Understanding the Internet of Things
VerifiedAdded on 2020/03/28
|3
|3006
|37
AI Summary
This assignment delves into the concept of the Internet of Things (IoT), examining its definition, architectural elements, future directions, and impact on various industries. It explores key aspects like smart environments, integrated ecosystems, and the convergence of technologies driving IoT advancements. The assignment also discusses the ethical implications and challenges associated with IoT.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Internet of Things
Abstract— Internet of Things is developing every day. The
potential of Internet of Things is estimated by combining
similar approaches of technologies and also concepts that
includes cloud computing, semantic technologies, robotics,
future internet and big data. The idea of combining these
technologies is not new but has become evident because the
concepts have started to release synergies. Applications of
Internet of Things such as management of infrastructure in
rural and urban areas, monitoring health remotely,
transportation systems, emergency system notification and
shopping systems are depending upon Internet of Things
based devices.
Keywords— Data Encryption, Data Authentication,
Hardware Security, Devices of Internet of Things
I. INTRODUCTION
The most modern technology that is famous worldwide is
Internet of Things. Different features of business,
implementation and research that are related with Internet of
Things are needed in industries, government and academics.
Different domain verticals applications are done by Internet of
Things that ranges from civil sector to defense sector. The
domains which are included are healthcare, construction,
water, space and agriculture. These sectors are transforming
their infrastructure to give support to Internet of Things.
Prediction of computation, storage and connectivity are
possible and their related solutions are also identified by using
Internet of Things. Applications of Internet of Things such as
management of infrastructure in rural and urban areas,
monitoring health remotely, transportation systems,
emergency system notification and shopping systems are
depending upon Internet of Things based devices. In this
present digital world, it is very much important to learn the
basis of the emerging technology of Internet of Things.
II. LITERATURE REVIEW ON INTERNET OF THINGS
A. Review 1
Chosen Article: “Understanding the Internet of Things (IoT)”
According to the article, to make a change in life of
individual and productivity of enterprises internet things are
needed. From the article it is reviewed that the network of
intelligent smart devices that are local, potential to extend and
enhance the fundamental services in security, utilities,
healthcare, education, logistics and transportation Internet of
Things are needed [3]. These Internet of Things devices
provides new ecosystem for the development of the
application. According to Cui, a great effort has been given to
the industries of early stages to develop towards maturities
that are driven by same understanding with particular nature of
opportunity [10]. The characteristics that are distinct in the
areas business, charging models, service distribution,
capabilities that are required to deliver the Internet of Things
devices and also different demands of putting these services
on mobile networks. These Internet of Things devices
provides new ecosystem for the development of the
application. From this article it can be analyzed that common
understandings of characteristics of Internet of Things will
allow the partners to unite more efficiently in order to
establish in the market and get benefit from society and
consumers.
For understanding IoT (Internet of Things) following things
are described in this article:
The services of Internet of Things that enhances life- The life
enhancing services are enabled by Internet of Things through
different sectors of economy.
The distribution model of services of Internet of Things is
made globally- The needs of the customers are meeting by
models of global distribution and global services that are
consistent.
New commercial models are employed by Internet of Things-
To support the mass deployment globally; an opportunity is
given by Internet of Things for commercial models that are
new.
For the applications of Internet of Things new capabilities are
developed- The maximum revenue comes from the value
added services and the operators are making capabilities that
are new to address areas of new services.
The last thing that is stated in this article to understand
Internet of Things is that demand is increasing and are
differing on mobile networks- The behavior of applications
and devices places new and different demands for mobile
networks.
B. Review 2
Chosen Article: “Internet of Things: Converging Technologies
for Smart Environments and Integrated Ecosystems”.
