Conference Paper

IoT for 5G/B5G Applications in Smart Homes, Smart Cities, Wearables and Connected Cars

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Internet connection is crucial for smart homes, because if there is no internet connection, means the house owners will not be able to get totally access to their houses. If the house is at a place with problems of connection, this could be a good moment for the thieves to know the weakness of that neighbor and steal whenever internet is not good [37]. ...
... For instance, if you live in an area where the internet connection is rather poor, you might experience serious issues since your smart home devices might not respond the way you want them to. Moreover, if you want to control your smart home device from your work or from other remote places, you might not be able to do so since you might not be able to connect with your devices in a sufficient manner [37]. ...
Article
Full-text available
The development of technologies in smart homes today, snip attention of many researchers due to the importance that these smart homes can bring to human beings. Smart homes are used to improve everyday life like monitoring (homes, children, old people and patients in hospital), home security, smart hospitals and automation in many buildings. However, there are many security problems and challenges that still persisting in smart homes, and these, somehow makes smart homes be vulnerable not only for their residents, but also to the manufacturers of smart devices. There are different situations like cyber-attacks, implantation of spy devices or the complete modification of data happening with frequency in smart home applications. We also analyze some opening issues like data integrity, confidentiality, non-repudiation and so on, to improve security of residents. Approaches of these problems, the techniques for their minimization, and at the end, solutions are brought to the efficient working principles of smart homes.
... • Applications geared toward consumers include wearable technology, smart homes, and medical technologies [35]. • Commercial applications in logistics and retail [36]. ...
Article
Full-text available
Enhancing the interconnection of devices and systems, the Internet of Things (IoT) is a paradigm-shifting technology. IoT security concerns are still a substantial concern despite its extraordinary advantages. This paper offers an extensive review of IoT security, emphasizing the technology's architecture, important security elements, and common attacks. It highlights how important artificial intelligence (AI) is to bolstering IoT security, especially when it comes to addressing risks at different IoT architecture layers. We systematically examined current mitigation strategies and their effectiveness, highlighting contemporary challenges with practical solutions and case studies from a range of industries, such as healthcare, smart homes, and industrial IoT. Our results highlight the importance of AI methods that are lightweight and improve security without compromising the limited resources of devices and computational capability. IoT networks can ensure operational efficiency and resilience by proactively identifying and countering security risks by utilizing machine learning capabilities. This study provides a comprehensive guide for practitioners and researchers aiming to understand the intricate connection between IoT, security challenges, and AI-driven solutions.
... Control-Wave's impact extends beyond the professional realm; it has the potential to redefine how we interact with technology in our daily lives. Imagine seamlessly controlling your smart home devices [1][2][3] with a flick of the wrist, adjusting the lighting, temperature, and entertainment systems with effortless gestures. Control-Wave transforms mundane tasks into moments of intuitive interaction, enhancing the overall user experience and fostering a deeper connection with our digital ecosystems. ...
Article
Full-text available
This Research work aims to address the challenges faced by teaching professionals in the Education as well as industry sector by developing an innovative wearable device known as Gesture control Glove named as control-wave equipped with advanced gesture recognition technology. Through a comprehensive understanding of the issues encountered by all the Teaching professionals, particularly regarding the navigation of digital content during lectures, the proposed research work seeks to create a comfortable, intuitive, and efficient tool that enhances their teaching experience. The proposed solution includes wearable hand glove using flex sensors which performs operation on customizable gestures like Mouse click mode and Presentation mode. This glove allows teaching professionals to tailor the device to their individual teaching preferences and styles. Mouse click mode focuses on left and right mouse click to open or close the apps, files, and folder whereas presentation mode facilitating seamless transitions and interactions with slide content. Control-Wave is not just a technological advancement; it signifies a transformation towards a more intuitive, seamless, and user-focused way of engaging with technology. The research work aims to provide teaching professionals with a seamless and empowering tool for optimizing their workflow, promoting engagement, and improving overall teaching effectiveness with 95% of accuracy.
... Not only direct sources of personal data, including sensitive information such as applications for medical purposes [3]- [5], Location-based Services (LBSs) [6]- [8], or Smart TVs [9], are responsible for accessing this type of data. Even simple applications, with other purposes, are capable of accessing personal data, or in some cases, contribute to the inference of personal characteristics from non-personal data. ...
