Internet of Things: Devices and Applications
VerifiedAdded on 2020/03/28
|13
|3547
|273
AI Summary
This assignment delves into the realm of the Internet of Things (IoT) by examining a range of smart devices. It details the functionalities offered by each device, such as smart speakers for audio playback, smoke detectors for fire safety, coffee makers for brewing, pillows for reducing snoring, and even smart ovens for healthier cooking. The analysis also includes information about prominent manufacturers and the average cost associated with each device category.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: INTERNET OF THINGS 1
INTERNET OF THINGS
<Student ID>
<Student Name>
<University Name>
INTERNET OF THINGS
<Student ID>
<Student Name>
<University Name>
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INTERNET OF THINGS 2
Contents
Introduction:...............................................................................................................................2
IoT devices.................................................................................................................................2
Smart Speaker.........................................................................................................................2
Smart Smoke Detectors:.........................................................................................................3
Smart coffee maker.................................................................................................................4
Smart Pillow:..........................................................................................................................4
Smart shower:.........................................................................................................................5
Fitness T-shirt.........................................................................................................................5
Smart cameras:.......................................................................................................................6
Smart Oven:............................................................................................................................6
Smart TV................................................................................................................................7
Smart parking.........................................................................................................................7
Conclusion:................................................................................................................................8
References..................................................................................................................................8
Appendix....................................................................................................................................8
Contents
Introduction:...............................................................................................................................2
IoT devices.................................................................................................................................2
Smart Speaker.........................................................................................................................2
Smart Smoke Detectors:.........................................................................................................3
Smart coffee maker.................................................................................................................4
Smart Pillow:..........................................................................................................................4
Smart shower:.........................................................................................................................5
Fitness T-shirt.........................................................................................................................5
Smart cameras:.......................................................................................................................6
Smart Oven:............................................................................................................................6
Smart TV................................................................................................................................7
Smart parking.........................................................................................................................7
Conclusion:................................................................................................................................8
References..................................................................................................................................8
Appendix....................................................................................................................................8
INTERNET OF THINGS 3
Introduction:
The term internet of things can be used to describe the larger assortment of connected objects
and devices that utilize internet as the medium of connection and could be accessed using the
internet. The examples of smartphones, tablets and computers alongside the products with
sensors such as cars and wearable devices could be accounted as the prominence of Internet
of Things (Bello & Zeadally, 2016).
IoT is able to provide privileges to the devices for system control and anticipation of existing
networks through integration with the physical computer based infrastructure found in the
world. The integration process is reflective of outcomes such as improvement in efficiency
and economic growth which can be observed from the applications of IoT to reduce costs of
energy as well as human effort.
The IoT platform has been characterized with prolific improvements due to the increasing
number of devices that could be operated under the precedents of IoT. One of the examples
of such improvements includes references to the increasing capacity of IoT devices for
recognition, collection and interpretation of substantial volumes of data (Chen, et al., 2015).
The support of technologies such as virtual power plants and smart grids imply the
opportunities for expansion of IoT applications on the cloud platforms thereby improving
usability of the applications. Furthermore, the concerns of data management process in
context of IoT have also been emphasized profoundly by developers thereby leading to
prolific outcomes such as limitation on external threats and ensuring relevancy of the data.
IoT devices
Smart Speaker
Smart speakers could be observed among smart devices which facilitate the features of
Bluetooth, Wi-Fi and audio playback and are generally not limited. The applications of smart
speaker could be diversified into other platforms such as mesh networking and peer to peer
connection which are associated with distinct designs. The device utilizes automation
techniques and controlled application methods (Guo, et al., 2013). The primary objective of
smart speakers is identified in the production of audio with the implementation of a wireless
connection that could be distinguished precisely from the online music services. The devices
Introduction:
The term internet of things can be used to describe the larger assortment of connected objects
and devices that utilize internet as the medium of connection and could be accessed using the
internet. The examples of smartphones, tablets and computers alongside the products with
sensors such as cars and wearable devices could be accounted as the prominence of Internet
of Things (Bello & Zeadally, 2016).
IoT is able to provide privileges to the devices for system control and anticipation of existing
networks through integration with the physical computer based infrastructure found in the
world. The integration process is reflective of outcomes such as improvement in efficiency
and economic growth which can be observed from the applications of IoT to reduce costs of
energy as well as human effort.
