619 results on '"IoT devices"'
Search Results
2. Compact planar 28/60‐GHz wideband MIMO antenna for 5G‐enabled IoT devices.
- Author
-
Farooq, Umar, Lokam, Anjaneyulu, and Mallavarapu, Sandhya
- Subjects
- *
ANTENNAS (Electronics) , *REFLECTANCE , *INTERNET of things , *STATISTICAL correlation , *RADIATORS - Abstract
Summary: This work presents a compact two‐element multi‐input‐multi‐output (MIMO) antenna for 5G‐enabled IoT devices. The antenna operates over a wide frequency range of 24.6 to 31.4 GHz (28‐GHz band) and 57.6 to 60.2 GHz (60‐GHz band). Each MIMO element consists of an inverted L‐shaped slotted radiator with a partial ground plane. The antenna offers a peak gain of 5.45 and 5.56 dBi across two operating bands. The minimum isolation between the two ports is −26.5 dB, reaching a maximum value of over −45 dB. The investigation of MIMO metrics like "envelope correlation coefficient (ECC)," "diversity gain (DG)," "mean effective gain (MEG)," "channel capacity loss (CCL)," and "total active reflection coefficient (TARC)" also show favorable characteristics. The antenna is fabricated on a 10 × 22 × 0.503 mm3 Rogers 5880 substrate. The experimental results are in close agreement with that of the simulation results. The distinguishing features of the proposed antenna such as its compact design, simple geometrical configuration, wide operating bandwidth, low ECC, and high isolation make it a strong candidate for 5G‐enabled IoT devices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. IoT malware detection using static and dynamic analysis techniques: A systematic literature review.
- Author
-
Kumar, Sumit, Ahlawat, Prachi, and Sahni, Jyoti
- Subjects
- *
MACHINE learning , *FEATURE selection , *SCHOLARLY periodicals , *INTERNET of things , *ACADEMIC conferences - Abstract
The Internet of Things (IoT) is reshaping the world with its potential to support new and evolving applications in areas, such as healthcare, automation, remote monitoring, and so on. This rapid popularity and growth of IoT‐based applications coincides with a significant surge in threats and malware attacks on IoT devices. Furthermore, the widespread usage of Linux‐based systems in IoT devices makes malware detection a challenging task. Researchers and practitioners have proposed a variety of techniques to address these threats in the IoT ecosystem. Both researchers and practitioners have proposed a range of techniques to counter these threats within the IoT ecosystem. However, despite the multitude of proposed techniques, there remains a notable absence of a comprehensive and systematic review assessing the efficacy of static and dynamic analysis methods in detecting IoT malware. This research work is a systematic literature review (SLR) that aims to offer a concise summary of the latest advancements in the field of IoT malware detection, specifically focusing on the utilization of static and dynamic analytic techniques. The SLR focuses on examining the present status of research, methodology, and trends in the area of IoT malware detection. It accomplishes this by synthesizing the findings from a wide range of scholarly works that have been published in well‐regarded academic journals and conferences. Additionally, the SLR highlights the significance of the empirical process that includes the role of selecting datasets, accurate feature selection and the utilization of machine learning algorithms in enhancing the detection accuracy. The study also evaluates the capability of different analysis techniques to detect malware and compares the performance of various models for IoT malware detection. Furthermore, the review concluded by addressing several open issues and challenges that the research community as a whole must address. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Kafka‐Shield: Kafka Streams‐based distributed detection scheme for IoT traffic‐based DDoS attacks.
- Author
-
Shukla, Praveen, Krishna, C. Rama, and Patil, Nilesh Vishwasrao
- Subjects
- *
DENIAL of service attacks , *SMART devices , *INTERNET of things , *MACHINE learning , *RESEARCH personnel - Abstract
With the rapid proliferation of insecure Internet of Things (IoT) devices, the security of Internet‐based applications and networks has become a prominent concern. One of the most significant security threats encountered in IoT environments is a Distributed Denial of Service (DDoS) attack. This attack can severely disrupt critical services and prevent smart devices from functioning normally, leading to severe consequences for businesses and individuals. It aims to overwhelm victims' resources, websites, and other services by flooding them with massive attack packets, making them inaccessible to legitimate users. Researchers have developed multiple detection schemes to detect DDoS attacks. As technology advances and other facilitating factors have increased, it is a challenge to identify such powerful attacks in real‐time. In this paper, we propose a novel distributed detection scheme for IoT network traffic‐based DDoS attacks by deploying it in a Kafka Streams processing framework named Kafka‐Shield. The Kafka‐Shield comprises two stages: design and deployment. Firstly, the detection scheme is designed on the Hadoop cluster employing a highly scalable H2O.ai machine learning platform. Secondly, a portable, scalable, and distributed detection scheme is deployed on the Kafka Streams processing framework. To analyze the incoming traffic data and categorize it into nine target classes in real time. Additionally, Kafka‐Shield stores each network flow with significant input features and the predicted outcome in the Hadoop Distributed File System (HDFS). It enables the development of new models or updating current ones. To validate the effectiveness of the Kafka‐Shield, we performed critical analysis using various configured attack scenarios. The experimental results affirm Kafka‐Shield's remarkable efficiency in detecting DDoS attacks. It has a detection rate of over 99% and can process 0.928 million traces in nearly 3.027 s. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Trust-Based Permissioned Blockchain Network for Identification and Authentication of Internet of Smart Devices: An E-Commerce Prospective.
- Author
-
Babu, Erukala Suresh, Kavati, Ilaiah, Cheruku, Ramalingaswamy, Nayak, Soumya Ranjan, and Ghosh, Uttam
- Subjects
- *
COMPUTERS , *WIRELESS Internet , *SMART speakers , *RETAIL industry , *WASHING machines - Abstract
The Internet of Things refers to billions of devices around us connected to the wireless internet. These IoT devices are memory-constrained devices that can collect and transfer data over the network without human assistance. Recently, IoT is materialized in retail commerce, transforming from recognition service to post-purchase engagement service. IoT examples in retail commerce are smart refrigerators, smart speakers, smart washing machines, smart automobiles, and automatic re-purchase of groceries using RFID tags. Despite the rise, one of the significant inconveniences slowing rapid adaption is the "security" of these devices, which are vulnerable to various attacks. One such attack is Distributed Denial-of-Service (DDoS) attacks targeting offline or online sensitive data. Hence, a lightweight cryptographic mechanism needs to establish secure communication among IoT devices. This paper presents the solution to secure communication among IoT devices using a permissioned blockchain network. Specifically, in this work, we proposed a mechanism for identifying and authenticating the smart devices using the Elliptic-curve cryptography (ECC) protocol. This proposed work uses permissioned blockchain infrastructure, which acts as a source of trust that aids the authentication process using ECC cryptosystem. In addition, lightweight Physical Unclonable Function (PUF) technology is also used to securely store the device's keys. Using this technology, the private keys need not be stored anywhere, but it is generated on the fly from the trusted zone whenever the private key is required. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Privacy Preservation in IoT Devices by Detecting Obfuscated Malware Using Wide Residual Network.