Conference Paper
Full-text available
We present a solution that applies state of the art Deep Learning methods in order to classify applications regarding their privacy footprint. For this purpose, we consider the user privacy, as stated in their public manifest, which presents reliance to popular attacks involving droppers, or application specifically design to abuse user data. The solution is carefully detailed, including the most important design choices, and validated against two standard datasets. The results demonstrate the effectiveness of our approach, yielding high F1-score and MCC metrics when compared against reference solutions. We also discuss further work and potential contributions that could be derived to enhance awareness around the privacy impact of mobile applications.
... Namun demikian, ekspansi sektor ini juga menghadapkan perusahaanperusahaan pada jaringan risiko yang rumit yang berasal dari berbagai faktor seperti fluktuasi pasar, perubahan peraturan, dan gangguan teknologi. Dalam konteks ini, efektivitas praktik manajemen risiko dan kemampuan untuk membina ketahanan bisnis menjadi elemen penting untuk mempertahankan dan meningkatkan keunggulan kompetitif (Abid & Hofa, 2022;Kang et al., 2019;Uddin et al., 2019). ...
Article
Full-text available
Penelitian ini menyelidiki hubungan antara praktik manajemen risiko, ketahanan bisnis, dan keunggulan kompetitif dalam perusahaan-perusahaan sektor jasa di Indonesia. Dengan menggunakan pendekatan kuantitatif, survei dilakukan terhadap 150 perusahaan dengan fokus pada konstruk-konstruk utama: Ketahanan Bisnis, Manajemen Risiko, dan Keunggulan Kompetitif. Model persamaan struktural menunjukkan hubungan positif yang signifikan antara ketahanan bisnis dan keunggulan kompetitif (β = 0,553) dan manajemen risiko dan keunggulan kompetitif (β = 0,342). Indeks kecocokan model menunjukkan kecocokan yang masuk akal secara keseluruhan, mendukung kekokohan kerangka kerja yang diusulkan. Temuan-temuan ini menggarisbawahi pentingnya strategi untuk mengembangkan ketahanan bisnis dan manajemen risiko yang efektif untuk mendapatkan keunggulan kompetitif di sektor jasa Indonesia.
... Researchers have investigated IoT, presenting challenges and recommendations for specific application scenarios [19,41]. For instance, Uddin et al. [37] discussed the risks and vulnerabilities of IoT focusing on smart homes, smart cities, wearables, and connected cars. Besides, Taimoor and Rehman [35] discussed security threats regarding the IoT architecture, focusing on personalized healthcare Services. ...
Conference Paper
Full-text available
The fifth-generation (5G) mobile communication systems are already a reality. This communication technology can increase and simplify the adoption of the Internet of Things (IoT) applications (e.g., industrial IoT), given that it will provide the means to connect up to one million devices in a squared kilometer. Many of these applications can generate sensitive data, which requires the adoption of security mechanisms, and these mechanisms must consider the computational limitations of the devices. Considering that IoT devices under security attacks can access the 5G infrastructure, this paper presents recommendations and challenges regarding security in IoT devices. It also presents a threat model and a few common attacks, classifying them with the STRIDE model and CVSS and discussing how they can impact the 5G infrastructure .
... It is also highly used to develop smart homes, smart cities, and connected cars. IoT technologies have been used to monitor and control traffic lights to avoid delays and 978-1-6654-5892-4/22/$31.00 ©2022 IEEE traffic congestions in cities like Barcelona, Amsterdam and Singapore [8]. A fundamental part of an IoT system is its communication protocol. ...
... Its development is closely connected to many cutting-edge technologies such as blockchain [10,13], smart home [17], and machine learning [11,23,32]. During the past decade, IoT applications have experienced rapid growth and have been successfully applied on both individual (e.g., e-health, smart home) and professional levels (e.g., smart supply chain, smart city, industry IoT) [16,28]. It is estimated that there will be over 500 billion IoT devices connected to the Internet by 2030 [25]. ...
