scholarly journals Systematic Review of Internet of Nano Things (IoNT) Technology: Taxonomy, Architecture, Open Challenges, Motivation and Recommendations

2021 ◽  
pp. 7-19
Author(s):  
Hayder A. Naser ◽  
Alaa Thaer Lateef ◽  
Falah A. Bida ◽  
Mohammed Zorah

Internet of nano things (IoNT) is a new and modern part of the internet of things (IoT). Applications that operate in the field of nano scale show a new advantage in communication networks. IoNT opened the door to many applications in various fields with new features derived from the advantages of nanotechnology. In this work, a description of the IoNT during 2015-2021 was achieved, including taxonomy, architecture, motives, applications and challenges, in addition to recommendations. The architecture of the IoNT and the most important technologies used in Nano communication networks have been identified, with an indication of the advantages of each. This study, we hope, will make a contribution to this field of science, thus contributing to providing assistance to researchers in this emerging field and covering the challenges they face in this way. That would permit communication between nano-devices to be conventional, making these calibrations to be implemented in various IoNT applications. Until the IoNT system is designed without any problems in the near future, which if achieved, will provide great services, especially in medical applications and other applications.

Author(s):  
Md Alimul Haque ◽  
Shameemul Haque ◽  
Kailash Kumar ◽  
Narendra Kumar Singh

The role of the internet of things (IoT) and cyberspace in a digital society is well recognized, and they have become tremendously popular due to certain features like the ability to ease the operational process of businesses and instant communication. Recent developments in the fields of wireless communication networks like 4G, 5G, and 6G with IoT applications have greatly benefited human welfare. Still, the rapid growth of various IoT applications focuses on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. It has also contributed to unethical practices by hackers who use new tools and techniques to penetrate more complex or well-controlled environments and produce increased damage and even remain under the cover. The main objective of this chapter is to improve understanding of the challenges to secure future digital infrastructure while it is still evolving. In this context, a detailed review of the security-related issues, challenges, threats, and countermeasures in the IoT applications is presented.


Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
S. A. Zhezhkun ◽  
◽  
L. B. Veksler ◽  
S. M. Brezitsʹkyy ◽  
B. O. Tarasyuk

This article focuses on the analysis of promising technologies for long-range traffic transmission for the implementation of the Internet of Things. The result of the review of technical features of technologies, their advantages and disadvantages is given. A comparative analysis was performed. An analysis is made that in the future heterogeneous structures based on the integration of many used radio technologies will play a crucial role in the implementation of fifth generation networks and systems. The Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety of IoT applications have been developed and deployed using different IoT frameworks. An IoT framework is a set of guiding rules, protocols, and standards which simplify the implementation of IoT applications. The success of these applications mainly depends on the ecosystem characteristics of the IoT framework, with the emphasis on the security mechanisms employed in it, where issues related to security and privacy are pivotal. In this paper, we survey the security of the main IoT frameworks, a total of 8 frameworks are considered. For each framework, we clarify the proposed architecture, the essentials of developing third-party smart apps, the compatible hardware, and the security features. Comparing security architectures shows that the same standards used for securing communications, whereas different methodologies followed for providing other security properties.


2020 ◽  
Author(s):  
Anbiao Huang ◽  
Shuo Gao ◽  
Arokia Nathan

In Internet of Things (IoT) applications, among various authentication techniques, keystroke authentication methods based on a user’s touch behavior have received increasing attention, due to their unique benefits. In this paper, we present a technique for obtaining high user authentication accuracy by utilizing a user’s touch time and force information, which are obtained from an assembled piezoelectric touch panel. After combining artificial neural networks with the user’s touch features, an equal error rate (EER) of 1.09% is achieved, and hence advancing the development of security techniques in the field of IoT.


