This document summarizes current research on the Internet of Things (IoT) in industries. It reviews key enabling technologies for IoT like RFID and wireless sensor networks. It also describes major IoT applications in various industries and identifies research challenges. The document proposes a service-oriented architecture for IoT with four layers - sensing, networking, service, and interface layers. It discusses each layer and how they interact to support IoT.
Towards Internet of Things: Survey and Future VisionCSCJournals
Internet of things is a promising research due to its importance in many commerce, industry, and education applications. Recently, new applications and research challenges in numerous areas of Internet of things are fired. In this paper, we discuss the history of Internet of things, different proposed architectures of Internet of things, research challenges and open problems related to the Internet of things. We also introduce the concept of Internet of things database and discuss about the future vision of Internet of things. These are the manuscript preparation guidelines used as a standard template for all journal submissions. Author must follow these instructions while preparing/modifying these guidelines.
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
This document proposes an Internet of Things (IoT)-based system for healthcare and an authentication scheme to secure it. It first reviews existing literature on IoT and healthcare systems. It then presents the architecture of the proposed system, which has perception, network and application layers. Devices in the perception layer would collect health data from patients. The network layer would communicate this data to cloud servers via gateways. The application layer would manage devices, analyze data and share it with applications. The document proposes authenticating healthcare devices during access of patient data. It aims to enhance security in IoT-based healthcare through device authentication.
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
New ITU Standard on Identity & Access ManagementITU
This document proposes requirements for assigning business meaning to identity and access management (IAM) roles and permissions by developing an IAM taxonomy and ontology model. The taxonomy would semantically identify IAM processes and phases to represent the full IAM lifecycle. The ontology model would semantically define IAM role and permission types, their syntax and relationships. This aims to address issues like incorrectly assigned access rights and inability to implement separation of duties controls across applications due to the current lack of business context for IAM roles and permissions.
IoT is referred as Internet of objects and wireless sensor networks and RFID are enabled in the fields of education, health, agriculture and entertainment. The IoT is the development production of the computer science and communication technology. The vulnerable nature of IoT is related to the security and privacy issues. The user may face as the consequence of the spread of IoT technology. The survey is focused on security loopholes arising out of the information exchange technologies used in IoT. Data analytics utilizes IoT and Big Data and it faces security challenges to protect their important data. In 2020, the wide amount of data could be generated by using the technologies of IoT and Big Data. The purpose of this survey is to analyze the vulnerable security issues and risk involved in each layer of the IoT as per to our knowledge the first survey with some goals. Dr. E. J. Thomson Fedrik | A. Vinitha | B. Vanitha ""Review on Vulnerabilities of IoT Security"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24020.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/24020/review-on-vulnerabilities-of-iot-security/dr-e-j-thomson-fedrik
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
This document discusses the Internet of Things (IoT) and provides an overview of what IoT is, its architecture and applications. The key points are:
1) IoT connects physical objects through the internet and allows them to collect and transfer data without human assistance. It transitions communication from human-to-human to human-to-device and device-to-device.
2) IoT has six layers in its architecture - perception, network, middleware, application, and business layers. It connects objects through sensors and networks and processes the data through middleware before powering applications.
3) IoT will have over 50 billion connected devices by 2020 and has applications in traffic monitoring, healthcare, security,
RT-RCT: an online tool for real-time retrieval of connected thingsjournalBEEI
The document proposes an online tool for real-time retrieval of connected things based on network port scanning. The tool allows users to search for and obtain information about IoT devices in real-time, displaying details like device state, ports, protocols, OS, and more. The tool was developed as a web application using Python libraries to provide an easy-to-use interface for retrieving current data on connected devices.
Towards Internet of Things: Survey and Future VisionCSCJournals
Internet of things is a promising research due to its importance in many commerce, industry, and education applications. Recently, new applications and research challenges in numerous areas of Internet of things are fired. In this paper, we discuss the history of Internet of things, different proposed architectures of Internet of things, research challenges and open problems related to the Internet of things. We also introduce the concept of Internet of things database and discuss about the future vision of Internet of things. These are the manuscript preparation guidelines used as a standard template for all journal submissions. Author must follow these instructions while preparing/modifying these guidelines.
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
This document proposes an Internet of Things (IoT)-based system for healthcare and an authentication scheme to secure it. It first reviews existing literature on IoT and healthcare systems. It then presents the architecture of the proposed system, which has perception, network and application layers. Devices in the perception layer would collect health data from patients. The network layer would communicate this data to cloud servers via gateways. The application layer would manage devices, analyze data and share it with applications. The document proposes authenticating healthcare devices during access of patient data. It aims to enhance security in IoT-based healthcare through device authentication.
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
New ITU Standard on Identity & Access ManagementITU
This document proposes requirements for assigning business meaning to identity and access management (IAM) roles and permissions by developing an IAM taxonomy and ontology model. The taxonomy would semantically identify IAM processes and phases to represent the full IAM lifecycle. The ontology model would semantically define IAM role and permission types, their syntax and relationships. This aims to address issues like incorrectly assigned access rights and inability to implement separation of duties controls across applications due to the current lack of business context for IAM roles and permissions.
IoT is referred as Internet of objects and wireless sensor networks and RFID are enabled in the fields of education, health, agriculture and entertainment. The IoT is the development production of the computer science and communication technology. The vulnerable nature of IoT is related to the security and privacy issues. The user may face as the consequence of the spread of IoT technology. The survey is focused on security loopholes arising out of the information exchange technologies used in IoT. Data analytics utilizes IoT and Big Data and it faces security challenges to protect their important data. In 2020, the wide amount of data could be generated by using the technologies of IoT and Big Data. The purpose of this survey is to analyze the vulnerable security issues and risk involved in each layer of the IoT as per to our knowledge the first survey with some goals. Dr. E. J. Thomson Fedrik | A. Vinitha | B. Vanitha ""Review on Vulnerabilities of IoT Security"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24020.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/24020/review-on-vulnerabilities-of-iot-security/dr-e-j-thomson-fedrik
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
This document discusses the Internet of Things (IoT) and provides an overview of what IoT is, its architecture and applications. The key points are:
1) IoT connects physical objects through the internet and allows them to collect and transfer data without human assistance. It transitions communication from human-to-human to human-to-device and device-to-device.
2) IoT has six layers in its architecture - perception, network, middleware, application, and business layers. It connects objects through sensors and networks and processes the data through middleware before powering applications.
3) IoT will have over 50 billion connected devices by 2020 and has applications in traffic monitoring, healthcare, security,
RT-RCT: an online tool for real-time retrieval of connected thingsjournalBEEI
The document proposes an online tool for real-time retrieval of connected things based on network port scanning. The tool allows users to search for and obtain information about IoT devices in real-time, displaying details like device state, ports, protocols, OS, and more. The tool was developed as a web application using Python libraries to provide an easy-to-use interface for retrieving current data on connected devices.
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...IAEME Publication
In recent times and as far as technological advancement goes, the Internet of
Things is the trending topic in the world. Internet of Things popularly called IoT is the
internetworking of interconnected devices over the internet to enable interaction
between those devices without any human interference. Cisco predicts at least 50
billion of such devices to be available by the year 2020. This leaves a huge gap as to
the appropriate awareness and literacy of the world as a collective to be receptive of
the massive IoT technology overhaul coming in the nearest future. This paper gives a
little insight into the basics of IoT, its core fundamentals, its architecture and
furthermore contributes to knowledge the application of IoT to the education sector.
Considering the number of connected devices expected to be produced, it is expected
also that sufficient amount of personnel are trained in IoT systems adequately to meet
with the rising demand
2015 security for the internet of things a survey ofVinod Salunkhe
This document surveys existing protocols and open issues regarding security for communications in the Internet of Things (IoT). It analyzes how current approaches ensure security requirements and protect IoT communications. The document also identifies challenges and opportunities for future research. Key points:
- The IoT will connect everyday objects to the Internet, requiring secure communication protocols optimized for constrained sensing devices.
- Standardization bodies are developing a protocol stack to enable reliable, efficient Internet connectivity between devices. This includes 6LoWPAN, RPL, CoAP and security protocols.
- The survey analyzes these protocols and how they address security requirements like authentication, integrity and confidentiality. It also discusses open problems and strategies for future research.
State regulation of the IoT in the Russian Federation: Fundamentals and chall...IJECEIAES
The purpose of this section is to study the problems with implementing technical and legal regulations for the development of public administration functions in the Russian Federation when using the internet of things (IoT). The introduction is based on an analysis of regulatory legal acts and presents the main strategic directions for the development of public administration functions in the Russian federation when using IoT. State reports, scientific literature, a system of technical and legal regulation are analyzed, and the main problems of implementing the IoT that impede the achievement of effective public administration are studied. The Russian practice of using IoT in various economic areas is investigated. Based on an analysis of the mechanisms for ensuring data safety of information technology users in the Russian federation, problems were investigated, such as the collecting data through IoT, including publicly available personal data in order to profile human activities, and creating of a digital twin of a person. The social constraints for introducing distributed registry technologies are users' distrust in the field of data privacy protection and mathematical algorithms that are used to establish trust in a digital environment instead of trusted centralized intermediaries; these problems were also analyzed. The Russian approach was analyzed in comparison to European experience in this field. To ensure information security and the possibility of its distribution, the IoT is revealed.
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY IJCNCJournal
The Internet of Things (IoT) enables numerous business opportunities in fields as diverse as e-health, smart
cities, smart homes, among many others. The IoT incorporates multiple long-range, short-range, and
personal area wireless networks and technologies into the designs of IoT applications. Localisation in
indoor positioning systems plays an important role in the IoT. Location Based IoT applications range from
tracking objects and people in real-time, assets management, agriculture, assisted monitoring technologies
for healthcare, and smart homes, to name a few. Radio Frequency based systems for indoor positioning
such as Radio Frequency Identification (RFID) is a key enabler technology for the IoT due to its costeffective,
high readability rates, automatic identification and, importantly, its energy efficiency
characteristic. This paper reviews the state-of-the-art RFID technologies in IoT Smart Homes applications.
It presents several comparable studies of RFID based projects in smart homes and discusses the
applications, techniques, algorithms, and challenges of adopting RFID technologies in IoT smart home
systems.
A Survey on the applications of IoT: an investigation into existing environme...TELKOMNIKA JOURNAL
In today’s digital environment, devices are able to interconnect and react to contextual data more than ever before: artificial intelligence is beginning to coordinate how data collected from sensors and de-vices within the network is analysed, and device ecosystems are replacing standalone devices to deliver solutions to the user. In this paper, the researcher explores current implementations of IoT that have led to positive outcomes for the user; but also, the challenges that remain in today’s applications. Moreover, ex-ploring these current barriers may be able to infer future applications capable of being deployed on a global scale
IRJET- Internet of Things for Industries and EnterprisesIRJET Journal
This document discusses how the Internet of Things (IoT) can benefit industries and enterprises. It begins with an introduction to the IoT and its growth and impact. It then presents the IoT ecosystem, which includes hardware, software, and network technology developers, as well as users. A five-layer IoT architecture is described including a perception layer, network layer, processing layer, application layer, and service management layer. Examples of IoT applications that can enhance value for industries are also provided, such as monitoring and control, business analytics, and information sharing. Finally, challenges of IoT development for enterprises are discussed, including issues around data management, data mining, privacy, security, and complexity.
Protecting Emerging Technology in the World of Internet of Things (IoTs), Art...Essentiality Check
The document discusses challenges for intellectual property counsel in protecting emerging technologies integrated into business products and services. It focuses on challenges for protecting internet of things (IoT) technologies, including artificial intelligence. Key challenges include securing adequate patent protection given that new innovations may automate known processes or apply known techniques. The document also discusses compliance with various standards and regulations for wireless technologies used in IoTs, as well as issues around graphical user interfaces, design patents, and patent eligibility of artificial intelligence inventions.
Applications of Blockchains in the Internet of Things: A Comprehensive SurveyDavid Bess
This document provides a comprehensive survey of applications of blockchains in the Internet of Things (IoT). It begins with an overview of blockchain technology and how it can help address challenges with centralized IoT models, such as single points of failure, lack of user control over data, and limited scalability. The document then surveys recent advances by industry and research to leverage blockchains to provide a decentralized, secure, and tamper-proof system for IoT data and communications. It discusses how blockchains can enhance fault tolerance, device autonomy, accountability, and enable features like smart contracts and programmable logic for IoT applications and interactions.
