SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 868
INTERNET OF THINGS, EXAMPLES and ISSUES
Namratha Kalasannavar
Assistant Professor Department of Master of Computer Applications
Sambhram Institute of Technology, Bangalore
-----------------------------------------------------------******--------------------------------------------------------------------
Abstract: These days Internet of Thing is getting
even popular with the way technology is moving and
today’s world is almost depend upon Internet of
Things. From home facilities to traffic management in
a smart city can help to develop a nation with Internet
of Things. There are more advantages for using
Internet of Things, but with usage of Internet of Things
there is more number of frauds causes due to more
usage and due to low privacy settings. There are three
different levels of Internet of Things. To overcome of
fraud and issue to Internet of Things can secure using
the secured products.
Keywords: Internet of Thing, Examples of Internet
of Things, Issues in IOT, Levels of IOT
INTRODUCTION
These days Internet of Thing is getting even
popular with the way technology is moving and
taking its new form the internet of things
changing everything about the world we live it
from where we make purchases and even how
we get energy for our homes. In the world of
today you see people talking connecting but not
for the voices but with things things, that are
close to their heart and within arm's reach things
that are at their fingertips that measure the
inspiration and things that I've with them every
step of the way all of it is possible because the
Internet of Things has made it possible. [1]
Billions of things talking to each other providing
insight continuously. How the world's best run
businesses responding how they integrating the
core of their businesses with the edge of the
network. Simple they're connecting the business
with technology to get these things to speak the
same language gathering intelligence and
transforming their existing business, processes
and ultimately reimagining their customers’
experiences, which in the end is turning millions
of customers into millions of fun. Sophisticated
sensors and chips are embedded in the physical
things that surround us is transmitting valuable
data that lets us better understand how these
things work and work together how exactly do
these devices share such large quantities of data
and how we put that information to work.
Whether we are improving the production of a
factory giving cities and real-time updates on
where to park our monitoring a personal health
it's a common Internet of Things, platform that
brings divers information together and provides
a common language for the devices and apps to
communicate with each other. The process starts
within the device itself with security
communicates for the Internet of Things
platform/ this platform integrates the data from
many devices and applies analytics to share the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 869
most valuable data with applications that
address industry specific needs.
EXAMPLES OF IOT
Transportation system internet of thing is
intended to play an essential role for Ivy to see
its full potential there are many challenges that
need to be addressed including collecting real-
time vehicle information and on time delivery
rate optimizing dispatch and fleet arrangement.
To improve the operating performance and
reducing manpower and fuel costs. The ultimate
goal is to achieve a more efficient safe. Handheld
device can be used to track location and
movement of vehicles in real-time it not only
helps fleet drivers complete their missions on
time but also enables fleet. Managers to flexibly
dispatch orders as for taxi fleet management
wireless data recorder is a smart taxi solution
integrating hail taxi app and taxi passenger
matching service. It enables the taxi company to
quickly locate the calling customer and assign a
suitable taxi thus taxi idle time can be effectively
reduced the result is greater fleet utilization and
operation performance regarding public
Transportation. Computer comes with features
like power on/off delay and why temperature
support it also can be used to monitor vehicle
information like temperature pressure oil and
engine speed for vehicle safety control besides
this the in-vehicle. Digital signage solution
enables customized contents so that marketing
messages are aimed to target audiences. A cloud-
based device management solution to manage all
the mobile devices over-the-air it facilitates
administrative tasks like remote control real-
time tracking and app management. It also
protects corporate data with remote lock and
wipe in case of devices stolen or lost.
There are million vehicles. Every year we spend
hundreds of millions of rupees maintaining these
roads. Dealing with flooding if we need where
and when these problems might happen we
could make better plans. So we put data sensors
in our cities. the moments on our alarm posts
and collected data on traffic flow weather and
road maintenance. Then made all this
information available in one place and called it
the heart. Now we can repair roads more
efficiently clean the cities only when they need
cleaning with the right places at the right times
we are creating more efficient systems to
manage our highways to help save resources
money.
BENEFITS AND RISKS
The Internet of Things describes the ever-
growing number of intelligent objects that are
being connected to the internet and each other.
These systems are infiltrating the heart of our
critical infrastructure and are forming the basis
of current and future smart services.
Smartphones tablets wearable technology and
smart home devices are now being adopted into
our everyday and they're starting to appear on
enterprise networks. As we continue to embed
these interconnected objects and a wider variety
of wireless devices infiltrate enterprise
infrastructure's the security risks posed by the
Internet of Things is becoming more complex