- Author
-
Alsekait, Deema, Zakariah, Mohammed, Amin, Syed Umar, Khan, Zafar Iqbal, and Alqurni, Jehad Saad
- Abstract
The widespread adoption of Internet of Things (IoT) devices has resulted in notable progress in different fields, improving operational effectiveness while also raising concerns about privacy due to their vulnerability to virus attacks. Further, the study suggests using an advanced approach that utilizes machine learning, specifically the Wide Residual Network (WRN), to identify hidden malware in IoT systems. The research intends to improve privacy protection by accurately identifying malicious software that undermines the security of IoT devices, using the MalMemAnalysis dataset. Moreover, thorough experimentation provides evidence for the effectiveness of the WRN-based strategy, resulting in exceptional performance measures such as accuracy, precision, F1-score, and recall. The study of the test data demonstrates highly impressive results, with a multiclass accuracy surpassing 99.97% and a binary class accuracy beyond 99.98%. The results emphasize the strength and dependability of using advanced deep learning methods such as WRN for identifying hidden malware risks in IoT environments. Furthermore, a comparison examination with the current body of literature emphasizes the originality and efficacy of the suggested methodology. This research builds upon previous studies that have investigated several machine learning methods for detecting malware on IoT devices. However, it distinguishes itself by showcasing exceptional performance metrics and validating its findings through thorough experimentation with real-world datasets. Utilizing WRN offers benefits in managing the intricacies of malware detection, emphasizing its capacity to enhance the security of IoT ecosystems. To summarize, this work proposes an effective way to address privacy concerns on IoT devices by utilizing advanced machine learning methods. The research provides useful insights into the changing landscape of IoT cybersecurity by emphasizing methodological rigor and conducting comparative performance analysis. Future research could focus on enhancing the recommended approach by adding more datasets and leveraging real-time monitoring capabilities to strengthen IoT devices' defenses against new cybersecurity threats. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Intelligent resource optimization for scalable and energy-efficient heterogeneous IoT devices.
- Author
-
Gupta, Shivani, Patel, Nileshkumar, Kumar, Ajay, Jain, Neelesh Kumar, Dass, Pranav, Hegde, Rajalaxmi, and Rajaram, A.
- Subjects
OPTIMIZATION algorithms ,INTERNET of things ,ENERGY consumption ,SCALABILITY ,DATA transmission systems - Abstract
Due to resource shortages and device diversity, energy efficiency and scalability issues are critical in the Internet of Things (IoT) space. Managing edge resources consistently to encourage resource sharing among devices is complex, given IoT's device heterogeneity and dynamic environmental conditions. In response to these challenges, our research presents a suite of intelligent techniques tailored for optimizing resources in IoT devices. Our solution's core component is a thorough full-stack system architecture made to flexibly handle a diverse range of IoT devices, each of which operates under resource limitations. This paradigm centers on the deployment of multiple edge servers, strategically positioned to cater to the unique requirements of IoT devices, which exhibit compatibility with heterogeneity, high performance, and adaptive intelligence. To realize this vision, we create a clustered environment within the realm of heterogeneous IoT devices. We employ an African vulture's optimization algorithm (AVOA), approach to establish connections between Cluster Head (CH) nodes. Following this crucial step, we meticulously select edge nodes situated in close proximity to the data source for transmission, reducing energy consumption and latency. Our proposed Multi-Edge-IoT system sets a new standard for efficiency within the IoT ecosystem, outperforming existing approaches in key metrics such as energy consumption, latency, communication overhead, and packet loss rate. It represents a significant stride towards the harmonious and resource-efficient operation of IoT devices in an increasingly interconnected world. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Harnessing Blockchain and IoT for Carbon Credit Exchange to Achieve Pollution Reduction Goals.
- Author
-
Boumaiza, Ameni and Maher, Kenza
- Subjects
- *
GLOBAL warming , *AIR pollution , *CARBON credits , *CARBON emissions , *BLOCKCHAINS - Abstract
The trinity of global warming, climate change, and air pollution casts an ominous shadow over society and the environment. At the heart of these threats lie carbon emissions, whose reduction has become paramount. Blockchain technology and the internet of things (IoT) emerge as innovative tools for establishing an efficient carbon credit exchange. This paper presents a blockchain and IoT-centric platform for carbon credit exchange, paving the way for transparent, secure, and effective trading. IoT devices play a pivotal role in monitoring and verifying carbon emissions, safeguarding the integrity and accountability of the trading process. Blockchain technology, with its decentralized and immutable nature, empowers the platform with transparency, reduced fraud, and enhanced accountability. This platform aims to arm organizations and individuals with the ability to actively curb carbon emissions, fostering collective efforts towards global pollution reduction goals. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Leveraging IoT Devices for Atrial Fibrillation Detection: A Comprehensive Study of AI Techniques.
- Author
-
Pedrosa-Rodriguez, Alicia, Camara, Carmen, and Peris-Lopez, Pedro
- Subjects
ARTIFICIAL intelligence ,ATRIAL fibrillation ,DEEP learning ,MACHINE learning ,INTERNET of things - Abstract
Internet of Things (IoT) devices play a crucial role in the real-time acquisition of photoplethysmography (PPG) signals, facilitating seamless data transmission to cloud-based platforms for analysis. Atrial fibrillation (AF), affecting approximately 1–2% of the global population, requires accurate detection methods due to its prevalence and health impact. This study employs IoT devices to capture PPG signals and implements comprehensive preprocessing steps, including windowing, filtering, and artifact removal, to extract relevant features for classification. We explored a broad range of machine learning (ML) and deep learning (DL) approaches. Our results demonstrate superior performance, achieving an accuracy of 97.7%, surpassing state-of-the-art methods, including those with FDA clearance. Key strengths of our proposal include the use of shortened 15-second traces and validation using publicly available datasets. This research advances the design of cost-effective IoT devices for AF detection by leveraging diverse ML and DL techniques to enhance classification accuracy and robustness. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Ecophysiology of Mediterranean Chestnut (Castanea sativa Mill.) Forests: Effects of Pruning Studied through an Advanced IoT System.
