SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1006
FUNDAMENTAL CONCEPT OF INTERNET OF THINGS
Nishant Singh1 , Ms. Swati Gaur2
1Mtech student, Dept. of Electronics and Communication Engineering, Delhi College of Technology and
Management, Palwal(Haryana), India
2Assistant Professor, Dept. of Electronics and Communication Engineering, Delhi College of Technology and
Management, Palwal(Haryana), India
-------------------------------------------------------------------------***------------------------------------------------------------------
Abstract: One of the trendy expressions in the Information
Technology is Internet of Things (IoT). What's to come is
Internet of Things, which will change this present reality
objects into canny virtual items. The IoT intends to bind
together everything in our reality under a typical
foundation, giving us not just control of things around us,
additionally keeping us educated of the condition of the
things. The primary target of this paper is to give a review of
Internet of Things, designs, and fundamental advances and
their utilizations in our everyday life. Be that as it may, this
composition will give great perception for the new analysts,
who need to do inquire about in this field of Internet of
Things and encourage information aggregation in
proficiently. In this paper we endeavor to arrange the
administrations given by the Internet of Things (IoT)
keeping in mind the end goal to enable application
engineers to expand upon a base administration.
Keywords:- Internet of things, History of IOT, RFID,
DARPA, ARPANET, IPv6, Gateways, Bluetooth, Cloud
1. INTRODUCTION
The potential advantages o f Internet of Things (IOT) are
practically boundless and IOT[1][2] applications are
changing the way we work and live by sparing time and
assets and opening new open doors for development,
advancement and information creation. The Internet of
things enables private and open division associations to
oversee resources, enhance execution, and grow new plans
of action. As an imperative instrument to interconnect
gadgets and to go about as nonexclusive empowering
agent of the hyper associated society, the web of things can
possibly bolster a maturing society, to enhance the vitality
effectiveness and to enhance a wide range of portability
and transport.The reciprocal with methodologies like
digital physical frameworks, cloud innovations, enormous
information and future systems like 5G is exceptionally
clear. The accomplishment of the Internet of Things will
rely on upon the biological system advancement, bolstered
by a suitable administrative condition and atmosphere of
trust , where issues like ID. trust, protection , security, and
semantic invulnerability are vital.
1.1 Internet of Things
The Internet of Things (IoT) is the system of physical items
or "things" inserted with gadgets, programming, sensors,
and system network, which empowers these articles to
gather and trade information. IoT enables articles to be
detected and controlled remotely crosswise over existing
system foundation, making open doors for more
straightforward coordination between the physical world
and PC based frameworks, and bringing about enhanced
effectiveness, precision and monetary advantage.
Broadening the present Internet and giving association,
correspondence, and between systems administration
amongst gadgets and physical items, or "Things," is a
developing pattern that is frequently alluded to as the
Internet of Things.
"The advances and arrangements that empower joining of
true information and administrations into the present data
organizing innovations are frequently depicted under the
umbrella term of the Internet of Things (IoT)"
"Things," in the IoT sense, can refer to a wide variety of
devices such as heart monitoring implants, biochip
transponders on farm animals, electric clams in coastal
waters, automobiles with built-in sensors, DNA analysis
devices for environmental/food/pathogen monitoring or
field operation devices that assist fire-fighters in search
and rescue operations. These devices collect useful data
with the help of various existing technologies and then
autonomously flow the data between other devices.
1.2 History of IOT
The Internet of Things (IoT) has not been around for long.
In any case, there have been dreams of machines speaking
with each other since the mid 1800s. Machines have been
giving direct interchanges since the broadcast (the
principal landline) was created in the 1840s. Depicted as
"remote telecommunication," the principal radio voice
transmission occurred on June 3, 1900, giving another vital
part to building up the Internet of Things. The
improvement of PCs started in the 1950s.
The Internet, itself a huge segment of the IoT, begun as a
major aspect of DARPA[3] (Defense Advanced Research
Projects Agency) in 1962, and developed into ARPANET[4]
in 1969. In the 1980s, business specialist organizations
started supporting open utilization of ARPANET, enabling
it to advance into our cutting edge Internet. Worldwide
Positioning Satellites (GPS) turned into a reality in mid
1993, with the Department of Defense giving a stable,
exceedingly useful arrangement of 24 satellites. This was
immediately trailed by exclusive, business satellites being
set in circle. Satellites and landlines give fundamental
interchanges to a great part of the IoT.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1007
One extra and imperative part in building up a practical
IoT was IPV6's[5][6] strikingly wise choice to expand
address space. Steve Leibson, of the Computer History
Museum, expresses, "The address space development
implies that we could allot an IPV6 deliver to each
molecule on the surface of the earth, and still have enough
delivers left to do another 100+ earths." Put another way,
we are not going to come up short on web addresses at any
point in the near future.
The idea of the Internet of Things initially wound up
plainly mainstream in 1999, through the Auto-ID Center at
MIT and related market-investigation productions. Radio-
recurrence distinguishing proof (RFID)[7] was viewed as an
essential for the IoT by then. On the off chance that all
articles and individuals in day by day life were outfitted
with identifiers, PCs could oversee and stock them. Other
than utilizing RFID, the labeling of things might be
accomplished through such advances as close field
correspondence, standardized tags, QR codes, Bluetooth,
and computerized watermarking.
2. WORKING PRINCIPLE
Internet of Things is not the result of a single novel
technology; instead, several complementary technical
developments provide capabilities that taken together help
