Article

A Study on the Internet of Things (IoT) Applications

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

The government has adopted the field of "Internet of Things" as a national strategic project, announcing the Internet of Things master plan to achieve a leading country of hyper-connected digital revolution last May. The government has the promotional strategy of reinforcing the competitiveness in software (SW) sensor components devices, training specialists that will lead Internet of Things (IoT) services and products, and internalizing security for Internet of Things products and services. Internet of Things, thus expected to grow from W2 trillion and 300 billion last year to W30 trillion by 2020 in the market, refers to the Internet environment where people, things around, data, etc. are all connected to the wired and wireless network to mutually create, collect, share, and utilize information. Internet of Things is the technology and service that includes generating information (sensor) - acquisition (parts, devices) - sharing (Clyde) - utilization (Big Data) - application software. Internet of Things is getting a lot of attention from the public due to the effect of increasing export businesses and jobs and has become a buzzword among businesses. The Internet of Things market has a tendency to grow in the future as it is extended from social infrastructure (utilities, transportation, automation, etc.) and safety management to the consumer sector centered on life services. Sophisticated wireless communication technology is expected to form a huge network connected to all object units as a communication function.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... With the rapid development of information and communication technologies, our society is moving to a hyper-connected society because of being connected to the internet (Kang et al., 2015). The meaning of a hyperconnected society is to create new values by adding communication features to all the things, such as mobile phones, cameras, cars, watches, and houses (Kang et al., 2015). ...
... With the rapid development of information and communication technologies, our society is moving to a hyper-connected society because of being connected to the internet (Kang et al., 2015). The meaning of a hyperconnected society is to create new values by adding communication features to all the things, such as mobile phones, cameras, cars, watches, and houses (Kang et al., 2015). The construction industry should emphasise the use of Internet of Things and cloud computing applications, as the construction industry will become increasingly complex and complicated in the future, and if no application will facilitate the work involved, the construction industry will be left behind by the improvement of other industries (Mahmud et al., 2018). ...
... Internet of Things and Cloud computing are two new and rising modern technologies in the field of Information Technology and they have already become a part of our daily life (Sarkar et al., 2020). The basic aim of the Internet of Things and cloud computing is to the leading country towards the digital revolution (Kang et al.,2015). Nowadays in the construction industry, a large number of projects are generally being undertaken by a consortium of members or companies and they work collaboratively throughout the lifecycle of the project to provide a wide range of skills . ...
Conference Paper
Full-text available
The construction industry is known together of the foremost important industries within the world. However, it also can be considered together of the foremost conservative industries in terms of the adoption of latest methods or technologies. Developing technologies just like Internet of Things and cloud computing forces the construction industry to utilize novel approaches to beat cost and time overruns and productivity improvising of construction projects. In recent years, new technologies and concepts like the Internet of Things and cloud computing have drawn great interest within the construction industry. The construction industry should consider the Internet of Things and cloud computing as otherwise, it will be getting to be left behind by other industries. The main objectives of this paper are to study the application and concepts of the Internet of Things and cloud computing thorough review of the comprehensive literature to give significant information to practitioners for further research.
... As explored in (Datta & Bonnet, 2016), there is lack of horizontal development linked to IoT use cases in terms of interoperability, network security, security standards and privacy issues. IoT security aspects include IoT security frameworks (Ammar et al., 2018;Kang et al., 2015) and privacy and security threats (Berkay Celik, 2018;Yashwant & Joshi, 2018). There are many existing security schemes such as RSA. ...
Article
Full-text available
With the emergence of cloud eco-system and technologies like Internet of Things (IoT), bit data analytics became essential to reap benefits of maintaining large volumes of data. As there is amalgamation of different devices, protocols, standard and use cases linked to IoT, there is increasing risk of security. IoT applications are vulnerable due to lack of security standards at global level. There is need for continuous efforts to provide end-to-end security in IoT applications. Sensor networks associated with IoT are resource constrained but produce large volumes of data or big data. In such environment, more light weight security primitives. Elliptic Curve Diffie Hellman (ECDH) is one such lightweight scheme for secure key exchange among connected devices. Nevertheless, ECDH is found vulnerable to attacks. To address this problem, we proposed a scheme known as E-ECDH (ECDH+SIGH) which is an enhanced version of ECDH. Our scheme is designed to enhance security level in IoT use cases. To evaluate our scheme, we used an IoT use case meant for anomaly detection in healthcare context. This application is in distributed environment where cloud infrastructure, IoT platform and Message Queue Telemetry Transport (MQTT) protocol are involved. Our experimental study showed that E-ECDH improves level of security in given IoT application and found to be better than existing security schemes.
... The IoT is a collection of physical devices that are connected through the internet. These devices have sensors capable of transmitting to and receiving data from other devices or networks, through the cloud or the internet, along with distinct capabilities to analyze, make decisions or carry out important tasks [1][2][3][4][5]. ...
