National Workshop on Internet of Things (IoT)
(Volume-1)

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Implementation And Analysis Of Partial Reconfiguration Based Xilinx Ise Design Of Processor Peripherals
Country
::
India
Authors
::
Ipseeta nanda || Nibedita Adhikari
Page
::
01-03

In this paper authors designed an OPB to DCRBridge which can be dynamically reconfigurable using ICAP(Internal Configuration Access Port).The processor system is created using Xilinx platform studio and PlanAhead software which is used to design the floorplan.The design deals with construction of OPB2DCR Bridgefor which Virtex-4 ML401 Evaluation Board is used to verify the design in hardware using Compact Flash Memory card to initially configure the Field Programmable Gate Array (FPGA) and then partial reconfiguration using ICAP under software control. Here authors use specific regions of the FPGA to reconfigure with new functionality at run time while rest areas in the FPGA remain static during that specific period of time. Here the user interacts with Partial Reconfigurable Regions (PRRs) and reconfigurable modules (RMs) using HyperTerminal under application control.

 

Keywords: - Field Programmable Gate Array,Partial Reconfigurable Region,Reconfigurable Module, Internal Configuration Access Port

[1]. Ipseeta Nanda,NibeditaAdhikari"Study and Design of Reconfigurable Processor Peripherals using Xilinx Tools" Journal of
Electronic Design Technology" will be published in the Volume 9 Issue 1, 2018, Pg.17-23, ISSN No. 2321-4228 2229-6980
[2]. Ipseeta Nanda, NibeditaAdhikari "An Approach to Excution of Partial Reconfiguration in FPGA using Xilinx PlanAhead" 2017
International Journal of Pure and Applied Mathematics, Volume 117 No. 19 2017, 217-223.
[3]. Ipseeta Nanda, S M Ali "Implementation and Execution of Math Partial Reconfiguration Region and LED Dealing with Xilinx
PlanAhead," International Journal of Advancements in Electronic and Electrical Engineering-IJAEEE Volume-4:Issue-2
[ISSN:2319-7498],Publication Date: 30 October, 2015.
[4]. Cindy Koo, "Benefits of Partial Reconfiguration," Xcell journal fourth quarter 2005.
[5]. Ipseeta Nanda, ShashankPujari,C S Panda"Implementation of Math PRR and LED processing using Xilinx PlanAhead"published in Computing Communication Control and automation-ICCUBEA,2015 in International Conference on 26th -27th February 2015,ISBN-978-1-4799-6892-3,Page(s):955-958.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
A Review On Iot Based Farmer Domain System Towards EAgriculture Of INDIA
Country
::
india
Authors
::
Sanjaya Kumar Sarangi || Mrutyunjaya Panda
Page
::
04-10

Agriculture sector in India is diminishing day by day which affects the production capacity of ecosystem. There is an exigent need to solve the problem in the domain to restore vibrancy and put it back on higher growth. The paper proposes an e-Agriculture Application based on the framework consisting of KMKnowledge base and Monitoring modules. To make profitable decisions, farmers need information throughout the entire farming cycle. The required information is scattered in various places which includes real time information such as market prices and current production level stats along with the available primary crop knowledge. A knowledge dataflow model is constructed connecting various scattered sources to the crop structures.............


Keywords: - e-Agriculture; Knowledge data Flow; ICT, Monitoring; Indian Agriculture System.

[1]. ICT Solution Architecture for Agriculture Fredrick AWUOR, K. K. (2013).. IST-Africa 2013 Conference Proceedings
PaulCunningham and Miriam Cunningham (Eds) IIMC International Information Management Corporation, 2013. Africa.
[2]. Management of Mobile Data in a Crop Field Richard K. Lomotey, R. D. (2014).. 2014 IEEE International Conference on
Mobile Services (pp. 100-107). IEEE.
[3]. Crop Water needs ,FAO Document repository, Chapter 3-. http://www.fao.org/docrep/s2022e/s2022e07.htm
[4]. Irrigation Water Needs ,FAO Document repository, Chapter 3-. http://www.fao.org/docrep/s2022e/s2022e08.htm
[5]. Solar radiation Basics ,http://solardata.uoregon.edu/SolarRadiationBasics.html