The document describes several cyber security solutions from Tekes Safety and Security Programme. The first solution discussed is a total IT asset data erasure solution that can completely erase digital data from all IT assets such that the data cannot be recovered with any existing technology. The solution has the most comprehensive certification in the industry. The second solution discussed is a flexible and secure authentication solution that aims to improve authentication for internet services. The third solution is a testing-as-a-service called Fuzz-o-Matic that can test applications for vulnerabilities and ensure their safety.
Internet of Things (IoT) from a Patent perspective | IPR strategy as a part of your Business Goal: Understanding the patent framework of internet of things (IoT). The following ppt illustrates some of the main technologies filed in the Internet of Things (IoT) sector.
Companies entering into the IoT sector need to have an IPR strategy for a profitable business in the long run.
This document summarizes a survey on cyber law in India. It discusses key issues and emerging challenges for cyber law in India, including security issues, ethical issues, lack of standardization, and rapidly evolving technologies. It also discusses implementations and solutions for enforcing cyber law in India, such as establishing more cyber crime cells, implementing a global techno-legal framework, and regular updates to the Information Technology Act. The survey concludes that cyber law is an evolving area with many complex issues and challenges due to the changing nature of both technology and crime, and will require ongoing research and improvements to effectively address cybercrime in India.
A Novel Security Approach for Communication using IOTIJEACS
The Internet of Things (IOT) is the arrangement of physical articles or "things" introduced with equipment, programming, sensors, and framework accessibility, which enables these things to accumulate and exchange data. Here outlining security convention for the Internet of Things, and execution of this relating security convention on the inserted gadgets. This convention will cover the honesty of messages and verification of every customer by giving a productive confirmation component. By this venture the protected correspondence is executed on implanted gadgets.
The internet of things is an emerging technology that is currently present in most processes and devices, allowing to improve the quality of life of people and facilitating the access to specific information and services. The main purpose of the present article is to offer a general overview of internet of things, based on the analysis of recently published work. The added value of this article lies in the analysis of the main recent publications and the diversity of applications of internet of things technology. As a result of the analysis of the current literature, internet of things technology stands out as a facilitator in business and industrial performance but above all in improving the quality of life. As a conclusion to this document, the internet of things is a technology that can overcome the challenges in terms of security, processing capacity and data mobility, as long as the development related to other technologies follows its expected course.
Internet of Things - Recent developments and TrendsDennis Jacob
The document discusses Internet of Things (IoT), providing an introduction and overview. It defines IoT as the network of physical devices embedded with sensors and connectivity that allows them to exchange data via the internet. The document outlines some key enabling technologies for IoT like RFID, wireless sensor networks, middleware, and presentation tools. It also discusses some common challenges for IoT like security and privacy issues. Examples of major IoT applications are given in areas like smart cities, healthcare, home automation, and industrial control. In conclusion, the document states that IoT has the potential to enhance services across many sectors and will likely become widespread in the coming decade as the necessary technologies continue to develop.
Technology analysis for internet of things using big data learningeSAT Journals
Abstract The internet of things (IoT) is an internet among things through advanced communication protocols without human’s operation. The main idea of IoT is to reach and improve the common goal by their intelligent networking. The IoT is an integrated technology of several sub technologies, such as wireless sensor or semantic. The technology of IoT has been evolved according to the environment based on information communication technology and social infrastructure. So we need to know the technological evolution of IoT in the future. In this paper, we analyze the IoT technology to find its technological relationship. We use patents and papers related to the IoT, and consider big data learning as tool for the IoT technology analysis. To verify the performance of our proposed methodology, we perform and show our case study using collected the patent and paper documents. Keywords: Big data learning, Internet of things, Technology analysis, and Patent analysis
The document discusses challenges with the current internet architecture and the need for a next generation architecture. It notes that the current architecture was designed 40 years ago and is facing issues around security, mobility, energy efficiency, and supporting new applications and services. The proposed next generation architecture would address these issues by enhancing security, separating control and data planes, better supporting mobility and distributed services, and enabling location-independent and person-centric communication models.
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET Journal
This document proposes enhancing security for IoT devices connected to cloud services through identity and access management (IAM). It discusses challenges in defining identity for IoT objects due to limitations in authentication factors. The document recommends using a risk-based multi-factor authentication approach leveraging inheritance, association, knowledge, and context information. It also notes complications from dynamic ownership and naming schemes. The proposed solution authenticates devices using OAuth 2.0 client credentials with a client ID, client secret, X509 certificates, and JSON web tokens. Access would further be authorized based on defined permissions and policies in a simple IAM implementation.
A survey on secure communication protocols for io t systemsVishwesh Nagamalla
This document provides a survey of secure communication protocols for Internet of Things (IoT) systems. It discusses the security requirements for IoT including confidentiality, integrity, authentication, privacy and resilience. It then evaluates the security capabilities of several standardized IoT communication protocols, including IEEE 802.15.4, WiFi, Bluetooth Low Energy, 6LoWPAN, and others. For each protocol, it describes the security features like encryption algorithms, authentication methods, and how they aim to satisfy the core security requirements for IoT systems.
Awareness on IoT Adoption for SMEs and Business IntelligenceDr. Mazlan Abbas
1) The document discusses Internet of Things (IoT) adoption for small and medium enterprises and provides business intelligence. It covers 13 interesting things about IoT including its history, enabling technologies, and how IoT can solve business problems and challenges.
2) The favoriot IoT platform is introduced as a platform-as-a-service that allows for rapid development of IoT vertical solutions using user-friendly APIs and examples.
3) A contest is announced where the first, tenth, and twentieth users to register for a free account on the favoriot platform will win a 1-year voucher for a beginner subscription plan worth RM100.
Comprehensive survey on security problems and key technologies of the interne...RSIS International
Internet of things (IoT) is a collection of many
interconnected objects, services, humans, and devices that can
communicate, share data, and information to achieve a common
goal in different areas and applications. The vision of IoT is to
enable devices to collaborate with each other on the Internet. IoT
security focuses on authentication and access control protocols.
IoT security is the area with protection connected devices and
networks. There are many key challenges in designing a secure
IoT: Privacy, Authentication, Access Control, Trust,
Confidentiality, Mobile Security, etc. Attacks on IoT security
devices are physical attacks, side channel attacks, cryptanalysis
attacks, software attacks, network attacks. This paper describes
Security Problems of IoT, Security issues and Key Technologies
of IoT.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
O documento descreve os benefícios dos testes ágeis, incluindo aceitação mais fácil de mudanças, objetivos compartilhados pela equipe, feedback contínuo que aumenta motivação e confiança, e foco no aprendizado constante.
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...IAEME Publication
In recent times and as far as technological advancement goes, the Internet of
Things is the trending topic in the world. Internet of Things popularly called IoT is the
internetworking of interconnected devices over the internet to enable interaction
between those devices without any human interference. Cisco predicts at least 50
billion of such devices to be available by the year 2020. This leaves a huge gap as to
the appropriate awareness and literacy of the world as a collective to be receptive of
the massive IoT technology overhaul coming in the nearest future. This paper gives a
little insight into the basics of IoT, its core fundamentals, its architecture and
furthermore contributes to knowledge the application of IoT to the education sector.
Considering the number of connected devices expected to be produced, it is expected
also that sufficient amount of personnel are trained in IoT systems adequately to meet
with the rising demand
2015 security for the internet of things a survey ofVinod Salunkhe
This document surveys existing protocols and open issues regarding security for communications in the Internet of Things (IoT). It analyzes how current approaches ensure security requirements and protect IoT communications. The document also identifies challenges and opportunities for future research. Key points:
- The IoT will connect everyday objects to the Internet, requiring secure communication protocols optimized for constrained sensing devices.
- Standardization bodies are developing a protocol stack to enable reliable, efficient Internet connectivity between devices. This includes 6LoWPAN, RPL, CoAP and security protocols.
- The survey analyzes these protocols and how they address security requirements like authentication, integrity and confidentiality. It also discusses open problems and strategies for future research.
State regulation of the IoT in the Russian Federation: Fundamentals and chall...IJECEIAES
The purpose of this section is to study the problems with implementing technical and legal regulations for the development of public administration functions in the Russian Federation when using the internet of things (IoT). The introduction is based on an analysis of regulatory legal acts and presents the main strategic directions for the development of public administration functions in the Russian federation when using IoT. State reports, scientific literature, a system of technical and legal regulation are analyzed, and the main problems of implementing the IoT that impede the achievement of effective public administration are studied. The Russian practice of using IoT in various economic areas is investigated. Based on an analysis of the mechanisms for ensuring data safety of information technology users in the Russian federation, problems were investigated, such as the collecting data through IoT, including publicly available personal data in order to profile human activities, and creating of a digital twin of a person. The social constraints for introducing distributed registry technologies are users' distrust in the field of data privacy protection and mathematical algorithms that are used to establish trust in a digital environment instead of trusted centralized intermediaries; these problems were also analyzed. The Russian approach was analyzed in comparison to European experience in this field. To ensure information security and the possibility of its distribution, the IoT is revealed.
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY IJCNCJournal
The Internet of Things (IoT) enables numerous business opportunities in fields as diverse as e-health, smart
cities, smart homes, among many others. The IoT incorporates multiple long-range, short-range, and
personal area wireless networks and technologies into the designs of IoT applications. Localisation in
indoor positioning systems plays an important role in the IoT. Location Based IoT applications range from
tracking objects and people in real-time, assets management, agriculture, assisted monitoring technologies
for healthcare, and smart homes, to name a few. Radio Frequency based systems for indoor positioning
such as Radio Frequency Identification (RFID) is a key enabler technology for the IoT due to its costeffective,
high readability rates, automatic identification and, importantly, its energy efficiency
characteristic. This paper reviews the state-of-the-art RFID technologies in IoT Smart Homes applications.
It presents several comparable studies of RFID based projects in smart homes and discusses the
applications, techniques, algorithms, and challenges of adopting RFID technologies in IoT smart home
systems.
A Survey on the applications of IoT: an investigation into existing environme...TELKOMNIKA JOURNAL
In today’s digital environment, devices are able to interconnect and react to contextual data more than ever before: artificial intelligence is beginning to coordinate how data collected from sensors and de-vices within the network is analysed, and device ecosystems are replacing standalone devices to deliver solutions to the user. In this paper, the researcher explores current implementations of IoT that have led to positive outcomes for the user; but also, the challenges that remain in today’s applications. Moreover, ex-ploring these current barriers may be able to infer future applications capable of being deployed on a global scale
IRJET- Internet of Things for Industries and EnterprisesIRJET Journal
This document discusses how the Internet of Things (IoT) can benefit industries and enterprises. It begins with an introduction to the IoT and its growth and impact. It then presents the IoT ecosystem, which includes hardware, software, and network technology developers, as well as users. A five-layer IoT architecture is described including a perception layer, network layer, processing layer, application layer, and service management layer. Examples of IoT applications that can enhance value for industries are also provided, such as monitoring and control, business analytics, and information sharing. Finally, challenges of IoT development for enterprises are discussed, including issues around data management, data mining, privacy, security, and complexity.
Protecting Emerging Technology in the World of Internet of Things (IoTs), Art...Essentiality Check
The document discusses challenges for intellectual property counsel in protecting emerging technologies integrated into business products and services. It focuses on challenges for protecting internet of things (IoT) technologies, including artificial intelligence. Key challenges include securing adequate patent protection given that new innovations may automate known processes or apply known techniques. The document also discusses compliance with various standards and regulations for wireless technologies used in IoTs, as well as issues around graphical user interfaces, design patents, and patent eligibility of artificial intelligence inventions.
Applications of Blockchains in the Internet of Things: A Comprehensive SurveyDavid Bess
This document provides a comprehensive survey of applications of blockchains in the Internet of Things (IoT). It begins with an overview of blockchain technology and how it can help address challenges with centralized IoT models, such as single points of failure, lack of user control over data, and limited scalability. The document then surveys recent advances by industry and research to leverage blockchains to provide a decentralized, secure, and tamper-proof system for IoT data and communications. It discusses how blockchains can enhance fault tolerance, device autonomy, accountability, and enable features like smart contracts and programmable logic for IoT applications and interactions.