Chapter
Full-text available
Due to the boom of Internet of Things (IoT) in recent years, various IoT devices are connected to the internet and communicate with each other through web protocols such as the Constrained Application Protocol (CoAP). These web protocols are typically defined and described in the Request for Comments (RFC) documents, which are written in natural or semi-formal languages. Since developers largely follow the RFCs when implementing web protocols, the RFCs have become the de facto protocol specifications. Therefore, it is desirable to ensure that the technical details being described in the RFC are consistent, to avoid technological issues, incompatibility, security risks or even legal concerns. In this work, we propose RFCKG, a knowledge graph based contradictions detection tool for CoAP RFC. Our approach can automatically parse the RFC documents and construct knowledge graphs from them through entity extraction, relation extraction, and rule extraction. It then conducts an intra-entity and inter-entity consistency checking over the generated knowledge graph. We implement RFCKG and apply it to the main RFC (RFC7252) of CoAP, one of the most extensively used messaging protocols in IoT. Our evaluation shows that RFCKG manages to detect both direct contradiction and conditional contradictions from the RFC.KeywordsContradiction detectionKnowledge graphNatural language processingRequest for commentsIoT protocols
... According to Cisco, by 2030, 5G applications will bring about USD 1.3 trillion of growth in global GDP, and more than 500 billion devices will be connected to the Internet. These devices will be embedded with IoT modules, and IoT applications will be deployed in all areas, including smart cities [2,3], smart transportation [4], smart agriculture [5], smart homes [6], etc. Maeng (2020) [7] argued that 5G mobile communication not only brings great convenience to people's daily lives, but also profoundly affects all aspects of social production, developing new markets and industries. Ericsson's Mobile Trends report shows that 94% of business respondents believe that next-generation mobile networks are critical to the strategic development of their business [8]. ...
Article
Full-text available
With the continuous evolution of mobile communication systems, 5G technology has become a key driver for a smart home appliance ecosystem. Fifth-generation technology may create opportunities and threats for the home appliance industry in the stock market, and so companies that do not actively engage in product innovation activities will eventually be eliminated from the market because their products are not on trend. This study investigates Chinese household appliance industry firms to identify their innovation strategies, applied to cope with global competition and gain a competitive advantage, and explores the correlation and operation mode between innovation strategies and design strategies. For this study, we administered a questionnaire to analyze three innovation clusters for Chinese household appliance firms. Interviews were conducted to further understand the design strategies and priorities of Chinese home appliance companies in response to 5G technology, to explore the relationship between innovation strategies and product design strategies, and to provide a reference for the product design strategies of home appliance companies in response to global competition.
... We may view the myriad of the actors and stakeholders of the digital environment as part of a greater ecosystem with interdependent links [10]. These IoT innovations are possible with the help of 5G technology over which speed dependent applications flourish, and homes, cities cars become smart entities creating ambient intelligence [11]. All these breakthrough technologies emerging inside smart vehicles create an intuitive and extraordinary driving experience of the digital transformation sage [12]. ...
Article
Full-text available
In the context of hyper-connected cars and a growing heterogeneous digital ecosystem, we wish to make the most of the data available from the various sensors, devices and services that compose the ecosystem, in order to propose a proof of concept in-vehicle system that enhances the driving experience. We focus on improving the driving experience along three main directions, namely: (1) driving and trip planning, (2) health and well-being and (3) social and online activities. We approached the in-vehicle space as a smart interface to the intelligent driving environment. The digital data-producers in the ecosystem of the connected car are sources of raw data of various categories, such as data from the outside world, gathered from sensors or online services, data from the car itself and data from the driver gathered with various mobile and wearable devices, by means of observing his state and by means of his social media and online activity. Data is later processed into three information categories-driving, wellness, and social-and used to provide multi-modal interaction, namely visual, audio and gesture. The system is implemented to act in response to the trafficked information on different levels of autonomy, either in a reactive manner, by simple monitoring, or in a proactive manner. The system is designed to provide an in-vehicle system that assists the driver with planning the travel (Drive panel), by providing a comfortable environment for the driver while monitoring him (Wellness panel), and by adaptively managing interactions with their phone and the digital environment (Social panel). Heuristic evaluation of the system is performed, with respect to guidelines formulated for automated vehicles, and a SWOT analysis of the system is also presented in the paper.
... A smart conveyance plan can support ideas between the smartphone of passengers and the taxi itself. Just like additional IoT ploys, a smart conveyance arrangement can further determine new looks for more control [28]. ...
