This document discusses the definition, characteristics, architecture, enabling technologies, applications and future challenges of the Internet of Things (IoT). It provides definitions of IoT, describing it as a network that connects physical objects through sensors and allows them to communicate and share data. It outlines the key enabling technologies that make IoT applications possible, such as wireless technologies, microcontrollers, cloud computing and wireless sensor networks. It also discusses some common applications of IoT and future challenges in areas like scalability, interoperability and security.
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
The world of smart devices talking to each other—and to us—is well
underway and here to stay. To connect to the Internet of Things
opportunity, it’s key to design and build networking infrastructures that can handle massive amounts of new data.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
This report is prepared for the major project submission for EC Engineering, This project deals with the development of Home Monitoring System using Internet of Things.
This is first detailed report submitted ever with whole content over Internet of Things based Home Automation system. Help of many journals have been taken and those references have been acknowledged at the end of the report file.
IoT: Ongoing challenges and opportunities in Mobile TechnologyAI Publications
Mobile technology opens the door for a new kind of learning called here and now learning that occurs when learners have access to information anytime and anywhere to perform authentic activities in the context of their learning. Mobile devices, applications and services have become integrated into people's daily lives on a personal and professional level. The purpose of this study was to investigate challenges &opportunities of IoT in mobile technology. The paper is divided in 5 sections and the content of the paper covers the history, elements, challenges and opportunities salong with future of IoT specific to Indian Mobile arena.
111
Blockchain-Outside of
Currencies
Digital currencies were the first ever application of blockchain technology, arguably
without realizing its true potential. With the invention of bitcoin the concept of blockchain
was introduced for the very first time, but it wasn't until 2013, with the advent of Blockchain
2.0 that the real benefits of blockchain were realized with its possible application in many
different industries. Since then a number of use cases of blockchain technology in different
industries, have been proposed including but not limited to finance, the Internet of Things,
digital rights management, government, and law. In this chapter, four main industries
namely the Internet of Things (IoT), government, health, and finance, have been selected
for discussion. Readers will be introduced to all these fields and various related use cases
will be presented.
Internet of Things
The Internet of Things or IoT for short has recently gained much traction due to its potential
for transforming business applications and everyday life. IoT can be defined as a network of
computationally intelligent physical objects that are capable of connecting to the Internet,
sensing real-world events or environments, reacting to those events, collecting relevant
data, and communicating it over the Internet. This simple definition has huge implications
and has led to exciting concepts, such as wearable's, smart homes, smart grids, smart
connected cars, and smart cities, that are all based on this basic concept of an IoT device.
After dissecting the definition of IoT above, there are four functions that come to light as
being performed by an IoT device. These include sensing, reacting, collecting, and
communicating. All these functions are performed by using various components on the IoT
device.
C
o
p
y
r
i
g
h
t
2
0
1
7
.
P
a
c
k
t
P
u
b
l
i
s
h
i
n
g
.
A
l
l
r
i
g
h
t
s
r
e
s
e
r
v
e
d
.
M
a
y
n
o
t
b
e
r
e
p
r
o
d
u
c
e
d
i
n
a
n
y
f
o
r
m
w
i
t
h
o
u
t
p
e
r
m
i
s
s
i
o
n
f
r
o
m
t
h
e
p
u
b
l
i
s
h
e
r
,
e
x
c
e
p
t
f
a
i
r
u
s
e
s
p
e
r
m
i
t
t
e
d
u
n
d
e
r
U
.
S
.
o
r
a
p
p
l
i
c
a
b
l
e
c
o
p
y
r
i
g
h
t
l
a
w
.
EBSCO Publishing : eBook Academic Collection (EBSCOhost) - printed on 1/26/2020 12:56 PM via UNIVERSITY OF THE CUMBERLANDS
AN: 1488410 ; Bashir, Imran.; Mastering Blockchain
Account: s8501869.main.eds_new
Blockchain-Outside of Currencies
[ 413 ]
Sensing is performed by sensors. Reacting or controlling is performed by actuators,
collection is a function of various sensors, and communication is performed by chips that
provide network connectivity. One thing to note is that all these components are accessible
and controllable via the Internet in the IoT. An IoT device on its own is perhaps useful to
some extent but if it is part of a larger IoT ecosystem it is more valuable.
A typical IoT can consist of many physical objects connecting with each other and to a
centralized cloud ser.
111
Blockchain-Outside of
Currencies
Digital currencies were the first ever application of blockchain technology, arguably
without realizing its true potential. With the invention of bitcoin the concept of blockchain
was introduced for the very first time, but it wasn't until 2013, with the advent of Blockchain
2.0 that the real benefits of blockchain were realized with its possible application in many
different industries. Since then a number of use cases of blockchain technology in different
industries, have been proposed including but not limited to finance, the Internet of Things,
digital rights management, government, and law. In this chapter, four main industries
namely the Internet of Things (IoT), government, health, and finance, have been selected
for discussion. Readers will be introduced to all these fields and various related use cases
will be presented.
Internet of Things
The Internet of Things or IoT for short has recently gained much traction due to its potential
for transforming business applications and everyday life. IoT can be defined as a network of
computationally intelligent physical objects that are capable of connecting to the Internet,
sensing real-world events or environments, reacting to those events, collecting relevant
data, and communicating it over the Internet. This simple definition has huge implications
and has led to exciting concepts, such as wearable's, smart homes, smart grids, smart
connected cars, and smart cities, that are all based on this basic concept of an IoT device.
After dissecting the definition of IoT above, there are four functions that come to light as
being performed by an IoT device. These include sensing, reacting, collecting, and
communicating. All these functions are performed by using various components on the IoT
device.
C
o
p
y
r
i
g
h
t
2
0
1
7
.
P
a
c
k
t
P
u
b
l
i
s
h
i
n
g
.
A
l
l
r
i
g
h
t
s
r
e
s
e
r
v
e
d
.
M
a
y
n
o
t
b
e
r
e
p
r
o
d
u
c
e
d
i
n
a
n
y
f
o
r
m
w
i
t
h
o
u
t
p
e
r
m
i
s
s
i
o
n
f
r
o
m
t
h
e
p
u
b
l
i
s
h
e
r
,
e
x
c
e
p
t
f
a
i
r
u
s
e
s
p
e
r
m
i
t
t
e
d
u
n
d
e
r
U
.
S
.
o
r
a
p
p
l
i
c
a
b
l
e
c
o
p
y
r
i
g
h
t
l
a
w
.
EBSCO Publishing : eBook Academic Collection (EBSCOhost) - printed on 1/26/2020 12:56 PM via UNIVERSITY OF THE CUMBERLANDS
AN: 1488410 ; Bashir, Imran.; Mastering Blockchain
Account: s8501869.main.eds_new
Blockchain-Outside of Currencies
[ 413 ]
Sensing is performed by sensors. Reacting or controlling is performed by actuators,
collection is a function of various sensors, and communication is performed by chips that
provide network connectivity. One thing to note is that all these components are accessible
and controllable via the Internet in the IoT. An IoT device on its own is perhaps useful to
some extent but if it is part of a larger IoT ecosystem it is more valuable.
A typical IoT can consist of many physical objects connecting with each other and to a
centralized cloud ser.
111
Blockchain-Outside of
Currencies
Digital currencies were the first ever application of blockchain technology, arguably
without realizing its true potential. With the invention of bitcoin the concept of blockchain
was introduced for the very first time, but it wasn't until 2013, with the advent of Blockchain
2.0 that the real benefits of blockchain were realized with its possible application in many
different industries. Since then a number of use cases of blockchain technology in different
industries, have been proposed including but not limited to finance, the Internet of Things,
digital rights management, government, and law. In this chapter, four main industries
namely the Internet of Things (IoT), government, health, and finance, have been selected
for discussion. Readers will be introduced to all these fields and various related use cases
will be presented.
Internet of Things
The Internet of Things or IoT for short has recently gained much traction due to its potential
for transforming business applications and everyday life. IoT can be defined as a network of
computationally intelligent physical objects that are capable of connecting to the Internet,
sensing real-world events or environments, reacting to those events, collecting relevant
data, and communicating it over the Internet. This simple definition has huge implications
and has led to exciting concepts, such as wearable's, smart homes, smart grids, smart
connected cars, and smart cities, that are all based on this basic concept of an IoT device.
After dissecting the definition of IoT above, there are four functions that come to light as
being performed by an IoT device. These include sensing, reacting, collecting, and
communicating. All these functions are performed by using various components on the IoT
device.
C
o
p
y
r
i
g
h
t
2
0
1
7
.