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 870
and may have serious consequences. Some of
these risks are already emerging, for example
many Internet of Things devices in our homes
can be connected to a smart hub for easier setup
and use. Unfortunately some of these smart hubs
contain serious vulnerabilities that could allow
an attacker to walk up to the front door and
unlock a smartlock that is connected to a smart
hub. For specific smart hub products this is one
hundred percent certain if the attacker
successfully gains access to our home's Wi-Fi
network. Vulnerabilities in these devices may
also allow cybercriminals to search and locate
these smart locks while driving around a city
known as war driving. Attackers could then hack
into the Smart Hub. To see which devices are
attached and even monitors the home through
its security cameras. By exploiting these security
vulnerabilities hackers may become uninvited
guest to our homes. [2]
A smartphone actually a multi-purpose pocket-
computer, that stays connected at all times and
goes with me wherever I go and with this simple
device and I generate an astounding amount of
personal information, like pictures and videos.
My web browsing GPS locations financial
information and even health information. Now
here's a question what happens to all this
sensitive data. We all know our data is stored
locally on our devices but did you know they are
also recorded onto third-party cloud storage
systems. Where large businesses can learn more
about their users. not only is this unfair privacy
is also jeopardized as cloud systems have been
prone to security attacks and sensitive data leak
into the wrong hands every day and the plot is
about to get much thicker. Everyday ordinary
household items and appliances like thermostats
refrigerators alarm clocks, activity trackers and
even light bulbs are being embedded with sensor
technology. We are about to enter the age of the
Internet of Things and it is predicted in a few
years there will be millions of these devices. For
this issues we need to build a product to connect
with all your IOT devices and securely collect
back up and transfer your data within your own
network every piece of data in the product is
encrypted individually and are only accessible to
the primary users unauthorized parties would
have to try to decrypt each piece of data
individually if possible at all and for data sharing
the product allows you to create your own
circles this can be personal professional or even
medical circles. Let your physician track your
health and activity monitoring devices let your
friends track the type of music you're purchasing
set privacy restrictions on your service providers
for a change the possibilities are endless and you
will always be in control. Remember no
institution and protect the privacy of your
personal information better than you the
product with power back into your hands
SECURITY MEASURES
The Internet of Things and the exponential
growth of associated technologies have presently
reached 6 billion connected devices. Machines
connect to each other. This automatic exchange
of information with no human intervention
opens up a new world of services and products.
the range of peyote solutions as well as the
number of diverse environment within which it
is used. Conversely generates the potential for
security breaches to be established across this
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 871
heterogeneous web-connected thing. we are
facing a global scenario where security is no
longer an option but is a mandatory requirement
that we need to address. There are three basic
security premises to follow:
 Prevention: deter attacks to avoid losses
 Detection: identify attacks to enable
rapid and thorough response
 Respondents: address and mitigate the
incident as soon as possible in structured
way to minimize losses and allow return
to normal operating business.[3]
There are three security levels
Level 1) Secure Network IOT infrastructure:
security measures used within the
communication infrastructure such as virtual
private networks dedicated and secure links.
Level 2) Secure IOT enable layer:
communication related alerts and automated
responses these include the detection of
replacement devices or a change in location or
devices which shouldn't move. Such as a meat
allowed to call only the authorized telephone
numbers.
Level 3) Secure IOT business IT and devices:
these extra security levels enables end-to-end
security in our customers IT business and
manage devices. level 3 offers comprehensive
and
Innovative solutions including trusted public
infrastructure provides a unique digital identity
to IOT devices by our digital certificate SSL
allowing mutually strong authentication
between the IOT solutions this society and the
device. [4]
Thread detection: supplies and hence the
information to improve awareness and inside of
potential security exposure in the digital world
and the associated identity threats and risks.
Vulnerability management delivers a global
security view of the IOT solution through
penetration testing and the identification of
potential risks.
Security monitoring administers and protects
IOT information with real-time alert notification
and reporting.
Security incident response manages critical
security incidents and resolution by
implementing clear and agrees business
solutions and protocol. [5]
REFERENCES
[1] Md. Mahmud Hossain, Maziar Fotouhi, and
Ragib Hasan, “Towards an Analysis of Security
Issues, Challenges, and Open Problems in the
Internet of Things”
[2] Andrea Zanella, “Internet of Things for Smart
Cities”, IEEE, 2014
[3]Friedemann Mattern and Christian
Floerkemeier, “From the Internet of Computers
to the Internet of Things”
[4] Mohamed Abomhara, Geir M. Køien “Security
and Privacy in the Internet of Things:Current
Status and Open Issues”
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 872
[5] Liane Margarida Rockenbach Tarouco, Lucas
Mendes Ribeiro Arbiza “Internet of Things in
Healthcare: Interoperatibility and Security
Issues”