The IoT platform has been characterized with prolific improvements due to the increasing
number of devices that could be operated under the precedents of IoT. One of the examples
of such improvements includes references to the increasing capacity of IoT devices for
recognition, collection and interpretation of substantial volumes of data (Chen, et al., 2015).
The support of technologies such as virtual power plants and smart grids imply the
opportunities for expansion of IoT applications on the cloud platforms thereby improving
usability of the applications. Furthermore, the concerns of data management process in
context of IoT have also been emphasized profoundly by developers thereby leading to
prolific outcomes such as limitation on external threats and ensuring relevancy of the data.
IoT devices
Smart Speaker
Smart speakers could be observed among smart devices which facilitate the features of
Bluetooth, Wi-Fi and audio playback and are generally not limited. The applications of smart
speaker could be diversified into other platforms such as mesh networking and peer to peer
connection which are associated with distinct designs. The device utilizes automation
techniques and controlled application methods (Guo, et al., 2013). The primary objective of
smart speakers is identified in the production of audio with the implementation of a wireless
connection that could be distinguished precisely from the online music services. The devices
INTERNET OF THINGS 4
are also characterized with features such as voice activated digital assistants and connectivity
features of Bluetooth and Wi-Fi.
Usage: Smart speakers have become increasingly popular among the general population with
the abilities to produce effective sound quality and flexible operations.
Control: The control of the device is realized through remote and smartphones.
Connectivity: The connectivity of smart speakers relies on the speed of the internet
connection.
Security: The security measures that have been implemented in smart speakers could be
observed in the case of microphones intended primarily for better voice recognition. The
security aspects are also addressed through appropriate maintenance and storage of data.
Privacy: The security of data uploaded to the server via internet is a prolific indication of
preserving user data from unauthenticated intrusion (Hong, et al., 2013).
Solutions: The profound issue that has been perceived in the case of smart speakers is
observed in connectivity which can be resolved through reforms in the design of smart
speakers to operate effectively at slower internet connection speeds.
Smart Smoke Detectors:
Smart Smoke Detectors are effective safety devices which could prevent detrimental
outcomes through prior anticipation of fire. The device is specifically tailored to raise an
alarm at instances where the levels of smoke or carbon monoxide in the house increase. The
devices are designed in the form a circle and are housed in plastic enclosures. The use of the
devices in various homes and industries signifies their increasing popularity (Jan, et al.,
2014).
Usage: Smart Smoke Detectors are use for identifying increase in smoke or gas levels in a
house and controlling it through a sensing machine.
Control: The devices could be controlled with the help of Wi-Fi connection or through a
remote.
Connectivity: The device is connected to the internet which provides the opportunity for
controlling the device from outside the house.
Security: The security aspects of the devices are supported by speed of connection which
implies efficient performance and maintenance of existing conditions effectively.
are also characterized with features such as voice activated digital assistants and connectivity
features of Bluetooth and Wi-Fi.
Usage: Smart speakers have become increasingly popular among the general population with
the abilities to produce effective sound quality and flexible operations.
Control: The control of the device is realized through remote and smartphones.
Connectivity: The connectivity of smart speakers relies on the speed of the internet
connection.
Security: The security measures that have been implemented in smart speakers could be
observed in the case of microphones intended primarily for better voice recognition. The
security aspects are also addressed through appropriate maintenance and storage of data.
Privacy: The security of data uploaded to the server via internet is a prolific indication of
preserving user data from unauthenticated intrusion (Hong, et al., 2013).
Solutions: The profound issue that has been perceived in the case of smart speakers is
observed in connectivity which can be resolved through reforms in the design of smart
speakers to operate effectively at slower internet connection speeds.
Smart Smoke Detectors:
Smart Smoke Detectors are effective safety devices which could prevent detrimental
outcomes through prior anticipation of fire. The device is specifically tailored to raise an
alarm at instances where the levels of smoke or carbon monoxide in the house increase. The
devices are designed in the form a circle and are housed in plastic enclosures. The use of the
devices in various homes and industries signifies their increasing popularity (Jan, et al.,
2014).
Usage: Smart Smoke Detectors are use for identifying increase in smoke or gas levels in a
house and controlling it through a sensing machine.
