Search results for "things"
showing 10 items of 196 documents
Fuzzy Logic Based Security Trust Evaluation for IoT Environments
2019
In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data concerning the privacy of their users. Consequently, users should trust the entities exchanging their personal information. In this paper, we present a framework that evaluates the security trust level of IoT nodes based on a Fuzzy Logic model using different input parameters such as Device Physical Security, Device Security Level and Device Ownershi…
MAC Protocols for Wake-up Radio: Principles, Modeling and Performance Analysis
2018
[EN] In wake-up radio (WuR) enabled wireless sensor networks (WSNs), a node triggers a data communication at any time instant by sending a wake-up call (WuC) in an on-demand manner. Such wake-up operations eliminate idle listening and overhearing burden for energy consumption in duty-cycled WSNs. Although WuR exhibits its superiority for light traffic, it is inefficient to handle high traffic load in a network. This paper makes an effort towards improving the performance of WuR under diverse load conditions with a twofold contribution. We first propose three protocols that support variable traffic loads by enabling respectively clear channel assessment (CCA), backoff plus CCA, and adaptive …
Adoption of Constrained Application Protocol
2016
Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…
Knowledge-based verification of concatenative programming patterns inspired by natural language for resource-constrained embedded devices
2020
We propose a methodology to verify applications developed following programming patterns inspired by natural language that interact with physical environments and run on resource-constrained interconnected devices. Natural language patterns allow for the reduction of intermediate abstraction layers to map physical domain concepts into executable code avoiding the recourse to ontologies, which would need to be shared, kept up to date, and synchronized across a set of devices. Moreover, the computational paradigm we use for effective distributed execution of symbolic code on resource-constrained devices encourages the adoption of such patterns. The methodology is supported by a rule-based sys…
Optimization of flat area coverage under connectivity constraint in wireless sensor networks
2022
A wireless sensor network consists of a set of small autonomous units that interact via a network built by their communication modules. They observe their environment, capture information, then manage this information according to their computing and/or storage capacity. To effectively accomplish their task(s), they need to cover as much of the area of interest as possible. It is therefore essential to quantify the quality of their coverage. In this thesis, we therefore seek to best cover an area of interest, with a precise number of sensors. While taking into account the possible overlaps between sensors, we first deploy in a zone of regular dimensions and evaluate the exact coverage using…
Consumer Acceptance Determinants of Internet of Things : A New Perspective
2018
International audience; Despite the rising popularity of Internet of Things (IoT), consumer acceptance continues to grow at a slow pace. For example, adoption of health and fitness wearables is still relatively low and about a half of consumers abandon their wearables within the first six months. This pattern means that firms engaged in IoT industry can not recover their development and marketing costs. Recent research offer a fragmented view of the determinants of IoT consumer acceptance and focus mainly on functional attributes.This paper aims to provide a new perspective. Drawing on the service-dominant logic, the perceived value conceptualization and the customer experience approach, ou…
Design and Implementation of Real-Time Kitchen Monitoring and Automation System Based on Internet of Things
2022
Automation can now be found in nearly every industry. However, home automation has yet to reach Pakistan. This paper presents an Internet of Things smart kitchen project that includes automation and monitoring. In this project, a system was developed that automatically detects the kitchen temperature. It also monitors the humidity level in the kitchen. This system includes built-in gas detection sensors that detect any gas leaks in the kitchen and notify the user if the gas pressure in the kitchen exceeds a certain level. This system also allows the user to remotely control appliances such as freezers, ovens, and air conditioners using a mobile phone. The user can control gas levels using t…
Next Generation Home Sharing: Disrupting Platform Organizations with Blockchain Technology and the Internet of Things?
2020
During the last decade, the sharing economy has given birth to a number of market mediators, which have grown to become the world’s most valuable companies. Centralized sharing platforms like Uber, Didi Chuxing, and Airbnb have transformed several traditional industries. However, with the rise of the blockchain technology, some voices predict that these platform companies will soon be at risk of being disrupted themselves. In this chapter, we address the question of whether blockchain technology has given birth to a new breed of sharing economy platforms that can challenge the incumbents’ business models. We identify five different stages of the application of blockchain technology in emerg…
A framework for evaluating Internet-of-Things platforms: Application provider viewpoint
2014
Widespread adoption of Internet of Things (IoT) applications assumes a sustainable ecosystem of firms creating, distributing, and using these applications. Such an ecosystem often forms around a platform that implements commonly used functionality and offers it to the members of the ecosystem for creating applications and services. In IoT, such a platform may be materialized in a form of a cloud platform that supports the management of connected devices, and the development and use of the applications based on them. A number of cloud platforms targeting IoT applications are available in the market; to prosper, they need to assist the providers of the IoT applications in designing and develo…
Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks
2015
Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT device…