to bridge the gap between the virtual and physical world.
These capabilities include:
 Communication and cooperation
 Addressability
 Identification
 Sensing
 Actuation
 Embedded information processing
 Localization
 User interfaces
2.1 Internet of Things Communications Models
From an operational viewpoint, it is valuable to consider
how IoT gadgets associate and impart in terms of their
specialized correspondence models. In March 2015, the
Internet Architecture Board (IAB) discharged a managing
compositional archive for systems administration of savvy
articles (RFC 7452)[8], which traces a system of four
normal correspondence models utilized by IoT gadgets.
The dialog underneath presents this system and clarifies
key attributes of each model in the structure.
2.1.1 Device to Device Communications
The Device to Device correspondence display speaks to at
least two gadgets that specifically interface and impart
between each other, instead of through a mediator
application server. These gadgets impart over many sorts
of systems, including IP systems or the Internet.
Frequently, however these gadgets utilize conventions like
Bluetooth[9],Wi-Fi etc. wireless network to set up direct
Device to Device.
interchanges, as appeared in Figure 1.
Figure 1. Example of device-to-device communication
model.
2.1.2 Device to Cloud Communication
In a gadget to-cloud communication show, the IoT gadget
associates straightforwardly to an Internet cloud benefit
like an application specialist organization to trade
information and control message activity. This approach as
often as possible exploits existing interchanges systems
like customary wired Ethernet or Wi-Fi associations with
build up an association between the gadget and the IP
organize, which at last interfaces with the cloud benefit.
This is appeared in Figure 2.
Figure 2. Device-to-cloud communication model
diagram.
2.1.3 Device to-Gateway Model
In the Device to-portal model, or all the more regularly, the
gadget to-application-layer entryway (ALG) demonstrate,
the IoT gadget associates through an ALG benefit as a
channel to achieve a cloud benefit. In more
straightforward terms, this implies there is application
programming working on a neighborhood portal gadget,
which goes about as a mediator between the gadget and
the cloud benefit and gives security and other usefulness,
for example, information or convention interpretation. The
model is appeared in Figure 3.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1008
Figure 3. Device-to-gateway communication model
diagram.
2.1.4 Back-End Data-Sharing Model
The back-end data-sharing model alludes to a
correspondence engineering that empowers clients to
send out and break down brilliant question information
from a cloud benefit in blend with information from
different sources. This design underpins "the [user's] crave
for conceding access to the transferred sensor information
to third parties". This approach is an augmentation of the
single gadget to-cloud correspondence display, which can
prompt information storehouses where "IoT gadgets
transfer information just to a solitary application benefit
provider''. A back-end sharing engineering permits the
information gathered from single IoT gadget information
streams to be totaled and dissected. The back-end data
sharing model proposes a unified cloud administration's
approach or cloud applications software engineer
interfaces (APIs) are expected to accomplish
interoperability of savvy gadget information facilitated in
the cloud. A graphical portrayal of this outline is appeared
in Figure 4.
Figure.4 Back-end data sharing model diagram.
3. ARCHITECTURE
More than 25 Billion things are relied upon to be
associated by 2020 which is a colossal number so the
current engineering of Internet with TCP/IP conventions,
embraced in 1980 [10], can't deal with a system as large as
IoT which caused a requirement for another open
engineering that could address different security and
Quality of Service (QoS) issues and in addition it could
bolster the current system applications utilizing open
conventions [11].Without an appropriate protection
confirmation, IoT is not prone to be embraced by
numerous. Consequently insurance of information and
security of clients are key difficulties for IoT [12]. For
further improvement of IoT, various multi-layered security
models are proposed. portrayed a three key level
engineering of IoT while depicted a four key level design.
proposed a five layered engineering utilizing the best
elements of the designs of Internet and
Telecommunication administration systems in light of
TCP/IP and TMN models separately. Additionally a five-
layered design was likewise proposed in view of the
system various leveled structure. According to the
recommendations of the International Telecommunication
Union (ITU), the network, Architecture
of Internet of Things consists of
(a) The Sensing Layer
(b) The Access Layer
(c) The Network Layer
(d) The Middleware Layer
(e) The Application Layers
These are like the Open Systems Interconnection (OSI)
reference model in network and data communication. So
by and large it's partitioned into five layers as appeared in
the Fig. 5.
Figure 5. Five-Layered Architecture of IoT
4. TECHNOLOGY
The improvement of a pervasive registering framework
where advanced articles can be extraordinarily recognized
and can have the capacity to think and interface with
different articles to gather information on the premise of
which mechanized moves are made, requires the
requirement for a blend of new and powerful advances
which is just conceivable through an joining of various
advances which can make the articles to be distinguished
and speak with each other. In this area we talk about the
important innovations that can help in the huge scale
improvement of IoT.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1009
4.1 Radio Frequency Identification
Radio Frequency Identification (RFID) is a framework that
transmits the character of a question or individual
remotely utilizing radio waves as a serial number. To start
with utilization of RFID gadget was occurred in second
world war in Brittan and it is utilized for Identify of Friend
or Foe in 1948. Later RFID innovation is established at
Auto-ID focus in MIT in the year 1999. RFID innovation
assumes an imperative part in IoT for unraveling ID issues
of articles around us in a savvy way [13]. The innovation is
ordered into three classes in light of the technique for
power supply arrangement in Tags: Active RFID, Passive
RFID and Semi Passive RFID. The fundamental segments of
RFID are label, peruser, recieving wire, get to controller,
