Search results for: web of things
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 851

Search results for: web of things

851 A Survey on Internet of Things and Fog Computing as a Platform for Internet of Things

Authors: Samira Kalantary, Sara Taghipour, Mansoure Ghias Abadi

Abstract:

The Internet of Things (IOT) is a technological revolution that represents the future of computing and communications. IOT is the convergence of Internet with RFID, NFC, Sensor, and smart objects. Fog Computing is the natural platform for IOT. At present, the IOT as a new network communication technology has rapidly shifted from concept to application under fog computing virtual storage computing platform. In this paper, we describe everything about IOT and difference between cloud computing and fog computing.

Keywords: cloud computing, fog computing, Internet of Things (IoT), IOT application

Procedia PDF Downloads 586
850 Evaluating Global ‘Thing’ Security of Consumer Products

Authors: Achutha Raman

Abstract:

Today's brave new world features a bonanza of digitally interconnected products, or ‘things,’ that improve convenience, possibilities, and in some cases efficiency for consumers. Nonetheless, even as the market accelerates, this Internet of ‘things’ is subject to substantial leakage of consumer personal data. First defining the fluid concept of ‘things,’ this paper subsequently uses case studies taken from the EU, Asia, and the US, to highlight large gaps and comprehensively evaluate the state of security for consumer ‘things.’ Ultimately, this paper offers several ways of improving the present status quo, and especially focuses on an evaluative approach that augments the standard mechanism of Firmware Over the Air Updates, and ought to be easily implementable.

Keywords: cybersecurity, FOTA, Internet of Things, transnational privacy

Procedia PDF Downloads 218
849 Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things

Authors: Aabiah Nayeem, Fariha Shafiq, Mustabshra Aftab, Rabia Saman Pirzada, Samia Ghazala

Abstract:

In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today’s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities.

Keywords: embedded computing, internet of things, mobile computing, wireless technologies

Procedia PDF Downloads 317
848 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises

Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh

Abstract:

As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.

Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan

Procedia PDF Downloads 42
847 Calculate Product Carbon Footprint through the Internet of Things from Network Science

Authors: Jing Zhang

Abstract:

To reduce the carbon footprint of mankind and become more sustainable is one of the major challenges in our era. Internet of Things (IoT) mainly resolves three problems: Things to Things (T2T), Human to Things, H2T), and Human to Human (H2H). Borrowing the classification of IoT, we can find carbon prints of industries also can be divided in these three ways. Therefore, monitoring the routes of generation and circulation of products may help calculate product carbon print. This paper does not consider any technique used by IoT itself, but the ideas of it look at the connection of products. Carbon prints are like a gene or mark of a product from raw materials to the final products, which never leave the products. The contribution of this paper is to combine the characteristics of IoT and the methodology of network science to find a way to calculate the product's carbon footprint. Life cycle assessment, LCA is a traditional and main tool to calculate the carbon print of products. LCA is a traditional but main tool, which includes three kinds.

Keywords: product carbon footprint, Internet of Things, network science, life cycle assessment

Procedia PDF Downloads 116
846 An Analysis of Privacy and Security for Internet of Things Applications

Authors: Dhananjay Singh, M. Abdullah-Al-Wadud

Abstract:

The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.

Keywords: Internet of Things (IoT), message authentication, privacy, security

Procedia PDF Downloads 384
845 Courtesy to Things and Sense of Unity with the Things: Psychological Evaluation Based on the Teaching of Buddha

Authors: H. Kamide, T. Arai

Abstract:

