Internet of Things (IoTs) Research Papers (original) (raw)
In an increasingly connected world, security is a top concern for Internet of Things (IoT). These IoT devices have to be inexpensive implying that they will be constrained in storage and computing resources. In order to secure such... more
In an increasingly connected world, security is a top concern for Internet of Things (IoT). These IoT devices have to be inexpensive implying that they will be constrained in storage and computing resources. In order to secure such devices, highly efficient public key cryptosystems (PKC) are critical. Elliptic Curve Cryptography (ECC) is the most commonly implemented PKC in use today. In this paper, an alternate and a more efficient PKC, called the PEC (Pells Equation Cryptography) has been proposed based on Pells equation: x 2 − D * y 2 ≡ 1 (mod p). It is shown that scalar multiplication in PEC is significantly more efficient compared to ECC. It is also shown that the Discrete Logarithm Problem-computing the private key from the public key-in PEC is at least as hard as that of ECC.
3rd International Conference on Blockchain and Internet of Things (BIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Blockchain and Internet of Things.... more
3rd International Conference on Blockchain and Internet of Things (BIoT 2022) will provide
an excellent international forum for sharing knowledge and results in theory, methodology and
applications of Blockchain and Internet of Things. The Conference looks for significant
contributions to all major fields of the Blockchain and Internet of Things in theoretical and
practical aspects.
Authors are solicited to contribute to the conference by submitting articles that illustrate research
results, projects, surveying works and industrial experiences that describe significant advances in
the areas of Blockchain and Internet of Things.
Floods are one of the most frequently occurring natural disasters in Indonesia. It is therefore of special concern to reduce the risk of flood fatalities and other damage. The purpose of this study is to design a flood early warning... more
Floods are one of the most frequently occurring natural disasters in Indonesia. It is therefore of special concern to reduce the risk of flood fatalities and other damage. The purpose of this study is to design a flood early warning system based on the Internet of Things (IoT). In this work, we use an ultrasonic HC-SR04 sensor to collect information about water levels. Further, we use an MCU8266 node as a microcontroller to analyze the sensor data and test it using a fuzzy inference system (FIS). To monitor the server activities, a Blink application is used as an iCloud IoT to hook up to smartphone devices. The test results show that all the devices function properly and that the system can classify water levels into normal, standby, alert, and danger categories in real time. Thus, the server can send information to the output device before a flood disaster occurs.
Internet of things (IoT) means connecting things or electronic objects with each other or with their manufacturers sharing data and information. It can also be called a cloud which connects multiple devices and gathers information from... more
Internet of things (IoT) means connecting things or electronic objects with each other or with their manufacturers sharing data and information. It can also be called a cloud which connects multiple devices and gathers information from those devices. Objects/things can be smart devices or electronic bio-implants in humans or animals. Structure of internet mainly depend upon functionality rather than security and when we are talking about interconnection of these things, definitely security is also an issue because with the interconnection of smart systems private data is also at stake. There are many types of threats to IoT but in this paper we will only discuss Distributed Denial of Service (DDoS) attacks on Network Layer and Application Layer, which are capable of targeting and penetrating a victim from multiple sources seizing the resources of the network, and making them unavailable to the network’s users. In order to prevent from such an attack we need a way to detect and mitigate it. Over the time many people proposed multiple ways to stop it but there is no legitimate way to get rid of a DDoS attack on Internet of Things because of limited power of small devices.
Objects can easily be remotely sensed, monitored and controlled when home is automated using the Internet of Things (IoT); this will give room for direct integration of the real world into computerized systems. Energy consumption is... more
Objects can easily be remotely sensed, monitored and controlled when home is automated using the Internet of Things (IoT); this will give room for direct integration of the real world into computerized systems. Energy consumption is defined as the degree of the amount of power expended by a given load in an electric circuit. Nowadays, inefficient techniques used in monitoring and control of power consuming devices has contributed immensely in the high rate of power consumption in our homes, institutions, business places, and marketplaces. The design and implementation of an IoT-based home automation, energy management and smart security system has been proposed in this paper. The components used in the development of the system unit include an ESP8266 Wi-Fi component and the universal Arduino imbedded controller. The proposed scheme is aimed at assisting and supporting an efficient usage of power, and by doing so, power consumption as well as the risk of fire outbreaks will be great...
The Internet of Things has allowed the connection of a countless number of devices, which has facilitated control and even decision-making by them, but at the same time security vulnerabilities in operating systems, wireless security... more
The Internet of Things has allowed the connection of a countless number of devices, which has facilitated control and even decision-making by them, but at the same time security vulnerabilities in operating systems, wireless security protocols, its applications, as well as the vulnerabilities in IoT, acronym in English of Internet of Things, devices, have allowed considerable sums of money to be paid to health institutions and patients for allowing the functionality of their equipment, according to security experts the world is facing a perfect storm which can allows attacks and system hijackings increasing in number, volume and gravity, since when adding more devices, they become access doors for intruders. However, it is important to be aware that everything that connects to the Internet is vulnerable; it has been demonstrated since birth, as well as the IoT.
- by Visión Electrónica and +1
- •
- Sensors, Dispositivos, Internet of Things (IoT), Devices
Agriculture contributes a remarkable breakthrough in any country's socioeconomic evolution. The shortcoming of natural resources degrades the potentiality of the world's farmland. In this paper, the semi-indoor hydroponic nutrition system... more
Agriculture contributes a remarkable breakthrough in any country's socioeconomic evolution. The shortcoming of natural resources degrades the potentiality of the world's farmland. In this paper, the semi-indoor hydroponic nutrition system is designed and automated using Arduino UNO. microcontroller. The semi-indoor hydroponic system integrates IoT for qualitative food production and sustainable urban farming. An array of sensors is used, such as depth sensor, humidity sensor, temperature sensor, and water leak sensor, to sense and detect the conditions of the system. With the help of IoT, we can monitor and control the hydroponic system and maintain the necessary values. A mobile app controls the actuators, and the sensor's data will be stored on the Thing Speak cloud. Additionally, renewable energy is used to power the hydroponics system through the solar panel.