programming and server. It is more dependable,
effective,secured, economical and exact. RFID has a broad
scope of remote applications, for example, conveyance,
following, tolerant observing, military applications and so
forth.
4.2 Wireless Sensor Networks (WSN)
A WSN is a remote system comprising of spatially
appropriated self-ruling gadgets utilizing sensors to
helpfully screen physical or natural conditions, for
example, temperature, sound, vibration, weight, movement
or toxins, at various areas. Framed by hundreds or
thousands of bits that speak with each other and pass
information along starting with one then onto the next. A
remote sensor system is an essential component in IoT
worldview. Sensor hubs might not have worldwide ID in
light of the substantial measure of overhead and huge
number of sensors. WSN in light of IoT has gotten amazing
consideration in numerous ranges, for example, military,
country security, social insurance, accuracy agribusiness
observing, producing, natural surroundings checking,
backwoods fire and surge discovery so on. Sensors
mounted to a patient's body are checking the reactions to
the pharmaceutical, so that specialists can quantify the
impacts of the drugs.
4.3 Cloud Computing
With a great many gadgets anticipated that would drop by
2020, the cloud is by all accounts the main innovation that
can dissect and store all the information adequately. It is a
keen processing innovation in which number of servers
are met on one cloud stage to permit sharing of assets
between each other which can be gotten to whenever and
wherever. Distributed computing is the most essential
some portion of IoT, which merges the servers as well as
procedures on an expanded handling power and breaks
down the valuable data gotten from the sensors and even
give great stockpiling limit. However, this is only a start of
unleashing the genuine potential of this innovation.
Distributed computing interfaced with shrewd objects
utilizing conceivably a large number of sensors can be of
tremendous benefits and can help IoT for an expansive
scale advancement so examines are being completed since
IoT will be absolutely needy on the Cloud Computing.
4.4 Bluetooth
Bluetooth remote innovation is a modest, short-run radio
innovation that takes out the requirement for star prietary
cabling between gadgets, for example, note pad PCs,
handheld PCs, PDAs, cameras, and printers and compelling
scope of 10 - 100 meters. What's more, by and large
convey at under 1 Mbps and Bluetooth utilizes specifi-
cation of IEEE 802.15.1 standard. At first in 1994 Ericson
Mobile Communication organization began extend named
"Bluetooth". It is utilized for making of Personal Area
Networks (PAN). An arrangement of Bluetooth gadgets
sharing a normal channel for correspondence is called
Piconet. This Piconet is fit for 2 - 8 gadgets at any given
moment for information sharing, and that information
might be content, picture, video and sound.
5.CONCLUSION
In outline, one vision without bounds is that IoT turns into
an utility with expanded refinement in detecting,
activation, interchanges, control, and in making learning
from huge measures of information. This will bring about
subjectively unique ways of life from today. What the ways
of life would be is impossible to say. It is reasonable for say
that we can't anticipate how lives will change. We didn't
foresee the Internet, the Web, long range informal
communication, Facebook, Twitter, a large number of
applications for cell phones, and so on., and these have all
subjectively changed social orders' way of life. New
research issues emerge because of the vast size of gadgets,
the association of the physical and digital universes, the
openness of the frameworks of frameworks, and
proceeding with issues of protection and security. It is
trusted that there is more collaboration between the
examination groups with a specific end goal to take care of
the bunch of issues sooner and in addition to stay away
from re-imagining the wheel when a specific group takes
care of an issue.
The Internet Society thinks about IoT on the
grounds that it speaks to a developing part of how
individuals and establishments are probably going to
associate with and consolidate the Internet and system
availability into their own, social, and monetary lives.
Answers for amplifying the advantages of IoT while
limiting the dangers won't be found by taking part in an
energized talk about that pits the guarantees of IoT against
its conceivable hazards. Or maybe, it will take educated
engagement, discourse, and joint effort over a scope of
partners to plot the best routes forward.
REFERENCES
[1] Andersson, P., Mattsson, L-G.: Service Innovation
Enabled by the “Internet of Things”. IMP Journal. Vol. 9. No.
1. Pp. 85-106. (2015)
[2]. Cuimei Li1, 9., Rou Wang2, 1., & Le Huang3, b. (2014).
The Key Technology and Application of the Internet of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1010
Things. Applied Mechanics & Materials, (644-650), 2812-
2815.
[3] DEFENSE ADVANCED RESEARCH PROJECTS AGENCY
Attention: DIRO/SBPO 675 North Randolph Street
Arlington, VA 22203-2114 sbir@darpa.mil
http://www.darpa.mil/Opportunities/SBIR_STTR/SBIR_S
TTR.aspx
[4] P. J. Denning " The ARPANET after Twenty Years"
Published in American Scientist 77 (Nov-Dec 1989), 530-
535.
[5] Deering, S.; Hinden, R. Internet Protocol, Version 6
(IPv6) Specification; RFC 1883; IETF:
Fremont, CA, USA, 1995.
[6] Frankel, S.; Graveman, R.; Pearce, J.; Rooks, M.
Guidelines for the Secure Deployment
of IPv6—Recommendations of the National Institute of
Standards and Technology; Technical
Report; NIST: Gaithersburg, MD, USA, 2010.
[7] K. P. Fishkin, S. Roy, and B. Jiang, "Some methods for
privacy in RFID communication", in Proc.
1st Eur. Workshop on Security in Ad-Hoc and Sensor
Networks, 2004,
[8] Tschofenig, H., et. al., Architectural Considerations in
Smart Object Networking. Tech. no. RFC 7452. Internet
Architecture Board,
Mar. 2015. Web. https://www.rfc-
editor.org/rfc/rfc7452.txt
[9] See http://www.bluetooth.com and
http://www.bluetooth.org
[10] ”From the ARPANET to the Internet” by Ronda
Hauben -
TCP Digest (UUCP). Retrieved 2007-07-05
It can be accessed at:
http://www.columbia.edu/ rh120/other/tcpdigest
paper.txt
[11] Jian An, Xiao-Lin Gui, Xin He, ”Study on the
Architecture
and Key Technologies for Internet of Things,” in Advances
in
Biomedical Engineering, Vol.11, IERI-2012, pp. 329-335
[12] ”The Internet of Things,” ITU Report, Nov 2005
[13] Aggarwal, R. and Lal Das, M. (2012) RFID Security in
the Context of “Internet of Things”. First International
Conference
on Security of Internet of Things, Kerala, 17-19 August
2012, 51-56