This study aims to clarify factors of courtesy to things and the effect of courtesy on a sense of unity with things based on the teaching of Buddha. The teaching of Buddha explains when dealing with things in a courteous manner carefully, the border between selves and the external world disappears, then both are united. This is an example in Buddhist way that explains the connections with all existences, and in the modern world, it is also a lesson that humans should not let matters go to waste and treat them politely. In order to reveal concrete ways to practice courtesy to things, we clarify the factors of courtesy (Study 1) and examine the effect of courtesy on the sense of unity with the things (Study 2). In Study 1, 100 Japanese (mean age=54.39, SD=15.04, 50% female) described freely about what is courtesy to things that they use daily. These descriptions were classified, and 25 items were made asking for the degree of courtesy to the things. Then different 678 Japanese (mean age=44.72, SD=13.14, 50% female) answered the 25 items on 7-point about tools they use daily. An exploratory factor analysis revealed two factors. The first factor (α=.97) includes 'I deal with the thing carefully' and 'I clean up the thing after use'. This factor reflects how gently people care about things. The second factor (α=.96) includes 'A sense of self-control has come to me through using the thing' and 'I have got inner strength by taking care of the thing'. The second factor reflects how people learn by dealing with things carefully. In this Study 2, 200 Japanese (mean age=49.39, SD=11.07, 50% female) answered courtesy about things they use daily and the degree of sense of unity with the things using the inclusion of other in the self scale, replacing 'Other' with 'Your thing'. The ANOVA was conducted to examine the effect of courtesy (high/low level of two factors) on the score of sense of unity. The results showed the main effect of care level. People with a high level of care have a stronger sense of unity with the thing. The tendency of an interaction effect is also found. The condition with a high level of care and a high level of learning enhances the sense of unity more than the condition of a low level of care and high level in learning. Study 1 found that courtesy is composed of care and learning. That is, courtesy is not only active care to the things but also to learn the meaning of the things and grow personally with the things. Study 2 revealed that people with a high level of care feel a stronger sense of unity and also people with both a high level of care and learn tend to do so. The findings support the idea of the teaching of Buddha. In the future, it is necessary to examine a combined effect of care and learning.

Keywords: courtesy, things, sense of unity, the teaching of Buddha

Procedia PDF Downloads 152
844 Internet of Things Applications on Supply Chain Management

Authors: Beatriz Cortés, Andrés Boza, David Pérez, Llanos Cuenca

Abstract:

The Internet of Things (IoT) field is been applied in industries with different purposes. Sensing Enterprise (SE) is an attribute of an enterprise or a network that allows it to react to business stimuli originating on the internet. These fields have come into focus recently on the enterprises and there is some evidence of the use and implications in supply chain management while finding it as an interesting aspect to work on. This paper presents a revision and proposals of IoT applications in supply chain management.

Keywords: industrial, internet of things, production systems, sensing enterprises, sensor, supply chain management

Procedia PDF Downloads 426
843 Internet of Things (IoT): An Analysis of Cost, Benefits, Risks and Enablers

Authors: Shwadhin Sharma, Monica Perez, Vinita Patel, Tyler Kuwatani, Siobhan Scott

Abstract:

The purpose of this research is to explain and analyze why the Internet of Things (IoT) is an emerging technology trend. The aspects of this research paper include an overview of IoT, what research has already been done, the benefits, implications, and our own perspectives on the trend in order to thoroughly analyze how the trend of IoT will make an impact on society. Through the identification of what makes IoT important, it is concluded that IoT will have a tremendous impact for the whole world. Technology is never going to go away, it is going to get smarter and have the potential to change the world.

Keywords: internet of things, enablers of IoT, cost of IoT, benefits of IoT

Procedia PDF Downloads 358
842 The Determinants of Behavioral Intention to Use toward T-Cash Services Provider in Jakarta and Surburban Area

Authors: Stephen Coandadiputra, Chrestella Carissa

Abstract:

Technology is created to simplify human’s life. One of current technology which being called as the second wave internet generation is the internet of things. Internet of things lets thousands of devices connected each other. In today's marketing world, IOT has brought customer into the next level which helping the customer to shorten every transaction they are conducting from traditional approach to sophisticated approach. However, the implementation of technology has always obstacles. The objective of this paper is to explore the determinants of customer to accepts such technology like the internet of things within their transaction. According to TAM (Technology Acceptance Model), researcher constructs the acceptance of internet of things based on perceived usefulness, perceived ease of use and trust and social factor and the two customer characteristics: perceived enjoyment and perceived behavioral control. This research uses exploratory research design which being facilitated by spreading questionnaire to 145 T-cash users in Jakarta and in its suburban region. At least, 190 samples were observed and questioned accordingly. All the collected data will be analyzed using Lisrel.

