CINXE.COM
Search results for: internet of things
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: internet of things</title> <meta name="description" content="Search results for: internet of things"> <meta name="keywords" content="internet of things"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="internet of things" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="internet of things"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 2135</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: internet of things</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2135</span> A Survey on Internet of Things and Fog Computing as a Platform for Internet of Things</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Samira%20Kalantary">Samira Kalantary</a>, <a href="https://publications.waset.org/abstracts/search?q=Sara%20Taghipour"> Sara Taghipour</a>, <a href="https://publications.waset.org/abstracts/search?q=Mansoure%20Ghias%20Abadi"> Mansoure Ghias Abadi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Internet of Things (IOT) is a technological revolution that represents the future of computing and communications. IOT is the convergence of Internet with RFID, NFC, Sensor, and smart objects. Fog Computing is the natural platform for IOT. At present, the IOT as a new network communication technology has rapidly shifted from concept to application under fog computing virtual storage computing platform. In this paper, we describe everything about IOT and difference between cloud computing and fog computing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title="cloud computing">cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=fog%20computing" title=" fog computing"> fog computing</a>, <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things%20%28IoT%29" title=" Internet of Things (IoT)"> Internet of Things (IoT)</a>, <a href="https://publications.waset.org/abstracts/search?q=IOT%20application" title=" IOT application"> IOT application</a> </p> <a href="https://publications.waset.org/abstracts/30670/a-survey-on-internet-of-things-and-fog-computing-as-a-platform-for-internet-of-things" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30670.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">584</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2134</span> Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aabiah%20Nayeem">Aabiah Nayeem</a>, <a href="https://publications.waset.org/abstracts/search?q=Fariha%20Shafiq"> Fariha Shafiq</a>, <a href="https://publications.waset.org/abstracts/search?q=Mustabshra%20Aftab"> Mustabshra Aftab</a>, <a href="https://publications.waset.org/abstracts/search?q=Rabia%20Saman%20Pirzada"> Rabia Saman Pirzada</a>, <a href="https://publications.waset.org/abstracts/search?q=Samia%20Ghazala"> Samia Ghazala</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today’s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=embedded%20computing" title="embedded computing">embedded computing</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title=" internet of things"> internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20computing" title=" mobile computing"> mobile computing</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20technologies" title=" wireless technologies"> wireless technologies</a> </p> <a href="https://publications.waset.org/abstracts/82889/comparison-of-security-challenges-and-issues-of-mobile-computing-and-internet-of-things" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82889.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">316</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2133</span> An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Umesh%20Kumar%20Singh">Umesh Kumar Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Abhishek%20Raghuvanshi"> Abhishek Raghuvanshi</a>, <a href="https://publications.waset.org/abstracts/search?q=Suyash%20Kumar%20Singh"> Suyash Kumar Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title="internet of things">internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability%20identification" title=" vulnerability identification"> vulnerability identification</a>, <a href="https://publications.waset.org/abstracts/search?q=mitigation%20plan" title=" mitigation plan"> mitigation plan</a> </p> <a href="https://publications.waset.org/abstracts/185503/an-efficient-mitigation-plan-to-encounter-various-vulnerabilities-in-internet-of-things-enterprises" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185503.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">40</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2132</span> Internet of Things Applications on Supply Chain Management</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Beatriz%20Cort%C3%A9s">Beatriz Cortés</a>, <a href="https://publications.waset.org/abstracts/search?q=Andr%C3%A9s%20Boza"> Andrés Boza</a>, <a href="https://publications.waset.org/abstracts/search?q=David%20P%C3%A9rez"> David Pérez</a>, <a href="https://publications.waset.org/abstracts/search?q=Llanos%20Cuenca"> Llanos Cuenca</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Internet of Things (IoT) field is been applied in industries with different purposes. Sensing Enterprise (SE) is an attribute of an enterprise or a network that allows it to react to business stimuli originating on the internet. These fields have come into focus recently on the enterprises and there is some evidence of the use and implications in supply chain management while finding it as an interesting aspect to work on. This paper presents a revision and proposals of IoT applications in supply chain management. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=industrial" title="industrial">industrial</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title=" internet of things"> internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=production%20systems" title=" production systems"> production systems</a>, <a href="https://publications.waset.org/abstracts/search?q=sensing%20enterprises" title=" sensing enterprises"> sensing enterprises</a>, <a href="https://publications.waset.org/abstracts/search?q=sensor" title=" sensor"> sensor</a>, <a href="https://publications.waset.org/abstracts/search?q=supply%20%20chain%20management" title=" supply chain management"> supply chain management</a> </p> <a href="https://publications.waset.org/abstracts/32455/internet-of-things-applications-on-supply-chain-management" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32455.