The document describes several cyber security solutions from Tekes Safety and Security Programme. The first solution discussed is a total IT asset data erasure solution that can completely erase digital data from all IT assets such that the data cannot be recovered with any existing technology. The solution has the most comprehensive certification in the industry. The second solution discussed is a flexible and secure authentication solution that aims to improve authentication for internet services. The third solution is a testing-as-a-service called Fuzz-o-Matic that can test applications for vulnerabilities and ensure their safety.
Internet of Things (IoT) from a Patent perspective | IPR strategy as a part of your Business Goal: Understanding the patent framework of internet of things (IoT). The following ppt illustrates some of the main technologies filed in the Internet of Things (IoT) sector.
Companies entering into the IoT sector need to have an IPR strategy for a profitable business in the long run.
This document summarizes a survey on cyber law in India. It discusses key issues and emerging challenges for cyber law in India, including security issues, ethical issues, lack of standardization, and rapidly evolving technologies. It also discusses implementations and solutions for enforcing cyber law in India, such as establishing more cyber crime cells, implementing a global techno-legal framework, and regular updates to the Information Technology Act. The survey concludes that cyber law is an evolving area with many complex issues and challenges due to the changing nature of both technology and crime, and will require ongoing research and improvements to effectively address cybercrime in India.
A Novel Security Approach for Communication using IOTIJEACS
The Internet of Things (IOT) is the arrangement of physical articles or "things" introduced with equipment, programming, sensors, and framework accessibility, which enables these things to accumulate and exchange data. Here outlining security convention for the Internet of Things, and execution of this relating security convention on the inserted gadgets. This convention will cover the honesty of messages and verification of every customer by giving a productive confirmation component. By this venture the protected correspondence is executed on implanted gadgets.
The internet of things is an emerging technology that is currently present in most processes and devices, allowing to improve the quality of life of people and facilitating the access to specific information and services. The main purpose of the present article is to offer a general overview of internet of things, based on the analysis of recently published work. The added value of this article lies in the analysis of the main recent publications and the diversity of applications of internet of things technology. As a result of the analysis of the current literature, internet of things technology stands out as a facilitator in business and industrial performance but above all in improving the quality of life. As a conclusion to this document, the internet of things is a technology that can overcome the challenges in terms of security, processing capacity and data mobility, as long as the development related to other technologies follows its expected course.
Internet of Things - Recent developments and TrendsDennis Jacob
The document discusses Internet of Things (IoT), providing an introduction and overview. It defines IoT as the network of physical devices embedded with sensors and connectivity that allows them to exchange data via the internet. The document outlines some key enabling technologies for IoT like RFID, wireless sensor networks, middleware, and presentation tools. It also discusses some common challenges for IoT like security and privacy issues. Examples of major IoT applications are given in areas like smart cities, healthcare, home automation, and industrial control. In conclusion, the document states that IoT has the potential to enhance services across many sectors and will likely become widespread in the coming decade as the necessary technologies continue to develop.
Technology analysis for internet of things using big data learningeSAT Journals
Abstract The internet of things (IoT) is an internet among things through advanced communication protocols without human’s operation. The main idea of IoT is to reach and improve the common goal by their intelligent networking. The IoT is an integrated technology of several sub technologies, such as wireless sensor or semantic. The technology of IoT has been evolved according to the environment based on information communication technology and social infrastructure. So we need to know the technological evolution of IoT in the future. In this paper, we analyze the IoT technology to find its technological relationship. We use patents and papers related to the IoT, and consider big data learning as tool for the IoT technology analysis. To verify the performance of our proposed methodology, we perform and show our case study using collected the patent and paper documents. Keywords: Big data learning, Internet of things, Technology analysis, and Patent analysis
The document discusses challenges with the current internet architecture and the need for a next generation architecture. It notes that the current architecture was designed 40 years ago and is facing issues around security, mobility, energy efficiency, and supporting new applications and services. The proposed next generation architecture would address these issues by enhancing security, separating control and data planes, better supporting mobility and distributed services, and enabling location-independent and person-centric communication models.
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET Journal
This document proposes enhancing security for IoT devices connected to cloud services through identity and access management (IAM). It discusses challenges in defining identity for IoT objects due to limitations in authentication factors. The document recommends using a risk-based multi-factor authentication approach leveraging inheritance, association, knowledge, and context information. It also notes complications from dynamic ownership and naming schemes. The proposed solution authenticates devices using OAuth 2.0 client credentials with a client ID, client secret, X509 certificates, and JSON web tokens. Access would further be authorized based on defined permissions and policies in a simple IAM implementation.
A survey on secure communication protocols for io t systemsVishwesh Nagamalla
This document provides a survey of secure communication protocols for Internet of Things (IoT) systems. It discusses the security requirements for IoT including confidentiality, integrity, authentication, privacy and resilience. It then evaluates the security capabilities of several standardized IoT communication protocols, including IEEE 802.15.4, WiFi, Bluetooth Low Energy, 6LoWPAN, and others. For each protocol, it describes the security features like encryption algorithms, authentication methods, and how they aim to satisfy the core security requirements for IoT systems.
Awareness on IoT Adoption for SMEs and Business IntelligenceDr. Mazlan Abbas
1) The document discusses Internet of Things (IoT) adoption for small and medium enterprises and provides business intelligence. It covers 13 interesting things about IoT including its history, enabling technologies, and how IoT can solve business problems and challenges.
2) The favoriot IoT platform is introduced as a platform-as-a-service that allows for rapid development of IoT vertical solutions using user-friendly APIs and examples.
3) A contest is announced where the first, tenth, and twentieth users to register for a free account on the favoriot platform will win a 1-year voucher for a beginner subscription plan worth RM100.
Comprehensive survey on security problems and key technologies of the interne...RSIS International
Internet of things (IoT) is a collection of many
interconnected objects, services, humans, and devices that can
communicate, share data, and information to achieve a common
goal in different areas and applications. The vision of IoT is to
enable devices to collaborate with each other on the Internet. IoT
security focuses on authentication and access control protocols.
IoT security is the area with protection connected devices and
networks. There are many key challenges in designing a secure
IoT: Privacy, Authentication, Access Control, Trust,
Confidentiality, Mobile Security, etc. Attacks on IoT security
devices are physical attacks, side channel attacks, cryptanalysis
attacks, software attacks, network attacks. This paper describes
Security Problems of IoT, Security issues and Key Technologies
of IoT.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
O documento descreve os benefícios dos testes ágeis, incluindo aceitação mais fácil de mudanças, objetivos compartilhados pela equipe, feedback contínuo que aumenta motivação e confiança, e foco no aprendizado constante.
Quando o resultado final não é o que o cliente deseja, existe um culpado? Descubra como o test thinking pode auxiliar na construção de competências colaborativas e criatividade para que a qualidade seja compromisso de todo o time!
Laith Mohammad Awad is an IOS developer from Jordan with over 3 years of experience developing mobile applications. He has a Bachelor's degree in Computer Science and is proficient in Objective-C, HTML, CSS and the IOS SDK. Currently, he works for RPC | Alrahma Programing Company developing their social media application Ashabe, which allows users to share updates, chat, and access video and groups.
El documento define la paz como un estado de quietud o tranquilidad que implica la ausencia de conflictos y guerra, tanto a nivel individual como entre estados. Explica que la paz es indispensable para el progreso de las personas y los pueblos, aunque lograrla es difícil dado los muchos conflictos que han existido a lo largo de la historia. Finalmente, menciona dos símbolos comunes de la paz: la paloma blanca con una rama de olivo y el círculo con cuatro líneas que representa una huella de ave.
Garbage collection v Javě, JVM generace a typy GC aneb způsob automatické správy paměti. Funguje tak, že speciální algoritmus (garbage collector) vyhledává a uvolňuje úseky paměti, které již program nebo proces nepoužívá. Šetří tak váš čas při vývoji.
O documento discute a integração de testes end-to-end com Protractor no processo de integração contínua. Ele explica o que é integração contínua e como os testes e2e com Protractor se encaixam nesse processo. Também lista ferramentas como Jenkins e SemaphoreCI que podem ser usadas para executar testes Protractor de forma automatizada como parte da integração contínua.
pagoPa, i pagamenti elettronici nella Pubblica AmministrazioneDaniele Mondello
pagoPA iniziativa che consente a cittadini e imprese di pagare in maniera elettronica la Pubblica Amministrazione. Normativa e guida tecnica per il collegamento
Vladimir Putin is the person the author admires. Putin was born in 1952 in Leningrad and had a working class background, with his mother a factory worker and his father a sailor. As president, Putin has done important things for Russia, such as hosting the successful Sochi Olympics that showed Russia in a positive light globally and annexing Crimea. The author is proud of Putin and sees him as a skilled politician.
The document discusses how companies are leveraging open API programs for several key reasons: to generate new revenue streams and business models, build their brand and ecosystem, reduce costs and speed up app development, enable mobile strategies, and drive products and services innovation. It provides examples of large companies that have seen success through their API programs, such as how eBay grew its listings and how Netflix transformed its business model by making its APIs available.
Helpful survey for researchers and students who are intended to investigate in the Internet of things field in term of security and privacy side. This survey has general overview in security issues with the solutions addressed these issues.
The implementation of embedded IPv6 applications in an IPv4 world require one of several strategies of converting or tunneling IPv6 traffic through the IPv4 internet.
CoffeeScript is a programming language created by Jeremy Ashkenas that transpires to JavaScript. It aims to enhance JavaScript with syntax sugar like lambda functions, list comprehensions, and class definitions. CoffeeScript code reads like English and removes unnecessary characters like semicolons and parentheses from JavaScript. Classes in CoffeeScript are based on JavaScript's prototype-based inheritance, and new objects created with the new keyword link to the class's prototype for property lookup.
Internet of Things: Surveys for Measuring Human Activities from Everywhere IJECEIAES
The internet of things (IoT), also called internet of all, is a new paradigm that combines several technologies such as computers, the internet, sensors network, radio frequency identification (RFID), communication technology and embedded systems to form a system that links the real worlds with digital worlds. With an increase in the deployment of smart objects, the internet of things should have a significant impact on human life in the near future. To understand the development of the IoT, this paper reviews the current research of the IoT, key technologies, the main applications of the IoT in various fields, and identifies research challenges. A main contribution of this review article is that it summarizes the current state of the IoT technology in several areas, and also the applications of IoT that cause side effects on our environment for monitoring and evaluation of the impact of human activity on the environment around us, and also provided an overview of some of the main challenges and application of IoT. This article presents not only the problems and challenges of IoT, but also solutions that help overcome some of the problems and challenges.
The document discusses the Internet of Things (IoT), which refers to a global network of machines and devices that can interact with each other. It identifies five essential IoT technologies - radio frequency identification, wireless sensor networks, middleware, cloud computing, and IoT application software. It also examines three categories of enterprise IoT applications - monitoring and control, big data and business analytics, and information sharing and collaboration. Finally, it discusses challenges of IoT implementation including data management, privacy, security, and integration complexity.
Internet of Things Insights of Applications in Research and Innovation to Int...ijtsrd
In existing world IOT find a great attention from researchers, it becomes an vital technology that offers a well defined communications between objects and machines. That will offer immediate access to information about the real world and objects in it leading to innovative facilities and increase in effectiveness and output. The IoT developments address the whole IoT spectrum form the devices at the edge to cloud and data centres on the backend and everything in between through ecosystems are generated by industry, research and application stakeholders that enable real world use cases to quicken the in IoT and establish open interoperability standards and common architectures for IoT solutions. This paper studies the perception of many IoT applications and innovation of original connected technologies to the challenges that in front of the execution of the IoT. Deepika Bairagee | Aditya Sharma "Internet of Things: Insights of Applications in Research and Innovation to Integrated Ecosystem" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31213.pdf Paper Url :https://www.ijtsrd.com/computer-science/other/31213/internet-of-things-insights-of-applications-in-research-and-innovation-to-integrated-ecosystem/deepika-bairagee
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsINFOGAIN PUBLICATION
Internet of Things (IoT) is a novel communication standard and it is researcher’s preferred topic, which integrates heterogeneous systems seamlessly. Designing a universal architecture for IoT is a challenging task due to the integration of wide variety of the devices. The main objective of this paper is to provide comprehensive knowledge on challenges, applications, Security issues, and different communication models of IoT. This paper also focuses on the marketing trends of IoT with respect to variety of application with the end users. This motivates the researchers to contribute more productive work in this field by analyzing various parameters.
