Professional Documents
Culture Documents
Sunil Luthra, Dixit Garg, Sachin Kumar Mangla, Yash Paul Singh Berwal,
Analyzing challenges to Internet of Things (IoT) adoption and diffusion: An Indian
context,
Procedia Computer Science,
Volume 125,
2018,
Pages 733-739,
ISSN 1877-0509,
https://doi.org/10.1016/j.procs.2017.12.094.
(http://www.sciencedirect.com/science/article/pii/S1877050917328624)
Abstract: The Internet of Things (IoT) arena has gained a significant attention in
recent years. IoT presents an image of a future internet and recognized as an
ecosystem of connected devices, computing mechanisms and other items to exchange
data/information cooperate with higher ease and financial benefits. However, IoT
adoption and diffusion still remains a challenge due to existence of many
challenges. Therefore, this work put forward an objective to recognize and analyze
the challenges in implementation of IoT systems in Indian context. Nine challenges
to IoT adoption and diffusion were identified by literature survey and experts’
opinions. Further, Grey Relational Analysis (GRA) and Analytical Hierarchy Process
(AHP) approaches were used to analyze the challenges to IoT adoption and diffusion
in Indian context. This study may help practitioners and policy makers in removing
the hurdles to successful IoT adoption and diffusion. Finally, conclusions and
future research directions are presented.
Keywords: Analytical Hierarchy Process (AHP); Challenges; Internet of Things (IoT);
India; Industry 4.0; Grey Relational Analysis (GRA)
Allaa R. Hilal, Aya Sayedelahl, Arash Tabibiazar, Mohamed S. Kamel, Otman A. Basir,
A distributed sensor management for large-scale IoT indoor acoustic surveillance,
Future Generation Computer Systems,
Volume 86,
2018,
Pages 1170-1184,
ISSN 0167-739X,
https://doi.org/10.1016/j.future.2018.01.020.
(http://www.sciencedirect.com/science/article/pii/S0167739X18300529)
Abstract: The recent world events have underscored the need for large area
surveillance systems. Such systems require effective sensing and collaborative
decision-making to operate in highly dynamic environments with demanding time
constraints. The Pervasive Internet of Things (IoT) is a novel paradigm that
enables detailed characterization of the real physical applications. To this end, a
pervasive IoT surveillance applications can offer an effective framework to collect
situation-aware knowledge that is vital for planning effective security measures.
Nevertheless, most state-of-the-art focus only on visual abnormal event recognition
using centralized systems, thus, ignoring the need for distributed operation to
enable large-scale IoT surveillance systems. This paper presents a novel Sensor
Management (SM) framework for pervasive IoT acoustic surveillance, IntelliSurv,
that automatically detects and localizes abnormal acoustic events in a distributed
collaborative manner. The proposed framework coordinates the sensing resources
using a novel team-theoretic SM, based on the Belief–Desire–Intention (BDI) model,
for autonomous decision-making and resource allocation. The proposed abnormal event
recognition module, using Support Vector Machines (SVM) and Linear Discriminate
Analysis (LDA) classifiers, relies on audio information to recognize human screams
or high-stress speech signals. The simulation scenario in this work is the
surveillance of the Waterloo International Airport implemented using Jadex platform
and Speech Under Simulated and Actual Stress (SUSAS) database. The simulation
results show the merits of the proposed IntelliSurv framework, compared to the
popular centralized systems, over varying network size, number of threats, Signal-
to-Noise Ratios (SNR), tracking quality, and energy consumption.
Keywords: Pervasive acoustic surveillance; Sensor management; Abnormality
detection; Localization; Belief–Desire–Intention (BDI) model; Autonomous systems;
Indoor environment; Internet of Things
Monika Mital, Victor Chang, Praveen Choudhary, Armando Papa, Ashis K. Pani,
Adoption of Internet of Things in India: A test of competing models using a
structured equation modeling approach,
Technological Forecasting and Social Change,
2017,
,
ISSN 0040-1625,
https://doi.org/10.1016/j.techfore.2017.03.001.
(http://www.sciencedirect.com/science/article/pii/S0040162517302949)
Abstract: Internet of Things based applications for smart homes, wearable health
devices, and smart cities are in the evolutionary stage in India. Adoption of
Internet of Things is still limited to a few application areas. In developing
countries, the usefulness of IOT's adoption is recognized as a key factor for
economic and social development of a country by both academicians and practitioners
as well. Currently, there are still very few studies that explore the adoption of
Internet of Things from a multiple theory perspective, namely, The Theory of
Reasoned Action (TRA), The Theory of Planned Behaviour (TPB) and The Technology
Acceptance Model (TAM). This research aims to satisfy a clear gap in the main field
of research by proposing a Structured Equation Model (SEM) approach to test three
competing models in the context of Internet of Things in India. With respect to
previous literature, this research sets the stage for extensive research in a broad
domain of application areas for the Internet of Things, like healthcare, elderly
well- being and support, smart cities and smart supply chains etc.
