scholarly journals IoT Masters Programs

Author(s):  
М.А. Держо ◽  
М.М. Лаврентьев ◽  
А.В. Шафаренко

В данной работе обсуждаются фундаментальные вопросы разработки программ магистратуры в области Интернета вещей (Internet of Things — IoT). Мы кратко сравниваем предложения Сколтеха и Стэнфорда и утверждаем, что наиболее гибкое решение достигается посредством вводного блока и четырех параллельных потоков учебных курсов: обработка сигналов и управление, обучение машин и искусственный интеллект (ИИ), программирование и схемотехника платформ с применением микроконтроллеров, и, наконец, сети и кибербезопасность. Вводный блок предполагается оснастить достаточным количеством предметов по выбору, чтобы поступающие выпускники бакалавриата из областей прикладной математики, информационных технологий и электроники/телекоммуникаций могли приобрести необходимые знания для освоения потоковых курсов. Мы утверждаем, что еще одним необходимым отличием программы IoT должен явиться междисциплинарный групповой дипломный проект значительного объема, также основанный на потоковых курсах. This paper discusses the fundamentals of postgraduate curriculum development for the area of the Internet of Things (IoT). We provide a brief contrasting analysis of Skoltech and Stanford Masters programs and argue that the most flexible way forward is via the introduction of a leveling-off, elective introductory stage, and four parallel course streams: signal processing and control; Artificial Intelligence (AI), and machine learning; microcontroller systems design; and networks and cyber security. The leveling-off stage is meant to provide sufficient electives for graduates of applied math, Information Technologies (IT), or electronics/telecom degrees to learn the necessary fundamentals for the stream modules. We argue that another distinguishing feature of an IoT masters program is a large project drawing on the stream modules and requiring a multidisciplinary, team development effort.

Author(s):  
Э.Д. Алисултанова ◽  
Л.К. Хаджиева ◽  
М.З. Исаева

Данная статья посвящена созданию профориентационной (умной) лаборатории, которая призвана сформировать у школьников базовые представления о технологии Интернет вещей (IoT), угрозах кибербезопасности в этой сфере, мотивировать к получению в будущем профильного образования и построению карьеры в области обеспечения безопасности Интернет вещей (IoT) при функционировании умного производства. Обучение школьников в профориентационной лаборатории, построенное на основе применения интерактивных электронных образовательных ресурсов, прежде всего будет позиционировать карьерные возможности будущих специалистов в сфере обеспечения безопасности Интернет вещей (IoT) при функционировании умного производства. В рамках функционирования лаборатории особое внимание обучающихся сконцентрировано на тематиках правовых аспектов обеспечения кибербезопасности, главных тенденциях развития киберугроз в современном глобальном информационном пространстве и мерах, необходимых для их нейтрализации. This article is devoted to the creation of a career-oriented (smart) laboratory, which is designed to formulate in schoolchildren basic ideas about the Internet of Things (IoT) technology, cyber security threats in this area, motivate to receive specialized education in the future and build a career in the field of Internet things (IoT) security) with the functioning of smart manufacturing. The training of schoolchildren in a vocational guidance laboratory, based on the use of interactive electronic educational resources, will primarily position the career opportunities of future specialists in the field of Internet of Things (IoT) security in the operation of smart manufacturing. Within the framework of the functioning of the laboratory, special attention of students is concentrated on the topics of the legal aspects of ensuring cyber security, the main trends in the development of cyber threats in the modern global information space and the measures necessary to neutralize them.


2020 ◽  
Vol 60 (11) ◽  
pp. 16-20
Author(s):  
Vugar Hajimahmud Abdullayev ◽  
◽  
Vusala Alyag Abuzarova ◽  

The article is devoted to the study of cyber security problems in the Smart Cities system. The development of the IT industry has led to the introduction of new technologies into our lives. One of these technologies is the Internet of Things technology. The application of IoT technology has increased in recent years. One of the most important areas in which Internet of Things technology is applied is the Smart Cities system. The main difference between smart cities and other cities is that their components are connected to each other via the Internet. All these smart devices create a smart city system in general. One of the biggest and most important problems in many areas where the Internet is used is security. The article looks at possible security problems in the system of smart cities and solutions to ensure cyber security. Key words: Smart city; Internet of Things; Information technologies; Security; Cyber security


Author(s):  
Zelal Gültekin Kutlu

In this study, the periodical differences of industrial revolutions, which is one of the effects of technological developments in the industrial field, and the last stage of it are mentioned. With the latest industrial revolution called Industry 4.0, machines work in harmony with technology at every stage of industrial areas. This period, known as Industry 4.0 or the fourth industrial revolution, refers to the system in which the latest production technologies, automation systems, and the technologies that make up this system exchange data with each other. In addition to the information technologies and automation systems used in Industry 3.0, industrial production has gained a whole new dimension with the use of the internet. With internet networks, machines, operators, and robots now work in harmony. At this point, the concept of internet of objects becomes important. Therefore, another focus of the study is the concept of internet of objects. There are some assumptions about the uses, benefits, and future status of the internet of things.


