Advances in Internet of Things

Journal Information
ISSN / EISSN : 2161-6817 / 2161-6825
Published by: Scientific Research Publishing, Inc. (10.4236)
Total articles ≅ 91
Archived in

Latest articles in this journal

Fuyu Tao, Pengchao Li
Advances in Internet of Things, Volume 12, pp 1-8;

This paper discusses the advantages of IPv6 technology compared with IPv4, such as address capacity, automatic address allocation, mobile connection characteristics, security and confidentiality, quality of service, and multicast transmission. The key summary summarizes the application of IPv6 technology in the four industries of power, finance, home, and education. Since there is almost no application of IPv6 technology in the public security industry in the previous literature, the author proposes the application innovation of IPv6 technology in the public security industry according to his own industry. IPv6 technology can be applied to the work communication, information exchange, case investigation, and social security management of public security departments, which helps to improve the level of public security work, the quality of the people’s police, and the efficiency of public security affairs, thereby improving the safety and satisfaction of the general public. Spend. It has a certain reference significance to make a great contribution to reducing the crime rate, creating a harmonious social environment, and truly realizing the integration of police and civilians.
Nahla Fatahelrahman Ibrahim, Johnson Ihyeh Agbinya
Advances in Internet of Things, Volume 12, pp 9-17;

In this paper, we survey a number of studies in the literature on improving lightweight systems in the Internet of Things (IoT). The paper illustrates recent development of Boolean cryptographic function Application and how it assists in using hardware such as the internet of things. For a long time there seems to be little progress in applying pure mathematics in providing security since the wide progress made by George Boole and Shannon. We discuss cryptanalysis of Boolean functions to avoid trapdoors and vulnerabilities in the development of block ciphers. It appears that there is significant progress. A comparative analysis of lightweight cryptographic schemes is reported in terms of execution time, code size and throughput. Depending on the schemes and the structure of the algorithms, these parameters change but remain within reasonable values making them suited for Internet of things applications. The driving force of lightweight cryptography (LWC) stems mainly from its direct applications in the real world since it provides solutions to actual problems faced by designers of IoT systems. Broadly speaking, lightweight cryptographic algorithms are designed to achieve two main goals. The first goal of a cryptographic algorithm is to withstand all known cryptanalytic attacks and thus to be secure in the black-box model. The second goal is to build the cryptographic primitive in such a way that its implementations satisfy a clearly specified set of constraints that depend on a case-by-case basis.
Norman Gwangwava, Tinashe B. Mubvirwi
Advances in Internet of Things, Volume 11, pp 59-76;

Design and implementation of Internet of Things (IoT) systems require platforms with smart things and components. Two dominant architectural approaches for developing IoT systems are mashup-based and model-based approaches. Mashup approaches use existing services and are mainly suitable for less critical, personalized applications. Web development tools are widely used in mashup approaches. Model-based techniques describe a system on a higher level of abstraction, resulting in very expressive modelling of systems. The article uses Cisco packet tracer 7.2 version, which consists of four subcategories of smart things—home, smart city, industrial and power grid, to design an IoT based control system for a fertilizer manufacturing plant. The packet tracer also consists of boards—microcontrollers (MCU-PT), and single boarded computers (SBC-PT), as well as actuators and sensors. The model facilitates flexible communication opportunities among things—machines, databases, and Human Machine Interfaces (HMIs). Implementation of the IoT system brings finer process control as the operating conditions are monitored online and are broadcasted to all stakeholders in real-time for quicker action on deviations. The model developed focuses on three process plants; steam raising, nitric acid, and ammonium nitrate plants. Key process parameters are saturated steam temperature, fuel flowrates, CO and SOx emissions, converter head temperature, NOx emissions, neutralisation temperature, solution temperature, and evaporator steam pressure. The parameters need to be monitored in order to ensure quality, safety, and efficiency. Through the Cisco packet tracer platform, a use case, physical layout, network layout, IoT layout, configuration, and simulation interface were developed.
Faisal Alghayadh, Debatosh Debnath
Advances in Internet of Things, Volume 11, pp 10-25;

With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and sensors are connected to the internet, and these devices can easily become the target of attacks. To mitigate the risk of using smart home devices, the security and privacy thereof must be artificially smart so they can adapt based on user behavior and environments. The security and privacy systems must accurately analyze all actions and predict future actions to protect the smart home system. We propose a Hybrid Intrusion Detection (HID) system using machine learning algorithms, including random forest, X gboost, decision tree, K -nearest neighbors, and misuse detection technique.
Omar H. Alhazmi, Khalid S. Aloufi
Advances in Internet of Things, Volume 11, pp 26-41;

Internet of Things (IoT) environments are being deployed all over the globe. They have the potential to form solutions to applications, from small scale applications to national and international ones. Therefore, scalability, performance, and security form a triangle of requirements that must be carefully set. Furthermore, IoT applications require higher security standards. A previously proposed IoT application framework with a security embedded structure using the integration between message queue telemetry transport (MQTT) and user-managed access (UMA) is analyzed in this work. The performance analysis of the model is presented. Comparing the model with existing models and different design structures shows that the model presented in this work is promising for a functioning IoT design model with security. The results and analysis showed that the built-in security model had performed better than models with other frameworks, especially with fog implementation.
Hussein Abdel-Jaber, Hussein Albazar, Ahmed Abdel-Wahab, Malak El Amir, Areej Alqahtani, Mohammed Alobaid
Advances in Internet of Things, Volume 11, pp 141-152;