Keywords: Internet of Things; Healthcare; Smart cities; Smart supply-chain
management; Indian market; Multiple-theory based approach
Kostas Kolomvatsos,
Time-optimized management of IoT nodes,
Ad Hoc Networks,
Volume 69,
2018,
Pages 1-14,
ISSN 1570-8705,
https://doi.org/10.1016/j.adhoc.2017.10.011.
(http://www.sciencedirect.com/science/article/pii/S157087051730183X)
Abstract: The vision of Internet of Things (IoT) aims to offer a vast
infrastructure of numerous interconnected devices usually called IoT nodes. The
infrastructure consists of the basis of pervasive computing applications.
Applications can be built with the participation of the IoT nodes that interact in
very dynamic environments. In this setting, one can identify the need for applying
updates in the software/firmware of the autonomous nodes. Updates may include
software extensions and patches significant for the efficient functioning of the
IoT nodes. Legacy methodologies involve centralized models where complex algorithms
and protocols are adopted for the distribution of the updates to the nodes. This
paper proposes a distributed approach where each node is responsible to initiate
and conclude the update process. We envision that each node monitors specific
performance metrics (related to the node itself and/or the network) and based on a
time-optimized scheme identifies the appropriate time to perform the update
process.We propose the adoption of a finite horizon optimal stopping scheme. Our
stopping model originates in the Optimal Stopping Theory (OST) and takes into
account multiple performance metrics. The aim is to have the nodes capable of
identifying when their performance and the performance of the network are of high
quality. In that time, nodes could be able to efficiently conclude the update
process. We provide a set of formulations and the analysis of our problem.
Extensive experiments and a comparison assessment reveal the advantages of the
proposed solution.
Keywords: Internet of Things; Updates management; Optimal stopping theory
Nir Kshetri,
The evolution of the internet of things industry and market in China: An interplay
of institutions, demands and supply,
Telecommunications Policy,
Volume 41, Issue 1,
2017,
Pages 49-67,
ISSN 0308-5961,
https://doi.org/10.1016/j.telpol.2016.11.002.
(http://www.sciencedirect.com/science/article/pii/S0308596116302038)
Abstract: This paper seeks to provide some explanation as to how demand-, supply-
and institutions-related factors in China have affected the creation and diffusion
of Internet of Things (IoT)-related products and services. Concerning demand side
factors the paper demonstrates how potential market size and existing technology
trajectory work in favor of IoT diffusion. As a related demand side factor the
paper argues that, in terms of the technological trajectory, China has started
farther from the frontier than most industrialized countries. The degree of
incremental benefit from the IoT is thus higher in the country. As to the supply
side factors, the article promotes an understanding of how Chinese technology
companies have capitalized on a huge user base to develop IoT-based applications.
It also suggests that technologies and expertise provided by foreign multinationals
have also played crucial roles. Regarding formal institutions, the government's
proactive policies have been a major factor in the IoT's evolution. It is also in
the Chinese government's interest to develop IoT products to make censorship and
surveillance more effective. Regarding informal institutions, Chinese consumers are
less concerned than Westerners about being tracked and monitored, which provides a
favorable condition for the adoption of IoT-enabled devices. Nonetheless, this
condition is changing due to increasing abuse of consumer privacy. China and the
U.S. are compared in terms of diffusion, key determinants, performance indicators
and impacts of the IoT in order to understand the areas that China outperforms—and
underperforms—the U.S. Some indicators are proposed to gauge the IoT-related
performance and the impacts of the IoT.
Keywords: China; Institutions; Internet of Things; Leapfrogging; Smart city;
Standardization
Marcelo Fantinato, Patrick C.K. Hung, Ying Jiang, Jorge Roa, Pablo Villarreal,
Mohammed Melaisi, Fernanda Amancio,
A preliminary study of Hello Barbie in Brazil and Argentina,
Sustainable Cities and Society,
Volume 40,
2018,
Pages 83-90,
ISSN 2210-6707,
https://doi.org/10.1016/j.scs.2018.03.006.
(http://www.sciencedirect.com/science/article/pii/S221067071830101X)
Abstract: A smart city is an urban development vision based on Information and
Communication Technology (ICT) and the Internet of things (IoT) for the city’s
management and operations. The smart city concept is raised simultaneously in many
modern societies. IoT is always playing an important role as smart devices to
support complex scenarios in smart cities. A smart toy, such as “Hello Barbie,” is
a smart device consisting of a physical toy component that connects to a computing
system with online services through networking to enhance the functionality of a
traditional toy. In this research, we particularly studied Brazilian and
Argentinian consumers’ perceived innovativeness, risks and benefits of smart toys
and their purchase intention toward such toys. Results indicate that Brazilian
consumers have better perception and evaluation of the toy and thus higher purchase
intention than Argentinian consumers do. Such difference may be explained by the
cultural differences between the two countries, such as relatively low vs. high
uncertainty avoidance. We also provide our recommendations for smart toys
manufacturers to address these issues for the future products.