Article
Full-text available
The Internet of Things (IoT) in healthcare has gained significant attention in recent years. This study demonstrates an adaptation of IoT in healthcare by illustrating a method of respiration rate measurement from a platform that simulates breathing. Respiration rate is a crucial physiological measure in monitoring critically ill patients. The devised approach, with further development, may be suitable for integration into neonatal intensive care units (NICUs) to measure infants’ respiration rate. A potential advantage of this method is that it monitors respiration using a wireless non-contact method and could add benefits such as preservation of skin integrity. The paper aimed to assess the accuracy of an IoT-integrated ultrasound (US)-based method for measuring respiration rate. Chest movement due to respiration was simulated by a platform with a controllable moving surface. The magnitude and frequency of the movements were accurately controlled by a signal generator. The surface movements were tracked using US as a reliable and cost-effective technology. ESP8266 NodeMCU was used to wirelessly record the US signal and ThingSpeak and Matlab© were used to analyze and visualize the data in the cloud. A close relationship between the measured rate of the simulated respiration and the actual frequency was observed. The study demonstrated a possible adaption of IoT for respiration rate measurement, however further work will be needed to ensure security and reliability of data handling before use of the system in medical environments.
... IoT security, standards, information-centric networking, and interoperability are insufficient, according [9]. Frameworks [10,11] and security and privacy issues [12,13] provide IoT security. [14] shows that conventional RSA is too hefty for IoT devices. ...
Preprint
Full-text available
Internet of Things (IoT) applications are growing in popularity and utility leading towards more comforts and conveniences with diversified use cases. However, there are security concerns as IoT technology is made up of heterogeneous devices, protocols and standards. Therefore, the environment might have inherent security issues due to lack of an integrated security framework. Security of internet of things applications is thus crucial for the growth of such applications in the real world. Towards this end, we have proposed a series of security schemes in our prior work. In this paper, we proposed an integrated framework for Leveraging Security of Internet of Things Application (LSITA) with Remote Patient Monitoring System (RPMS) use case. The framework is named as Integrated IoT Security Framework which is realized with different schemes to have privacy and end to end security. The framework enables cloud assisted authentication, secure communications among parties involved in IoT application and an improved key sharing model for multi-user data analytics environment. Different security schemes work together with seamless integration. Remote Patient Monitoring System is the case study built to evaluate the proposed framework. Empirical results revealed that the proposed framework has holistic approach to security of IoT applications. It has potential to trigger further research in the area of IoT security.
... As Datta and Bonnet [6] opined that there is lack of horizontal development associated with IoT in terms of security, standards, information centric networking and inter-operability. Security of IoT frameworks [7,8] and security and privacy challenges [9,10] provided different aspects of IoT security. As presented in [11], the traditional RSA is not suitable for IoT devices as it is heavy weight mechanism. ...
Article
Full-text available
Internet of Things (IoT) technology became an inter-disciplinary revolution in the contemporary era. It is capable of influencing human lives significantly when used in different domains. It has plethora of use cases like smart transportation, smart healthcare and smart city to mention few. As IoT is capable of combining physical objects and digital objects seamlessly, it has opened gates to have thousands of use cases where IoT integration takes to the next generation of computations and building applications. The present IoT applications lack in end-to-end security as there are different protocols and vendors involved. No standardizations are made yet. Besides, the sources of big data such as sensor networks in IoT use cases generate large volumes of data that needs more lightweight cryptographic solutions. Diffie Hellman when combined with Elliptic Curve (EC-DH) became an ideal choice to have secure and lightweight communications for connected devices in IoT use cases. However, it is still vulnerable to certain kinds of attacks. To overcome this problem, we proposed an enhanced EC-DH known as E-ECDH for higher level of security to IoT applications. We considered an anomaly detection case study which is part of Healthcare industry. IBM cloud, Watson IoT platform and MQ Telemetry Transport messaging protocol are used as part of experimental setup. Experiments revealed the efficiency of the scheme as it provides higher level of security besides improving in performance in data encryption, decryption, execution time and time taken for upload and download. The proposed scheme can be used with real time IoT applications.
... By analyzing in detail the contents of the papers included in the database, it is possible to state how a large part deal with tools for the implementation of safety management principles [60][61][62][63][64][65][66][67]. ...
Article
Full-text available
Innovations introduced during the Industry 4.0 era consist in the integration of the so called “nine pillars of technologies” in manufacturing, transforming the conventional factory in a smart factory. The aim of this study is to investigate enabling technologies of Industry 4.0, focusing on technologies that have a greater impact on safety management. Main characteristics of such technologies will be identified and described according to their use in an industrial environment. In order to do this, we chose a systematic literature review (SLR) to answer the research question in a comprehensively way. Results show that articles can be grouped according to different criteria. Moreover, we found that Industry 4.0 can increase safety levels in warehouse and logistic, as well as several solutions are available for building sector.
... The Internet of Things (Kang et al., 2015) was instrumental in this training course because it enabled the trainers to provide any kind of common defects that might occur in a vehicle's air conditioner for the technicians to train. Furthermore, this was based on Huansheng Ning and Sha Hu, (2012) who explained that the IoT could be used for the hybrid training module for the online training of technicians. ...