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
A Review On Security Of Technologies of IoT
Country
::
India
Authors
::
Sushree Priyanka Mishra || Ankeet Agarwalla || Jayasmita Mohapatra || Neelamani Samal
Page
::
11-16

This paper provides an overview of the Internet of Things (IoT) that which facilitates daily activities and the devices are connected through the Internet. IoT allows that device to be sensed and controlled remotely by maintaining proper connection among the devices. Through IoT data can be transferred over internet with minimal human intervention. The back bone of IoT includes various communication protocol, technology used for the communication, standards, operating system, software, hardwares In this paper we have also discussed about the architecture and technology used in IoT.This paper is a survey of most common technologies used in IoT such as RFID ,RFID Reader,NFC,IP. We have also discussed about the goals of Information security ,Common threats and solution for the Technologies like RFID ,NFC and Mobile.

 

Keywords: - RFID,NFC,Mobile,Security.

[1] Jun Wei Chuah ―The Internet of Things: An Overview and New Perspectives in Systems Design‖ 2014 International
Symposium on Integrated Circuits 978-1-4799-4833-8/14.
[2] Sarita Agrawal, Manik Lal Das ―Internet of Things – A Paradigm Shift of Future Internet Applications‖ Institute of
technology, nirma university, ahmedabad – 382 481, 08-10 december, 2011.
[3] Ala Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari and Moussa Ayyash ―Internet of Things: A
Survey on Enabling Technologies, Protocols, and Applications‖ ieee communication surveys & tutorials, vol. 17, no. 4, fourth
quarter 2015.
[4] M.U. Farooq, Muhammad Waseem, Sadia Mazhar, Anjum Khairi and Talha Kamal ―A Review on Internet of Things (IoT)‖ International Journal of Computer Applications (0975 8887) Volume 113 - No. 1, March 2015.
[5] Tuhin Borgohain, Uday Kumar and Sugata Sanyal ―Survey of Security and Privacy Issues of Internet of Things‖

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Home Automation System and IoT: Review & Approach
Country
::
India
Authors
::
Smaranika Mohapatra || Neelamani Samal
Page
::
17-20

A low value and user friendly sensible home system that uses an android application to speak with the cloud and provides shift functionalities, is given. The system eliminates the utilization of private pc and pc peripherals that ends up in overall reduction within the price of system. Unlike the similar system that uses either of Bluetooth module network. The planned system use net of things (IOT) for watching and dominant electrical and physics appliances remotely. Switches of electrical and electronics appliance are integrated to the system so as to demonstrate the effectiveness and feasibleness of the system.

 

Keywords - Internet of things, Smart home, Home automation, android Smartphone, ardunio.

[1]. Yuichi KAWAMOTO, Hiroki NISHIYAMA, Nei KATO, Naoko YOSHIMURA, and Shinichi YAMAMOTO, "Internet of Things
(IoT): Present State and Future Prospects".
[2]. Hasan Omar Al-Sakran, "Intelligent Traffic Information System Based on Integration of Internet of Things and Agent Technology", (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 6, No. 2, 2015.
[3]. http://postscapes.com/internet-of-things-award/project/sintelur-waste-management/
[4]. Manna. S, Bhunia. S.S, Mukherjee.N, "Vehicular pollution monitoring using IoT", Recent Advances and Innovations in
Engineering (ICRAIE),2014
[5]. N. Sriskanthan and Tan Karand, "Bluetooth Based Home Automation System". Journal of Microprocessors and Microsystems, Vol. 26, pp.281-289, 2002.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Challenges and performance enhancement associated withvirtualized data:A case study
Country
::
India
Authors
::
Mishra Jyoti Prakash || Mishra Anil Kumar || Mishra Sambit Kumar
Page
::
21-24

In the present days, the technology associated with Internet of Things(IoT) maintains the continuity towards providing internet connections as well as setting link among the physical and cyber space. In addition to increased volume, the IoT generates Big Data characterized by velocity in terms of time and location dependency, with a variety of multiple modalities and varying data quality. In general, IoT may be thought of as a combination of embedded technologies associated with wired and wireless communications, sensor and actuator devices, and the physical objects connected to the Internet. Its primary objective is to simplify and strengthen human activities as well as expertise.............