Keywords: behavioral intention to use, internet of things, near field communication, technology acceptance model

Procedia PDF Downloads 336
841 Privacy for the Internet of Things and its Different Dimensions

Authors: Maryam M Esfahani

Abstract:

The Internet of Things is a concept that has fundamentally changed the way information technology works and communication environments. This concept, which is referred to as the next revolution in the field of information and communication technology, takes advantage of existing technologies such as wireless sensor networks, RFID, cloud computing, M2M, etc., to the final slogan of providing the possibility of connecting any object anywhere and everywhere. This use of technologies, along with the possibility of providing new services, also inherits their threats, and although the Internet of Things is facing many challenges, it can be said that its most important challenge is security and privacy, and perhaps even a more tangible challenge is privacy. In this article, we will first introduce the definition and concepts related to privacy, and then we will examine some threats against the privacy of the Internet of Things in different layers of a typical architecture. Also, while examining the differences and the relationship between security and privacy, we study different dimensions of privacy, and finally, we review some of the methods and technologies for improving the level of privacy.

Keywords: Iot, privacy, different dimension of privacy, W3model, privacy enhancing technologies

Procedia PDF Downloads 101
840 The Application of Internet of Things in Healthcare: Building an Interconnected Health Environment

Authors: Quinn Au, Amedeo Carmine, Tauheed Khan Mohd

Abstract:

The Internet of Things (IoT) is emerging as a new development in information technology in recent years, with the potential to improve convenience and efficiency in life. Following the rise of IoT, the Social Internet of Things (SIoT) is another new development in which the benefits of connectivity and user-friendliness from social network services (SNS) are its main features. With the introduction of IoT, the world will be much more modernized, convenient, and industrialized. This paper will discuss the applications of IoT in different sectors such as healthcare services, education, and lifestyle. The privacy challenges that IoT still poses to user data will also be discussed. Finally, an empirical study to evaluate the number of active installed IoT connections in recent years demonstrates the increase in usage of IoT regardless of the privacy challenges. The study also examines some types of IoT devices that are being preferred in the market and predictions from researchers about IoT in the upcoming years.

Keywords: IoT, health care, robotics, social Internet of Things

Procedia PDF Downloads 151
839 Security of Internet of Things: Challenges, Requirements and Future Directions

Authors: Amjad F. Alharbi, Bashayer A. Alotaibi, Fahd S. Alotaibi

Abstract:

The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted.

Keywords: Internet of Things (IoT), IoT security challenges, IoT security requirements, IoT security architecture

Procedia PDF Downloads 375
838 Implementing Internet of Things through Building Information Modelling in Order to Assist with the Maintenance Stage of Commercial Buildings

Authors: Ushir Daya, Zenadene Lazarus, Dimelle Moodley, Ehsan Saghatforoush

Abstract:

It was found through literature that there is a lack of implementation of the Internet of Things (IoT) incorporated into Building Information Modelling (BIM) in South Africa. The research aims to find if the implementation of IoT into BIM will make BIM more useful during the maintenance stage of buildings and assist facility managers when doing their job. The research will look at the existing problematic areas with building information modelling, specifically BIM 7D. This paper will look at the capabilities of IoT and what issues IoT will be able to resolve in BIM software, as well as how IoT into BIM will assist facility managers and if such an implementation will make a facility manager's job more efficient.