Article
The objectives of this research were the following: 1) to develop a hybrid vehicular air conditioner repair training model based on the Internet of Things for technicians; 2) to compare their competency and achievement in vehicular air conditioner repair to those of the control group. The samples were 260 technicians, selected by a Multi-stage Random Sampling method. They were divided into two groups: 130 technicians in an experimental group and 130 technicians in a control group. The research instruments were as follows: (1) a Hybrid training model based on Internet of Things and problem-based learning; (2) a competency test; and (3) a achievement test. Data analysis was conducted using means, standard deviation, and one-way MANOVA. The results of the study were as follows: 1) A hybrid training model consisting of 3 components—1) hybrid online and face to face training, 2) Internet of things, and 3) problem-based Learning; 2) The experimental group of technicians achieved significantly higher scores in the competency and achievement tests than those achieved by the group control, at .05 level. Keywords: hybrid training, internet of things, problem-based learning
... By 2020 Korean government made plan implies that more than 10000 plants to be optimized with the help of IoT and other information technology software. [17] Several issues rise due to the rapid development on IoT technology. Security flaws let the IoT devices to be controlled without authorization due to lack of encryption in communication. ...
Article
Full-text available
Building’s Air Conditioning systems require moving liquids for dweller comfort. Clogged pipes, system degradation can cause pressure buildups, leaks and other faults which leads to damage to the building. Most of the leaks in the commercial building occur due to poor maintenance and/or material degradation. Visual inspection is most predominantly used to solve this problem in the industry. This paper introduces the Internet of Things technology to detect leakage in building’s hydronic pipes with the support of sensors, fault detection method and mechanical control. The system consists of: Microcontroller, Windows application and website application. Internet of Things technology was used to monitor and control the hydronics using microcontroller’s capability of connecting to main server which is used to transmit the data to the cloud. The prototype was successfully built and tested. Promising results show that leaks above 2ml/s could be detected after 4 seconds specifically for the built small-scale system while control and monitor feature could be implemented with Internet of Things technology.
... Therefore, establishing an IoT Engineering Laboratory jointly with number of its applications is necessary to Source (Kaukalias and Chatzimisios, 2015) carry out basic experiments in various industry applications including generating information (sensor); acquisition (parts, devices); sharing (Clyde); utilization (Big Data); and application software. The training of IoT engineers requires different platforms that include operation and training (Kang et al., 2015). ...
Chapter
Full-text available
Abstract Higher education institutions and their engineering departments have a vital role in fulfilling the new requirements and opportunities of the information and communication technologies (ICT). Therefore, understanding the guidelines to adapt to the new ICT innovations in relation with the Fourth Industrial Revolution such as the internet of things, cloud computing, virtual reality, and artificial intelligence is vital to determine the emerging patterns in their development, delivery, implementation, and assessment. This study aims to define the new educational requirements in engineering education based on the developments of the Fourth Industrial Revolution. Conducting an in-depth analysis of the current literature revealed that although these emerging technologies have been widely used, there are some challenges being faced for their effective use in engineering education. Therefore, the authors provide some guidelines and discuss possible research directions for the use of these technologies in near future.
... IoT has been widely used for various cases. As example, Korea implements IoT to provide payment services, security services, mobile operators, heath care, and smart farm [8]. In bigger scale, IoT can be used to transform a city into a smart city. ...
... The internet of things has been highlighted as a new growth engine of the ICT industry. [1] It was 20 years ago that the term "things of Internet" was first used, when Kevin Ashton of P&G mentioned that the IoT mounted with RFID and sensors would be built in 1999. It was more than 150 years ago when the communication between men was done via telephone. ...
Article
Full-text available
Internet of things (IoT) security is the technology area concerned with safeguarding networks and connected devices in the internet of things (IoT). IoT involves adding internet connectivity to a system of mechanical and digital machines, interrelated computing devices, animals, people and/or objects. Each "thing" is provided a unique identifier and the ability to automatically transfer data over a network. Allowing devices to connect to the internet opens them up to a number of serious vulnerabilities if they are not properly protected. In this paper, we discuss the different attacks and vulnerabilities which is classified by layer in the architecture. We also proposed solutions to mitigate and counter these attacks and vulnerabilities.
... The IoT continuous to grow according to the OECD and it has seen that the growth engine of IoT will enhance the modernization of communication and information, which will bring the added new value for other sectors. [3] However there are some challenges to the growth and use of IoT. One of the main challenges of IoT has to do with the interoperability of the heterogeneous platforms and the issue about managing the data generated by the smart objects. ...