- Author
-
Chiriacò, Maria Vincenza, Samad, Nafeesa, Magnani, Federico, Vianello, Gilmo, Vittori-Antisari, Livia, Mazzoli, Ilaria, Ranieri, Roberto, and Valentini, Riccardo
- Subjects
CLIMATE change adaptation ,FRUIT trees ,CARBON cycle ,CARBON sequestration ,FOREST management ,CHESTNUT - Abstract
Chestnut (Castanea sativa Mill.) forests in the Mediterranean region are facing increasing abandonment due to a combination of factors, ranging from climate change to socioeconomic issues. The recovery of chestnut ecosystems and their preservation and valorization are key to ensuring the supply of the wide spectrum of ecosystem services they provide and to preventing detrimental environmental shifts. The study's objective was to provide evidence on the effects of different management options on the ecophysiology of chestnut forests, with diverse pruning intensities (low, medium, and high intensity versus no pruning) tested in an abandoned chestnut stand in central Italy with the aim of recovering and rehabilitating it for fruit production. Innovative Internet of Things (IoT) 'Tree Talker' devices were installed on single trees to continuously monitor and measure ecophysiological (i.e., water transport, net primary productivity, foliage development) and microclimatic parameters. Results show a reduction in water use in trees subjected to medium- and high-intensity pruning treatments, along with a decrease in the carbon sequestration function. However, interestingly, the results highlight that trees regain their usual sap flow and carbon sink activity at the end of the first post-pruning growing season and fully realign during the following year, as also confirmed by the NDVI values. As such, this paper demonstrates the efficacy of recovering and managing abandoned chestnut forests, and the initial setback in carbon sequestration resulting from pruning is rapidly remedied with the advantage of reviving trees for fruit production. Additionally, the reduced water demand induced by pruning could represent a promising adaptation strategy to climate change, bolstering the resilience of chestnut trees to prolonged and intensified drought periods, which are projected to increase under future climate scenarios, particularly in the Mediterranean region. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. IDFE:面向物联网设备识别的指纹深度提取方法.
- Author
-
唐跃中, 卢士达, 钱李烽, 位雪银, 顾荣斌, 黄君, and 李静
- Abstract
Copyright of Journal of Computer Engineering & Applications is the property of Beijing Journal of Computer Engineering & Applications Journal Co Ltd. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
12. Cybersecurity and Forensic Analysis of IP-Cameras Used in Saudi Arabia
- Author
-
Istabraq M. Alshenaif, Lujain A. Alharbi, Sandaresan Ramachandran, and Kyounggon Kim
- Subjects
cybersecurity ,digital forensics ,iot devices ,ip cameras ,smart city ,saudi arabia ,Criminal law and procedure ,K5000-5582 ,Cybernetics ,Q300-390 - Abstract
In smart city infrastructure, IP cameras play a pivotal role in crime prevention and detection. However, not much research has been conducted on IP cameras from a cybersecurity and forensics perspective. In this study, we investigate vulnerability assessment and forensic artifacts for Hanwha and Mobotix IP cameras, which are widely used in Saudi Arabia. Saudi Arabia is using IP cameras which are essential for its smart cities. In this paper, we examine IP cameras in two directions. The first is to assess the vulnerability of IP cameras through various attack scenarios such as denial of service (DoS), brute force, and unauthorized access, and we suggest countermeasures. The second shows how analysis for IP cameras can be used to investigate logs for cyberattacks. Through this study, we expect to contribute to research on cyber-attack and forensic perspectives on IP cameras to be used in smart cities.
- Published
- 2024
- Full Text
- View/download PDF
13. SC-SA: Byte-Oriented Lightweight Stream Ciphers Based on S-Box Substitution.
- Author
-
Ye, Jun and Chen, Yabing
- Subjects
- *
STREAM ciphers , *INTERNET of things , *AUTOMOBILE industry , *ARITHMETIC , *CIPHERS - Abstract
With the rapid proliferation of the Internet of Things (IoT) in recent years, the number of IoT devices has surged exponentially. These devices collect and transmit vast amounts of data, including sensitive information. Encrypting data is a crucial means to prevent unauthorized access and potential misuse. However, the traditional cryptographic schemes offering robust security demand substantial device resources and are unsuitable for lightweight deployments, particularly in resource-constrained IoT devices. On the other hand, with the automotive industry making strides in autonomous driving, self-driving vehicles are beginning to integrate into people's daily lives. Ensuring the security of autonomous driving systems, particularly in preventing hacker infiltrations, is a paramount challenge currently facing the industry. An emerging lightweight sequence cipher—aiming to strike a balance between security and resource efficiency—has been proposed in this paper based on S-box substitution and arithmetic addition. The designed security threshold is 280. It has been verified that with a slight performance disadvantage, it can reduce memory usage while ensuring the security threshold. The key stream generated by this structure exhibits excellent pseudo-randomness. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. SDDA-IoT: storm-based distributed detection approach for IoT network traffic-based DDoS attacks.
- Author
-
Shukla, Praveen, Krishna, C. Rama, and Patil, Nilesh Vishwasrao
- Subjects
- *
DENIAL of service attacks , *CYBERTERRORISM , *INTERNET of things , *MACHINE learning , *TRAFFIC flow - Abstract
In the world of connected devices, there is huge growth of less secure Internet of Things (IoT) devices, and the ease of performing sophisticated cyberattacks using these devices has posed a serious threat to the security of Internet-based services or networks. Distributed Denial of Service (DDoS) attack is one of the most significant cyberattacks. It aims to damage or exhaust victims' resources, services, or networks and make them unavailable to legitimate users. Several solutions are available in the literature to detect DDoS attacks. However, it is difficult to detect them in real-time due to today's high speed or high volume of attack traffic. Therefore, this paper proposes an Apache Storm-based distributed detection approach for IoT network traffic-based DDoS attacks, namely SDDA-IoT. SDDA-IoT is composed of two primary modules: model development and model deployment. In the case of model development, we created five distributed detection models by utilizing a Hadoop cluster and the extremely scalable H2O.ai machine learning platform. In the case of model deployment, we deploy an efficient distributed detection model on the Apache Storm stream processing framework for analyzing ingress streaming data and classifying it into seven classes in near-real-time. To create new models or update existing ones, this module also saves the highly discriminating input features of each network flow along with the predicted outcome in the Hadoop Distributed File System (HDFS). The effectiveness of the SDDA-IoT approach has been examined using a variety of configured scenarios. The experimental results show that the SDDA-IoT approach detects DDoS attacks faster than recent state-of-the-art methods and more accurately with 99%+ accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. A Dual-Step Approach for Implementing Smart AVS in Cars.