Keywords: internet of things, building information modeling, facilities management, structural health monitoring

Procedia PDF Downloads 208
837 Industry 4.0 and Supply Chain Integration: Case of Tunisian Industrial Companies

Authors: Rym Ghariani, Ghada Soltane, Younes Boujelbene

Abstract:

Industry 4.0, a set of emerging smart and digital technologies, has been the main focus of operations management researchers and practitioners in recent years. The objective of this research paper is to study the impact of Industry 4.0 on the integration of the supply chain (SCI) in Tunisian industrial companies. A conceptual model to study the relationship between Industry 4.0 technologies and supply chain integration was designed. This model contains three explained variables (Big data, Internet of Things, and Robotics) and one variable to be explained (supply chain integration). In order to answer our research questions and investigate the research hypotheses, principal component analysis and discriminant analysis were used using SPSS26 software. The results reveal that there is a statistically positive impact significant impact of Industry 4.0 (Big data, Internet of Things and Robotics) on the integration of the supply chain. Interestingly, big data has a greater positive impact on supply chain integration than the Internet of Things and robotics.

Keywords: industry 4.0 (I4.0), big data, internet of things, robotics, supply chain integration

Procedia PDF Downloads 62
836 Image Recognition Performance Benchmarking for Edge Computing Using Small Visual Processing Unit

Authors: Kasidis Chomrat, Nopasit Chakpitak, Anukul Tamprasirt, Annop Thananchana

Abstract:

Internet of Things devices or IoT and Edge Computing has become one of the biggest things happening in innovations and one of the most discussed of the potential to improve and disrupt traditional business and industry alike. With rises of new hang cliff challenges like COVID-19 pandemic that posed a danger to workforce and business process of the system. Along with drastically changing landscape in business that left ruined aftermath of global COVID-19 pandemic, looming with the threat of global energy crisis, global warming, more heating global politic that posed a threat to become new Cold War. How emerging technology like edge computing and usage of specialized design visual processing units will be great opportunities for business. The literature reviewed on how the internet of things and disruptive wave will affect business, which explains is how all these new events is an effect on the current business and how would the business need to be adapting to change in the market and world, and example test benchmarking for consumer marketed of newer devices like the internet of things devices equipped with new edge computing devices will be increase efficiency and reducing posing a risk from a current and looming crisis. Throughout the whole paper, we will explain the technologies that lead the present technologies and the current situation why these technologies will be innovations that change the traditional practice through brief introductions to the technologies such as cloud computing, edge computing, Internet of Things and how it will be leading into future.

Keywords: internet of things, edge computing, machine learning, pattern recognition, image classification

Procedia PDF Downloads 156
835 Using the Internet of Things to Deal with Ventilators for Minimizing the Direct Contact with COVID-19 Patients

Authors: Mohammed Al-Shalabi

Abstract:

In recent years, the Internet of Things (IoT) has become an important technology for connecting various smart objects in many applications, especially in health monitoring applications. The IoT technology develops healthcare applications from traditional to personalized ones by making the treatment and monitoring of patients easier. Nowadays, especially during the COVID-19 pandemic, the necessity of enhancing healthcare monitoring applications to avoid the spreading of this pandemic is increased. In this paper, a mechanism is proposed to minimize direct contact with COVID-19 patients who need ventilators by using IoT technology. The proposed mechanism saves medical providers from COVID-19 infection and then minimizes the spreading of this disease.

Keywords: internet of things, healthcare monitoring, COVID-19, ventilators, thingspeak, clouds

Procedia PDF Downloads 136
834 An Enhanced Digital Forensic Model for Internet of Things Forensic

Authors: Tina Wu, Andrew Martin

Abstract:

The expansion of the Internet of Things (IoT) brings a new level of threat. Attacks on IoT are already being used by criminals to form botnets, launch Distributed Denial of Service (DDoS) and distribute malware. This opens a whole new digital forensic arena to develop forensic methodologies in order to have the capability to investigate IoT related crimes. However, existing proposed IoT forensic models are still premature requiring further improvement and validation, many lack details on the acquisition and analysis phase. This paper proposes an enhanced theoretical IoT digital forensic model focused on identifying and acquiring the main sources of evidence in a methodical way. In addition, this paper presents a theoretical acquisition framework of the different stages required in order to be capable of acquiring evidence from IoT devices.