Weitere ähnliche Inhalte

Was ist angesagt?

Internet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingInternet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingIAEME Publication
 
Eclipse M2M Industry Working Group
Eclipse M2M Industry Working GroupEclipse M2M Industry Working Group
Eclipse M2M Industry Working GroupBenjamin Cabé
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutionsijtsrd
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...ijcsit
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...IRJET Journal
 
IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyAI Publications
 
The Beginner's Guide to the Internet of Things
The Beginner's Guide to the Internet of ThingsThe Beginner's Guide to the Internet of Things
The Beginner's Guide to the Internet of ThingsRobin
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsBHAVANA KONERU
 
IRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of ThingsIRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of ThingsIRJET Journal
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io tPuneet Mishra
 
IoT project: best 30 ideas with cloud, raspberry pi, and arduino
IoT project: best 30 ideas with cloud, raspberry pi, and arduinoIoT project: best 30 ideas with cloud, raspberry pi, and arduino
IoT project: best 30 ideas with cloud, raspberry pi, and arduinoMarkMojumdar
 
Application and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information TechnologyApplication and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information TechnologyDr. Amarjeet Singh
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 

Was ist angesagt? (18)

Internet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingInternet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controlling
 
Eclipse M2M Industry Working Group
Eclipse M2M Industry Working GroupEclipse M2M Industry Working Group
Eclipse M2M Industry Working Group
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
 
IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile Technology
 
The Beginner's Guide to the Internet of Things
The Beginner's Guide to the Internet of ThingsThe Beginner's Guide to the Internet of Things
The Beginner's Guide to the Internet of Things
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Iot report
Iot reportIot report
Iot report
 
IRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of ThingsIRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of Things
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io t
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
IoT project: best 30 ideas with cloud, raspberry pi, and arduino
IoT project: best 30 ideas with cloud, raspberry pi, and arduinoIoT project: best 30 ideas with cloud, raspberry pi, and arduino
IoT project: best 30 ideas with cloud, raspberry pi, and arduino
 
Application and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information TechnologyApplication and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information Technology
 
Internet of Things (IoT): Readme
Internet of Things (IoT): ReadmeInternet of Things (IoT): Readme
Internet of Things (IoT): Readme
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 

Ähnlich wie Fundamental Concept of Internet of Things

CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptxttyu2
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of ThingsIRJET Journal
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
 
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONSA REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONSIRJET Journal
 
A MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSA MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSIJCNCJournal
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)Biniam Behailu
 
E-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudE-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudIRJET Journal
 
Internet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingInternet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingIAEME Publication
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationIRJET Journal
 
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...IRJET Journal
 
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...BRNSS Publication Hub
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 DocumentAjith Kumar Ravi
 
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
VET4SBO Level 1   module 3 - unit 1 - v1.0 enVET4SBO Level 1   module 3 - unit 1 - v1.0 en
VET4SBO Level 1 module 3 - unit 1 - v1.0 enKarel Van Isacker
 
Fog computing and data concurrency
Fog computing and data concurrencyFog computing and data concurrency
Fog computing and data concurrencyPriyanka Goswami
 

Ähnlich wie Fundamental Concept of Internet of Things (20)

CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of Things
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONSA REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
 
U - 4 Emerging.pptx
U - 4 Emerging.pptxU - 4 Emerging.pptx
U - 4 Emerging.pptx
 
A MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSA MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGS
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)
 
E-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudE-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure Cloud
 
Internet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingInternet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controlling
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
 
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
 
IoT
IoTIoT
IoT
 
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 Document
 
05_AJMS_08_18_CS.pdf
05_AJMS_08_18_CS.pdf05_AJMS_08_18_CS.pdf
05_AJMS_08_18_CS.pdf
 
05_AJMS_08_18_CS.pdf
05_AJMS_08_18_CS.pdf05_AJMS_08_18_CS.pdf
05_AJMS_08_18_CS.pdf
 
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
VET4SBO Level 1   module 3 - unit 1 - v1.0 enVET4SBO Level 1   module 3 - unit 1 - v1.0 en
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
 
Fog computing and data concurrency
Fog computing and data concurrencyFog computing and data concurrency
Fog computing and data concurrency
 
IoT Intro.pptx
IoT Intro.pptxIoT Intro.pptx
IoT Intro.pptx
 

Mehr von IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 

Kürzlich hochgeladen (20)