More Related Content

What's hot

Internet of things
Internet of thingsInternet of things
Internet of things
Ishaq Ticklye
 
Internet of things-Introduction
Internet of things-IntroductionInternet of things-Introduction
Internet of things-Introduction
Nirnay Banagar
 
Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devices
mentoresd
 
Internet of things
Internet of thingsInternet of things
Internet of things
Komal Agarwal
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Things
ardiri
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsVala Afshar
 
Emergingtreands class11 cs
Emergingtreands class11 csEmergingtreands class11 cs
Emergingtreands class11 cs
sahunamita10
 
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET Journal
 
IoT across devices with Windows 10 and Azure IoT Suite by Admir Tuzović
IoT across devices with Windows 10 and Azure IoT Suite by Admir TuzovićIoT across devices with Windows 10 and Azure IoT Suite by Admir Tuzović
IoT across devices with Windows 10 and Azure IoT Suite by Admir Tuzović
Bosnia Agile
 
The Future of the Internet - The Next 30 Years
The Future of the Internet - The Next 30 YearsThe Future of the Internet - The Next 30 Years
The Future of the Internet - The Next 30 Years
Rahul Singh
 
Internet Of Things - Tech Talk
Internet Of Things - Tech TalkInternet Of Things - Tech Talk
Internet Of Things - Tech Talk
Shankar Kantharaj
 
Internet of things
Internet of thingsInternet of things
Internet of things
Tamojit Das
 
IBM Xforce Q4 2014
IBM Xforce Q4 2014IBM Xforce Q4 2014
IBM Xforce Q4 2014
Patrick Bouillaud
 
Sensing as-a-Service - The New Internet of Things (IOT) Business Model
Sensing as-a-Service - The New Internet of Things (IOT) Business ModelSensing as-a-Service - The New Internet of Things (IOT) Business Model
Sensing as-a-Service - The New Internet of Things (IOT) Business Model
Dr. Mazlan Abbas
 
IOT Success depends on Integration
IOT Success depends on Integration IOT Success depends on Integration
IOT Success depends on Integration
John Mathon
 
How Internet of Things Shape Better Outlook for Your Business in the 21st Cen...
How Internet of Things Shape Better Outlook for Your Business in the 21st Cen...How Internet of Things Shape Better Outlook for Your Business in the 21st Cen...
How Internet of Things Shape Better Outlook for Your Business in the 21st Cen...
Dr. Mazlan Abbas
 
Harbor Research and Postscapes Infographic
Harbor Research and Postscapes InfographicHarbor Research and Postscapes Infographic
Harbor Research and Postscapes Infographic
Harbor Research
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
IRJET Journal
 
Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)
Dr. Mazlan Abbas
 

What's hot (20)

Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of things-Introduction
Internet of things-IntroductionInternet of things-Introduction
Internet of things-Introduction
 
Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devices
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IoT White Paper
IoT White PaperIoT White Paper
IoT White Paper
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Emergingtreands class11 cs
Emergingtreands class11 csEmergingtreands class11 cs
Emergingtreands class11 cs
 
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...
 
IoT across devices with Windows 10 and Azure IoT Suite by Admir Tuzović
IoT across devices with Windows 10 and Azure IoT Suite by Admir TuzovićIoT across devices with Windows 10 and Azure IoT Suite by Admir Tuzović
IoT across devices with Windows 10 and Azure IoT Suite by Admir Tuzović
 
The Future of the Internet - The Next 30 Years
The Future of the Internet - The Next 30 YearsThe Future of the Internet - The Next 30 Years
The Future of the Internet - The Next 30 Years
 
Internet Of Things - Tech Talk
Internet Of Things - Tech TalkInternet Of Things - Tech Talk
Internet Of Things - Tech Talk
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IBM Xforce Q4 2014
IBM Xforce Q4 2014IBM Xforce Q4 2014
IBM Xforce Q4 2014
 
Sensing as-a-Service - The New Internet of Things (IOT) Business Model
Sensing as-a-Service - The New Internet of Things (IOT) Business ModelSensing as-a-Service - The New Internet of Things (IOT) Business Model
Sensing as-a-Service - The New Internet of Things (IOT) Business Model
 
IOT Success depends on Integration
IOT Success depends on Integration IOT Success depends on Integration
IOT Success depends on Integration
 
How Internet of Things Shape Better Outlook for Your Business in the 21st Cen...
How Internet of Things Shape Better Outlook for Your Business in the 21st Cen...How Internet of Things Shape Better Outlook for Your Business in the 21st Cen...
How Internet of Things Shape Better Outlook for Your Business in the 21st Cen...
 