Keywords: Smart city; Smart toy; Survey; South America; Brazil; Argentina; Hello
Barbie; Perceived innovativeness; Privacy risks; Parental control
Mohamed Elhoseny, Ahmed Abdelaziz, Ahmed S. Salama, A.M. Riad, Khan Muhammad, Arun
Kumar Sangaiah,
A hybrid model of Internet of Things and cloud computing to manage big data in
health services applications,
Future Generation Computer Systems,
Volume 86,
2018,
Pages 1383-1394,
ISSN 0167-739X,
https://doi.org/10.1016/j.future.2018.03.005.
(http://www.sciencedirect.com/science/article/pii/S0167739X17322021)
Abstract: Over the last decade, there has been an increasing interest in big data
research, especially for health services applications. The adoption of the cloud
computing and the Internet of Things (IoT) paradigm in the healthcare field can
bring several opportunities to medical IT, and experts believe that it can
significantly improve healthcare services and contribute to its continuous and
systematic innovation in a big data environment such as Industry 4.0 applications.
However, the required resources to manage such data in a cloud-IoT environment are
still a big challenge. Accordingly, this paper proposes a new model to optimize
virtual machines selection (VMs) in cloud-IoT health services applications to
efficiently manage a big amount of data in integrated industry 4.0. Industry 4.0
applications require to process and analyze big data, which come from different
sources such as sensor data, without human intervention. The proposed model aims to
enhance the performance of the healthcare systems by reducing the stakeholders’
request execution time, optimizing the required storage of patients’ big data and
providing a real-time data retrieval mechanism for those applications. The
architecture of the proposed hybrid cloud-IoT consists of four main components:
stakeholders’ devices, stakeholders’ requests (tasks), cloud broker and network
administrator. To optimize the VMs selection, three different well-known optimizers
(Genetic Algorithm (GA), Particle swarm optimizer (PSO) and Parallel Particle swarm
optimization (PPSO) are used to build the proposed model. To calculate the
execution time of stakeholders’ requests, the proposed fitness function is a
composition of three important criteria which are CPU utilization, turn-around time
and waiting time. A set of experiments were conducted to provide a comparative
study between those three optimizers regarding the execution time, the data
processing speed, and the system efficiency. The proposed model is tested against
the state-of-the-art method to evaluate its effectiveness. The results show that
the proposed model outperforms on the state-of-the-art models in total execution
time the rate of 50%. Also, the system efficiency regarding real-time data retrieve
is significantly improved by 5.2%.
Keywords: Big data; Industry 4.0; Cloud computing; Internet of Things; Health
services; Genetic Algorithm; Particle swarm optimization
Ping-Win Lui, Feng Min Lai, Kuo-Chih Su, Jen Yung Lin, Hwa Wei Chi, Jean-Shyan
Wang, Yuh Wen Chen,
Use Eye Tracker to Design an Intelligent Patient Bed,
Energy Procedia,
Volume 143,
2017,
Pages 553-558,
ISSN 1876-6102,
https://doi.org/10.1016/j.egypro.2017.12.726.
(http://www.sciencedirect.com/science/article/pii/S1876610217364901)
Abstract: In the case of caring disable patients in hospital, transportation and
security of a patient under supervision of a nurse is crucially important. We
developed an intelligent patient bed here, with the assistance of contactless eye
tracker which works to facilitate the communication between the disable patient and
the bed for better self-care. In real time, it delivers information about the gaze
position, where a designed Graphical User Interface (GUI) is used to catch the
intention of user. After that, it is able to trigger a special service that the
patient expects. The service embedded in the patient bed include the complicated
positioning control and the call for a nurse. In addition, this patient bed is
innovatively made of composite materials: carbon fibers to reduce the total weight
for saving electricity and reduce the burden of transportation or positioning. Our
efforts are valuable when the hospital moves toward the automation and intelligence
via the technology from Internet of Things (IOTs).
Keywords: Eye Tracker; Hospital; Patient Bed; Composite Material; Internet of
Things
Jemal Abawajy, Shamsul Huda, Shaila Sharmeen, Mohammad Mehedi Hassan, Ahmad
Almogren,
Identifying cyber threats to mobile-IoT applications in edge computing paradigm,
Future Generation Computer Systems,
Volume 89,
2018,
Pages 525-538,
ISSN 0167-739X,
https://doi.org/10.1016/j.future.2018.06.053.