Control: The devices could be controlled with the help of Wi-Fi connection or through a
remote.
Connectivity: The device is connected to the internet which provides the opportunity for
controlling the device from outside the house.
Security: The security aspects of the devices are supported by speed of connection which
implies efficient performance and maintenance of existing conditions effectively.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INTERNET OF THINGS 5
Privacy: The dimensions of privacy could be anticipated on the basis of their location within
offices or homes. Furthermore, the placement of the devices above reachable limits is also
reflective of minimal intrusion with the device.
Solution: The desired level of smoke or gas within the room for raising an alarm could be a
major setback in case of such devices. Therefore, the configuration of detectors to recognize
slight alteration in smoke levels can be ascertained through integrating and information
system with the device that would enable it to review past instances of smoke levels
(Kamalinejad, et al., 2015).
Smart coffee maker
These devices are intended to monitor the time for preparing coffee and the resultant outcome
is obtained in terms of healthy and fresh coffee. The devices are operated with the help of
smartphones and hot coffee can be enjoyed by customers early in the morning only with the
condition of filling the grinds before going to sleep (Kang, et al., 2014).
Usage: The application of smart coffee makers is found in homes and offices. The market
demand for these devices is complemented by the sophisticated design and features of the
device.
Control: The control of smart coffee makers is realized through a Wi-Fi setup for which the
device needs to be plugged into the connection. The setup could be followed by control
through the smartphones of users.
Connectivity: The connectivity of the smart coffee maker is comprehensively dependent on
the speed of the Wi-Fi setup.
Security: The security of these devices is ensured through their design which enables them to
withstand any shocks.
Privacy: The devices are used for domestic purposes largely and hence in cases of
connection failure, the devices were not able to function appropriately.
Solution: The observed issue in terms of connection failure could be addressed through
developing alternative options for connectivity which would ensure the device functioning at
all times of requirement (Karagiannis, et al., 2015).
Smart Pillow:
Sleeping has become smarter with the introduction of smart pillows which are characterized
with designs in the foam form alongside the moisture wicking fabric. The pillows are able to
Privacy: The dimensions of privacy could be anticipated on the basis of their location within
offices or homes. Furthermore, the placement of the devices above reachable limits is also
reflective of minimal intrusion with the device.
Solution: The desired level of smoke or gas within the room for raising an alarm could be a
major setback in case of such devices. Therefore, the configuration of detectors to recognize
slight alteration in smoke levels can be ascertained through integrating and information
system with the device that would enable it to review past instances of smoke levels
(Kamalinejad, et al., 2015).
Smart coffee maker
These devices are intended to monitor the time for preparing coffee and the resultant outcome
is obtained in terms of healthy and fresh coffee. The devices are operated with the help of
smartphones and hot coffee can be enjoyed by customers early in the morning only with the
condition of filling the grinds before going to sleep (Kang, et al., 2014).
Usage: The application of smart coffee makers is found in homes and offices. The market
demand for these devices is complemented by the sophisticated design and features of the
device.
Control: The control of smart coffee makers is realized through a Wi-Fi setup for which the
device needs to be plugged into the connection. The setup could be followed by control
through the smartphones of users.
Connectivity: The connectivity of the smart coffee maker is comprehensively dependent on
the speed of the Wi-Fi setup.
Security: The security of these devices is ensured through their design which enables them to
withstand any shocks.
Privacy: The devices are used for domestic purposes largely and hence in cases of
connection failure, the devices were not able to function appropriately.
Solution: The observed issue in terms of connection failure could be addressed through
developing alternative options for connectivity which would ensure the device functioning at
all times of requirement (Karagiannis, et al., 2015).
Smart Pillow:
Sleeping has become smarter with the introduction of smart pillows which are characterized
with designs in the foam form alongside the moisture wicking fabric. The pillows are able to
INTERNET OF THINGS 6
detect snoring of users and respond by vibrating slightly so as to change the position of the
customer.
Usage: The smart pillows are used for detection of sound intensity levels of snoring and
maintaining the information. The smart alarm integrated in the pillows proves to be an
optimal resource for regulating the sleep cycles of the user (Mineraud, et al., 2016).
Control: The device is activated with the user sleeping on it and initiated snoring.
