scholarly journals The Third Wave: The internet of things

Ubiquity ◽  
2015 ◽  
Vol 2015 (October) ◽  
pp. 1-4 ◽  
Author(s):  
Kemal A. Delic
2014 ◽  
Vol 644-650 ◽  
pp. 2812-2815 ◽  
Author(s):  
Cui Mei Li ◽  
Rou Wang ◽  
Le Huang

The Internet of Things, which is another revolution in the information industry following the computer and the Internet, is referred to as the third wave of the world information industry. In this paper, the concepts, the architecture system and the principle, and the key technology in the Internet of Things and its application in real life are presented. Finally, a strategic advice on the development of the Internet of Things in China is put forward.


Author(s):  
Yusuf Perwej ◽  
Firoj Parwej ◽  
Mumdouh Mirghani Mohamed Hassan ◽  
Nikhat Akhtar

Recent years have seen the swift development and deployment of Internet-of-Things (IoT) applications in a variety of application domains. In this scenario, people worldwide are now ready to delight the benefits of the Internet of Things (IoT). The IoT is emerging as the third wave in the evolution of the Internet. The 1990s’ Internet wave connected 1.2 billion subscribers while the 2000s’ mobile wave connected another 2.4 billion. Actually, IoT is expected to consist of more than 84 billion connected devices generating 186 zettabyte of data by 2025, in the opinion of IDC. It includes major types of networks, such as distributed, ubiquitous, grid, and vehicular, these have conquered the world of information technology over a decade. IoT is growing fast across several industry verticals along with increases in the number of interconnected devices and diversify of IoT applications. In spite of the fact that, IoT technologies are not reaching maturity yet and there are many challenges to overcome. The Internet of Things combines actual and virtual anywhere and anytime, fascinate the attention of both constructor and hacker. Necessarily, leaving the devices without human interference for a long period could lead to theft and IoT incorporates many such things. In this paper, we are briefly discussing technological perspective of Internet of Things security. Because, the protection was a major concern when just two devices were coupled. In this context, security is the most significant of them. Today scenario, there are millions of connected devices and billions of sensors and their numbers are growing. All of them are expected secure and reliable connectivity. Consequently, companies and organizations adopting IoT technologies require well-designed security IoT architectures.


2018 ◽  
Vol 11 (4) ◽  
pp. 32-52 ◽  
Author(s):  
Kouah Sofia ◽  
Kitouni Ilham

Nowadays, the Internet of things (IoT) is becoming a promising technology which revolutionizes and simplifies our daily life style. It allows interaction and cooperation between a large variety of pervasive objects over wireless and wired connections, in order to achieve specific goals. Moreover, it provides a concise integration of physical world into computer systems through network infrastructure. This paper provides an agent-based architecture for developing IoT systems. The proposed architecture is multi-layer and generic. It encompasses four layers: Physical Component Management, Local Management -Coordination, Global Management-Coordination and Specialized Operative Management Layers. The first one can be seen as a smart layer that ensures connection and communication between things and the system. The second one constitutes the intelligent core of the system which acts locally to ensure coordination and further internal functioning. The third layer ensures coordination between the local system and the externals ones. The last layer supports additional behaviors which are domain dependent. The architecture is illustrated by an IoT system diagnosis.


Author(s):  
Keyurbhai Arvindbhai Jani ◽  
Nirbhay Chaubey

The Internet of Things (IoT) connects different IoT smart objects around people to make their life easier by connecting them with the internet, which leads IoT environments vulnerable to many attacks. This chapter has few main objectives: to understand basics of IoT; different types of attacks possible in IoT; and prevention steps to secure IoT environment at some extent. Therefore, this chapter is mainly divided into three parts. In first part discusses IoT devices and application of it; the second part is about cyber-attacks possible on IoT environments; and in the third part is discussed prevention and recommendation steps to avoid damage from different attacks.


2017 ◽  
Vol 67 (4) ◽  
pp. 483
Author(s):  
Nitin Rai ◽  
Shailesh R Chansarkar

Internet is perhaps the only technology invented by mankind which has singly led to what is appearing to be the third revolution after the renaissance and the industrial revolution. The Internet, as of today, proposes to connect everything driven by the semiconductor, naming it off late, as the Internet-of-Things (IoT). It has over the years, connected the semiconductor driven systems and their human users, evolving the connected whole including the human user represented in that common whole, being called the cyberspace. This cyberspace consists of all the computing, processing, storage, printing, communicating, networking, etc. devices together with the large mass of human population using it.


2014 ◽  
Vol 22 ◽  
pp. 6-22
Author(s):  
Ori Freiman

This paper discusses the epistemology of the Internet of Things [IoT] by focusing on the topic of trust. It presents various frameworks of trust, and argues that the ethical framework of trust is what constitutes our responsibility to reveal desired norms and standards and embed them in other frameworks of trust. The first section briefly presents the IoT and scrutinizes the scarce philosophical work that has been done on this subject so far. The second section suggests that the field of epistemology is not sufficiently capable of dealing with technologies, and presents a possible solution to this problem. It is argued that knowledge is not only social phenomena, but also a technological one, and that in order to address epistemological issues in technology, we need to carefully depart from traditional epistemic analysis and form a new approach that is technological (termed here Techno-Epistemology). The third and fourth sections engage in an epistemic analysis of trust by dividing it in to various frameworks. The last section argues that these various frameworks of trust can be understood to form a trustworthy large-scale socio-technological system, emphasizing the place of ethical trust as constituting our commitment to give proper accounts for all of the other frameworks.


Sign in / Sign up

Export Citation Format

Share Document