Keywords: acquisition, Internet of Things, model, zoning

Procedia PDF Downloads 272
833 The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols

Authors: Nazli W. Hardy

Abstract:

A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem.

Keywords: identity relation management, multifactor authentication, protocols, survey of internet of things ecosystem

Procedia PDF Downloads 356
832 Pregnancy and Women's Subjectivity Represented in Ali's Brick Lane, Cusk's Arlington Park, and Mcgregor's If Nobody Speaks of Remarkable Things

Authors: Nurul Imansari

Abstract:

The study object in this research is 'pregnancy and women’s subjectivity represented in Ali’s Brick Lane, Cusk’s Arlington Park, and McGregor’s If Nobody Speaks of Remarkable Things'. Pregnancy is invested with both figurative and literal significance in the novels. Being a symbol of domesticity of the woman in the novels, pregnancy conveys the relationship of the women due to their role as a mother and wife in a family and their subjectivity as a woman. The aim of this study is to examine to what extent pregnancy affects the subjectivity of woman in Ali’s 'Brick Lane', Cusk’s 'Arlington Park', and McGregor’s 'If Nobody Speaks of Remarkable Things'. It also discusses on how pregnancy can be seen as a symbolic sense and the things that symbolise it. The study uses theoretical ideas of female subjectivity proposed by Julia Kristeva. She stated that in patriarchal culture, the meaning of a woman is always being reduced to the function of reproduction. She has emphasized a new discourse about pregnancy that recognizes the importance of maternal function in the development of subjectivity and in culture. The result shows that the three novels represent pregnancy as something which can affect women’s subjectivity but the way in representing the pregnancy are different from each other. Kristeva’s idea about pregnancy and women’s subjectivity can be applied in both Cusk’s Arlington Park, and McGregor’s If Nobody Speaks of Remarkable Things as the characters in the texts come from the same background as her. However, it can hardly be applied to Ali’s Brick Lane because this idea can justify the women to choose their own way and South Asian culture still bound to the strong patriarchal system.

Keywords: culture, pregnancy, subjectivity, women

Procedia PDF Downloads 339
831 Energy-Efficient Internet of Things Communications: A Comparative Study of Long-Term Evolution for Machines and Narrowband Internet of Things Technologies

Authors: Nassim Labdaoui, Fabienne Nouvel, Stéphane Dutertre

Abstract:

The Internet of Things (IoT) is emerging as a crucial communication technology for the future. Many solutions have been proposed, and among them, licensed operators have put forward LTE-M and NB-IoT. However, implementing these technologies requires a good understanding of the device energy requirements, which can vary depending on the coverage conditions. In this paper, we investigate the power consumption of LTE-M and NB-IoT devices using Ublox SARA-R422S modules based on relevant standards from two French operators. The measurements were conducted under different coverage conditions, and we also present an empirical consumption model based on the different states of the radio modem as per the RRC protocol specifications. Our findings indicate that these technologies can achieve a 5 years operational battery life under certain conditions. Moreover, we conclude that the size of transmitted data does not have a significant impact on the total power consumption of the device under favorable coverage conditions. However, it can quickly influence the battery life of the device under harsh coverage conditions. Overall, this paper offers insights into the power consumption of LTE-M and NBIoT devices and provides useful information for those considering the use of these technologies.