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">421</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2131</span> The Determinants of Behavioral Intention to Use toward T-Cash Services Provider in Jakarta and Surburban Area</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Stephen%20Coandadiputra">Stephen Coandadiputra</a>, <a href="https://publications.waset.org/abstracts/search?q=Chrestella%20Carissa"> Chrestella Carissa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Technology is created to simplify human’s life. One of current technology which being called as the second wave internet generation is the internet of things. Internet of things lets thousands of devices connected each other. In today's marketing world, IOT has brought customer into the next level which helping the customer to shorten every transaction they are conducting from traditional approach to sophisticated approach. However, the implementation of technology has always obstacles. The objective of this paper is to explore the determinants of customer to accepts such technology like the internet of things within their transaction. According to TAM (Technology Acceptance Model), researcher constructs the acceptance of internet of things based on perceived usefulness, perceived ease of use and trust and social factor and the two customer characteristics: perceived enjoyment and perceived behavioral control. This research uses exploratory research design which being facilitated by spreading questionnaire to 145 T-cash users in Jakarta and in its suburban region. At least, 190 samples were observed and questioned accordingly. All the collected data will be analyzed using Lisrel. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=behavioral%20intention%20to%20use" title="behavioral intention to use">behavioral intention to use</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title=" internet of things"> internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=near%20field%20communication" title=" near field communication"> near field communication</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20acceptance%20model" title=" technology acceptance model"> technology acceptance model</a> </p> <a href="https://publications.waset.org/abstracts/73945/the-determinants-of-behavioral-intention-to-use-toward-t-cash-services-provider-in-jakarta-and-surburban-area" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73945.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">335</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2130</span> Integration of Internet-Accessible Resources in the Field of Mobile Robots</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=B.%20Madhevan">B. Madhevan</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Sakkaravarthi"> R. Sakkaravarthi</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Diya"> R. Diya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The number and variety of mobile robot applications are increasing day by day, both in an industry and in our daily lives. First developed as a tool, nowadays mobile robots can be integrated as an entity in Internet-accessible resources. The present work is organized around four potential resources such as cloud computing, Internet of things, Big data analysis and Co-simulation. Further, the focus relies on integrating, analyzing and discussing the need for integrating Internet-accessible resources and the challenges deriving from such integration, and how these issues have been tackled. Hence, the research work investigates the concepts of the Internet-accessible resources from the aspect of the autonomous mobile robots with an overview of the performances of the currently available database systems. IaR is a world-wide network of interconnected objects, can be considered an evolutionary process in mobile robots. IaR constitutes an integral part of future Internet with data analysis, consisting of both physical and virtual things. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet-accessible%20resources" title="internet-accessible resources">internet-accessible resources</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=big%20data%20analysis" title=" big data analysis"> big data analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title=" internet of things"> internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20robot" title=" mobile robot"> mobile robot</a> </p> <a href="https://publications.waset.org/abstracts/50385/integration-of-internet-accessible-resources-in-the-field-of-mobile-robots" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50385.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">388</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2129</span> An Analysis of Privacy and Security for Internet of Things Applications </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dhananjay%20Singh">Dhananjay Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Abdullah-Al-Wadud"> M. Abdullah-Al-Wadud</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things%20%28IoT%29" title="Internet of Things (IoT)">Internet of Things (IoT)</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20authentication" title=" message authentication"> message authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/59840/an-analysis-of-privacy-and-security-for-internet-of-things-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59840.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">382</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2128</span> Evaluating Global ‘Thing’ Security of Consumer Products</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Achutha%20Raman">Achutha Raman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Today's brave new world features a bonanza of digitally interconnected products, or ‘things,’ that improve convenience, possibilities, and in some cases efficiency for consumers. Nonetheless, even as the market accelerates, this Internet of ‘things’ is subject to substantial leakage of consumer personal data. First defining the fluid concept of ‘things,’ this paper subsequently uses case studies taken from the EU, Asia, and the US, to highlight large gaps and comprehensively evaluate the state of security for consumer ‘things.’ Ultimately, this paper offers several ways of improving the present status quo, and especially focuses on an evaluative approach that augments the standard mechanism of Firmware Over the Air Updates, and ought to be easily implementable. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=FOTA" title=" FOTA"> FOTA</a>, <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things" title=" Internet of Things"> Internet of Things</a>, <a href="https://publications.waset.org/abstracts/search?q=transnational%20privacy" title=" transnational privacy"> transnational privacy</a> </p> <a href="https://publications.waset.org/abstracts/69272/evaluating-global-thing-security-of-consumer-products" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69272.