 

Keywords - Big Data, IoT, Virtualization, Sensor, Actuator, Data Center, Cluster.

[1]. F. Chen, P. Deng, J. Wan, D. Zhang, A. V. Vasilakos, X. Rong, Data mining for the internet of things: literature review and
challenges, International Journal of Distributed Sensor Networks 2015 (2015) 12.
[2]. C.-W. Tsai, C.-F. Lai, M.-C. Chiang, L. T. Yang, Data mining for internet of things: a survey, IEEE Communications Surveys &
Tutorials 16 (1) (2014) 77-97.
[3]. R. Kapoor, A. Snoeren, G. Voelker, and G. Porter. Bullet Trains: A study of NIC burst behavior at microsecond timescales. in
Proceedings of CoNEXT, 2013.
[4]. A. Ahmed, Z. M. Faten, L. Rami, B. Raouf, and P. Guy, "Greenhead: Virtual data center embedding across distributed
infrastructures," IEEE Transactions on Cloud Computing, vol. 1, no. 1, January-June 2013.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Support Vector Machine Used in Network Intrusion Detection
Country
::
India
Authors
::
Nilamadhab Mishra || Sarojananda Mishra
Page
::
25-27

Computer behavior in Intrusion Detection System can be classified into two important categories i.e. normal and abnormal activities. To achieve the categories, Intrusion detection adapt a new machine learning based data classification algorithm which is applied to network intrusion detection. The basic work is to classify network activities as normal or abnormal while minimizing classification. Different models for Network Intrusion detection already developed , each of them has its own strengths and weaknesses. By applying the Support Vector Machine we have to classify the data and do the clustering using Ant Colony Network. To avoid the weakness , we combine both SVM and ACN . In this approach , we need to use KDD cup 1999 dataset. IDS will be detected its rate, speed attack types and false alarm rate.

[1]. Conteh, N. Y., & Schmick, P. J. (2016). Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research, 6(23), 31-38.
[2]. Streilein, W. W., Truelove, J., Meiners, C. R., & Eakman, G. (2011, November). Cyber situational awareness through operational streaming analysis. In Military Communications Conference, 2011-MILCOM 2011 (pp. 1152-1157). IEEE.
[3]. Zuech, R., Khoshgoftaar, T. M., & Wald, R. (2015). Intrusion detection and big heterogeneous data: a survey. Journal of Big Data, 2(3), 1-41.
[4]. Sandhu, U. A., Haider, S., Naseer, S., & Ateeb, O. U. (2011). A survey of intrusion detection & prevention techniques. In 2011
International Conference on Information Communication and Management, IPCSIT (Vol. 16). 66-71.
[5]. Tyler, G. (2009). Information Assurance Tools Report Intrusion Detection Systems. Information Assurance Technology Analysis Center (IATAC).

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
A Novel Approach of Security Concern of IoT with Cloud Based Services
Country
::
India
Authors
::
Prakash Kumar Patra || Tarun Kumar Behera
Page
::
28-32

Internet of Things use of standard Internet protocols for the human-to-thing or thing-to-thing communication in embedded networks. Cloud based services are high demand technology which makes an infrastructure where both data storage and data processing operate outside of the device i.e. irrespective of devices like smart phone, gadgets and traditional computer . Current market based situation Internet of Things. Internet of Things is growing rapidly in the field of telecommunications and wireless communications. So cooperation between wireless network like wifi, traditional network and different object need attention of security issue. The Internet of Things (IoT) is ''the network of physical existed objects, mobile devices, desktops ,vehicles and other items which are deals with either software, sensors with network connectivity, permitting these objects to gathering and interchange data make crucial in operation point of view............

