854 research outputs found

    Internet of things

    Get PDF
    Manual of Digital Earth / Editors: Huadong Guo, Michael F. Goodchild, Alessandro Annoni .- Springer, 2020 .- ISBN: 978-981-32-9915-3Digital Earth was born with the aim of replicating the real world within the digital world. Many efforts have been made to observe and sense the Earth, both from space (remote sensing) and by using in situ sensors. Focusing on the latter, advances in Digital Earth have established vital bridges to exploit these sensors and their networks by taking location as a key element. The current era of connectivity envisions that everything is connected to everything. The concept of the Internet of Things(IoT)emergedasaholisticproposaltoenableanecosystemofvaried,heterogeneous networked objects and devices to speak to and interact with each other. To make the IoT ecosystem a reality, it is necessary to understand the electronic components, communication protocols, real-time analysis techniques, and the location of the objects and devices. The IoT ecosystem and the Digital Earth (DE) jointly form interrelated infrastructures for addressing today’s pressing issues and complex challenges. In this chapter, we explore the synergies and frictions in establishing an efficient and permanent collaboration between the two infrastructures, in order to adequately address multidisciplinary and increasingly complex real-world problems. Although there are still some pending issues, the identified synergies generate optimism for a true collaboration between the Internet of Things and the Digital Earth

    Systematic Review of Internet of Things Security

    Get PDF
    The Internet of Things has become a new paradigm of current communications technology that requires a deeper overview to map its application domains, advantages, and disadvantages. There have been a number of in-depth research efforts to study various aspects of IoT. However, to the best of our knowledge, there is no literature that have discussed specifically and deeply about the security and privacy aspects of IoT. To that end, this paper aims at providing a more comprehensive and systematic review of IoT security based on the survey result of the most recent literature over the past three years (2015 to 2017). We have classified IoT security research based on the research objectives, application domains, vulner-abilities/threats, countermeasures, platforms, proto-cols, and performance measurements. We have also provided some security challenges for further research

    Setting Privacy "by Default" in Social IoT: Theorizing the Challenges and Directions in Big Data Research

    Full text link
    [EN] The social Internet of Things (SIoT) shares large amounts of data that are then processed by other Internet of Thing (IoT) devices, which results in the generation, collection, and treatment of databases to be analyzed afterwards with Big Data techniques. This paradigm has given rise to users' concerns about their privacy, particularly with regard to whether users have to use a smart handling (self-establishment and self-management) in order to correctly install the SIoT, ensuring the privacy of the SIot-generated content and data. In this context, the present study aims to identify and explore the main perspectives that define user privacy in the SIoT; our ultimate goal is to accumulate new knowledge on the adoption and use of the concept of privacy "by default" in the scientific literature. To this end, we undertake a literature review of the main contributions on the topic of privacy in SIoT and Big Data processing. Based on the results, we formulate the following five areas of application of SIoT, including 29 key points relative to the concept of privacy "by default": (i) SIoT data collection and privacy; (ii) SIoT security; (iii) threats for SIoT devices; (iv) SIoT devices mandatory functions; and (v) SIoT and Big Data processing and analytics. In addition, we outline six research propositions and discuss six challenges for the SIoT industry. The results are theorized for the future development of research on SIoT privacy by "default" and Big Data processing.In gratitude to the Ministry of Science, Innovation and Uni-versities and the European Regional Development Fund: RTI2018-096295-B-C22.Saura, JR.; Ribeiro-Soriano, D.; Palacios Marqués, D. (2021). Setting Privacy "by Default" in Social IoT: Theorizing the Challenges and Directions in Big Data Research. Big Data Research. 25:1-12. https://doi.org/10.1016/j.bdr.2021.100245S1122

    2D Time-frequency interference modelling using stochastic geometry for performance evaluation in Low-Power Wide-Area Networks

    Full text link
    In wireless networks, interferences between trans- missions are modelled either in time or frequency domain. In this article, we jointly analyze interferences in the time- frequency domain using a stochastic geometry model assuming the total time-frequency resources to be a two-dimensional plane and transmissions from Internet of Things (IoT) devices time- frequency patterns on this plane. To evaluate the interference, we quantify the overlap between the information packets: provided that the overlap is not too strong, the packets are not necessarily lost due to capture effect. This flexible model can be used for multiple medium access scenarios and is especially adapted to the random time-frequency access schemes used in Low-Power Wide-Area Networks (LPWANs). By characterizing the outage probability and throughput, our approach permits to evaluate the performance of two representative LPWA technologies Sigfox{\textsuperscript \textregistered} and LoRaWA{\textsuperscript \textregistered}
    corecore