The Internet of Things
Latest Publications


TOTAL DOCUMENTS

24
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

Published By IGI Global

9781522518327, 9781522518334

2017 ◽  
pp. 423-440
Author(s):  
In Lee

This paper introduces IoT categories used to build smart enterprises and discusses how Fortune 500 companies may use various IoT applications to innovate their business models. The authors' analysis reveals that there is a significant relationship between the type of IoT applications and the IoT adoption rate and there is also a significant relationship between the type of business model innovation and the IoT adoption rate. Finally, five implementation strategies for smart enterprise development are discussed.


2017 ◽  
pp. 88-111 ◽  
Author(s):  
Cristina Elena Turcu ◽  
Corneliu Octavian Turcu

This chapter presents a future vision for healthcare, which will involve smart devices, Internet of Things, and social networks, that make this vision a reality. The authors present the necessary background by introducing the Social Internet of Things paradigm. Agent technology seems to be a promising approach in the adoption of the Social Internet of Things in collaborative environments with increased autonomy and agility, like healthcare is. Also, it is examined challenges to the adoption of the Social Internet of Things in healthcare in order to facilitate new applications and services in more effective and efficient ways.


2017 ◽  
pp. 507-526
Author(s):  
Peter J. Hawrylak ◽  
Steven Reed ◽  
Matthew Butler ◽  
John Hale

Access to resources, both physical and cyber, must be controlled to maintain security. The increasingly connected nature of our world makes access control a paramount issue. The expansion of the Internet of Things into everyday life has created numerous opportunities to share information and resources with other people and other devices. The Internet of Things will contain numerous wireless devices. The level of access each user (human or device) is given must be controlled. Most conventional access control schemes are rigid in that they do not account for environmental context. This solution is not sufficient for the Internet of Things. What is needed is a more granular control of access rights and a gradual degradation or expansion of access based on observed facts. This chapter presents an access control system termed the Access of Things, which employs a gradual degradation of privilege philosophy. The Access of Things concept is applicable to the dynamic security environment present in the Internet of Things.


2017 ◽  
pp. 491-506
Author(s):  
Padmalaya Nayak

Internet of Things (IoT) is not a futuristic intuition, it is present everywhere. It is with devices, Sensors, Clouds, Big data, and data with business. It is the combination of traditional embedded systems combined with small wireless micro sensors, control systems with automation, and others that makes a huge infrastructure. The integration of wireless communication, micro electro mechanical devices, and Internet has led to the development of new things in the Internet. It is a network of network objects that can be accessed through the Internet and every object can be identified by unique identifier. By replacing IPV4, IPV6 plays a key role and provides a huge increase of address spaces for the development of things in the Internet. The objective of IoT application is to make the things smart without the human intervention. With the increasing number of smart nodes and amount of data that generated by each node is expected to create new concerns about data privacy, data scalability, data security, data manageability and many more issues that have been discussed in this chapter.


2017 ◽  
pp. 441-459
Author(s):  
Grzegorz Chmaj ◽  
Henry Selvaraj

Nowadays we are witnessing a trend with significantly increasing number of networked and computing-capable devices being integrated into everyday environment. This trend is expected to continue. With computing devices available as logic structures, they might use each other's processing capabilities to achieve a given goal. In this paper, the authors propose an architectural solution to perform the processing of tasks using a distributed structure of Internet of Things devices. They also include ZigBee devices that are not connected to the Internet, but participate with the processing swarm using local network. This significantly extends the flexibility and potential of the IoT structure, while being still not a well-researched area. Unlike many high-level realizations for IoT processing, the authors present a realization operating on the communications, computing and near protocol level that achieves energy consumption efficiency. They also include the reconfigurability of IoT devices. The authors' work is suitable to be the base for higher-level realizations, especially for systems with devices operating on battery power. At the same time, the architecture presented in this paper uses minimal centralization, moving maximum responsibilities to regular devices. The proposed realizations are described using linear programming models and their high efficiency is evaluated.


2017 ◽  
pp. 398-422 ◽  
Author(s):  
Meisong Wang ◽  
Charith Perera ◽  
Prem Prakash Jayaraman ◽  
Miranda Zhang ◽  
Peter Strazdins ◽  
...  