[1]. ―Forecast: The Internet of Things, Worldwide, 2013. ―, Gartner, 2013.
[2]. D.Evans, ― The Internet of Things How the Next Evolution of the Internet Is Changing Everything‖, White Paper, Cisco, April 2011.
[3]. Miguel Blockstrand, Tomas Holm, Lars-Örjan Kling, Robert Skog and Berndt Wallin, "Operator opportunities in the internet of things―, Ericsson review, 2011
[4]. Rooney, B. ―Internet of Things Poses Big Questions.‖ Wall Street Journal Online, July 3, 2013.
[5]. International Data Corporation (IDC) Press Release. ―The Internet of Things Is Poised to Change Everything, Says IDC.‖ October, 2013.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Forecasting of Rainfall and Flood Situation: A Literature Review
Country
::
India
Authors
::
Binaya Kumar Panigrahi || Tushar Kumar Nath
Page
::
33-37

Forecasts of water inflow into major reservoirs of different rivers are needed for the operational planning over periods ranging from a few hours to several months ahead. Medium-range forecasts of the order of a few days to two week shave usually been obtained by simple ARMA-type models, which do not utilize information on observed or forecast precipitation, nor stream flow observations from upstream gauging stations. Recently, several different hydrological models have been tested to assess the potential improvements in forecasts that could be obtained by using observed and forecast precipitation as additional inputs. In this paper we have carried out a review of different techniques used for forecasting the water flow into various rivers and fore casting the flood situation.

[1]. R. Baratti,B. Cannas,A. Fanni,M. Pintus,G.M. Sechi,River flowforecastfor reservoirmanagement, through neural networks,
www.elsevier.com/locate/neucomdoi:10.1016/S0925-2312(03)00387-4
[2]. Sulafa Hag Elsafi, Artificial Neural Networks (ANNs) for flood forecasting at Dongola Station in the river Nile,Sudan,
Sudan,doi.org/10.1016/j.aej.2014.06.010
[3]. Nile Basin Capacity Building Network (NBCBN). Flood andDrought,Forecastingand Early Warning Program, 2005.
[4]. Moore, R.J., Jones, D.A., Black, K.B., Austin, R.M.,Carrington, D.S., Tinnion, M.,Akhondi, A., 1994. RFFS and HYRAD:
Integrated System for Rainfall and River Flow Forecasting in Real-Time and their Application in Yorkshire.BHS Ossasional paper No. 4, 12.
[5]. G.E.P Box, G.M. Jenkins, Time Series Analysis: Forecasting control, Holden –Day, Oakland, California, 1976.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Data Aggregation, Security Control and Device Addressing Over WSN in IoT
Country
::
India
Authors
::
Manas Ranjan Moharana || Bikash Chandra Pattanaik
Page
::
38-44

A sensor interface device is important for sensor data collection of industrial wireless sensor networks (WSN) in IoT environments. However, the current connect Number, sampling rate, and types of sensors are restricted by the device. Meanwhile, in the Internet of Things (IoT) environment; each sensor connected to the device is required to write complicated and cumber some data collection program code. In IoT environment base of sensor are used improper use of power including non-standard addressing scheme and lack of device security In this paper, to solve these problems, we proposed are IoT based network to overcome all problems to developed IoT based network using integration of hash based addressing scheme for device by developing data aggregation to reduce power consumption and also provide Kerberos based authentication system for device control so that our IoT based environment will be used for all environment monitoring security..............

 

Keywords - Internet of Things, Cloud Computing, Wireless Sensor Network, CPLD.