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 

Fundamental Concept of Internet of Things

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1006 FUNDAMENTAL CONCEPT OF INTERNET OF THINGS Nishant Singh1 , Ms. Swati Gaur2 1Mtech student, Dept. of Electronics and Communication Engineering, Delhi College of Technology and Management, Palwal(Haryana), India 2Assistant Professor, Dept. of Electronics and Communication Engineering, Delhi College of Technology and Management, Palwal(Haryana), India -------------------------------------------------------------------------***------------------------------------------------------------------ Abstract: One of the trendy expressions in the Information Technology is Internet of Things (IoT). What's to come is Internet of Things, which will change this present reality objects into canny virtual items. The IoT intends to bind together everything in our reality under a typical foundation, giving us not just control of things around us, additionally keeping us educated of the condition of the things. The primary target of this paper is to give a review of Internet of Things, designs, and fundamental advances and their utilizations in our everyday life. Be that as it may, this composition will give great perception for the new analysts, who need to do inquire about in this field of Internet of Things and encourage information aggregation in proficiently. In this paper we endeavor to arrange the administrations given by the Internet of Things (IoT) keeping in mind the end goal to enable application engineers to expand upon a base administration. Keywords:- Internet of things, History of IOT, RFID, DARPA, ARPANET, IPv6, Gateways, Bluetooth, Cloud 1. INTRODUCTION The potential advantages o f Internet of Things (IOT) are practically boundless and IOT[1][2] applications are changing the way we work and live by sparing time and assets and opening new open doors for development, advancement and information creation. The Internet of things enables private and open division associations to oversee resources, enhance execution, and grow new plans of action. As an imperative instrument to interconnect gadgets and to go about as nonexclusive empowering agent of the hyper associated society, the web of things can possibly bolster a maturing society, to enhance the vitality effectiveness and to enhance a wide range of portability and transport.The reciprocal with methodologies like digital physical frameworks, cloud innovations, enormous information and future systems like 5G is exceptionally clear. The accomplishment of the Internet of Things will rely on upon the biological system advancement, bolstered by a suitable administrative condition and atmosphere of trust , where issues like ID. trust, protection , security, and semantic invulnerability are vital. 1.1 Internet of Things The Internet of Things (IoT) is the system of physical items or "things" inserted with gadgets, programming, sensors, and system network, which empowers these articles to gather and trade information. IoT enables articles to be detected and controlled remotely crosswise over existing system foundation, making open doors for more straightforward coordination between the physical world and PC based frameworks, and bringing about enhanced effectiveness, precision and monetary advantage. Broadening the present Internet and giving association, correspondence, and between systems administration amongst gadgets and physical items, or "Things," is a developing pattern that is frequently alluded to as the Internet of Things. "The advances and arrangements that empower joining of true information and administrations into the present data organizing innovations are frequently depicted under the umbrella term of the Internet of Things (IoT)" "Things," in the IoT sense, can refer to a wide variety of devices such as heart monitoring implants, biochip transponders on farm animals, electric clams in coastal waters, automobiles with built-in sensors, DNA analysis devices for environmental/food/pathogen monitoring or field operation devices that assist fire-fighters in search and rescue operations. These devices collect useful data with the help of various existing technologies and then autonomously flow the data between other devices. 1.2 History of IOT The Internet of Things (IoT) has not been around for long. In any case, there have been dreams of machines speaking with each other since the mid 1800s. Machines have been giving direct interchanges since the broadcast (the principal landline) was created in the 1840s. Depicted as "remote telecommunication," the principal radio voice transmission occurred on June 3, 1900, giving another vital part to building up the Internet of Things. The improvement of PCs started in the 1950s. The Internet, itself a huge segment of the IoT, begun as a major aspect of DARPA[3] (Defense Advanced Research Projects Agency) in 1962, and developed into ARPANET[4] in 1969. In the 1980s, business specialist organizations started supporting open utilization of ARPANET, enabling it to advance into our cutting edge Internet. Worldwide Positioning Satellites (GPS) turned into a reality in mid 1993, with the Department of Defense giving a stable, exceedingly useful arrangement of 24 satellites. This was immediately trailed by exclusive, business satellites being set in circle. Satellites and landlines give fundamental interchanges to a great part of the IoT.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1007 One extra and imperative part in building up a practical IoT was IPV6's[5][6] strikingly wise choice to expand address space. Steve Leibson, of the Computer History Museum, expresses, "The address space development implies that we could allot an IPV6 deliver to each molecule on the surface of the earth, and still have enough delivers left to do another 100+ earths." Put another way, we are not going to come up short on web addresses at any point in the near future. The idea of the Internet of Things initially wound up plainly mainstream in 1999, through the Auto-ID Center at MIT and related market-investigation productions. Radio- recurrence distinguishing proof (RFID)[7] was viewed as an essential for the IoT by then. On the off chance that all articles and individuals in day by day life were outfitted with identifiers, PCs could oversee and stock them. Other than utilizing RFID, the labeling of things might be accomplished through such advances as close field correspondence, standardized tags, QR codes, Bluetooth, and computerized watermarking. 