Article
The Internet of things is a new revolution that has shifted people's lifestyles from conventional to high-tech. Smart cities, smart homes, pollution management, energy conservation, smart transportation and smart industries are examples of IoT-driven developments. A lot of critical research studies and inspections have existed exhausted order to improve the electronics through IoT. However, there are still plenty of challenges and issues that need to be focused on to reach the full potential of IoT. These challenges and issues must be thought-out from miscellaneous facets of IoT to a degree uses, challenges, permissive sciences, friendly and referring to practices or policies that do not negatively affect the environment impacts etc. The main aim of this review paper is to debate various challenges and key issues of IoT, construction and use of rules. Moreover, this paper shed some light on the existing information and pictorial representations of different facets of IoT. Moreover, the significance of substantial dossier and allure reasoning concerned to IoT has been explored. This paper would help the researchers and analyst to appreciate and allure towards the IoT.
... These devices will be endogenously equipped with IoT modules that allow device-to-device (D2D) communications to each other, forming IoT networks [8]. IoT applications will be deployed in almost all humanity domains, including smart cities [9,10], smart transportation [11,12], smart agriculture [13,14], and smart homes [15]. In [16], we presented a detailed survey of IoT applications for humanity. ...
Article
Full-text available
Communication technologies are developing very rapidly and achieving many breakthrough results. The advent of 5th generation mobile communication networks, the so-called 5G, has become one of the most exciting and challenging topics in the wireless study area. The power of 5G enables it to connect to hundreds of billions of devices with extreme-high throughput and extreme-low latency. The 5G realizing a true digital society where everything can be connected via the Internet, well known as the Internet of Things (IoT). IoT is a technology of technologies where humans, devices, software, solutions, and platforms can connect based on the Internet. The formation of IoT technology leads to the birth of a series of applications and solutions serving humanity, such as smart cities, smart agriculture, smart retail, intelligent transportation systems, and IoT ecosystems. Although IoT is considered a revolution in the evolution of the Internet, it still faces a series of challenges such as saving energy, security, performance, and QoS support. In this study, we provide a vision of the Internet of Things that will be the main force driving the comprehensive digital revolution in the future. The communication technologies in the IoT system are discussed comprehensively and in detail. Furthermore, we also indicated indepth challenges of existing common communication technologies in IoT systems and future research directions of IoT. We hope the results of this work can provide a vital guide for future studies on communication technologies for IoT in 5G.
... The internet of Things (IoT) refers to the coordination of various machines, devices and applications connected to the Internet through multiple wired or wireless networks as explained in [2]. According to [3], many IoT devices can be used for different applications within Smart City, allowing the exchange of information and communication within the city, improving the quality of life of its citizens. This shows that IoT and the 5G network have been introduced to improve sustainability and speed within the environment of a Smart City. ...
Article
Full-text available
The evolution of the technology 5G has influenced the Internet of the Things (IoT) according to the wireless communications of minor latency, and major speed compared to the existing technologies. Consequently, from the 21st century, 5G will act as the spinal column of the IoT and will level the way for the design and deployment of a Smart City, nevertheless, this progress has a negative point which is demonstrated in the energy consumption. The target of this investigation is to announce methods to reduce the consumption of energy in one Smart City based on the IoT and the technology 5G. The results obtained in this investigation allow determining that 5G and the IoT will have a major energy consumption with about 80 % of the entire potency, due to the transmission and reception of a big quantity of information in a Smart City. Likewise, this research, contributes to the knowledge, presenting a review of methods that allow minimizing energy consumption and projects that improve energy efficiency.
... Connected Automobile is also coming up [92]. In a few years, we would see IoT implementations in budget sector cars too. ...
Article
Full-text available
The Internet of Things (IoT) is basically like a system for connecting computer devices, mechanical and digital machines, objects, or individuals provided with the unique system (UIDs) and without transfer to transmit data over an ability human-to-human or computer-to-human relation. Another thing on the internet is that the items in the IoT are like a connected manner with humans and computers to which internet protocol addresses can be assigned and which can transfer data over the network or another man-made object. In this paper, we describe the utilization of IoT in the cloud, fog, IoT technologies with applications and security. Specifically, we provide IoT architecture for design and development with sensors in 6G. Finally, we discuss the current research, solutions, and present open issues of future research in IoT.
... h) Focusing on cost-efficiency of the L-IoT. The cost of connecting to the IoT terminal [543][544][545] may not be important for large businesses, but it is a big deal for Small and Mediumsized Enterprises (SMEs). It is while its development is heavily subject to its influence on SMEs that are considered the economic backbone of many countries [546]. ...