- Author
-
Poornima, Bachu and Surya Kumari, P. Lalitha
- Subjects
AUTOMATIC systems in automobiles ,MACHINE learning ,GPS receivers ,INTELLIGENT sensors ,USER interfaces - Abstract
The Smart Autonomous Vehicular System (AVS) is designed to combine technologies such as sensors, cameras, radars, and machine learning algorithms in cars. The implementation of Smart AVS in smart cars has the potential to revolutionize the automotive industry and transform the way we think about transportation. In this paper, the implementation of Smart AVS in smart cars includes two steps. Firstly, the architecture is designed using Microsoft Threat Modelling tool. Secondly, with the use of Engineering Software, smart cars are constructed and simulated to verify and validate algorithms related to autonomous driving, path planning, and other intelligent functionalities. Simulating these algorithms in a controlled virtual environment helps to identify and address issues before implementation on physical vehicles. The main advantages of using the proposed model are early detection of vulnerabilities, realistic simulation of sensor inputs, communication protocol testing, cloud integration validation, user interface, and consumer experience, and validation of compliance with security standards. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Modeling Trust in IoT Systems for Drinking-Water Management.
- Author
-
Aiche, Aicha, Tardif, Pierre-Martin, and Erritali, Mohammed
- Subjects
TRUST ,WATER purification ,DATABASES ,INTERNET of things ,MATHEMATICAL models - Abstract
This study focuses on trust within water-treatment IoT plants, examining the collaboration between IoT devices, control systems, and skilled personnel. The main aim is to assess the levels of trust between these different critical elements based on specific criteria and to emphasize that trust is neither bidirectional nor transitive. To this end, we have developed a synthetic database representing the critical elements in the system, taking into account characteristics such as accuracy, reliability, and experience. Using a mathematical model based on the (AHP), we calculated levels of trust between these critical elements, taking into account temporal dynamics and the non-bidirectional nature of trust. Our experiments included anomalous scenarios, such as sudden fluctuations in IoT device reliability and significant variations in staff experience. These variations were incorporated to assess the robustness of our approach. The trust levels obtained provide a detailed insight into the relationships between critical elements, enhancing our understanding of trust in the context of water-treatment plants. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Handling Power Depletion in Energy Harvesting IoT Devices.
- Author
-
Kang, Young-myoung and Lim, Yeon-sup
- Subjects
ENERGY harvesting ,ENERGY consumption ,WIRELESS sensor networks ,POWER resources ,SOLAR energy - Abstract
Efficient energy management is a significant task in Internet-of-Things (IoT) devices because typical IoT devices have the constraint of a limited power supply. In particular, energy harvesting IoT devices must be tolerant of complex and varying temporal/spatial environments for energy availability. Several schemes have been proposed to manage energy usage in IoT devices, such as duty-cycle control, transmission power control, and task scheduling. However, these approaches need to deal with the operating conditions particular to energy harvesting devices, e.g., power depletion according to energy harvesting conditions. In this paper, regarding a wireless sensor network (WSN) as a representative IoT device, we propose an Energy Intelligence Platform Module (EIPM) for energy harvesting WSNs. The EIPM provides harvested energy status prediction, checkpointing, and task execution control to ensure continuous operation according to energy harvesting conditions while minimizing required hardware/software overheads such as additional measurement components and computations. Our experiment results demonstrate that the EIPM successfully enables a device to cope with energy insufficiency under various harvesting conditions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. ANÁLISIS BIBLIOGRÁFICO DE LAS TECNOLOGÍAS IOT EN LA TELEMEDICINA PARA EL TRATAMIENTO DE ENFERMEDADES CARDIOVASCULARES.
- Author
-
Cedeño-Cedeño, Julexy, Chancay-García, Leonardo, and Macías-Mero, Ángelo
- Subjects
- *
MEDICAL personnel , *HEALTH facilities , *HOSPITALS , *TECHNOLOGICAL innovations , *MEDICAL care , *HEART rate monitors - Abstract
Medicine has advanced significantly, but healthcare challenges remain, especially in rural areas. Telemedicine, supported by the Internet of Things (IoT), offers a solution through remote monitoring of cardiovascular diseases. However, its implementation faces obstacles such as the lack of healthcare professionals and facilities, and insufficient coverage and technological infrastructure for efficient and secure transmission of medical data. It is crucial to review the use of IoT devices in telemedicine for heart disease, highlighting trends and challenges in an updated state-of-the-art analysis for future proposals. Using the PRISMA methodological framework, 22 studies from Scopus, IEEE Xplore and ACM databases were included. The key factors for implementing these models were found to be economic and social. The most common devices are body temperature, electrocardiogram and heart rate sensors, which, together with technologies such as Wifi and Bluetooth, play important roles in hospital systems, such as real-time monitoring and decision making. This represents a move towards a more seamless and effective integration of emerging technologies in medicine, promoting more accurate and accessible medical care. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. Use of edge resources for DNN model maintenance in 5G IoT networks.
- Author
-
Sung, Jungwoong and Han, Seung-jae
- Subjects
- *
REINFORCEMENT learning , *DEEP reinforcement learning , *ARTIFICIAL neural networks , *COMPUTER vision , *5G networks - Abstract
Internet-of-Things (IoT) services become closely coupled with machine learning and cloud computing, where the 5G network provides the connectivity for the IoT devices. The 5G network can be used not only for connecting the IoT devices to the cloud servers, but also for providing computing resources for 'edge computing'. In this paper, we propose to use the edge node resources of the 5G network for 'inferencing' and 'training' the deep neural network (DNN) models for massive IoT services. More specifically, two types of 5G edge nodes are utilized to this end: (i) the 'IoT controller', which functions as a 5G-UE (user equipment), (ii) the 'edge controller', which is collocated with 5G-UPF (user plane function) in the 5G core network. In the proposed scheme, the downsized DNN models are executed and trained at the IoT controllers. At the edge controller, a deep reinforcement learning (DRL) algorithm is executed to determine the downsizing configuration and the training configuration of the DNN models. The resource constraints of the IoT controllers are considered in these decisions. Extensive evaluations with various DNN models show the effectiveness of the proposed scheme. We show that the proposed scheme achieves proper load balancing even when the resource capacity of individual IoT controllers is very low. For example, fairly complex DNN models for computer vision can be effectively supported by using IoT controllers equipped with the resource capacity of NVIDIA Jetson Nano. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. IoT-based real-time object detection system for crop protection and agriculture field security.
