scispace - formally typeset
Search or ask a question
Reference BookDOI

Internet of Things (IoT) : Technologies, Applications, Challenges and Solutions

About: The article was published on 2017-10-10. It has received 25 citations till now.
Citations
More filters
Journal ArticleDOI
TL;DR: In this article, the authors used polyurethane acrylate (PUA) UV-curable resins for the development of composites with multi-walled carbon nanotubes (MWCNT) with suitable morphological, thermal, mechanical, electrical and piezoresistive properties for sensor applications.

21 citations

Journal ArticleDOI
03 Apr 2020-Sensors
TL;DR: A novel OTP (one-time password)-authentication schema for MQTT is proposed, which uses the Ethereum blockchain to implement a second-factor out-of-band channel and enables the authentication of both local and remote devices preserving user privacy and guaranteeing trust and accountability via Ethereum smart contracts.
Abstract: The Internet of Things is constantly capturing interest from modern applications, changing our everyday life and empowering industrial applications. Interaction and the collaboration among smart devices offer new challenges to security since they conflict with economic and energy consumption requirement constraints. On the other hand, the lack of security measures could negatively impact the concrete adoption of this paradigm. This paper focuses on the Message Queuing Telemetry Transport (MQTT) protocol, widely adopted in the Internet of Things. This protocol does not implement natively secure authentication mechanisms, which are demanded to developers. Hence, this paper proposes a novel OTP (one-time password)-authentication schema for MQTT, which uses the Ethereum blockchain to implement a second-factor out-of-band channel. The proposal enables the authentication of both local and remote devices preserving user privacy and guaranteeing trust and accountability via Ethereum smart contracts.

18 citations

Journal ArticleDOI
TL;DR: An algorithm for modeling CAC in an area served by the three categories of services in a 5G access network, mainly based on minimum energy consumption is suggested, which will allow connected objects that consume low energy to connect to the network with an adequate quality of service and enable the development of the Internet of Things.
Abstract: The International Telecommunications Union defines in its IMT‐2020 recommendations three types of use of 5G services: mMTC (massive Machine‐type Communications), eMBB (enhanced Mobile Broadband), and uRLLC (ultra‐Reliable Low Latency Communications). The mMTC service allows a considerable number of machines and devices to communicate while guaranteeing a good quality of service. The eMBB service allows very high data throughput, even at the cell border. The uRLLC service is used for ultra‐reliable communication for critical needs requiring very low latency. These services are provided separately in a given cell. However, the number of connected objects is starting to increase rapidly as well as the bit rates and energy consumption. The 5G network must make it possible to provide access to a vast number of users of its different service categories. Call admission control (CAC) techniques focus more on availability in terms of bit rate and coverage. In this article, we suggest an algorithm for modeling CAC in an area served by the three categories of services in a 5G access network, mainly based on minimum energy consumption. This technique will allow connected objects that consume low energy to connect to the network with an adequate quality of service and enable the development of the Internet of Things.

16 citations

Proceedings ArticleDOI
01 Nov 2019
TL;DR: A Call Admission Control (CAC) modeling algorithm for IoT in a New Radio Access (NR 5G), essentially based on minimal energy consumption is suggested.
Abstract: Internet of Things (IoT) started with the idea of connecting both wireless and wired sensors to the Internet network that can be found in homes, offices, or everywhere. Then, its major contribution was raised by RFID (Radio Frequency Identification) and electronic tags. The IoT makes it possible to connect everything that is connectable, from various objects to "Smart Dust." The concept is simple. However, there are many problems, because "things" are not usually sophisticated enough to handle applications-related communications and processing. Some mobile networks (4G LTE) are used, such as LTE-M (LTE for Machine Type Communication) and NB-IoT (Narrowband IoT), which are LPWA technologies (Low Power Wide Area) standardized by 3GPP. There are also other used LPWA technologies such as LoRa, Sigfox. Nowadays, the number of connected objects becomes to increases very quickly as well as bit-rates and energy consumption. For this, the 5G will provide solutions to this problem, although it manages an Ultra-Dense Network (UDN) requiring a lot of energy. In this paper, we suggest a Call Admission Control (CAC) modeling algorithm for IoT in a New Radio Access (NR 5G), essentially based on minimal energy consumption.

15 citations

Proceedings ArticleDOI
09 Sep 2020
TL;DR: A new unified criteria and characteristics, namely Formal, Inclusive, Future, Agile, and Compliant with the standards (FIFAC), are proposed in order to assure modularity, reliability, and trust for future IoT security models, as well as, to provide an assortment of adaptable controls for protecting the data consistently across all IoT layers.
Abstract: Nowadays, Internet of Things (IoT) has gained considerable significance and concern, consequently, and in particular with widespread usage and adoption of the IoT applications and projects in various industries, the consideration of the IoT Security has increased dramatically too. Therefore, this paper presents a concise and a precise review for the current state of the IoT security models and frameworks. The paper also proposes a new unified criteria and characteristics, namely Formal, Inclusive, Future, Agile, and Compliant with the standards (FIFAC), in order to assure modularity, reliability, and trust for future IoT security models, as well as, to provide an assortment of adaptable controls for protecting the data consistently across all IoT layers.

10 citations


Cites background from "Internet of Things (IoT) : Technolo..."

  • ...[7] B....

    [...]

  • ...The Wearable devices record large amounts of data by measuring signals around the body, and they come in many different forms such as wristbands, armbands, watches, and headbands [7]....

    [...]