Article
Full-text available
The emerging context of Logistics Internet-of-Things (L-IoT) has attracted tremendous attention from practitioners and academics during the past decade. Evidence of this growing attention is the increasing number of studies published in scientific journals and conferences around the world. Therefore, now is the time to provide a systematic and comprehensive literature review of recent papers to draw a framework of the past, and to shed light on potential directions for future research. In doing so, this paper has systematically reviewed 560 papers to propose a general architecture for the L-IoT and to extract existing research gaps by creating a correct and accurate understanding. It also has categorized 185 of these papers, published between January 2008 and September 2020, to provide an appropriate classification and extensive suggestions for guiding future L-IoT research.
... The treasure of data generated from interconnected IoT devices can be used to predict crimes and accidents based on the existing data [103]. Thus, it is providing new ideas that can become projects for tech companies, generating big data (large volume of data which can be used to reveal trends, patterns and associations) and providing various ways of communicating [104], as depicted in Fig. 4. ...
Article
Full-text available
The Internet of Things (IoT)-centric concepts like augmented reality, high-resolution video streaming, self-driven cars, smart environment, e-health care, etc have a ubiquitous presence now. These applications require higher data-rates, large bandwidth, increased capacity, low latency and high throughput. In light of these emerging concepts, IoT has revolutionized the world by providing seamless connectivity between heterogeneous networks (HetNets). The eventual aim of IoT is to introduce the plug and play technology providing the end-user, ease of operation, remotely access control and configurability. This paper presents the IoT technology from a bird’s eye view covering its statistical/architectural trends, use cases, challenges and future prospects. The paper also presents a detailed and extensive overview of the emerging 5G-IoT scenario. Fifth Generation (5G) cellular networks provide key enabling technologies for ubiquitous deployment of the IoT technology. These include carrier aggregation, multiple-input multiple-output (MIMO), massive-MIMO (M-MIMO), coordinated multipoint processing (CoMP), device-to-device (D2D) communications, centralized radio access network (CRAN), software-defined wireless sensor networking (SD-WSN), network function virtualization (NFV) and cognitive radios (CRs). This paper presents an exhaustive review for these key enabling technologies and also discusses the new emerging use cases of 5G-IoT driven by the advances in artificial intelligence, machine and deep learning, ongoing 5G initiatives, quality of service (QoS) requirements in 5G and its standardization issues. Finally, the paper discusses challenges in the implementation of 5G-IoT due to high data-rates requiring both cloud-based platforms and IoT devices based edge computing.
Conference Paper
Full-text available
Federated learning (FL) achieves collaborative learning without the need for data sharing, thus preventing privacy leakage. To extend FL into a fully decentralized algorithm, researchers have applied distributed optimization algorithms to FL by considering machine learning (ML) tasks as parameter optimization problems. Conversely, the consensus-based multi-hop federated distillation (CMFD) proposed in the authors' previous work makes neural network (NN) models get close with others in a function space rather than in a parameter space. Hence, this study solves two unresolved challenges of CMFD: (1) communication cost reduction and (2) visualization of model convergence. Based on a proposed dynamic communication cost reduction method (DCCR), the amount of data transferred in a network is reduced; however, with a slight degradation in the prediction accuracy. In addition, a technique for visualizing the distance between the NN models in a function space is also proposed. The technique applies a dimensionality reduction technique by approximating infinite-dimensional functions as numerical vectors to visualize the trajectory of how the models change by the distributed learning algorithm.
Conference Paper
Full-text available
The applications of smart homes received attention due to their popularity and accessibility of using modern technology such as the Internet of Things (IoT). Reducing greenhouse gas (GHG) emissions and addressing climate change depend heavily on residential buildings' increased energy efficiency and sustainability. Programming smart homes, which use cutting-edge technologies and automation systems to optimize energy use and improve occupant comfort, is one way to accomplish sustainability. Smart meters, sensors, actuators, and communication networks are just a few of the systems and components that must be integrated into a smart home's programming. The aforementioned elements work together to gather information on energy use, occupancy patterns, and environmental factors. The studied data is then used to guide the programming choices for the home's heating, cooling, lighting, and other energy-consuming equipment. Utilizing the proper programming software is also a significant component. This study presents various programming languages that enable smart devices to work efficiently.