Connectivity: The connectivity of the smart pillow is ensured through Wi-Fi networks.
Security: The security of the devices is solely subjected to the control and ownership of user.
Privacy: The privacy aspects of the device are maintained through ensuring sole user access
through other devices such as smartphones.
Solution: The observed issue in usage where the customer may wake up due to vibration of
the pillow could be resolved through design modifications that allow arrangement of the
contours of the pillow in order to change the position of the user flexibly.
Smart shower:
This device is intended for regulating the flow of shower, temperature inside the bathroom
and other showering needs of customers with the use of iOS systems and android
applications. The smart shower applications could enable users to observe the features of
greeting, shower timer, notifications and name of the user alongside other customization
options.
Usage: The use of smart shower IoT devices is observed explicitly in the regulation of
temperature through digital means (Raza, et al., 2014).
Control: The control of the device is operated through the LCD screen of the device and the
control buttons with the use of media of android apps and IOS system.
Connectivity: The connectivity in the case of smart shower is observed with smartphones
and is dependent on the speed of the connection.
Security: The security of smart shower devices is ensured through their placement within
private location of a home.
Privacy: The privacy of information is validated through the limited chances for stealing of
the device.
Solution: The regulation of the temperature could be affected by the concerns of connectivity
which can be addressed through including manual options for temperature regulation.
detect snoring of users and respond by vibrating slightly so as to change the position of the
customer.
Usage: The smart pillows are used for detection of sound intensity levels of snoring and
maintaining the information. The smart alarm integrated in the pillows proves to be an
optimal resource for regulating the sleep cycles of the user (Mineraud, et al., 2016).
Control: The device is activated with the user sleeping on it and initiated snoring.
Connectivity: The connectivity of the smart pillow is ensured through Wi-Fi networks.
Security: The security of the devices is solely subjected to the control and ownership of user.
Privacy: The privacy aspects of the device are maintained through ensuring sole user access
through other devices such as smartphones.
Solution: The observed issue in usage where the customer may wake up due to vibration of
the pillow could be resolved through design modifications that allow arrangement of the
contours of the pillow in order to change the position of the user flexibly.
Smart shower:
This device is intended for regulating the flow of shower, temperature inside the bathroom
and other showering needs of customers with the use of iOS systems and android
applications. The smart shower applications could enable users to observe the features of
greeting, shower timer, notifications and name of the user alongside other customization
options.
Usage: The use of smart shower IoT devices is observed explicitly in the regulation of
temperature through digital means (Raza, et al., 2014).
Control: The control of the device is operated through the LCD screen of the device and the
control buttons with the use of media of android apps and IOS system.
Connectivity: The connectivity in the case of smart shower is observed with smartphones
and is dependent on the speed of the connection.
Security: The security of smart shower devices is ensured through their placement within
private location of a home.
Privacy: The privacy of information is validated through the limited chances for stealing of
the device.
Solution: The regulation of the temperature could be affected by the concerns of connectivity
which can be addressed through including manual options for temperature regulation.
INTERNET OF THINGS 7
Fitness T-shirt
The fitness T-shirt device is intended to regulate the body temperature during exercise or
workout. The connection of the wearable device to IOS apps as well as the outcomes of
increasing flexibility and speed of an individual alongside reduction of calories can be
accounted as promising features of the device (Sancho, et al., 2015). The device also
facilitates the opportunity to listen to music while using the device and the extended battery
life of the fitness t-shirt can also be assumed as favourable indicators of its popularity.
Usage: The device is utilized for maintaining the temperature of the user during exercise and
workout which enables them to shed more calories alongside implying outcomes of higher
flexibility.
Control: The control of the device is ensured through a button on the device as well as
mobile applications.
Connectivity: The connectivity dimension of the device is associated with the internet and
performs efficiently with the higher speed of internet
Security: The security factor in the device is addressed without the instances of missing grip.
Privacy: Privacy of the device is sustained on the basis of the ownership of the device with
the user.
Solution: The observed issue in the usage of the device is identified in the form of varying
responses of users to different workout regimes. Therefore, advancements in the form of
identifying the variation in body temperature and implementing relevant measures could be
implemented as solutions (Westerlund, Leminen & Rajahonka, 2014).