2. WORKING PRINCIPLE Internet of Things is not the result of a single novel technology; instead, several complementary technical developments provide capabilities that taken together help to bridge the gap between the virtual and physical world. These capabilities include:  Communication and cooperation  Addressability  Identification  Sensing  Actuation  Embedded information processing  Localization  User interfaces 2.1 Internet of Things Communications Models From an operational viewpoint, it is valuable to consider how IoT gadgets associate and impart in terms of their specialized correspondence models. In March 2015, the Internet Architecture Board (IAB) discharged a managing compositional archive for systems administration of savvy articles (RFC 7452)[8], which traces a system of four normal correspondence models utilized by IoT gadgets. The dialog underneath presents this system and clarifies key attributes of each model in the structure. 2.1.1 Device to Device Communications The Device to Device correspondence display speaks to at least two gadgets that specifically interface and impart between each other, instead of through a mediator application server. These gadgets impart over many sorts of systems, including IP systems or the Internet. Frequently, however these gadgets utilize conventions like Bluetooth[9],Wi-Fi etc. wireless network to set up direct Device to Device. interchanges, as appeared in Figure 1. Figure 1. Example of device-to-device communication model. 2.1.2 Device to Cloud Communication In a gadget to-cloud communication show, the IoT gadget associates straightforwardly to an Internet cloud benefit like an application specialist organization to trade information and control message activity. This approach as often as possible exploits existing interchanges systems like customary wired Ethernet or Wi-Fi associations with build up an association between the gadget and the IP organize, which at last interfaces with the cloud benefit. This is appeared in Figure 2. Figure 2. Device-to-cloud communication model diagram. 2.1.3 Device to-Gateway Model In the Device to-portal model, or all the more regularly, the gadget to-application-layer entryway (ALG) demonstrate, the IoT gadget associates through an ALG benefit as a channel to achieve a cloud benefit. In more straightforward terms, this implies there is application programming working on a neighborhood portal gadget, which goes about as a mediator between the gadget and the cloud benefit and gives security and other usefulness, for example, information or convention interpretation. The model is appeared in Figure 3.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1008 Figure 3. Device-to-gateway communication model diagram. 2.1.4 Back-End Data-Sharing Model The back-end data-sharing model alludes to a correspondence engineering that empowers clients to send out and break down brilliant question information from a cloud benefit in blend with information from different sources. This design underpins "the [user's] crave for conceding access to the transferred sensor information to third parties". This approach is an augmentation of the single gadget to-cloud correspondence display, which can prompt information storehouses where "IoT gadgets transfer information just to a solitary application benefit provider''. A back-end sharing engineering permits the information gathered from single IoT gadget information streams to be totaled and dissected. The back-end data sharing model proposes a unified cloud administration's approach or cloud applications software engineer interfaces (APIs) are expected to accomplish interoperability of savvy gadget information facilitated in the cloud. A graphical portrayal of this outline is appeared in Figure 4. Figure.4 Back-end data sharing model diagram. 3. ARCHITECTURE More than 25 Billion things are relied upon to be associated by 2020 which is a colossal number so the current engineering of Internet with TCP/IP conventions, embraced in 1980 [10], can't deal with a system as large as IoT which caused a requirement for another open engineering that could address different security and Quality of Service (QoS) issues and in addition it could bolster the current system applications utilizing open conventions [11].Without an appropriate protection confirmation, IoT is not prone to be embraced by numerous. Consequently insurance of information and security of clients are key difficulties for IoT [12]. For further improvement of IoT, various multi-layered security models are proposed. portrayed a three key level engineering of IoT while depicted a four key level design. proposed a five layered engineering utilizing the best elements of the designs of Internet and Telecommunication administration systems in light of TCP/IP and TMN models separately. Additionally a five- layered design was likewise proposed in view of the system various leveled structure. According to the recommendations of the International Telecommunication Union (ITU), the network, Architecture of Internet of Things consists of (a) The Sensing Layer (b) The Access Layer (c) The Network Layer (d) The Middleware Layer (e) The Application Layers These are like the Open Systems Interconnection (OSI) reference model in network and data communication. So by and large it's partitioned into five layers as appeared in the Fig. 5. Figure 5. Five-Layered Architecture of IoT 4. TECHNOLOGY The improvement of a pervasive registering framework where advanced articles can be extraordinarily recognized and can have the capacity to think and interface with different articles to gather information on the premise of which mechanized moves are made, requires the requirement for a blend of new and powerful advances which is just conceivable through an joining of various advances which can make the articles to be distinguished and speak with each other. In this area we talk about the important innovations that can help in the huge scale improvement of IoT.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1009 4.1 Radio Frequency Identification Radio Frequency Identification (RFID) is a framework that transmits the character of a question or individual remotely utilizing radio waves as a serial number. To start with utilization of RFID gadget was occurred in second world war in Brittan and it is utilized for Identify of Friend or Foe in 1948. Later RFID innovation is established at Auto-ID focus in MIT in the year 1999. RFID innovation assumes an imperative part in IoT for unraveling ID issues of articles around us in a savvy way [13]. The innovation is ordered into three classes in light of the technique for power supply arrangement in Tags: Active RFID, Passive RFID and Semi Passive RFID. The fundamental segments of RFID are label, peruser, recieving wire, get to controller, programming and server. It is more dependable, effective,secured, economical and exact. RFID has a broad scope of remote applications, for example, conveyance, following, tolerant observing, military applications and so forth. 