Blind people have many tasks to do in their lives. However, blindness generates challenges for them to perform their tasks. Many blind persons use a traditional stick to move around and to perform their tasks. But the obstacles are not detected in traditional stick, it is ineffective for visually impaired people. The blind person has no idea what kind of objects or obstacles are in front of him/her. The blind person has no idea what size the object is or how far away he or she is from it. It is difficult for a blind person to get around. To assist people with vision impairment by making many of their daily tasks simple, comfortable, and organized, they will be able to recognize anything (an obstacle for blind people). A smart stick with mobile application can be used. One of the solutions is a mobile-based Internet of Things solution, which is a stick intended to assist visually impaired people to navigate more easily. It enables blindness and low vision people to navigate and carry out their daily tasks with ease and comfort. A technologically advanced blind stick that enables visually impaired people to move with ease. This paper proposes a system of software and hardware that helps visually impairment people to find their ways in an easy and comfortable way. The proposed system uses smart stick and mobile application to help blind and visually impaired people to identify objects (such as walls, tables, vehicles, people, etc.) in their ways, this can enable them to avoid these objects. In addition, as a result, the system will notify the user through sound from the smartphone. Finally, if he/she gets lost, he will be able to send an SMS with his/her GPS location.
Yanbo Huang, Wei Ma, Daniel Fisher
Advances in Internet of Things, Volume 11, pp 1-9;

Real time monitoring of herbicide spray droplet drift is important for crop production management and environmental protection. Existing spray droplet drift detection methods, such as water-sensitive paper and tracers of fluorescence and Rubidium chloride, are time-consuming and laborious, and the accuracies are not high in general. Also, the tracer methods indirectly quantify the spray deposition from the concentration of the tracer and may change the drift characteristics of the sprayed herbicides. In this study, a new optical sensor system was developed to directly detect the spray droplets without the need to add any tracer in the spray liquid. The system was prototyped using a single broadband programmable LED light source and a near infrared sensor containing 6 broadband spectral detectors at 610, 680, 730, 760, 810, and 860 nm to build a detection system for monitoring and analysis of herbicide spray droplet drift. A rotatory structure driven by a stepper motor in the system was created to shift the droplet capture line going under the optical sensor to measure and collect the spectral signals that reflect spray drift droplets along the line. The system prototype was tested for detection of small (Very Fine and Fine), medium (Medium), and large (Coarse) droplets within the droplet classifications of the American Society of Agricultural and Biological Engineers. Laboratory testing results indicated that the system could detect the droplets of different sizes and determine the droplet positions on the droplet capture line with 100% accuracy at the wavelength of 610 nm selected from the 6 bands to detect the droplets.
Daniel K. Fisher, Reginald S. Fletcher, Saseendran S. Anapalli
Advances in Internet of Things, Volume 11, pp 42-58;

Many options exist for developing and implementing monitoring systems for research and scientific applications. Commercially, available systems and devices, however, are usually built using proprietary tools and programming instructions, and often offer limited flexibility for end users. The use of open-source hardware and software has been embraced by the research and scientific communities and can be used to target unique data and information requirements. Development based on the Arduino microcontroller project has resulted in many successful applications, and the Arduino hardware and software environment continues to expand and become more powerful but can be intimidating for users with limited electronics or programming experience. The open-source Python language has gained in popularity and is being taught in schools and universities as an introduction to computer programming and software development due to its simple structure, ease of use, and large standard library of functions. A project called CircuitPython was developed to extend the use of Python to programming hardware devices such as programmable microcontrollers and maintains much of the original Python language and features, with additional support for accessing and controlling microcontroller hardware. The objective of the work reported here is to discuss the CircuitPython programming language and demonstrate its use in the development of research and scientific applications. Several open-source sensing and monitoring systems developed using open-source hardware and the open-source CircuitPython programming language are presented and described.
Febronie Nambajemariya, Yongshun Wang
Advances in Internet of Things, Volume 11, pp 113-122;

Transportation, as one of the most common aspects people use in their daily lives, has resulted in highly complex traffic in urban areas due to the large number of private vehicles. As some results of the traffic congestion, there is energy consumption, environmental pollution, unplanned accidents, and time is wasted due to congestion and traffic jams. With the aid of the Internet of Things (IoT), which is an excellent computerized technology solution for all field claims, Internet of Things (IoT) technology has recently provided an efficient and effective traffic management system, especially in transportation, due to the combined functions IoT can handle, there are management, monitoring, tracking, identifying, computing, and so on. This article provided a comprehensive overview of a variety of intelligent management systems that have been built using IoT to alleviate traffic congestion.
Sana Abdelaziz Bkheet, Johnson I. Agbinya
Advances in Internet of Things, Volume 11, pp 153-174;

The Internet of Things (IOT) is a recent technology originating from the field of sensor networks. It has received significant attention because it is involved in most aspects of our daily lives. The IOT vision makes objects of various kinds become part of the Internet by assigning each object a unique identifier, enabling objects to communicate with each other in the same or different environments. IOT can collect, process, and exchange data via a data communication network. There are many methods for identifying objects; some have existed since the beginning of IOT innovation, such as Radio Frequency Identification (RFID), Barcode/2D code, IP address, Electronic Product Codes (EPC), etc. Continuous development in IOT domain and the large number of objects connected to the Internet daily require an improved identification method to cope with the rapid development in this field. Many modern methods have been proposed recently, based on various technologies such as computer vision, fingerprinting, and machine learning. This paper introduces an overview of IOT and discusses its fundamental elements; it mainly focuses on identification of IOT which is considered the main part that the IOT systems rely on. The paper discusses the existing identification methods for IOT. Moreover, it provides a review of the modern identification methods proposed in recent literature.
Back to Top Top