
Real-Life Applications of the Internet of Things
Challenges, Applications, and Advances
- 510 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Real-Life Applications of the Internet of Things
Challenges, Applications, and Advances
About this book
This new volume provides an overview of the Internet of Things along with its architectures, its vital technologies, and their uses in our daily life. The book explores the integration of IoT with other emerging technologies, such as blockchain and cloud. Topics in the volume cover the many powerful features and applications of IoT, such as for weather forecasting, in agriculture, in medical science, in surveillance systems, and much more.
The first section of the book covers many of the issues and challenges that arise from the Internet of Things (IoT), exploring security challenges, such as attack detection and prevention systems, as well as energy efficiency and resource management in IoT. The volume also introduces the use of IoT and smart technology in agricultural management, in healthcare diagnosis and monitoring, and in the financial industry. Chapters also focus on surveillance network technology, the technology shift from television to video streaming apps, using IoT–fog computing for smart healthcare, detection of anomalies in climate conditions, and even detection of illegal wood logging activity.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
PART I Issues and Challenges in IoT
CHAPTER 1 Detailed Review on Security Challenges Associated with the Internet of Things
ABSTRACT
1.1 INTRODUCTION
1.1.1 IOT: MERITS
- Enhanced Client Engagement: In the current analysis, there occurs numerous flaws in the accuracy so involvement of the client becomes quite essential.
- Innovation Optimization: The similar innovations that enhance client knowledge also improves gadget utilization, and help in more intense changes to advancement [8].
- A Decrease in Waste: Current analysis provides us shallow understanding, but IoT provides real-world information provoking a more effective organization of assets.
- Improved Data Gathering: Modern gathering of data encounters from its limitations and its design for passive use.
1.1.2 IOT: DEMERITS
- Security: IoT presents an environment of frequently related devices communicating over the networks.
- Privacy: IoT gives extensive individual data in extreme detail without the customer’s active involvement.
- Complexity: IoT systems are quite complicated regarding design as well as deployment.
- Flexibility: Many are stressed over the flexibility of an IoT structure to facilitate quickly with another [10].
- Compliance: IoT, like some other innovation in the area of business, must consent to guidelines.
| Algorithm | Rounds | Word Size | Internal State Size | Block Size | Output Size (bits) |
|---|---|---|---|---|---|
| GOST | 32 | 32 | 256 | 256 | 256 |
| HAVAL | 5 | 32 | 256 | 1,024 | 128 |
| MD2 | 18 | 32 | 384 | 128 | 128 |
| MD4 | 3 | 32 | 128 | 512 | 128 |
| MD5 | 64 | 32 | 128 | 512 | 128 |
| PANAMA | 32 | 32 | 8,736 | 256 | 256 |
| RIPEMD | 48 | 32 | 128 | 512 | 128 |
| RIPEMD-128/256 | 64 | 32 | 128/256 | 512 | 128/256 |
| RIPEMD-160 | 80 | 32 | 160 | 512 | 160 |
| RIPEMD-320 | 80 | 32 | 320 | 512 | 320 |
| SHA-0 | 80 | 32 | 160 | 512 | 160 |
| SHA-1 | 80 | 40 | 160 | 512 | 160 |
| SHA-256 | 64 | 56 | 256 | 512 | 256 |
| SHA-3 | 24 | 64 | 1,600 | 3,200 | 512 |
| SHA3-224 | 24 | 64 | 1,600 | 1,152 | 224 |
| SHA3-256 | 24 | 64 | 1,600 | 1,088 | 256 |
| SHA3-384 | 24 | 64 | 1,600 | 832 | 384 |
| SHA3-512 | 24 | 64 | 1,600 | 576 | 512 |
| Tiger2 | 24 | 64 | 192 | 512 | 128 |
| WHIRLPOOL | 10 | 8 | 512 | 512 | 512 |
| BLAKE2b | 12 | 64 | 1,024 | 512 | 512 |
| BLAKE2s | 10 | 32 | 512 | 256 | 256 |

1.2 CHALLENGES OF IOT
- Device Similarity: IoT gadgets are genuinely uniform. They use a similar association innovation as well as modules [6]. In this, if one framework or gadget experiences powerlessness or suffers from a susceptibility then many more have a similar issue.
- Long Device Life and Expired Support: One of the advantages of IoT gadgets is lifespan, although, that long life furthermore implies that they may outlast their gadget sustenance that is possible to some extent only.
- No Upgrade Support: Many IoT gadgets acts in the same way as other portable and little gadgets do, which is not inte...
Table of contents
- Cover Page
- Half Title Page
- Title Page
- Copyright Page
- About the Editors
- Table of Contents
- Contributors
- Abbreviations
- Acknowledgments
- Preface
- Organization of the Book
- Part I: Issues and Challenges in IoT
- Part II: IoT Applications
- Part III Integration of IoT with Blockchain and Cloud
- Index