- by Vennu Roopa and +1
- •
- Internet of Things (IoTs)
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against... more
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube attack. We exhibit our attack against Simeck32/64 using the Hamming weight leakage assumption to extract linearly independent equations in key bits. We have been able to find 32 linearly independent equations in 32 key variables by only considering the second bit from the LSB of the Hamming weight leakage of the internal state on the fourth round of the cipher. This enables our attack to improve previous attacks on Simeck32/64 within side-channel attack model with better time and data complexity of 2 35 and 2 11.29 respectively.
Since the introduction of Internet of Things (IoT), e-health has become one of the main research topics. Due to the sensitivity of patient data, preserving the privacy of patients appears to be challenging. In healthcare applications,... more
Since the introduction of Internet of Things (IoT), e-health has become one of the main research topics. Due to the sensitivity of patient data, preserving the privacy of patients appears to be challenging. In healthcare applications, patient data are usually stored in the cloud, which makes it difficult for the users to have enough control over their data. However, due to the General Data Protection Regulation (GDPR), it is the data subject's right to know where and how his data has been stored, who can access his data and to what extent. In this paper, we propose a blockchain-based architecture for e-health applications which provides an efficient privacy-preserving access control mechanism. We take advantage of Blockchain (BC) special features, i.e., immutability and anonymity of users, while modifying the classic blockchain structure in order to overcome its challenges in IoT applications (i.e., low throughput, high overhead and latency). To this end, we cluster the miners of BC, store and process data at the nearest cluster to the patient. While our proposal is a work in progress, we provide a security analysis of our proposed architecture.
The drainage system is the action of draining waste water and sticky liquid components towards the rivers using particular patterns, drainage channels and streams. Drainage system basically refers to all the piping within the private and... more
The drainage system is the action of draining waste water and sticky liquid components towards the rivers using particular patterns, drainage channels and streams. Drainage system basically refers to all the piping within the private and public premises which conveys sewage, rainwater and other liquid waste to a point of disposal. The connected devices will make the drainage system more comfortable to operate, monitor, control with less resources and to take necessary actions.
Internet of Things (IoT) is a new technological revolution of the Internet. IoT is and can be said the expansion of internet services. It is changing the way we work and live by saving time and resources and opening new opportunities for... more
Internet of Things (IoT) is a new technological revolution of the Internet. IoT is and can be said the expansion of internet services. It is changing the way we work and live by saving time and resources and opening new
opportunities for growth, innovation and knowledge creation. Internet of Things is the general idea of things, especially everyday objects that are readable, recognizable, locatable, addressable, and/or controllable via the Internet, irrespective of the communication means .IoT allows everyone to be connected anytime and anywhere. It provides a platform for communication between objects where objects can organize and manage themselves. Objects can be communicated between each other by using radio frequency identification (RFID), wireless sensor network (WSN), Zigbee, etc. IoT is embodied in a wide spectrum of networked products, systems and sensors, which take advantage of advancements in computing power, electronics miniaturization, and network interconnections to offer new capabilities not previously possible.
ABSTACT Fog computing is a prime example that extends Cloud computing and Internet of Things (IoT) application services to the edge of the network. Correlated to Cloud, Fog computing provides data transferring, larger and more immediate... more
ABSTACT
Fog computing is a prime example that extends Cloud computing and Internet of Things (IoT) application services to the edge of the network. Correlated to Cloud, Fog computing provides data transferring, larger and more immediate storage bandwidth and application services to end users. This innovative architecture stands in close correlation with its Cloud counterpart. As it is well known Cloud faces various security and privacy problems thus inheriting most of them to Fog computing along side some new security and privacy challenges because of Fog's distinct characteristics. Later on, we will cite these new challenges and threads.
In this study, we present a new scheme for smart education utilizing the concept of a blockchain for question sharing. A two-phase encryption technique for encrypting question papers (QSPs) is proposed. In the first phase, QSPs are... more
In this study, we present a new scheme for smart education utilizing the concept of a blockchain for question sharing. A two-phase encryption technique for encrypting question papers (QSPs) is proposed. In the first phase, QSPs are encrypted using a timestamp, and in the second phase, previously encrypted QSPs are encrypted again using a timestamp, salt hash, and hash from the previous QSPs. These encrypted QSPs are stored in a blockchain along with a smart contract that helps the user to unlock the selected QSP. An algorithm is also proposed for selecting a QSP for the exam that randomly picks a QSP. Moreover, a timestamp-based lock is imposed on the scheme so that no one can decrypt the QSP before the allowed time. Security analysis is conducted to demonstrate the feasibility of the proposed scheme against different attacks. Finally, the effectiveness of the proposed scheme is demonstrated through implementation, and the superiority of the proposed scheme over existing schemes is ...
The current prominence and future promises of the Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT) are extensively reviewed and a summary survey report is presented. The analysis clearly... more
The current prominence and future promises of the Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT) are extensively reviewed and a summary survey report is presented. The analysis clearly distinguishes between IoT and IoE which are wrongly considered to be the same by many people. Upon examining the current advancement in the fields of IoT, IoE and IoNT, the paper presents scenarios for the possible future expansion of their applications.
