scholarly journals Design of IoT based Smart Home System

2021 ◽  
Vol 23 (12) ◽  
pp. 249-261
Author(s):  
Monish Chandradhara ◽  
◽  
Ashlin George ◽  
Mohammed Faraaz ◽  
Aryan Saraf ◽  
...  

The Internet of Things (IoT) is used to describe a network of physical objects which are connected to each other with the help of embedded sensors, transceivers and software code to communicate and share data with each other. The Internet of Things, which first took shape back in the 1980s through an ARPA-NET connected Coca-Cola Vending machine in Carnegie Mellon University has come a long way since then. In today’s world a growing proportion of new home appliances are coming with IoT features embedded in them. These include, but are not limited to Television Sets, Refrigerators, Microwave Ovens, Fitness trackers, Smart watches and even IoT enabled light bulbs. IoT devices are not only used in Homes but also in Industries where they can play a pivotal role in bringing down operating costs and helping companies make better business decisions to align their companies in the right direction. With the advent of Industrial Internet of Things (IIoT) and Industry 4.0, a new standard has been set that organizations follow to gain a lot of key advantages such as improving productivity, customer experience, driving down costs and taking better informed decisions. IoT devices have also entered the healthcare industry where they play a paramount role in monitoring vital signs of patients. These devices continuously monitor all the vital signs such as heart rate, blood pressure and oxygen saturation.

2019 ◽  
Vol 8 (S3) ◽  
pp. 45-49
Author(s):  
V. Bhagyasree ◽  
K. Rohitha ◽  
K. Kusuma ◽  
S. Kokila

The Internet of Things anticipates the combination of physical gadgets to the Internet and their access to wireless sensor data which makes it useful to restrain the physical world. Big Data convergence has many aspects and new opportunities ahead of business ventures to get into a new market or enhance their operations in the current market. The existing techniques and technologies is probably safe to say that the best solution is to use big data tools to provide an analytical solution to the Internet of Things. Based on the current technology deployment and adoption trends, it is visioned that the Internet of Things is the technology of the future; while to-day’s real-world devices can provide best and valuable analytics, and people in the real world use many IOT devices. In spite of all the advertisements that companies offer in connection with the Internet of Things, you as a liable consumer, have the right to be suspicious about IoT advertisements. This paper focuses on the Internet of things concerning reality and what are the prospects for the future.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


Author(s):  
Clinton Fernandes ◽  
Vijay Sivaraman

This article examines the implications of selected aspects of the Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015, which was passed by the Australian Parliament in March 2015. It shows how the new law has strengthened protections for privacy. However, focusing on the investigatory implications, it shows how the law provides a tactical advantage to investigators who pursue whistleblowers and investigative journalists. The article exposes an apparent discrepancy in the way ‘journalist’ is defined across different pieces of legislation. It argues that although legislators’ interest has been overwhelmingly focused on communications data, the explosion of data generated by the so-called Internet-of-Things (IoT) is as important or more. It shows how the sensors in selected IoT devices lead to a loss of user control and will enable non-stop, involuntary and ubiquitous monitoring of individuals. It suggests that the law will need to be amended further once legislators and investigators’ knowledge of the potential of IoT increases. 


Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


CAHAYAtech ◽  
2020 ◽  
Vol 9 (1) ◽  
Author(s):  
Adetya Windiarto Makhmud ◽  
Tutus Praningki ◽  
Ira Luvi Indah

Drying clothes is one of the daily activities of people who use solar energy. With these conditions, people are very dependent on weather conditions that are sometimes erratic. One of the right ways is by utilizing technology, namely using an automatic clothesline using a Wemos D1Mini microcontroller, equipped with an LDR sensor that will read light intensity and the DHT11 sensor will read humidity and temperature around the environment. This tool is also based on the Internet of Things which can be accessed from anywhere as long as it is connected to the internet. Keyword: Microcontroller, LDR sensor, DHT11 sensor, Internet of Things.