According to the article “Internet of Things:
Converging Technologies for Smart Environments and
Integrated Ecosystems”, Internet of Things is developing
every day [11]. The potential of Internet of Things is estimated
by combining similar approaches of technologies and also
concepts that includes cloud computing, semantic
technologies, robotics, future internet and big data [9]. The
idea of combining these technologies is not new but has
become evident because the concepts have started to release
synergies. There are many numbers of factors that helps in
increasing the maturity of Internet of Things which tends to
full exploitation of Internet of Things. The factors that are
Abstract— Internet of Things is developing every day. The
potential of Internet of Things is estimated by combining
similar approaches of technologies and also concepts that
includes cloud computing, semantic technologies, robotics,
future internet and big data. The idea of combining these
technologies is not new but has become evident because the
concepts have started to release synergies. Applications of
Internet of Things such as management of infrastructure in
rural and urban areas, monitoring health remotely,
transportation systems, emergency system notification and
shopping systems are depending upon Internet of Things
based devices.
Keywords— Data Encryption, Data Authentication,
Hardware Security, Devices of Internet of Things
I. INTRODUCTION
The most modern technology that is famous worldwide is
Internet of Things. Different features of business,
implementation and research that are related with Internet of
Things are needed in industries, government and academics.
Different domain verticals applications are done by Internet of
Things that ranges from civil sector to defense sector. The
domains which are included are healthcare, construction,
water, space and agriculture. These sectors are transforming
their infrastructure to give support to Internet of Things.
Prediction of computation, storage and connectivity are
possible and their related solutions are also identified by using
Internet of Things. Applications of Internet of Things such as
management of infrastructure in rural and urban areas,
monitoring health remotely, transportation systems,
emergency system notification and shopping systems are
depending upon Internet of Things based devices. In this
present digital world, it is very much important to learn the
basis of the emerging technology of Internet of Things.
II. LITERATURE REVIEW ON INTERNET OF THINGS
A. Review 1
Chosen Article: “Understanding the Internet of Things (IoT)”
According to the article, to make a change in life of
individual and productivity of enterprises internet things are
needed. From the article it is reviewed that the network of
intelligent smart devices that are local, potential to extend and
enhance the fundamental services in security, utilities,
healthcare, education, logistics and transportation Internet of
Things are needed [3]. These Internet of Things devices
provides new ecosystem for the development of the
application. According to Cui, a great effort has been given to
the industries of early stages to develop towards maturities
that are driven by same understanding with particular nature of
opportunity [10]. The characteristics that are distinct in the
areas business, charging models, service distribution,
capabilities that are required to deliver the Internet of Things
devices and also different demands of putting these services
on mobile networks. These Internet of Things devices
provides new ecosystem for the development of the
application. From this article it can be analyzed that common
understandings of characteristics of Internet of Things will
allow the partners to unite more efficiently in order to
establish in the market and get benefit from society and
consumers.
For understanding IoT (Internet of Things) following things
are described in this article:
The services of Internet of Things that enhances life- The life
enhancing services are enabled by Internet of Things through
different sectors of economy.
The distribution model of services of Internet of Things is
made globally- The needs of the customers are meeting by
models of global distribution and global services that are
consistent.
New commercial models are employed by Internet of Things-
To support the mass deployment globally; an opportunity is
given by Internet of Things for commercial models that are
new.
For the applications of Internet of Things new capabilities are
developed- The maximum revenue comes from the value
added services and the operators are making capabilities that
are new to address areas of new services.
The last thing that is stated in this article to understand
Internet of Things is that demand is increasing and are
differing on mobile networks- The behavior of applications
and devices places new and different demands for mobile
networks.
B. Review 2
Chosen Article: “Internet of Things: Converging Technologies
for Smart Environments and Integrated Ecosystems”.