Article
Full-text available
The Internet of Things (IoT) concept of connecting objects with IP address to a network has many significant applications such as smart health, smart cities, and smart energy. This study focuses on the use of Internet of Things for smart cities and its advantages. In this paper our main goal is to model and simulate an IoT system for Accra smart city that uses smart webcams with IP address that are addressable to allow these smart webcam transmit valuable information to users. The designed smart city will address a challenge by giving live feeds on traffic situations and flooding on major routes to people. We used cisco packet tracer to model and simulate the IoT network where smart webcams can remotely transmit data packets. The results of the simulation indicates that when the smart webcam are connected in a wireless medium, they can send and receive data packets via a 6LowPAN gateway which can be access by users in the Internet. 1. Introduction The Internet of Things (IoT) has been describe as a worldwide network, which interconnects seemly unique objects that are addressable, based on standard protocols for communication. [1] The Internet of Things is aimed at connecting smart objects to a network which can be access from anywhere and at anytime in the Internet. The concept of Internet of Things (IoT) will allow unique objects to be connected to a network that will remotely share data generated by these objects and interact with each other. The IoT seeks to present many benefits that will improve upon all aspects of our everyday living. This perhaps will allow people live a smart life in an IoT system. The key objective of IoT is to allow for the creation of a smart environment and the presents of things that are self-aware which formed the vision of IERC. [2] The smart objects present in the IoT space are self-aware and are able to remotely send data packets generated to each other via a communication network. The conceptualization of IoT is to make the Internet more pervasive for smart things, by allowing for heterogeneous devices such as sensors/actuators, RFIDs, ZigBee, 6LowPAN etc to connect and interact with each other. There are a number of applications of IoT that have significant benefits for people. Some applications of IoT include smart cities, smart health to improve the health of people, smart transport system that will help in the movement of people from one location to another and smart energy to ensure energy efficiency. A detail description of some useful application of IoT is below; Smart Energy: Energy plays a key role in achieving the desired economic growth of a country. The entire fabric of developmental goals is webbed around a successful energy strategy. Energy is vital for the creation of wealth and improvement of social welfare. Smart Energy Monitors (SEM) is a technology introduced to help people to conserve energy and to use electricity efficiently when needed. Smart energy monitor helps individuals to identify their home's energy-hungry habits, where they can have an automated IoT monitor device that allows users to see how much energy they are consuming whenever an appliance is switch on and cost of power consumption. Smart Health: An important application of IoT is smart health where special monitors are used to observe patients in a hospital and take care of them. These devices are used to monitor and evaluate the health condition of patients. Sportsmen can also use sensor devices to monitor their blood pressure, heartbeat and temperature when they are engaged in sporting activities. A patient monitor system can also be used to take care of patients at homes with chronic health conditions or special needs. Smart Manufacturing: The application of IoT for manufacturing has some significance where an automated system can be use to restock raw materials in a manufacturing warehouse. A special control system is used to alert when raw materials are running out at a warehouse and trigger the process of replacing the raw materials to continue the production cycle. This is important to ensure raw materials are always available for production at a warehouse. Smart living: Another important application of IoT is to help people to life a smart live within their vicinity. People at a shopping mall can get tips of their favorite groceries at the mall, where a sensor monitors can alert shoppers when a particular grocery is due to expire and also warn them of allergy components in some food. The use of sensors in some products will allow users to scan the barcode components to see when the products are due for expiring, some components in product that may pose as an allergy to users and information about the manufacturers of the product. These are the few applications of IoT that have significant advantages. In this paper our main focus is on the
... Há ainda a tendência da exploração da Internet das Coisas (Internet of Things IoT), que favorece uma ampla rede de sensores em combinação para diversas aplicações em sistemas de controle [4]. Isso vem sendo utilizado gradualmente em países como Coreia do Sul em setores simples, como em sistemas de pagamento de varejo até aos mais complexos, como em assistência médica, com grade destaque para aplicações em fazendas inteligentes (Smart Farm) com sensoriamento expandido [5]. Este trabalho discute aplicações da tecnologia adaptativa na automação agrícola, com a ferramenta de tabelas de decisão adaptativas em um exemplo de aplicação de controle de manejo preventivo de requeima (Phytophthora infestans) em cultivos de batata. ...
Conference Paper
Full-text available
A automação agrícola tem sido desenvolvida de forma significativa no mundo. Para contribuir com este desenvolvimento, o presente trabalho descreve uma aplicação de abordagens metodológicas de tabelas de tomadas de decisão adaptativas, tendo em vista um uso futuro em sistemas de controle, juntamente com aplicações e integração nos sistemas existentes na área do crescimento de plantas em ambientes controlados.
... In their study, Bhmui and Tushar found that for IoT solution development, Microsoft Azure and ThingWorxs compared to others are the most favorable platforms and ThingSpeak is mainly used to provide analytics of data and its visualization. Kang et al studied various IoT applications [17]. Debasis et al in [18] reviewed state-of-art IoT applications, challenges and showed the future research area in the application domains of IoT. ...
Conference Paper
Full-text available
Internet of Things (IoT) refers to a prospective in which physical objects are used in our daily life are going to be connected to the Internet by appropriate mode of information and communication technologies, but far from traditional desktop environment. The aim of IoT is to create a better world for human beings using a common infrastructure to conjugate everything in our world. This will make us to control of these objects and keep letting us about their state. Enormous number of devises are participating in this technology, therefore, the security challenges play a vital role while adapting IoT. This paper provides an overview of IoT with emphasis on state of art review on operating systems, platforms and application domains. The IoT architecture and security challenges are presented as well.