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">218</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2127</span> Internet of Things (IoT): An Analysis of Cost, Benefits, Risks and Enablers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shwadhin%20Sharma">Shwadhin Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=Monica%20Perez"> Monica Perez</a>, <a href="https://publications.waset.org/abstracts/search?q=Vinita%20Patel"> Vinita Patel</a>, <a href="https://publications.waset.org/abstracts/search?q=Tyler%20Kuwatani"> Tyler Kuwatani</a>, <a href="https://publications.waset.org/abstracts/search?q=Siobhan%20Scott"> Siobhan Scott</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this research is to explain and analyze why the Internet of Things (IoT) is an emerging technology trend. The aspects of this research paper include an overview of IoT, what research has already been done, the benefits, implications, and our own perspectives on the trend in order to thoroughly analyze how the trend of IoT will make an impact on society. Through the identification of what makes IoT important, it is concluded that IoT will have a tremendous impact for the whole world. Technology is never going to go away, it is going to get smarter and have the potential to change the world. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title="internet of things">internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=enablers%20of%20IoT" title=" enablers of IoT"> enablers of IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=cost%20of%20IoT" title=" cost of IoT"> cost of IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=benefits%20of%20IoT" title=" benefits of IoT"> benefits of IoT</a> </p> <a href="https://publications.waset.org/abstracts/52044/internet-of-things-iot-an-analysis-of-cost-benefits-risks-and-enablers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/52044.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">356</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2126</span> Privacy for the Internet of Things and its Different Dimensions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maryam%20M%20Esfahani">Maryam M Esfahani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Internet of Things is a concept that has fundamentally changed the way information technology works and communication environments. This concept, which is referred to as the next revolution in the field of information and communication technology, takes advantage of existing technologies such as wireless sensor networks, RFID, cloud computing, M2M, etc., to the final slogan of providing the possibility of connecting any object anywhere and everywhere. This use of technologies, along with the possibility of providing new services, also inherits their threats, and although the Internet of Things is facing many challenges, it can be said that its most important challenge is security and privacy, and perhaps even a more tangible challenge is privacy. In this article, we will first introduce the definition and concepts related to privacy, and then we will examine some threats against the privacy of the Internet of Things in different layers of a typical architecture. Also, while examining the differences and the relationship between security and privacy, we study different dimensions of privacy, and finally, we review some of the methods and technologies for improving the level of privacy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Iot" title="Iot">Iot</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=different%20dimension%20of%20privacy" title=" different dimension of privacy"> different dimension of privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=W3model" title=" W3model"> W3model</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20enhancing%20technologies" title=" privacy enhancing technologies"> privacy enhancing technologies</a> </p> <a href="https://publications.waset.org/abstracts/168830/privacy-for-the-internet-of-things-and-its-different-dimensions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168830.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">98</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2125</span> The Application of Internet of Things in Healthcare: Building an Interconnected Health Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Quinn%20Au">Quinn Au</a>, <a href="https://publications.waset.org/abstracts/search?q=Amedeo%20Carmine"> Amedeo Carmine</a>, <a href="https://publications.waset.org/abstracts/search?q=Tauheed%20Khan%20Mohd"> Tauheed Khan Mohd</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Internet of Things (IoT) is emerging as a new development in information technology in recent years, with the potential to improve convenience and efficiency in life. Following the rise of IoT, the Social Internet of Things (SIoT) is another new development in which the benefits of connectivity and user-friendliness from social network services (SNS) are its main features. With the introduction of IoT, the world will be much more modernized, convenient, and industrialized. This paper will discuss the applications of IoT in different sectors such as healthcare services, education, and lifestyle. The privacy challenges that IoT still poses to user data will also be discussed. Finally, an empirical study to evaluate the number of active installed IoT connections in recent years demonstrates the increase in usage of IoT regardless of the privacy challenges. The study also examines some types of IoT devices that are being preferred in the market and predictions from researchers about IoT in the upcoming years. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=IoT" title="IoT">IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20care" title=" health care"> health care</a>, <a href="https://publications.waset.org/abstracts/search?q=robotics" title=" robotics"> robotics</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20Internet%20of%20Things" title=" social Internet of Things"> social Internet of Things</a> </p> <a href="https://publications.waset.org/abstracts/133408/the-application-of-internet-of-things-in-healthcare-building-an-interconnected-health-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/133408.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">151</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2124</span> Calculate Product Carbon Footprint through the Internet of Things from Network Science</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jing%20Zhang">Jing Zhang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> To reduce the carbon footprint of mankind and become more sustainable is one of the major challenges in our era. Internet of Things (IoT) mainly resolves three problems: Things to Things (T2T), Human to Things, H2T), and Human to Human (H2H). Borrowing the classification of IoT, we can find carbon prints of industries also can be divided in these three ways. Therefore, monitoring the routes of generation and circulation of products may help calculate product carbon print. This paper does not consider any technique used by IoT itself, but the ideas of it look at the connection of products. Carbon prints are like a gene or mark of a product from raw materials to the final products, which never leave the products. The contribution of this paper is to combine the characteristics of IoT and the methodology of network science to find a way to calculate the product's carbon footprint. Life cycle assessment, LCA is a traditional and main tool to calculate the carbon print of products. LCA is a traditional but main tool, which includes three kinds. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=product%20carbon%20footprint" title="product carbon footprint">product carbon footprint</a>, <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things" title=" Internet of Things"> Internet of Things</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20science" title=" network science"> network science</a>, <a href="https://publications.waset.org/abstracts/search?q=life%20cycle%20assessment" title=" life cycle assessment"> life cycle assessment</a> </p> <a href="https://publications.waset.org/abstracts/155253/calculate-product-carbon-footprint-through-the-internet-of-things-from-network-science" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155253.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">116</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2123</span> Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maha%20Aladdin">Maha Aladdin</a>, <a href="https://publications.waset.org/abstracts/search?q=Khaled%20Nagaty"> Khaled Nagaty</a>, <a href="https://publications.waset.org/abstracts/search?q=Abeer%20Hamdy"> Abeer Hamdy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title="internet of things">internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptography" title=" cryptography"> cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20protocol" title=" security protocol"> security protocol</a> </p> <a href="https://publications.waset.org/abstracts/154760/secure-authentication-scheme-based-on-numerical-series-cryptography-for-internet-of-things" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154760.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">120</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2122</span> Security of Internet of Things: Challenges, Requirements and Future Directions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amjad%20F.%20Alharbi">Amjad F. Alharbi</a>, <a href="https://publications.waset.org/abstracts/search?q=Bashayer%20A.%20Alotaibi"> Bashayer A. Alotaibi</a>, <a href="https://publications.waset.org/abstracts/search?q=Fahd%20S.%20Alotaibi"> Fahd S. Alotaibi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things%20%28IoT%29" title="Internet of Things (IoT)">Internet of Things (IoT)</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20challenges" title=" IoT security challenges"> IoT security challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20requirements" title=" IoT security requirements"> IoT security requirements</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20architecture" title=" IoT security architecture"> IoT security architecture</a> </p> <a href="https://publications.waset.org/abstracts/71488/security-of-internet-of-things-challenges-requirements-and-future-directions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71488.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">374</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2121</span> Implementing Internet of Things through Building Information Modelling in Order to Assist with the Maintenance Stage of Commercial Buildings</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ushir%20Daya">Ushir Daya</a>, <a href="https://publications.waset.org/abstracts/search?q=Zenadene%20Lazarus"> Zenadene Lazarus</a>, <a href="https://publications.waset.org/abstracts/search?q=Dimelle%20Moodley"> Dimelle Moodley</a>, <a href="https://publications.waset.org/abstracts/search?q=Ehsan%20Saghatforoush"> Ehsan Saghatforoush</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It was found through literature that there is a lack of implementation of the Internet of Things (IoT) incorporated into Building Information Modelling (BIM) in South Africa. The research aims to find if the implementation of IoT into BIM will make BIM more useful during the maintenance stage of buildings and assist facility managers when doing their job. The research will look at the existing problematic areas with building information modelling, specifically BIM 7D. This paper will look at the capabilities of IoT and what issues IoT will be able to resolve in BIM software, as well as how IoT into BIM will assist facility managers and if such an implementation will make a facility manager's job more efficient. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title="internet of things">internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=building%20information%20modeling" title=" building information modeling"> building information modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=facilities%20management" title=" facilities management"> facilities management</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20health%20monitoring" title=" structural health monitoring"> structural health monitoring</a> </p> <a href="https://publications.waset.org/abstracts/119277/implementing-internet-of-things-through-building-information-modelling-in-order-to-assist-with-the-maintenance-stage-of-commercial-buildings" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/119277.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">208</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2120</span> Industry 4.0 and Supply Chain Integration: Case of Tunisian Industrial Companies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rym%20Ghariani">Rym Ghariani</a>, <a href="https://publications.waset.org/abstracts/search?q=Ghada%20Soltane"> Ghada Soltane</a>, <a href="https://publications.waset.org/abstracts/search?q=Younes%20Boujelbene"> Younes Boujelbene</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Industry 4.0, a set of emerging smart and digital technologies, has been the main focus of operations management researchers and practitioners in recent years. The objective of this research paper is to study the impact of Industry 4.0 on the integration of the supply chain (SCI) in Tunisian industrial companies. A conceptual model to study the relationship between Industry 4.0 technologies and supply chain integration was designed. This model contains three explained variables (Big data, Internet of Things, and Robotics) and one variable to be explained (supply chain integration). In order to answer our research questions and investigate the research hypotheses, principal component analysis and discriminant analysis were used using SPSS26 software. The results reveal that there is a statistically positive impact significant impact of Industry 4.0 (Big data, Internet of Things and Robotics) on the integration of the supply chain. Interestingly, big data has a greater positive impact on supply chain integration than the Internet of Things and robotics. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=industry%204.0%20%28I4.0%29" title="industry 4.0 (I4.0)">industry 4.0 (I4.0)</a>, <a href="https://publications.waset.org/abstracts/search?q=big%20data" title=" big data"> big data</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title=" internet of things"> internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=robotics" title=" robotics"> robotics</a>, <a href="https://publications.waset.org/abstracts/search?q=supply%20chain%20integration" title=" supply chain integration"> supply chain integration</a> </p> <a href="https://publications.waset.org/abstracts/185906/industry-40-and-supply-chain-integration-case-of-tunisian-industrial-companies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185906.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">59</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2119</span> Using the Internet of Things to Deal with Ventilators for Minimizing the Direct Contact with COVID-19 Patients</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammed%20Al-Shalabi">Mohammed Al-Shalabi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, the Internet of Things (IoT) has become an important technology for connecting various smart objects in many applications, especially in health monitoring applications. The IoT technology develops healthcare applications from traditional to personalized ones by making the treatment and monitoring of patients easier. Nowadays, especially during the COVID-19 pandemic, the necessity of enhancing healthcare monitoring applications to avoid the spreading of this pandemic is increased. In this paper, a mechanism is proposed to minimize direct contact with COVID-19 patients who need ventilators by using IoT technology. The proposed mechanism saves medical providers from COVID-19 infection and then minimizes the spreading of this disease. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title="internet of things">internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare%20monitoring" title=" healthcare monitoring"> healthcare monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=COVID-19" title=" COVID-19"> COVID-19</a>, <a href="https://publications.waset.org/abstracts/search?q=ventilators" title=" ventilators"> ventilators</a>, <a href="https://publications.waset.org/abstracts/search?q=thingspeak" title=" thingspeak"> thingspeak</a>, <a href="https://publications.waset.org/abstracts/search?q=clouds" title=" clouds"> clouds</a> </p> <a href="https://publications.waset.org/abstracts/150598/using-the-internet-of-things-to-deal-with-ventilators-for-minimizing-the-direct-contact-with-covid-19-patients" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150598.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">135</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2118</span> An Enhanced Digital Forensic Model for Internet of Things Forensic</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tina%20Wu">Tina Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrew%20Martin"> Andrew Martin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The expansion of the Internet of Things (IoT) brings a new level of threat. Attacks on IoT are already being used by criminals to form botnets, launch Distributed Denial of Service (DDoS) and distribute malware. This opens a whole new digital forensic arena to develop forensic methodologies in order to have the capability to investigate IoT related crimes. However, existing proposed IoT forensic models are still premature requiring further improvement and validation, many lack details on the acquisition and analysis phase. This paper proposes an enhanced theoretical IoT digital forensic model focused on identifying and acquiring the main sources of evidence in a methodical way. In addition, this paper presents a theoretical acquisition framework of the different stages required in order to be capable of acquiring evidence from IoT devices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=acquisition" title="acquisition">acquisition</a>, <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things" title=" Internet of Things"> Internet of Things</a>, <a href="https://publications.waset.org/abstracts/search?q=model" title=" model"> model</a>, <a href="https://publications.waset.org/abstracts/search?q=zoning" title=" zoning"> zoning</a> </p> <a href="https://publications.waset.org/abstracts/76982/an-enhanced-digital-forensic-model-for-internet-of-things-forensic" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76982.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">271</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2117</span> The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nazli%20W.%20Hardy">Nazli W. Hardy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=identity%20relation%20management" title="identity relation management">identity relation management</a>, <a href="https://publications.waset.org/abstracts/search?q=multifactor%20authentication" title=" multifactor authentication"> multifactor authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=protocols" title=" protocols"> protocols</a>, <a href="https://publications.waset.org/abstracts/search?q=survey%20of%20internet%20of%20things%20ecosystem" title=" survey of internet of things ecosystem"> survey of internet of things ecosystem</a> </p> <a href="https://publications.waset.org/abstracts/50501/the-internet-of-things-ecosystem-survey-of-the-current-landscape-identity-relationship-management-multifactor-authentication-mechanisms-and-underlying-protocols" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50501.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">354</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2116</span> A Named Data Networking Stack for Contiki-NG-OS</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sedat%20Bilgili">Sedat Bilgili</a>, <a href="https://publications.waset.org/abstracts/search?q=Alper%20K.%20Demir"> Alper K. Demir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The current Internet has become the dominant use with continuing growth in the home, medical, health, smart cities and industrial automation applications. Internet of Things (IoT) is an emerging technology to enable such applications in our lives. Moreover, Named Data Networking (NDN) is also emerging as a Future Internet architecture where it fits the communication needs of IoT networks. The aim of this study is to provide an NDN protocol stack implementation running on the Contiki operating system (OS). Contiki OS is an OS that is developed for constrained IoT devices. In this study, an NDN protocol stack that can work on top of IEEE 802.15.4 link and physical layers have been developed and presented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things%20%28IoT%29" title="internet of things (IoT)">internet of things (IoT)</a>, <a href="https://publications.waset.org/abstracts/search?q=named-data" title=" named-data"> named-data</a>, <a href="https://publications.waset.org/abstracts/search?q=named%20data%20networking%20%28NDN%29" title=" named data networking (NDN)"> named data networking (NDN)</a>, <a href="https://publications.waset.org/abstracts/search?q=operating%20system" title=" operating system"> operating system</a> </p> <a href="https://publications.waset.org/abstracts/146125/a-named-data-networking-stack-for-contiki-ng-os" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146125.