Author(s):  
Jonika Lamba ◽  
Esha Jain

Cybersecurity is not just about fortification of data. It has wide implications such as maintaining safety, privacy, integrity, and trust of the patients in the healthcare sector. This study methodically reviews the need for cybersecurity amid digital transformation with the help of emerging technologies and focuses on the application and incorporation of blockchain and the internet of things (IoT) to ensure cybersecurity in the well-being of the business. It was found in the study that worldwide, advanced technology has been used in managing the flow of data and information, India should focus on maintaining the same IT-enabled infrastructure to reduce causalities in the nation and on the other hand improve administration, privacy, and security in the hospital sector. Depending on the network system, resource allocation, and mobile devices, there is a need to prioritize the resources and efforts in the era of digitalization.


Author(s):  
Md Alimul Haque ◽  
Shameemul Haque ◽  
Kailash Kumar ◽  
Narendra Kumar Singh

The role of the internet of things (IoT) and cyberspace in a digital society is well recognized, and they have become tremendously popular due to certain features like the ability to ease the operational process of businesses and instant communication. Recent developments in the fields of wireless communication networks like 4G, 5G, and 6G with IoT applications have greatly benefited human welfare. Still, the rapid growth of various IoT applications focuses on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. It has also contributed to unethical practices by hackers who use new tools and techniques to penetrate more complex or well-controlled environments and produce increased damage and even remain under the cover. The main objective of this chapter is to improve understanding of the challenges to secure future digital infrastructure while it is still evolving. In this context, a detailed review of the security-related issues, challenges, threats, and countermeasures in the IoT applications is presented.


2021 ◽  
Author(s):  
Jehad Ali ◽  
Byeong-hee Roh

Separating data and control planes by Software-Defined Networking (SDN) not only handles networks centrally and smartly. However, through implementing innovative protocols by centralized controllers, it also contributes flexibility to computer networks. The Internet-of-Things (IoT) and the implementation of 5G have increased the number of heterogeneous connected devices, creating a huge amount of data. Hence, the incorporation of Artificial Intelligence (AI) and Machine Learning is significant. Thanks to SDN controllers, which are programmable and versatile enough to incorporate machine learning algorithms to handle the underlying networks while keeping the network abstracted from controller applications. In this chapter, a software-defined networking management system powered by AI (SDNMS-PAI) is proposed for end-to-end (E2E) heterogeneous networks. By applying artificial intelligence to the controller, we will demonstrate this regarding E2E resource management. SDNMS-PAI provides an architecture with a global view of the underlying network and manages the E2E heterogeneous networks with AI learning.


Author(s):  
Jathan Sadowski ◽  
Frank Pasquale

There is a certain allure to the idea that cities allow a person to both feel at home and like a stranger in the same place. That one can know the streets and shops, avenues and alleys, while also going days without being recognized. But as elites fill cities with “smart” technologies — turning them into platforms for the “Internet of Things” (IoT): sensors and computation embedded within physical objects that then connect, communicate, and/or transmit information with or between each other through the Internet — there is little escape from a seamless web of surveillance and power. This paper will outline a social theory of the “smart city” by developing our Deleuzian concept of the “spectrum of control.” We present two illustrative examples: biometric surveillance as a form of monitoring, and automated policing as a particularly brutal and exacting form of manipulation. We conclude by offering normative guidelines for governance of the pervasive surveillance and control mechanisms that constitute an emerging critical infrastructure of the “smart city.”


Author(s):  
Praveen Pandey

Abstract: Cyber security are techniques generally set forth in published materials that attempt to safeguard the cyber environment of a user or organization. It manages the set of techniques used to save the integrity of networks, programs and data from unauthorized access. It refers to the body of technologies, processes, and it may also be referred to as information technology security. The field is of growing importance due to increasing reliance on computer systems, including smart phones, televisions and the various tiny devices that constitute the Internet of Things. Keywords: IT security, Internet of things (IOT)


Sign in / Sign up

Export Citation Format

Share Document