In this paper, we discuss the most significant application opportunities and outline the challenges in performing a real-time and energy-efficient management of the distributed resources available at mobile devices and Internet-to-Data... more
In this paper, we discuss the most significant application opportunities and outline the challenges in performing a real-time and energy-efficient management of the distributed resources available at mobile devices and Internet-to-Data Center. We also present an energy-efficient adaptive scheduler for Vehicular Fog Computing (VFC) that operates at the edge of a vehicular network, connected to the served Vehicular Clients (VCs) through an Infrastructure-to-Vehicular (I2V) over multiple Foglets (Fls). The scheduler optimizes the energy by leveraging the heterogeneity of Fls, where the Fl provider shapes the system workload by maximizing the task admission rate over data transfer and computation. The presented scheduling algorithm demonstrates that the resulting adaptive scheduler allows scalable and distributed implementation.
Formation Python - Les fichiers JSON en Python - Yassine Ben Salah - Yassine Ben Ghriba
- by Yassine Ben Salah and +1
- •
- Machine Learning, Artifical Intelligence, Data Science, Big Data
It is fascinating to know that the multiplexing can be employed and defined from different points of views and different disciplines. For example, Dr. E. Julius Dasch, former manager of the NASA National Space Grant Program, defines... more
It is fascinating to know that the multiplexing can be employed and defined
from different points of views and different disciplines. For example, Dr. E. Julius
Dasch, former manager of the NASA National Space Grant Program, defines multiplexing on his dictionary book [1] as:
…the simultaneous transmission of different data from a spacecraft using a single
channel. The data stream is separated into frames that carry codes for different
information, such as temperatures, pressures, and the state of on-board computers.
In a media and communication dictionary book [2], multiplexing is mentioned as:
Digital television transmission allows for multiplexing, whereby multiple channels
are bundled together and sent simultaneously in a single stream of data.
In a computer science dictionary book [3], multiplexing is described as:
…the process of combining multiple messages simultaneously on the same physical or
logical transmission medium. There are two main types: time division multiplexing
(TDM) and frequency division multiplexing (FDM).
The list continues for the Internet, optic engineering, graphics, phytography,
laser and photonics geology, earth sciences, and many more.
In this paper, the proposed system has demonstrated three ways of detecting alcohol level in the body of the car driver and prevent car driver from driving the vehicle by turning off the ignition system. It also sends messages to... more
In this paper, the proposed system has demonstrated three ways of detecting alcohol level in the body of the car driver and prevent car driver from driving the vehicle by turning off the ignition system. It also sends
messages to concerned people. In order to detect breath alcohol level MQ-3 sensor is included in this module along with a heartbeat sensor which can detect the heart beat rate of driver, facial recognition using webcam & MATLAB and a Wi-Fi module to send a message through the TCP/IP App, a Raspberry pi module to turn off the ignition and an alarm as prevention module. If a driver alcohol intake is more than the
prescribed range, set by government the ignition will be made
off provided either his heart beat abnormal or the driver is
drowsy. In both the cases there will be a message sent to the
App and from the App you can send it to family, friend, and
well-wisher or nearest cop for the help. The system is
developed considering the fact if driver is drunk and he needs
a help, his friend can drive the car if he is not drunk. The
safety of both the driver and the surroundings are aimed by
this system and this aids in minimizing death cases by drunken
driving and also burden on the cops.
Keywords — Drowsy state detection, Drunken state Detection,
Internet of Things, Facial recognition, Prevention models,
Raspberry Pi.
In this work, two embroidered chipless octagonal-shaped RFID tags on cotton fabric for wearable applications are presented. The first tag is designed by using silver-coated polyamide conductive fibre (HC12) and the second tag is... more
In this work, two embroidered chipless octagonal-shaped RFID tags on cotton fabric for wearable applications are presented. The first tag is designed by using silver-coated polyamide conductive fibre (HC12) and the second tag is embroidered by using highly conductive Vectran (LIBERATOR 40) which is a highly conductive multifilament yarn spun from Liquid Crystal Polymers (LCP), on cotton fabrics. The proposed tag's design uses a Frequency Selective Surface (FSS) technique for the frequency range of 8 to 18GHz and fabricated by using commercial ZSK Technical Embroidery System JCZA. The tag design is composed of six concentric octagonal loop resonators with one unitary element. The desired data bits are obtained by a series of comparative experiments for Radar Cross Section (RCS) in an anechoic chamber. The experimental results obtained show that the 4-bit data codeword is accurately retrieved with the variation of distance by up to 1.8m at 0dBm. Moreover, the experimental results include on-body RCS measurements and the bending effects on both of the tags. The tags are compared to the state of the art tags in a comparative table.
There is a growing requirement for Internet of Things (IoT) infrastructure to ensure low response time to provision latency-sensitive real-time applications such as health monitoring, disaster management, and smart homes. Fog computing... more
There is a growing requirement for Internet of Things (IoT) infrastructure to ensure low response time to provision latency-sensitive real-time applications such as health monitoring, disaster management, and smart homes. Fog computing offers a means to provide such requirements, via a virtualized intermediate layer to provide data, computation, storage, and networking services between Cloud datacenters and end users. A key element within such Fog computing environments is resource management. While there are existing resource manager in Fog computing, they only focus on a subset of parameters important to Fog resource management encompassing system response time, network bandwidth, energy consumption and latency. To date no existing Fog resource manager considers these parameters simultaneously for decision making, which in the context of smart homes will become increasingly key. In this paper, we propose a novel resource management technique (ROUTER) for fog-enabled Cloud computing environments, which leverages Particle Swarm Optimization to optimize simultaneously. The approach is validated within an IoT-based smart home automation scenario, and evaluated within iFogSim toolkit driven by empirical models within a small-scale smart home experiment. Results demonstrate our approach results a reduction of 12% network bandwidth, 10% response time, 14% latency and 12.35% in energy consumption.