[1]. Rogers, Moving on from Weiser's vision of calm computing: engaging ubicomp experiences, in: UbiComp 2006: Ubiquitous
Computing, 2006.
[2]. R. Caceres, A. Friday, Ubicomp systems at 20: progress, opportunities, and challenges, IEEE Pervasive Computing
[3]. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Wireless sensor networks: a survey, Computer Networks
[4]. L. Atzori, A. Iera, G. Morabito, The Internet of Things: a survey, Computer Networks 54 (2010) 2787–2805.
[5]. J. Belissent, Getting clever about smart cities: new opportunities require new business models, Forrester Research,
http://www.gartner.com/technology/research/hype-cycles/.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Big Data with reference to IoT: Architecture, Opportunities and Challenges
Country
::
India
Authors
::
Ranjita Rout || Rupak Kumar Mohanayak
Page
::
45-53

Big amounts of data have been produced, as the miniaturization of Internet of things (IoT) devices increases. However, such data are not useful without analytic power. Several big data, IoT, and analytics solutions have empowered people to obtain valuable insight into large data generated by IoT devices. This paper investigates the contemporary research efforts directed toward big IoT data analytics. The relationship between big data analytics and IoT is explained. We identify the opportunities resulting from the convergence of big data, analytics, and IoT as well as discuss the role of big data analytics in IoT applications. Furthermore, big IoT data analytic types, methods, and technologies for big data mining, challenges, and opportunities are discussed. Several notable use cases are also presented. Several opportunities brought by data analytics in IoT
paradigm are then discussed.

 

Keywords - IoT, big data, , analytics, data mining.

[1]. P. Tiainen, ‗‗New opportunities in electrical engineering as a result of the emergence of the Internet of Things,'' Tech. Rep., AaltoDoc, Aalto Univ., 2016.
[2]. M. Beyer, ‗‗Gartner says solving ‗Big Data' challenge involves more than just managing volumes of data,'' Tech. Rep., AaltoDoc, Aalto Univ., 2011.
[3]. J. Gantz and D. Reinsel, ‗‗Extracting value from chaos,'' IDC Iview, vol. 1142, pp. 1–12, Jun. 2011. [4] R. Mital, J. Coughlin, and M. Canaday, ‗‗Using big data technologies and analytics to predict sensor anomalies,'' in Proc. Adv. Maui Opt. Space Surveill. Technol. Conf., Sep. 2014, p. 84.
[4]. N. Golchha, ‗‗Big data-the information revolution,'' Int. J. Adv. Res., vol. 1, no. 12, pp. 791–794, 2015.
[5]. P. Russom, Big Data Analytics. TDWI, 4th Quart., 2011

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Iot For Irrigation Monitoring In Rural Villages
Country
::
India
Authors
::
Ashutosh Acharya
Page
::
54-59

In growing with technology, automation is widely used for better response within a short interval by considering minimum effort. Similarly, irrigation in rural villages are a great challenges during the summer for cultivation. So to make this irrigation in an intelligent way or in a smart way by adopting automation which will lead a higher production with optimum human supervision. The projected model focuses on auto-monitoring and controlling of irrigation by considering the soil parameters like moisture content. Micrto-controller (ATMEGA328P) along with Arduino UNO platform is used to implement the control unit. The projected model uses moisture sensor for accurate moisture content measurement which prompts the system to monitor and control an exact volume of water required for the purpose of farming. IoT is used for providing updated information related to the sprinklers status. Again sensor's information is regularly updated on web page using GSM-GPRS SIM900A modem. This web information helps the farmers for updated information regarding sprinkler's status.

 

Keywords - Monitoring, Irrigation, IoT, Farmer.

[1]. Karan Kansara, Vishal Zaveri, Shreyans Shah, Sandip Delwadkar, and Kaushal Jani "Sensor based Automated Irrigation System with IOT: A Technical Review", (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (6) , 2015, 5331-5333
[2]. Sumeet. S. Bedekar, Monoj. A. Mechkul, and Sonali. R. Deshpande "IoT based Automated Irrigation System", IJSRD -
International Journal for Scientific Research& Development| Vol. 3, Issue 04, 2015 | ISSN (online): 2321-0613

[3]. R.Suresh, Gopinath, K.Govindaraju, T.Devika, N.SuthanthiraVanitha, "GSM based Automated Irrigation Control using Raingun Irrigation System", International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 2, February 2014.