Smart cameras:
Smart cameras have become the next big thing in the sector of surveillance with the
implications for detection methods being able to recognize motion of individuals. The
different recognition technologies that are identified in the case of smart camera refer to the
classification of animal motion, human motion and the motion of other members.
Usage: These devices are applied for surveillance and security systems of establishments
such as offices and homes.
Control: The control of smart cameras is vested in smartphones and internet connection.
Connectivity: The connectivity of smart cameras is observed in the Wi-Fi setup.
Security: The device facilitates credible features for security and hence is used.
Fitness T-shirt
The fitness T-shirt device is intended to regulate the body temperature during exercise or
workout. The connection of the wearable device to IOS apps as well as the outcomes of
increasing flexibility and speed of an individual alongside reduction of calories can be
accounted as promising features of the device (Sancho, et al., 2015). The device also
facilitates the opportunity to listen to music while using the device and the extended battery
life of the fitness t-shirt can also be assumed as favourable indicators of its popularity.
Usage: The device is utilized for maintaining the temperature of the user during exercise and
workout which enables them to shed more calories alongside implying outcomes of higher
flexibility.
Control: The control of the device is ensured through a button on the device as well as
mobile applications.
Connectivity: The connectivity dimension of the device is associated with the internet and
performs efficiently with the higher speed of internet
Security: The security factor in the device is addressed without the instances of missing grip.
Privacy: Privacy of the device is sustained on the basis of the ownership of the device with
the user.
Solution: The observed issue in the usage of the device is identified in the form of varying
responses of users to different workout regimes. Therefore, advancements in the form of
identifying the variation in body temperature and implementing relevant measures could be
implemented as solutions (Westerlund, Leminen & Rajahonka, 2014).
Smart cameras:
Smart cameras have become the next big thing in the sector of surveillance with the
implications for detection methods being able to recognize motion of individuals. The
different recognition technologies that are identified in the case of smart camera refer to the
classification of animal motion, human motion and the motion of other members.
Usage: These devices are applied for surveillance and security systems of establishments
such as offices and homes.
Control: The control of smart cameras is vested in smartphones and internet connection.
Connectivity: The connectivity of smart cameras is observed in the Wi-Fi setup.
Security: The device facilitates credible features for security and hence is used.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
INTERNET OF THINGS 8
Privacy: The camera is placed well above reachable limits which validates the privacy
dimension (Yager & Espada, 2017).
Solution: The device should implement wide spread connectivity alongside improving the
detection mechanisms for lighting intensity.
Smart Oven:
A smart oven has reformed the conventional approaches for cooking with the integration of
modern tools and technology.
Usage: The smart oven is used for cooking food through the use of internet connection
thereby limiting the time required for cooking food to a substantial extent.
Control: The control of the device is ensured through the devices on the panel on the exterior
of the oven.
Connectivity: The connectivity dimension of smart oven is realized only in the internet
connection and the key facilitated by user for cooking.
Security: The security of smart ovens is higher due to less probability of attack by external
agents.
Privacy: The efficiency of the sensors enables the recognition of touch of user and stops
function on recognition of an unknown touch (Yang, et al., 2017).
Solution: The development of a key of specific fingerprints could be attributed as a solution
for the instances when other family members would also require operating the oven.
Smart TV
Smart TV could be assumed as the upgrades of the traditional television with the promising
features of displaying online music, videos and opportunities for playing online games.
Usage: The device is utilized for obtaining access to online entertainment services such as
video, music and games with the help of a setup box and is operated with touch.
Control: The device is controlled through the user touch alongside citing prospects for
development of other new forms of controlling the Smart TV (Zheng, et al., 2014).
Connectivity: Connectivity in the case of smart TVs is observed in the internet connection
alongside emphasizing on the connection speed.
Security: The concerns of losing information are observed in these devices as they are prone
to external attacks.
Privacy: The camera is placed well above reachable limits which validates the privacy
dimension (Yager & Espada, 2017).
Solution: The device should implement wide spread connectivity alongside improving the
detection mechanisms for lighting intensity.
Smart Oven:
A smart oven has reformed the conventional approaches for cooking with the integration of
modern tools and technology.
Usage: The smart oven is used for cooking food through the use of internet connection
thereby limiting the time required for cooking food to a substantial extent.
Control: The control of the device is ensured through the devices on the panel on the exterior
of the oven.