P
a
c
k
t
P
u
b
l
i
s
h
i
n
g
.
A
l
l
r
i
g
h
t
s
r
e
s
e
r
v
e
d
.
M
a
y
n
o
t
b
e
r
e
p
r
o
d
u
c
e
d
i
n
a
n
y
f
o
r
m
w
i
t
h
o
u
t
p
e
r
m
i
s
s
i
o
n
f
r
o
m
t
h
e
p
u
b
l
i
s
h
e
r
,
e
x
c
e
p
t
f
a
i
r
u
s
e
s
p
e
r
m
i
t
t
e
d
u
n
d
e
r
U
.
S
.
o
r
a
p
p
l
i
c
a
b
l
e
c
o
p
y
r
i
g
h
t
l
a
w
.
EBSCO Publishing : eBook Academic Collection (EBSCOhost) - printed on 1/26/2020 12:56 PM via UNIVERSITY OF THE CUMBERLANDS
AN: 1488410 ; Bashir, Imran.; Mastering Blockchain
Account: s8501869.main.eds_new
Blockchain-Outside of Currencies
[ 413 ]
Sensing is performed by sensors. Reacting or controlling is performed by actuators,
collection is a function of various sensors, and communication is performed by chips that
provide network connectivity. One thing to note is that all these components are accessible
and controllable via the Internet in the IoT. An IoT device on its own is perhaps useful to
some extent but if it is part of a larger IoT ecosystem it is more valuable.
A typical IoT can consist of many physical objects connecting with each other and to a
centralized cloud ser ...
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
The world of smart devices talking to each other—and to us—is well
underway and here to stay. To connect to the Internet of Things
opportunity, it’s key to design and build networking infrastructures that can handle massive amounts of new data.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
This report is prepared for the major project submission for EC Engineering, This project deals with the development of Home Monitoring System using Internet of Things.
This is first detailed report submitted ever with whole content over Internet of Things based Home Automation system. Help of many journals have been taken and those references have been acknowledged at the end of the report file.
IoT: Ongoing challenges and opportunities in Mobile TechnologyAI Publications
Mobile technology opens the door for a new kind of learning called here and now learning that occurs when learners have access to information anytime and anywhere to perform authentic activities in the context of their learning. Mobile devices, applications and services have become integrated into people's daily lives on a personal and professional level. The purpose of this study was to investigate challenges &opportunities of IoT in mobile technology. The paper is divided in 5 sections and the content of the paper covers the history, elements, challenges and opportunities salong with future of IoT specific to Indian Mobile arena.
111
Blockchain-Outside of
Currencies
Digital currencies were the first ever application of blockchain technology, arguably
without realizing its true potential. With the invention of bitcoin the concept of blockchain
was introduced for the very first time, but it wasn't until 2013, with the advent of Blockchain
2.0 that the real benefits of blockchain were realized with its possible application in many
different industries. Since then a number of use cases of blockchain technology in different
industries, have been proposed including but not limited to finance, the Internet of Things,
digital rights management, government, and law. In this chapter, four main industries
namely the Internet of Things (IoT), government, health, and finance, have been selected
for discussion. Readers will be introduced to all these fields and various related use cases
will be presented.
Internet of Things
The Internet of Things or IoT for short has recently gained much traction due to its potential
for transforming business applications and everyday life. IoT can be defined as a network of
computationally intelligent physical objects that are capable of connecting to the Internet,
sensing real-world events or environments, reacting to those events, collecting relevant
data, and communicating it over the Internet. This simple definition has huge implications
and has led to exciting concepts, such as wearable's, smart homes, smart grids, smart
connected cars, and smart cities, that are all based on this basic concept of an IoT device.
After dissecting the definition of IoT above, there are four functions that come to light as
being performed by an IoT device. These include sensing, reacting, collecting, and
communicating. All these functions are performed by using various components on the IoT
device.
C
o
p
y
r
i
g
h
t
2
0
1
7
.
P
a
c
k
t
P
u
b
l
i
s
h
i
n
g
.
A
l
l
r
i
g
h
t
s
r
e
s
e
r
v
e
d
.
M
a
y
n
o
t
b
e
r
e
p
r
o
d
u
c
e
d
i
n
a
n
y
f
o
r
m
w
i
t
h
o
u
t
p
e
r
m
i
s
s
i
o
n
f
r
o
m
t
h
e
p
u
b
l
i
s
h
e
r
,
e
x
c
e
p
t
f
a
i
r
u
s
e
s
p
e
r
m
i
t
t
e
d
u
n
d
e
r
U
.
S
.
o
r
a
p
p
l
i
c
a
b
l
e
c
o
p
y
r
i
g
h
t
l
a
w
.
EBSCO Publishing : eBook Academic Collection (EBSCOhost) - printed on 1/26/2020 12:56 PM via UNIVERSITY OF THE CUMBERLANDS
AN: 1488410 ; Bashir, Imran.; Mastering Blockchain
Account: s8501869.main.eds_new
Blockchain-Outside of Currencies
[ 413 ]
Sensing is performed by sensors. Reacting or controlling is performed by actuators,
collection is a function of various sensors, and communication is performed by chips that
provide network connectivity. One thing to note is that all these components are accessible
and controllable via the Internet in the IoT. An IoT device on its own is perhaps useful to
some extent but if it is part of a larger IoT ecosystem it is more valuable.
A typical IoT can consist of many physical objects connecting with each other and to a
centralized cloud ser.
111
Blockchain-Outside of
Currencies
Digital currencies were the first ever application of blockchain technology, arguably
without realizing its true potential. With the invention of bitcoin the concept of blockchain
was introduced for the very first time, but it wasn't until 2013, with the advent of Blockchain
2.0 that the real benefits of blockchain were realized with its possible application in many
different industries. Since then a number of use cases of blockchain technology in different
industries, have been proposed including but not limited to finance, the Internet of Things,
digital rights management, government, and law. In this chapter, four main industries
namely the Internet of Things (IoT), government, health, and finance, have been selected
for discussion. Readers will be introduced to all these fields and various related use cases
will be presented.
Internet of Things
The Internet of Things or IoT for short has recently gained much traction due to its potential
for transforming business applications and everyday life. IoT can be defined as a network of
computationally intelligent physical objects that are capable of connecting to the Internet,
sensing real-world events or environments, reacting to those events, collecting relevant
data, and communicating it over the Internet. This simple definition has huge implications
and has led to exciting concepts, such as wearable's, smart homes, smart grids, smart
connected cars, and smart cities, that are all based on this basic concept of an IoT device.
After dissecting the definition of IoT above, there are four functions that come to light as
being performed by an IoT device. These include sensing, reacting, collecting, and
communicating. All these functions are performed by using various components on the IoT
device.
C
o
p
y
r
i
g
h
t
2
0
1
7
.
P
a
c
k
t
P
u
b
l
i
s
h
i
n
g
.
A
l
l
r
i
g
h
t
s
r
e
s
e
r
v
e
d
.
M
a
y
n
o
t
b
e
r
e
p
r
o
d
u
c
e
d
i
n
a
n
y
f
o
r
m
w
i
t
h
o
u
t
p
e
r
m
i
s
s
i
o
n
f
r
o
m
t
h
e
p
u
b
l
i
s
h
e
r
,
e
x
c
e
p
t
f
a
i
r
u
s
e
s
p
e
r
m
i
t
t
e
d
u
n
d
e
r
U
.
S
.
o
r
a
p
p
l
i
c
a
b
l
e
c
o
p
y
r
i
g
h
t
l
a
w
.
EBSCO Publishing : eBook Academic Collection (EBSCOhost) - printed on 1/26/2020 12:56 PM via UNIVERSITY OF THE CUMBERLANDS
AN: 1488410 ; Bashir, Imran.; Mastering Blockchain
Account: s8501869.main.eds_new
Blockchain-Outside of Currencies
[ 413 ]
Sensing is performed by sensors. Reacting or controlling is performed by actuators,
collection is a function of various sensors, and communication is performed by chips that
provide network connectivity. One thing to note is that all these components are accessible
and controllable via the Internet in the IoT. An IoT device on its own is perhaps useful to
some extent but if it is part of a larger IoT ecosystem it is more valuable.
A typical IoT can consist of many physical objects connecting with each other and to a
centralized cloud ser.