Internet of Things (IoT) links the objects of the real world to the virtual world, and enables anytime, anywhere connectivity for anything that has an ON and OFF switch. It constitutes to a world where physical objects and living beings, as well as virtual data and environments, interact with each other. Large amount of data is generated as large number of devices are connected to the internet. So this large amount of data has to be controlled and converted to useful information in order to develop efficient systems. In this paper, we focus on to an application of IoT in military service that is used to reduce the time and increase speed. IoT based intelligent transportation systems, deffense & security,Industry & most important Health monitoring system are designed to support the Smart City vision & various field which aims at employing the advanced and powerful technologies for the administration of the people and many service. Renuka Chandrakant Sonare | Dinesh V. Rojatkar"Application OF IoT in Military Service" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4629.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/4629/application-of-iot-in-military-service/renuka-chandrakant-sonare
Insight into IoT Applications and Common Practice Challengesijtsrd
IoT caused a revolution in the technological world. Not only is the IoT related to computers, people or cell phones but also to various sensors, actuators, vehicles, and other modern appliances. There are around 14 billion interconnected digital devices across the globe i.e. almost 2 devices per human being on earth. The IoT serves as a medium to connect non living things to the internet to transfer information from one point to another in their community network which automates processes and ultimately makes the life of human beings convenient. The subsequent result of amalgamating internet connectivity with powerful data analysis is a complete change in the way we humans work and live. The most vital characteristics of IoT include connectivity, active engagement, sensors, artificial intelligence, and small device use. All of this creates many challenges that need to be solved to keep this technology to continue expanding. In this paper, we have identified various applications of IoT based on recent technological and business trends and highlighted the existing challenges faced by IoT which need to be addressed considering the exponential acceptance of the concept globally and the way those challenges had been addressed in the past. We have also made a few comments on the way such challenges are being attempted to be resolved now. This paper presents the current status Internet of Things IoT in terms of technical details, and applications. Also, this paper opens a window for future work on the historical approach to study and address IoT challenges. Lubna Alazzawi | Jamal Alotaibi "Insight into IoT Applications and Common Practice Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30286.pdf Paper Url :https://www.ijtsrd.com/engineering/computer-engineering/30286/insight-into-iot-applications-and-common-practice-challenges/lubna-alazzawi
This document provides a survey of the Internet of Things (IoT). It defines IoT from different perspectives such as things, internet, and semantics. Key enabling technologies for IoT include RFID, sensor networks, and intelligence in smart objects. Potential applications discussed are supply chain management, transportation, healthcare, and disaster alerting/recovery. Major open issues remaining are the need for further standardization and addressing security/privacy concerns as IoT becomes more pervasive.
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
‘Internet of Things (IoT)’emerged as an intelligent collaborative computation and communication between a set of objects capable of providing on-demand services to other objects anytime anywhere. A large-scale deployment of data-driven cloud applications as well as automated physical things such as embed electronics, software, sensors and network connectivity enables a joint ubiquitous and pervasive internet-based computing systems well capable of interacting with each other in an IoT. IoT, a well-known term and a growing trend in IT arena certainly bring a highly connected global network structure providing a lot of beneficial aspects to a user regarding business productivity, lifestyle improvement, government efficiency, etc. It also generates enormous heterogeneous and homogeneous data needed to be analyzed properly to get insight into valuable information. However, adoption of this new reality (i.e., IoT) by integrating it with the internet invites a certain challenges from security and privacy perspective. At present, a much effort has been put towards strengthening the security system in IoT still not yet found optimal solutions towards current security flaws. Therefore, the prime aim of this study is to investigate the qualitative aspects of the conventional security solution approaches in IoT. It also extracts some open research problems that could affect the future research track of IoT arena.
The Internet of Things (IoT), also referred to as the Internet of Objects, will change everything—including ourselves. This may seem like a bold statement, but consider the impact the Internet already had on education, science, communication, business, government, and humanity. Clearly, the Internet is one of the most important and a powerful creation in all of human history. This paper discussesIOT architecture, IOT applications and limitations of IOT.
Internet of Things IoT Meaning, Application and Challengesijtsrd
The idea of making self- communicating devices conceived back in 1999 however it caught attention only after the British Entrepreneur Kevin Ashton christened the term Internet of Things. Since then, many distinguished researchers and other academicians of this domain have been adding significant knowledge on the fundamental concepts of IoT in the form of extensive researches, review papers and visual presentations. Here, in this paper, we are shedding light on the core concepts of Internet of Things. We further examine the potential impact of other existing or establishing technologies on IoT. We are presenting an extensive multi-facet report on the implementation of IoT while addressing many probable challenges that may occur in future. Ibrar Ahmed | Shilpi | Mohammad Amjad "Internet of Things (IoT) Meaning, Application and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18773.pdf
Internet of Things (IoT) integrates billions of the heterogeneous IoT things with the Internet in which the embedded systems such as sensors and actuators linked together to improve quality of life, and becomes the future of technologies in any field of human daily life. These IoT devices cooperate with each other and generate useful information to provide better services and applications to the governments and the society. Also, there is a need to store these data on Cloud for monitoring. This paper, surveys IoT applications, new challenges and issues arise in different fields and provides IoT architecture, focuses on explanation of IoT protocols and their operations and functionalities, presents different microcontroller types used by researchers. With the huge amount of data generated from IoT devices, the integrating Cloud and IoT may helpful, Therefore, a survey on open issues faced when these two concepts integrating together is discussed. The objective of this paper is to provide a survey for everything related to IoT and direct it to all beginners in this filed or academic researchers.
This document discusses applications of the Internet of Things (IoT) in manufacturing. It begins by providing an overview of IoT and how it is being applied specifically in industrial settings through the Industrial Internet of Things (IIoT). Some general applications of IIoT in manufacturing discussed include automation, supply chain management, inventory management, and predictive maintenance. Specific applications highlighted are in smart automotive manufacturing, mining, pipeline monitoring, digital factories, and using digital twins. The document explores how IIoT can improve efficiencies, reduce costs, and enhance safety monitoring across various manufacturing processes and industries.
In recent years, the Internet of Things (IOT) has attracted many attentions. It allows a number of objects that have been embedded with wired or wireless communication interfaces to automatically communicate and interact with each other. The IOT is a system, combination of embedded controllers, sensors, software’s and network. After internet and mobile communication, IOT is regarded as the third wave of information because of its huge market prospects. The development of IOT can support a variety of applications including Intelligent Art, Intelligent Logistics, Intelligent Medicine & Healthcare, Intelligent Transportation, Intelligent Power, Smart Life etc. IOT Gateway plays an important role in IOT applications since it bridges between wireless sensor networks with traditional communication networks or internet. This paper includes an IOT Gateway system based on Zigbee and Wi-Fi protocols according to the presented data transmission between wireless sensor networks and mobile communication networks, typical IOT application scenarios and requirements from telecom operators, protocol conversion of different sensor network protocols, and control functionalities for sensor networks, and an implementation of prototyping system and system validation is given.
In recent years, the Internet of Things (IOT) has attracted many attentions. It allows a number of objects that have been embedded with wired or wireless communication interfaces to automatically communicate and interact with each other. The IOT is a system, combination of embedded controllers, sensors, software’s and network. After internet and mobile communication, IOT is regarded as the third wave of information because of its huge market prospects. The development of IOT can support a variety of applications including Intelligent Art, Intelligent Logistics, Intelligent Medicine & Healthcare, Intelligent Transportation, Intelligent Power, Smart Life etc. IOT Gateway plays an important role in IOT applications since it bridges between wireless sensor networks with traditional communication networks or internet. This paper includes an IOT Gateway system based on Zigbee and Wi-Fi protocols according to the presented data transmission between wireless sensor networks and mobile communication networks, typical IOT application scenarios and requirements from telecom operators, protocol conversion of different sensor network protocols, and control functionalities for sensor networks, and an implementation of prototyping system and system validation is given.
Internet of things applications using Raspberry-Pi: a surveyIJECEIAES
The internet of things (IoT) is the communication of everything with anything else, with the primary goal of data transfer over a network. Raspberry Pi, a low-cost computer device with minimal energy consumption is employed in IoT applications designed to accomplish many of the same tasks as a normal desktop computer. Raspberry Pi is a quad-core computer with parallel processing capabilities that may be used to speed up computations and processes. The Raspberry Pi is an extremely useful and promising technology that offers portability, parallelism, low cost, and low power consumption, making it ideal for IoT applications. In this article, the authors provide an overview of IoT and Raspberry Pi and research on IoT applications using Raspberry Pi in various fields, including transportation, agriculture, and medicine. This article will outline the details of several research publications on Raspberry Pi-based IoT applications.
A MIDDLEWARE FOR THE INTERNET OF THINGSIJCNCJournal
The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as “things” to the Internet, in an intelligent and pervasive fashion. This connectivity gives rise to the possibility of using the tracking capabilities of things to impinge on the location privacy of users. Most of the existing management and location privacy protection solutions do not consider the low-cost and low-power requirements of things; or, they do not account for the heterogeneity, scalability, or autonomy of communications supported in the IoT. Moreover, these traditional solutions do not consider the case where a user wishes to control the granularity of the disclosed information based on
the context of their use (e.g. based on the time or the current location of the user). To fill this gap, a middleware, referred to as the Internet of Things Management Platform (IoT-MP) is proposed in this paper.
IRJET- Fourth Coming Internet: The Internet of ThingsIRJET Journal
This document discusses the concept of the Internet of Things (IoT) and its potential architecture. It begins by defining IoT as connecting physical objects through technologies like RFID, allowing objects to communicate with each other and be monitored remotely. It then discusses how IoT will expand communication beyond just human-to-human to include human-to-object and object-to-object. The document proposes an architecture for IoT including edge technologies like sensors to connect physical objects, as well as a service-oriented design and ability to interface with various networks. It acknowledges challenges in scaling such an architecture as more objects connect and exchange data.
(1) The Internet of Things (IoT) refers to a wireless network that connects household appliances and everyday objects.
(2) IoT embeds short-range mobile transceivers into gadgets and items, enabling new communication between people, things, and things themselves.
(3) IoT describes technologies that allow the Internet to connect physical objects, enabling applications in shopping, health care, transportation, and more.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
2. 1551-3203 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TII.2014.2300753, IEEE Transactions on Industrial Informatics
2
II. BACKGROUND & CURRENT RESEARCH OF IOT
IoT can be considered as a global network infrastructure
composed of numerous connected devices that rely on sensory,
communication, networking, and information processing
technologies [5]. A foundational technology for IoT is the RFID
technology, which allows microchips to transmit the
identification information to a reader through wireless
communication. By using RFID readers, people can identify,
track and monitor any objects attached with RFID tags
automatically [6]. RFID has been widely used in logistics,
pharmaceutical production, retailing, and supply chain
management since 1980s [7,8]. Another foundational
technology for IoT is the wireless sensor networks (WSN),
which mainly use interconnected intelligent sensors to sense and
monitoring. Its’ applications include environmental monitoring,
healthcare monitoring, industrial monitoring, traffic monitoring
and so on [9,10]]. The advances in both RFID and WSN
significantly contribute to the development of IoT. In addition,
many other technologies and devices such as barcodes, smart
phones, social networks, and cloud computing are being used to
form an extensive network for supporting IoT [11-16] (see
Figure 2).
Figure 2. Technologies associated with IoT
So far IoT has been gaining attraction in industry such as
logistics, manufacturing, retailing and pharmaceutics. With the
advances in wireless communication, smartphone, and sensor
network technologies, more and more networked things or
smart objects are being involved in IoT. As a result, these IoT
related technologies have also made a large impact on new ICT
and enterprise systems technologies (see Figure 3).