Internet of Things (IoTs) is a global platform of Internet connected smart devices that have been argued to improve the supply chain integration (SCI). While the positive effect of IoT capability on SCI influencing supply chain and firm... more
Internet of Things (IoTs) is a global platform of Internet connected smart devices that have been argued to improve the supply chain integration (SCI). While the positive effect of IoT capability on SCI influencing supply chain and firm performance is empirically validated, exploratory study in this context is limited. Drawing upon the organisational capability theory, this study investigates the use of IoTs in enhancing the integration of suppliers, customers and internal activities of the retail supply chain. Interviews of managers across Australian retail industry were analysed using Nvivo. The thematic analysis reveals the added capability of IoTs that improves supply chain visibility, auto-capture and information sharing for greater SCI. The IoT-enabled integration capability demonstrates a positive effect on cost, quality, delivery, and flexibility of the entire supply chain and improves retail firm's sustainable performance with financial, social and environmental outcomes.
Internet-of-Things (IoT) is becoming an emerging trend where most of the digital and physical things are connected and can be interacted with the help of Internet. Since the usage of IoT devices are increasing, there is a need for better... more
Internet-of-Things (IoT) is becoming an emerging trend where most of the digital and physical things are connected and can be interacted with the help of Internet. Since the usage of IoT devices are increasing, there is a need for better security. In this paper, we propose a new cryptographic architecture for IoT devices which is based on honey encryption scheme.
Our proposed system enables maintenance and control of electric poles i.e the street lights. It will be easier to monitor and control the operation of street lights. The system will detect faults in the street lights to intimate the... more
Our proposed system enables maintenance and control of electric poles i.e the street lights. It will be easier to monitor and control the operation of street lights. The system will detect faults in the street lights to intimate the control room to take immediate action. This application will have the following features viz. automatic circuit fault detection, pole inclination detection, and light sensing. This project aims for designing and executing the advanced development in embedded systems for energy saving of street lights. Currently, we have a manual system where the street lights will be switched ON in the evening before the sunsets and they are switched OFF in the next day morning after there is sufficient light on the outside[1]. But the actual timing for these lights to be switched ON is when there is absolute darkness. With this, the power will be wasted up to some extent. This project gives a solution for electrical power wastage.[2]
Smartness is generating several new contentions in terms of pragmatic aesthetics and interaction design, stimulating a debate on how design and advanced technologies can impact on reshaping human lives and behaviors. Many issues are... more
Smartness is generating several new contentions in terms of pragmatic aesthetics and interaction design, stimulating a debate on how design and advanced technologies can impact on reshaping human lives and behaviors. Many issues are currently arising not just in relation to the appearance of smart objects or spaces, but also in terms of relational communication, pleasurable experiences, and perception. It's time to think of what will rule the aesthetic of this new artificial. Thanks to tangible examples of smart furniture, including prototypes and concepts at a very experimental stage, the analysis will help to zoom on Next Design Aesthetics, also based on the methodologies applied while delivering a course on Smart Solutions for domestic environments within a Design School. However, the chosen examples will support our assumptions, clarifying how technology should be increasingly integrated in contemporary lifestyle, though never overhanging human nature.
This project is to development the centralized cloud-based system using sensors that monitor and analyse air pollution. The collected data by sensor node stored on cloud server that can be accessed through web browser from anywhere using... more
- by IERJ Journal
- •
- Clouds, Air pollution, Arduino, Sensors
In this paper, we propose an intelligent and secure internet of things approach for the healthcare system that monitors the patient heart rate in real-time and from any place. Thanks to the agent, the proposed system can predict the... more
In this paper, we propose an intelligent and secure internet of things approach for the healthcare system that monitors the patient heart rate in real-time and from any place. Thanks to the agent, the proposed system can predict the critical condition before it even happens and takes fast and apt decisions in an emergency case. Based on the experimentation, the proposed system is convenient, reliable, and ensures data security at a low cost. The proposed algorithm outperforms other algorithms regarding the system's operational efficiency. It is more suitable for devices with power, storage, and processing limitations, such as in IoT devices. Also, agents are the better current technologies for heterogeneous and distributed systems, such as the internet of things. Moreover, this approach's scalability makes it suitable for a broad range of IoT environments, including smart homes, smart cities, dynamic and large-area networks, etc.
In modern days, many people have fish as their pets at home. The fishes have been fed by the aquarist in the aquarium tanks which demands a proper setup for maintenance. The problems faced are changes in water quality, feeding the fish,... more
In modern days, many people have fish as their pets at home. The fishes have been fed by the aquarist in the aquarium tanks which demands a proper setup for maintenance. The problems faced are changes in water quality, feeding the fish, maintaining the temperature, controlling the lights, and difficulty checking the conditions of an aquarium manually. Therefore, it's necessary to monitor the physical parameters closely and enhance the water condition. So, this project proposes a system that is equipped with sensors to be operated in real-time. It performs temperature monitoring, water pH level detection, turbidity detection, and fish feeding. An IoT-based system is implemented to monitor and deliver the status of the aquarium to the user's web application. Thus, intelligent aquarium management has been implemented with a temperature sensor, pH sensor, and turbidity sensor so that the fish is neither over nor underfed and thereby reducing the manual effort required in the maintenance of the aquarium.
The Internet of things is a platform, which connects and controls the real word objects through a wireless network. This paper presents a novel approach to collect the data from the sensors, which resides on a Mechatronic devices. Using... more
The Internet of things is a platform, which connects and controls the real word objects through a wireless network. This paper presents a novel approach to collect the data from the sensors, which resides on a Mechatronic devices. Using communication protocols these devices are integrated with the cloud based IoT data logger. There will be a communication between the data logger and the server. Android based application developed will monitor the action of devices.