According to the article “Internet of Things:
Converging Technologies for Smart Environments and
Integrated Ecosystems”, Internet of Things is developing
every day [11]. The potential of Internet of Things is estimated
by combining similar approaches of technologies and also
concepts that includes cloud computing, semantic
technologies, robotics, future internet and big data [9]. The
idea of combining these technologies is not new but has
become evident because the concepts have started to release
synergies. There are many numbers of factors that helps in
increasing the maturity of Internet of Things which tends to
full exploitation of Internet of Things. The factors that are
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
mentioned in the article to increase the maturity of Internet of
Things are as follows:
No such clear approach is given for
utilization of identifiers that are urgent and
also number the spaces for different kinds of
volatile and persistent objects globally.
No such development of Internet of Things
architecture references like ARM
(Architecture reference Model) of project
and accelerated use of Internet of Things.
Semantic interoperability that is used for
exchanging the sensor data in environments
that are heterogeneous have less rapid
advance.
The ownership and trust of data of Internet
of Things are difficult to develop that is
used for innovation and also giving privacy
and security in a complicated environment.
There lays a difficulty to develop business
which enhances the full potential of the
Internet of Things.
The learning and testing environment are
missing which increase both
experimentation with sensor networks and
also increases innovation via experience and
reflection.
The roaming charges that fall in practical
aspect of Internet of Things have application
of large range sensor and also miss the
availability of technical aspect and network
connectivity that are reliable.
If these hurdles are overcome, then Internet of Things will
lead to better exploitation in the areas of cross domain
interactivity, awareness of real world is increased and also
utilizing problem solving space that are infinite [12]. The
further solutions and approaches to make Internet of Things
better exploited are discussed briefly in this article.
C. Review 2
Chosen Article: “An Overview Understanding the Issues
and Challenges of a More Connected World”.
The concept that is explained in the article “An Overview
Understanding the Issues and Challenges of a More Connected
World” is that it is an important part in the technology sector
of engineering, policy and industry [8]. The Internet of Things
has become a specialty press and also a popular media in the
news. The technology of Internet of Things has provided a
wide area in the products, systems and also the sensors which
are needed in computing power, network interconnections and
electronics miniaturization that offers new opportunities that
were not possible previously. The potential of Internet of
Things is estimated by combining similar approaches of
technologies and also concepts that includes cloud computing,
semantic technologies, robotics, future internet and big data
[1]. The idea of combining these technologies is not new but
has become evident because the concepts have started to
release synergies. Applications of Internet of Things such as
management of infrastructure in rural and urban areas,
monitoring health remotely, transportation systems,
emergency system notification and shopping systems are
depending upon Internet of Things based devices. In this
present digital world, it is very much important to learn the
basis of the emerging technology of Internet of Things. The
Internet of Things products used by consumers are detailed in
this article [14]. The devices are home automation system,
devices of energy management makes the world to move
towards a smarter home. This Internet of Things offers more
energy and security the house [2]. Other devices of Internet of
Things that are discussed in this article are monitoring health
devices and wearable fitness and also medical devices that are
network enabled for transforming the services of healthcare
[6]. The technology of Internet of Things provides benefits to
the elderly people and also people with disabilities so that the
quality of life is increased at a very reasonable cost. Systems
like intelligent traffic system, roads that are sensor embedded
and networked vehicles are the systems of Internet of Things
which leads to smart cities and helps to decrease the
congestion of cities and also helps in consumption of energy.
This article explains that Internet of Things gives possibility to
transform energy production, industry and agriculture by
increasing data availability in the productions that are made of
networked sensors [13]. The challenges and issues that arise
with Internet of Things are considered as important aspect in
the digital world and to mitigate them relative procedures are
taken.
III. THREE SECURITY ISSUES OF IOT
A. Data Encryption
Numerous amounts of data is collected by the devices of
Internet of Things. Data processing and data retrieval is
considered as the internal part of the Internet of Things
environment. The data that are put in the devices of Internet of
Things are very personal and also needed to give a protection
via encryption. The security issue of Internet of Things is
secured by using Secure Socket Layer Protocol (SSL) when
the information is online [5]. The website that are used in
daily life has Secure Socket Layer Protocol certification to
give a protection to the and also encrypt the user data that are
online. Only the half part of the website is protected by SSL
and the other side is to give protection to wireless protocol
side. The data that are transferred without wire also needs
encryption process. The location of the sensitive data is to be
kept personal and it is to be kept in mind that only the user
knows about the data. So, for inbuilt encryption, wireless
protocol is to be installed.