(http://www.sciencedirect.com/science/article/pii/S0167739X18300906)
Abstract: The malware has become an increasing problem for Mobile-Internet of
Things applications in edge computing platform. Variants of malware can be
identified once their general characteristics are known and overtly malicious
behavior can be identified. Some research has been performed using static analysis
in order to identify privacy violating malware for IoT in edge computing. Dynamic
analysis can be easily evaded as malware can adapt to avoid detection and has
performance overheads. The case where an application lies about its intention for
requesting a permission or intentionally violates the user’s expectation of an
applications behavior is not so well researched. This research extensively explores
the fundamental gap in the current literature in terms of mobile malware. We
particularly focus on a greater set of permissions which may be leveraged for other
purposes, for example by using sensors to record user credentials or monitoring a
user’s movements. This research will attempt to identify such scenarios by
employing behavioral analysis to determine when and how permissions are used and
static and dynamic analysis to determine the behavior of application logic yet to
execute. We proposed two-layer detection engine with hybrid feature analysis.
Experimental results with real mobile malware IoT data show that our proposed
approach with permission related features outperforms other detection engines.
Keywords: Cyber-threat; Mobile malware; Internet of Things; Edge computing; Feature
analysis
Bruno P. Santos, Olga Goussevskaia, Luiz F.M. Vieira, Marcos A.M. Vieira, Antonio
A.F. Loureiro,
Mobile Matrix: Routing under mobility in IoT, IoMT, and Social IoT,
Ad Hoc Networks,
Volume 78,
2018,
Pages 84-98,
ISSN 1570-8705,
https://doi.org/10.1016/j.adhoc.2018.05.012.
(http://www.sciencedirect.com/science/article/pii/S1570870518302415)
Abstract: The explosive growth of “things” connected to the Internet (Internet of
Things, IoT) raises the question of whether existing ready-to-go networking
protocols are enough to cover social and mobile IoT’s demands. IoT aims to
interconnect static devices attached to some physical infrastructure. However,
mobility is a major factor present in everyday life, and naturally the “things” can
move around (Internet of Mobile Things, IoMT) and create social ties (Social IoT,
SIoT) in the cyber-physical space. In that context, we present Mobile Matrix
(μMatrix), a routing protocol that uses hierarchical IPv6 address allocation to
perform any-to-any routing and mobility management without changing a node’s
address. In this way, device mobility is transparent to the application level
favoring IoMT and SIoT implementation and broader adoption. The protocol has low
memory footprint, adjustable control message overhead, and it achieves optimal
routing path distortion. Moreover, it does not rely on any particular hardware for
mobility detection (a key open issue), such as an accelerometer. Instead, it uses a
passive mechanism to detect that a device has moved. We present analytic proofs for
the computational complexity and efficiency of μMatrix, as well as an evaluation of
the protocol through simulations. We evaluate the protocol performance under human
and non-human mobility models. For human mobility, we generated mobility traces
using Group Regularity Mobility (GRM) Model, setting its parameters based on real
human mobility traces. For the non-human mobility, we propose a new mobility model,
to which we refer as Cyclical Random Waypoint (CRWP), where nodes move using a
simple Random Waypoint and, eventually, return to their initial position. We
compared μMatrix with three baseline protocols: Routing Protocol for low-power and
lossy networks (RPL), Mobility Management RPL (MMRPL), and Ad hoc On-Demand
Distance Vector (AODV). The results show that μMatrix and RPL offer ≈ 99.9% of
bottom-up delivery rate, but only μMatrix offer ≥ 95% of top-down traffic in
highly dynamic and mobile scenarios, while other protocols ≤ 75%. Moreover,
μMatrix uses up to 65% of the routing table while RPL and AODV fulfill theirs in
all scenarios, which leads to poor top-down and any-to-any reliability.
Keywords: Internet of Things; Mobility; Hierarchical address; Routing protocol
Everton Cavalcante, Jorge Pereira, Marcelo Pitanga Alves, Pedro Maia, Roniceli
Moura, Thais Batista, Flavia C. Delicato, Paulo F. Pires,
On the interplay of Internet of Things and Cloud Computing: A systematic mapping
study,
Computer Communications,
Volumes 89–90,
2016,
Pages 17-33,
ISSN 0140-3664,
https://doi.org/10.1016/j.comcom.2016.03.012.
