Submitted Successfully!
To reward your contribution, here is a gift for you: A free trial for our video production service.
Thank you for your contribution! You can also upload a video entry or images related to this topic.
Version Summary Created by Modification Content Size Created at Operation
1 -- 1308 2022-10-21 15:37:54 |
2 format correct Meta information modification 1308 2022-10-24 03:26:29 |

Video Upload Options

We provide professional Video Production Services to translate complex research into visually appealing presentations. Would you like to try it?

Confirm

Are you sure to Delete?
Cite
If you have any further questions, please contact Encyclopedia Editorial Office.
Sadhu, P.K.;  Yanambaka, V.P.;  Abdelgawad, A. Internet of Things Applications. Encyclopedia. Available online: https://encyclopedia.pub/entry/30711 (accessed on 27 December 2024).
Sadhu PK,  Yanambaka VP,  Abdelgawad A. Internet of Things Applications. Encyclopedia. Available at: https://encyclopedia.pub/entry/30711. Accessed December 27, 2024.
Sadhu, Pintu Kumar, Venkata P. Yanambaka, Ahmed Abdelgawad. "Internet of Things Applications" Encyclopedia, https://encyclopedia.pub/entry/30711 (accessed December 27, 2024).
Sadhu, P.K.,  Yanambaka, V.P., & Abdelgawad, A. (2022, October 21). Internet of Things Applications. In Encyclopedia. https://encyclopedia.pub/entry/30711
Sadhu, Pintu Kumar, et al. "Internet of Things Applications." Encyclopedia. Web. 21 October, 2022.
Internet of Things Applications
Edit

Devices like the Internet of Things (IoT) have a significant presence in our daily lives owing to the technological revolution, wireless devices, and communication systems. IoT has become a vital part of the digital era of Industry 4.0. The ability to bring physical things into the digital world is becoming more likely because of technology. Applications of IoT can be utilized in various ways to assist systems and businesses in simplifying, improving, automating, and controlling processes. IoT can also be used for delivering important data, activity performance, or even environmental factors that have to be monitored continuously and remotely. IoT applications can therefore help with the creation of new systems and business strategies, as well as provide businesses with the instant data they need to create products and services.

Internet of Things security and privacy cryptography

1. Smart City

A smart city is a technologically advanced metropolitan region that collects information using different electronic techniques, voice recognition technologies, and sensors. The data is utilized to successfully handle assets, services, and programs; in turn, the information is being used to function smoothly throughout the city. Data obtained from community members, equipment, structures, and assets are processed and analyzed to track and maintain road and transport infrastructures, energy plants, utilities, water system connectivity, waste management, preventing crime, data management, education institutions, libraries, healthcare facilities, and other community programs. A smart city is a collection of different sensors and equipment to monitor, report, and process to manage the resources of the infrastructure effectively. Using the information gathered from the wireless sensors, the system will learn and make decisions to provide beneficial outcomes to the people. Compared to the healthcare, water supplies, and environment surveillance in the current urban areas, a smart city will be able to connect the citizens and the required services in a better way [1][2]. It is necessary to protect both the residents’ privacy and the information system’s integrity. Sensitive information is being gathered by sensing devices, which makes it vulnerable to cyberattacks.