Cricket requires a non-stop of performance by one team in batting until a violation of the playing rules is encountered. That non-peacefully-effective a encoded decision, the possible Wicket of a batsman-may have a significant effect on... more
Cricket requires a non-stop of performance by one team in batting until a violation of the playing rules is encountered. That non-peacefully-effective a encoded decision, the possible Wicket of a batsman-may have a significant effect on the course of the batting side, and ultimately on the game. Some dismissals are indisputable, but a significant minority are the subject of decisions by umpires. Some of these are complex situations yet need rapid decision-making, and television slow-motion replays have highlighted the problem of apparent wrong calls. The impact of such decisions on batsmen and on part of match that is a inning totals can be simulated and consequently estimated to assess their importance.
In recent years, the Internet of Things (IoT) has become well known. It has attracted much attention thanks to its powerful application in different fields. Currently, billions of IoT devices are connected. The massive rise in the number... more
In recent years, the Internet of Things (IoT) has become well known. It has
attracted much attention thanks to its powerful application in different fields. Currently, billions of IoT devices are connected. The massive rise in the number of connected devices instantly produces further data that requires high storage and processing technology. Besides, the IoT equipment has limited processing, and storage capability did not allow data processing or even storage. Also, things cannot make smart and quick decisions to achieve their goals, and the thing ability to communicate with other things depends on service similarity and communication protocols; this will impact the performance, efficiency, development, and scalability of IoT applications. This thesis provides three main contributions, in the first contribution, we propose a Cloud-IoT approach to provide an efficient solution for the storage and analysis of data generated by IoT applications and improve IoT scalability. In order to demonstrate the viability of the proposed approach, a Cloud-IoT system for remote patient monitoring is developed.
IoT security becomes a more challenging problem due to the computing and communication limits of IoT devices make IoT more vulnerable to security and privacy attacks. Hence, as a second contribution, we propose a robust solution based on lightweight cryptography to ensure data security. Also, we have used the access control mechanism to ensure data privacy. The experimentation demonstrates that the proposed solution more suitable for IoT devices. To tap the most out of massive data streams, IoT needs real-time management and analysis of data. In order to enhance the intelligence of IoT devices and to improve our first approach, we have developed an efficient, autonomous, and real-time solution based on the agent for data management and analysis as a third contribution. The proposed system can make fast and apt decisions in an emergency case.
Controlled and precise delivery of fluid is one of the essential requirement in many fluid flow applications such as micro fluidics, Micro Electro Mechanical Systems, micro-machining and in medicinal biological systems. Such deliveries... more
Controlled and precise delivery of fluid is one of the essential requirement in many fluid flow applications such as micro fluidics, Micro Electro Mechanical Systems, micro-machining and in medicinal biological systems. Such deliveries are commonly achieved using syringe pump which generally employs syringes driven by an electric motor. In this work a syringe pump is operated with a Raspberry Pi-System on Single Chip, which is more user friendly than a control with an ordinary microcontroller. It runs on Linux platform which is easy to code and control using Python language. The syringe pump is actuated by stepper motor which has 200 steps per revolution so that precise flow rate is possible compared to other electrical actuators. The stepper is connected to a Dual H-Bridge L293D motor driver, which in turn is powered through the GPIO (General Purpose Input / Output) pins-an integral part of the Raspberry pi. Lead screw mechanism is used in this work to transmit rotary motion of the motor to linear motion of syringe. The pitch length travelled by the screw is minimal and controllable, resulting in a precise flow rate of the fluid which is measured experimentally.
2nd International Conference on Cloud Computing and IOT (CCCIOT 2021) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Cloud computing and IoT. The aim of the... more
2nd International Conference on Cloud Computing and IOT (CCCIOT 2021) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Cloud computing and IoT. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Wind farms are set up in highly exposed sites. Wind is fluctuating in nature and hence a continuous monitoring system is needed. The wind turbine is used for converting wind energy into a useful form of energy. In this project the various... more
Wind farms are set up in
highly exposed sites. Wind is fluctuating in nature and hence a
continuous monitoring system is needed. The wind turbine is
used for converting wind energy into a useful form of energy. In
this project the various parameters of wind are measured and
monitored by setting up an instrumentation system. Due to
environmental conditions, the remote location of wind farms,
and the vertical height of the nacelle, it is expensive to physically
visit wind turbines for maintenance and repair. So, we proposed
the system to monitor the status of wind turbine from anywhere
in the world using Internet of Things (IoT) technology. In our
present work, it is declared that the system with IoT and
Universal Asynchronous Receiver/Transmitter (UART) to
monitor and diagnose the problem in the wind turbine
application. The work deals with the data transmission between
two units in the exact time without any disturbance.
Contaminated water became a major issue for our country over the last few decades. One of the main reasons behind this scenario is urbanization and industrialization. Every industry should have an Effluent Treatment Plant (ETP) for... more
Contaminated water became a major issue for our country over the last few decades. One of the main reasons behind this scenario is urbanization and industrialization. Every industry should have an Effluent Treatment Plant (ETP) for treating industrial wastewater and safe disposal to the environment. We implement a system that monitors whether an industry uses ETP or not. To monitor ETP, we need to monitor the untreated wastewater quality. The traditional way offers us a method that is time-consuming and inefficient. To solve this problem, we adopt a model based on Wireless Sensor Networking (WSN), which allows us to keep track of the water quality parameters in real-time. This paper proposes a water quality monitoring system that uses WSN and Internet of Things (IoT) based devices to monitor different parameters of water: temperature by a temperature sensor, turbidity by a turbidity sensor, and pH by a pH sensor. Moreover, the microcontroller of Arduino Uno R3 collects the parameter values from these sensors and transmits the values to the IoT based cloud server using the GSM module. The GSM module is also used to alert the supervisors by sending SMS in case of an emergency. Integrating modules such as sensors, Arduino Uno R3, GSM module, enhances the purpose of the desired system. Finally, we calculate the Water Quality Index (WQI) for the pH and turbidity data to report the water quality status. Also, we compare the WQI status with our cloud status, and it shows excellent performance.
