scholarly journals The Advent of the Internet of Things in Airfield Lightning Systems: Paving the Way from a Legacy Environment to an Open World

Sensors ◽  
2019 ◽  
Vol 19 (21) ◽  
pp. 4724
Author(s):  
Enrico Buzzoni ◽  
Fabio Forlani ◽  
Carlo Giannelli ◽  
Matteo Mazzotti ◽  
Stefano Parisotto ◽  
...  

This paper discusses the design and prototype implementation of a software solution facilitating the interaction of third-party developers with a legacy monitoring and control system in the airfield environment. By following the Internet of Things (IoT) approach and adopting open standards and paradigms such as REpresentational State Transfer (REST) and Advanced Message Queuing Protocol (AMQP) for message dispatching, the work aims at paving the way towards a more open world in the airfield industrial sector. The paper also presents performance results achieved by extending legacy components to support IoT standards. Quantitative results not only demonstrate the feasibility of the proposed solution, but also its suitability in terms of prompt message dispatching and increased fault tolerance.

2021 ◽  
Vol 11 (8) ◽  
pp. 3454
Author(s):  
Pedro D. Gaspar ◽  
Carlos M. Fernandez ◽  
Vasco N. G. J. Soares ◽  
João M. L. P. Caldeira ◽  
Hélio Silva

The agro-industrial sector consumes a significant amount of natural resources for farming and meat production. By 2050, population growth is expected, generating more demand and, consequently, more consumption of scarce resources. This challenging scenario is a concern of the European Commission, revealed in the Green Deal commitment and by the United Nations’ 12th goal of sustainable development. Thus, organizations must increase productivity and be more sustainable as soon as possible. Internet of Things (IoT) is introduced as a solution to facilitate agro-food companies to be more eco-efficient, mainly facing difficulties on farms, such as food loss and waste, best efficiency in management of resources, and production. The deployment of this technology depends on the stage of maturity and potential of implementation. To assess and characterize companies, with respect of IoT implementation, a survey was applied in 21 micro, small and medium agro-food companies, belonging to milk, honey, olive oil, jams, fruticulture, bakery and pastry, meat, coffee, and wine sectors, in the central region of Portugal. As results, this paper reveals the stage of maturity, level of sophistication, potential, opportunities, solutions, and barriers for implementation of IoT. Additionally, suggestions and recommendations to improve practices are discussed.


Economies ◽  
2018 ◽  
Vol 6 (2) ◽  
pp. 36 ◽  
Author(s):  
Milos Maryska ◽  
Petr Doucek ◽  
Lea Nedomova ◽  
Pavel Sladek

Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
S. A. Zhezhkun ◽  
◽  
L. B. Veksler ◽  
S. M. Brezitsʹkyy ◽  
B. O. Tarasyuk

This article focuses on the analysis of promising technologies for long-range traffic transmission for the implementation of the Internet of Things. The result of the review of technical features of technologies, their advantages and disadvantages is given. A comparative analysis was performed. An analysis is made that in the future heterogeneous structures based on the integration of many used radio technologies will play a crucial role in the implementation of fifth generation networks and systems. The Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety of IoT applications have been developed and deployed using different IoT frameworks. An IoT framework is a set of guiding rules, protocols, and standards which simplify the implementation of IoT applications. The success of these applications mainly depends on the ecosystem characteristics of the IoT framework, with the emphasis on the security mechanisms employed in it, where issues related to security and privacy are pivotal. In this paper, we survey the security of the main IoT frameworks, a total of 8 frameworks are considered. For each framework, we clarify the proposed architecture, the essentials of developing third-party smart apps, the compatible hardware, and the security features. Comparing security architectures shows that the same standards used for securing communications, whereas different methodologies followed for providing other security properties.


Author(s):  
Clinton Fernandes ◽  
Vijay Sivaraman

This article examines the implications of selected aspects of the Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015, which was passed by the Australian Parliament in March 2015. It shows how the new law has strengthened protections for privacy. However, focusing on the investigatory implications, it shows how the law provides a tactical advantage to investigators who pursue whistleblowers and investigative journalists. The article exposes an apparent discrepancy in the way ‘journalist’ is defined across different pieces of legislation. It argues that although legislators’ interest has been overwhelmingly focused on communications data, the explosion of data generated by the so-called Internet-of-Things (IoT) is as important or more. It shows how the sensors in selected IoT devices lead to a loss of user control and will enable non-stop, involuntary and ubiquitous monitoring of individuals. It suggests that the law will need to be amended further once legislators and investigators’ knowledge of the potential of IoT increases. 


2017 ◽  
Vol 5 (1) ◽  
pp. 488
Author(s):  
Elena Samoylova

This paper is dedicated to the analysis of the phenomenon of virtual narrative and its connection to the phenomenon of Internet of things. Modern virtual narrative is a complex, syncretic phenomenon, alludes to the different cultural, historical and even mythological subjects and objects. But with the development of new technologies, such as the Internet of Things, virtual narrative became to be some kind of independent phenomenon. Moreover, the Internet of things (which is not clerly identified phenomen itself from the philosophic point of view) uses the virtual narrative as one of the components, for example applaying some methond of virtual narrative in creating advertisments, creating messages in musiams, exposititions etc. So, in our paper we will analyze this both phenomena, their connections and the way of its development.


Author(s):  
Muawya N. Al Dalaien ◽  
Ameur Bensefia ◽  
Salam A. Hoshang ◽  
Abdul Rahman A. Bathaqili

In recent years the Internet of Things (IoT) has rapidly become a revolutionary technological invention causing significant changes to the way both corporate computing systems, and even household gadgets and appliances, are designed and manufactured. The aim of this chapter is to highlight the security and privacy issues that may affect the evolution of IoT technology. The privacy issues are discussed from customer perspectives: first, the IoT privacy concern where the privacy debates on IoT and the IoT privacy that reflected from users' perspective based on the examination of previous researches results. In addition, the different architectures for IoT are discussed. Finally, the chapter discusses the IoT security concern by collecting, analyzing and presenting the major IoT security concerns in the literature as well as providing some potential solutions to these concerns.


Sign in / Sign up

Export Citation Format

Share Document