- Author
-
Singh, Priya and Krishnamurthi, Rajalakshmi
- Abstract
In farming, clashes between humans and animals create significant challenges, risking crop yields, human well-being, and resource depletion. Farmers use traditional methods like electric fences to protect their fields but these can harm essential animals that maintain a balanced ecosystem. To address these fundamental challenges, our research presents a fresh solution harnessing the power of the Internet of Things (IoT) and deep learning. In this paper, we developed a monitoring system that takes advantage of ESP32-CAM and Raspberry Pi in collaboration with optimised YOLOv8 model. Our objective is to detect and classify objects such as animals or humans that roam around the field, providing real-time notification to the farmers by incorporating firebase cloud messaging (FCM). Initially, we have employed ultrasonic sensors that will detect any intruder movement, triggering the camera to capture an image. Further, the captured image is transmitted to a server equipped with an object detection model. Afterwards, the processed image is forwarded to FCM, responsible for managing the image and sending notifications to the farmer through an Android application. Our optimised YOLOv8 model attains an exceptional precision of 97%, recall of 96%, and accuracy of 96%. Once we achieved this optimal outcome, we integrated the model with our IoT infrastructure. This study emphasizes the effectiveness of low-power IoT devices, LoRa devices, and object detection techniques in delivering strong security solutions to the agriculture industry. These technologies hold the potential to significantly decrease crop damage while enhancing safety within the agricultural field and contribute towards wildlife conservation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. Emerging wireless communication technologies in Iraqi government: Exploring cloud, edge, and fog computing.
- Author
-
Mezaal, Yaqeen S., Shareef, Mustafa S., Alameri, Ban M., Saeed, Saeed R., Al-Hilali, Aqeel A., Hussein, Zaid K., and Al-Majdi, Kadhum
- Subjects
- *
WIRELESS communications , *CLOUD computing , *CAPACITY building , *STAKEHOLDERS - Abstract
This study aims to structure the implementation of a governmental cloud of things (CoT), edge computing (EC), and fog computing in Iraq in the context of sustainable wireless communication. A base of literature was built that included any challenges, opportunities, and best practices relevant to these innovative technologies to set up the background for this paper. A concept model was created that included core components (cognitive technologies and fog computing), key processes (resource analysis, infrastructure design), and stakeholders (governments, industry, community). A strategic methodology made up of stakeholder involvement, capacity building, and pilot projects was used in the project. Concerning IoT planned deployment and services provision, network infrastructure was put in place to support the devices and a higher level of security measures were recommended. Using scenario hypothesis, MATLAB simulator was employed to simulate data value distribution as well as received power distribution based on different institutions for 12 months. Monitoring and evaluation should be followed to measure performance indicators and effects on this process. Continuously improvement strategies were the highlight of the session which further stimulated innovations. Acquainted projects will be put in the function to extend the range of activities by including additional government agencies, regions, or sectors. Reporting of the collected data and funding will be done with stakeholders to share and pool knowledge. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. A Survey of Machine Learning in Edge Computing: Techniques, Frameworks, Applications, Issues, and Research Directions.
- Author
-
Jouini, Oumayma, Sethom, Kaouthar, Namoun, Abdallah, Aljohani, Nasser, Alanazi, Meshari Huwaytim, and Alanazi, Mohammad N.
- Subjects
MACHINE learning ,EDGE computing ,DISTRIBUTED computing ,DEEP learning ,DATA privacy ,ELECTRONIC data processing ,MICROCONTROLLERS - Abstract
Internet of Things (IoT) devices often operate with limited resources while interacting with users and their environment, generating a wealth of data. Machine learning models interpret such sensor data, enabling accurate predictions and informed decisions. However, the sheer volume of data from billions of devices can overwhelm networks, making traditional cloud data processing inefficient for IoT applications. This paper presents a comprehensive survey of recent advances in models, architectures, hardware, and design requirements for deploying machine learning on low-resource devices at the edge and in cloud networks. Prominent IoT devices tailored to integrate edge intelligence include Raspberry Pi, NVIDIA's Jetson, Arduino Nano 33 BLE Sense, STM32 Microcontrollers, SparkFun Edge, Google Coral Dev Board, and Beaglebone AI. These devices are boosted with custom AI frameworks, such as TensorFlow Lite, OpenEI, Core ML, Caffe2, and MXNet, to empower ML and DL tasks (e.g., object detection and gesture recognition). Both traditional machine learning (e.g., random forest, logistic regression) and deep learning methods (e.g., ResNet-50, YOLOv4, LSTM) are deployed on devices, distributed edge, and distributed cloud computing. Moreover, we analyzed 1000 recent publications on "ML in IoT" from IEEE Xplore using support vector machine, random forest, and decision tree classifiers to identify emerging topics and application domains. Hot topics included big data, cloud, edge, multimedia, security, privacy, QoS, and activity recognition, while critical domains included industry, healthcare, agriculture, transportation, smart homes and cities, and assisted living. The major challenges hindering the implementation of edge machine learning include encrypting sensitive user data for security and privacy on edge devices, efficiently managing resources of edge nodes through distributed learning architectures, and balancing the energy limitations of edge devices and the energy demands of machine learning. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Multi-Objective Evolutionary Algorithm to Optimize IoT Based Scheduling Problem Using (NSGA-II Algorithm).
- Author
-
Hussaini, Syed Mutiullah, Razak, T. Abdul, and Jamil, Muhammad Abid
- Subjects
COMPUTER systems ,PROCESS capability ,PARETO distribution ,OPERATING costs ,CLOUD computing ,EVOLUTIONARY algorithms - Abstract
Due to the continual advancements in the Internet of Things (IoT), which generate enormous volumes of data, the cloud computing infrastructure recently has received the most significance. to meet the demands made by the network of IoT devices. It is anticipated that the planned Fog computing system would constitute the next development in cloud computing. The optimal distribution of computing capacity to reduce processing times and operating costs is one of the tasks that fog computing confronts. In the IoT, fog computing is a decentralized computing approach that moves data storage and processing closer to the network's edge. This research article discusses a unique technique for lowering operating expenses and improving work scheduling in a cloud-fog environment. Non-dominated sorting genetic algorithm II (NSGA-II) is a proposal that is presented in this paper. Its purpose is to allocate service requests with the multi-objective of minimising finishing time and running cost. Determining the Pareto front that is associated with a group of perfect solutions, which are sometimes referred to as non-dominated solutions or Pareto sets, is the fundamental objective of the Pareto NSGA-II. There is a contradiction between the environmental and economic performances, which is shown by the Pareto set of suboptimal solutions that are the consequence of the bi-objective issue. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. IOT CİHAZLARINDA İNSAN HATASINDAN KAYNAKLANAN GÜVENLİK AÇIKLARININ ANALİZİ.