Internet of Things (IoT) has gained substantial attention recently and play a significant role in smart city application deployments. A number of such smart city applications depend on sensor fusion capabilities in the cloud from diverse data sources. The authors introduce the concept of IoT and present in detail ten different parameters that govern our sensor data fusion evaluation framework. They then evaluate the current state-of-the art in sensor data fusion against our sensor data fusion framework. The authors' main goal is to examine and survey different sensor data fusion research efforts based on our evaluation framework. The major open research issues related to sensor data fusion are also presented.


2017 ◽  
pp. 241-259 ◽  
Author(s):  
Edewede Oriwoh ◽  
Geraint Williams

The Internet of Things (IoT), a metaphor for smart, functional Cyberphysical Environments (CPE), is finding some usefulness in various sectors including healthcare, security, transportation, and the Smart Home (SH). Within the IoT, objects potentially operate autonomously to provide specified services and complete assigned tasks. However, the introduction of new technologies and/or the novel application of existing ones usually herald the discovery of unfamiliar security vulnerabilities, which lead to exploits and sometimes to security breaches. There is existing research that identifies IoT-related security concerns and breaches. This chapter discusses existing Digital Forensics (DF) models and methodologies for their applicability (or not) within the IoT domain using the SH as a case in point. The chapter also makes the argument for smart forensics, the use of a smart autonomous system (tagged the Forensics Edge Management System [FEMS]) to provide forensic services within the self-managed CPE of the SH.


2017 ◽  
pp. 205-240
Author(s):  
Rami Haidar Ahmad ◽  
Al-Sakib Khan Pathan

The increase of the applications of numerous innovative technologies and associated devices has brought forward various new concepts like Cyber-Physical System (CPS), Internet of Things (IoT), Smart environment, Smart cities, and so on. While the boundary lines between these concepts and technologies are often kind of blur and perhaps, each one's development is helping the development of the other, M2M (Machine to Machine) communication would surely play a great role as a key enabler of all these emerging scenarios. When we see the same smart concept from different angles; for instance, from the participating device, or human being's angle, we get different definitions and concept-specific standards. In this chapter, our objective is to study M2M system and communication along with its security issues and intrusion detection systems. We have also proposed our framework in line with the standardization efforts for tackling security issues of M2M.


2017 ◽  
pp. 137-160 ◽  
Author(s):  
Ilze Black ◽  
Graham White

This chapter discusses the emergence of the Internet of Things, using a case study of a citizen science initiative, focusing in particular on issues involved in measuring air quality. The core of the citizen science initiative was formed by a world-wide network of early adaptors of the Internet of Things who, motivated by public health issues, set out to create widely available tools for air quality measuring. With these tools, they established a global, citizen-led, air quality measurement network. Besides highlighting a number of social and technological issues which are involve any such enterprise, this chapter engages with the discourse surrounding the use of IoT in collective sensing projects. Two questions are salient here. Firstly, can IoT technology be used in a citizen science context to monitor air quality? And secondly, does the construction of these devices lead to a successful mobilisation around issues of air quality?


2017 ◽  
pp. 112-136
Author(s):  
Adrian Copie ◽  
Bogdan Manațe ◽  
Victor Ion Munteanu ◽  
Teodor-Florin Fortiș

The astonishing expansion of Internet of Things has opened a lot of opportunities for related domains to employ strategies that were successfully used for the “things” governance. Furthermore, because of the technology blending in the most common household devices and wearable items, it becomes very easy for the computers to sense the surrounding environment and to collect information about the inhabitants, therefore transforming the intelligent house in a Home Care System (HCS). For medical conditions like dementia and its associated diseases, it is very convenient to monitor the patients in their living space because the patient will benefit from their home comfort. In addition, the costs for in hospital monitoring will decrease. This chapter proposes an Internet of Things Governance Architecture that can be used to sustain and monitor a complex e-health system, with application especially for patients with dementia and its associated diseases.


Sign in / Sign up

Export Citation Format

Share Document