{"title":"A Strategic Approach to IoT Security by Working Towards a Secure IoT Future","authors":"M'Kaila J. Clark, L. Rajabion","doi":"10.4018/ijhiot.317088","DOIUrl":"https://doi.org/10.4018/ijhiot.317088","url":null,"abstract":"The internet of things' (IoT) fast-growing development and adoption are undeniable. Although the IoT development is moving at a fast rate, the security of these technologies is not keeping up. Lack of security infrastructure on the internet of things is due to such security measures being excluded from the average company business plan and the lack of security configurations established. The increasing need for robust security architecture is needed to address said vulnerabilities. How do the internet of things companies create a dynamic security approach to defend and combat threats while also being flexible to accommodate future technological advancements? This paper will answer this question by addressing the strategic approach to developing a strong IoT security infrastructure that promotes confidentiality, integrity, and availability with dynamic elements that allow for future developments to address new security concerns. This research question will be answered through analysis of extensive thematic literature review.","PeriodicalId":262783,"journal":{"name":"International Journal of Hyperconnectivity and the Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128434516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart and Secure Dyeing Industrial Water Pollution Monitoring Using IoT","authors":"Gathir Selvan B., Allirani S.","doi":"10.4018/ijhiot.305227","DOIUrl":"https://doi.org/10.4018/ijhiot.305227","url":null,"abstract":"Textile industries are responsible for one of the major environmental pollution because they release undesirable dye effluents. Therefore, environmental legislation commonly obligates textile factories to treat these effluents before discharge into the water bodies. The main aim of our project is to control the parameters causing pollution and to reduce the effect of these parameters without affecting the natural or industrial environment. The industrial waste is continuously sensed from a pH sensor. If anyone parameter exceeds its standard level, this information will send to the pollution control board through the IoT module. Another important step is these parameters can be monitor through the internet by using a web page (cloud). These systems find the amount of pH present in the industrial waste during Treatment. Thus our project will monitor and control pollution efficiently and the data can be transferred through cloud communication. Cayenne is a GUI to the user and IoT is used for outside world interaction for information transfer.","PeriodicalId":262783,"journal":{"name":"International Journal of Hyperconnectivity and the Internet of Things","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126972977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Security and Privacy Concern A systematic Mapping Study","authors":"","doi":"10.4018/ijhiot.285589","DOIUrl":"https://doi.org/10.4018/ijhiot.285589","url":null,"abstract":"The extend of clever gadgets has accelerated touchy statistics trade on the Internet the usage of most of the time unsecured channels. Since a large use of RFID (Radio-frequency Identification) tags in the transportation and development industries from 1980 to 1990, with the multiplied use of the Internet with 2G/3G or 4G when you consider that 2000, we are witnessing a new generation of related objects. . This paper aims to understand and additionally grant continuing doe’s research topic, challenge, and Future Direction related to Iot security. A systematic mapping finds out about (SMS) is thus utilized on the way to organize the chosen Articles into the following classification: contribution type, Type of Research, Iot Security, and their approach. We take out an overall of twenty-four Articles in support of this systematic discover out about also they categorize the following described criterion. The findings of this SMS are mentioned and the researcher was once given hints on the possible route for future research","PeriodicalId":262783,"journal":{"name":"International Journal of Hyperconnectivity and the Internet of Things","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124999793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effect of the Use of Social Media on Organizational Commitment","authors":"Pavithra Salanke, O. Omotayo, Deepak K. V.","doi":"10.4018/ijhiot.294896","DOIUrl":"https://doi.org/10.4018/ijhiot.294896","url":null,"abstract":"Social Media offers an opportunity for firms to generate value through the facilitation of employee experiences. Using social media business creates an environment of collaboration. This article suggests that organization commitment of employees is prejudiced by the social media usage. The study attempts to answer how social media helps in improving the organization commitment in terms of affective, normative and continuance commitment. The study was empirically tested by using the employee survey data collected from IT employees working in Bangalore. The paper concludes with a brief of the usage of social media in IT companies and its consequences.","PeriodicalId":262783,"journal":{"name":"International Journal of Hyperconnectivity and the Internet of Things","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126588555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalability of Pervasive Communication Networks in IoT","authors":"M. Khayyat, N. Akkari","doi":"10.4018/ijhiot.294895","DOIUrl":"https://doi.org/10.4018/ijhiot.294895","url":null,"abstract":"The vision of the future IoT is to facilitate interoperability between the massive heterogeneous end-users’ terminals, and at the same time, expedite smooth access to their vast and pervasive smart applications in the cloud. This huge number of things spread all over the cloud generates a significant burden on the current architecture of the IoT. Therefore, this paper aims to achieve scalability for future IoT. To reach the solution, we first investigated the encountered challenges when trying to attain scalability. Afterward, we define the main requirements along with their key enabling technologies to achieve scalability in the distributed IoT environment. Finally, a reference model with central management and control is designed, satisfying the defined scalability requirements to reach the desired future IoT architecture.","PeriodicalId":262783,"journal":{"name":"International Journal of Hyperconnectivity and the Internet of Things","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131525304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implicit Cognitive Vulnerability through