Real-Life Applications of the Internet of Things
eBook - ePub

Real-Life Applications of the Internet of Things

Challenges, Applications, and Advances

  1. 510 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Real-Life Applications of the Internet of Things

Challenges, Applications, and Advances

About this book

This new volume provides an overview of the Internet of Things along with its architectures, its vital technologies, and their uses in our daily life. The book explores the integration of IoT with other emerging technologies, such as blockchain and cloud. Topics in the volume cover the many powerful features and applications of IoT, such as for weather forecasting, in agriculture, in medical science, in surveillance systems, and much more.

The first section of the book covers many of the issues and challenges that arise from the Internet of Things (IoT), exploring security challenges, such as attack detection and prevention systems, as well as energy efficiency and resource management in IoT. The volume also introduces the use of IoT and smart technology in agricultural management, in healthcare diagnosis and monitoring, and in the financial industry. Chapters also focus on surveillance network technology, the technology shift from television to video streaming apps, using IoT–fog computing for smart healthcare, detection of anomalies in climate conditions, and even detection of illegal wood logging activity.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Real-Life Applications of the Internet of Things by Monika Mangla,Ashok Kumar,Vaishali Mehta,Megha Bhushan,Sachi Nandan Mohanty in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.

PART I Issues and Challenges in IoT

CHAPTER 1 Detailed Review on Security Challenges Associated with the Internet of Things

TARANDEEP KAUR BHATIA1,2 and RAMKUMAR KETTI RAMACHANDRAN2
1School of Information Technology, Deakin University, Geelong, VIC–3220, Australia, E-mails: [email protected]; [email protected]
2Chitkara University Institute of Engineering and Technology, Punjab, India, E-mail: [email protected] (R. K. Ramachandran)

ABSTRACT

Internet of things (IoT) is the trending technology in this 21st century that aims at the interconnection of all the things in our surroundings via the internet. This chapter presents a detailed tutorial in the context of the IoT along with its description, merits, demerits, and challenges. This chapter elaborates on the main challenges faced by the field of IoT, such as unpredictable behavior, robustness, concurrency, co-ordination, and many more. However, in today’s world, one of the major challenges that IoT has to deal with is the extremely dangerous security attacks that even can destroy the entire network. So, maintaining a balance between security and privacy is a challenging task for the IoT field. Therefore, this chapter explores and reviews good journal articles that discuss the security problems in the domain of IoT also elaborate on the technology used, as well as a solution to overcome the discussed problems. Based on the knowledge gathered from all the reviewed articles, this chapter discussed the research gaps for the current going on research in the domain of IoT security that need to be addressed in the upcoming future. IoT application provides a lot of benefits to the user, but in the case, if the IoT could not be able to secure the user information as well as data from hackers, outbreaks, and vulnerabilities, then IoT would not be considered as a secure domain. Furthermore, a critical analysis has been presented graphically for the evolution of the cybersecurity market in the domain of IoT. By reading this chapter, the readers will have a complete picture of the IoT domain as well as know the necessity for managing and controlling the security challenges faced by the field of IoT. Moreover, this chapter also allows the readers to understand and choose the research issues to carry out for their future research.

1.1 INTRODUCTION

The IoT (internet of things) is the novel technology in the present period that aims at the inter-connection of every single entity in a real-world scenario [1]. With the help of this technique, we can trail anything from a distant position using Internet set-up. Also, the IoT states the association of gadgets to the internet. Cars, kitchen machines as well as pulse rate all would be associated through IoT [2]. Furthermore, as the IoT progresses in a subsequent couple of ages, further new devices will connect that rundown. IoT is considered as a structure of interrelated substances ready to collect and skill data using embedded sensors. In order to deliver the entire systems intended for a service or product, IoT acts as advanced computerization as well as analytics systems that feats big data, networking, sensing, and artificial intelligence (AI) technology. These systems allow more notable straightforwardness, control, and performance when applied to any industry or framework [3]. The IoT is a framework of interconnected computing gadgets, motorized as well as digital machinery, articles, faunas, or humans that are equipped with the unique identifier as well as the capability of transferring information over a setup without requiring a human to PC or else human to human associations [4].
The word “thing,” in the IoT things might be a human being with a heart screen implant, an animal with a bio-chip transponder, a car that has functioned in sensors to aware the car owner when tire weight is low or some other natural or man-made thing that can be allocated an IP address as well as outfitted with the capability to transfer above an internet. IoT has developed from the conjunction of wire-less skills, micro-electro-mechanical systems (MEMS), small-scale administrations as well as the web. Kevin Ashton, prime supporter as well as official chief of the Auto-ID focus at MIT, first whispered the IoT in an introduction he made in front of Procter and gamble in 1999 [5]. As per the novel research by Gartner, The IoT, which ignores PCs, tablets, and cell phones, will produce incremental income of more than $300 billion in amenities by 2020. The services involve equipment, embedded software, communications facilities as well as information amenities related to the things [6], [7]. Gartner predicted that 2.9 billion associated things will be in practice in the user area in the year 2015 and will spread over 13 billion in the year 2020. The motorized field will display the maximum progress rate at 96% in the year 2015.
Cryptography refers to the approaches and techniques which are developed and implemented for secured communication for specific channels [8, 9]. It is traditionally associated with the encryption approaches to secure the overall transmission. Security ideas can be executed simply by applying tools of cryptography for example message authentication outlines or encryption. Table 1.1 displays the evaluation of cryptography hash approaches applied in the network environment. Table 1.1 depicts different security-related algorithms with their description of various parameters. Also, Figure 1.1 shows the graphical illustration of traditional cryptography hash approaches using several parameters.