Keywords: internet of things, LTE-M, NB-IoT, MQTT, cellular IoT, power consumption

Procedia PDF Downloads 143
830 A New Center of Motion in Cabling Robots

Authors: Alireza Abbasi Moshaii, Farshid Najafi

Abstract:

In this paper a new model for centre of motion creating is proposed. This new method uses cables. So, it is very useful in robots because it is light and has easy assembling process. In the robots which need to be in touch with some things this method is very good. It will be described in the following. The accuracy of the idea is proved by an experiment. This system could be used in the robots which need a fixed point in the contact with some things and make a circular motion. Such as dancer, physician or repair robots.

Keywords: centre of motion, robotic cables, permanent touching, mechatronics engineering

Procedia PDF Downloads 445
829 Investigating Perception of Iranian Organizations on Internet of Things Solutions and Applications

Authors: Changiz Valmohammadi

Abstract:

The main purpose of this study is to explore the perception of Iranian experts and executive managers of sample organizations on the benefits and barriers of Internet of Things (IoT) solutions implementation. Based on the review of the related literature and web sites, benefits and barriers of successful implementation to IoT solutions were identified. Through a self-administered questionnaire which was collected from 67 Iranian organizations the ranking and importance of benefits and barriers of IoT solutions implementation were determined based on the perception of the experts of the surveyed organizations. Analysis of data and the obtained results revealed that “improved customer experience” and “Supply chain optimization and responsiveness” are the most important benefits that the survey organizations expect to reap as a result of IoT solutions implementation. Also,” Integration challenges" and “cannot find right suppliers” were ranked as the most challenging barriers to IoT solutions implementation.

Keywords: internet of things (IoT), exploratory study, benefits, barriers, Iran

Procedia PDF Downloads 520
828 IoT: State-of-the-Art and Future Directions

Authors: Bashir Abdu Muzakkari, Aisha Umar Sulaiman, Mohamed Afendee Muhamad, Sanah Abdullahi Muaz

Abstract:

The field of the Internet of Things (IoT) is rapidly expanding and has the potential to completely change how we work, live, and interact with the world. The Internet of Things (IoT) is the term used to describe a network of networked physical objects, including machinery, vehicles, and buildings, which are equipped with electronics, software, sensors, and network connectivity. This review paper aims to provide a comprehensive overview of the current state of IoT, including its definition, key components, development history, and current applications. The paper will also discuss the challenges and opportunities presented by IoT, as well as its potential impact on various industries, such as healthcare, agriculture, and transportation. In addition, this paper will highlight the ethical and security concerns associated with IoT and the need for effective solutions to address these challenges. The paper concludes by highlighting the prospects of IoT and the directions for future research in this field.

Keywords: internet of things, IoT, sensors, network

Procedia PDF Downloads 176
827 Progress and Challenges of Smart Cities in India: An Exploratory Study

Authors: Sushil K. Sharma, Jeff Zhang, Saeed Tabar

Abstract:

Worldwide, several governments are utilizing the Internet of Things (IoT) and other information and communication technologies (ICTs) to create smart city infrastructures to improve both the quality of government services and citizen welfare. Over 700 cities from around the world have already started implementing their smart city projects. Smart City utilizes the network of connected things, or the Internet of Things (IoT), that interconnects devices and various components across city infrastructure, making them work together seamlessly to enhance the quality, performance, and interactivity of urban services, optimize resources, and reduce costs. Without developing smart cities, the accelerating growth of cities, and their disproportionate consumption of physical and social resources are unsustainable. In 2016, the Indian Government released a list of 100 cities with the intention of kick-starting the process of developing them into 'smart cities’ as part of the Smart Cities Mission. This study reports the progress and challenges of Smart City projects in India. The data were collected through the city/state government websites, media reports, and focus group discussions/interviews. The preliminary results indicate that smart city projects are not only behind in their implementation and scope but also lacks the sincerity for its implementation.

Keywords: smart city, smart government, Internet of Things, digital government

Procedia PDF Downloads 185
826 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things

Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy

Abstract:

The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.

