IoT Protocols and Applications for Improving Industry, Environment, and Society - Advances in Web Technologies and Engineering
Latest Publications


TOTAL DOCUMENTS

11
(FIVE YEARS 11)

H-INDEX

0
(FIVE YEARS 0)

Published By IGI Global

9781799864639, 9781799864653

Author(s):  
Liliana Maria Favre

Smartphones are at the core of new paradigms such as cloud computing, pervasive computing, and internet of things. Frequently, the development of mobile software requires adaptation of valuable and tested non-mobile software. In this context, most challenges are related to the diversity of platforms on the smartphones market and to the need of systematic and reusable processes with a high degree of automation that reduce time, cost, and risks. To face these challenges, this chapter presents an analysis of non-mobile software modernization through an integration of MDE (model-driven engineering) with cross-platform development. Two approaches are analyzed. One of them is a lightweight process that combines MDA (model-driven architecture) with traditional static and dynamic analysis techniques of reverse engineering. The other approach is based on ADM (architecture-driven modernization) standards. A scenario for the migration of C/C++ or Java software through the multiplatform Haxe language is described.


Author(s):  
Ambika N.

The internet of things is the technology that aims to provide a common platform to the devices of varying capabilities to communicate. Industrial internet of things (IIoT) systems can perform better using these devices in combination with SDN network and blockchain technology. The suggestion uses random space learning (RSL) comprising three stages. The random subspace learning strategy is a troupe learning procedure called attributes bagging. It improves forecast and order errands as it utilizes group development of base classifiers rather than a solitary classifier, and it takes arbitrary subsets of properties rather than the whole arrangement of attributes. The system uses the blockchain methodology to secure the system. SDN networks aim to better the transmission of data in industrial IoT devices. Misrouting and forged attacks are some of the common attacks in these systems. The proposal provides better reliability than the previous contribution by 2.7%.


Author(s):  
Jayashree K. ◽  
Babu R.

The internet of things comprises billions of devices, people, and services and entitles each to connect through sensor devices. These sensor devices influence the real world by administering critical network infrastructure and sometimes may collect sensitive private information about individuals. Managing this data authentication of who can access the device data and under what circumstances it can be found and used by others is one of the major threats for consumers and businesses. So, the internet of things services deliver new privacy challenges in our day-to-day lives. Though information systems discipline addressed research in privacy to a great extent, there still prevails no robust approach for the inspection of privacy breaches in the internet of things services. This chapter provides a detailed view on the privacy concerns in various aspects and scrutinizes the challenges to be addressed to ensure that the internet of things becomes true in near future.


Author(s):  
Kamalendu Pal

The manufacturing industry tends to worldwide business operations due to the economic benefits of product design and distribution operations. The design and development of a manufacturing enterprise information system (EIS) involve different types of decision making at various levels of business control. This decision making is complex and requires real-time data collection from machines, business processes, and operating environments. Enterprise information systems are used to support data acquisition, communication, and all decision-making activities. Hence, information technology (IT) infrastructure for data acquisition and sharing affects the performance of an EIS significantly. The chapter highlights the advantages and disadvantages of an integrated internet of things (IoT) and blockchain technology on EIS in the modern manufacturing industry. Also, it presents a review of security-related issues in the context of an EIS consisting of IoT-based blockchain technology. Finally, the chapter discusses the future research directions.


Author(s):  
Asmaa Achtaich ◽  
Camille Salinesi ◽  
Nissrine Souissi ◽  
Raul Mazo ◽  
Ounsa Roudies

In the last five years, we witnessed the shift from the vision of the internet of things (IoT) to an actual reality. It is currently shifting again from specific and single applications to larger and more generic ones, which serves the needs of thousands of users across borders and platforms. To avoid losing the personification of applications, on account of genericity, new approaches and languages that use generic knowledge as a steppingstone while taking into consideration users and context's specific and evolutive needs are on the rise. This chapter aims to provide a framework to support the creation of such approaches (DSPL4IoT). It is later on used to assess notable IoT specification approaches and extract conclusion of the trends and persistent challenges and directions. An approach for the specification of natural language (NL) requirements for IoT systems is also provided to assist domain and application engineers with the formulations of such requirements.