111
Blockchain-Outside of
Currencies
Digital currencies were the first ever application of blockchain technology, arguably
without realizing its true potential. With the invention of bitcoin the concept of blockchain
was introduced for the very first time, but it wasn't until 2013, with the advent of Blockchain
2.0 that the real benefits of blockchain were realized with its possible application in many
different industries. Since then a number of use cases of blockchain technology in different
industries, have been proposed including but not limited to finance, the Internet of Things,
digital rights management, government, and law. In this chapter, four main industries
namely the Internet of Things (IoT), government, health, and finance, have been selected
for discussion. Readers will be introduced to all these fields and various related use cases
will be presented.
Internet of Things
The Internet of Things or IoT for short has recently gained much traction due to its potential
for transforming business applications and everyday life. IoT can be defined as a network of
computationally intelligent physical objects that are capable of connecting to the Internet,
sensing real-world events or environments, reacting to those events, collecting relevant
data, and communicating it over the Internet. This simple definition has huge implications
and has led to exciting concepts, such as wearable's, smart homes, smart grids, smart
connected cars, and smart cities, that are all based on this basic concept of an IoT device.
After dissecting the definition of IoT above, there are four functions that come to light as
being performed by an IoT device. These include sensing, reacting, collecting, and
communicating. All these functions are performed by using various components on the IoT
device.
C
o
p
y
r
i
g
h
t
2
0
1
7
.
P
a
c
k
t
P
u
b
l
i
s
h
i
n
g
.
A
l
l
r
i
g
h
t
s
r
e
s
e
r
v
e
d
.
M
a
y
n
o
t
b
e
r
e
p
r
o
d
u
c
e
d
i
n
a
n
y
f
o
r
m
w
i
t
h
o
u
t
p
e
r
m
i
s
s
i
o
n
f
r
o
m
t
h
e
p
u
b
l
i
s
h
e
r
,
e
x
c
e
p
t
f
a
i
r
u
s
e
s
p
e
r
m
i
t
t
e
d
u
n
d
e
r
U
.
S
.
o
r
a
p
p
l
i
c
a
b
l
e
c
o
p
y
r
i
g
h
t
l
a
w
.
EBSCO Publishing : eBook Academic Collection (EBSCOhost) - printed on 1/26/2020 12:56 PM via UNIVERSITY OF THE CUMBERLANDS
AN: 1488410 ; Bashir, Imran.; Mastering Blockchain
Account: s8501869.main.eds_new
Blockchain-Outside of Currencies
[ 413 ]
Sensing is performed by sensors. Reacting or controlling is performed by actuators,
collection is a function of various sensors, and communication is performed by chips that
provide network connectivity. One thing to note is that all these components are accessible
and controllable via the Internet in the IoT. An IoT device on its own is perhaps useful to
some extent but if it is part of a larger IoT ecosystem it is more valuable.
A typical IoT can consist of many physical objects connecting with each other and to a
centralized cloud ser ...
111
Blockchain-Outside of
Currencies
Digital currencies were the first ever application of blockchain technology, arguably
without realizing its true potential. With the invention of bitcoin the concept of blockchain
was introduced for the very first time, but it wasn't until 2013, with the advent of Blockchain
2.0 that the real benefits of blockchain were realized with its possible application in many
different industries. Since then a number of use cases of blockchain technology in different
industries, have been proposed including but not limited to finance, the Internet of Things,
digital rights management, government, and law. In this chapter, four main industries
namely the Internet of Things (IoT), government, health, and finance, have been selected
for discussion. Readers will be introduced to all these fields and various related use cases
will be presented.
Internet of Things
The Internet of Things or IoT for short has recently gained much traction due to its potential
for transforming business applications and everyday life. IoT can be defined as a network of
computationally intelligent physical objects that are capable of connecting to the Internet,
sensing real-world events or environments, reacting to those events, collecting relevant
data, and communicating it over the Internet. This simple definition has huge implications
and has led to exciting concepts, such as wearable's, smart homes, smart grids, smart
connected cars, and smart cities, that are all based on this basic concept of an IoT device.
After dissecting the definition of IoT above, there are four functions that come to light as
being performed by an IoT device. These include sensing, reacting, collecting, and
communicating. All these functions are performed by using various components on the IoT
device.
C
o
p
y
r
i
g
h
t
2
0
1
7
.
P
a
c
k
t
P
u
b
l
i
s
h
i
n
g
.
A
l
l
r
i
g
h
t
s
r
e
s
e
r
v
e
d
.
M
a
y
n
o
t
b
e
r
e
p
r
o
d
u
c
e
d
i
n
a
n
y
f
o
r
m
w
i
t
h
o
u
t
p
e
r
m
i
s
s
i
o
n
f
r
o
m
t
h
e
p
u
b
l
i
s
h
e
r
,
e
x
c
e
p
t
f
a
i
r
u
s
e
s
p
e
r
m
i
t
t
e
d
u
n
d
e
r
U
.
S
.
o
r
a
p
p
l
i
c
a
b
l
e
c
o
p
y
r
i
g
h
t
l
a
w
.
EBSCO Publishing : eBook Academic Collection (EBSCOhost) - printed on 1/26/2020 12:56 PM via UNIVERSITY OF THE CUMBERLANDS
AN: 1488410 ; Bashir, Imran.; Mastering Blockchain
Account: s8501869.main.eds_new
Blockchain-Outside of Currencies
[ 413 ]
Sensing is performed by sensors. Reacting or controlling is performed by actuators,
collection is a function of various sensors, and communication is performed by chips that
provide network connectivity. One thing to note is that all these components are accessible
and controllable via the Internet in the IoT. An IoT device on its own is perhaps useful to
some extent but if it is part of a larger IoT ecosystem it is more valuable.
A typical IoT can consist of many physical objects connecting with each other and to a
centralized cloud ser.
Understand about the fundamentals of Internet of Things and its building blocks along with their
characteristics.
Understand the recent application domains of IoT in everyday life.
Gain insights about the current trends of Associated IOT technologoes and IOT Anlaytics.
Understand about the fundamentals of Internet of Things and its building blocks along with their
characteristics.
Understand the recent application domains of IoT in everyday life.
Gain insights about the current trends of Associated IOT technologoes and IOT Anlaytics.
In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It
extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates
opportunities in numerous domains. However, this increase in connectivity creates many prominent
challenges. This paper provides a survey of some of the major issues challenging the widespread adoption
of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the
IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security, management, and privacy.
Internet of Things (IoT) plays a vital role in our
day to day life and normally used in our houses, in industry,
schools and in hospitals which implemented outside to manage
and control for taking report the changes in location prevent
from dangers and many more favorable things. Moreover all
other advantages can approach of big risks of privacy loss and
security issues. To protect the IoT devices, so many research
works have been measure to find those problems and locate a
best way to eradicate those risks or at least to reduce their effect
on the security and privacy requirement. Formation the concept
of device to device (D2D) communication technology, IoT plays
the information transfer from one end to another end as node of
interconnection. This paper examines the constraints and
security challenges posed by IoT connected devices and the
ability to connect, communicate with, and remotely manage an
incalculable number of networked, automated devices via the
Internet is becoming pervasive.
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...ijmnct
The Ubiquitous Power Internet of Things (UPIoT) is a deep integration of the interconnected power
network and communication network, enabling full perception of the system status and business operations
for power production, transmission, and consumption. To address the challenges of real-time perception,
rapid response, and privacy protection, UPIoT can benefit from the use of edge computing technology.
Edge computing is a new and innovative computing architecture that enables quick and efficient
processing of data close to the source, bypassing network latency and bandwidth issues. By shifting
computing power to the edge of the network, edge computing reduces the strain on cloud computing
centers and decreases input response time for users. However, access latency can still be a bottleneck,
which may overshadow the benefits of edge computing, particularly for data-intensive services. While edge
computing offers promising solutions for the IoT network, there are still some issues to address, such as
security, incomplete data, and investment and maintenance costs. In this paper, researcher conducts a
comprehensive survey of edge computing and how edge device placement can improve performance in IoT
networks. The paper includes a comparative use case of smart agriculture edge computing
implementations and discusses the various challenges faced in implementing edge computing in the UPIoT
context. The results also aim to inspire new edge-based IoT security designs by providing a complete
review of IoT security solutions at the edge layer in UPIoT
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Internet of things: review, architecture and applicationsCSITiaesprime
Devices linked to the internet of things (IoT) may communicate with one another in several settings. Furthermore, rather of relying on an existing centralized system, users may develop their own network by using wireless capabilities. This kind of network is known as a wireless mobile ad hoc network. The mobile ad-hoc network (MANET) enables IoT devices to connect with one another in an unstructured networked environment. IoT devices may connect, establish linkages, and share data on a continuous basis. In this system, the cloud's purpose is to store and analyze data acquired from IoT devices. One of the most significant challenges in cloud computing has been identified as information security, and its resolution will result in an even bigger increase in cloud computing usage and popularity in the future. Finally, the goal of this project is to create a framework for facilitating communication between IoT devices in a Cloud and MANET context. Our major contribution is a ground-breaking research initiative that combines cloud computing with the MANET and connects the internet of things. This research might be used to the IoT in the future.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
111
Blockchain-Outside of
Currencies
Digital currencies were the first ever application of blockchain technology, arguably
without realizing its true potential. With the invention of bitcoin the concept of blockchain
was introduced for the very first time, but it wasn't until 2013, with the advent of Blockchain
2.0 that the real benefits of blockchain were realized with its possible application in many
different industries. Since then a number of use cases of blockchain technology in different
industries, have been proposed including but not limited to finance, the Internet of Things,
digital rights management, government, and law. In this chapter, four main industries
namely the Internet of Things (IoT), government, health, and finance, have been selected
for discussion. Readers will be introduced to all these fields and various related use cases
will be presented.