2. Internet of Medical Things (IoMT)

The integration of health features into IoT devices makes the environment an IoMT. With the advancement of technology, the usage of IoMT devices is increasing. Moreover, the COVID-19 situation limits face-to-face meeting between patients and doctors. The pandemic has created a new era of IoMT for providing treatment to patients [3]. IoMT is making a network of people and medical devices (wireless medical devices and implanted medical devices). It utilizes wireless communication (Bluetooth, WiFi, 3G, 4G, 5G, ZigBee, etc.) to exchange health data with medical facilities like doctors, hospitals, medical experts, etc., [4]. With the advancement of microelectronics, medical devices have become intelligent and can monitor and report physical conditions such as blood pressure, heartbeat, oxygen level, etc. The devices can be placed in the body in the form of watches, belts, shoes, clothes, necklaces, etc., [5]. Moreover, IoMT has become the most significant change among the development in the medical sector as it brings not only the aged people but also every aged sick people in continuous monitoring and treatment. Especially people suffer even after recovering from COVID-19, and IoMT provides immediate treatment if necessary. Many healthcare systems from all over the world adopt the IoMT system to provide treatment. However, nearly 50% of IoMT equipment is susceptible to attack, as per the 2020 CyberMDX research. IoMT network is distinct from other systems in that they have the potential to impact patients’ lives and raise privacy problems if their identities are divulged [6]. Maintaining security and privacy is the primary concern of the IoMT system. According to a research from cybersecurity firm Critical Insights, cybersecurity incidents reached an all-time peak in 2021, compromising a record quantity of patients’ personal health data. Healthcare attacks harmed 45 million people in 2021, rising from 34 million in 2020. As per the research, the number of breached data has tripled within only three years, up from 14 million in 2018 [7].

3. Smart Grid

A smart grid is an electrical system that contains several efficient and energy efficiency features such as infrastructure for intelligent metering, intelligent power panels, smart equipment, control system, alternative/renewable energy, etc. The term “smart grid” refers to a concept that encapsulates the entire power generation and distribution system in a single frame. It is an electricity system built on digital technology that uses two-way digital communication to supply electricity to consumers. To put it another way, a Smart Grid is a grid that makes the entire system smarter or cleaner. Clean energy is presently in high demand all around the world. In 2003, the first time the term “Smart Grid” was stated by Michael T. Burr in an article [8]. Smart grid technology allows real-time monitoring, coordination, and control of the electric energy grid via communication networks between physical components, resulting in more effective and economical grid management. The widespread availability of Internet connectivity in most houses has made the smart grid more viable to adopt. The smart grid consists of Supervisory Control And Data Acquisition (SCADA), Energy Management System, Grid Communication Systems, and Distributed Energy Resources (DERs). In a smart grid system, users’ data privacy and security are crucial and challenging issues. A cyber-physical exploit is a safety failure in cyberspace that negatively affects a CPS’s physical environment [9]. There have been a number of significant cyber-physical incidents have been reported in the sector in recent years. A computer worm called “Stuxnet” leveraged four zero-day flaws and cryptographically signed certificates to evade intrusion detection. It hit the Iranian nuclear fuel enrichment complex in June 2010 where the programmable logic controllers (PLC) of the SCADA system were the targets [10]. Three Ukrainian electric power distribution firms were hacked in a coordinated operation in December 2015. Thirty substations were blacked out for almost three hours, resulting in 225,000 consumers experiencing wide-area power outages. To frustrate claims of disruptions, a telephonic DoS attempt was conducted while authorized members’ virtual private network accounts were stolen using the Black-Energy3 virus [11]. At present different AI based techniques are used to detect and defend the mechanism of the smart grid security system.

4. Internet of Vehicles (IoV)

With the development of industry, the number of vehicles is increasing rapidly. The increment of vehicles raises security concerns that trigger secure communication. IoV will lead industry 4.0. It is certain that the IoV will be bright and profitable in the future, offering improved road safety, reduced environmental effects, better space utilization, and cost control. The IoV, often known as smart transportation or connected cars, is a framework comprising vehicles, smartphones and wearables, roadside equipment, and a network. People, cars, and numerous IoT devices that are part of the transport system communicate over IoV [12]. Transportation, production, energy, software, and other industries are all affected. The IoV ecosystem includes hardware, software, services, and multiple network technologies ranging from Bluetooth and cellular to Wi-Fi and 5G, as well as several types of communication (V2V, V2X, and so on). Vehicle-to-vehicle and vehicle-to-infrastructure communication systems are combined to create the vehicular ad hoc network or VANET, and the term IoV has developed from the notation VANET. The combination of functionalities such as sensing units, control platforms, and various computer resources makes each vehicle in IoV an intelligent object. Each vehicle connects to any entity via a V2X communication architecture. The aim of IoV, also known as V2X, is safe driving by reducing accidents, alleviating traffic congestion, providing low traffic route information, and providing other information services. Every vehicle in the IoV network interacts with all other things that could have an influence on it. V2X mainly includes vehicle-to-vehicle (V2V), vehicle-to-sensors (V2S), vehicle-to-infrastructure (V2I), vehicle-to-network (V2N), and vehicle-to-pedestrian (V2P) communication. Nevertheless, roads can be seized by modifying or changing data or making wrong decisions due to the receipt of prank data [13]. To avoid these kinds of situations, it is required to develop a robust authentication framework that can resist security vulnerabilities and can conduct verification within milliseconds.