- Author
-
SEVİNÇ, Mevlüt and AVCI, İsa
- Abstract
Copyright of SDU Journal of Engineering Sciences & Design / Mühendislik Bilimleri ve Tasarım Dergisi is the property of Journal of Engineering Sciences & Design and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
25. Utilizing Fog Computing to Secure Smart Health Care Monitoring (SHM) in Smart Cities
- Author
-
Ljubimova, Elena, Yumashev, Alexey, Sergin, Afanasiy, Prasad, B., Lydia, E. Laxmi, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Bhateja, Vikrant, editor, Tang, Jinshan, editor, Sharma, Dilip Kumar, editor, Polkowski, Zdzislaw, editor, and Ahmad, Afaq, editor
- Published
- 2024
- Full Text
- View/download PDF
26. Research Trends and Key Themes in the Intersection of Renewable Energy and Smart Homes
- Author
-
Singh, Sneh, Walia, Siddhant, Howlett, Robert J., Series Editor, Jain, Lakhmi C., Series Editor, Somani, Arun K., editor, Mundra, Ankit, editor, Gupta, Rohit Kumar, editor, Bhattacharya, Subhajit, editor, and Mazumdar, Arka Prokash, editor
- Published
- 2024
- Full Text
- View/download PDF
27. Collaborative Communication and Monitoring Ecosystem for Elderly Care
- Author
-
Baldissera, Thais A., De Faveri, Cristiano, Oliveira, Maria A., Camarinha-Matos, Luis M., Rannenberg, Kai, Editor-in-Chief, Soares Barbosa, Luís, Editorial Board Member, Carette, Jacques, Editorial Board Member, Tatnall, Arthur, Editorial Board Member, Neuhold, Erich J., Editorial Board Member, Stiller, Burkhard, Editorial Board Member, Stettner, Lukasz, Editorial Board Member, Pries-Heje, Jan, Editorial Board Member, M. Davison, Robert, Editorial Board Member, Rettberg, Achim, Editorial Board Member, Furnell, Steven, Editorial Board Member, Mercier-Laurent, Eunika, Editorial Board Member, Winckler, Marco, Editorial Board Member, Malaka, Rainer, Editorial Board Member, Camarinha-Matos, Luis M., editor, Ortiz, Angel, editor, Boucher, Xavier, editor, and Barthe-Delanoë, Anne-Marie, editor
- Published
- 2024
- Full Text
- View/download PDF
28. Designing a Smart Lighting System for Illuminating Learning Experiences
- Author
-
Vinh, Phan Van, Dung, Phan Xuan, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Pagac, Marek, editor, Hajnys, Jiri, editor, Kozior, Tomasz, editor, Nguyen, Hoang-Sy, editor, Nguyen, Van Dung, editor, and Nag, Akash, editor
- Published
- 2024
- Full Text
- View/download PDF
29. Edge Computing Security: Overview and Challenges
- Author
-
Almubark, Hameed, Al-Raweshidy, Hamed, Jedidi, Ahmed, Kacprzyk, Janusz, Series Editor, Novikov, Dmitry A., Editorial Board Member, Shi, Peng, Editorial Board Member, Cao, Jinde, Editorial Board Member, Polycarpou, Marios, Editorial Board Member, Pedrycz, Witold, Editorial Board Member, Hamdan, Allam, editor, and Harraf, Arezou, editor
- Published
- 2024
- Full Text
- View/download PDF
30. Real-Time Monitoring and Fault Detection in AI-Enhanced Wastewater Treatment Systems
- Author
-
Mohanty, Anita, Mohanty, Subrat Kumar, Mohapatra, Ambarish G., Kostianoy, Andrey G., Series Editor, Carpenter, Angela, Editorial Board Member, Younos, Tamim, Editorial Board Member, Scozzari, Andrea, Editorial Board Member, Vignudelli, Stefano, Editorial Board Member, Kouraev, Alexei, Editorial Board Member, and Garg, Manoj Chandra, editor
- Published
- 2024
- Full Text
- View/download PDF
31. A Secure Multi-factor Authentication Framework for IoT-Environment Using Cloud Computing
- Author
-
Kumar, Vipin, Ali, Rifaqat, Sharma, Pawan Kumar, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Hassanien, Aboul Ella, editor, Anand, Sameer, editor, Jaiswal, Ajay, editor, and Kumar, Prabhat, editor
- Published
- 2024
- Full Text
- View/download PDF
32. Robust Method for Accessing IoT Devices and Blockchain for Secure Data Management
- Author
-
Verma, Saweta, Chandel, Garima, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Tan, Kay Chen, Series Editor, Shukla, Balvinder, editor, Murthy, B. K., editor, Hasteer, Nitasha, editor, Kaur, Harpreet, editor, and Van Belle, Jean-Paul, editor
- Published
- 2024
- Full Text
- View/download PDF
33. Design and Optimization of a Sub-threshold CMOS LDO Regulator with Improved Performance for IoT and Wearable Devices
- Author
-
Ameziane, Hatim, Zared, Kamal, Akhmal, Hicham, Qjidaa, Hassan, Pisello, Anna Laura, Editorial Board Member, Hawkes, Dean, Editorial Board Member, Bougdah, Hocine, Editorial Board Member, Rosso, Federica, Editorial Board Member, Abdalla, Hassan, Editorial Board Member, Boemi, Sofia-Natalia, Editorial Board Member, Mohareb, Nabil, Editorial Board Member, Mesbah Elkaffas, Saleh, Editorial Board Member, Bozonnet, Emmanuel, Editorial Board Member, Pignatta, Gloria, Editorial Board Member, Mahgoub, Yasser, Editorial Board Member, De Bonis, Luciano, Editorial Board Member, Kostopoulou, Stella, Editorial Board Member, Pradhan, Biswajeet, Editorial Board Member, Abdul Mannan, Md., Editorial Board Member, Alalouch, Chaham, Editorial Board Member, Gawad, Iman O., Editorial Board Member, Nayyar, Anand, Editorial Board Member, Amer, Mourad, Series Editor, Bendaoud, Mohamed, editor, El Fathi, Amine, editor, Bakhsh, Farhad Ilahi, editor, and Pierluigi, Siano, editor
- Published
- 2024
- Full Text
- View/download PDF
34. Securing Data in IoT-RFID-Based Systems Using Lightweight Cryptography Algorithm
- Author
-
AL-Azzawi, Ruah Mouad Alyas, AL-Dabbagh, Sufyan Salim Mahmood, Xhafa, Fatos, Series Editor, Saeed, Faisal, editor, Mohammed, Fathey, editor, and Fazea, Yousef, editor
- Published
- 2024
- Full Text
- View/download PDF
35. Review on Privacy Preservation Techniques and Challenges in IoT Devices
- Author
-