Internet of Things
The Internet of Things or IoT for short has recently gained much traction due to its potential
for transforming business applications and everyday life. IoT can be defined as a network of
computationally intelligent physical objects that are capable of connecting to the Internet,
sensing real-world events or environments, reacting to those events, collecting relevant
data, and communicating it over the Internet. This simple definition has huge implications
and has led to exciting concepts, such as wearable's, smart homes, smart grids, smart
connected cars, and smart cities, that are all based on this basic concept of an IoT device.
After dissecting the definition of IoT above, there are four functions that come to light as
being performed by an IoT device. These include sensing, reacting, collecting, and
communicating. All these functions are performed by using various components on the IoT
device.
C
o
p
y
r
i
g
h
t
2
0
1
7
.
P
a
c
k
t
P
u
b
l
i
s
h
i
n
g
.
A
l
l
r
i
g
h
t
s
r
e
s
e
r
v
e
d
.
M
a
y
n
o
t
b
e
r
e
p
r
o
d
u
c
e
d
i
n
a
n
y
f
o
r
m
w
i
t
h
o
u
t
p
e
r
m
i
s
s
i
o
n
f
r
o
m
t
h
e
p
u
b
l
i
s
h
e
r
,
e
x
c
e
p
t
f
a
i
r
u
s
e
s
p
e
r
m
i
t
t
e
d
u
n
d
e
r
U
.
S
.
o
r
a
p
p
l
i
c
a
b
l
e
c
o
p
y
r
i
g
h
t
l
a
w
.
EBSCO Publishing : eBook Academic Collection (EBSCOhost) - printed on 1/26/2020 12:56 PM via UNIVERSITY OF THE CUMBERLANDS
AN: 1488410 ; Bashir, Imran.; Mastering Blockchain
Account: s8501869.main.eds_new
Blockchain-Outside of Currencies
[ 413 ]
Sensing is performed by sensors. Reacting or controlling is performed by actuators,
collection is a function of various sensors, and communication is performed by chips that
provide network connectivity. One thing to note is that all these components are accessible
and controllable via the Internet in the IoT. An IoT device on its own is perhaps useful to
some extent but if it is part of a larger IoT ecosystem it is more valuable.
A typical IoT can consist of many physical objects connecting with each other and to a
centralized cloud ser.
Understand about the fundamentals of Internet of Things and its building blocks along with their
characteristics.
Understand the recent application domains of IoT in everyday life.
Gain insights about the current trends of Associated IOT technologoes and IOT Anlaytics.
Understand about the fundamentals of Internet of Things and its building blocks along with their
characteristics.
Understand the recent application domains of IoT in everyday life.
Gain insights about the current trends of Associated IOT technologoes and IOT Anlaytics.
In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It
extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates
opportunities in numerous domains. However, this increase in connectivity creates many prominent
challenges. This paper provides a survey of some of the major issues challenging the widespread adoption
of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the
IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security, management, and privacy.
Internet of Things (IoT) plays a vital role in our
day to day life and normally used in our houses, in industry,
schools and in hospitals which implemented outside to manage
and control for taking report the changes in location prevent
from dangers and many more favorable things. Moreover all
other advantages can approach of big risks of privacy loss and
security issues. To protect the IoT devices, so many research
works have been measure to find those problems and locate a
best way to eradicate those risks or at least to reduce their effect
on the security and privacy requirement. Formation the concept
of device to device (D2D) communication technology, IoT plays
the information transfer from one end to another end as node of
interconnection. This paper examines the constraints and
security challenges posed by IoT connected devices and the
ability to connect, communicate with, and remotely manage an
incalculable number of networked, automated devices via the
Internet is becoming pervasive.
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...ijmnct
The Ubiquitous Power Internet of Things (UPIoT) is a deep integration of the interconnected power
network and communication network, enabling full perception of the system status and business operations
for power production, transmission, and consumption. To address the challenges of real-time perception,
rapid response, and privacy protection, UPIoT can benefit from the use of edge computing technology.
Edge computing is a new and innovative computing architecture that enables quick and efficient
processing of data close to the source, bypassing network latency and bandwidth issues. By shifting
computing power to the edge of the network, edge computing reduces the strain on cloud computing
centers and decreases input response time for users. However, access latency can still be a bottleneck,
which may overshadow the benefits of edge computing, particularly for data-intensive services. While edge
computing offers promising solutions for the IoT network, there are still some issues to address, such as
security, incomplete data, and investment and maintenance costs. In this paper, researcher conducts a
comprehensive survey of edge computing and how edge device placement can improve performance in IoT
networks. The paper includes a comparative use case of smart agriculture edge computing
implementations and discusses the various challenges faced in implementing edge computing in the UPIoT
context. The results also aim to inspire new edge-based IoT security designs by providing a complete
review of IoT security solutions at the edge layer in UPIoT
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Internet of things: review, architecture and applicationsCSITiaesprime
Devices linked to the internet of things (IoT) may communicate with one another in several settings. Furthermore, rather of relying on an existing centralized system, users may develop their own network by using wireless capabilities. This kind of network is known as a wireless mobile ad hoc network. The mobile ad-hoc network (MANET) enables IoT devices to connect with one another in an unstructured networked environment. IoT devices may connect, establish linkages, and share data on a continuous basis. In this system, the cloud's purpose is to store and analyze data acquired from IoT devices. One of the most significant challenges in cloud computing has been identified as information security, and its resolution will result in an even bigger increase in cloud computing usage and popularity in the future. Finally, the goal of this project is to create a framework for facilitating communication between IoT devices in a Cloud and MANET context. Our major contribution is a ground-breaking research initiative that combines cloud computing with the MANET and connects the internet of things. This research might be used to the IoT in the future.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
4. The Internet of things refers to a type of
network to connect anything with the Internet
based on stipulated protocols through
information sensing equipments to conduct
information exchange and communications in
order to achieve smart recognitions, positioning,
tracing, monitoring, and administration.
In this chapter we briefly discussed about what IOT
is, how IOT enables different technologies, about
its architecture, characteristics & applications, IOT
functional view & what are the future challenges for
IOT.
5. Internet of things common definition is defining as:
Internet of things (IOT) is a network of physical objects.
The internet is not only a network of computers, but it
has evolved into a network of device of all type and
sizes, vehicles, smart phones, home appliances, toys,
cameras, medical instruments and industrial
systems, animals, people, buildings, all
connected, all communicating & sharing information
based on stipulated protocols in order to achieve smart
reorganizations, positioning, tracing, safe & control &
even personal real time online monitoring , online
upgrade, process control & administration.
6. We define IOT into three categories as
below:
Internet of things is an internet of three
things:
(1)People to people,
(2) People to machine /things,
(3) Things /machine to things /machine,
Interacting through internet.
7.
8. Internet of Things (IoT) is a concept and a paradigm
that considers pervasive presence in the environment
of a variety of things/objects that through wireless and
wired connections and unique addressing schemes are
able to interact with each other and cooperate with
other things/objects to create new
applications/services and reach common goals.
In this context the research and development
challenges to create a smart world are enormous.
A world where the real, digital and the virtual are
converging to create smart environments that make
energy, transport, cities and many other areas more
intelligent.
9. Internet of Things is a new revolution of the Internet.
Objects make themselves recognizable and they obtain
intelligence by making or enabling context related decisions
thanks to the fact that they can communicate information
about themselves.
They can access information that has been aggregated
by other things, or they can be components of complex
services.
This transformation is concomitant with the emergence
of cloud computing capabilities and the transition of the
Internet towards IPv6 with an almost unlimited addressing
capacity.