[4]. Pei Suping, Wu Birui, The Soil Moisture Content Monitoring and Irrigation System Based on IOT, Journal of Agricultural
Mechanization Research, 2013-07
[5]. Indu Gautam and S.R.N Reddy, "Innovative GSM based Remote Controlled Embedded System for Irrigation", International Journal of Computer Applications Vol. 47 – No.13, June 2012

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
An IOT Based Architecture For Power System Integration
Country
::
India
Authors
::
Debswarup Rath || Balaji Prasad Padhi || Bijaya Kumar Mohapatra
Page
::
60-64

A term is often used in electrical engineering is "The Internet of Things" (IoT). IoT was coined in 1999, and it refers to the growth of possibilities of machines and sensors in world communicating with each other in a "mobile, and instantaneous "way, making literally everything controllable from our phones to our streetlights to our refrigerators " Smart grid is one of the features of smart city model. It is energy consumption monitoring and management system. Smart grids are based on communication between the service provider and consumer. One of the main issues with today's out-dated grid is efficiency. The grid are overloaded during peak times or seasons. It is also possible to hack and take free electricity. By using smart grid consumer and owner get daily electricity consumption reading and owner can cut electricity supply remotely through internet if bill is not paid..............

 

Keywords -.............

[1]. ZHome: http://z-home.orgl
[2]. ZWave : http://www.z-wave.coml
[3]. SYNCO LIVING : https:/lhit.sbt.siemens.com
[4]. Rintala, Mikko, JussiSormunen, Petri Kuisma, and MattiRahkala. "Automation System Products and Research."(2014).
[5]. Sandeep Patel, Punit Gupta, Mayank Kumar Goyal, "Low Cost Hardware Design of a Web Server for Home Automation Systems", Conference on Advances in Communication and Control Systems(CAC2S), 2013

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Design Alternatives For A 4-Bit Universal Shift Register Using Clock Pulse Sense Latch
Country
::
India
Authors
::
Suraj pattanaik || Suraj kumar samal
Page
::
65-74

This paper proposed the design of 4-bit universal shift register using a low power area reduced speed improved clock pulse generator and clock sense pulse latch. The proposed 4-bit universal shift register consists of two section of operation one section included pulse latch and another section for the control operation like right shift, left shift and parallel loading. These operations of the universal shift register executed by 4*1 MUX. All the MUX design using PTL logic and the clock pulse generator is designed using inverted inverter logic and pass transistor based AND gate circuit. The proposed 4-bit universal shift register increased the speed with low power consumption. The 4-bit universal shift register is designed and tested by using cadence virtuoso simulation tool in 180nm technology at a supply voltage of 1.8v for pulse latch and 2.5v for 4*1 MUX.

 

Keywords - low power, clock pulse generator, 180nm, cadence virtuoso, pass transistor logic, area-efficiency, MUX design, shift register.

[1]. Byung-Do Yang, ―Low-Power and Area-Efficient Shift Register Using Pulsed Latches,‖ IEEE transactions on circuits and
systems—I: regular papers, vol. 62, no. 6, June 2015, pp. 1564-1571
[2]. Heranmoy Maity, Arindam Biswas, Anup Kr. Bhattacherjee,Anita Pal, ―Design of Quantum Cost Efficient 4-Bit Reversible
Universal Shift Register,‖ Devices for Integrated Circuit (DevIC), 23-24 March, 2017, Kalyani, India, 2017, pp. 44-47
[3]. Tanushree Doi, Vandana Niranjan,"Low power and high performance ring counter using pulsed latch technique,‖ International Conference on Micro-Electronics and Telecommunication Engineering,2016,pp.584-586.
[4]. Wei Jin, Seongjong Kim, Weifeng He, Zhigang Mao,Mingoo Seok, ―Near- and Sub-Vt Pipelines Based onWide-Pulsed-Latch Design Techniques.‖ IEEE journal of solid-state circuits, 2017, pp.2475-2487.
[5]. S.Dinesh, Christo Ananth, ―Area Power and Speed Optimized Serial Type Daisy Chain Memory using modified CPG with SSASP,‖ International Conference on Control, instrumentation, Communication and Computational Technologies (ICCICCT), 2015, pp. 344- 349.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
A review paper on Security Integration & Privacy in the IOT
Country
::
India
Authors
::
Chandan Kumar Sethi
Page
::
75-79