Meena, Prakash, Jajal, Brijesh, Khanna, Samrat, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Rajagopal, Sridaran, editor, Popat, Kalpesh, editor, Meva, Divyakant, editor, and Bajeja, Sunil, editor
- Published
- 2024
- Full Text
- View/download PDF
36. Securing IoT Networks Using Machine Learning, Deep Learning Solutions: A Review
- Author
-
Nikam, Vivek, Devi, S. Renuka, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Tan, Kay Chen, Series Editor, Gunjan, Vinit Kumar, editor, Kumar, Amit, editor, Zurada, Jacek M., editor, and Singh, Sri Niwas, editor
- Published
- 2024
- Full Text
- View/download PDF
37. Markov Process Based IoT Model for Road Traffic Prediction
- Author
-
Sreelatha, V., Mamatha, E., Anand, S. Krishna, Reddy, Nayana H., Howlett, Robert J., Series Editor, Jain, Lakhmi C., Series Editor, Das, Biplab, editor, Patgiri, Ripon, editor, Bandyopadhyay, Sivaji, editor, Balas, Valentina Emilia, editor, and Roy, Sukanta, editor
- Published
- 2024
- Full Text
- View/download PDF
38. Hierarchical Heterogeneous Ant Colony Optimization-Based Approach to Generate Efficient Minimal Boolean Expressions for Rekeying in Authentication of IoT Devices
- Author
-
Sreelaja, N. K., Sreeja, N. K., Yang, Xin-She, Series Editor, Dey, Nilanjan, Series Editor, and Fong, Simon, Series Editor
- Published
- 2024
- Full Text
- View/download PDF
39. Main Characteristics and Cybersecurity Vulnerabilities of IoT Mobile Devices
- Author
-
Harkai, Alisa, Howlett, Robert J., Series Editor, Jain, Lakhmi C., Series Editor, Ciurea, Cristian, editor, Pocatilu, Paul, editor, and Filip, Florin Gheorghe, editor
- Published
- 2024
- Full Text
- View/download PDF
40. An IoT-Based Telemedicine System for the Rural People of Bangladesh
- Author
-
Hasan, Raqibul, Islam, Md. Tamzidul, Rahman, Md. Mubayer, Xhafa, Fatos, Series Editor, Souri, Alireza, editor, and Bendak, Salaheddine, editor
- Published
- 2024
- Full Text
- View/download PDF
41. Smart Locking System Using AR and IoT
- Author
-
Deshpande, Varun, Vigneshwaran, P., Vishwak, Nama Venkata, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Ortis, Alessandro, editor, Hameed, Alaa Ali, editor, and Jamil, Akhtar, editor
- Published
- 2024
- Full Text
- View/download PDF
42. A Detection Approach for IoT Traffic-Based DDoS Attacks
- Author
-
Shukla, Praveen, Krishna, C. Rama, Patil, Nilesh Vishwasrao, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Challa, Rama Krishna, editor, Aujla, Gagangeet Singh, editor, Mathew, Lini, editor, Kumar, Amod, editor, Kalra, Mala, editor, Shimi, S. L., editor, Saini, Garima, editor, and Sharma, Kanika, editor
- Published
- 2024
- Full Text
- View/download PDF
43. Power Consumption Analysis as a Detection Indicator for Cyberattacks on Smart Home Devices
- Author
-
Schorr, Victoria, Kamenev, Nikolai, Bleistein, Thomas, Werth, Dirk, Wendzel, Steffen, Weigold, Thomas, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Jørgensen, Bo Nørregaard, editor, da Silva, Luiz Carlos Pereira, editor, and Ma, Zheng, editor
- Published
- 2024
- Full Text
- View/download PDF
44. A Survey Study and Comparison of Drones Communication Systems
- Author
-
Koulouris, Charalampos, Dimitrios, Piromalis, Al-Darraji, Izzat, Tsaramirsis, Georgios, Khadidos, Alaa Omar, Khadidos, Adil Omar, Papageorgas, Panagiotis, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Tan, Kay Chen, Series Editor, Goyal, Sunil Kumar, editor, Palwalia, Dheeraj Kumar, editor, Tiwari, Rajiv, editor, and Gupta, Yeshpal, editor
- Published
- 2024
- Full Text
- View/download PDF
45. Blockchain and IoT Integration for Air Pollution Control
- Author
-
Bigiotti, Alessandro, Mostarda, Leonardo, Navarra, Alfredo, Xhafa, Fatos, Series Editor, and Barolli, Leonard, editor
- Published
- 2024
- Full Text
- View/download PDF
46. Highly integrable planar-structured printed circularly polarized antenna for emerging wideband internet of things applications in the millimeter-wave band
- Author
-
Ubaid Ullah, Slawomir Koziel, and Anna Pietrenko-Dabrowska
- Subjects
Internet of things ,IoT devices ,Single-layer antenna ,Millimeter-wave ,IoT application ,Wideband designs ,Medicine ,Science - Abstract
Abstract This paper proposes a numerically and experimentally validated printed wideband antenna with a planar geometry for Internet of Things (IoT) applications. This design tackles the challenges associated with deploying IoT sensors in remote areas or across extensive geographical regions. The proposed design exploits a coplanar-waveguide-fed modified microstrip line monopole for excitation of circularly polarized waves radiating in the broadside direction. The primary design is based on perturbations of the microstrip line protracted from a grounded coplanar waveguide. The capacitively coupled short rectangular stubs are periodically inserted alternately and excited asymmetrically on each side of the microstrip line parallel to the direction of the electric field vector. The sequential phase excitation of the periodic stubs generates a rectangular-cascaded electric field, which suppresses the stop band at the open end. As a result, the antenna radiates in the broadside direction. The impedance bandwidth of the antenna exceeds 8 GHz in the 28 GHz mm-wave band, i.e., it ranged from 25 to 33.5 GHz. Additionally, an axial ratio below 3 dB is achieved within the operating band from 26 to 33.5 GHz with the alterations of the surface current using straightforward topological adjustments of the physical parameters. The average in-band realized gain of the antenna is 10 dBic when measured in the broadside direction. These results indicate that the proposed design has the potential to improve the connectivity between IoT devices and the constantly varying orientation of satellites by mitigating the polarization mismatch.