10. Internet of things (IoT) is a global infrastructure for the
information society, enabling advanced services
by interconnecting (physical and virtual) things based on
existing and evolving interoperable information and
communication technologies.
With the Internet of Things the communication is extended via
Internet to all the things that surround us.
The Internet of Things is much more than machine to
machine communication, wireless sensor networks, sensor
networks, 2G/3G/4G, GSM, GPRS, RFID, WI-FI, GPS,
microcontroller, microprocessor etc.
These are considered as being the enabling technologies that
make “Internet of Things” applications possible.
11. Enabling technologies for the Internet of Things are
considered can be grouped into three categories:
(1) technologies that enable “things” to acquire contextual
information,
(2) technologies that enable “things” to process contextual
information, and
(3) technologies to improve security and privacy.
The first two categories can be jointly understood as functional
building blocks required building “intelligence” into “things”,
which are indeed the features that differentiate the IoT from
the usual Internet.
The third category is not a functional but rather a de facto
requirement, without which the penetration of the IoT would be
severely reduced.
12. There is a heterogeneous mix of communication technologies,
which need to be adapted in order to address the needs of IoT
applications such as energy efficiency, speed, security,
and reliability.
In this context, it is possible that the level of diversity will
be scaled to a number a manageable connectivity
technologies that address the needs of the IoT applications,
are adopted by the market, they have already proved to be
serviceable, supported by a strong technology alliance.
Examples of standards in these categories include wired and
wireless technologies like Ethernet, WI-FI, Bluetooth, ZigBee,
GSM, and GPRS. [1, 2]
The key enabling technologies for the Internet of Things is
presented in Figure 3.
13.
14.
15. Internet of Things or IoT basically is connecting
Embedded System to internet. The heart of the
embedded system is a RISC family microcontroller
like PIC 16F84/Atmel 8051/ Motorola 68HC11 and
so on.
Most important thing that differentiates these
microcontrollers with microprocessors like 8085 is
their internal read/writable memory (EPROM). So
you can develop your light weight program (in
Assembly language or using Embedded C with
software like Keil) and "burn" the program into the
hardware. These programs keep on running in a
loop.
16. Interestingly in most embedded system a single
program is burn with several subroutines. So unlike
your PC, microcontroller device in an embedded
system runs a single program infinitely.
You can connect several input and output devices with
these microcontrollers which are either memory
mapped or IO mapped. This simple hardware includes
LCD display, buzzers, keypad (numpad) or even a
printer. You connect several sensors through A/D
interface. The devices can control Higher
Power/Voltage/Current rating devices like fans, motors,
bulbs using drives devices like relay-opt coupler and
so on.
17.
18. Autonomous: That means you can build a system
specific to a particular application. For instance
some standard peripherals and a specialized
program can turn a microcontroller unit into
washing machine controller or an oven controller.
Also embedded systems can be built specific to
the requirement. Unlike a PC which you cannot
work without a monitor, an embedded system may
not mandatorily need a display unit.
Low Cost: The cost of the microcontroller unit is
magnitude scale lower than a full fledged
computer.
19. Low Space: Obviously figure 2 show that an
embedded system takes way too little space when
you compare it with even the sleekest of laptops.
So you can put such a system in your hardware
system quite efficiently.
Low power: Most of the common microcontrollers
out there which are popular choices for embedded
systems operate at 5V and often need 5v
regulated power supply which can be provided
through a simple 9v standard battery with voltage
regulator or directly from main by using a voltage
rectifier with filter circuit.
20. Wireless sensor network refers to a group of spatially
dispersed and dedicated sensors for monitoring and recording
the physical conditions of the environment and organizing the
collected data at a central location. WSNs measure
environmental conditions like temperature, sound, pollution
levels, humidity, wind, and so on.
These are similar to wireless ad hoc networks in the sense
that they rely on wireless connectivity and spontaneous
formation of networks so that sensor data can be transported
wirelessly. WSNs are spatially distributed autonomous sensors
to monitor physical or environmental conditions, such as
temperature, sound, pressure, etc. and to cooperatively pass
their data through the network to a main locations. The more
modern networks are bi-directional, also enabling control of
sensor activity.
21. The development of wireless sensor
networks was motivated by military
applications such as battlefield
surveillance; today such networks are
used in many industrial and consumer
applications, such as industrial process
monitoring and control, machine health
monitoring, and so on.
22.
23. Cloud computing is the on-demand availability of
computer system resources, especially data storage and
computing power, without direct active management by
the user.
The term is generally used to describe data centers
available to many users over the Internet. Large clouds,
predominant today, often have functions distributed over
multiple locations from central servers.
If the connection to the user is relatively close, it may be
designated an edge server.
24.
25.
26. Private cloud is cloud infrastructure operated solely
for a single organization, whether managed
internally or by a third party, and hosted either
internally or externally.
Undertaking a private cloud project requires
significant engagement to virtualize the business
environment, and requires the organization to
reevaluate decisions about existing resources.
It can improve business, but every step in the
project raises security issues that must be
addressed to prevent serious vulnerabilities. Self-
run data centers[83] are generally capital intensive.
27. A cloud is called a "public cloud" when the services
are rendered over a network that is open for public
use.
Public cloud services may be free.[87] Technically
there may be little or no difference between public
and private cloud architecture, however, security
consideration may be substantially different for
services (a Applications, storage, and other
resources) that are made available by a service
provider for a public audience and when
communication is effected over a non-trusted
network. Generally, public cloud service providers
like Amazon Web Services (AWS)
28. Hybrid cloud is a composition of two or more clouds (private,
community or public) that remain distinct entities but are
bound together, offering the benefits of multiple deployment
models.
Hybrid cloud can also mean the ability to connect collocation,
managed and/or dedicated services with cloud resources.[61]
Gartner defines a hybrid cloud service as a cloud computing
service that is composed of some combination of private,
public and community cloud services, from different service
providers.[89]
A hybrid cloud service crosses isolation and provider
boundaries so that it can't be simply put in one category of
private, public, or community cloud service. It allows one to
extend either the capacity or the capability of a cloud service,
by aggregation, integration or customization with another
cloud service.
29. Though service-oriented architecture advocates "everything as
a service" (with the acronyms EaaS or XaaS,[62] or simply
aas), cloud-computing providers offer their "services"
according to different models, of which the three standard
models per NIST are Infrastructure as a Service (IaaS),
Platform as a Service (PaaS), and Software as a Service
(SaaS).[61]
These models offer increasing abstraction; they are thus often
portrayed as a layers in a stack: infrastructure-, platform- and
software-as-a-service, but these need not be related. For
example, one can provide SaaS implemented on physical
machines (bare metal), without using underlying PaaS or IaaS
layers, and conversely one can run a program on IaaS and
access it directly, without wrapping it as SaaS.
30. "Infrastructure as a service" (IaaS) refers to online
services that provide high-level APIs used to
dereference various low-level details of underlying
network infrastructure like physical computing
resources, location, data partitioning, scaling, security,
backup etc.
Facebook APP from google play store
Linux containers run in isolated partitions of a single
Linux kernel running directly on the physical hardware.
Linux c groups and namespaces are the underlying
Linux kernel technologies used to isolate, secure and
manage the containers.
31. Definition of cloud computing defines Platform as a
Service as: The capability provided to the
consumer is to deploy onto the cloud infrastructure
consumer-created or acquired applications created
using programming languages, libraries, services,
and tools supported by the provider.
The consumer does not manage or control the
underlying cloud infrastructure including network,
servers, operating systems, or storage, but has
control over the deployed applications and possibly
configuration settings for the application-hosting
environment.
32. Definition of cloud computing defines Software as a
Service as: The capability provided to the consumer is
to use the provider's applications running on a cloud
infrastructure.
The applications are accessible from various client
devices through either a thin client interface, such as a
web browser (e.g., web-based email), or a program
interface. The consumer does not manage or control
the underlying cloud infrastructure including network,
servers, operating systems, storage, or even individual
application capabilities, with the possible exception of
limited user-specific application configuration settings.
33. In the software as a service (SaaS) model, users gain
access to application software and databases. Cloud
providers manage the infrastructure and platforms that
run the applications.
SaaS is sometimes referred to as "on-demand
software" and is usually priced on a pay-per-use basis
or using a subscription fee.[70]
In the SaaS model, cloud providers install and operate
application software in the cloud and cloud users
access the software from cloud clients.
Cloud users do not manage the cloud infrastructure
and platform where the application runs.
34.