Internet of Things (IoT) constitutes a pivotal contributor to the Industry 4.0 (I 4.0) vision, technologically transforming production and societies. It enables novel services through the seamless integration of devices, such as motes... more
Internet of Things (IoT) constitutes a pivotal contributor to the Industry 4.0 (I 4.0) vision, technologically transforming production and societies. It enables novel services through the seamless integration of devices, such as motes carrying sensors, with the Internet. However, the broad adoption of IoT technologies is facing security issues due to the direct access to the devices from the Internet, the broadcasting nature of the wireless media, and the potential unattended operation of relevant deployments. In particular, the Routing over Low Power and Lossy Networks (RPL) protocol, a prominent IoT solution, is vulnerable to a large number of attacks, both of general-purpose and RPL-specific nature, while the resource-constraints of the corresponding devices are making attack mitigation even more challenging, e.g., in terms of involved control overhead and detection accuracy. In this paper, we introduce ASSET, a novel Intrusion Detection System (IDS) for RPL with diverse profiles to tackle the above issues that mitigate at least 13 attacks. At the same time, other solutions go up to eight. ASSET, inspired by the network softwarization paradigm, supports a novel, extendable workflow, bringing together three anomaly-detection and four RPL specification-based mechanisms, a novel attacker identification process, as well as multiple attack mitigation strategies. Our IDS also supports an adaptable control & monitoring protocol, trading overhead for accuracy, depending on the network conditions. The proof-ofconcept experiments show that ASSET entails a low overhead for the different modes of operation it supports (i.e., 6.28 percent on average) compared to other solutions reaching up to 30 percent. At the same time, it also keeps the power consumption at acceptable levels (from 0.18 up to 1.54 percent more). Moreover, it provides 100 percent accuracy for specific attacks and can identify the attacker in far more attacks than any other similar solution.
In this paper, we explain the most important phase of security architecture for Internet of Things (IoT) based on software-defined networking (SDN). In this context, the SDN-based architecture is executed with or without the... more
In this paper, we explain the most important phase of security architecture for Internet of Things (IoT) based on software-defined networking (SDN). In this context, the SDN-based architecture is executed with or without the infrastructure; this is also called as SDN-Domain. This works gives briefing of the operations of the proposed architecture and summarizes the opportunity to achieve network security in a more effective and flexible with the presence of SDN. In this paper, we assumed the network access control and global traffic monitoring for ad-hoc networks. Finally, we point out the architectural design choices for SDN using Open Flow and discuss their performance implications.
IoT in human services is the central member in giving better clinical offices to the patients and encourages specialists and hospitals. The proposed framework here comprises different clinical gadgets, for example, sensors and online or... more
IoT in human services is the central member in giving better clinical offices to the patients and encourages specialists and hospitals. The proposed framework here comprises different clinical gadgets, for example, sensors and online or versatile-based applications that impart system-associated gadgets and assist with checking and recording patients' well being information and clinical data. The proposed result of the paper is to manufacture a framework to give a world-class clinical guide to the patients even in the remotest territories without any hospitals in their zones by interfacing over the Internet and grasping data through about their well being status using the wearable gadgets gave in the unit utilizing a raspberry pi microcontroller which would have the option to record the patient's pulse, circulatory strain. The framework will be brilliant to imply the patient's relatives and their primary care physician about the patient's present well being status and full clinical data if any health-related crisis emerges. The gathered data can be utilized to investigate and anticipate ongoing issues or different disorders, such as coronary episodes in the fundamental stage using the information mining strategies that will likewise give the methodology favorable to dynamic.
Vital signs monitoring is a customarily repetitive, tedious part of patient care that nonetheless requires constant measurements and documentations to avert significant adverse consequences. Routinely performed by nurses, measurements of... more
Vital signs monitoring is a customarily repetitive, tedious part of patient care that nonetheless requires constant measurements and documentations to avert significant adverse consequences. Routinely performed by nurses, measurements of vital signs are recorded at regular intervals for safeguarding patient safety yet some evidence concerning the frequency of noncompliance in vital sign collection as well as the inaccuracy of vital sign measurements is still at large. This paper covered the development of a patient monitoring device using hardware modules such as pulse rate sensor, sphygmomanometer, and body temperature sensor that communicates through wireless technology protocol based on IEEE 802.15.4 standard for synchronous measurements of multiple vital signs such as body temperature, pulse rate, and blood pressure. Physiological data accuracy based from the Modified Early Warning Score was measured by Bland-Altman and Pearson correlation analysis, and user acceptability was inspected using IoT technology trust model with the aid of health professionals and patients from hospitals and diagnostic centers. Vital sign measurements by VITAL APP and health professionals correlated well, and the device was accepted as an important tool in patient monitoring.
The word hydroponics has its derivation from the combination of two Greek words, hydro meaning water and ponos meaning labour, i.e., working water. Hydroponics used to be considered a system where there was no growing media at all, such... more
The word hydroponics has its derivation from the combination of two Greek words, hydro meaning water and ponos meaning labour, i.e., working water. Hydroponics used to be considered a system where there was no growing media at all, such as the nutrient film technique in vegetables. But today it's accepted that a soil-less growing medium is often used to support the plant root system physically and provide for a favourable buffer of solution around the root system. The system that is used will be automated to prevent many disadvantages that we have in a manual system.
