Transforming the Internet of Things for Next-Generation Smart Systems - Advances in Computational Intelligence and Robotics
Latest Publications


TOTAL DOCUMENTS

8
(FIVE YEARS 8)

H-INDEX

0
(FIVE YEARS 0)

Published By IGI Global

9781799875413, 9781799875437

Author(s):  
Nalina Suresh ◽  
Valerianus Hashiyana ◽  
Martin Mabeifam Ujakpa ◽  
Anton Limbo ◽  
Gloria E. Iyawa ◽  
...  

The term “cloud of things” is currently in the forefront of computer research topics due to its vital role towards the internet of things. To integrate cloud computing and internet of things into a single technology or worldview, this chapter discussed the evolution of internet of things and cloud computing and reviewed literature on cloud computing and internet of things and their possible integration. The chapter also discussed the importance of cloud internet of things, its architecture, and operation; the need to integrate internet of things and cloud computing; and challenges of cloud internet of things. The chapter then used the identified open issues and future direction to propose a generic cloud internet of things architecture and pilot simulated the results to verify the possibility and effectiveness of cloud computing and internet of things (CIoTs) integration. The researchers believe that the chapter will provide a better insight for anyone who wishes to carry out research in the field of cloud internet of things.


Author(s):  
Aditya Sam Koshy ◽  
Nida Fatima ◽  
Bhavya Alankar ◽  
Harleen Kaur ◽  
Ritu Chauhan

The world is going through growth in smart cities, and this is possible because of a revolution of information technology contributing towards social and economic changes and hence endowing challenges of security and privacy. At present, everything is connected through internet of things in homes, transport, public progress, social systems, etc. Nevertheless, they are imparting incomparable development in standard of living. Unified structure commits to welfare, well-being, and protection of people. This chapter surveys two consequential threats, that is, privacy and security. This chapter puts forward review of some paperwork done before consequently finding the contributions made by author and what subsequent work can be carried out in the future. The major emphasis is on privacy security of smart cities and how to overcome the challenges in achievement of protected smart city structure.


Author(s):  
Syed Ariz Manzar ◽  
Sindhu Hak Gupta ◽  
Bhavya Alankar

Energy consumption has become a prime concern in designing wireless sensor networks (WSN) for the internet of things (IoT) applications. Smart cities worldwide are executing exercises to progress greener and safer urban situations with cleaner air and water, better adaptability, and capable open organizations. These exercises are maintained by progresses like IoT and colossal information examination that structure the base for smart city model. The energy required for successfully transmitting a packet from one node to another must be optimized so that the average energy gets reduced for successful transmission over a channel. This chapter has been devised to optimize the energy required for transmitting a packet successfully between two communicating sensor nodes using particle swarm optimization (PSO). In this chapter, the average energy for successfully transmitting a packet from one node to another has been optimized to achieve the optimal energy value for efficient communication over a channel. The power received by the sensor node has also been optimized.


Author(s):  
Anton Limbo ◽  
Nalina Suresh ◽  
Set-Sakeus Ndakolute ◽  
Valerianus Hashiyana ◽  
Titus Haiduwa ◽  
...  

Farmers in Namibia currently operate their irrigation systems manually, and this seems to increase labor and regular attention, especially for large farms. With technological advancements, the use of automated irrigation could allow farmers to manage irrigation based on a certain crops' water requirements. This chapter looks at the design and development of a smart irrigation system using IoT. The conceptual design of the system contains monitoring stations placed across the field, equipped with soil moisture sensors and water pumps to maintain the adequate moisture level in the soil for the particular crop being farmed. The design is implemented using an Arduino microcontroller connected to a soil moisture sensor, a relay to control the water pump, as well as a GSM module to send data to a remote server. The remote server is used to represent data on the level of moisture in the soil to the farmers, based on the readings from the monitoring station.


Author(s):  
Shruthi H. Shetty ◽  
Ashwath Rao ◽  
Rathishchandra R. Gatti

Internet of things (IoT) guarantees an incredible future for the internet where the sort of correspondence is machine-machine (M2M). This arising standard of networking will impact all aspects of lives going from the computerized houses to smart IoT-based systems by implanting knowledge into the articles. This chapter intends to give an exhaustive outline of the IoT, IIoT situation and audits its empowering innovations. And finally, applications resulting from IoT/IIoT that facilitate daily needs are discussed.


Author(s):  
Palanivel Kuppusamy ◽  
Suresh Joseph K.

Transforming IT systems educational applications has become imperative in a rapidly evolving global scenario. Today, educational organizations have to provide transparent, confident, secured information and quality data for monitoring and advanced predictive capabilities services to society. Educational organizations have to meet these objectives consistently during typical and crisis scenarios. Modern educational applications are integrated with social network sites, sensors, intelligent devices, and cloud platforms. Hence, data management solutions serve as the basis for educational organizations' information needs. However, modern technologies demand a re-engineer of these platforms to meet the ever-growing demand for better performance, scalability, and educational organizations' availability. This chapter discusses the challenges inherent to the existing educational data system, the architectural methods available to address the above challenges, and the roadmap for building next-generation educational data ecosystems.


Author(s):  
Rachna Jain

Internet of things (IoT) networks is the buzzword these days in Industry 4.0. IoT nodes are resource constrained and should be light enough to minimize the power consumption. IoT paradigm does not depend on human intervention at each and every step. There is a need of “trust” between communicating entities. Devices at physical layer are vulnerable to various attacks such as denial of service (DoS) attack, wormhole attack, etc. Trust becomes more important when vulnerability of attacks increases to the devices. This establishment of trust helps in handling risks in a controlled way in unpredicted situations as well as providing better services at infrastructure level. Social environments can evaluate trust while seeing the relationship between interacting parties; however, in service-oriented industries quality of service (QoS) parameters must be maintained while evaluating trust. So, in this chapter a unique metric expected transmission count (ETX) is employed for implementing QoS while evaluating trust between interacting entities using Cooja simulator.


Author(s):  
Ritu Chauhan ◽  
Sandhya Avasthi ◽  
Bhavya Alankar ◽  
Harleen Kaur

The IoT or the internet of things started as a technology to connect everyday objects over the internet, which has evolved into something big and invaded into every single aspect of our lives. As technology is gaining momentum, IoT-based smart devices usage among users is expanding, which generates massive data at our disposal across various domains. The authors have systematically studied the taxonomy of data analytics and the benefits of using advanced machine learning techniques in converting data into valuable assets. In the studies, they have identified and did due diligence on different smart home systems, their features, and configuration. During this course of study, they have also identified the vulnerability of such a system and threats associated with these vulnerabilities in a secure smart home environment.


Sign in / Sign up

Export Citation Format

Share Document