Emerging Real-World Applications of Internet of Things

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The Internet of things (IoT) is a network of connected physical objects or things that are working along with sensors, wireless transceiver modules, processors, and software required for connecting, processing, and exchanging data among the other devices over the Internet. These objects or things are devices ranging from simple handheld devices to complex industrial heavy machines. A thing in IoT can be any living or non-living object that can be provided capabilities to sense, process, and exchange data over a network. The IoT provides people with the ability to handle their household works to industrial tasks smartly and efficiently without the intervention of another human. The IoT provides smart devices for home automation as well as business solutions for delivering insights into everything from real-time monitoring of working systems to supply chain and logistics operations. The IoT has become one of the most prominent technological inventions of the 21st century.

Due to the versatility of IoT devices, there are numerous real-world applications of the IoT in various domains such as smart home, smart city, health care, agriculture, industry, and transportation. The IoT has emerged as a paradigm-shifting technology that is influencing various industries. Many companies, governments, and civic bodies are shifting to IoT applications to improve their works and to become more efficient. The world is slowly transforming toward a "smart world" with smart devices. As a consequence, it shows many new opportunities coming up in the near "smart" future for IoT professionals. Therefore, there is a need to keep track of advancements related to IoT applications and further investigate several research challenges related to the applicability of IoT in different domains to make it more adaptable for practical and industrial use. With this goal, this book provides the most recent and prominent applications of IoT in different domains as well as issues and challenges in developing IoT applications for various new domains.

Author(s): Anshul Verma, Pradeepika Verma, Yousef Farhaoui, Zhihan Lv
Publisher: CRC Press
Year: 2022