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2115</span> Energy-Efficient Internet of Things Communications: A Comparative Study of Long-Term Evolution for Machines and Narrowband Internet of Things Technologies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nassim%20Labdaoui">Nassim Labdaoui</a>, <a href="https://publications.waset.org/abstracts/search?q=Fabienne%20Nouvel"> Fabienne Nouvel</a>, <a href="https://publications.waset.org/abstracts/search?q=St%C3%A9phane%20Dutertre"> Stéphane Dutertre</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Internet of Things (IoT) is emerging as a crucial communication technology for the future. Many solutions have been proposed, and among them, licensed operators have put forward LTE-M and NB-IoT. However, implementing these technologies requires a good understanding of the device energy requirements, which can vary depending on the coverage conditions. In this paper, we investigate the power consumption of LTE-M and NB-IoT devices using Ublox SARA-R422S modules based on relevant standards from two French operators. The measurements were conducted under different coverage conditions, and we also present an empirical consumption model based on the different states of the radio modem as per the RRC protocol specifications. Our findings indicate that these technologies can achieve a 5 years operational battery life under certain conditions. Moreover, we conclude that the size of transmitted data does not have a significant impact on the total power consumption of the device under favorable coverage conditions. However, it can quickly influence the battery life of the device under harsh coverage conditions. Overall, this paper offers insights into the power consumption of LTE-M and NBIoT devices and provides useful information for those considering the use of these technologies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title="internet of things">internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=LTE-M" title=" LTE-M"> LTE-M</a>, <a href="https://publications.waset.org/abstracts/search?q=NB-IoT" title=" NB-IoT"> NB-IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=MQTT" title=" MQTT"> MQTT</a>, <a href="https://publications.waset.org/abstracts/search?q=cellular%20IoT" title=" cellular IoT"> cellular IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20consumption" title=" power consumption"> power consumption</a> </p> <a href="https://publications.waset.org/abstracts/163932/energy-efficient-internet-of-things-communications-a-comparative-study-of-long-term-evolution-for-machines-and-narrowband-internet-of-things-technologies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163932.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">141</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2114</span> Image Recognition Performance Benchmarking for Edge Computing Using Small Visual Processing Unit</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kasidis%20Chomrat">Kasidis Chomrat</a>, <a href="https://publications.waset.org/abstracts/search?q=Nopasit%20Chakpitak"> Nopasit Chakpitak</a>, <a href="https://publications.waset.org/abstracts/search?q=Anukul%20Tamprasirt"> Anukul Tamprasirt</a>, <a href="https://publications.waset.org/abstracts/search?q=Annop%20Thananchana"> Annop Thananchana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Internet of Things devices or IoT and Edge Computing has become one of the biggest things happening in innovations and one of the most discussed of the potential to improve and disrupt traditional business and industry alike. With rises of new hang cliff challenges like COVID-19 pandemic that posed a danger to workforce and business process of the system. Along with drastically changing landscape in business that left ruined aftermath of global COVID-19 pandemic, looming with the threat of global energy crisis, global warming, more heating global politic that posed a threat to become new Cold War. How emerging technology like edge computing and usage of specialized design visual processing units will be great opportunities for business. The literature reviewed on how the internet of things and disruptive wave will affect business, which explains is how all these new events is an effect on the current business and how would the business need to be adapting to change in the market and world, and example test benchmarking for consumer marketed of newer devices like the internet of things devices equipped with new edge computing devices will be increase efficiency and reducing posing a risk from a current and looming crisis. Throughout the whole paper, we will explain the technologies that lead the present technologies and the current situation why these technologies will be innovations that change the traditional practice through brief introductions to the technologies such as cloud computing, edge computing, Internet of Things and how it will be leading into future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title="internet of things">internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=edge%20computing" title=" edge computing"> edge computing</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=pattern%20recognition" title=" pattern recognition"> pattern recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20classification" title=" image classification"> image classification</a> </p> <a href="https://publications.waset.org/abstracts/144127/image-recognition-performance-benchmarking-for-edge-computing-using-small-visual-processing-unit" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144127.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">155</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2113</span> Investigating Perception of Iranian Organizations on Internet of Things Solutions and Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Changiz%20Valmohammadi">Changiz Valmohammadi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The main purpose of this study is to explore the perception of Iranian experts and executive managers of sample organizations on the benefits and barriers of Internet of Things (IoT) solutions implementation. Based on the review of the related literature and web sites, benefits and barriers of successful implementation to IoT solutions were identified. Through a self-administered questionnaire which was collected from 67 Iranian organizations the ranking and importance of benefits and barriers of IoT solutions implementation were determined based on the perception of the experts of the surveyed organizations. Analysis of data and the obtained results revealed that “improved customer experience” and “Supply chain optimization and responsiveness” are the most important benefits that the survey organizations expect to reap as a result of IoT solutions implementation. Also,” Integration challenges" and “cannot find right suppliers” were ranked as the most challenging barriers to IoT solutions implementation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things%20%28IoT%29" title="internet of things (IoT)">internet of things (IoT)</a>, <a href="https://publications.waset.org/abstracts/search?q=exploratory%20study" title=" exploratory study"> exploratory study</a>, <a href="https://publications.waset.org/abstracts/search?q=benefits" title=" benefits"> benefits</a>, <a href="https://publications.waset.org/abstracts/search?q=barriers" title=" barriers"> barriers</a>, <a href="https://publications.waset.org/abstracts/search?q=Iran" title=" Iran"> Iran</a> </p> <a href="https://publications.waset.org/abstracts/25553/investigating-perception-of-iranian-organizations-on-internet-of-things-solutions-and-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25553.