Nudges, Boosts and Bounces","authors":"","doi":"10.4018/ijhiot.285588","DOIUrl":"https://doi.org/10.4018/ijhiot.285588","url":null,"abstract":"Implicit Cognitive Vulnerability is a developing theoretical understanding, wherein feeling safe within an instructional environment is of significant impact upon short-term and long-term memory’s cognitive acquisition of information so as to embed new information within a learner’s conceptual framework of understanding. Towards successfully individualizing a learner’s implicit cognitive vulnerability, the primary focus has been upon the larger community environment in which the learner is housed, yet the viability of the learner’s ability and cognitive viability must also be addressed through nudges, boosts and bounces of motivational support. Recognizing this individualized need of learners, this discussion revolves around the ability of a learner to embed implicit cognitive vulnerability within their own cognitive viability through structured and unstructured synchronous and asynchronous nudges and boosts that support self-regulatory and self-efficacy understandings.","PeriodicalId":262783,"journal":{"name":"International Journal of Hyperconnectivity and the Internet of Things","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125611523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward an IoT based Software Defined Plumbing Network System with fault tolerance","authors":"","doi":"10.4018/ijhiot.285587","DOIUrl":"https://doi.org/10.4018/ijhiot.285587","url":null,"abstract":"in this paper we will see the application of computer science algorithms to the plumbing system. We propose a fault tolerant tap water system which is impossible without Internet of things and algorithms . We will show that the problem is a mutual exclusion group problem and we propose an adapted algorithm version from the literature as a solution . Coupling algorithms with the configurable plumbing network we believe that this will open new field of research on IoT we called it software defined plumbing Network where components that have been traditionally implemented in hardware (e.g. water mixers, spring faucets ,flow sensors, etc.) are instead implemented by means of software . This way we can solve other problem like instantaneous hot water,automatic cleaning of the water heater..etc since due to computer algorithms the systems can be easily smart, extensible and adaptive.","PeriodicalId":262783,"journal":{"name":"International Journal of Hyperconnectivity and the Internet of Things","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128641542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things-Based Personal Device for Diabetes Mellitus Treatment and Management","authors":"Anurup Salokhe, M. Krishnamoorthy","doi":"10.4018/ijhiot.304441","DOIUrl":"https://doi.org/10.4018/ijhiot.304441","url":null,"abstract":"The importance of diabetes treatment in various conditions majorly included elder individuals and home patients with diabetes having very difficult conditions variables influence blood glucose levels in a patient. Symptoms like sickness, physical movement, drugs, intravenous liquids cause unusual and conceivably hazardous variances in glucose regimen glycemic list and by this way patients need to measurement prompting portion, which finishes in a partly scene of hyperglycemia and hypoglycemia. The glucose sugar level inside a human could be estimated by inserting IR radiations. For this purpose, a personal device was created to assist in the determination of insulin therapy dose and consider further factors. The arrangement proposed relies on the Internet of Things from one viewpoint of a patient dependent on close to home RFID cards and the doctor to give worldwide network between the individual gadget made for the patient dependent on 6LoWPAN, program for attendants/doctors to screen individual wellbeing cards, the glycemic file data framework and the patient web-based interface.","PeriodicalId":262783,"journal":{"name":"International Journal of Hyperconnectivity and the Internet of Things","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115716128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive IoT Technology for Measuring Salinity, Dissolved Oxygen, and pH in Aquatic Environments","authors":"Jarrod Trevathan, D. Nguyen","doi":"10.4018/ijhiot.294894","DOIUrl":"https://doi.org/10.4018/ijhiot.294894","url":null,"abstract":"This paper presents an extension to an IoT platform for remote near real-time aquatic environmental monitoring that incorporates electrical conductivity (i.e., salinity), dissolved oxygen and potential of hydrogen (pH) sensors. The predecessor to this system could be remotely deployed for extended periods of time, but was limited to measuring temperature, lux (light) and turbidity only. This paper outlines how the platform was expanded upon to include the additional environmental parameters (i.e., salinity, dissolved oxygen and pH) by selecting the appropriate compatible sensor technologies, redesigning the electronic componentry/physical buoy, and undertaking thorough system integration testing. We present the hardware and software challenges faced to adapt the platform to the new sensor parameters, illustrate the latest buoy design, describe the calibration process and demonstrate in-house and commercial field-testing. The system can be deployed for 12 months between maintenance cycles and has been used in environmental research and commercial prawn farm water quality monitoring.","PeriodicalId":262783,"journal":{"name":"International Journal of Hyperconnectivity and the Internet of Things","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124677206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Cybersecurity and Human Behavior","authors":"S. Muller, D. Burrell","doi":"10.4018/ijhiot.305228","DOIUrl":"https://doi.org/10.4018/ijhiot.305228","url":null,"abstract":"National security in the 21st Century require investments in social cybersecurity that involves basic research into the human interaction between technology and social behavior and beliefs. National security dictates increasing capital spending into appropriate tools for identifying and neutralizing external manipulation of open and free societies. Supplementary policy changes that reflect the technical complexity of the modern information environment while remaining true to national values are also needed. This paper uses an applied and case study research approach to explore the applications of emerging approaches.","PeriodicalId":262783,"journal":{"name":"International Journal of Hyperconnectivity and the Internet of Things","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127404135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}