References

  1. Gaur, A.; Scotney, B.; Parr, G.; McClean, S. Smart City Architecture and its Applications Based on IoT. Procedia Comput. Sci. 2015, 52, 1089–1094.
  2. Du, R.; Santi, P.; Xiao, M.; Vasilakos, A.V.; Fischione, C. The Sensable City: A Survey on the Deployment and Management for Smart City Monitoring. IEEE Commun. Surv. Tutor. 2018, 21, 1533–1560.
  3. Sadhu, P.K.; Yanambaka, V.P.; Abdelgawad, A.; Yelamarthi, K. Prospect of Internet of Medical Things: A Review on Security Requirements and Solutions. Sensors 2022, 22, 5517.
  4. Sadhu, P.; Yanambaka, V.P.; Abdelgawad, A.; Yelamarthi, K. NAHAP: PUF-Based Three Factor Authentication System for Internet of Medical Things. IEEE Consum. Electron. Mag. 2022. early access.
  5. Wei, K.; Zhang, L.; Guo, Y.; Jiang, X. Health Monitoring Based on Internet of Medical Things: Architecture, Enabling Technologies, and Applications. IEEE Access 2020, 8, 27468–27478.
  6. Ghubaish, A.; Salman, T.; Zolanvari, M.; Unal, D.; Al-Ali, A.; Jain, R. Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security. IEEE Internet Things J. 2020, 8, 8707–8718.
  7. Healthcare Data Breaches Hit All-Time High in 2021. Available online: https://www.fiercehealthcare.com/health-tech/healthcare-data-breaches-hit-all-time-high-2021-impacting-45m-people (accessed on 4 April 2022).
  8. Burr, M.T. Reliability Demands will Drive Automation Investments. Fortnightly Magazine, 1 November 2003; 1–4.
  9. Zhang, H.; Liu, B.; Wu, H. Smart Grid Cyber-physical Attack and Defense: A Review. IEEE Access 2021, 9, 29641–29659.
  10. Shakarian, P. Stuxnet: Cyberwar Revolution in Military Affairs; Technical Report; Military Academy: West Point, NY, USA, 2011.
  11. Liang, G.; Weller, S.R.; Zhao, J.; Luo, F.; Dong, Z.Y. The 2015 Ukraine Blackout: Implications for False Data Injection Attacks. IEEE Trans. Power Syst. 2016, 32, 3317–3318.
  12. Sadhu, P.K.; Yanambaka, V.P.; Mohanty, S.P.; Kougianos, E. Easy-Sec: PUF-Based Rapid and Robust Authentication Framework for the Internet of Vehicles. arXiv 2022, arXiv:2204.07709.
  13. Bagga, P.; Das, A.K.; Wazid, M.; Rodrigues, J.J.; Park, Y. Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges. IEEE Access 2020, 8, 54314–54344.
More
Information
Contributors MDPI registered users' name will be linked to their SciProfiles pages. To register with us, please refer to https://encyclopedia.pub/register : , ,
View Times: 492
Revisions: 2 times (View History)
Update Date: 24 Oct 2022
1000/1000
Video Production Service