The Internet of Things is one of the techniques that has experienced rapid development, covering hundreds of applications in many fields, as it allows the use of sensors and monitoring systems to collect and analyze data and also to... more
The Internet of Things is one of the techniques that has experienced rapid development, covering hundreds of applications in many fields, as it allows the use of sensors and monitoring systems to collect and analyze data and also to improve the productivity of agricultural crops through remote monitoring and decision-making based on real data.
This work is considered as a study and implementation of the Internet of Things system for the remote control of greenhouses by controlling the following climatic factors as temperature, humidity and water required by special sensors: DHT11 and the soil sensor. In this research, we have developed:
1. Android application and website which allow the display of information on climatic factors in real time on the main interface and stored in the Google Firebase database
which was sent via the nodemcu control unit, and the possibility to reset the actuators:
lamps, fan and pump according to the requirements necessary for growth.
2. A mini greenhouse prototype allowed us to test surveillance systems and perform remote control.
Internet-connected technologies have become mainstays of the modern household. From Internet of Things (IoT) connected coffee makers to sophisticated adaptive climate control systems, inexpensive wireless technology and the popularity of... more
Internet-connected technologies have become mainstays of the modern household. From Internet of Things (IoT) connected coffee makers to sophisticated adaptive climate control systems, inexpensive wireless technology and the popularity of voice-activated digital assistants have enabled a wide variety of connected technology. Most of this technology remains closed source. However, many popular connected technologies such as Nest or ecoBee rely on closed source protocols and private cloud backends. What happens to the hardware when these companies go out of business or shut down older services? VueZone shut down its services leaving owners with severely crippled IoT cameras. This paper focuses on building a proof of the concept of open source IoT-connected garage real time controller (GarageRTC). It presents the features, design, and implementation of a reference architecture built on an ESP32 microcontroller and free real-time operating system (FreeRTOS). The results show that the GarageRTC meets most of the performance and design requirements as identified in the concept and requirements phase. The system is more than capable of proving responsive interactivity with a residential garage door system. Moreover, benchmarking-functionally-the system against other commercial offerings enables it-due to its platform flexibility-to outperform its commercial counterparts.
India is agriculture sector, on either side, is losing ground every day, affecting the ecosystem's output capacity. In order to restore vitality and put agriculture back on a path of higher growth, there is a growing need to resolve the... more
India is agriculture sector, on either side, is losing ground every day, affecting the ecosystem's output capacity. In order to restore vitality and put agriculture back on a path of higher growth, there is a growing need to resolve the issue. A large-scale agricultural system necessitates a great deal of upkeep, knowledge, and oversight. The IoT is a network of interconnected devices that can transmit and receive data over the internet and carry out tasks without human involvement. Agriculture provides a wealth of data analysis parameters, resulting in increased crop yields. The use of IoT devices in smart farming aids in the modernization of information and communication. For better crop growth moisture, mineral, light and other factors can be assumed. This research looks into a few of these characteristics for data analysis with the goal of assisting users in making better agricultural decisions using IoT. The technique is intended to help farmers increase their agricultural output.
Internet of Things (IoT) is an ecosystem of connected physical objects that are accessible through the internet. IOT devices are used in many application fields which make the users' day to day life more comfortable. These devices are... more
Internet of Things (IoT) is an ecosystem of connected physical objects that are accessible through the internet. IOT devices are used in many application fields which make the users' day to day life more comfortable. These devices are used to collect temperature, blood pressure, and sugar level etc., which are used to evaluate the health condition of the patient. Communicating the collected information to the doctor, making accurate decision on the data collected and notifying the patient is the challenging task in the IOT. In this project, An IoT based Patient Health Monitoring System (PHMS) using Arduino is proposed to collect the required parameters and evaluate the data obtained from the sensor devices. PHMS with arduino also gives the notifications to patient with possible precautionary measures to be practiced by them. This system suggests the patient with medical care and next step to be followed in case of critical situation. The combination of IoT with arduino is the new way of introducing Internet of Things in Health care Monitoring system of patients. Arduino Uno board collects data from the sensors and transfer wirelessly to IoT website. The Proposed PHMS system is evaluated for certain parameters like heartbeat, body temperature, blood pressure etc. and the decisions can be made based on the data obtained from IoT website.
Perkembangan jumlah pengguna aplikasi Instant Messenger (IM) yang sangat pesat menyebabkan naiknya potensi tindakan kriminal dilakukan melalui aplikasi IM. Fitur keamanan data aplikasi IM yang ditujukan untuk melindungi privasi... more
Perkembangan jumlah pengguna aplikasi Instant Messenger (IM) yang sangat pesat menyebabkan naiknya potensi tindakan kriminal dilakukan melalui aplikasi IM. Fitur keamanan data aplikasi IM yang ditujukan untuk melindungi privasi penggunanya, digunakan oleh pelaku kriminal untuk menyembunyikan bukti digital dari aktivitas kriminalnya. Penelitian ini membahas mengenai analisa dan perbandingan bukti digital dari aplikasi IM pada Android yang telah diunduh sebanyak 500 juta orang di Play Store, yaitu WhatsApp, Telegram, Line, dan IMO. Proses analisa dilakukan pada bukti digital dari penggunaan fitur yang ada di aplikasi IM, sehingga proses pengumpulan data dibantu dengan simulasi dari beberapa skenario yang berpotensi terjadi dalam tindakan kriminal. Teknik akuisisi data dilakukan dengan metode physical imaging untuk mendapatkan akses penuh pada memori smartphone. Hasil analisa disimpulkan dalam bentuk tabel perbandingan yang dapat dirujuk oleh investigator forensik ketika melakukan investigasi aplikasi IM yang diteliti. Hasil analisa menyatakan bahwa bukti digital dari aktivitas tukar menukar pesan, berkas media, dan kontak ditemukan. Hasil analisa juga memberikan penjelasan mengenai kemungkinan untuk menganbil bukti digital yang dihapus dan bagaimana cara memulihkannya dengan teknik data carving.