Figure 3. IoT related technology and their impact on new ICT
and enterprise systems
In order to provide high quality services to end users, IoT
technical standards need to be designed to define the
specification for information exchange, processing, and
communications between things. The success of IoT depends on
standardization, which provides interoperability, compatibility,
reliability, and effective operations on a global scale [17]. Many
countries and organizations are interested in the development of
IoT standards because it can bring tremendous economic
benefits in the future. Currently, numerous organizations such
as International Telecommunication Union, International
Electro-technical Commission, International Organization for
Standardization, IEEE, European Committee for
Electro-technical Standardization, China Electronics
Standardization Institute, and American National Standards
Institute are working on the development of various IoT
standards [18,19]. As so many organizations are involved in the
development of IoT standards, a strong coordination between
different standardization organizations is necessary to
coordinate and govern the relationships between international
standards organizations and national/regional standards
organizations [20]. By establishing widely accepted standards,
developers and users can implement IoT applications and
services that would be deployed and used on a large scale while
saving the development and maintenance cost in the long run.
The standardization of the technologies in IoT will also
accelerate the wide spread of IoT technology and innovations.
So far many countries have significantly invested on IoT
initiatives. The UK government has launched a £5m project to
develop IoT. In Europe Union, the IoT European Research
Cluster (IERC) FP7 (http://www.rfid-in-action.eu/cerp/) has
proposed a number of IoT projects and created an international
IoT forum to develop a joint strategic and technical vision for
the use of IoT in Europe [21, 22]. China takes IoT seriously and
plans to invest $800 million in the IoT industry by 2015. China
3. 1551-3203 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TII.2014.2300753, IEEE Transactions on Industrial Informatics
3
aims to take a leading role in setting international standards for
IoT technologies [23]. In the US, IBM and ITIF (The
Information Technology & Innovation Foundation) reported in
2009 that IoT can be an effective way to improve traditional
physical and information technology infrastructure, and will
have a greater positive impact on productivity and innovation.
Japan launched u-Japan and i-Japan strategies respectively in
2008 and 2009 in order to use IoT to support daily lives [24].
III. SERVICE-ORIENTED ARCHITECTURE FOR IOT
IoT aims to connect different things over the networks. As a key
technology in integrating heterogeneous systems or devices,
service-oriented architecture (SOA) can be applied to support
IoT. SOA has been successfully used in research areas such as
cloud computing, wireless sensor networks and vehicular
network [25-32]. Quite a few ideas have been proposed to create
multi-layer SOA architectures for IoT based on the selected
technology, business needs, and technical requirements. For
example, the International Telecommunication Union
recommends that IoT architecture consists of five different
layers: sensing, accessing, networking, middleware, and
application layers. Jia, Feng, Fan, and Lei [6] and Domingo [33]
propose to divide the IoT system architecture into three major
layers: perception layer, network layer, and service layer (or
application layer). Atzori et al. [19] developed a three-layered
architectural model for IoT which consists of the application
layer, the network layer, and the sensing layer. Liu et al. [34]
designed an IoT application infrastructure that contains physical
layer, transport layer, middleware layer, and applications layer.
From the perspective of functionalities, a four-layered
service-oriented architecture of IoT is shown in Table 1. Figure
4 shows a service-oriented architecture where the four layers
interact to each other.
Layers Description
Sensing layer This layer is integrated with existing
hardware (RFID, sensors, actuators,
etc.) to sense/control the physical
world and acquire data.
Networking layer This layer provides basic networking
support and data transfer over
wireless or wired network.
Service layer This layer creates and manages
services. It provides services to
satisfy user needs.
Interface layer This layer provides interaction
methods to users and other
applications.
Table 1. A four-layered architecture for IoT
Figure 4. Service-oriented architecture for IoT
The architectural design of IoT is concerned with architecture
styles, networking and communication, smart objects, web
services and applications, business models and corresponding
process, cooperative data processing, security, etc. From the
technology perspective, the design of an IoT architecture needs
to consider extensibility, scalability, modularity, and
interoperability among heterogeneous devices. As things might
move or need real-time interaction with their environment, an
adaptive architecture is needed to help devices dynamically
interact with other things. The decentralized and heterogeneous
nature of IoT requires that the architecture provides IoT
efficient event-driven capability. Thus, SOA is considered a
good approach to achieve inter-operability between
heterogeneous devices in a multitude of way [19,20,32].
A. Sensing layer
IoT can be considered as a world-wide physical inner-connected
network, in which things can be connected and controlled
remotely. As more and more devices are equipped with RFID or
intelligent sensors, connecting things becomes much easier
[35]. In the sensing layer, the wireless smart systems with tags
or sensors are now able to automatically sense and exchange
information among different devices. These technology
advances significantly improve the capability of IoT to sense
and identify things or environment. In some industry sectors,
intelligent service deployment schemes and a universal unique
identifier (UUID) is assigned to each service or device that may
be needed. A device with UUID can be easily identified and
retrieved. Thus, UUIDs are critical for successful services
deployment in a huge network like IoT [35,36].
4. 1551-3203 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TII.2014.2300753, IEEE Transactions on Industrial Informatics
4
B. Networking layer
The role of networking layer is to connect all things together and
allow things to share the information with other connected
things. In addition, the networking layer is capable of
aggregating information from existing IT infrastructures (e.g.
business systems, transportation systems, power grids,
healthcare systems, ICT systems, etc.). In SOA-IoT, services
provided by things are typically deployed in a heterogeneous
network and all related things are brought into the service
Internet [19,37]. This process might involve QoS management
and control according to the requirements of users/applications.
On the other hand, it is essential for a dynamically changing
network to automatically discovery and map things in a
network. Things need to be automatically assigned with roles to
deploy, manage, and schedule the behaviours of things and be
able to switch to any other roles at any time as needed. These
capabilities enable devices to be able to collaboratively perform
tasks. To design the networking layer in IoT, designers need to
address issues such as network management technologies for
heterogonous networks (such as fixed, wireless, mobile, etc.),
energy efficiency in networks, QoS requirements, service
discovery and retrieval, data and signal processing, security and
privacy [38].
C. Service layer
Service layer relies on the middleware technology, which
provides functionalities to seamlessly integrate services and
applications in IoT. The middleware technology provides the
IoT with a cost-efficient platform, where the hardware and
software platforms can be reused. A main activity in the service
layer involves the service specifications for middleware, which
are being developed by various organizations. A well designed
service layer will be able to identify common application
requirements and provide APIs and protocols to support
required services, applications and user needs. This layer also
processes all service-oriented issues, including information
exchange and storage, data management, search engines and
communication [19,20,38]. This layer includes the following
components:
Service discovery: finding objects that can offer the needed
services and information in an efficient way [19].
Service composition: enabling the interaction and
communication among connected things. The discovery phase
leverage the relationships among different things to discover the
desired service, and the service composition component is to
schedule or re-create more suitable services in order to acquire
the most reliable services to meet the request [19,20].
Trustworthiness management: aiming at determining trust
and reputation mechanisms that can evaluate and use the
information provided by other services to create a trustworthy
system [19,37,38].
Service APIs: supporting the interactions between services
required in IoT [24,38].
D. Interface layer
In IoT, a large number of devices involved are made by different
manufacturers/vendors and they do not always follow the same
standards/protocols. As a result of the heterogeneity, there are
many interaction problems with information exchange,
communication between things, and cooperative event
processing among different things. Furthermore, the constant
increase of things participating in an IoT makes it harder to
dynamically connect, communicate, disconnect, and operate.
There is also a necessity for an interface layer to simplify the
management and interconnection of things. An interface profile
(IFP) can be seen as a subset of service standards that support
interaction with applications deployed on the network. A good
interface profile is related to the implementation of Universal
Plug and Play (UPnP), which defines a protocol for facilitating
interaction with services provided by various things [38,39].
The interface profiles are used to describe the specifications
between applications and services. The services on the service
layer run directly on limited network infrastructures in order to
effectively find new services for an application as they connect
to the network. Recently an SOCRADES integration
architecture (SIA) has been proposed to effectively interact
between applications and services [38,40]. Traditionally, the
service layer provides universal API for applications. However,
the recent research results on SOA-IoT reported [41] that
service provisioning process (SPP) can also effectively provide
interaction between applications and services. The SPP first
perform a “types query”, which send a request for services with
a generic WSDL format, then use a “candidate search”
mechanism to find potential services. Based on the “Application
context” and “QoS information”, all service instances are
ranked and a "On-Demand service provisioning" mechanism
will be used to identify a service instance that matches the
application's requirements. In the end, a “Process Evaluation” is
used to evaluate the process [41,42].
IV. KEY ENABLING TECHNOLOGIES
A. Identification and Tracking technologies
The identification and tracking technologies involved in IoT
include RFID systems, Barcode, and Intelligent Sensors. A
simple RFID system is composed of an RFID reader and an
RFID tag. Because of its ability to identify, trace, and track
devices and physical objects, the RFID system is increasingly
being used in industries such as logistics, supply chain
management, and healthcare service monitoring [6, 43]. Other
benefits of the RFID system include providing precise real-time
information about the involved devices, reducing labor cost,
simplifying business process, increasing the accuracy of
inventory information, and improving business efficiency. So
far the RFID system has been successfully used by numerous
manufacturers, distributors, and retailers in many industries [7,
8]. Recent development of the RFID technology focuses on the
following aspects [6,7,8,43]:
Active RFID systems with spread-spectrum transmission
Technology of managing RFID applications [7,8].
There is still a plenty of room for the growth of the
RFID-based applications [44]. To further promote the RFID
technology, RFID can be integrated with wireless sensors
networks to better track and trace things in real time. In
particular, the emerging wireless intelligent sensor technologies
5. 1551-3203 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TII.2014.2300753, IEEE Transactions on Industrial Informatics
5
such as electromagnetic sensors, biosensors On/Off-board
location sensors, sensor tags, independent tag, and sensor
devices further facilitate implementation and deployment of
industrial services and applications. By integrating data
acquired by intelligent sensors with RFID data, more powerful
IoT applications that are suitable for the industrial environments
can be created.
B. Communication technologies in IoT
IoT can contain many electronic devices, mobile devices, and
industrial equipment Different things have different
communication, networking, data processing, data storage
capacities and transmission power. For instance, many smart
phones now have powerful communication, networking, data
processing, data storage capacities. Compared to smart phones,
heart rate monitor watches only have limited communication
and computation capabilities. All these things can be connected
by networking and communication technologies.
IoT involves a number of heterogeneous networks such as
WSNs, wireless mesh networks, WLAN, etc. These networks
help things in IoT exchange information. A gateway has the
ability to facilitate the communication or interaction of various
devices over the Internet. The gateway can also leverage its
network knowledge by executing optimization algorithms
locally. Therefore, a gateway can be used to handle many
complex aspects involved in communication on the network
[44].
Different things may have varying QoS requirements such as
performance, energy efficiency, and security. For example,
many devices rely on batteries and thus reducing energy
consumption for these devices is a top concern. In contrast,
devices with power supply connection often do not set energy
saving as a top priority. IoT would also greatly benefit by
leveraging existing Internet protocols such as IPv6, as this
would make it possible to directly address any number of things
needed through the Internet [3, 19,20]. Main communication
protocols and standards include RFID (eg. ISO 18000 6c EPC
class 1 Gen2), NFC, IEEE 802.11 (WLAN), IEEE
802.15.4(ZigBee), IEEE 802.15.1(Bluetooth), Multihop
Wireless Sensor/Mesh Networks, IETF Low power Wireless
Personal Area Networks (6LoWPAN), Machine to Machine
(M2M) and traditional IP technologies such as IP, IPv6, etc.
C. Networks involved in IoT
There are quite a few cross-layer protocols for wireless
networks such as Wireless Sensor and Actuator Networks
(WSAN) or Ad Hoc Networks (AHNs) [37]. However, they
must be revised before they can be applied to the IoT. The
reason is that because things in IoT often have diverse
communication and computation capabilities and varying QoS
requirements. In contrast, nodes in WSNs typically have similar
requirements for hardware and network communication. In
addition, the IoT network uses the Internet to support
information exchange and data communication. In contrast,
WSNs and AHNs do not have to involve the Internet for
communication.
D. Service Management in IoT
Service management in IoT refers to the implementation and
management of quality IoT services that meet the needs of users
or applications. The service-oriented architecture can be used to
encapsulate services by hiding the implementation details of
services such as protocols used [45]. This makes it possible to
decouple between components in a system and therefore hide
the heterogeneity from end users. SOA-IoT allows applications
to use heterogonous objects as compatible services [11]. On the
other hand, the dynamic nature of IoT applications requires IoT
to provide reliable and consistent services. An effective
service-oriented architecture can minimize the impact caused by
device moves or battery failure. A good example is the OSGi
platform [46] which applies a dynamic SOA architecture to
enable the deployment of smart services. As an effective
modular platform for service deployment, OSGi has been
employed in diverse contexts (e.g., mobile apps, plug-in,
application servers, etc.). In IoT, the service composition based
on OSGi platform can be implemented by Apache Felix iPoJo
[47].