The internet of things (IoT) is a technology that has the capacity to revolutionize the way that we live, in sectors ranging from transport to health, from entertainment to our interactions with government. This fantastic opportunity also presents a number of significant challenges. The growth in the number of devices and the speed of that growth presents challenges to our security and freedoms as we battle to develop policies, standards, and governance that shape this development without stifling innovation. This paper discusses the evolution of the IOT, its various definitions, and some of its key application areas. Security and privacy considerations and challenges that lie ahead are discussed both generally and in the context of these applications. Mobile Cloud Computing is a new technology which refers to an infrastructure where both data storage and data processing operate outside of the mobile device.

 

Keywords - Internet of things, security, privacy, trust.

[1]. ABI Research. 2017. "What Is the Internet of Things?" Accessed July 4, 2017.
[2]. Abomhara, Mohamed, and Geir M. Køien. 2014. "Security and Privacy in the Internet of Things: Current Status and Open
Issues." International Conference on Privacy and Security in Mobile Systems (PRISMS), Aalborg, Denmark, May 11–14, 1–8.
[3]. Al-Fuqaha, Ala, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, and MoussaAyyash. 2015. "Internet of Things: A
Survey on Enabling Technologies, Protocols, and Applications." IEEE Communications Surveys & Tutorials 17 (4): 2347–2376.
[4]. Ashton, Kevin. 2009. "That "Internet of Things" Thing." RFiD Journal, 97–114.
[5]. Atzori, Luigi, Antonio Iera, and Giacomo Morabito. 2010. "The Internet of Things: A Survey." Computer Networks 54 (15): 2787– 2805. doi:10.1016/j.comnet.2010.05.010.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Iot Based Fuel Efficiency Monitoring System For A Vechile
Country
::
India
Authors
::
Pritinika Behera
Page
::
80-83

The IOT based fuel efficiency monitoring system is for four wheeler, aimed at the improvement of efficiency in four wheeler especially in car. From our application, the user will come to know about their car efficiency in the graphical format. Mainly how the fuel is being consumed at various factors like increase in speed, worst road conditions, engine getting heat after long time ,frequent change of gear, during traffic ,not having proper maintenance, also due to some bad petrol/diesel/oil in which the fuel is consumed more and it will give less mileage .In some cases the according to the driving and other factors the fuel is less consumed and mileage is give more .To find all this system helps to track their mileage with the help of speed sensor and terrain sensor. From tracking the mileage the user will come to know about their car's efficiently properly and maintenance of the car is easy. Through our website the user can view their mileage graph .The graphical view makes the user to understand better. From this the proper analysis is made and maintained properly.

 

Keywords - Internet of Things, Cloud Computing, Wireless Sensor Network, CPLD.

[1] Fuel monitoring and vehicle tracking" Sachin S. Aher, Kokate R. D. http://www.ijeit.com/vol%201/Issue%203/IJEIT141
2201203_35.pdf
[2] System for remote monitoring of a vehicle and method of determining vehicle mileage, jurisdiction crossing and fuel consumption" https://docs.google.com/viewer?url=patentimages.st orage.googleapis.com/pdfs/US6714857.pdf
[3] Fuel monitoring and vehicle tracking" Sachin S. Aher, Kokate R. D. http://www.ijeit.com/vol%201/Issue%203/IJEIT141
2201203_35.pdf
[4] System for remote monitoring of a vehicle and method of determining vehicle mileage, jurisdiction crossing and fuel consumption" https://docs.google.com/viewer?url=patentimages.st orage.googleapis.com/pdfs/US6714857.pdf