Connectivity: The connectivity dimension of smart oven is realized only in the internet
connection and the key facilitated by user for cooking.
Security: The security of smart ovens is higher due to less probability of attack by external
agents.
Privacy: The efficiency of the sensors enables the recognition of touch of user and stops
function on recognition of an unknown touch (Yang, et al., 2017).
Solution: The development of a key of specific fingerprints could be attributed as a solution
for the instances when other family members would also require operating the oven.
Smart TV
Smart TV could be assumed as the upgrades of the traditional television with the promising
features of displaying online music, videos and opportunities for playing online games.
Usage: The device is utilized for obtaining access to online entertainment services such as
video, music and games with the help of a setup box and is operated with touch.
Control: The device is controlled through the user touch alongside citing prospects for
development of other new forms of controlling the Smart TV (Zheng, et al., 2014).
Connectivity: Connectivity in the case of smart TVs is observed in the internet connection
alongside emphasizing on the connection speed.
Security: The concerns of losing information are observed in these devices as they are prone
to external attacks.
INTERNET OF THINGS 9
Privacy: Privacy in the case of Smart TV could be ensured through the wireless connection
as well as the options for notifications when the device is accessed without authentication.
Solution: The concerns of information security could be addressed through determining user
level privileges of accessing data and introduce settings that would enable user to encrypt
information.
Smart parking
The necessity for reducing the disorder and cost factors associated with parking resulted in
development of apps which facilitate impression of the relevant parking details.
Usage: The smart parking apps could be access through the internet to obtain details
regarding vacant spaces in parking and these systems are used in places which encountered
problems in parking.
Control: The control of the smart parking system is realized through android apps and
smartphones.
Connectivity: The smart parking system acquired connectivity from internet connection.
Security: Security factor is ensured at the optimal extent in this system.
Privacy: The privacy facilitated to users could be reflected in minimal disturbance for the
vehicles due to prior verification of the system.
Solution: The issues observed in the form of glitches such as allocation of same parking spot
to different users can be resolved through consistent review of system specifications and
information pertaining to traffic volume at different times of the day (Ziegeldorf, Morchon &
Wehrle, 2014).
Privacy: Privacy in the case of Smart TV could be ensured through the wireless connection
as well as the options for notifications when the device is accessed without authentication.
Solution: The concerns of information security could be addressed through determining user
level privileges of accessing data and introduce settings that would enable user to encrypt
information.
Smart parking
The necessity for reducing the disorder and cost factors associated with parking resulted in
development of apps which facilitate impression of the relevant parking details.
Usage: The smart parking apps could be access through the internet to obtain details
regarding vacant spaces in parking and these systems are used in places which encountered
problems in parking.
Control: The control of the smart parking system is realized through android apps and
smartphones.
Connectivity: The smart parking system acquired connectivity from internet connection.
Security: Security factor is ensured at the optimal extent in this system.
Privacy: The privacy facilitated to users could be reflected in minimal disturbance for the
vehicles due to prior verification of the system.
Solution: The issues observed in the form of glitches such as allocation of same parking spot
to different users can be resolved through consistent review of system specifications and
information pertaining to traffic volume at different times of the day (Ziegeldorf, Morchon &
Wehrle, 2014).
INTERNET OF THINGS 10
Diagram
Conclusion:
Internet of Things is gradually becoming an integral part of the lifestyle of every individual
and with the increasing demand of the devices, the concerns of threats from hackers could
also be observed imperatively. Furthermore, several other issues related to connectivity of
IoT devices and limitations on operational efficiency could be considered as reasons for
inducing difficulties for operation of these devices by user.
References
Bello, O., & Zeadally, S. (2016). Intelligent device-to-device communication in the internet
of things. IEEE Systems Journal, 10(3), 1172-1182.
Chen, F., Deng, P., Wan, J., Zhang, D., Vasilakos, A. V., & Rong, X. (2015). Data mining for
the internet of things: literature review and challenges. International Journal of
Distributed Sensor Networks.