A service is a collection of data and associated behaviors to
accomplish a particular function or feature of a device or
portions of a device. Services can be provisioned in various
ways. A service may reference other primary or secondary
services and/or a set of characteristics that make up the service.
The services can be categorized into two types: primary service
and secondary service. The former denotes services that expose
the primary functionalities at an IoT node, which can be seen as
the basic service component and can be included by another
service. A secondary service can provide auxiliary
functionalities to the primary service or other secondary
services. A service may consist of one or more characteristics,
which defines service data structures, permission, descriptors,
and other attributes of a service [32,38].
In a service-oriented IoT, services can be created and
deployed according to the following steps [3,19,20]: (1)
developing services composition platforms; (2) abstracting the
device' functionalities and communication capabilities; (3)
provision of a common set of services. Services identity
management involves context management and object
classification. IoT also makes it possible to build a mirror for
each real object in the IoT. IoT also has a service-oriented and
context aware architecture where every virtual and physical
object can communicate with one another. The service-oriented
IoT allows each component to offer its functionalities as
standard services, which might significantly increase the
efficiency of both devices and networks involved in IoT.
V. KEY IOT APPLICATIONS IN INDUSTRIES
IoT applications are still in its early stage [19,20,32]. However,
the use of IoT is rapidly evolving and growing. Quite a few IoT
applications are being developed and/or deployed in various
industries including environmental monitoring, healthcare
service, inventory and production management, food supply
chain, transportation, workplace and home support, security and
surveillance. Atzori et al. [19] and Miorandi et al. [20] provide a
general introduction to IoT applications in various domains.
Different from their discussions, our discussion specifically
6. 1551-3203 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TII.2014.2300753, IEEE Transactions on Industrial Informatics
6
focuses on industrial IoT applications. The design of industrial
IoT applications needs to consider the following goals.
Design Goals Description
Energy How long can an IoT device operate with
limited power supply?
Latency How much time is need for message
propagation and processing?
Throughput What is the maximum amount of data
that can be transported through the
network?
Scalability How many devices are supported?
Topology Who must communicate with whom?
Security & Safety How secure and safe is the application?
Table 2. Design considerations for Industrial IoT Applications
(adapted from Flügel & Gehrmann [48])
Depending on the intended industrial application, designers
may have to make a tradeoff among these goals to achieve a
balance of cost and benefits [48]. Below are some IoT
applications in industries.
Using IoT in the healthcare service industry [49]. IoT
provides new opportunities to improve healthcare [33].
Powered by IoT’s ubiquitous identification, sensing, and
communication capacities, all objects in the healthcare systems
(people, equipment, medicine, etc.) can be tracked and
monitored constantly [50]. Enabled by its global connectivity,
all the healthcare related information (logistics, diagnosis,
therapy, recovery, medication, management, finance, and even
daily activity) can be collected, managed, and shared efficiently.
For example, a patient’s heart rate can be collected by sensors
from time to time and then sent to the doctor’s office. By using
the personal computing devices (laptop, mobile phone, tablet,
etc.) and mobile internet access (WiFi, 3G, LTE, etc.), the
IoT-based healthcare services can be mobile and personalized
[51]. The wide spread of mobile internet service has expedited
the development of the IoT-powered in-home healthcare (IHH)
services [49]. Security and privacy concerns are two major
challenges that currently limit the further development of IoT in
health care.
Using IoT in food supply chain [52]. Today’s food supply
chain (FSC) is extremely distributed and complex. It has large
geographical and temporal scale, complex operation processes,
and large number of stakeholders. The complexity has caused
many issues in the quality management, operational efficiency,
and public food safety. IoT technologies offer promising
potentials to address the traceability, visibility, and
controllability challenges. It can cover the FSC in the so-called
farm-to-plate manner, from precise agriculture, to food
production, processing, storage, distribution, and consuming.
Safer, more efficient, and sustainable FSCs are expectable in the
future. A typical IoT solution for FSC (the so called Food-IoT)
comprises three parts: the field devices such as WSN nodes,
RFID readers/tags, user interface terminals, etc., the backbone
system such as databases, servers, and many kinds of terminals
connected by distributed computer networks, etc., and the
communication infrastructures such as WLAN, cellular,
satellite, power line, Ethernet, etc. As the IoT system offers
ubiquitous networking capacity, all of these elements can be
distributed throughout the entire FSC. Furthermore, it also
offers effective sensing functionalities to track and monitor the
process of food production. The vast amount of raw data can be
further mined and analyzed to improve the business process and
support decision making. Big data technologies can be used to
facilitate the challenge of analyzing the tremendous data
collected from food supply chain.
Using IoT for safer mining production. Mine safety is a big
concern for many countries due to the working condition in the
underground mines. To prevent and reduce accidents in the
mining, there is a need to use IoT technologies to sense mine
disaster signals in order to make early warning, disaster
forecasting, and safety improvement of underground production
possible [53]. By using RFID, WiFi, and other wireless
communications technology and devices to enable effective
communication between surface and underground, mining
companies can track the location of underground miners and
analyze critical safety data collected from sensors to enhance
safety measures. Another useful application is to use chemical
and biological sensors for the early disease detection and
diagnosis of underground miners as they work in a hazardous
environment. These chemical and biological sensors can be
used to acquire biological information from human body and
organs and to detect hazardous dust, harmful gases, and other
environmental hazards that will cause accidents. A challenge is
that wireless devices need power and could potentially detonate
gas in the mine. More research is needed regarding safety
characteristics of IoT devices used in the mining production.
Using IoT in transportation and logistics. IoT will play an
increasingly important role in transportation and logistics
industries [19]. As more and more physical objects are equipped
with bar codes, RFID tags or sensors, transportation and
logistics companies can conduct real-time monitoring of the
move of physical objects from an origin to a destination across
the entire supply chain including manufacturing, shipping,
distribution, and so on [54]. Furthermore, IoT is expected to
offer promising solutions to transform transportation systems
and automobile services [55]. As vehicles have increasingly
powerful sensing, networking, communication, and data
processing capabilities, IoT technologies can be used to
enhance these capabilities and share under-utilized resources
among vehicles in the parking space or on the road. For
example, IoT technologies make it possible to track each
vehicle’ existing location, monitor its movement and predict its
future location. Recently, an intelligent informatics system
(iDrive system) developed by BMW used various sensors and
tags to monitor the environment such as tracking the vehicle
location and the road condition to provide driving directions
[56]. Zhang et al. [57] designed an intelligent monitoring system
to monitor temperature/humidity inside refrigerator trucks by
using RFID tags, sensors, and wireless communication
technology. In the near future, we will see the development of an
automotive autopilot that can automatically detect pedestrians
or other vehicles and take evasive steering to avoid collisions as
needed [58]. Security and privacy protection are important for
the widespread use of IoT in transportation and logistics since
7. 1551-3203 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TII.2014.2300753, IEEE Transactions on Industrial Informatics
7
many vehicle drivers are worried about information leak and
privacy invasion. Reasonable efforts in technology, law and
regulation are needed to prevent unauthorized access to or
disclosure of the privacy data.
Using IoT in firefighting. IoT has been used in the
firefighting safety field to detect potential fire and provide early
warning for possible fire disasters. In China, RFID tags and/or
bar codes are being attached to firefighting products to develop
nationwide firefighting product information databases and
management systems. By leveraging RFID tags, mobile RFID
readers, intelligent video cameras, sensor networks, and
wireless communication networks, the firefighting authority or
related organizations could perform automatic diagnosis to
realize real-time environmental monitoring, early fire warning
and emergency rescue as needed. Researchers in China are also
using IoT technologies to construct Fire Automatic Alarming
Systems in order to raise the nation’s firefighting management
and emergency management to a new level [59]. Recently Ji &
Qi [60] illustrate an infrastructure of IoT applications used for
emergency management in China. Their IoT application
infrastructure contains sense layer, transmission layer, support
layer, platform layer, and applications layer. Their IoT
infrastructure has been designed to integrate both local-based
and sector-specific emergency systems. Establishing standards
for implementing Fire IoT is a pressing challenge now.
VI. RESEARCH CHALLENGES & FUTURE TRENDS
It is broadly accepted that the IoT technologies and applications
are still in their infancy [32]. There are still many research
challenges for industrial use such as technology,
standardization, security and privacy [19,20]. Future efforts are
needed to address these challenges and examine the
characteristics of different industries to ensure a good fit of IoT
devices in the industrial environments. A sufficient
understanding of industrial characteristics and requirements on
factors such as cost, security, privacy, and risk is required
before IoT will be widely accepted and deployed in industries.
A. Technical challenges
Although a lot of research efforts have been made on IoT
technologies, there are still technical challenges:
(1) Design a service-oriented architecture for IoT is a big
challenge, in which service-based things might suffer from
performance and cost limitations. In addition, scalability issues
often arise as more and more physical objects are connected to
the network. When the number of things is large, scalability is
problematic at different levels including data transfer and
networking, data processing and management, and service
provisioning [20].
(2) From the viewpoint of network, the IoT is a very
complicated heterogeneous network, which includes the
connection between various types of networks through various
communication technologies. Currently, there is lack of a
widely accepted common platform that hides the heterogeneity
of underlining networks/communication technologies and
provide a transparent naming service to various applications
[20]. Large amounts of data transmission across the network at
the same time can also cause frequent delay, conflict and
communication issues. It is a challenging task to develop
networking technologies and standards that can allow data
gathered by a large number of devices to move efficiently within
IoT networks. Managing connected things in terms of
facilitating the collaboration between different entities and the
administering devices addressing, identification, and
optimization at the architectural and protocol levels is a research
challenge [17].
(3) From the viewpoint of service, a lack of a commonly
accepted service description language makes the service
development and integration of resources of physical objects
into value-added services difficult. The developed services
could be incompatible with different communication and
implementation environments [19,22]. In addition, powerful
service discovery methods and object naming services need to
be developed to spread the IoT technology [19,20].
(4) As IoT is often developed based on a traditional ICT
environment and it is affected by everything connected to the
network, it requires a lot of work to integrate IoT with existing
IT systems or legacy systems into a unified information
infrastructure. Furthermore, with the huge number of things
connected to the Internet, a massive amount of real-time data
flow will be automatically produced by connected things [61].
The data may not have much meaningful value unless people
find an effective way to analyze and understand it [62].
Analyzing or mining massive amounts of data generated from
both IoT applications and existing IT systems to derive valuable
information requires strong big data analytics skills which could
be challenging for many end users. In addition, integrating IoT
devices with external resources such as existing software
systems and Web services requires the development of various
middleware solutions since applications vary a lot by industries.
Building practical applications of combining heterogeneous
IoT-related data with traditional data can be a challenge task for
various industries.
B. Standardization
The rapid growth of IoT makes the standardization difficult.
However, standardization plays an import role for the further
development and spread of IoT. Standardization in IoT aims to
lower the entry barriers for the new service providers and users,
to improve the interoperability of different applications/systems
and to allow products or services to better compete at a higher
level. A careful standardization process and a lot of
coordination efforts are needed to ensure devices and
applications from different countries to be able to exchange
information [20]. Various standards used in IoT (e.g., security
standards, communication standards, identification standards)
might be the key enablers for the spread of IoT technologies and
need to be designed to embrace emerging technologies. Specific
issues in IoT standardization include interoperability issue,
radio access level issues, semantic interoperability, and security
and privacy issues [63-65]. In addition, industry-specific
guidelines or standards for implementing IoT in industrial
environments are also recommended for easier integration of
various services.