(http://www.sciencedirect.com/science/article/pii/S0140366416300706)
Abstract: The Internet of Things (IoT) is a novel paradigm relying on the
interaction of smart objects (things) with each other and with physical and/or
virtual resources through the Internet. Despite the recent advances that have made
IoT a reality, there are several challenges to be addressed towards exploiting its
full potential and promoting tangible benefits to society, environment, economy,
and individual citizens. Recently, Cloud Computing has been advocated as a
promising approach to tackle some of the existing challenges in IoT while
leveraging its adoption and bringing new opportunities. With the combination of IoT
and Cloud Computing, the cloud becomes an intermediate layer between smart objects
and applications that make use of data and resources provided by these objects. On
the one hand, IoT can benefit from the almost unlimited resources of Cloud
Computing to implement management and composition of services related to smart
objects and their provided data. On the other hand, the cloud can benefit from IoT
by broadening its operation scope to deal with real-world objects. In spite of this
synergy, the literature still lacks of a broad, comprehensive overview on what has
been investigated on the integration of IoT and Cloud Computing and what are the
open issues to be addressed in future research and development. The goal of this
work is to fill this gap by systematically collecting and analyzing studies
available in the literature aiming to: (i) obtain a comprehensive understanding on
the integration of IoT and Cloud Computing paradigms; (ii) provide an overview of
the current state of research on this topic; and (iii) identify important gaps in
the existing approaches as well as promising research directions. To achieve this
goal, a systematic mapping study was performed covering papers recently published
in journals, conferences, and workshops, available at five relevant electronic
databases. As a result, 35 studies were selected presenting strategies and
solutions on how to integrate IoT and Cloud Computing as well as scenarios,
research challenges, and opportunities in this context. Besides confirming the
increasing interest on the integration of IoT and Cloud Computing, this paper
reports the main outcomes of the performed systematic mapping by both presenting an
overview of the state of the art on the investigated topic and shedding light on
important challenges and potential directions to future research.
Keywords: Internet of Things; IoT; Cloud Computing; Systematic mapping
Chakib Bekara,
Security Issues and Challenges for the IoT-based Smart Grid,
Procedia Computer Science,
Volume 34,
2014,
Pages 532-537,
ISSN 1877-0509,
https://doi.org/10.1016/j.procs.2014.07.064.
(http://www.sciencedirect.com/science/article/pii/S1877050914009193)
Abstract: Internet of Things (IoT) is the next step evolution of our today
Internet, where any physical object/thing having/equipped with computation and
communication capabilities could be seamlessly integrated, at different levels, to
the Internet. The Smart Grid (SG), which is considered as one of the most critical
Infrastructures, is defined as the classical power grid augmented with a large-
scale ICT and renewable energy integration, can be seen as one of the largest IoT
network. The SG will involve billions of smart objects/things: smart meters, smart
appliances, sensors, actuators-cars, etc. in addition to several communication
infrastructures whether public (most often) or private. However, security is seen
as one of the major factors hampering the rapid and large scale adoption and
deployment of both the IoT vision and the Smart Grid. In this paper we investigate
the security issues and challenges on the IoT-based SG, and define the major
security services that we should consider when dealing with SG security
Keywords: Internet of Things; Smart Grid; Security; Cyber Physical Systems;
Advanced Metering Infrastructure
José Quevedo, Mário Antunes, Daniel Corujo, Diogo Gomes, Rui L. Aguiar,
On the application of contextual IoT service discovery in Information Centric
Networks,
Computer Communications,
Volumes 89–90,
2016,
Pages 117-127,
ISSN 0140-3664,
https://doi.org/10.1016/j.comcom.2016.03.011.
(http://www.sciencedirect.com/science/article/pii/S014036641630069X)
Abstract: The continuous flow of technological developments in communications and
electronic industries has led to the growing expansion of the Internet of Things
(IoT). By leveraging the capabilities of smart networked devices and integrating
them into existing industrial, leisure and communication applications, the IoT is
expected to positively impact both economy and society, reducing the gap between
the physical and digital worlds. Therefore, several efforts have been dedicated to
the development of networking solutions addressing the diversity of challenges
associated with such a vision. In this context, the integration of Information
Centric Networking (ICN) concepts into the core of IoT is a research area gaining
momentum and involving both research and industry actors. The massive amount of
heterogeneous devices, as well as the data they produce, is a significant challenge
for a wide-scale adoption of the IoT. In this paper we propose a service discovery
mechanism, based on Named Data Networking (NDN), that leverages the use of a
semantic matching mechanism for achieving a flexible discovery process. The
development of appropriate service discovery mechanisms enriched with semantic
capabilities for understanding and processing context information is a key feature
for turning raw data into useful knowledge and ensuring the interoperability among
different devices and applications. We assessed the performance of our solution
through the implementation and deployment of a proof-of-concept prototype. Obtained
results illustrate the potential of integrating semantic and ICN mechanisms to
enable a flexible service discovery in IoT scenarios.
Keywords: Internet of Things; Information-Centric Networking; Context information;
Service discovery; Semantic similarity
Eileen Haggerty,
Healthcare and digital transformation,
Network Security,
Volume 2017, Issue 8,
2017,
Pages 7-11,
ISSN 1353-4858,
https://doi.org/10.1016/S1353-4858(17)30081-8.
(http://www.sciencedirect.com/science/article/pii/S1353485817300818)
Abstract: As with most other industries, healthcare has seen significant benefits
from digital transformation (DX), with the adoption of new technologies helping to
deliver secure, high-quality patient care and drive greater business efficiency.
Electronic health records (EHR), digital imaging, e-prescription services and
enterprise resource planning systems are among the digital services that have been
integrated into the extensive IT systems of many healthcare organisations. As with
most other industries, healthcare has seen significant benefits from digital
transformation, as well as the impact of the burgeoning Internet of Things (IoT).