Author(s):  
Ali Osman Serdar Citak

The history of the development of the Internet of Things (IoT) covers the last twenty years. Despite the short of time, the concept and implementation of the Internet of Things have widely spread all over the world. The impetus of the dissemination of the concept has exponential speed. In the near future, billions of smart sensors and devices will interact with one another without human intervention. The early impact of the Internet of Things has been observed and discussed in the areas of technology, transportation, production, and marketing. The prospective effect of the Internet of Things on the finance sector has been discussed recently. In this study, the development of the concept of the Internet of Things and it is effect on the finance sector and specifically the insurance and banking sectors and future expectations have been evaluated.


Author(s):  
Mahmoud Elkhodr ◽  
Seyed Shahrestani ◽  
Hon Cheung

The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity not only to computer and mobile devices but also to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. This chapter briefly surveys some IoT applications and the impact the IoT could have on societies. It shows how the various application of the IoT enhances the overall quality of life and reduces management and costs in various sectors.


Author(s):  
Aminu Bello Usman ◽  
Jairo A. Gutierrez ◽  
Abdullahi Baffa Bichi

The internet of things (IoT) is expected to influence both architecture and infrastructure of current and future smart cities vision. Thus, the requirement and effectiveness of making cities smarter demands suitable provision of secure and efficient communication networks between IoT networking devices. Trust-based routing protocols play an important role in IoT for secure information exchange and communications between IoT networking elements. Thus, this chapter presents the foundation of trust-based protocols from social science to IoT for secure smart city environments. The chapter outlines and discusses the key ideas, notions, and theories that may help the reader to understand the current status and the possible future trends of trust-based protocols in IoT networks for smart cities. The chapter also discusses the implications, requirements, and future research challenges of trust-based protocols in IoT for smart cities.


Author(s):  
Hwa Lee

With the Americans with Disabilities Act (ADA), the past two decades have seen a proliferation of Assistive Technology (AT) and its enabling impact on the lives of people with disabilities in the areas of accessing information, communication, and daily living activities. Due to recent emergence of the Internet of Things (IoT), the fields of rehabilitation, healthcare, and education are challenged to incorporate the IoT applications into current AT services. While IoT applications continue to be developed and integrated into AT, they are still at a primitive stage where clear guidelines are yet to be developed and benefits are yet to be substantiated to ensure the quality of lives of people with disabilities. This chapter provides an overview of the IoT and AT integrated applications based on the building blocks of the IoT, along with recent trends and issues relevant to accessing technology for people with disabilities.


Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) will consist of billions (50 billions by 2020) of interconnected heterogeneous devices denoted as “Smart Objects:” tiny, constrained devices which are going to be pervasively deployed in several contexts. To meet low-latency requirements, IoT applications must rely on specific architectures designed to handle the gigantic stream of data coming from Smart Objects. This paper propose a novel Cloud architecture for Big Stream applications that can efficiently handle data coming from Smart Objects through a Graph-based processing platform and deliver processed data to consumer applications with low latency. The authors reverse the traditional “Big Data” paradigm, where real-time constraints are not considered, and introduce the new “Big Stream” paradigm, which better fits IoT scenarios. The paper provides a performance evaluation of a practical open-source implementation of the proposed architecture. Other practical aspects, such as security considerations, and possible business oriented exploitation plans are presented.


Author(s):  
Harshit Bhardwaj ◽  
Pradeep Tomar ◽  
Aditi Sakalle ◽  
Taranjeet Singh ◽  
Divya Acharya ◽  
...  

Fog computing has latency, particularly for healthcare applications, which is of the utmost importance. This research aims to be a comprehensive literature analysis of healthcare innovations for fog computing. All of these components involved special abilities. In sequence, developers must be qualified to write stable, healthy IoT programs in four distinct fields of software production: embedded, server, tablet, and web-based. Furthermore, the distributed results, IoT structure essence, dispersed abilities in programming play a deciding position. This chapter discusses the difficulties in creating the IoT method and summarizing findings and observations. Experiences of the need for and co-presence of various kinds of skills in software creation in the construction of IoT applications are discussed.


Sign in / Sign up

Export Citation Format

Share Document