Keywords: internet of things, authentication, cryptography, security protocol

Procedia PDF Downloads 123
825 Remote Monitoring and Control System of Potentiostat Based on the Internet of Things

Authors: Liang Zhao, Guangwen Wang, Guichang Liu

Abstract:

Constant potometer is an important component of pipeline anti-corrosion systems in the chemical industry. Based on Internet of Things (IoT) technology, Programmable Logic Controller (PLC) technology and database technology, this paper developed a set of a constant potometer remote monitoring management system. The remote monitoring and remote adjustment of the working status of the constant potometer are realized. The system has real-time data display, historical data query, alarm push management, user permission management, and supporting Web access and mobile client application (APP) access. The actual engineering project test results show the stability of the system, which can be widely used in cathodic protection systems.

Keywords: internet of things, pipe corrosion protection, potentiostat, remote monitoring

Procedia PDF Downloads 147
824 TMBCoI-SIOT: Trust Management System Based on the Community of Interest for the Social Internet of Things

Authors: Oumaima Ben Abderrahim, Mohamed Houcine Elhedhili, Leila Saidane

Abstract:

In this paper, we propose a trust management system based on clustering architecture for the social internet of things called TMBCO-SIOT. The proposed model integrates numerous factors such as direct and indirect trust; transaction factor; precaution factor; and social modeling of trust. The novelty of our approach can be summed up in two aspects. The first aspect concerns the architecture based on the community of interest (CoT) where each community is headed by an administrator (admin). However, the second aspect is the trust management system that tries to prevent On-Off attacks and mitigates dishonest recommendations using the k-means algorithm and guarantor things. The effectiveness of the proposed system is proved by simulation against malicious nodes.

Keywords: IoT, trust management system, attacks, trust, dishonest recommendations, K-means algorithm

Procedia PDF Downloads 213
823 Domestic Led Lighting Designs Using Internet of Things

Authors: Gouresh Singhal, Rajib Kumar Panigrahi

Abstract:

In this paper, we try to examine historical and technological changes in lighting industry. We propose a (proto) technical solution at block diagram and circuit level. Untapped and upcoming technologies such as Cloud and 6LoWPAN are further explored. The paper presents a robust hardware realistic design. A mobile application is also provided to provide last mile user interface. The paper highlights the current challenges to be faced and concludes with a pragmatic view of lighting industry.

Keywords: 6lowpan, internet of things, mobile application, led

Procedia PDF Downloads 571
822 The Internet of Healthcare Things: A European Perspective and a Review of Ethical Concerns

Authors: M. Emmanouilidou

Abstract:

The Internet of Things (IoT) is a disruptive technological paradigm that is at the center of the digital evolution by integrating physical and virtual worlds leading to the creation of extended interconnected ecosystems that are characterized as smart environments. The concept of the IoT has a broad range of applications in different industries including the healthcare sector. The Internet of Healthcare Things (IoHT), a branch of the IoT, is expected to bring promising benefits to all involved stakeholders and accelerate the revolution of the healthcare sector through a transition towards preventive and personalized medicine. The socio-economic challenges that the healthcare sector is facing further emphasize the need for a radical transformation of healthcare systems in both developed and developing countries with the role of pervasive technological innovations, such as IoHT, recognized as key to counteract the relevant challenges. Besides the number of potential opportunities that IoHT presents, there are fundamental ethical concerns that need to be considered and addressed in relation to the application of IoHT. This paper contributes to the discussion of the emerging topic of IoHT by providing an overview of the role and potential of IoHT, highlighting the characteristics of the current and future healthcare landscape, reporting on the up-to-date status of IoHT in Europe and reflecting upon existing research in the ethics of IoHT by incorporating additional ethical dimensions that have been ignored which can provide pathways for future research in the field.

Keywords: ethics, Europe, healthcare, Internet of Things

Procedia PDF Downloads 136