Smart
TV
Smart Oven
Smart
Camera
Smart
Fitness Shirt
Smart
Shower
Smart Pillow
Smart Coffe
Maker
Smart Smoke
Detector
Smart
Speaker
Smart
Speaker
SMART PARKING
Smart Smoke
Detector
Diagram
Conclusion:
Internet of Things is gradually becoming an integral part of the lifestyle of every individual
and with the increasing demand of the devices, the concerns of threats from hackers could
also be observed imperatively. Furthermore, several other issues related to connectivity of
IoT devices and limitations on operational efficiency could be considered as reasons for
inducing difficulties for operation of these devices by user.
References
Bello, O., & Zeadally, S. (2016). Intelligent device-to-device communication in the internet
of things. IEEE Systems Journal, 10(3), 1172-1182.
Chen, F., Deng, P., Wan, J., Zhang, D., Vasilakos, A. V., & Rong, X. (2015). Data mining for
the internet of things: literature review and challenges. International Journal of
Distributed Sensor Networks.
Smart
TV
Smart Oven
Smart
Camera
Smart
Fitness Shirt
Smart
Shower
Smart Pillow
Smart Coffe
Maker
Smart Smoke
Detector
Smart
Speaker
Smart
Speaker
SMART PARKING
Smart Smoke
Detector
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INTERNET OF THINGS 11
Guo, B., Zhang, D., Wang, Z., Yu, Z., & Zhou, X. (2013). Opportunistic IoT: Exploring the
harmonious interaction between human and the internet of things. Journal of Network
and Computer Applications, 36(6), 1531-1539.
Hong, K., Lillethun, D., Ramachandran, U., Ottenwälder, B., & Koldehofe, B. (2013,
August). Mobile fog: A programming model for large-scale applications on the internet
of things. In Proceedings of the second ACM SIGCOMM workshop on Mobile cloud
computing (pp. 15-20). ACM.
Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014, September). A robust
authentication scheme for observing resources in the internet of things environment.
In Trust, Security and Privacy in Computing and Communications (TrustCom), 2014
IEEE 13th International Conference on(pp. 205-211). IEEE.
Kamalinejad, P., Mahapatra, C., Sheng, Z., Mirabbasi, S., Leung, V. C., & Guan, Y. L.
(2015). Wireless energy harvesting for the internet of things. IEEE Communications
Magazine, 53(6), 102-108.
Kang, K., Pang, Z., Da Xu, L., Ma, L., & Wang, C. (2014). An interactive trust model for
application market of the internet of things. IEEE Transactions on Industrial
Informatics, 10(2), 1516-1526.
Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., & Alonso-Zarate, J. (2015). A
survey on application layer protocols for the internet of things. Transaction on IoT and
Cloud Computing, 3(1), 11-17.
Mineraud, J., Mazhelis, O., Su, X., & Tarkoma, S. (2016). A gap analysis of Internet-of-
Things platforms. Computer Communications, 89, 5-16.
Raza, S., Duquennoy, S., Höglund, J., Roedig, U., & Voigt, T. (2014). Secure communication
for the Internet of Things—a comparison of link‐layer security and IPsec for
6LoWPAN. Security and Communication Networks, 7(12), 2654-2668.
Sancho, M., Teresa, M., Iturrioz Aguirre, T., Manso Callejo, M. A., & Wachowicz, M.
(2015). Towards Mapping Experience Design for the Internet of Things.
Westerlund, M., Leminen, S., & Rajahonka, M. (2014). Designing business models for the
internet of things. Technology Innovation Management Review, 4(7), 5.
Guo, B., Zhang, D., Wang, Z., Yu, Z., & Zhou, X. (2013). Opportunistic IoT: Exploring the
harmonious interaction between human and the internet of things. Journal of Network
and Computer Applications, 36(6), 1531-1539.
Hong, K., Lillethun, D., Ramachandran, U., Ottenwälder, B., & Koldehofe, B. (2013,
August). Mobile fog: A programming model for large-scale applications on the internet
of things. In Proceedings of the second ACM SIGCOMM workshop on Mobile cloud
computing (pp. 15-20). ACM.
Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014, September). A robust
authentication scheme for observing resources in the internet of things environment.
In Trust, Security and Privacy in Computing and Communications (TrustCom), 2014
IEEE 13th International Conference on(pp. 205-211). IEEE.
Kamalinejad, P., Mahapatra, C., Sheng, Z., Mirabbasi, S., Leung, V. C., & Guan, Y. L.