Author(s):  
Jerin Geo Jacob ◽  
Siji A. Thomas ◽  
Bivin Biju ◽  
Richarld John ◽  
Abhilash P. R.

This chapter discusses the design of a quantitative controlled pesticide sprayer and the development of an efficient algorithm for plant identification. The whole system is controlled using the raspberry pi and convolutional neural networks (CNN) algorithm for training the proposed model. Once the algorithm identifies the plant by processing the image, it is captured by using a pi camera, and it determines the pesticide and its dosage. The sensors will collect the information related to the plant condition such as humidity and surrounding temperature, which is simultaneously sent to the farmers/agriculture officers through the internet of things (IoT), for the purpose of live analysis, and they are stored using cloud services, making the system suitable for remote farming. The proposed algorithm is trained mainly for three types of plant leaves, which include tomato, brinjal, and chilly. The CNN algorithm scores accuracy of 97.2% with sensitivity and specificity of 0.94 and 0.95, respectively. The robot is intended to encourage the agriculturists for next-level farming to facilitate their work.


Author(s):  
Dominik Hromada ◽  
Rogério Luís de C. Costa ◽  
Leonel Santos ◽  
Carlos Rabadão

The Internet of Things (IoT) comprises the interconnection of a wide range of different devices, from Smart Bluetooth speakers to humidity sensors. The great variety of devices enables applications in several contexts, including Smart Cities and Smart Industry. IoT devices collect and process a large amount of data on machines and the environment and even monitor people's activities. Due to their characteristics and architecture, IoT devices and networks are potential targets for cyberattacks. Indeed, cyberattacks can lead to malfunctions of the IoT environment and access and misuse of private data. This chapter addresses security concerns in the IoT ecosystem. It identifies common threats for each of IoT layers and presents advantages, challenges, and limitations of promising countermeasures based on new technologies and strategies, like Blockchain and Machine Learning. It also contains a more in-depth discussion on Intrusion Detection Systems (IDS) for IoT, a promising solution for cybersecurity in IoT ecosystems.


Author(s):  
Silvia Fernandes

In the information age, activities and business models have become different. Factors such as new technologies and social media influence consumer behavior due to the variety of choices/channels. Companies are making a difference in consumers' minds by connecting with them active and creatively. Also, customers contribute with ideas and experiences, not only for products and services, but also for platforms and brands. Cyber-physical apps together with mobile media tend to revolutionize business models across multiple industries. This is important for tourism due to a contribution to link some still weakly linked activities across tourism sub-sectors in Portugal. The present work reflects on how Portugal is in terms of internet of things adoption (IoT) and digital transformation facing the challenges of sustainable and smart cities. It also explores which impacts this transformation can have through its platforms and processes in tourism and future services.


Author(s):  
Anjum Nazir Qureshi Sheikh ◽  
Asha Ambhaikar ◽  
Sunil Kumar

The internet of things is a versatile technology that helps to connect devices with other devices or humans in any part of the world at any time. Some of the researchers claim that the number of IoT devices around the world will surpass the total population on the earth after a few years. The technology has made life easier, but these comforts are backed up with a lot of security threats. Wireless medium for communication, large amount of data, and device constraints of the IoT devices are some of the factors that increase their vulnerability to security threats. This chapter provides information about the attacks at different layers of IoT architecture. It also mentions the benefits of technologies like blockchain and machine learning that can help to solve the security issues of IoT.


Author(s):  
Ambika N.

The internet of things, popularly known as IoT, is intelligent sensors working together to accomplish a task. These devices are used in innumerable applications, and they are aiming to minimize human efforts. These unsupervised devices require some amount of security. Hence, the previous systems use blockchains to enhance security. The hashing system used in this technology preserves the security and confidentiality among the stakeholders. Medchain is a system that communicates between the personnel and insurance dealings securely. To enhance reliability of the previous work, the proposal is proposed. The methodology used in the contribution enhances the reliability by 2.89% compared to the previous proposal.


Sign in / Sign up

Export Citation Format

Share Document