Language: English
Pages: 271
City: Boca Raton

Cover
Half Title
Title Page
Copyright Page
Table of Contents
Preface
Acknowledgments
Editors
Contributors
1 Secure IoT data using blockchain
1.1 Introduction
1.2 Research motivation
1.3 Related work
1.4 Blockchain and IoT
1.4.1 Integration of IoT and blockchain
1.4.2 Ways of integration of IoT with blockchain
1.4.2.1 IoT-IoT
1.4.2.2 IoT-blockchain
1.4.2.3 Hybrid approach
1.4.3 Challenges in blockchain-IoT integration
1.4.3.1 Storage capacity and scalability
1.4.3.2 Security
1.4.3.3 Anonymity and data privacy
1.4.3.4 Legal issues
1.4.4 Benefits of Integration of blockchain with IoT
1.4.5 Blockchain platforms for IoT
1.5 Blockchain as a solution
1.5.1 Analyzing the use of blockchain in different industries
1.5.1.1 Insurance industry
1.5.1.2 Information services industry
1.5.1.3 Real estate industry
1.5.1.4 Banking industry
1.5.1.5 Retail industry
1.5.1.6 Healthcare industry
2 Energy data lakes: An edge Internet of Energy approach
2.1 Introduction
2.2 The big picture: Framework overview
2.3 Energy data lakes
2.3.1 Introduction
2.3.2 Edge computing platform and sensing testbed
2.3.3 Labeling with the energy micro-moment (EMM) index
2.4 Results and discussion
2.4.1 Testbeds overview
2.4.2 Sensing accuracy
2.4.3 Data visualization
2.5 Conclusions
References
3 Cyberattack detection and prevention on resource-constrained IoT devices based on intelligent agents
3.1 Introduction
3.2 Background
3.2.1 Internet of things devices
3.2.2 Constrained IoT device operating system
3.2.3 Constrained IoT device cyberattack
3.3 Intrusion detection and prevention
3.4 Intelligent agents for cyberattack detection and prevention
3.4.1 Data collection segment
3.4.2 Data processing and analysis segment
3.4.3 Centralized monitoring, warning, and preventing cyberattacks segment
3.5 Future research directions
3.6 Conclusions
Acknowledgments
References
4 Artificial intelligence system for intelligent monitoring and management of water treatment plants
4.1 Introduction
4.2 Literature review
4.3 Proposed system
4.4 Materials and methods
4.4.1 Multi-parameter probes
4.4.2 Intelligent sensors
4.4.2.1 Conjunction of needs and technology
4.4.2.2 Construction of smart sensors
4.4.2.3 Intelligent sensor networks for water quality monitoring
4.4.3 Sensors software
4.5 Results and discussion
4.5.1 Architecture of the Monitoring System
4.5.2 Description of input data
4.5.3 Sensor application for system
4.6 Conclusions
References
5 Very long range (VLoRa) communication for the Internet of things: An imaginative proposal for Raspberry Pi transmitters and the WSPR protocol
5.1 Introduction (WSPR versus LoRa CSS )
5.2 The WSPR protocol and IoT applications
5.3 A Raspberry Pi WSPR transmitter for very long range (VLoRa) communications
5.4 Practical examples: Malaysian Airlines Flight MH370 and space weather stations
5.5 Opportunities and challenges
5.6 Conclusions
References
6 Analysis of applying blockchain technology to hospitality operation
6.1 Introduction
6.1.1 Advantage of the blockchain
6.1.2 How blockchain can solve the existing issues in the hospitality industry
6.2 Related work
6.2.1 Information system used in hospitality and its advantages and challenges
6.2.2 Blockchain technology
6.2.3 Different applications in different industries
6.3 Blockchain inhospitality
6.3.1 Existing system and limitations
6.3.2 How does it work?
6.3.2.1 Supply chain management system
6.3.2.2 Digital ID system
6.3.2.3 Booking system
6.3.2.4 Payment system
6.3.2.5 Room service system
6.3.2.6 Reputation system
6.3.3 Comparison and evaluation
6.3.3.1 SCM system
6.3.3.2 Digital ID system
6.3.3.3 Booking system
6.3.3.4 Payment system
6.3.3.5 Reputation system
6.3.4 Comparative analysis on availability, privacy and costs
6.3.4.1 Availability
6.3.4.2 Privacy
6.3.4.3 Relatively high implementation and development cost
6.3.4.4 Increasing transaction cost
6.4 Conclusions
Bibliography
7 Hardware security considerations and challenges in IoT architectures
7.1 Introduction
7.2 Background
7.2.1 IoT hardware
7.2.2 IoT operating systems and software
7.2.3 Cyberthreats and security breaches
7.2.4 IoT web portals
7.2.5 IoT protocols
7.3 Analysis of current and future security standards and methods
7.3.1 Security algorithms and methodologies
7.3.2 Legal, political, and social rationale for security in IoT
7.4 Future considerations for Io T security
7.5 Discussion
7.6 Conclusions
Bibliography
8 Virtualization using Docker container
8.1 Introduction
8.2 Background
8.2.1 Virtual machine-based virtualization
8.2.1.1 Virtual machine monitors (VMMs)
8.2.1.2 Software-based virtualization
8.2.1.3 Hardware-assisted virtualization
8.2.1.4 Virtual Box
8.2.1.5 VMware Player
8.2.2 Containers-based virtualization
8.2.3 Various container architectures and their management
8.2.3.1 Basis of container technology
8.2.3.2 Cloud-based container architectures
8.3 Docker
8.3.1 History of Docker
8.3.2 Docker daemon
8.3.3 Libcontainer
8.3.4 Layering file system in Docker
8.3.5 Security in Docker
8.3.6 Performance using Docker
8.3.7 Future technologies related to Docker
8.3.7.1 Kubernetes
8.3.7.2 Mesos
8.3.7.3 CoreOS
8.3.7.4 Snappy Ubuntu Core and LXD
8.3.7.5 Project Atomic
8.3.7.6 Rkt
8.3.8 Docker orchestration tools and APIs
8.3.9 Docker on Linux
8.3.10 Implementation of Docker use case: WordPress
8.4 Docker applications in Internet of things (IoT)
8.4.1 Message Queuing Telemetry Transport (MQTT) broker cluster
8.4.2 Edge/Fog computing
8.4.3 IoT analytics
8.4.4 Smart healthcare monitoring system
8.4.5 Vehicle-to-everything (V2X) applications
8.4.6 Aquaculture
8.4.7 Precision agriculture
8.4.8 Smart homes
8.4.9 Energy management
8.4.10 Industrial IoT (IIoT)
8.4.11 Smart cities
8.5 Conclusions
References
9 IoT-enabled smart street light control for demand response applications
9.1 Introduction
9.2 Smart street light control technologies
9.3 IoT for street light control
9.4 Demand response using street light control
9.5 Proposed approach
9.5.1 Weather data collection
9.5.2 Traffic data collection
9.5.3 Street light control algorithm
9.6 Case study evaluation
9.7 Results and discussion
9.8 Conclusions
References
10 IoT in retail industry: The emergence of walkaway technology in business
10.1 Introduction
10.2 The history and evolution of IoT
10.3 Definition of IoT
10.4 What is an Internet of things?
10.5 IoT and security
10.6 IoT in business applications
10.7 IoT in retail industry
10.7.1 IoT and Consumer experience enhancement
10.8 Conclusion
References
11 Respiratory rate meter with the Internet of things
11.1 Internet of things in healthcare preamble
11.2 Some applications of the Internet of things to health care and respiratory rate
11.2.1 Measurement of respiratory frequency
11.3 Respiratory rate monitor with Particle Photon
11.3.1 Electronic circuit
11.3.2 Printed circuit board
11.4 Photon programming
11.5 Conclusions
References
12 Artificial intelligence with IoT for energy efficiency in buildings
12.1 Introduction
12.2 Related works: AI and IoT for energy management
12.2.1 Energy-saving based on behavioral change
12.2.2 Energy saving based on thermal comfort optimization
12.2.3 Energy saving using ML-based load forecasting
12.3 Proposed methodology
12.3.1 Micro-moments concept
12.3.2 Recommender system
12.3.3 Home-Assistant app
12.3.4 Pilot installation
12.4 Experimental results
12.4.1 Sample size and characteristics
12.4.2 Survey overview
12.4.3 Results and discussion
12.4.3.1 Response analysis
12.4.3.2 Usefulness evaluation
12.5 Conclusions
Acknowledgments
Ethical Approval
Bibliography
Index