Chapter
Machine learning methods have scarcely been applied in forensic soil analysis. In this work, an ultra-performance liquid chromatography technique was used in profiling non-volatile organic compounds from five different red and brown soils, respectively. Each sample was injected in triplicate into the instrument. As a result, the data matrix composing 30 rows (i.e. samples) and 18 000 columns (i.e. retention time points) was first explored using principal component analysis. Then, the chromatographic data were modeled using the K-nearest neighbor algorithm for discriminating and classifying the 30 chromatograms by soil color and origin, respectively. Several K-nearest neighbor models were constructed by considering (a) two different input regions, i.e. full and truncated chromatograms, and (b) four values of the number of nearest neighbors (K): 1, 2, 3 and 4. Score plots of principal component analysis indicated that the soils showing different colors but sharing the same origin were not always clustered together. Despite that, most of the K-nearest neighbor models have achieved prediction accuracy rates close to 100%.KeywordsForensic Soil AnalysisK-nearest neighbor (K-NN)Ultra-performance liquid chromatography (UPLC)
Article
Full-text available
The purpose of this paper is to discuss the IoT's technology practices and performance in retail sector. This internet information technology is vital part of the evolution of retail sector. This paper develops an analytical framework for the assessment of approaches for the measurement of IoT's technology practices and performance in the retail store operation. Methodology used as literature review and conceptual development of framework. Existing approaches also discussed in the improving retail inventory management operation.
Chapter
The popularityAustraliaofOpportunities implementing new digital technologies like IoT (Internet of ThingsInternet of Things (IoT)) is influencing every aspect of business and life; nonetheless the environmental impacts of these new technologies are still not fully understood and investigated. Literature indicates that this urge to look at environmental and social factors in practising business, as well as profit and financial gain, started with the concept of sustainabilitySustainability, where the main goals are to decrease energy consumptionEnergy consumption and preserve natural resources. This led to theoretical and practical implications such as Triple Bottom LineTriple Bottom Line (TBL) and Corporate Social ResponsibilityCorporate social responsibility (CSR). These frameworks try to measure and implement sustainable actions in business practices. Advancement in computer science has resulted in new technologies like IoTInternet of Things (IoT) that have a widespread applicability in several businesses and industries. With this advancement, and its applications in various fields of the economy, the significance of Green technologyGreen, technology implementation is more crucial than ever. On the other hand, Australia`sAustralia economy is suffering from low productivity and efficiencyEfficiency and also has one of the worst performances in regard to the environmentEnvironment and climate changeClimate change compared to other advanced nations; therefore, IoTInternet of Things (IoT) technology can offer a variety of solutions to tackle those issues and develop a wide range of industries and businesses, from mining to healthcare. IoT application from an Australian perspective was investigated in this study in terms of awarenessAwareness factors, opportunitiesOpportunities and challengesChallenges. In order to do so, a comprehensive survey was designed and conducted in Western AustraliaAustralia in 2019 to study citizens’ opinion and knowledge on various topics regarding sustainabilitySustainabilityand IoTInternet of Things (IoT) application in AustraliaAustralia. One hundred and five valid questionnaires were returned and based on the outcomes of the survey, which were analysed by SPSS version 25, 2 factors were identified for IoT environmental awarenessAwareness, 3 factors for opportunitiesOpportunities and 3 factors for challengesChallenges of IoT application in AustraliaAustralia were also generated. IoT is a relatively new concept and this study aimed to shed light on some important angles of this technology in line with sustainabilitySustainabilityand Green ITGreen Information Technology (Green IT) initiatives; however, there are still various aspects of IoTInternet of Things (IoT) that need more investigation and study and some recommendations for government, businesses and academics for future works are suggested, including an emphasis on educationEducation and training. The limitations of this study include the survey method and survey population, limited resources and lack of knowledge and awarenessAwareness regarding the concept of IoT and the research scope.
Chapter
Full-text available
Higher education institutions and their engineering departments have a vital role in fulfilling the new requirements and opportunities of the information and communication technologies (ICT). Therefore, understanding the guidelines to adapt to the new ICT innovations in relation with the Fourth Industrial Revolution such as the internet of things, cloud computing, virtual reality, and artificial intelligence is vital to determine the emerging patterns in their development, delivery, implementation, and assessment. This study aims to define the new educational requirements in engineering education based on the developments of the Fourth Industrial Revolution. Conducting an in-depth analysis of the current literature revealed that although these emerging technologies have been widely used, there are some challenges being faced for their effective use in engineering education. Therefore, the authors provide some guidelines and discuss possible research directions for the use of these technologies in near future.
Conference Paper
Different recent approaches from the Product Lifecycle Management (PLM) or Internet-of-Things (IoT) area describe a product-centric view on data and information which are collected by different Stakeholders and systems along the lifecycle in order to enhance retrospective analytics, predictive analytics, Business decisions, etc. The purpose of this paper is to investigate the basic principles of information sharing, communication and collaboration in traditional human-centric social networks and discuss whether these can be applied to data and information exchange in the PLM/IoT sector. With respect to the methodology applied to this investigation, recent communication mechanisms in social networks as well as in productcentric IoT platforms are systemized and abstracted. Based on the transformation of social network means for IoT, possible improvements of IoT platforms are discussed, resulting in demonstrations of possible PLM usage. In summery, the paper draws implications about the adoption of valuable Social Network means for product-centric usage.