B. Data Authentication
When the data is encrypted, and then comes
the chance of getting hacked. The data is to be
protected from hacking. To security to establish
authenticity of data those are communicated to
the receiver and from the sender in an Internet of
Things is compromised [8]. For an example, in a temperature
Things are as follows:
No such clear approach is given for
utilization of identifiers that are urgent and
also number the spaces for different kinds of
volatile and persistent objects globally.
No such development of Internet of Things
architecture references like ARM
(Architecture reference Model) of project
and accelerated use of Internet of Things.
Semantic interoperability that is used for
exchanging the sensor data in environments
that are heterogeneous have less rapid
advance.
The ownership and trust of data of Internet
of Things are difficult to develop that is
used for innovation and also giving privacy
and security in a complicated environment.
There lays a difficulty to develop business
which enhances the full potential of the
Internet of Things.
The learning and testing environment are
missing which increase both
experimentation with sensor networks and
also increases innovation via experience and
reflection.
The roaming charges that fall in practical
aspect of Internet of Things have application
of large range sensor and also miss the
availability of technical aspect and network
connectivity that are reliable.
If these hurdles are overcome, then Internet of Things will
lead to better exploitation in the areas of cross domain
interactivity, awareness of real world is increased and also
utilizing problem solving space that are infinite [12]. The
further solutions and approaches to make Internet of Things
better exploited are discussed briefly in this article.
C. Review 2
Chosen Article: “An Overview Understanding the Issues
and Challenges of a More Connected World”.
The concept that is explained in the article “An Overview
Understanding the Issues and Challenges of a More Connected
World” is that it is an important part in the technology sector
of engineering, policy and industry [8]. The Internet of Things
has become a specialty press and also a popular media in the
news. The technology of Internet of Things has provided a
wide area in the products, systems and also the sensors which
are needed in computing power, network interconnections and
electronics miniaturization that offers new opportunities that
were not possible previously. The potential of Internet of
Things is estimated by combining similar approaches of
technologies and also concepts that includes cloud computing,
semantic technologies, robotics, future internet and big data
[1]. The idea of combining these technologies is not new but
has become evident because the concepts have started to
release synergies. Applications of Internet of Things such as
management of infrastructure in rural and urban areas,
monitoring health remotely, transportation systems,
emergency system notification and shopping systems are
depending upon Internet of Things based devices. In this
present digital world, it is very much important to learn the
basis of the emerging technology of Internet of Things. The
Internet of Things products used by consumers are detailed in
this article [14]. The devices are home automation system,
devices of energy management makes the world to move
towards a smarter home. This Internet of Things offers more
energy and security the house [2]. Other devices of Internet of
Things that are discussed in this article are monitoring health
devices and wearable fitness and also medical devices that are
network enabled for transforming the services of healthcare
[6]. The technology of Internet of Things provides benefits to
the elderly people and also people with disabilities so that the
quality of life is increased at a very reasonable cost. Systems
like intelligent traffic system, roads that are sensor embedded
and networked vehicles are the systems of Internet of Things
which leads to smart cities and helps to decrease the
congestion of cities and also helps in consumption of energy.
This article explains that Internet of Things gives possibility to
transform energy production, industry and agriculture by
increasing data availability in the productions that are made of
networked sensors [13]. The challenges and issues that arise
with Internet of Things are considered as important aspect in
the digital world and to mitigate them relative procedures are
taken.