(2015). Wireless energy harvesting for the internet of things. IEEE Communications
Magazine, 53(6), 102-108.
Kang, K., Pang, Z., Da Xu, L., Ma, L., & Wang, C. (2014). An interactive trust model for
application market of the internet of things. IEEE Transactions on Industrial
Informatics, 10(2), 1516-1526.
Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., & Alonso-Zarate, J. (2015). A
survey on application layer protocols for the internet of things. Transaction on IoT and
Cloud Computing, 3(1), 11-17.
Mineraud, J., Mazhelis, O., Su, X., & Tarkoma, S. (2016). A gap analysis of Internet-of-
Things platforms. Computer Communications, 89, 5-16.
Raza, S., Duquennoy, S., Höglund, J., Roedig, U., & Voigt, T. (2014). Secure communication
for the Internet of Things—a comparison of link‐layer security and IPsec for
6LoWPAN. Security and Communication Networks, 7(12), 2654-2668.
Sancho, M., Teresa, M., Iturrioz Aguirre, T., Manso Callejo, M. A., & Wachowicz, M.
(2015). Towards Mapping Experience Design for the Internet of Things.
Westerlund, M., Leminen, S., & Rajahonka, M. (2014). Designing business models for the
internet of things. Technology Innovation Management Review, 4(7), 5.
INTERNET OF THINGS 12
Yager, R. R., & Espada, J. P. (2017). New Advances in the Internet of Things.
Yang, J., He, S., Lin, Y., & Lv, Z. (2017). Multimedia cloud transmission and storage system
based on internet of things. Multimedia Tools and Applications, 76(17), 17735-17750.
Zheng, X., Martin, P., Brohman, K., & Da Xu, L. (2014). Cloud service negotiation in
internet of things environment: A mixed approach. IEEE Transactions on Industrial
Informatics, 10(2), 1506-1515.
Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the Internet of Things:
threats and challenges. Security and Communication Networks, 7(12), 2728-2742.
Appendix
S.N Devices Functions Manufacturer Average Cost
1.
Smart speaker Good Sound Google,
Amazon,
Philips
70$
2. Smart smoke
detectors
Very Good Smoke
Detectors
Amazon 25$
3. Smart coffee
maker
Prepare nice coffee at
minimum cost
Amazon,
Philips
45$
4. Smart pillow Reduces the snoring Amazon 61$
5. Smart shower Maintains the
temperature of Water
Aqubiq,
amphiro
999$
6. Fitness T-shirt Reduces Sweating Amazon 123$
7. Smart cameras Detect Smiling face Amazon 345$
8. Smart oven Prepare healthy Foods Samsung, 145$
Yager, R. R., & Espada, J. P. (2017). New Advances in the Internet of Things.
Yang, J., He, S., Lin, Y., & Lv, Z. (2017). Multimedia cloud transmission and storage system
based on internet of things. Multimedia Tools and Applications, 76(17), 17735-17750.
Zheng, X., Martin, P., Brohman, K., & Da Xu, L. (2014). Cloud service negotiation in
internet of things environment: A mixed approach. IEEE Transactions on Industrial
Informatics, 10(2), 1506-1515.
Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the Internet of Things:
threats and challenges. Security and Communication Networks, 7(12), 2728-2742.
Appendix
S.N Devices Functions Manufacturer Average Cost
1.
Smart speaker Good Sound Google,
Amazon,
Philips
70$
2. Smart smoke
detectors
Very Good Smoke
Detectors
Amazon 25$
3. Smart coffee
maker
Prepare nice coffee at
minimum cost
Amazon,
Philips
45$
4. Smart pillow Reduces the snoring Amazon 61$
5. Smart shower Maintains the
temperature of Water
Aqubiq,
amphiro
999$
6. Fitness T-shirt Reduces Sweating Amazon 123$
7. Smart cameras Detect Smiling face Amazon 345$
8. Smart oven Prepare healthy Foods Samsung, 145$
INTERNET OF THINGS 13
Breville
9. Smart TV Online streaming Amazon ,
Sony, LG
5678$
10. Smart Parking Best way to keep Car
Safe
Quindao 2376$
Breville
9. Smart TV Online streaming Amazon ,
Sony, LG
5678$
10. Smart Parking Best way to keep Car
Safe
Quindao 2376$
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.