8. 1551-3203 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TII.2014.2300753, IEEE Transactions on Industrial Informatics
8
C. Information Security and Privacy Protection
The acceptance and widespread of new IoT technologies and
services will largely rely on the information security and data
privacy protection which are two difficult issues in IoT because
of its deployment, mobility, and complexity [66]. Many existing
technologies are available for consumer use but are not suitable
for industrial applications that have strict safety and security
requirements. To secure the information, existing encryption
technology borrowed from the WSNs or other networks need to
be carefully reviewed when they are used to build IoT. As IoT
allows many daily things to be tracked, monitored, and
connected, a lot of personal and private information can be
collected automatically [19]. Protecting privacy in the IoT
environment becomes more serious than the traditional ICT
environment because the number of attack vectors on IoT
entities is apparently much larger [67,68,69]. For example, a
health monitor will collect patient’s information such as heart
rate and blood sugar level and then send the information directly
to the doctor’s office over the network. When the information is
transferred over the network, patient’s data could be stolen or
compromised. Another example is that bio-sensor used in the
food industry can be used to monitor temperature and bacterial
composition of food stored in the refrigerator. When some food
becomes deteriorated, data can be sent back to the food
company through the network. However, such data should be
kept strictly confidential in order to protect the reputation of a
food company [20]. It should be noticed that some issues such
as the definition of privacy, legal interpretation are still vague
and are not clearly defined in IoT. Although the existing
network security technologies provide a basis for privacy and
security in IoT, more work still needs to be done. A reliable
security protection mechanism for IoT needs to be researched
from the following aspects: (1)The definition of security and
privacy from the viewpoint of social, legal and culture; (2) trust
and reputation mechanism; (3) communication security such as
end-to-end encryption; (4) privacy of communication and user
data; (5) security on services and applications.
D. Research Trends
The development of IoT infrastructures will likely follow an
incremental approach and expand from existing identification
techniques such as RFID. International cooperation efforts and
a system-level perspective are needed to address the above
IoT-related challenges [20,70-73]. In addition to conducting
research to address the above challenges, we also identify a few
other research trends:
(1) Integrating social networking with IoT solutions. There is
a strong interest to use social networking to enhance the
communications among different IoT things. A new paradigm
named Social Internet of Things (SIoT) was recently proposed
by Atzori et al. [42]. There is a trend for the move from IoT to a
new vision named Web of Things that allows IoT objects to
become active actors and peers on the Web [74-77].
(2) Developing green IoT technologies. As IoT involves
billions of connected sensors communicating through the
wireless network, the power consumption of sensors is a big
concern and limitation for the widespread of IoT. Saving
energy should become a critical design goal for IoT devices
such as wireless sensors [78]. There is a need to develop
energy-efficient techniques or approaches that can reduce the
consumed power by sensors [79].
(3) Developing context-aware IoT middleware solutions.
When billions of sensors are connected to the Internet, it is not
feasible for people to process all the data collected by those
sensors. Context-awareness computing techniques such as IoT
middleware are proposed to better understand sensor data and
help decide what data needs to be processed [61]. Currently,
most IoT middleware solutions do not have context-awareness
capabilities. The European Union has identified context
awareness as an important IoT research area and specified a
time frame (2015-2020) for context-aware IoT computing
research and development [21].
(4) Employing artificial intelligence techniques to create
intelligent things or smart objects. Arsénio et al. [80] propose to
create Internet of Intelligent Things by bringing artificial
intelligence into things and communication networks. Future
IoT systems should have characteristics including
“self-configuration, self-optimization, self-protection, and
self-healing” [81,82]. Smart objects will become more
intelligent [83] and context-aware with larger memory,
processing, and reasoning capabilities in the future.
(5) Combining IoT and cloud computing. Clouds provide a
good way for things to get connected and allow us to access
different things on the Internet. Further research will focus on
implementing new models or platforms that provide “sensing as
a service” on the cloud [84-86].
VII. CONCLUSION
As a complex cyber-physical system, IoT integrates various
devices equipped with sensing, identification, processing,
communication, and networking capabilities. In particular,
sensors and actuators are getting increasingly powerful, less
expensive and smaller, which makes their use ubiquitous.
Industries have strong interest in deploying IoT devices to
develop industrial applications such as automated monitoring,
control, management, and maintenance. Due to the rapid
advances in technology and industrial infrastructure, IoT is
expected to be widely applied to industries. For example, the
food industry is integrating WSN and RFID to build automated
systems for tracking, monitoring, and tracing food quality along
the food chain in order to food quality.
This paper reviews the recent researches on IoT from the
industrial perspective. We firstly introduce the background and
service oriented architecture models of IoT and then discuss the
fundamental technologies that might be used in IoT. Next, we
introduce some key industrial applications of IoT. Afterwards,
we analyzed the research challenges and future trends
associated with IoT. Different from other IoT survey papers, a
main contribution of this review paper is that it focuses on
industrial IoT applications and highlights the challenges and
possible research opportunities for future industrial researchers.
REFERENCES
[1] K. Ashton, “Internet of Things,” RFID Journal, June 22 2009.
9. 1551-3203 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TII.2014.2300753, IEEE Transactions on Industrial Informatics
9
[2] R. van Kranenburg, The Internet of Things: A Critique of Ambient
Technology and the All-Seeing Network of RFID. Institute of Network
Cultures, 2008.
[3] R. van Kranenburg, E. Anzelmo, A. Bassi, D. Caprio, S. Dodson, and M.
Ratto, “The Internet of things,” in Proceedings of 1st Berlin Symposium on
Internet and Society, pp. 25-27, 2011.
[4] Y. Li, M. Hou, H. Liu, Y. Liu,”Towards a theoretical framework of strategic
decision, supporting capability and information sharing under the context of
IoT,” Information Technology and Management, vol.13, no.4, pp.205-216,
2012.
[5] L. Tan, and N. Wang, “Future internet: The Internet of Things,” in
Proceedings of the 3rd
International Conference on Advanced Computer
Theory and Engineering (ICACTE), August 20-22, 2010, pp.V5-376-380.
[6] X. Jia, O. Feng, T. Fan, and Q. Lei, “RFID technology and its applications
in Internet of Things (IoT),” in Proceedings of the 2nd IEEE International
Conference on Consumer Electronics, Communications and Networks
(CECNet), April 21-23, 2012, pp.1282-1285.
[7] C. Sun, “Application of RFID technology for logistics on Internet of
Things,” AASRI Procedia, vol.1, pp.106-111, 2012.
[8] E. W. T. Ngai, K. K. Moon, F. J. Riggins, and C. Y. Yi, “RFID research: an
academic literature review (1995–2005) and future research directions,”
International Journal of Production Economics, vol.112, no.2, pp.510-520,
2008.
[9]S. Li, L. Xu, and X. Wang, “Compressed sensing signal and data acquisition
in wireless sensor networks and Internet of Things,” IEEE Transactions on
Industrial Informatics, vol.9, no.4, pp. 2177-2186, 2013.
[10] W. He, and L. Xu, “Integration of distributed enterprise applications: a
survey,” IEEE Transactions on Industrial Informatics, vol.10, no. 1, pp.35-42,
2014.
[11] D. Uckelmann, M. Harrison, and F. Michahelles, “An architectural
approach towards the future internet of things”, in Architecting the Internet of
Things, pp. 1-24, Springer, 2011.
[12] S. Li, L. Xu, X. Wang, J. Wang, “Integration of hybrid wireless networks
in cloud services oriented enterprise information systems,” Enterprise
Information Systems, vol.6, no.2, pp.165-187, 2012.
[13] Li. Wang, L. Xu, Z. Bi, Y. Xu,”Data Filtering for RFID and WSN
Integration,” IEEE Transactions on Industrial Informatics, vol.10, no.1, pp.
408-418, 2014.
[14] L. Ren, L. Zhang, F. Tao, X. Zhang, Y. Luo, Y. Zhang, “A methodology
towards virtualization-based high performance simulation platform supporting
multidisciplinary design of complex products,” Enterprise Information
Systems, vol.6, no.3, pp.267-290, 2012.
[15] F. Tao, Y. Laili, L. Xu, L. Zhang, “FC-PACO-RM: a parallel method for
service composition optimal-selection in cloud manufacturing system,” IEEE
Transactions on Industrial Informatics, vol.9, no.4, pp.2023-2033, 2013.
[16] Q. Li, Z. Wang, W. Li, J. Li, C. Wang, R. Du, “Applications integration in
a hybrid cloud computing environment: modelling and platform,” Enterprise
Information Systems, vol.7, no.3, pp.237-271, 2013.
[17] D. Bandyopadhyay, and J. Sen, “Internet of things: applications and
challenges in technology and standardization,” Wireless Personal
Communications, vol.58, no.1, pp.49-69, 2011.
[18] ITU NGN-GSI Rapporteur Group, “Requirements for support of USN
applications and services in NGN environment,” Geneva: International
Telecommunication Union (ITU), 2010.
[19] L. Atzori, A. Iera, and G. Morabito, “The Internet of things: a survey,”
Computer Networks, vol.54, no.15, pp.2787-2805, 2010.
[20] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of
things: vision, applications and research challenges,” Ad Hoc Networks, vol.10,
no.7, pp.1497-1516, 2012.
[21] O. Vermesan, P. Friess, P. Guillemin, “Internet of things strategic research
roadmap,” The Cluster of European Research Projects, 2009, available from
http://www.internet-of-things-research.eu/pdf/IoT
Cluster Strategic Research Agenda 2009.pdf
[22] H. Sundmaeker, P. Guillemin, P. Friess, “Vision and challenges for
realizing the Internet of Things,” European Commission, 2010.
[23] K. Voigt, “China looks to lead the Internet of Things,” 2012. Available at
http://www.cnn.com/2012/11/28/business/china-internet-of-things/
[24] H. Zhang, and L. Zhu, “Internet of Things: key technology, architecture
and challenging problems,” in Proceedings of 2011 IEEE International
Conference on Computer Science and Automation Engineering (CSAE), June
10-12, 2011, pp. 507-512.
[25] S. Wang, L. Li, K. Wang, J. Jones, “e-business system integration: a
systems perspective,” Information Technology and Management, vol.13, no.4,
pp.233-249, 2012.
[26] F. Tao, H. Guo, L. Zhang, Y. Cheng,“Modelling of combinable
relationship-based composition service network and the theoretical proof of its
scale-free characteristics,” Enterprise Information Systems, vol.6, no.4,
pp.373-404, 2012.
[27] L. Xu, W. Viriyasitavat, P. Ruchikachorn, A. Martin, “Using propositional
logic for requirements verification of service workflow,” IEEE Transactions on
Industrial Informatics, vol.8, no. 3, pp.639-646, 2012.
[28] D. Paulraj, S. Swamynathan, M. Madhaiyan, “Process model-based
atomic service discovery and composition of composite semantic web services
using web ontology language for services,” Enterprise Information Systems,
vol.6, no.4, pp.445-471, 2012.
[29] H. Panetto, J. Cecil, “Information systems for enterprise integration,
interoperability and networking: theory and applications,” Enterprise
Information Systems, vol.7, no.1, pp.1-6, 2013.
[30] W. Viriyasitavat, L. Xu, A. Martin, “SWSpec, service workflow
requirements specification language: the formal requirements specification in
service workflow environments,” IEEE Transactions on Industrial
Informatics, vol.8, no.3, pp.631-638, 2012.
[31] S. Hachani, L. Gzara, H. Verjus, “A service-oriented approach for flexible
process support within enterprises: an application on PLM systems,”
Enterprise Information Systems, vol.7, no.1, pp.79-99, 2013.
[32] L. Xu, “Enterprise Systems: state-of-the-art and future trends,” IEEE
Transactions on Industrial Informatics, vol.7, no.4, pp. 630-640, 2011.
[33] M. C. Domingo, “An overview of the Internet of Things for people with
disabilities,” Journal of Network and Computer Applications, vol.35, no.2,
pp.584-596, 2012.
[34] C. H. Liu, B. Yang, and T. Liu, “Efficient naming, addressing and profile
services in Internet-of-Things sensory environments,” Ad Hoc Networks, in
press, 2013.
[35] Y. Wu, Q. Z. Sheng, and S. Zeadally, “RFID: opportunities and
challenges,” in Next-Generation Wireless Technologies, edited by N.
Chilamkurti, pp. 105-129, Springer, 2013.
[36] E. Ilie-Zudor, Z. Kemeny, F. van Blommestein, L. Monostori, and A. van
der Meulen, “A survey of applications and requirements of unique
identification systems and RFID techniques,” Computers in Industry,
vol.62, no.3, pp.227-252, 2011.