- Published
- 2024
- Full Text
- View/download PDF
47. The impact of Caputo-Fabrizio fractional derivative and the dynamics of noise on worm propagation in wireless IoT networks
- Author
-
B.S.N. Murthy, M.N. Srinivas, V. Madhusudanan, Anwar Zeb, Elsayed M. Tag-Eldin, Sina Etemad, and Shahram Rezapour
- Subjects
Wireless sensor network ,IoT devices ,Caputo-Fabrizio derivative ,Sumudu transform ,White noise ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
The main objective of this article on Wireless sensor network of the Internet of Things (IoT). The wireless network, B bluetooth network, infrared network, and other networks are the key components of the Internet of Things (IoT). The major emphasis of this work was on the impact of Caputo-Fabrizio fractional derivative on worm propagation in heterogeneous susceptible-exposed-infected-recovered wireless IoT devices. We first determined the equilibrium points and fundamental reproduction number for the Caputo-Fabrizio HSEIR system, and then we discussed the stability of the system at the worm propagation equilibrium point. Using the Picard-Lindeof method, we determine the existence and unique solution for the fractional CF system of the heterogeneous SEIR model. Next, we use fixed point theory to judge the stability of the iterative method. We investigate the impact of the derivative order on the behaviour of the resultant functions and acquired numerical values by computing the model's findings for various fractional orders. In addition, we compute the integer-order model's results and contrast them with the results of the fractional-order model. We develop a periodically intermittent controller driven by white noise with the amazing benefits of reduced cost and more adaptable control technique to restrict the spread of worms in wireless IoT networks. To clearly define the conditions for stability in probability one, we employ the stochastic analysis technique. Our results show that the nonlinear worm propagation system may be stabilised by intermittent stochastic perturbation under the parameters of intermittent time linked to stochastic perturbation strength. Our theoretical conclusions may be used to analyse the observable processes of the worm, design countermeasures to prevent its spread, and evaluate the consequences of various system parameters.
- Published
- 2024
- Full Text
- View/download PDF
48. Highly integrable planar-structured printed circularly polarized antenna for emerging wideband internet of things applications in the millimeter-wave band.
- Author
-
Ullah, Ubaid, Koziel, Slawomir, and Pietrenko-Dabrowska, Anna
- Abstract
This paper proposes a numerically and experimentally validated printed wideband antenna with a planar geometry for Internet of Things (IoT) applications. This design tackles the challenges associated with deploying IoT sensors in remote areas or across extensive geographical regions. The proposed design exploits a coplanar-waveguide-fed modified microstrip line monopole for excitation of circularly polarized waves radiating in the broadside direction. The primary design is based on perturbations of the microstrip line protracted from a grounded coplanar waveguide. The capacitively coupled short rectangular stubs are periodically inserted alternately and excited asymmetrically on each side of the microstrip line parallel to the direction of the electric field vector. The sequential phase excitation of the periodic stubs generates a rectangular-cascaded electric field, which suppresses the stop band at the open end. As a result, the antenna radiates in the broadside direction. The impedance bandwidth of the antenna exceeds 8 GHz in the 28 GHz mm-wave band, i.e., it ranged from 25 to 33.5 GHz. Additionally, an axial ratio below 3 dB is achieved within the operating band from 26 to 33.5 GHz with the alterations of the surface current using straightforward topological adjustments of the physical parameters. The average in-band realized gain of the antenna is 10 dBic when measured in the broadside direction. These results indicate that the proposed design has the potential to improve the connectivity between IoT devices and the constantly varying orientation of satellites by mitigating the polarization mismatch. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
49. Extended Review Concerning the Integration of Electrochemical Biosensors into Modern IoT and Wearable Devices.
- Author
-
Bocu, Razvan
- Subjects
BIOSENSORS ,ELECTRONIC equipment ,DIGITAL technology ,INTERNET of things ,ARTIFICIAL implants ,ELECTROCHEMICAL apparatus - Abstract
Electrochemical biosensors include a recognition component and an electronic transducer, which detect the body fluids with a high degree of accuracy. More importantly, they generate timely readings of the related physiological parameters, and they are suitable for integration into portable, wearable and implantable devices that are significant relative to point-of-care diagnostics scenarios. As an example, the personal glucose meter fundamentally improves the management of diabetes in the comfort of the patients' homes. This review paper analyzes the principles of electrochemical biosensing and the structural features of electrochemical biosensors relative to the implementation of health monitoring and disease diagnostics strategies. The analysis particularly considers the integration of the biosensors into wearable, portable, and implantable systems. The fundamental aim of this paper is to present and critically evaluate the identified significant developments in the scope of electrochemical biosensing for preventive and customized point-of-care diagnostic devices. The paper also approaches the most important engineering challenges that should be addressed in order to improve the sensing accuracy, and enable multiplexing and one-step processes, which mediate the integration of electrochemical biosensing devices into digital healthcare scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. Res-DFNN: An NN-Based Device Fingerprint Extraction Method Using Network Packet Data.
- Author
-
Zhong, Yinan, Pan, Mingyu, Chen, Yanjiao, and Xu, Wenyuan
- Subjects
- *
DATA packeting , *ARTIFICIAL neural networks , *BIOMETRIC identification , *INTERNET of things - Abstract
The past few years have witnessed a wider adoption of Internet of Things (IoT) devices. Since IoT devices are usually deployed in an open and uncertain environment, device authentication is of great importance. However, traditional device fingerprint (DF) extraction methods have several disadvantages. First, existing DF extraction methods need private information from devices to compute DFs, which puts the privacy of devices at stake. Second, the manually designing features-based methods suffer from poor performance. To tackle these limitations, we propose a Linear Residual Neural Network-based DF extraction method, Res-DFNN, which utilizes network packet data in the pcap file to generate DF. The key block is designed according to symmetry, and it is verified by simulation that our method achieves better performance in both non-private and privacy-preserving scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.