Harbor Research and Postscapes Infographic
Harbor Research and Postscapes InfographicHarbor Research and Postscapes Infographic
Harbor Research and Postscapes Infographic
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
 
Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)
 

Similar to Internet of Things, Examples and Issues

Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
ShubhamYadav73126
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks
 
Knowledge of IoT
Knowledge of IoTKnowledge of IoT
Knowledge of IoT
TahaMallawala1
 
IoT Mobile App Development Benefits Challenges.pdf
IoT Mobile App Development Benefits  Challenges.pdfIoT Mobile App Development Benefits  Challenges.pdf
IoT Mobile App Development Benefits Challenges.pdf
FuGenx Technologies
 
iot.docx
iot.docxiot.docx
iot.docx
MonuBhagat4
 
MODULE 1.pdf
MODULE 1.pdfMODULE 1.pdf
MODULE 1.pdf
AnithaMC6
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Technological environment
Technological environmentTechnological environment
Technological environment
Dr. Priyanka Jain
 
FinalPPT-StJoseph (3).pptx
FinalPPT-StJoseph (3).pptxFinalPPT-StJoseph (3).pptx
FinalPPT-StJoseph (3).pptx
ssuser046cf5
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
IRJET Journal
 
Top five emerging technology in industry
Top five emerging technology in industryTop five emerging technology in industry
Top five emerging technology in industry
AgitAjey
 
FUTURE OF IOT
FUTURE OF IOTFUTURE OF IOT
FUTURE OF IOT
RaheemUnnisa1
 
Designing for Manufacturing's 'Internet of Things'
Designing for Manufacturing's 'Internet of Things'Designing for Manufacturing's 'Internet of Things'
Designing for Manufacturing's 'Internet of Things'
Cognizant
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023
XDuce Corporation
 
thomas.pptx
thomas.pptxthomas.pptx
thomas.pptx
ThomasJose43
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 Document
Ajith Kumar Ravi
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023
XDuce Corporation
 
Revolutionising Facility Management Services Through Internet of Things - Is ...
Revolutionising Facility Management Services Through Internet of Things - Is ...Revolutionising Facility Management Services Through Internet of Things - Is ...
Revolutionising Facility Management Services Through Internet of Things - Is ...
Dr. Mazlan Abbas
 

Similar to Internet of Things, Examples and Issues (20)

Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
 
KPN and Connectivity
KPN and ConnectivityKPN and Connectivity
KPN and Connectivity
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
Topic 7
Topic 7Topic 7
Topic 7
 
Knowledge of IoT
Knowledge of IoTKnowledge of IoT
Knowledge of IoT
 
IoT Mobile App Development Benefits Challenges.pdf
IoT Mobile App Development Benefits  Challenges.pdfIoT Mobile App Development Benefits  Challenges.pdf
IoT Mobile App Development Benefits Challenges.pdf
 
iot.docx
iot.docxiot.docx
iot.docx
 
MODULE 1.pdf
MODULE 1.pdfMODULE 1.pdf
MODULE 1.pdf
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Technological environment
Technological environmentTechnological environment
Technological environment
 
FinalPPT-StJoseph (3).pptx
FinalPPT-StJoseph (3).pptxFinalPPT-StJoseph (3).pptx
FinalPPT-StJoseph (3).pptx
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
 
Top five emerging technology in industry
Top five emerging technology in industryTop five emerging technology in industry
Top five emerging technology in industry
 
FUTURE OF IOT
FUTURE OF IOTFUTURE OF IOT
FUTURE OF IOT
 
Designing for Manufacturing's 'Internet of Things'
Designing for Manufacturing's 'Internet of Things'Designing for Manufacturing's 'Internet of Things'
Designing for Manufacturing's 'Internet of Things'
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023
 
thomas.pptx
thomas.pptxthomas.pptx
thomas.pptx
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 Document
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023
 