III. THREE SECURITY ISSUES OF IOT
A. Data Encryption
Numerous amounts of data is collected by the devices of
Internet of Things. Data processing and data retrieval is
considered as the internal part of the Internet of Things
environment. The data that are put in the devices of Internet of
Things are very personal and also needed to give a protection
via encryption. The security issue of Internet of Things is
secured by using Secure Socket Layer Protocol (SSL) when
the information is online [5]. The website that are used in
daily life has Secure Socket Layer Protocol certification to
give a protection to the and also encrypt the user data that are
online. Only the half part of the website is protected by SSL
and the other side is to give protection to wireless protocol
side. The data that are transferred without wire also needs
encryption process. The location of the sensitive data is to be
kept personal and it is to be kept in mind that only the user
knows about the data. So, for inbuilt encryption, wireless
protocol is to be installed.
B. Data Authentication
When the data is encrypted, and then comes
the chance of getting hacked. The data is to be
protected from hacking. To security to establish
authenticity of data those are communicated to
the receiver and from the sender in an Internet of
Things is compromised [8]. For an example, in a temperature
sensor device for smart home, even after encryption of data, if
someone hacks the system and send fake data instructing the
sensor to make the temperature hot instead if cooling or vice
versa. So there must be authenticated data that are sending to
the device. Security risk comes from authentication problem
of the information.
C. Hardware Issue
The hardware creates a problem from the beginning of
Internet of Things [16]. The makers of Internet of Things
devices, the chipmakers of devices such as Intel and ARM are
focusing more on security purpose because with all time new
generation evolving, new ways are coming to as a risk to the
devices. But then also the security gap does not fill up. The
modern architecture of the devices of Internet of Things faces
a security problem mainly in the chips that are fixed inbuilt in
the Internet of Things devices [15]. Making new devices and
implementing new chips make the price of the device go high.
To ensure the security process, the chips are remade and thus
become expensive. The complex design of the chips also
requires more power consumption which gives a challenge to
the Internet of Things devices. Better approaches are to be
inbuilt so that the devices are affordable and are safe from
security risks.
IV. MITIGATE SECURITY THREAT
The solution for mitigating risk that is related to
hardware security is done by testing the system before the
framework is being installed. Four such methods of testing a
device before implementation is discussed below-
Testing hardware-
The best and most significant way to mitigate the security risk
of hardware in Internet of Things is to test the framework of
the place [4]. The testing procedure includes- device range,
capacity and latency and manufacturability test.
In Device range the coverage network of Internet of Things is
paramount. The range of the application is to be specified
before the device application. For example if the technology
of Zigbee is applied on the device’s network that is to be
implemented, then the numbers of repeaters are to needed is to
be fixed so that the communication range id fixed. The
capacity of handling the speed of device network in bytes per
second and the latency signifies the time that is taken to
transfer the data between endpoints of application [3]. The
latency and the capacity of the applications of Internet of
Things are to be improved so that the performance increases.
The applications and the devices of data intensive are to be
tested thoroughly for balancing the capacity and latency of the
device. Manufacturability test includes testing the devices that
are taken from other manufacturers so the when they are
accumulated to make a device, it does not creates a problem.
The devices are to be tested individually.
Acknowledgment
Applications of Internet of Things such as
management of infrastructure in rural and urban areas,
monitoring health remotely, transportation systems,
emergency system notification and shopping systems are
depending upon Internet of Things based devices. In this
present digital world, it is very much important to learn the
basis of the emerging technology of Internet of Things. The
life enhancing services are enabled by Internet of Things
through different sectors of economy. Different features of
business, implementation and research that are related with
Internet of Things are needed in industries, government and
academics.
References
[1] Bonomi, Flavio, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. "Fog
computing and its role in the internet of things." In Proceedings of the
first edition of the MCC workshop on Mobile cloud computing, pp. 13-
16. ACM, 2012.
[2] Chandrakanth, S., K. Venkatesh, J. Uma Mahesh, and K. V.
Naganjaneyulu. "Internet of things." International Journal of
Innovations & Advancement in Computer Science 3, no. 8 (2014): 16-
20.