35. "Big data" is a field that treats ways to analyze, systematically
extract information from, or otherwise deal with data sets that are too
large or complex to be dealt with by traditional data-processing
application software.
Data with many cases (rows) offer greater statistical power, while
data with higher complexity (more attributes or columns) may lead to
a higher false discovery rate.[2]
Big data challenges include capturing data, data storage, data
analysis, search, sharing, transfer, visualization, querying, updating,
information privacy and data source.
Big data was originally associated with three key concepts: volume,
variety, and velocity.[3] Other concepts later attributed to big data are
veracity (i.e., how much noise is in the data) [4] and value.[5]
36. Big data can be described by the following
characteristics:
Volume : The quantity of generated and stored
data. The size of the data determines the value
and potential insight, and whether it can be
considered big data or not.
Variety: The type and nature of the data. This
helps people who analyze it to effectively use the
resulting insight. Big data draws from text, images,
audio, video; plus it completes missing pieces
through data fusion.
37. Velocity In this context, the speed at which the data is generated and
processed to meet the demands and challenges that lie in the path
of growth and development. Big data is often available in real-time.
Compared to small data, big data are produced more continually.
Two kinds of velocity related to big data are the frequency of
generation and the frequency of handling, recording, and
publishing.[38]
Veracity It is the extended definition for big data, which refers to the
data quality and the data value.[39] The data quality of captured data
can vary greatly, affecting the accurate analysis.[40] Data must be
processed with advanced tools (analytics and algorithms) to reveal
meaningful information. For example, to manage a factory one must
consider both visible and invisible issues with various components.
38. Interoperability is: “the ability of two or more systems
or components to exchange data and use information”.
This definition is interesting as provide many
challenges on how to: Get the information, Exchange
data, and • Use the information in understanding it and
being able to process it.
Different types of interoperability are
1.Technical interoperability,
2.Syntactical Interoperability,
3.Semantic Interoperability,
4.Organizational Interoperability.
A simple representation of interoperability is shown in
next Ppt.
40. Technical Interoperability : is usually associated with
hardware/ software components, systems and platforms
that enable machine-to-machine communication to take
place. This kind of interoperability is often centered on
(communication) protocols and the infrastructure needed
for those protocols to operate.
Syntactical Interoperability: is usually associated with
data for-mats. Certainly, the messages transferred by
communication protocols need to have a well-defined
syntax and encoding, even if it is only in the form of bit-
tables. However, many protocols carry data or content,
and this can be represented using high-level transfer
syntaxes such as HTML, XML or ASN.1.
41. Semantic Interoperability is usually associated with the
meaning of content and concerns the human rather than
machine interpretation of the content. Thus,
interoperability on this level means that there is a
common understanding between people of the meaning
of the content (information) being exchanged.
Organizational Interoperability, as the name implies, is
the ability of organizations to effectively communicate
and transfer (meaningful) data (information) even though
they may be using a variety of different information
systems over widely different infrastructures, possibly
across different geographic regions and cultures.
42.
43.
44. In a fully interoperable environment, any IoT device
would be able to connect to any other device or system
and exchange information as desired.
In practicality, interoperability is more complex.
Interoperability among IoT devices and systems happens
in varying degrees at different layers within the
communications protocol stack between the devices.
45. Technical interoperability ensures basic
connectivity: mechanism to established
physical & logical connection between systems,
network interoperability: to exchange data between
multiple systems across variety of networks.
Syntactic interoperability ensures understanding of
data structure in data exchanged between
systems.
While semantic ensures understanding of concept
contained in data structure.
46. Ethernet
WirelessHart
"Wireless-HART technology provides a robust wireless
protocol for the full range of process measurement,
control, and asset management applications."
DigiMesh
"DigiMesh is a proprietary peer-to-peer networking
topology for use in wireless end-point connectivity
solutions.
ISA100.11a
"ISA100.11a is a wireless networking technology
standard developed by the International Society of
Automation (ISA). The official description is "Wireless
Systems for Industrial Automation: Process Control
and Related Application"
47. IEEE 802.15.4
IEEE 802.15.4 is a standard which specifies the physical layer and
media access control for low-rate wireless personal area networks
(LR-WPANs). It is maintained by the IEEE 802.15 working group.
It is the basis for the ZigBee,ISA100.11a, Wireless HART, and MiWi
specifications, each of which further extends the standard by
developing the upper layers which are not defined in IEEE 802.15.4.
Alternatively, it can be used with 6LoWPAN and standard Internet
protocols to build a wireless embedded Internet.
NFC
Based on the standard ISO/IEC 18092:2004, using inductive coupled
devices at a center frequency of13.56 MHz. The data rate is up to
424 kbps and the rangeis with a few meters short compared to the
wireless sensor networks.
48. ANT
ANT is a proprietary wireless sensor network technology
featuring a wireless communications protocol stack that
enables semiconductor radios operating in the 2.4 GHz
Industrial, Scientific and Medical allocation of the RF spectrum
("ISM band") to communicate by establishing standard rules
for co-existence, data representation, signalling,
authentication and error detection.
Bluetooth
Bluetooth works in the 2.4 GHz ISM band and uses frequency
hopping. With a data rate up to 3 Mbps and maximum range
of 100m. Each application type which can use Bluetooth has
its own profile.
49. Eddystone - A protocol specification that defines a Bluetooth
low energy (BLE) message format for proximity beacon
messages.
ZigBee
The ZigBee protocol uses the 802.15.4 standard and operates
in the 2.4 GHz frequency range with 250 kbps. The maximum
number of nodes in the network is 1024 with a range up to 200
meter. ZigBee can use 128 bit AES encryption.
EnOcean
EnOcean is a an energy harvesting wireless technology which
works in the frequencies of 868 MHz for europe and 315 MHz
for North America. The transmit range goes up to 30 meter in
buildings and up to 300 meter outdoor.
50. WiFi
WiMax
WiMax is based on the standard IEEE 802.16
and is intended for wireless metropolitan area
networks. The range is different for fixed
stations, where it can go up to 50 km and
mobile devices with 5 to 15 km. Wi-MAx
operates at frequencies between 2.5 GHz to
5.8 GHz with a transfer rate of 40 Mbps.
51. We divide the IoT devices into two broad
categories:
1. The wearable ones
2.Microcontroller/Microprocessor driven embedded
IoT devices.
Some of the embedded devices like Arduino
Lillypad are minisque and you can further utilize
them to make your own wearable solution. But in
wearable I have included hardware which are
pretty standard and IoT has only software scope
for the developer.
52.
53. At this stage we divide our IoT development into
two parallel technologies: Wearable and
Embedded.
Developers can build apps for custom wearable
devices like Peeble, Samsung Gear or can opt to
create their own platform using embedded
solution and then can develop app for that
platform.
54. Wearable Platform
Tizen is fast becoming one of the most popular
platforms for Mobile and wearable devices. Tizen
SDK comes ported with wearable emulator which
makes it easier to develop wearable solutions for
Tizen platform.
a large Android Wear devices are now being made
and marketed. Smart watches are getting popular by
every day. Android Wear apps can be developed and
tested in Eclipse. This Android Developer Guide
helps you in setting up Android Wear development
environment in Eclipse.
55. Salesforce is another platform which is coming
up with awesome development environment,
APIs in wearable technologies.
Their solution is extended from Peeble to Google
glass.
Salesforce is really worth a try if you are
planning to have a serious go at wearable
technology as a career option. Checkout
Salesforce Wear page.
56. Embedded Platforms
Arduino is probably the best starting point for embedded
based IoT.
Basic Android boards don't come with Ethernet shield
and for Arduino to be able to work as IoT device, you
need to select Android with Ethernet shield.
Android Yun on the other hand is a board that comes
ported with ethernet shield. You can actually order a
basic board of Arduino like Arduino Decimilia or
Dueminolova and learn the hardware basics like
connecting sensors, working with actuators, serial
communication and then you can go for Ethernet shield
and look for more web based application for Arduino.
57. Raspberry Pi is probably one of the best things to
happen in DIY IoT.
A wide range of Data driven applications like Home
Automation Server to Home Multimedia server, File
Server can be developed with Pi. PI like Arduino has
general purpose IO pins.
But seamless working with sensors is bit tedious in Pi.
Another efficient IoT board is Intel Edition which has
integrated BLE, WiFi among host of other features. It
supports wide range of Industry standard hardware
(over 30) through 70-pin interface. What is important
is it supports wide range of platforms including
Arduino and Node.js
58. Intel Galileo is another good offering by Intel which supports the
same shielding that of Arduino Uno. So it can be said to be first
Intel powered device which is Arduino compatible.