Revolutionising Facility Management Services Through Internet of Things - Is ...
Revolutionising Facility Management Services Through Internet of Things - Is ...Revolutionising Facility Management Services Through Internet of Things - Is ...
Revolutionising Facility Management Services Through Internet of Things - Is ...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 

Recently uploaded (20)

Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 

Internet of Things, Examples and Issues

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 868 INTERNET OF THINGS, EXAMPLES and ISSUES Namratha Kalasannavar Assistant Professor Department of Master of Computer Applications Sambhram Institute of Technology, Bangalore -----------------------------------------------------------******-------------------------------------------------------------------- Abstract: These days Internet of Thing is getting even popular with the way technology is moving and today’s world is almost depend upon Internet of Things. From home facilities to traffic management in a smart city can help to develop a nation with Internet of Things. There are more advantages for using Internet of Things, but with usage of Internet of Things there is more number of frauds causes due to more usage and due to low privacy settings. There are three different levels of Internet of Things. To overcome of fraud and issue to Internet of Things can secure using the secured products. Keywords: Internet of Thing, Examples of Internet of Things, Issues in IOT, Levels of IOT INTRODUCTION These days Internet of Thing is getting even popular with the way technology is moving and taking its new form the internet of things changing everything about the world we live it from where we make purchases and even how we get energy for our homes. In the world of today you see people talking connecting but not for the voices but with things things, that are close to their heart and within arm's reach things that are at their fingertips that measure the inspiration and things that I've with them every step of the way all of it is possible because the Internet of Things has made it possible. [1] Billions of things talking to each other providing insight continuously. How the world's best run businesses responding how they integrating the core of their businesses with the edge of the network. Simple they're connecting the business with technology to get these things to speak the same language gathering intelligence and transforming their existing business, processes and ultimately reimagining their customers’ experiences, which in the end is turning millions of customers into millions of fun. Sophisticated sensors and chips are embedded in the physical things that surround us is transmitting valuable data that lets us better understand how these things work and work together how exactly do these devices share such large quantities of data and how we put that information to work. Whether we are improving the production of a factory giving cities and real-time updates on where to park our monitoring a personal health it's a common Internet of Things, platform that brings divers information together and provides a common language for the devices and apps to communicate with each other. The process starts within the device itself with security communicates for the Internet of Things platform/ this platform integrates the data from many devices and applies analytics to share the
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 869 most valuable data with applications that address industry specific needs. EXAMPLES OF IOT Transportation system internet of thing is intended to play an essential role for Ivy to see its full potential there are many challenges that need to be addressed including collecting real- time vehicle information and on time delivery rate optimizing dispatch and fleet arrangement. To improve the operating performance and reducing manpower and fuel costs. The ultimate goal is to achieve a more efficient safe. Handheld device can be used to track location and movement of vehicles in real-time it not only helps fleet drivers complete their missions on time but also enables fleet. Managers to flexibly dispatch orders as for taxi fleet management wireless data recorder is a smart taxi solution integrating hail taxi app and taxi passenger matching service. It enables the taxi company to quickly locate the calling customer and assign a suitable taxi thus taxi idle time can be effectively reduced the result is greater fleet utilization and operation performance regarding public Transportation. Computer comes with features like power on/off delay and why temperature support it also can be used to monitor vehicle information like temperature pressure oil and engine speed for vehicle safety control besides this the in-vehicle. Digital signage solution enables customized contents so that marketing messages are aimed to target audiences. A cloud- based device management solution to manage all the mobile devices over-the-air it facilitates administrative tasks like remote control real- time tracking and app management. It also protects corporate data with remote lock and wipe in case of devices stolen or lost. There are million vehicles. Every year we spend hundreds of millions of rupees maintaining these roads. Dealing with flooding if we need where and when these problems might happen we could make better plans. So we put data sensors in our cities. the moments on our alarm posts and collected data on traffic flow weather and road maintenance. Then made all this information available in one place and called it the heart. Now we can repair roads more efficiently clean the cities only when they need cleaning with the right places at the right times we are creating more efficient systems to manage our highways to help save resources money. BENEFITS AND RISKS The Internet of Things describes the ever- growing number of intelligent objects that are being connected to the internet and each other. These systems are infiltrating the heart of our critical infrastructure and are forming the basis of current and future smart services. Smartphones tablets wearable technology and smart home devices are now being adopted into our everyday and they're starting to appear on enterprise networks. As we continue to embed these interconnected objects and a wider variety of wireless devices infiltrate enterprise infrastructure's the security risks posed by the Internet of Things is becoming more complex
