scholarly journals Trends in the Internet of Things

TecnoLógicas ◽  
2019 ◽  
Vol 22 (44) ◽  
pp. I-II ◽  
Author(s):  
Juan Botero Valencia ◽  
Luis Castaño Londoño ◽  
David Marquez Viloria

The Internet of Things continues to set the pace of many aspects of the scientific and technological development worldwide. Moreover, it is expected to do so, at least, for the next ten years, according to forecasts that predict trillions of devices connected to the Internet [1]. In addition to influencing different factors of people’s daily lives, this new vision of the world poses a series of challenges and opportunities that have an effect on general aspects of the economy and politics.

Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
S. A. Zhezhkun ◽  
◽  
L. B. Veksler ◽  
S. M. Brezitsʹkyy ◽  
B. O. Tarasyuk

This article focuses on the analysis of promising technologies for long-range traffic transmission for the implementation of the Internet of Things. The result of the review of technical features of technologies, their advantages and disadvantages is given. A comparative analysis was performed. An analysis is made that in the future heterogeneous structures based on the integration of many used radio technologies will play a crucial role in the implementation of fifth generation networks and systems. The Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety of IoT applications have been developed and deployed using different IoT frameworks. An IoT framework is a set of guiding rules, protocols, and standards which simplify the implementation of IoT applications. The success of these applications mainly depends on the ecosystem characteristics of the IoT framework, with the emphasis on the security mechanisms employed in it, where issues related to security and privacy are pivotal. In this paper, we survey the security of the main IoT frameworks, a total of 8 frameworks are considered. For each framework, we clarify the proposed architecture, the essentials of developing third-party smart apps, the compatible hardware, and the security features. Comparing security architectures shows that the same standards used for securing communications, whereas different methodologies followed for providing other security properties.


Author(s):  
Hala A. Naman ◽  
Naseer Ali Hussien ◽  
Mohand Lokman Al-dabag ◽  
Haider Th.Salim Alrikabi

<p class="0abstract">One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion of Internet science and the use of the Internet worldwide, we will establish a security feature of the IOT service that will work more reliably and more effectively to deal with the Internet of Things and ensure the work of the services that the customer interacts with. A secret-key stenographic scheme that embeds four gray-scale secret size (128*128) pixel images into a size (512*512) pixel cover image in this work. Wavelet transform is the method used in this project to analyze the cover into its frequency components. In this work, combinations of steganography and cryptography were made to increase the level of safety and make the device more difficult for attackers to beat. The resulting stego-image that will be transmitted did not raise any suspicion by both objective and subjective evaluation, so the primary objective of Steganography is achieved. The proposed system was designed by using (MATLAB R2018b) and running on a Pentium-4 computer. The Internet of Things works with the encryption system for data in a synchronized manner with the technological development, and in order to maintain the stability of any Internet of things service, whether it is information signal services, visual or audio data, a remote control system, or data storage in the Internet cloud, we must focus on data preservation from internet pirates and internet system hackers. The picture Figure<strong> </strong>4 below shows the method of encryption and dealing with the Internet of things system..</p>


Author(s):  
Anthony Bolton ◽  
Leila Goosen ◽  
Elmarie Kritzinger

The purpose of this chapter is to address challenges related to the integration and implementation of the developing internet of things (IoT) into the daily lives of people. Demands for communication between devices, sensors, and systems are reciprocally driving increased demands for people to communicate and manage the growing digital ecosystem of the IoT and an unprecedented volume of data. A larger study was established to explore how digital transformation through unified communication and collaboration (UC&C) technologies impact the productivity and innovation of people in the context of one of the world's largest automotive enterprises, General Motors (GM). An analysis and exploration of this research milieu, supported by a critical realist interpretation of solutions, suggested that recommendations can be made that the integration and implementation of digital transformation, delivered via UC&C technologies, impact productivity and opportunity for driving innovation within a global automotive enterprise.