Article
Full-text available
Voltage fluctuations and power grid instability are caused by the growing use of distributed renewable energy sources (RESs) like solar energy. The efficient monitoring and management of solar energy produced by solar panels can improve the quality and reliability of grid power for the smart grid (SG) environment. Additionally, we build solar power plants in remote locations that people cannot regularly access, so this method will enable them to virtually control their systems from those locations. In this regard, this paper suggests an Internet of Things (IoT)-based smart solar energy management system (SEMS) to enable users to remotely monitor solar or PV (photovoltaic) panel systems via their smartphones from any location in the world. In this system, data collected from the panels is transmitted via the internet to the Android Apps for later use. The user can obtain data on the solar panel's temperature as well as the current and previous average values for parameters like ampere, voltage, power, and energy. Remote users can also manage the solar panel's loads. Operators of on-grid and off-grid solar systems can enhance the quality and reliability of their power by using these data. This system can function as a smart meter (SM) in a smart grid environment. Future smart grids with significant solar energy penetration may find this system to be effective. A hardware prototype has been developed to validate the system's operation.
Article
Due to the boom of Internet of Things (IoT) in recent years, various IoT devices are connected to the Internet and communicate with each other through network protocols such as the Constrained Application Protocol (CoAP). These protocols are typically defined and described in specification documents, such as Request for Comments (RFC), which are written in natural or semi-formal languages. Since developers largely follow the specification documents when implementing web protocols, they have become the de facto protocol specifications. Therefore, it must be ensured that the descriptions in them are consistent to avoid technological issues, incompatibility, security risks, or even legal concerns. In this work, we propose Neural RFC Knowledge Graph (NRFCKG), a neural network-generated knowledge graph based contradictions detection tool for IoT protocol specification documents. Our approach can automatically parse the specification documents and construct knowledge graphs from them through entity extraction, relation extraction, and rule extraction with large language models. It then conducts an intra-entity and inter-entity contradiction detection over the generated knowledge graph. We implement NRFCKG and apply it to the most extensively used messaging protocols in IoT, including the main RFC (RFC7252) of CoAP, the specification document of MQTT, and the specification document of AMQP. Our evaluation shows that NRFCKG generalizes well to other specification documents and it manages to detect contradictions from these IoT protocol specification documents.
Article
Full-text available
Smart cities, one of the key application areas of 5G and IoT technologies, have at their core the goal of improving quality of life, creating collaborative solutions, and addressing resource constraints. Examples of some of the many services integrated into the network of a typical smart city are related to smart health, smart transportation, smart buildings, smart hotels, smart industry, smart universities, etc. The new era of wireless mobile telecommunication technology and the IoT ecosystem is driving the opportunities for smart cities to not only solve existing problems but also create new services and functionalities that are out of the box and invisible to the end user. The main objective of this paper is to explore the role of 5G and IoT in smart cities. The market environment, key business developments, and trends related to the key smart cities’ enablers, IoT and 5G, are presented. An in-depth literature review followed by a discussion is substantiated with synthesised research findings on the current development, 5G coverage, use and deployment of IoT in smart cities, and forecasting the evolution of its application in smart cities.
Chapter
Full-text available
In the current Covid-19 situation, people all over the world must begin to adhere to social distancing guidelines. However, ensuring that people follow these social distancing guidelines has proven to be a difficult challenge for the government. To combat this issue, authorities have implemented IoT solutions such as remote health monitoring and contact tracing techniques to effectively manage the spread of coronavirus. To address this issue in depth, the current paper provides a comprehensive review of how IoT applications have aided the healthcare, education, home, entertainment, transportation, hospitality, and retail sectors of an economy. Additionally, the risk and challenges posed by the widespread adoption of IoT solutions are also addressed. Finally, the paper suggests ways to mitigate existing challenges associated with the implementation of IoT solutions.
Article
Full-text available
In this era of the digital world, data play a central role and are continuously challenging spectrum efficiency. With the introduction of enriched multimedia user-generated content, the challenges are even more aggravated. In this vein, uplink caching is considered as one of the promising solutions to effectively cater the user’s demands. One of the main challenges for uplink caching is duplication elimination. In this paper, a cache enabled uplink transmission with a duplication elimination scheme is proposed. The proposed scheme matches the mobile’s data to be uploaded with the cached contents both at mobile station (MS) and small base station (SBS). In contrast to existing techniques, the proposed scheme broadcasts the cached contents at an SBS to all the MSs under its footprint. This provides MS an opportunity to exploit the list of cached contents before uploading its data. A MS only uploads its data if it is not already cached at an SBS. This significantly reduces duplication before the real transmission takes place. Furthermore, the proposed technique reduces energy consumption in addition to improving spectral efficiency and network throughput. Besides, a higher caching hit ratio and lower caching miss ratio are also observed as compared to other schemes. The simulation results reveal that the proposed scheme saves 97% energy for SBS, whereas 96–100% energy is saved for MS on average.