Healthcare providers have more access to patient data and applications than ever
before. However, the increased complexity of the IT networks that power today's
healthcare organisations, as well as the sheer volume of data traversing these, has
added to the challenge of ensuring network and data security, as Eileen Haggerty of
Netscout explains.
Martin Henze, Lars Hermerschmidt, Daniel Kerpen, Roger Häußling, Bernhard Rumpe,
Klaus Wehrle,
A comprehensive approach to privacy in the cloud-based Internet of Things,
Future Generation Computer Systems,
Volume 56,
2016,
Pages 701-718,
ISSN 0167-739X,
https://doi.org/10.1016/j.future.2015.09.016.
(http://www.sciencedirect.com/science/article/pii/S0167739X15002964)
Abstract: In the near future, the Internet of Things is expected to penetrate all
aspects of the physical world, including homes and urban spaces. In order to handle
the massive amount of data that becomes collectible and to offer services on top of
this data, the most convincing solution is the federation of the Internet of Things
and cloud computing. Yet, the wide adoption of this promising vision, especially
for application areas such as pervasive health care, assisted living, and smart
cities, is hindered by severe privacy concerns of the individual users. Hence, user
acceptance is a critical factor to turn this vision into reality. To address this
critical factor and thus realize the cloud-based Internet of Things for a variety
of different application areas, we present our comprehensive approach to privacy in
this envisioned setting. We allow an individual user to enforce all her privacy
requirements before any sensitive data is uploaded to the cloud, enable developers
of cloud services to integrate privacy functionality already into the development
process of cloud services, and offer users a transparent and adaptable interface
for configuring their privacy requirements.
Keywords: Privacy; Cloud computing; Internet of Things; Model-driven development;
User acceptance
Malcolm Townsend, Thanh Le Quoc, Gaurav Kapoor, Hao Hu, Wei Zhou, Selwyn Piramuthu,
Real-Time business data acquisition: How frequent is frequent enough?,
Information & Management,
Volume 55, Issue 4,
2018,
Pages 422-429,
ISSN 0378-7206,
https://doi.org/10.1016/j.im.2017.10.002.
(http://www.sciencedirect.com/science/article/pii/S0378720617300265)
Abstract: Effective data acquisition for business process monitoring has become a
critical element in today’s business world. While the need for monitoring is
generally agreed upon by both re- searchers and practitioners alike, the means and
mechanisms are often vague. This is especially salient with the fast growing
availability of various technologies to monitor in real-time through recent
advances such as the Internet of Things (IoT) with specific emphasis on Radio-
Frequency IDentification (RFID) and associated sensor networks. This study is
motivated by the lack of published literature in data acquisition and analytics
that specifically addresses sufficient real-time data acquisition for effective
managerial monitoring. As a step in addressing this void, we review and extend
existing literature in this general area by studying various requirements and
information sources that relate to effective management monitoring. We then design
an exploratory study to evaluate current managerial monitoring needs and the
importance of automated data collection technologies. Results from this study show
that the most important latent factor that influences an organization’s information
need is its dynamic competitiveness, and consequently, companies with a dynamic
supply chain would need a faster transaction and operations data system. The second
important latent factor is the behavioral performance, which renders it essential
to have a human-centric data system. This study provides evidence for the
significance in adopting technologies such as RFID and other IoT systems for real-
time monitoring in highly dynamic organizations and offers guidelines for
analytical technology adoption for various industries.
Keywords: RFID; Process monitoring; Monitoring frequency; Real-time data
acquisition
X. Krasniqi, E. Hajrizi,
Use of IoT Technology to Drive the Automotive Industry from Connected to Full
Autonomous Vehicles,
IFAC-PapersOnLine,
Volume 49, Issue 29,
2016,
Pages 269-274,
ISSN 2405-8963,
https://doi.org/10.1016/j.ifacol.2016.11.078.
(http://www.sciencedirect.com/science/article/pii/S2405896316325162)
Abstract: Abstract:
The automotive industry has been around for quite some time and it has evolved ever
since, but the major transformation that is happening now from vehicles driven by
humans to vehicles driven by themselves will have a long term impact on society.
Today's cars are already connected and have been connected for some time, since
they can link to smartphones, offer emergency roadside assistance, register real-
time traffic alerts etc., but this evolution is about to change. The automobile
industry is on the brink of a revolution, to move to self-driving automobile
industry, and the driving force behind this is the fast developing technology, the
Internet of Things (IoT). IoT will transform the automobile industry and at the
same time, the automobile industry will provide a big boost to IoT. The potential
and the prospects of this technology is astonishing. This paper examines the market
and technical trends towards Autonomous Vehicles, evolution stages from early cars
to fully autonomous, the importance of IoT in driving this industry ecosystem,
advantages and disadvantages of Autonomous Vehincles, key issues and challenges
faced by the industry, standards activities around this industry and finally the
deployment use cases. The focus of this paper is more based on an industrial push
to identify issues and challenges of Autonomous Vehicles and less on any academic
research activity. The intention of this paper is to bring these issues and
challenges to the attention of IFAC technical committee and trigger some debate on
the opportunities for IFAC research in international stability.