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">518</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2112</span> Applications of Internet of Things (IoTs) for Information Resources and Services: Survey of Academic Librarians</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sultan%20Aldaihani">Sultan Aldaihani</a>, <a href="https://publications.waset.org/abstracts/search?q=Eiman%20Al-Fadhli"> Eiman Al-Fadhli</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Internet of Things (IoTs) expected to change the future of academic libraries operations. It enables academic libraries to be smart libraries through, for example, the connection of the physical objects with the Internet. The implementation of IoTs will improve library resources and services. Therefore, this research aims to investigate the applications of Internet of Things (IoTs) for information resources and services. Understanding perceptions of academic librarians toward IoTs before adopting of such applications will assist decision-makers in academic libraries in their strategic planning. An online questionnaire was administered to academic librarians at Kuwait University. The findings of this study showed that academic librarians have awareness for the IoTs. They have strongly believed that the IoTs contributes to the development of information resources, services, and understanding of the user's information behavior. Identifying new applications of the IoTs in libraries was the highest possible reason for future adoption. Academic librarians indicated that lack of privacy and data penetration were the greatest problem in their future adoption of IoTs. Academic libraries need to implement the IoTs for enhancing their information resources and services. One important step in the success of future adoption is to conduct awareness and training programs for academic librarians. They also need to maintain higher security and privacy measurements in their implementation for the IoTs. This study will assist academic libraries in accommodating this technology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=academic%20libraries" title="academic libraries">academic libraries</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title=" internet of things"> internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20resources" title=" information resources"> information resources</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20services" title=" information services"> information services</a> </p> <a href="https://publications.waset.org/abstracts/110227/applications-of-internet-of-things-iots-for-information-resources-and-services-survey-of-academic-librarians" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/110227.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">153</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2111</span> A New Block Cipher for Resource-Constrained Internet of Things Devices</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Rana">Muhammad Rana</a>, <a href="https://publications.waset.org/abstracts/search?q=Quazi%20Mamun"> Quazi Mamun</a>, <a href="https://publications.waset.org/abstracts/search?q=Rafiqul%20Islam"> Rafiqul Islam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title="internet of things">internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptography%20block%20cipher" title=" cryptography block cipher"> cryptography block cipher</a>, <a href="https://publications.waset.org/abstracts/search?q=S-box" title=" S-box"> S-box</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20management" title=" key management"> key management</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=network" title=" network"> network</a> </p> <a href="https://publications.waset.org/abstracts/148938/a-new-block-cipher-for-resource-constrained-internet-of-things-devices" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148938.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">113</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2110</span> IoT: State-of-the-Art and Future Directions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bashir%20Abdu%20Muzakkari">Bashir Abdu Muzakkari</a>, <a href="https://publications.waset.org/abstracts/search?q=Aisha%20Umar%20Sulaiman"> Aisha Umar Sulaiman</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Afendee%20Muhamad"> Mohamed Afendee Muhamad</a>, <a href="https://publications.waset.org/abstracts/search?q=Sanah%20Abdullahi%20Muaz"> Sanah Abdullahi Muaz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The field of the Internet of Things (IoT) is rapidly expanding and has the potential to completely change how we work, live, and interact with the world. The Internet of Things (IoT) is the term used to describe a network of networked physical objects, including machinery, vehicles, and buildings, which are equipped with electronics, software, sensors, and network connectivity. This review paper aims to provide a comprehensive overview of the current state of IoT, including its definition, key components, development history, and current applications. The paper will also discuss the challenges and opportunities presented by IoT, as well as its potential impact on various industries, such as healthcare, agriculture, and transportation. In addition, this paper will highlight the ethical and security concerns associated with IoT and the need for effective solutions to address these challenges. The paper concludes by highlighting the prospects of IoT and the directions for future research in this field. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title="internet of things">internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=sensors" title=" sensors"> sensors</a>, <a href="https://publications.waset.org/abstracts/search?q=network" title=" network"> network</a> </p> <a href="https://publications.waset.org/abstracts/170950/iot-state-of-the-art-and-future-directions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170950.