It has among other thing a USB host controller like Raspberry Pi
which makes this an attractive hardware. Galelio also has
ethernet shield in built.
Netduino is a .Net Micro Framework based platform where
hardware is simillar to Arduino. But Netduino has 12 bit ADC as
against 10 bit Arduino ADC channels and uses 32 bit Controller.
There are few more differences. But the reason why Arduino is a
better bet for me than Netduino is that I get an Arduino
Dueminolova for under $10 where as Netduino is about $60.
Though Netduino really has better multitasking, cost is a big
factor for DIY guy.
59. Cloud Platform for IoT
Let's discuss the possibilities to beverage vending
machine once more in terms of sheer possibilities. In
the conventional vending machine you need to press a
button or put a coin to trigger the process of liquid flow,
which stops after certain quantity.
Now how about integrating PayPal or Google money
with the vending machine? How about a customer
discovering the vending machine as "website" along
with it's location and then pays online for a glass of
beverage.
Once payment is successful he gets an access token.
He can pass the token to the machine through NFC
and bingo he gets his drink.
60. For instance when you have to make a device
discoverable in web, you have to assign a fixed IP
address, maintain a router and follow several
networking skills. You might not have the knowledge
and infrastructure needed for maintaining a
commercial sophisticated network for IoT.
Yaler is a great example of what services and cloud
can bring to table. This provides connection as a
service such that your device is easily discoverable
and communicable over the web without much hassle
and take care of underneath security.
Axeda Provides infrastructure for M2M architecture.
OpenIoT is an open source IoT platform that provides
out of other services a unique Sensing as a Service.
61. Google has already integrated location services with it's
cloud. Location extracted from your devices is silently put
in your status updates in facebook and twitter and are
also used for more personalized searches.
So cloud APIs has a great potential in IoT in all levels of
architecture starting from firmware to hardware to more
top level architecture.
62.
63.
64.
65. The fundamental characteristics of the IoT are as follows
:
Interconnectivity: With regard to the IoT, anything can
be interconnected with the global information and
communication infrastructure.
Things-related services: The IoT is capable of
providing thing-related services within the constraints of
things, such as privacy protection and semantic
consistency between physical things and their associated
virtual things. In order to provide thing-related services
within the constraints of things, both the technologies in
physical world and information world will change.
66. Heterogeneity: The devices in the IoT are heterogeneous as
based on different hardware platforms and networks. They can
interact with other devices or service platforms through
different networks.
Dynamic changes: The state of devices change dynamically,
e.g., sleeping and waking up, connected and/or disconnected
as well as the context of devices including location and speed.
Moreover, the number of devices can change dynamically.
Enormous scale: The number of devices that need to be
managed and that communicate with each other will be at
least an order of magnitude larger than the devices connected
to the current Internet.
67. Safety: As we gain benefits from the IoT, we must
not forget about safety. As both the creators and
recipients of the IoT, we must design for safety.
This includes the safety of our personal data and
the safety of our physical well-being. Securing the
endpoints, the networks, and the data moving
across all of it means creating a security paradigm
that will scale.
Connectivity: Connectivity enables network
accessibility and compatibility. Accessibility is
getting on a network while compatibility provides
the common ability to consume and produce
data.
68.
69.
70. IOT architecture consists of different layers of technologies
supporting IOT. It serves to illustrate how various
technologies relate to each other and to communicate the
scalability, modularity and configuration of IOT deployments in
different scenarios.
Figure 4 shows detailed architecture of IOT. The functionality
of each layer is described below :
A. smart device / sensor layer:
The lowest layer is made up of smart objects integrated with
sensors. The sensors enable the interconnection of the
physical and digital worlds allowing real-time information to be
collected and processed.
There are various types of sensors for different purposes. The
sensors have the capacity to take measurements such as
temperature, air quality, speed, humidity, pressure, flow,
movement and electricity etc.
71. B. Gateways and Networks
Massive volume of data will be produced by these tiny
sensors and this requires a robust and high
performance wired or wireless network infrastructure
as a transport medium. Current networks, often tied
with very different protocols, have been used to
support machine-to-machine (M2M) networks and
their applications.
With demand needed to serve a wider range of IOT
services and applications such as high speed
transactional services, context-aware applications,
etc, multiple networks with various technologies and
access protocols are needed to work with each
other in a heterogeneous configuration.
72. C. Management Service Layer
The management service renders the processing of
information possible through analytics, security controls,
process modeling and management of devices.
One of the important features of the management service
layer is the business and process rule engines.
IOT brings connection and interaction of objects and
systems together providing information in the form of events or
contextual data such as temperature of goods, current location
and traffic data.
Some of these events require filtering or routing to post-
processing systems such as capturing of periodic sensory
data, while others require response to the immediate
situations such as reacting to emergencies on patient’s health
conditions.
73. D. Application Layer
The IoT application covers “smart”
environments/spaces in domains such as:
Transportation, Building, City, Lifestyle,
Retail, Agriculture, Factory, Supply chain,
Emergency, Healthcare, User interaction,
Culture and tourism, Environment and
Energy.
74. While IOT is architected into layers, the technologies
have been categorized into three groups.
The first group of technologies impacts the
devices, microprocessor chips:
The second group comprises technologies that
support network sharing and address capacity and
latency issues:
The third group impacts the management
services that support the IOT applications:
75. Physical Design of IoT is comprises specialized hardware
boards, Software systems, web APIs, protocols which together
creates a seamless environment which allows smart
embedded devices to be connected to internet such that
sensory data can be accessed and control system can be
triggered over internet.
Also devices could be connected to internet using various
means like Wi-Fi, Ethernet and so on. Furthermore devices
may not need to be connected to internet independently.
Rather a cluster of devices could be created (for example a
sensor network) and the base station or the cluster head could
be connected to internet. This leads to more abstract
architecture for communication protocols which ranges from
high level to low level.
Figure- shows Internet of Things (IoT) physical Architecture.
76.
77. Most interestingly; these devices must be uniquely
discovered. For unique discovery of the devices in a
Network, they need to have unique IP address.
As number of IoT devices online is expected to
suppress 20 billion mark and that IPv4 can only
support up to 4Billion unique addresses, IoT devices
essentially have IPv6 addressing scheme.
All these devices have either fixed or Subnet masked
IP addresses of type v6.
Unique IP addresses makes IoT devices discoverable
in the internet as independent node.
This is the most important concept to have in mind to
understand IoT.
78. The Internet of Things concept refers to uniquely
identifiable things with their virtual representations
in an Internet-like structure and IoT solutions
comprising a number of components such as :
(1) Module for interaction with local IoT devices.
This module is responsible for acquisition of
observations and their forwarding to remote
servers for analysis and permanent storage.
(2) Module for local analysis and processing of
observations acquired by IoT devices.
(3) Module for interaction with remote IoT devices,
directly over the Internet.
79. This module is responsible for acquisition of
observations and their forwarding to remote
servers for analysis and permanent storage.
(4) Module for application specific data analysis and
processing. This module is running on an application
server serving all clients. It is taking requests from
mobile and web clients and relevant IoT observations
as input, executes appropriate data processing
algorithms and generates output in terms of knowledge
that is later presented to users.
(5)User interface (web or mobile): visual
representation of measurements in a given
context (for example on a map) and interaction with
the user, i.e. definition of user queries.
80. The development of enabling technologies
such as semiconductor electronics,
communications, sensors, smart phones,
embedded systems, cloud networking,
network virtualization and software will be
essential to allow physical devices to
operate in changing environments &
to be connected all the time everywhere.
81.
82.
83. There are key challenges and implications today
that need to be addressed before mass adoption of
IOT can occur.
A. Privacy and Security
As the IoT become a key element of the Future
Internet and the usage of the Internet of Things for
large-scale, partially mission-critical systems
creates the need to address trust and security
functions adequately. New challenges identified for
privacy, trust and reliability are: • providing trust
and quality- of-information in shared information
models to enable re-use across many applications.
84. Providing secure exchange of data
between IoT devices and consumers of
their information.
Providing protection mechanisms for
vulnerable devices.
Table 2 shows various security & privacy
requirement at different layers of IOT.
85.
86. B. Cost versus Usability
IOT uses technology to connect physical
objects to the Internet.
For IOT adoption to grow, the cost of
components that are needed to support
capabilities such as sensing, tracking and
control mechanisms need to be relatively
inexpensive in the coming years.
87. C. Interoperability (Portability)
In the traditional Internet, interoperability is the most
basic core value; the first requirement of Internet
connectivity is that “connected” systems be able to
“talk the same language” of protocols and
encodings. Different industries today use different
standards to support their applications.