Article
Purpose This study aims to conduct socio-technical analysis of the rapidly evolving Internet of Things (IoT) ecosystem and industry, including such factors as market growth and user experiences, policy and the impact of IoT on various areas. Design/methodology/approach By applying a multi-level socio-technical framework to IoT in South Korea, this study seeks an ecological understanding of how IoT will evolve and stabilize in a smart environment. Findings The study shows the values influencing potential users’ adoption of IoT by integrating cognitive motivations and user values as primary determining factors. Along with user modeling, the findings reveal the challenges of designing, deploying and sustaining the diverse components of IoT, and provides a snapshot of Korea’s current approach to meeting these challenges. Originality/value The study’s findings offer a contextualized socio-technical analysis of IoT, providing insight into its challenges and opportunities. This insight helps to conceptualize how IoT can be designed and situated within human-centered contexts.
Article
Full-text available
Many efforts are currently going towards network-ing smart things from the physical world (e.g. RFID, wireless sensor and actuator networks, embedded devices) on a larger scale. Rather than exposing real-world data and functionality through proprietary and tightly-coupled systems we propose to make them an integral part of the Web. As a result, smart things become easier to build upon. Popular Web languages (e.g. HTML, URI, JavaScript, PHP) can be used to build applications involving smart things and users can leverage well-known Web mechanisms (e.g. browsing, searching, bookmarking, caching, linking) to interact and share things. In this paper, we begin by describing a Web of Things architecture and best-practices rooted on the RESTful principles that contributed to the popular success, scalability, and evolvability of the traditional Web. We then discuss several prototypes implemented using these principles to connect environmental sensor nodes, energy monitoring systems and RFID tagged objects to the World Wide Web. We finally show how Web-enabled things can be used in lightweight ad-hoc applications called "physical mashups".
Article
Full-text available
Ubiquitous computing technologies will have a wide impact on our daily lives in the future. Currently, most debates about social implications of these technologies concentrate on different aspects of privacy and data security. However, the authors of this paper argue that there is more to consider from a social perspective: In particular, the question is raised how people can maintain control in environments that are supposed to be totally automated. Hinting at the possibility that people may be subdued to machines' autonomous actions we introduce the term "Technology Paternalism". We elaborate a working definition and illustrate the concept by looking at different examples based on current and future technology. We also dwell on the impacts of ubiquity and control of technology and suggest some approaches to assure a reasonable balance of interests such as a general "right for the last word".
Article
Full-text available
The EPC Network is a global RFID data sharing infrastructure based on standards that are built around the Electronic Product Code (EPC), an unambiguous numbering scheme for the designation of physical goods. The authors present the fundamental concepts and applications of the EPC Network, its integration with enterprise systems, and its functionality for data exchange between organizations in the supply chain.
Conference Paper
Full-text available
Information and communication technology (ICT) consumes energy, but is also an important means of conserving energy. Conventionally, it has done so by optimizing the performance of energy-using systems and processes in industry and commerce. In the near future, ICT will also play a critical role in supporting the necessary paradigm shifts within the energy sector towards more sustainable electricity generation. However, with the advent of "smart" technology from the field of ubiquitous computing, further ways of reducing growing levels of domestic energy consumption are now emerging. With this in mind, we discuss how getting consumers "into the loop" can achieve energy savings on top of the efficiency gains resulting from automated systems, and we describe a prototype application aimed at inducing behavioral change by providing direct feedback on household electricity consumption.
Article
Full-text available
The convergence of Web technology, wireless networks, and portable client devices provides new design opportunities for computer/communications systems. In the HP Labs' “Cooltown” project we have been exploring these opportunities through an infrastructure to support “web presence” for people, places and things. We put web servers into things like printers and put information into web servers about things like artwork; we group physically related things into places embodied in web servers. Using URLs for addressing, physical URL beaconing and sensing of URLs for discovery, and localized web servers for directories, we can create a location-aware but ubiquitous system to support nomadic users. On top of this infrastructure we can leverage Internet connectivity to support communications services. Web presence bridges the World Wide Web and the physical world we inhabit, providing a model for supporting nomadic users without a central control point.
Article
Full-text available
In this paper, we show that Web protocols and technologies are good candidates to design the Internet of Things, through a user-centric architecture (the user simply has to use a standard Web browser). We detail how this Web of Things can handle typical embedded devices interaction needs. We discuss the technical feasibility of embedded Web servers, and, thanks to an analysis of the Web protocols, we propose new cross-layer solutions for efficient tiny embedded Web servers design. The problem of event notification for Web applications is also discussed. We finally present a prototype -- named Smews -- as a proof of concept of the Web of Things. Smews implements our proposals and has been embedded in tiny devices (smart cards, sensors and other embedded devices), with a requirement of only 200~bytes of volatile memory and 7~kilo-bytes of code. We show that it is significantly faster than other state of the art solutions. We made Smews source code publically available under an open-source license.
Article
The idea of pervasive gaming, where traditional, tabletop games are enhanced with wireless computing devices, has recently re-ceived increased attention. In this paper, we present a card game that is augmented with information technology to advise novice players and to relieve the players of mundane tasks, such as score keeping. The pa-per outlines in particular our efforts to build a system that preserves the assets of conventional card games. The paper shows how appropriate RFID system design results in a portable solution which requires min-imal changes and disruptions to the conventional game flow and which works reliably. We also illustrate how the players' mobile phones can be used as user interfaces, thus reducing the overall system costs.