Author(s):  
Kundankumar Rameshwar Saraf ◽  
Malathi P. Jesudason

This chapter explores the encryption techniques used for the internet of things (IoT). The security algorithm used for IoT should follow many constraints of an embedded system. Hence, lightweight cryptography is an optimum security solution for IoT devices. This chapter mainly describes the need for security in IoT, the concept of lightweight cryptography, and various cryptographic algorithms along with their shortcomings given IoT. This chapter also describes the principle of operation of all the above algorithms along with their security analysis. Moreover, based on the algorithm size (i.e., the required number of gate equivalent, block size, key size, throughput, and execution speed of the algorithm), the chapter reports the comparative analysis of their performance. The chapter discusses the merits and demerits of these algorithms along with their use in the IoT system.


Author(s):  
Vishwas D. B. ◽  
Gowtham M. ◽  
Gururaj H. L. ◽  
Sam Goundar

In the era of mechanical digitalization, organizations are progressively putting resources into apparatuses and arrangements that permit their procedures, machines, workers, and even the products themselves to be incorporated into a solitary coordinated system for information assortment, information examination, the assessment of organization advancement, and execution improvement. This chapter presents a reference guide and review for propelling an Industry 4.0 venture from plan to execution, according to base on the economic and scientific policy of European parliament, applying increasingly effective creation forms, and accomplishing better profitability and economies of scale may likewise bring about expanded financial manageability. This chapter present the contextual analysis of a few Industry 4.0 applications. Authors give suggestions coordinating the progression of Industry 4.0. This section briefly portrays the advancement of IIoT 4.0. The change of ubiquitous computing through the internet of things has numerous difficulties related with it.


Author(s):  
Nipun R. Navadia ◽  
Gurleen Kaur ◽  
Harshit Bhardwaj ◽  
Taranjeet Singh ◽  
Aditi Sakalle ◽  
...  

Cloud storage is a great way for companies to fulfill more of their data-driven needs and excellent technology that allows the company to evolve and grow at a faster pace, accelerating growth and providing a flexible forum for developers to build useful apps for better devices to be developed over the internet. The integration of cloud computing and the internet of things creates a scalable, maintainable, end-to-end internet of things solution on the cloud network. By applying the infrastructure to the real universe, it generates sources of insight. Cloud computing and IoT are separate technology but are closely associated and are termed as ‘cloud-based IoT' as IoT has the ability to create intelligent goods and services, gather data that can affect business decisions and probably change the business model to boost success and expansion, and cloud infrastructure can be at the heart of all IoT has to deliver.


Sensors ◽  
2020 ◽  
Vol 20 (23) ◽  
pp. 6761
Author(s):  
Anjan Bandyopadhyay ◽  
Vikash Kumar Singh ◽  
Sajal Mukhopadhyay ◽  
Ujjwal Rai ◽  
Fatos Xhafa ◽  
...  

In the Internet of Things (IoT) + Fog + Cloud architecture, with the unprecedented growth of IoT devices, one of the challenging issues that needs to be tackled is to allocate Fog service providers (FSPs) to IoT devices, especially in a game-theoretic environment. Here, the issue of allocation of FSPs to the IoT devices is sifted with game-theoretic idea so that utility maximizing agents may be benign. In this scenario, we have multiple IoT devices and multiple FSPs, and the IoT devices give preference ordering over the subset of FSPs. Given such a scenario, the goal is to allocate at most one FSP to each of the IoT devices. We propose mechanisms based on the theory of mechanism design without money to allocate FSPs to the IoT devices. The proposed mechanisms have been designed in a flexible manner to address the long and short duration access of the FSPs to the IoT devices. For analytical results, we have proved the economic robustness, and probabilistic analyses have been carried out for allocation of IoT devices to the FSPs. In simulation, mechanism efficiency is laid out under different scenarios with an implementation in Python.


Sign in / Sign up

Export Citation Format

Share Document