Keywords: IoT; autonomous cars; autonomous vehicles; self-driving; driverless cars;
5G
Axel Ensslen, Till Gnann, Patrick Jochem, Patrick Plötz, Elisabeth Dütschke, Wolf
Fichtner,
Can product service systems support electric vehicle adoption?,
Transportation Research Part A: Policy and Practice,
2018,
,
ISSN 0965-8564,
https://doi.org/10.1016/j.tra.2018.04.028.
(http://www.sciencedirect.com/science/article/pii/S0965856417311473)
Abstract: Plug-in electric vehicles are seen as a promising option to reduce oil
dependency, greenhouse gas emissions, particulate matter pollution, nitrogen oxide
emissions and noise caused by individual road transportation. But how is it
possible to foster diffusion of plug-in electric vehicles? Our research focuses on
the question whether e-mobility product service systems (i.e. plug-in electric
vehicles, interconnected charging infrastructure as well as charging platform and
additional services) are supportive to plug-in electric vehicle adoption in
professional environments. Our user oriented techno-economic analysis of costs and
benefits is based on empirical data originating from 109 organizational fleets
participating in a field trial in south-west Germany with in total 327 plug-in
electric vehicles and 181 charging points. The results show that organizations
indicate a high willingness to pay for e-mobility product service systems.
Organizations encounter non-monetary benefits, which on average overcompensate the
current higher total cost of ownership of plug-in electric vehicles compared to
internal combustion engine vehicles. However, the willingness to pay for e-mobility
charging infrastructure and services alone is currently not sufficient to cover
corresponding actual costs. The paper relates the interconnected charging
infrastructure solutions under study to the development of the internet of things
and smarter cities and draws implications on this development.
Keywords: Electric mobility; Electric vehicle; Smart city; Platform service;
Business model; Product service system
Jacob Høxbroe Jeppesen, Emad Ebeid, Rune Hylsberg Jacobsen, Thomas Skjødeberg
Toftegaard,
Open geospatial infrastructure for data management and analytics in
interdisciplinary research,
Computers and Electronics in Agriculture,
Volume 145,
2018,
Pages 130-141,
ISSN 0168-1699,
https://doi.org/10.1016/j.compag.2017.12.026.
(http://www.sciencedirect.com/science/article/pii/S0168169917308293)
Abstract: The terms Internet of Things and Big Data are currently subject to much
attention, though the specific impact of these terms in our practical lives are
difficult to apprehend. Data-driven approaches do lead to new possibilities, and
significant improvements within a broad range of domains can be achieved through a
cloud-based infrastructure. In the agricultural sector, data-driven precision
agriculture shows great potential in facilitating the increase in food production
demanded by the increasing world population. However, the adoption rate of
precision agriculture technology has been slow, and information and communications
technology needed to promote the implementation of precision agriculture is limited
by proprietary integrations and non-standardized data formats and connections. In
this paper, an open geospatial data infrastructure is presented, based on standards
defined by the Open Geospatial Consortium (OGC). The emphasis in the design was on
improved interoperability, with the capability of using sensors, performing cloud
processing, carrying out regional statistics, and provide seamless connectivity to
machine terminals. The infrastructure was implemented through open source software,
and was complemented by open data from governmental offices along with ESA
satellite imagery. Four use cases are presented, covering analysis of nearly 50 000
crop fields and providing seamless interaction with an emulated machine terminal.
They act to showcase both for how the infrastructure enables modularity and
interoperability, and for the new possibilities which arise from this new approach
to data within the agricultural domain.
Keywords: Internet of Things; Remote sensing; Open software; Open data; Farm
management information systems
Matthew Krugh, Ethan McGee, Stephen McGee, Laine Mears, Andrej Ivanco, K.C. Podd,
Barbara Watkins,
Measurement of Operator-machine Interaction on a Chaku-chaku Assembly Line,
Procedia Manufacturing,
Volume 10,
2017,
Pages 123-135,
ISSN 2351-9789,
https://doi.org/10.1016/j.promfg.2017.07.039.
(http://www.sciencedirect.com/science/article/pii/S2351978917302196)
Abstract: Assembly operations in the automotive industry represent a substantial
proportion of overall manufacturing time and total manufacturing cost. With product
complexity increasing year after year, humans continue to remain a cost-effective
solution to the needs of flexible manufacturing. The human element is largely
marginalized in Manufacturing 2.0 and necessitates a better understanding of the
human's impact on the future of manufacturing. The work herein illustrates a method
through the use of the Industrial Internet of Things (IIoT) to capture ubiquitous
data streams from human and automated machinery with the intention to make
available the data necessary and elucidate the potential to deepen the
understanding of the human impact on Industry 4.0 assembly systems.