Article
Ubiquitous sensing enabled by Wireless Sensor Network (WSN) technologies cuts across many areas of modern day living. This offers the ability to measure, infer and understand environmental indicators, from delicate ecologies and natural resources to urban environments. The proliferation of these devices in a communicating-actuating network creates the Internet of Things (IoT), wherein, sensors and actuators blend seamlessly with the environment around us, and the information is shared across platforms in order to develop a common operating picture (COP). Fuelled by the recent adaptation of a variety of enabling device technologies such as RFID tags and readers, near field communication (NFC) devices and embedded sensor and actuator nodes, the IoT has stepped out of its infancy and is the the next revolutionary technology in transforming the Internet into a fully integrated Future Internet. As we move from www (static pages web) to web2 (social networking web) to web3 (ubiquitous computing web), the need for data-on-demand using sophisticated intuitive queries increases significantly. This paper presents a cloud centric vision for worldwide implementation of Internet of Things. The key enabling technologies and application domains that are likely to drive IoT research in the near future are discussed. A cloud implementation using Aneka, which is based on interaction of private and public clouds is presented. We conclude our IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Conference Paper
Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply convey information but process it in transit, connect peer to peer, and form advanced collaborations. This “Internet of Things (IoT)” infrastructure will be strongly integrated with the environment. This paper focuses on researching on the architecture and key technology of Internet of Things. Moreover, the applications of Internet of Things are interpreted in this paper. Especially, the application of IoT in smart grid is emphasized. The work presented here proposes the principal characteristics for an effective integration of the Internet of Things in smart grid.
Article
Against the background of the first RFID-Rollouts by large retailers in North America and Europe, this paper concerns itself with the perception of RFID technology as a risk to privacy. The objective of our contribution is to identify, at a relatively early phase of the risk development, strategic options with which RFID suppliers and users can positively influence the public acceptance of the technology. We propose a strategic framework based on research findings on risk perception and technology acceptance as well as a set of options for coping with the public perception of RFID-related privacy risks.
Article
We present a system for monitoring and locating everyday items using mobile phones. The system is based on phones which are enhanced with the capability to detect electronically tagged objects in their vicinity. It supports various functionalities: On the one hand, phones can store the context in which users leave registered items and thus help to locate them later on. On the other hand, object owners can search for their objects using the infrastructure of mobile phones carried by other users. We describe the design of our object location system and provide an algorithm which can be used to search for lost or misplaced items efficiently by selecting the most suitable sensors based on arbitrary domain knowledge. Furthermore, we demonstrate the practicability of such wide-area searching by means of user-held sensors in a series of simulations complemented by a real-world experiment.
Conference Paper
Automatic identification technology such as RFID promises to connect physical objects with virtual representations or even computational capabilities. How- ever, even though RFID tags are continuously falling in price, their widespread use on consumer items is still several years away, rendering large-scale experiments with such an "internet of things" difficult. Much more ubiquitous are printed bar codes, yet so far their recognition required either specialized scanner equipment, custom-tailored bar codes or costly commercial licenses - all equally significant deployment hurdles. We have developed a freely available EAN-13 bar code recognition and information system that is both lightweight and fast enough for the use on camera-equipped mo- bile phones, thus significantly lowering the barrier for large-scale, real-world testing of novel information and interaction applications based on "connected" physical objects. We hope that this "low tech" version of bridging the gap will allow the community to quickly develop and try out more realistic and widespread applications, and thus gain real-world experiences for better jump-starting the future internet of things, today.
Article
Zusammenfassung Der Beitrag diskutiert die Vision, die informationstechnischen Grundlagen und Herausforderungen sowie die Anwendungsmöglichkeiten eines ,,Internet der Dinge“. Ferner wird auf informatikbezogene Aspekte wie RFID und die Realisierung von IP-Stacks und Webservern für smarte Alltagsgegenstände eingegangen. In einem Ausblick werden auch einige gesellschaftliche und politische Fragen angesprochen, die mit einem Internet der Dinge auf uns zukommen.
What is the Internet of Things? When Things Add Value
  • E Fleisch
E. Fleisch, "What is the Internet of Things? When Things Add Value", Auto-ID Labs White Paper WP-BIZAPP-053, Auto-ID Lab St. Gallen, Switzerland, (2010).
The internet of things
  • C R Schoenberger
C. R. Schoenberger, "The internet of things", Forbes Magazine, (2002) March 18.
He is studying his doctor's degree of software engineering in Graduated Soongsil University His research interests are in areas of Policy of Information Technology
  • Authors Young-Mo Kang
  • A Ge
Authors Young-Mo Kang was a CEO at A/GE. He is studying his doctor's degree of software engineering in Graduated Soongsil University, Seoul. His research interests are in areas of Policy of Information Technology, IT Convergence and AI.
Internet of Things (IoT), A vision, architectural elements, and future directions
  • J Gubbia
  • R Buyyab
  • S Marusica
  • M Palaniswamia
J. Gubbia, R. Buyyab, S. Marusica and M. Palaniswamia, " Internet of Things (IoT), A vision, architectural elements, and future directions ", arxiv.org, doi:10.1016/j.future.2013.01.010, (2013).