Article
The Internet of Things (IoT) is currently the main enabler of smart services, where network communication links physical objects (embedded Things), such as a sensor with a main backend server, and allows the collection and exchange of data. Therefore, it is very important to maintain high availability of smart services, especially critical services, in case any failure of the objects occurs. In this paper, we address the different business continuity (BC) approaches that can be implemented in IoT services. An assessment of the vulnerabilities and threats of IoT services is essential for containing damage and continuing services during a crisis. There is a lack of frameworks and guidelines that address the BC of IoT services. Therefore, in this paper, we review and analyze the different types of IoT architectures and risks associated with them. In addition, we analyze many use cases and different types of standards, guidelines, policies and frameworks of BC that can outfit our final framework. As a result, the analysis outcomes are used to propose a BC framework for the IoT. The proposal explains different types of IoT architectures along with different types of BC measurements for IoT services. Finally, we implement our proposed framework with one of the real IoT service use cases.
Article
Full-text available
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of smart devices. The ubiquitous use of IoT ranges from Industrial Control Systems (ICS) to e-Health, e-Commerce, smart cities, supply chain management, smart cars, Cyber Physical Systems (CPS) and a lot more. Such reliance on IoT is resulting in a significant amount of data to be generated, collected, processed and analyzed. The big data analytics is no doubt beneficial for business development. However, at the same time, numerous threats to the availability and privacy of the user data, message and device integrity, the vulnerability of IoT devices to malware attacks and the risk of physical compromise of devices pose a significant danger to the sustenance of IoT. This paper thus endeavors to highlight most of the known threats at various layers of the IoT architecture with a focus on the anatomy of malware attacks. We present a detailed attack methodology adopted by some of the most successful malware attacks on IoT including ICS and CPS. We also deduce an attack strategy of a Distributed Denial of Service (DDoS) attack through IoT botnet followed by requisite security measures. In the end, we propose a composite guideline for the development of an IoT security framework based on industry best practices and also highlight lessons learned, pitfalls and the open research challenges. Index Terms-Threats to the IoT, Internet of Things, mal-ware attacks on the Internet of Things, attack methodology, security and privacy, IoT security framework, security guidelines.
Article
Full-text available
The concept of a smart city includes a high degree of information technology integration, but goes beyond the use of ICT for better resource use and less emissions. [...]
Article
Full-text available
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to performing critical and sensitive tasks like money payments. Since the mobile device is accompanying a person most of his time, it is highly probably that it includes personal and sensitive data for that person. The increased use of mobile devices in daily life made mobile systems an excellent target for attacks. One of the most important attacks is phishing attack in which an attacker tries to get the credential of the victim and impersonate him. In this paper, analysis of different types of phishing attacks on mobile devices is provided. Mitigation techniques - anti-phishing techniques - are also analyzed. Assessment of each technique and a summary of its advantages and disadvantages is provided. At the end, important steps to guard against phishing attacks are provided. The aim of the work is to put phishing attacks on mobile systems in light, and to make people aware of these attacks and how to avoid them
Article
Full-text available
A smart city is developed, deployed and maintained with the help of Internet of Things (IoT). The smart cities have become an emerging phenomena with rapid urban growth and boost in the field of information technology. However, the function and operation of a smart city is subject to the pivotal development of security architectures. The contribution made in this paper is twofold. Firstly, it aims to provide a detailed, categorized and comprehensive overview of the research on security problems and their existing solutions for smart cities. The categorization is based on several factors such as governance, socioeconomic and technological factors. This classification provides an easy and concise view of the security threats, vulnerabilities and available solutions for the respective technologies areas that are proposed over the period 2010-2015. Secondly, an IoT testbed for smart cities architecture, i.e., SmartSantander is also analyzed with respect to security threats and vulnerabilities to smart cities. The existing best practices regarding smart city security are discussed and analyzed with respect to their performance, which could be used by different stakeholders of the smart cities.
Article
Full-text available
Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT devices and services.
Article
The last mile in Internet of Things (IoT) privacy is to give users a unified way to discover and be notified about the privacy properties of IoT services. A conceptual privacy stack that would build a communication bridge between IoT systems and end users is described.
Article
Securing the IoT is now a matter of public safety. But without government intervention, the IoT will remain dangerously insecure.