[37]C. Han, J. M. Jornet, E. Fadel, and I. F. Akyildiz, “A cross-layer
communication module for the Internet of Things,” Computer Networks,
vol.57, no.3, pp. 622–633, 2013.
[38] D. Guinard, V. Trifa, S. Karnouskos, P. Spiess, and D. Savio, “Interacting
with the soa-based internet of things: discovery, query, selection, and
on-demand provisioning of web services,” IEEE Transactions on Services
Computing, vol.3, no.3, pp.223-235, 2010.
[39] K. Gama, L. Touseau, and D. Donsez, “Combining heterogeneous service
technologies for building an Internet of Things middleware,” Computer
Communications, vol.35, no.4, pp.405-417, 2012.
[40] D. Romero, G. Hermosillo, A. Taherkordi, R. Nzekwa, R. Rouvoy, and F.
Eliassen, “RESTful integration of heterogeneous devices in pervasive
environments,” LNCS 6115, pp.1-4, Springer, 2010.
[41] H. Zhou, The Internet of Things in the Cloud: A Middleware Perspective.
CRC Press, 2012.
[42] L. Atzori, A. Iera, G. Morabito, and M. Nitti, “The social Internet of
Things (SIoT)-when social networks meet the Internet of Things: concept,
architecture and network characterization,” Computer Networks, vol.56, no.16,
pp. 3594-3608, 2012.
[43] M. K. Lim, W. Bahr, and S. Leung, “RFID in the warehouse: a literature
analysis (1995–2010) of its applications, benefits, challenges and future
trends,” International Journal of Production Economics, vol.145, no.1,
pp.409-430, 2013.
[44] Q. Zhu, R. Wang, Q. Chen, Y. Liu, and W. Qin, “IoT gateway: bridging
wireless sensor networks into internet of things,” in Proceedings of IEEE/IFIP
8th International Conference on Embedded and Ubiquitous Computing
(EUC), Dec 11-13, 2010, pp.347-352.
[45] Y. Liu, and G. Zhou, “Key technologies and applications of internet of
things,” in Proceedings of 2012 Fifth International Conference on Intelligent
Computation Technology and Automation (ICICTA), Jan 12-14, 2012,
pp.187-200.
10. 1551-3203 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TII.2014.2300753, IEEE Transactions on Industrial Informatics
10
[46] H. Cervantes, and R. S. Hall, “Automating service dependency
management in a service-oriented component model,” in Proceedings of the 6th
Workshop on Component-Based Software Engineering, May 2003, pp.1-5.
[47] J. I. Vazquez, A. Almeida, I. Doamo, X. Laiseca, and P. Orduña, “Flexeo:
an architecture for integrating Wireless Sensor Networks into the Internet of
Things,” in Proceedings of 3rd Symposium of Ubiquitous Computing and
Ambient Intelligence 2008, pp. 219-228), 2009.
[48] C. Flügel, and V. Gehrmann, “Scientific workshop 4: intelligent objects
for the Internet of Things: Internet of Things-application of sensor networks in
logistics,” Communications in Computer and Information Science, vol.32,
pp.16-26, 2009.
[49] Z. Pang, Q. Chen, J. Tian, L. Zheng, and E. Dubrova, "Ecosystem analysis
in the design of open platform-based in-home healthcare terminals towards the
internet-of-things," in Proceedings of 2013 15th International Conference on
Advanced Communication Technology (ICACT), Jan 27-30, 2013,
pp.529-534.
[50] H. Alemdar, and C. Ersoy, “Wireless sensor networks for healthcare: a
survey,” Computer Networks, vol.54, no.15, pp.2688-2710, 2010.
[51] I. Plaza, L. MartíN, S. Martin, and C. Medrano, “Mobile applications in an
aging society: status and trends,” Journal of Systems and Software, vol.84,
no.11, pp.1977-1988, 2011.
[52] Z. Pang, Q. Chen, W. Han, and L. Zheng, L., “Value-centric design of the
internet-of-things solution for food supply chain: value creation, sensor
portfolio and information fusion,” Information Systems Frontiers, in press,
2014.
[53] Q. Wei, S. Zhu, C. Du, “Study on key technologies of Internet of Things
perceiving mine,” Procedia Engineering, vol.26, pp.2326-2333, 2011.
[54] B. Karakostas, “A DNS architecture for the Internet of Things: a case study
in transport logistics,” Procedia Computer Science, vol.19, pp.594-601, 2013.
[55] H. Zhou, B. Liu, and D. Wang, “Design and research of urban intelligent
transportation system based on the Internet of Things,” Communications of
Computer and Information Science, vol.312, pp.572-580, 2012.
[56] E. Qin, Y. Long, C. Zhang, and L. Huang, “Cloud computing and the
Internet of Things: technology innovation in automobile service,” LNCS 8017,
pp.173-180, 2013.
[57] Y. Zhang, B. Chen, and X. Lu, “Intelligent monitoring system on
refrigerator trucks based on the Internet of Things,” Wireless Communications
and Applications, vol.72, pp.201-206, 2012.
[58] C. G. Keller, T. Dang, H. Fritz, A. Joos, C. Rabe and D. M. Gavrila,
“Active pedestrian safety by automatic braking and evasive steering,” IEEE
Transactions on Intelligent Transportation System, vol. 12, no.4, pp. 1292
-1304, 2011.
[59] Y.C. Zhang, and J. Yu, “A study on the fire IOT development strategy,”
Procedia Engineering, vol.52, pp.314-319, 2013.
[60] Z. Ji, and A. Qi, “The application of internet of things (IOT) in emergency
management system in China,” in Proceedings of 2010 IEEE International
Conference on Technologies for Homeland Security (HST), pp. 139-142,
2010.
[61] S. Wang, Z. Zhang, Z. Ye, X. Wang, X. Lin, and S. Chen, “Application of
environmental Internet of Things on water quality management of urban scenic
river,” International Journal of Sustainable Development & World Ecology,
vol.20, no.3, pp.216-222, 2013.
[62] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Context
aware computing for the Internet of Things: a survey,” IEEE Communications
Surveys & Tutorials, submitted 2013.
[63] F. Wang, B. Ge, L. Zhang, Y. Chen, Y. Xin, X. Li, “A system framework
of security management in enterprise systems,” Systems Research and
Behavioral Science, vol.30, no.3, pp. 287-299, 2013.
[64] J. Li, J. Yang, Y. Zhao, B. Liu, “A top-down approach for approximate
data anonymisation,” Enterprise Information Systems, vol.7, no.3, pp.272-302,
2013.
[65] Y. Xing, L. Li, Z. Bi, M. Wilamowska-Korsak, L. Zhang, “Operations
research (OR) in service industries: a comprehensive review,” Systems
Research and Behavioral Science, vol.30, no.3, pp.300-353, 2013.
[66] J. Wan, J. Jones, “Managing IT service management implementation
complexity from the perspective of the Warfield version of systems science,”
Enterprise Information Systems, vol.7, no.4, pp.490-522, 2013.
[67]R. Roman, P. Najera, and J. Lopez, “Securing the Internet of Things,”
Computer, vol.44, no.9, pp.51-58, 2011.
[68] L. Li, “Technology designed to combat fakes in the global supply chain,”
Business Horizons, vol.56, no.2, pp. 167-177, 2013.
[69] S.L. Ting, W.H. Ip, “Combating the counterfeits with web portal
technology,” Enterprise Information Systems, in press, DOI:
10.1080/17517575.2012.755713
[70]J. Clarke, R. Castro, A. Sharma, J. Lopez, and N. Suri, “Trust & security
RTD in the internet of things: opportunities for international cooperation,” in
Proceedings of the First International Conference on Security of Internet of
Things, pp. 172-178). ACM, 2012.
[71] L. Xu, “Introduction: systems science in industrial sectors,” Systems
Research and Behavioral Science, vol.30, no.3, pp.211-213, 2013.
[72] F. Li, C. Jin, Y. Jing, M. Wilamowska-Korsak, Z. Bi, “A rough
programming model based on the greatest compatible classes and synthesis
effect,” Systems Research and Behavioral Science, vol.30, no.3, pp.229-243,
2013.
[73] Y. Lin, X. Duan, C. Zhao, L. Xu, Systems Science Methodological
Approaches. CRC Press, 2013.
[74] L. Atzori, D. Carboni, and A. Iera, “Smart things in the social loop:
paradigms, technologies, and potentials,” Ad Hoc Networks, in press, 2013.
[75] L. Xu, “Information architecture for supply chain quality management,”
International Journal of Production Research, vol.49, no. 1, pp.183-198,
2011.
[76] J. Z. Sun, “Towards the Web of Things: open research issues and the
BAS-AMI use case,” Lecture Notes in Electrical Engineering, vol.144, pp.1-8,
2012.
[77] D. Guinard, V. Trifa, F. Mattern, and E. Wilde, “From the internet of
things to the web of things: resource-oriented architecture and best practices,”
in Architecting the Internet of Things, pp. 97-129, Springer, 2011.
[78] F. Xia, “Wireless sensor technologies and applications,” Sensors, vol.9,
no.11, pp.8824-8830, 2009.
[79] E. Yaacoub, A. Kadri, and A. Abu-Dayya, “Cooperative wireless sensor
networks for green internet of things,” in Proceedings of the 8h ACM
Symposium on QoS and Security for Wireless and Mobile Networks, pp. 79-80,
ACM, 2012.
[80] A. Arsénio, H. Serra, R. Francisco, F. Nabais, J. Andrade, and E. Serrano,
“Internet of Intelligent Things: bringing artificial intelligence into things and
communication networks,” Studies in Computational Intelligence, vol.495,
pp.1-37, 2014.
[81] J. O. Kephart, and D. M. Chess, “The vision of autonomic computing,”
IEEE Computer, vol.36, no.1, pp.41–50, 2003.
[82] G. Kortuem, F. Kawsar, D. Fitton, and V. Sundramoorthy, “Smart objects
as building blocks for the internet of things,” IEEE Internet Computing, vol.14,
no.1, pp.44-51, 2010.
[83]Y. Ding, Y. Jin, L. Ren, and K. Hao, “An intelligent self-organization
scheme for the Internet of Things,” IEEE Computational Intelligence
Magazine, vol.8, no.3, pp.41-53, 2013.
[84] B. P. Rao, P. Saluia, N. Sharma, A. Mittal, and S. V. Sharma, “Cloud
computing for Internet of Things & sensing based applications,” in
Proceedings of 2012 Sixth International Conference on Sensing Technology
(ICST), Dec 18-21, 2012, pp. 374-380.
[85] S. Fang, L. Xu, H. Pei, and Y. Liu, “An integrated approach to snowmelt
flood forecasting in water resource management,” IEEE Transactions on
Industrial Informatics, vol.10, no.1, pp.548-558, 2014.
[86] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things
(IoT): A vision, architectural elements, and future directions,” Future
Generation Computer Systems, vol.29, no.7, pp. 1645–1660, 2013.
Li Da Xu (M’86-SM’11) received the M.S. degree in
information science and engineering from the University of
Science and Technology of China, Hefei, China, in 1981,
and the Ph.D. degree in systems science and engineering
from Portland State University, Portland, OR, USA, in
1986. Dr. Xu serves as the Founding Chair of IFIP TC8
WG8.9 and the Founding Chair of the IEEE SMC Society
Technical Committee on Enterprise Information Systems.
Wu He received the B.S. degree in Computer Science from
DongHua University, China, in 1998, and the Ph.D. degree
in Information Science from the University of Missouri,
USA, in 2006. His research interests include Enterprise
Applications, Data Mining, Cyber Security and Knowledge
Management.
11. 1551-3203 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TII.2014.2300753, IEEE Transactions on Industrial Informatics
11
Shancang Li (M’08) received the B.Eng. and M.Sc.
degrees in mechanical engineering and the Ph.D. degree in
computer science from Xi’an Jiaotong University, Suzhou,
China, in 2001, 2004, and 2008, respectively. He joined
the College of Engineering, Swansea University, Swansea,
U.K., in December 2008, as a Research Fellow. His current
research interests include wireless mesh and sensor
networks, internet of things, signal processing, an
applications of wireless technologies.
ACKNOWLEDGMENT
This work was supported in part by the National Natural Science Foundation of
China (NNSFC) under Grant 71132008, and U.S. National Science Foundation
under Grant SES-1318470 and 1044845