[3] Cui X. The internet of things. InEthical Ripples of Creativity and
Innovation 2016 (pp. 61-68). Palgrave Macmillan, London.
[4] Da Xu, Li, Wu He, and Shancang Li. "Internet of things in industries: A
survey." IEEE Transactions on industrial informatics 10, no. 4 (2014):
2233-2243.
[5] Drucker, Peter F. "Internet of Things." European Commission
Information Society and Media (2015).
[6] Gubbi, Jayavardhana, Rajkumar Buyya, Slaven Marusic, and Marimuthu
Palaniswami. "Internet of Things (IoT): A vision, architectural elements,
and future directions." Future generation computer systems 29, no. 7
(2013): 1645-1660.
[7] Lee, Gyu Myoung, Noel Crespi, Jun Kyun Choi, and Matthieu
Boussard. "Internet of things." In Evolution of Telecommunication
Services, pp. 257-282. Springer Berlin Heidelberg, 2013.
[8] Rose K, Eldridge S, Chapin L. The internet of things: An overview. The
Internet Society (ISOC). 2015 Oct 15:1-50.
[9] Vermesan O and Friess P, editors. Internet of things: converging
technologies for smart environments and integrated ecosystems. River
Publishers; 2013.
[10] Wang, Yongheng, and Xiaoming Zhang. "Internet of things." (2012).
[11] Wortmann, Felix, and Kristina Flüchter. "Internet of things." Business &
Information Systems Engineering 57, no. 3 (2015): 221-224.
[12] Wortmann, Felix, and Kristina Flüchter. "Internet of things." Business &
Information Systems Engineering 57, no. 3 (2015): 221-224.
[13] Xia F, Yang LT, Wang L and Vinel A. Internet of things. International
Journal of Communication Systems. 2012 Sep 1;25(9):1101.
[14] Xia, Feng, Laurence T. Yang, Lizhe Wang, and Alexey Vinel. "Internet
of things." International Journal of Communication Systems 25, no. 9
(2012): 1101.
[15] Yang, Shuang-Hua. "Internet of things." In Wireless Sensor Networks,
pp. 247-261. Springer London, 2014.
[16] Zanella, Andrea, Nicola Bui, Angelo Castellani, Lorenzo Vangelista,
and Michele Zorzi. "Internet of things for smart cities." IEEE Internet of
Things journal 1, no. 1 (2014): 22-32.
someone hacks the system and send fake data instructing the
sensor to make the temperature hot instead if cooling or vice
versa. So there must be authenticated data that are sending to
the device. Security risk comes from authentication problem
of the information.
C. Hardware Issue
The hardware creates a problem from the beginning of
Internet of Things [16]. The makers of Internet of Things
devices, the chipmakers of devices such as Intel and ARM are
focusing more on security purpose because with all time new
generation evolving, new ways are coming to as a risk to the
devices. But then also the security gap does not fill up. The
modern architecture of the devices of Internet of Things faces
a security problem mainly in the chips that are fixed inbuilt in
the Internet of Things devices [15]. Making new devices and
implementing new chips make the price of the device go high.
To ensure the security process, the chips are remade and thus
become expensive. The complex design of the chips also
requires more power consumption which gives a challenge to
the Internet of Things devices. Better approaches are to be
inbuilt so that the devices are affordable and are safe from
security risks.
IV. MITIGATE SECURITY THREAT
The solution for mitigating risk that is related to
hardware security is done by testing the system before the
framework is being installed. Four such methods of testing a
device before implementation is discussed below-
Testing hardware-
The best and most significant way to mitigate the security risk
of hardware in Internet of Things is to test the framework of
the place [4]. The testing procedure includes- device range,
capacity and latency and manufacturability test.