As the enhancement of Internet of Things (IoT) networks and its vast use by various industry, it is one fear may arise that construction industry may have left behind the other industry.That is why the construction industry should start... more
As the enhancement of Internet of Things (IoT) networks and its vast use by various industry, it is one fear may arise that construction industry may have left behind the other industry.That is why the construction industry should start the use of applications offered by IoT to ascertain the smoothness and fast progress of the construction process.At present, developing countries like India, needs fast development of infrastructure and construction, so the better solution is to use IoT applications to boost the speed of construction. So this paper aims to check the feasibility of IoT in the construction industry and to find out the IoT applications which may help for fast and quality development of construction. Some research papers and thesis are to be reviewed critically to find out the adoptability of IoT applications in several phases of construction industry during project life cycle.
In recent days numerous individuals have experienced the ill effects Of medical issues like heart related, cardiovascular, malignancy and various illnesses. Epilepsy is like a complex network disease, those who have seizures, which are... more
In recent days numerous individuals have experienced the ill effects Of medical issues like heart related, cardiovascular, malignancy and various illnesses. Epilepsy is like a complex network disease, those who have seizures, which are controlled, and those who struggle on a daily basis. Many epilepsy patients cannot call for help during a seizure, because of the unconscious so it can lead to injuries, medical Complications and loses memory during the seizure attack. The seizures happen because of electrical activity in the brain, causing a sudden change in behavior at times seizures appear to be unique and on what part of the cerebrum they influence. This paper proposes a methodology for epilepsy individual which uses sensor to evaluate the parameters of the patients like temperature, fall of the patient, shaken of the hand and sound of the patient. The patient's status can be seen on PC through IOT so that the specialist/attendants can occasionally screen the patient's epilepsy.
In the information technology field, the Internet of Things (IoT) is considered as the forthcoming technological boom. Although related paradigms such as mobile computing and pervasive computing help understanding the concept of... more
In the information technology field, the Internet of Things (IoT) is considered as the forthcoming technological boom. Although related paradigms such as mobile computing and pervasive computing help understanding the concept of "connecting in anytime, at anywhere, and for everyone", the term "internet of things" is used for visualizing a global perspective about objects and items connected, which is the same as the connection for everything. IoT is an inseparable part of the future Internet, which in network development and the existing and evolving internet. IoT can be conceptually defined as dynamic global network infrastructure for smart ecosystem creation and, with its capabilities, can form configurations based on standardized and compatible communication protocols, in which everything is "physical and virtual." Almost all businesses are aware of the potential achievements that IoT has provided, but they are not sure how to achieve them. The Internet of Things is a modern trend in the industry and a high priority is to consider the different dimensions involved with this area. In order to transition to the new economy, do businesses working in the non-digital sector look at their internal business model differently and are they able to adopt this technology? In this article, a general company architecture model is presented in this regard and briefly regarding the difficulties and eventually their impact on different facets of future firms. Moreover, a business model that is based on the findings of Holler et al. was examined. This model consists of three dimensions: who, where, and why. The collaboration of business partners that creates a "value network" was described by the term "who". The term "where" refers to the sources of collaboration value creation that are rooted in the digital object layer model and the term "why" defines the partners who benefit from collaborating in the value network. The proposed framework for the strategy, tactics and elements of the value chain is integrated to address "how" this model works.
Stroke onset during night-time sleep referred as wake-up stroke, where a patient awakens with stroke symptoms that were not present before falling asleep. The symptoms of wake-up stroke are not clearly known; it is only noticed upon... more
Stroke onset during night-time sleep referred as wake-up stroke, where a patient awakens with stroke symptoms that were not present before falling asleep. The symptoms of wake-up stroke are not clearly known; it is only noticed upon waking. Without knowledge of the stroke onset time, this large group of patients is excluded from treatment with tissue plasminogen (tPA) activator. This research studies stroke risk prediction during sleep, i.e., wake-up stroke prediction using Internet of Things (IoT). Stroke prediction through intelligence technology and prediction algorithms which controlled by hyper-connected self-machine learning engine. The idea achieved through building a knowledge base including physiological data, motion data, bio signal, risk factors and electronic health record. The physiological, biosignal, and motion data will be measured through wearable and embedded sensors. This paper focused on briefly explaining the conceptual idea and related information of the elderly stroke prediction while sleeping using IoT.
Customer loyalty and business credibility are the currency for the success of all e-commerce platforms, as well as, the most prevalent challenge to the pervasive adoption of 'online shopping' in Nigeria given its acclaimed boon to both... more
Customer loyalty and business credibility are the currency for the success of all e-commerce platforms, as well as, the most prevalent challenge to the pervasive adoption of 'online shopping' in Nigeria given its acclaimed boon to both businesses and customers, particularly, SMEs. This study bridges the gap between sellers and their patrons by utilizing a multi-shop e-commerce application design approach as opposed to the single-shop approach employed by most e-commerce applications found all over the Internet. This web application is built using the Agile Software Development methodology, employing HTML5, CSS3 and Native JavaScript for content, presentation and behavior respectively. PHP and MySQL are used for the backend functionalities. The multi-shop application offers innumerable benefits to participatory SMEs and customers considering that the payoffs are hinged on already existing seller-customer relationships. Consequently, customers can purchase genuine products from their trusted vendors with all the inherent ease of an online shopping experience.