2021 ◽  
Vol 22 (1) ◽  
pp. 35
Author(s):  
Zulfan Taufik ◽  
Muhammad Taufik

This article examines how Tarekat Qadiriyah wa Naqshabandiyah (TQN) utilizes online media to strengthen its existence. As an integral part of the Islamic revival in Indonesia, Sufi orders (tarekat) are facing remarkable challenges and opportunities in maintaining their existence in the digital era. Nevertheless, previous studies observed Sufi orders as a traditional community that would be exterminated by the pace of modernization and globalization. This article argues that Sufi orders may survive in the internet of things era, contrary to preceding discourses. Based on ethnography research, both online and offline, the authors found out that the vitality of the Sufi order can adapt, develop, and innovate using online media. TQN's use of online media through various platforms proves Sufi order’s adaptive efforts to the internet-based era. TQN’s online media provide informations on Islamic  and Sufism teachings, news, schedule of activities, and fundraising. Even though TQN members’ being active in cyber-Islamic environments, they resist online asceticism thus leverage the vertical-personal obedience, conservative authorities, and sacred rituals. These practices done by TQN members illuminate its identity as an authentic online sufism. Premises shown in this paper may enrich the scope of study within the relationship of Sufi orders and Islamic-cyber environment, especially in Indonesian context.


Author(s):  
Scott J. Shackelford

The Internet of Things (IoT) is the notion that nearly everything we use, from gym shorts to streetlights, will soon be connected to the Internet; the Internet of Everything (IoE) encompasses not just objects, but the social connections, data, and processes that the IoT makes possible. Industry and financial analysts have predicted that the number of Internet-enabled devices will increase from 11 billion to upwards of 75 billion by 2020. Regardless of the number, the end result looks to be a mind-boggling explosion in Internet connected stuff. Yet, there has been relatively little attention paid to how we should go about regulating smart devices, and still less about how cybersecurity should be enhanced. Similarly, now that everything from refrigerators to stock exchanges can be connected to a ubiquitous Internet, how can we better safeguard privacy across networks and borders? Will security scale along with this increasingly crowded field? Or, will a combination of perverse incentives, increasing complexity, and new problems derail progress and exacerbate cyber insecurity? For all the press that such questions have received, the Internet of Everything remains a topic little understood or appreciated by the public. This volume demystifies our increasingly “smart” world, and unpacks many of the outstanding security, privacy, ethical, and policy challenges and opportunities represented by the IoE. Scott J. Shackelford provides real-world examples and straightforward discussion about how the IoE is impacting our lives, companies, and nations, and explain how it is increasingly shaping the international community in the twenty-first century. Are there any downsides of your phone being able to unlock your front door, start your car, and control your thermostat? Is your smart speaker always listening? How are other countries dealing with these issues? This book answers these questions, and more, along with offering practical guidance for how you can join the effort to help build an Internet of Everything that is as secure, private, efficient, and fun as possible.


2018 ◽  
Vol 7 (2.24) ◽  
pp. 16
Author(s):  
Abhilash V ◽  
P K.Mani

The Internet of Things (IoT) is one major field which is fast developing now a days. The IoT means the connection or controlling of an equipment using internet. The another field everyone attracted is towards the robotics. Everyone wants to use a robot because they can do things what we can only imagine to do so. Here in this project we are blending the IoT with the robotics. The robot is controlled by the IoT here. The robot used here is the wheeled robot. Because it is easy to use a wheeled robot in a smooth and hard surface, and it is more energy efficient than the legged robot. The basic motive of the robot here is to pic and place an object from one place to another. This paper discuss about the pick and place wheeled robotic arm which is controlling using the Internet of Things.  


Author(s):  
Deepika Dhingra ◽  
Shruti Ashok

The internet of things (IoT) is proving to be a seminal development amongst this century's most productive and pervasive high-tech revolutions. Increased reliance on the internet of things (IoT) is one of the foremost trends, and the financial services industry is a major contributor to that trend. IoT's influence on our daily lives is noteworthy, and it has become imperative for financial services organizations to evolve to adapt to these changes. Digital devices have started to interconnect with each other and possibly with other peripheral entities. Owing to the explosion of these devices and digitization in the banking and financial services industry, businesses are discovering the possibility of IoT in finance to control data and to minimize the risk. This chapter focuses on the impact of internet of things on financial services. It discusses the various applications, trends, challenges, and risks associated with adoption of IoT by financial services institutions. This chapter also discusses Indian and global cases of application of internet of things by financial services institutions.


Author(s):  
Yong Kyu Lee

This chapter reviews the internet of things (IoT) as a key component of a smart city and how it is applied to consumers' daily lives and business. The IoT is a part of information and communication technology (ICT) and is considered a powerful means to improve consumers' quality of life. The “thing” could be any object which has internet capability, such as wearable devices and smart TVs/phones/speakers. Several studies have identified driving factors that have led consumers to adopting them, but also concerns of consumers' resistance to IoT devices. The three major fields of application of IoT technologies were selected to review the role of the IoT in consumers' daily lives and business.


Sign in / Sign up

Export Citation Format

Share Document