With numerous sources of data and heterogeneous
devices, the use of standard interfaces between these
diverse entities becomes important.
This is especially so for applications that supports
cross organizational and various system boundaries.
Thus the IOT systems need to handle high degree of
interoperability.
88. D. Data Management
Data management is a crucial aspect in
the Internet of Things. When considering a
world of objects interconnected and
constantly exchanging all types of
information, the volume of the generated
data and the processes involved in the
handling of those data become critical.
89. E. Device Level Energy Issues
One of the essential challenges in IoT is
how to interconnect “things” in an
interoperable way while taking into account
the energy constraints, knowing that the
communication is the most energy
consuming task on devices.
90.
91. Potential applications of the IoT are numerous and
diverse, permeating into practically all areas of
every-day life of individuals, enterprises, and
society as a whole.
The IoT application covers “smart”
environments/spaces in domains such as:
Transportation, Building, City, Lifestyle, Retail,
Agriculture, Factory, Supply chain, Emergency,
Healthcare, User interaction, Culture and
tourism, Environment and Energy.
Below are some of the IOT applications
92. A. IOsL (Internet of smart living):
Remote Control Appliances: Switching on and off remotely
appliances to avoid accidents and save energy,
Weather: Displays outdoor weather conditions such as humidity,
temperature, pressure, wind speed and rain levels with ability to
transmit data over long distances,
Smart Home Appliances: Refrigerators with LCD screen telling
what’s inside, food that’s about to expire, ingredients you need to
buy and with all the information available on a Smartphone app.
Washing machines allowing you to monitor the laundry remotely,
and. Kitchen ranges with interface to a Smartphone app allowing
remotely adjustable temperature control and monitoring the oven’s
self-cleaning feature,
Safety Monitoring: cameras, and home alarm systems making
people feel safe in their daily life at home,
Intrusion Detection Systems: Detection of window and door
openings and violations to prevent intruders,
Energy and Water Use: Energy and water supply consumption
monitoring to obtain advice on how to save cost and resources, &
many more…
93. B. IOsC ( Internet of smart cities):
Structural Health: Monitoring of vibrations and material conditions
in buildings, bridges and historical monuments,
Lightning: intelligent and weather adaptive lighting in street lights,
Safety: Digital video monitoring, fire control management, public
announcement systems,
Transportation: Smart Roads and Intelligent High-ways with
warning messages and diversions according to climate conditions
and unexpected events like accidents or traffic jams,
Smart Parking: Real-time monitoring of parking spaces availability
in the city making residents able to identify and reserve the closest
available spaces,
Waste Management: Detection of rubbish levels in containers to
optimize the trash collection routes. Garbage cans and recycle bins
with RFID tags allow the sanitation staff to see when garbage has
been put out.
94. C. IOsE (Internet of smart environment):
Air Pollution monitoring: Control of CO2 emissions of
factories, pollution emitted by cars and toxic gases generated
in farms,
Forest Fire Detection: Monitoring of combustion gases and
preemptive fire conditions to define alert zones,
Weather monitoring: weather conditions monitoring such as
humidity, temperature, pressure, wind speed and rain,
Earthquake Early Detection,
Water Quality: Study of water suitability in rivers and the sea
for eligibility in drinkable use,
River Floods: Monitoring of water level variations in rivers,
dams and reservoirs during rainy days,
Protecting wildlife: Tracking collars utilizing GPS/GSM
modules to locate and track wild animals and communicate
their coordinates via SMS.
95. D. IOsI (Internet of smart industry):
Explosive and Hazardous Gases: Detection of gas
levels and leakages in industrial environments,
surroundings of chemical factories and inside mines,
Monitoring of toxic gas and oxygen levels inside
chemical plants to ensure workers and goods safety,
Monitoring of water, oil and gas levels in storage
tanks and Cisterns,
Maintenance and repair: Early predictions on
equipment malfunctions and service maintenance
can be automatically scheduled ahead of an actual
part failure by installing sensors inside equipment to
monitor and send reports.
96. E. IOsH (Internet of smart health):
Patients Surveillance: Monitoring of conditions of patients
inside hospitals and in old people’s home,
Medical Fridges: Control of conditions inside freezers storing
vaccines, medicines and organic elements,
Fall Detection: Assistance for elderly or disabled people living
independent,
Dental: Bluetooth connected toothbrush with Smartphone
app analyzes the brushing uses and gives information on the
brushing habits on the Smartphone for private information or
for showing statistics to the dentist,
Physical Activity Monitoring: Wireless sensors placed
across the mattress sensing small motions, like breathing and
heart rate and large motions caused by tossing and turning
during sleep, providing data available through an app on the
Smartphone.
97. F. IOsE (internet of smart energy):
Smart Grid: Energy consumption monitoring and
management, Wind Turbines/ Power house: Monitoring and
analyzing the flow of energy from wind turbines & power
house, and two-way communication with consumers’ smart
meters to analyze consumption patterns,
Power Supply Controllers: Controller for AC-DC power
supplies that determines required energy, and improve
energy efficiency with less energy waste for power
supplies related to computers, telecommunications, and
consumer electronics applications,
Photovoltaic Installations: Monitoring and optimization of
performance in solar energy plants
98. G. IOsA (internet of smart agriculture):
Green Houses: Control micro-climate conditions to maximize the
production of fruits and vegetables and its quality,
Compost: Control of humidity and temperature levels in alfalfa,
hay, straw, etc. to prevent fungus and other microbial contaminants,
Animal Farming/Tracking: Location and identification of animals
grazing in open pastures or location in big stables, Study of
ventilation and air quality in farms and detection of harmful gases
from excrements, Offspring Care: Control of growing conditions of
the offspring in animal farms to ensure its survival and health,
field Monitoring: Reducing spoilage and crop waste with better
monitoring, accurate ongoing data obtaining, and management of
the agriculture fields, including better control of fertilizing,
electricity and watering.
99. The IoT application area is very diverse and
IoT applications serve different users.
Different user categories have different
driving needs. From the IoT perspective there
are three important user categories:
(1) The individual citizens,
(2) Community of citizens (citizens of a city, a
region, country or society as a whole),
(3) The enterprises.
100. [1] Dr. Ovidiu Vermesan SINTEF, Norway, Dr. Peter
FriessEU, Belgium, “Internet of Things: Converging
Technologies for Smart Environments and Integrated
Ecosystems”, river publishers’ series in communications,
2013.
[2] Dr. Ovidiu Vermesan SINTEF, Norway, Dr. Peter
FriessEU, Belgium, “Internet of Things–From Research and
Innovation to Market Deployment”, river publishers’ series in
communications, 2014.
[3] O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, et al.,
“Internet of Things Strategic Research Agenda”, Chapter 2 in
Internet of Things -Global Technological and Societal Trends,
River Publishers, 2011.
[4] Martin Serrano, Insight Centre for Data Analytics,
Ireland ,Omar Elloumi, Alcatel Lucent, France, Paul Murdock,
Landis+Gyr, Switzerland, “ALLIANCE FOR INTERNET OF
THINGS INNOVATION, Semantic Interoperability” , Release
2.0, AIOTI WG03 – loT Standardisation,2015.
101. [5] IoT: https://dzone.com/articles/the-internet-of-things-
gateways-and-next-generation.
[6] [http://www.reloade.com/blog/2013/12/6characteristics-
within-internet-things-iot.php].
[7] Martín Serrano, Payam Barnaghi, Francois Carrez
Philippe Cousin, Ovidiu Vermesan, Peter Friess,
“Internet of Things Semantic Interoperability: Research
Challenges, Best Practices, Recommendations and Next
Steps”, European research cluster on the internet of
things, IERC,2015.
[8] Karen Rose, Scott Eldridge, Lyman Chapin, “The
Internet of Things: An Overview Understanding the Issues
and Challenges of a More Connected World”, The Internet
Society (ISOC), 2015.
102. [9] H. van der Veer, A.Wiles, “Achiveing Technical
Interoperability —the ETSI Approach”, ETSI White Paper
No.3, 3rd edition, April 2008,
http://www.etsi.org/images/files/ETSI
WhitePapers/IOP%20whitepaper%20Edition%203%20fi
nal.pdf
[10] ITU-T, Internet of Things Global Standards Initiative,
http://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx
[11] http://tblocks.com/internet-of-things
[12] https://www.ida.gov.sg/~/media/Files/Infocomm%20Lan
dscape/Technology/TechnologyRoadmap/InternetOfThin
gs.pdf