Visualisierung von Transponder-Daten mittels Mashup
  • D Kramarz
  • A Loeber
D. Kramarz and A. Loeber, " Visualisierung von Transponder-Daten mittels Mashup. Diplomarbeit, Zürcher Hochschule für Angewandte Wissenschaften (2007)
Seoul (1995) and master's degree (2002), doctor " s degree of Now, he is a professor in the Graduate School of Software
  • Jong-Bae Kim
Jong-Bae Kim received his bachelor's degree of Business Administration in University of Seoul, Seoul (1995) and master's degree (2002), doctor " s degree of Computer Science in Soongsil University, Seoul (2006). Now, he is a professor in the Graduate School of Software, Soongsil University, Seoul, Korea. His research interests focus on Software Engineering, and Open Source Software.
  • T Kindberg
  • J Barton
  • J Morgan
  • G Becker
  • D Caswell
  • P Debaty
  • G Gopal
  • M Frid
  • V Krishnan
  • H Morris
  • J Schettino
  • B Serra
  • M Spasojevic
T. Kindberg, J. Barton, J. Morgan, G. Becker, D. Caswell, P. Debaty, G. Gopal, M. Frid, V. Krishnan, H. Morris, J. Schettino, B. Serra and M. Spasojevic, " People, Places, Things: Web Presence for the Real World. Mobile Networks and Axpplications ", International Telecommunication Union, vol. 7, no. 5, (2002), pp. 365-376.
Das Internet of Things " – Der kurze Weg zur kollektiven Zwangsentmündigung
  • K Kollmann
K. Kollmann, " Das Internet of Things " – Der kurze Weg zur kollektiven Zwangsentmündigung. Telepolis, (2009).
Han received her bachelor's degree of Statistics in Dongguk University She is studying her master's degree of software engineering in Graduated Soongsil University Her current research interests include open source development and security
  • Mi-Ran
Mi-Ran Han received her bachelor's degree of Statistics in Dongguk University, Seoul (2002). She is studying her master's degree of software engineering in Graduated Soongsil University, Seoul. Her current research interests include open source development and security.
A Study on How to Enhance Manufacturing Competitiveness using Things of Internet
  • Digieco
DIGIECO, "A Study on How to Enhance Manufacturing Competitiveness using Things of Internet", Report CEO Info,. (2014).
Han received his bachelor's degree of Education (1979) and master's degree of Management (1984) in Seoul National University, and doctor " s degree of MIS in Purdue University Now, he is a professor in the Dept. of Management
  • Kyeong-Seok
Kyeong-Seok Han received his bachelor's degree of Education (1979) and master's degree of Management (1984) in Seoul National University, and doctor " s degree of MIS in Purdue University, USA (1989). Now, he is a professor in the Dept. of Management, Soongsil University, Seoul, Korea. His research interests focus on Technical MIS, Digital Economy, Agent-Eased Simulation, Web Programming, ERP.
  • J Hui
  • D Culler
  • S Chakrabarti
J. Hui, D. Culler and S. Chakrabarti, " 6LoWPAN – Incorporating IEEE 802.15.4 into the IP architecture ", Internet Protocol for Smart Objects Alliance, white paper # 3 (2009).
The perspective of the consumer Internet of Things (IoT)
  • Digital Echo
  • Info
Digital Echo reports CEO Info., " The perspective of the consumer Internet of Things (IoT) ", (2014). [4] coca-colafreestyle.com, http://www.coca-colafreestyle.com/home/.
  • C Floerkemeier
  • M Langheinrich
  • E Fleisch
  • F Mattern
  • S E Sarma
C. Floerkemeier, M. Langheinrich, E. Fleisch, F. Mattern and S. E. Sarma, "The Internet of Things. First International Conference", IOT 2008, LNCS 4952, Springerm, (2008).
Perception of Risk: A Strategic Framework
Perception of Risk: A Strategic Framework. The Journal of Strategic Information Systems, vol. 16, no. 2, (2007), pp. 214-232.
She is studying her master's degree of software engineering in Graduated Soongsil University, Seoul. Her current research interests include open source development and security
  • Mi-Ran
Mi-Ran Han received her bachelor's degree of Statistics in Dongguk University, Seoul (2002). She is studying her master's degree of software engineering in Graduated Soongsil University, Seoul. Her current research interests include open source development and security.
His research interests focus on Technical MIS, Digital Economy, Agent-Eased Simulation, Web Programming, ERP. Jong-Bae Kim received his bachelor's degree of Business Administration in University of Seoul, Seoul (1995) and master's degree (2002), doctor"s degree of
  • Kyeong-Seok
Kyeong-Seok Han received his bachelor's degree of Education (1979) and master's degree of Management (1984) in Seoul National University, and doctor"s degree of MIS in Purdue University, USA (1989). Now, he is a professor in the Dept. of Management, Soongsil University, Seoul, Korea. His research interests focus on Technical MIS, Digital Economy, Agent-Eased Simulation, Web Programming, ERP. Jong-Bae Kim received his bachelor's degree of Business Administration in University of Seoul, Seoul (1995) and master's degree (2002), doctor"s degree of Computer Science in Soongsil University, Seoul (2006). Now, he is a professor in the Graduate School of Software, Soongsil University, Seoul, Korea. His research interests focus on Software Engineering, and Open Source Software.