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 870 and may have serious consequences. Some of these risks are already emerging, for example many Internet of Things devices in our homes can be connected to a smart hub for easier setup and use. Unfortunately some of these smart hubs contain serious vulnerabilities that could allow an attacker to walk up to the front door and unlock a smartlock that is connected to a smart hub. For specific smart hub products this is one hundred percent certain if the attacker successfully gains access to our home's Wi-Fi network. Vulnerabilities in these devices may also allow cybercriminals to search and locate these smart locks while driving around a city known as war driving. Attackers could then hack into the Smart Hub. To see which devices are attached and even monitors the home through its security cameras. By exploiting these security vulnerabilities hackers may become uninvited guest to our homes. [2] A smartphone actually a multi-purpose pocket- computer, that stays connected at all times and goes with me wherever I go and with this simple device and I generate an astounding amount of personal information, like pictures and videos. My web browsing GPS locations financial information and even health information. Now here's a question what happens to all this sensitive data. We all know our data is stored locally on our devices but did you know they are also recorded onto third-party cloud storage systems. Where large businesses can learn more about their users. not only is this unfair privacy is also jeopardized as cloud systems have been prone to security attacks and sensitive data leak into the wrong hands every day and the plot is about to get much thicker. Everyday ordinary household items and appliances like thermostats refrigerators alarm clocks, activity trackers and even light bulbs are being embedded with sensor technology. We are about to enter the age of the Internet of Things and it is predicted in a few years there will be millions of these devices. For this issues we need to build a product to connect with all your IOT devices and securely collect back up and transfer your data within your own network every piece of data in the product is encrypted individually and are only accessible to the primary users unauthorized parties would have to try to decrypt each piece of data individually if possible at all and for data sharing the product allows you to create your own circles this can be personal professional or even medical circles. Let your physician track your health and activity monitoring devices let your friends track the type of music you're purchasing set privacy restrictions on your service providers for a change the possibilities are endless and you will always be in control. Remember no institution and protect the privacy of your personal information better than you the product with power back into your hands SECURITY MEASURES The Internet of Things and the exponential growth of associated technologies have presently reached 6 billion connected devices. Machines connect to each other. This automatic exchange of information with no human intervention opens up a new world of services and products. the range of peyote solutions as well as the number of diverse environment within which it is used. Conversely generates the potential for security breaches to be established across this
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 871 heterogeneous web-connected thing. we are facing a global scenario where security is no longer an option but is a mandatory requirement that we need to address. There are three basic security premises to follow:  Prevention: deter attacks to avoid losses  Detection: identify attacks to enable rapid and thorough response  Respondents: address and mitigate the incident as soon as possible in structured way to minimize losses and allow return to normal operating business.[3] There are three security levels Level 1) Secure Network IOT infrastructure: security measures used within the communication infrastructure such as virtual private networks dedicated and secure links. Level 2) Secure IOT enable layer: communication related alerts and automated responses these include the detection of replacement devices or a change in location or devices which shouldn't move. Such as a meat allowed to call only the authorized telephone numbers. Level 3) Secure IOT business IT and devices: these extra security levels enables end-to-end security in our customers IT business and manage devices. level 3 offers comprehensive and Innovative solutions including trusted public infrastructure provides a unique digital identity to IOT devices by our digital certificate SSL allowing mutually strong authentication between the IOT solutions this society and the device. [4] Thread detection: supplies and hence the information to improve awareness and inside of potential security exposure in the digital world and the associated identity threats and risks. Vulnerability management delivers a global security view of the IOT solution through penetration testing and the identification of potential risks. Security monitoring administers and protects IOT information with real-time alert notification and reporting. Security incident response manages critical security incidents and resolution by implementing clear and agrees business solutions and protocol. [5] REFERENCES [1] Md. Mahmud Hossain, Maziar Fotouhi, and Ragib Hasan, “Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things” [2] Andrea Zanella, “Internet of Things for Smart Cities”, IEEE, 2014 [3]Friedemann Mattern and Christian Floerkemeier, “From the Internet of Computers to the Internet of Things” [4] Mohamed Abomhara, Geir M. Køien “Security and Privacy in the Internet of Things:Current Status and Open Issues”
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 872 [5] Liane Margarida Rockenbach Tarouco, Lucas Mendes Ribeiro Arbiza “Internet of Things in Healthcare: Interoperatibility and Security Issues”