Keywords: Industry 4.0; IIoT; Quality
Ruhul Amin, SK Hafizul Islam, G.P. Biswas, Muhammad Khurram Khan, Lu Leng, Neeraj
Kumar,
Design of an anonymity-preserving three-factor authenticated key exchange protocol
for wireless sensor networks,
Computer Networks,
Volume 101,
2016,
Pages 42-62,
ISSN 1389-1286,
https://doi.org/10.1016/j.comnet.2016.01.006.
(http://www.sciencedirect.com/science/article/pii/S1389128616000207)
Abstract: Recently, Farash et al. pointed out some security weaknesses of
Turkanović et al.’s protocol, which they extended to enhance its security. However,
we found some problems with Farash et al.’s protocol, such as a known session-
specific temporary information attack, an off-line password-guessing attack using a
stolen-smartcard, a new-smartcard-issue attack, and a user-impersonation attack.
Additionally, their protocol cannot preserve user-anonymity, and the secret key of
the gateway node is insecure. The main intention of this paper is to design an
efficient and robust smartcard-based user authentication and session key agreement
protocol for wireless sensor networks that use the Internet of Things. We analyze
its security, proving that our protocol not only overcomes the weaknesses of Farash
et al.’s protocol, but also preserves additional security attributes, such as the
identity change and smartcard revocation phases. Moreover, the results of a
simulation using AVISPA show that our protocol is secure against active and passive
attacks. The security and performance of our work are also compared with a number
of related protocols.
Keywords: Anonymity preserving; Key exchange protocol; Wireless sensor network;
Internet of Things; Sensor node; Gateway node
Alexander Savelyev,
Russia's new personal data localization regulations: A step forward or a self-
imposed sanction?,
Computer Law & Security Review,
Volume 32, Issue 1,
2016,
Pages 128-145,
ISSN 0267-3649,
https://doi.org/10.1016/j.clsr.2015.12.003.
(http://www.sciencedirect.com/science/article/pii/S0267364915001685)
Abstract: The paper represents one of the first comprehensive analyses of Russian
personal data localization regulations, which became effective at September 1,
2015. This work describes in detail the main components of the data localization
mechanism: triggers of its application, scope, exemptions and enforcement. It also
takes into account the official and non-official interpretations of the law by
Russian regulators, some of which were developed with the participation of the
author. Special consideration is given to the jurisdictional aspects of the Russian
data protection legislation and the criteria of its application to foreign data
controllers. The author also reveals the rationale behind the adoption of data
localization provisions and analyzes their possible impact on foreign companies
operating in Russia and implementation of innovative IT-technologies (Cloud
computing, Big Data and Internet of Things). The paper concludes that most of the
potential benefits of data localization provisions, i.e. in the area of public law,
law enforcement activities and taxation. Nevertheless, data localization provisions
may still have medium-term positive impact on privacy, since they force all
stakeholders to revisit the basic concepts of existing personal data legislation
(the notion of personal data, data controller, processing, etc.), thus serving as a
driver for re-shaping existing outdated data privacy regulations and crafting
something more suitable for the modern IT-environment.
Keywords: Personal data; Data localization; Cloud computing; Big data; Transborder
data flows; Digital sovereignty
Idowu Ayoola, Mart Wetzels, Peter Peters, Sander van Berlo, Loe Feijs,
Do CHANGE platform: A service-based architecture for secure aggregation and
distribution of health and wellbeing data,
International Journal of Medical Informatics,
Volume 117,
2018,
Pages 103-111,
ISSN 1386-5056,
https://doi.org/10.1016/j.ijmedinf.2018.06.004.
(http://www.sciencedirect.com/science/article/pii/S138650561830368X)
Abstract: Over the last decade, the adoption of open API standards offers new
services meaningful in the domain of health informatics and behavior change. We
present our privacy-oriented solution to support personal data collection,
distribution, and usage. Given the new General Data Protection Regulations in
Europe, the proposed platform is designed with requirements in mind to position
citizens as the controllers of their data. The proposed result uses NodeJS servers,
OAuth protocol for Authentication and Authorization, a publish-subscribe semantic
for real-time data notification and Cron for APIs without a notification strategy.
It uses Distributed Data Protocol to control and securely provision data to
distributed frameworks utilizing the data and those distributed applications are
exemplified. The platform design is transparent and modularized for research
projects and small businesses to set-up and manage, and to allow them to focus on
the application layer utilizing personal information. This solution can easily be
configured to support custom or new data sources with open API and can scale. In
our use cases, maintaining the separate ecosystem services was trivial. The adopted
distributed protocol was the most challenging to manage due to its high RAM usage.
And implementing a fine-grained privacy control by end-users was challenging in an
existing clinical enterprise system.
Keywords: IoT; Personal data; Health services; Privacy; Security; Data aggregation;
Data distribution