1.1.1 IOT: MERITS

The benefits of IoT navigate over each zone of lifespan as well as business. Here is a rundown of certain merits that IoT brings to the notice [7]:
  1. Enhanced Client Engagement: In the current analysis, there occurs numerous flaws in the accuracy so involvement of the client becomes quite essential.
  2. Innovation Optimization: The similar innovations that enhance client knowledge also improves gadget utilization, and help in more intense changes to advancement [8].
  3. A Decrease in Waste: Current analysis provides us shallow understanding, but IoT provides real-world information provoking a more effective organization of assets.
  4. Improved Data Gathering: Modern gathering of data encounters from its limitations and its design for passive use.

1.1.2 IOT: DEMERITS

Despite the way that IoT provides numerous benefits, it also offers asubstantial number of challenges [9]. Here is a summary of a couple of itsnoteworthy issues:
  1. Security: IoT presents an environment of frequently related devices communicating over the networks.
  2. Privacy: IoT gives extensive individual data in extreme detail without the customer’s active involvement.
  3. Complexity: IoT systems are quite complicated regarding design as well as deployment.
  4. Flexibility: Many are stressed over the flexibility of an IoT structure to facilitate quickly with another [10].
  5. Compliance: IoT, like some other innovation in the area of business, must consent to guidelines.
TABLE 1.1 Evaluation of Cryptography Hash Approaches in Network Environment
Algorithm Rounds Word Size Internal State Size Block Size Output Size (bits)
GOST 32 32 256 256 256
HAVAL 5 32 256 1,024 128
MD2 18 32 384 128 128
MD4 3 32 128 512 128
MD5 64 32 128 512 128
PANAMA 32 32 8,736 256 256
RIPEMD 48 32 128 512 128
RIPEMD-128/256 64 32 128/256 512 128/256
RIPEMD-160 80 32 160 512 160
RIPEMD-320 80 32 320 512 320
SHA-0 80 32 160 512 160
SHA-1 80 40 160 512 160
SHA-256 64 56 256 512 256
SHA-3 24 64 1,600 3,200 512
SHA3-224 24 64 1,600 1,152 224
SHA3-256 24 64 1,600 1,088 256
SHA3-384 24 64 1,600 832 384
SHA3-512 24 64 1,600 576 512
Tiger2 24 64 192 512 128
WHIRLPOOL 10 8 512 512 512
BLAKE2b 12 64 1,024 512 512
BLAKE2s 10 32 512 256 256
FIGURE 1.1 Graphical evaluation of traditional cryptography hash approaches.

1.2 CHALLENGES OF IOT

There are several challenges that IoT faces beyond costs and the ubiquity of devices such as [5]:
  1. Device Similarity: IoT gadgets are genuinely uniform. They use a similar association innovation as well as modules [6]. In this, if one framework or gadget experiences powerlessness or suffers from a susceptibility then many more have a similar issue.
  2. Long Device Life and Expired Support: One of the advantages of IoT gadgets is lifespan, although, that long life furthermore implies that they may outlast their gadget sustenance that is possible to some extent only.
  3. No Upgrade Support: Many IoT gadgets acts in the same way as other portable and little gadgets do, which is not inte...

Table of contents

  1. Cover Page
  2. Half Title Page
  3. Title Page
  4. Copyright Page
  5. About the Editors
  6. Table of Contents
  7. Contributors
  8. Abbreviations
  9. Acknowledgments
  10. Preface
  11. Organization of the Book
  12. Part I: Issues and Challenges in IoT
  13. Part II: IoT Applications
  14. Part III Integration of IoT with Blockchain and Cloud
  15. Index