Article
The new Internet of Things (IoT) applications are enabling Smart City initiatives worldwide. It provides the ability to remotely monitor, manage and control devices, and to create new insights and actionable information from massive streams of real-time data. The main features of a smart city include a high degree of information technology integration and a comprehensive application of information resources. The essential components of urban development for a smart city should include smart technology, smart industry, smart services, smart management and smart life. The Internet of Things is about installing sensors (RFID, IR, GPS, laser scanners, etc.) for everything, and connecting them to the internet through specific protocols for information exchange and communications, in order to achieve intelligent recognition, location, tracking, monitoring and management. With the technical support from IoT, smart city need to have three features of being instrumented, interconnected and intelligent. Only then a Smart City can be formed by integrating all these intelligent features at its advanced stage of IOT development. The explosive growth of Smart City and Internet of Things applications creates many scientific and engineering challenges that call for ingenious research efforts from both academia and industry, especially for the development of efficient, scalable, and reliable Smart City based on IoT. New protocols, architectures, and services are in dire needs to respond for these challenges. The goal of the special issue is to bring together scholars, professors, researchers, engineers and administrators resorting to the state-of-the-art technologies and ideas to significantly improve the field of Smart City based on IoT.
Article
The connected car-A vehicle capable of accessing to the Internet, of communicating with smart devices as well as other cars and road infrastructures, and of collecting real-Time data frommultiple sources-is likely to play a fundamental role in the foreseeable Internet Of Things. In a context ruled by very strong competitive forces, a significant amount of car manufacturers and software and hardware developers have already embraced the challenge of providing innovative solutions for new-generation vehicles. Today's cars are asked to relieve drivers from the most stressful operations needed for driving, providing them with interesting and updated entertainment functions. In the meantime, they have to comply with the increasingly stringent standards about safety and reliability. The aim of this article is to provide an overview of the possibilities offered by connected functionalities on cars and the associated technological issues and problems, as well as to enumerate the currently available hardware and software solutions and their main features.
Conference Paper
Last few years, smart city related projects are evolving rapidly and users are shifting from local servers to community data centers. Therefore, automotive markets are desperately in need of solutions that can improve safety of driving, security of vehicles as-well-as need to reduce the cost of ownership of an automobile. In this paper we specify, connected vehicle architecture solutions for both safe and smart driving in personal/public vehicles. The idea is to utilize Internet of vehicle's dashboard camera (Smart-Eye) to enhance the control and accident prevention/monitoring services. The smart-Eye has capability to capture and share their real-time accident/traffic footage into text, audio and video forms to the related authorities such as nearest vehicles, police staff, hospital, family members and insurance company instantly along with the location. Hence, the Smart-Eye solutions can support automotive markets for smart and safe driving.
Article
The first wearables DevCon for developers of wearables was held in San Francisco 5?7 March 2014 and was greeted with great enthusiasm, with more than 1,000 people attending the three-day event. With the introduction of Google Glass, Epson Moverio, Pebble, and Fitbit, wearables have certainly captured the attention of many consumers and enterprises. While some of these wearables mainly provide a single function, such as fitness tracking, health monitoring, and message display, others have taken on the integration of multiple functions in the same device; the BASIS watch, for example, combines time, fitness, and health-monitoring functions into a single device. According to a new market report published by Transparency Market Research, ?Wearable Technology Market?Global Scenario, Trends, Industry Analysis, Size, Share and Forecast, 2012?2018,? the global wearable technology market is expected to grow from US750millionin2012toUS750 million in 2012 to US5.8 billion in 2018. U.K.-based Juniper Research projects that the number of wearable devices shipped will rise from about 13 million in 2013 to 130 million in 2018, and the size of the market will jump from US1.4billionin2013toUS1.4 billion in 2013 to US19 billion in 2018. Business Insider Intelligence projects shipments of 100 million units in 2014 and forecasts the market will ultimately be worth about US$12 billion per year. Such widely divergent forecasts by research firms are typical when industries are in their relative infancies and hypergrowth mode.
Next Generation Encryption
  • Cisco
Internet of things: making the most of the second digital revolution
  • M Walport
A Review: Internet of Things(IoT) Based Smart Home Automation
  • nakrani
Huawei: US official warns ‘no safe level’ of involvement with tech giant
  • Huawei
Leading tech companies support code to strengthen security of internet-connected devices
  • Gov
  • Uk