In Device range the coverage network of Internet of Things is
paramount. The range of the application is to be specified
before the device application. For example if the technology
of Zigbee is applied on the device’s network that is to be
implemented, then the numbers of repeaters are to needed is to
be fixed so that the communication range id fixed. The
capacity of handling the speed of device network in bytes per
second and the latency signifies the time that is taken to
transfer the data between endpoints of application [3]. The
latency and the capacity of the applications of Internet of
Things are to be improved so that the performance increases.
The applications and the devices of data intensive are to be
tested thoroughly for balancing the capacity and latency of the
device. Manufacturability test includes testing the devices that
are taken from other manufacturers so the when they are
accumulated to make a device, it does not creates a problem.
The devices are to be tested individually.
Acknowledgment
Applications of Internet of Things such as
management of infrastructure in rural and urban areas,
monitoring health remotely, transportation systems,
emergency system notification and shopping systems are
depending upon Internet of Things based devices. In this
present digital world, it is very much important to learn the
basis of the emerging technology of Internet of Things. The
life enhancing services are enabled by Internet of Things
through different sectors of economy. Different features of
business, implementation and research that are related with
Internet of Things are needed in industries, government and
academics.
References
[1] Bonomi, Flavio, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. "Fog
computing and its role in the internet of things." In Proceedings of the
first edition of the MCC workshop on Mobile cloud computing, pp. 13-
16. ACM, 2012.
[2] Chandrakanth, S., K. Venkatesh, J. Uma Mahesh, and K. V.
Naganjaneyulu. "Internet of things." International Journal of
Innovations & Advancement in Computer Science 3, no. 8 (2014): 16-
20.
[3] Cui X. The internet of things. InEthical Ripples of Creativity and
Innovation 2016 (pp. 61-68). Palgrave Macmillan, London.
[4] Da Xu, Li, Wu He, and Shancang Li. "Internet of things in industries: A
survey." IEEE Transactions on industrial informatics 10, no. 4 (2014):
2233-2243.
[5] Drucker, Peter F. "Internet of Things." European Commission
Information Society and Media (2015).
[6] Gubbi, Jayavardhana, Rajkumar Buyya, Slaven Marusic, and Marimuthu
Palaniswami. "Internet of Things (IoT): A vision, architectural elements,
and future directions." Future generation computer systems 29, no. 7
(2013): 1645-1660.
[7] Lee, Gyu Myoung, Noel Crespi, Jun Kyun Choi, and Matthieu
Boussard. "Internet of things." In Evolution of Telecommunication
Services, pp. 257-282. Springer Berlin Heidelberg, 2013.
[8] Rose K, Eldridge S, Chapin L. The internet of things: An overview. The
Internet Society (ISOC). 2015 Oct 15:1-50.
[9] Vermesan O and Friess P, editors. Internet of things: converging
technologies for smart environments and integrated ecosystems. River
Publishers; 2013.
[10] Wang, Yongheng, and Xiaoming Zhang. "Internet of things." (2012).
[11] Wortmann, Felix, and Kristina Flüchter. "Internet of things." Business &
Information Systems Engineering 57, no. 3 (2015): 221-224.
[12] Wortmann, Felix, and Kristina Flüchter. "Internet of things." Business &
Information Systems Engineering 57, no. 3 (2015): 221-224.
[13] Xia F, Yang LT, Wang L and Vinel A. Internet of things. International
Journal of Communication Systems. 2012 Sep 1;25(9):1101.
[14] Xia, Feng, Laurence T. Yang, Lizhe Wang, and Alexey Vinel. "Internet
of things." International Journal of Communication Systems 25, no. 9
(2012): 1101.
[15] Yang, Shuang-Hua. "Internet of things." In Wireless Sensor Networks,
pp. 247-261. Springer London, 2014.
[16] Zanella, Andrea, Nicola Bui, Angelo Castellani, Lorenzo Vangelista,
and Michele Zorzi. "Internet of things for smart cities." IEEE Internet of
Things journal 1, no. 1 (2014): 22-32.
1 out of 3
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.