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">173</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2109</span> Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jerlin%20George">Jerlin George</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Chitra"> R. Chitra</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title="internet of things">internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare" title=" healthcare"> healthcare</a>, <a href="https://publications.waset.org/abstracts/search?q=sensors" title=" sensors"> sensors</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20health%20records" title=" electronic health records"> electronic health records</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=proxy%20re-encryption" title=" proxy re-encryption"> proxy re-encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20privacy" title=" data privacy"> data privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20security" title=" data security"> data security</a> </p> <a href="https://publications.waset.org/abstracts/192971/securing-health-monitoring-in-internet-of-things-with-blockchain-based-proxy-re-encryption" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/192971.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">15</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2108</span> Improving the Security of Internet of Things Using Encryption Algorithms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amirhossein%20Safi">Amirhossein Safi </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title="internet of things">internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=hybrid%20algorithm" title=" hybrid algorithm"> hybrid algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a> </p> <a href="https://publications.waset.org/abstracts/69919/improving-the-security-of-internet-of-things-using-encryption-algorithms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69919.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">467</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2107</span> Location Privacy Preservation of Vehicle Data In Internet of Vehicles</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ying%20Ying%20Liu">Ying Ying Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Austin%20Cooke"> Austin Cooke</a>, <a href="https://publications.waset.org/abstracts/search?q=Parimala%20Thulasiraman"> Parimala Thulasiraman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Internet of Things (IoT) has attracted a recent spark in research on Internet of Vehicles (IoV). In this paper, we focus on one research area in IoV: preserving location privacy of vehicle data. We discuss existing location privacy preserving techniques and provide a scheme for evaluating these techniques under IoV traffic condition. We propose a different strategy in applying Differential Privacy using k-d tree data structure to preserve location privacy and experiment on real world Gowalla data set. We show that our strategy produces differentially private data, good preservation of utility by achieving similar regression accuracy to the original dataset on an LSTM (Long Term Short Term Memory) neural network traffic predictor. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=differential%20privacy" title="differential privacy">differential privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title=" internet of things"> internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20vehicles" title=" internet of vehicles"> internet of vehicles</a>, <a href="https://publications.waset.org/abstracts/search?q=location%20privacy" title=" location privacy"> location privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20preservation%20scheme" title=" privacy preservation scheme"> privacy preservation scheme</a> </p> <a href="https://publications.waset.org/abstracts/127016/location-privacy-preservation-of-vehicle-data-in-internet-of-vehicles" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/127016.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">179</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2106</span> Remote Monitoring and Control System of Potentiostat Based on the Internet of Things</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Liang%20Zhao">Liang Zhao</a>, <a href="https://publications.waset.org/abstracts/search?q=Guangwen%20Wang"> Guangwen Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Guichang%20Liu"> Guichang Liu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Constant potometer is an important component of pipeline anti-corrosion systems in the chemical industry. Based on Internet of Things (IoT) technology, Programmable Logic Controller (PLC) technology and database technology, this paper developed a set of a constant potometer remote monitoring management system. The remote monitoring and remote adjustment of the working status of the constant potometer are realized. The system has real-time data display, historical data query, alarm push management, user permission management, and supporting Web access and mobile client application (APP) access. The actual engineering project test results show the stability of the system, which can be widely used in cathodic protection systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title="internet of things">internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=pipe%20corrosion%20protection" title=" pipe corrosion protection"> pipe corrosion protection</a>, <a href="https://publications.waset.org/abstracts/search?q=potentiostat" title=" potentiostat"> potentiostat</a>, <a href="https://publications.waset.org/abstracts/search?q=remote%20monitoring" title=" remote monitoring"> remote monitoring</a> </p> <a href="https://publications.waset.org/abstracts/110860/remote-monitoring-and-control-system-of-potentiostat-based-on-the-internet-of-things" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/110860.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">147</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=internet%20of%20things&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=internet%20of%20things&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=internet%20of%20things&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=internet%20of%20things&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=internet%20of%20things&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=internet%20of%20things&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=internet%20of%20things&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=internet%20of%20things&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=internet%20of%20things&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=internet%20of%20things&page=71">71</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=internet%20of%20things&page=72">72</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=internet%20of%20things&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>