4.2 Wireless Sensor Networks (WSN) A WSN is a remote system comprising of spatially appropriated self-ruling gadgets utilizing sensors to helpfully screen physical or natural conditions, for example, temperature, sound, vibration, weight, movement or toxins, at various areas. Framed by hundreds or thousands of bits that speak with each other and pass information along starting with one then onto the next. A remote sensor system is an essential component in IoT worldview. Sensor hubs might not have worldwide ID in light of the substantial measure of overhead and huge number of sensors. WSN in light of IoT has gotten amazing consideration in numerous ranges, for example, military, country security, social insurance, accuracy agribusiness observing, producing, natural surroundings checking, backwoods fire and surge discovery so on. Sensors mounted to a patient's body are checking the reactions to the pharmaceutical, so that specialists can quantify the impacts of the drugs. 4.3 Cloud Computing With a great many gadgets anticipated that would drop by 2020, the cloud is by all accounts the main innovation that can dissect and store all the information adequately. It is a keen processing innovation in which number of servers are met on one cloud stage to permit sharing of assets between each other which can be gotten to whenever and wherever. Distributed computing is the most essential some portion of IoT, which merges the servers as well as procedures on an expanded handling power and breaks down the valuable data gotten from the sensors and even give great stockpiling limit. However, this is only a start of unleashing the genuine potential of this innovation. Distributed computing interfaced with shrewd objects utilizing conceivably a large number of sensors can be of tremendous benefits and can help IoT for an expansive scale advancement so examines are being completed since IoT will be absolutely needy on the Cloud Computing. 4.4 Bluetooth Bluetooth remote innovation is a modest, short-run radio innovation that takes out the requirement for star prietary cabling between gadgets, for example, note pad PCs, handheld PCs, PDAs, cameras, and printers and compelling scope of 10 - 100 meters. What's more, by and large convey at under 1 Mbps and Bluetooth utilizes specifi- cation of IEEE 802.15.1 standard. At first in 1994 Ericson Mobile Communication organization began extend named "Bluetooth". It is utilized for making of Personal Area Networks (PAN). An arrangement of Bluetooth gadgets sharing a normal channel for correspondence is called Piconet. This Piconet is fit for 2 - 8 gadgets at any given moment for information sharing, and that information might be content, picture, video and sound. 5.CONCLUSION In outline, one vision without bounds is that IoT turns into an utility with expanded refinement in detecting, activation, interchanges, control, and in making learning from huge measures of information. This will bring about subjectively unique ways of life from today. What the ways of life would be is impossible to say. It is reasonable for say that we can't anticipate how lives will change. We didn't foresee the Internet, the Web, long range informal communication, Facebook, Twitter, a large number of applications for cell phones, and so on., and these have all subjectively changed social orders' way of life. New research issues emerge because of the vast size of gadgets, the association of the physical and digital universes, the openness of the frameworks of frameworks, and proceeding with issues of protection and security. It is trusted that there is more collaboration between the examination groups with a specific end goal to take care of the bunch of issues sooner and in addition to stay away from re-imagining the wheel when a specific group takes care of an issue. The Internet Society thinks about IoT on the grounds that it speaks to a developing part of how individuals and establishments are probably going to associate with and consolidate the Internet and system availability into their own, social, and monetary lives. Answers for amplifying the advantages of IoT while limiting the dangers won't be found by taking part in an energized talk about that pits the guarantees of IoT against its conceivable hazards. Or maybe, it will take educated engagement, discourse, and joint effort over a scope of partners to plot the best routes forward. REFERENCES [1] Andersson, P., Mattsson, L-G.: Service Innovation Enabled by the “Internet of Things”. IMP Journal. Vol. 9. No. 1. Pp. 85-106. (2015) [2]. Cuimei Li1, 9., Rou Wang2, 1., & Le Huang3, b. (2014). The Key Technology and Application of the Internet of
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1010 Things. Applied Mechanics & Materials, (644-650), 2812- 2815. [3] DEFENSE ADVANCED RESEARCH PROJECTS AGENCY Attention: DIRO/SBPO 675 North Randolph Street Arlington, VA 22203-2114 sbir@darpa.mil http://www.darpa.mil/Opportunities/SBIR_STTR/SBIR_S TTR.aspx [4] P. J. Denning " The ARPANET after Twenty Years" Published in American Scientist 77 (Nov-Dec 1989), 530- 535. [5] Deering, S.; Hinden, R. Internet Protocol, Version 6 (IPv6) Specification; RFC 1883; IETF: Fremont, CA, USA, 1995. [6] Frankel, S.; Graveman, R.; Pearce, J.; Rooks, M. Guidelines for the Secure Deployment of IPv6—Recommendations of the National Institute of Standards and Technology; Technical Report; NIST: Gaithersburg, MD, USA, 2010. [7] K. P. Fishkin, S. Roy, and B. Jiang, "Some methods for privacy in RFID communication", in Proc. 1st Eur. Workshop on Security in Ad-Hoc and Sensor Networks, 2004, [8] Tschofenig, H., et. al., Architectural Considerations in Smart Object Networking. Tech. no. RFC 7452. Internet Architecture Board, Mar. 2015. Web. https://www.rfc- editor.org/rfc/rfc7452.txt [9] See http://www.bluetooth.com and http://www.bluetooth.org [10] ”From the ARPANET to the Internet” by Ronda Hauben - TCP Digest (UUCP). Retrieved 2007-07-05 It can be accessed at: http://www.columbia.edu/ rh120/other/tcpdigest paper.txt [11] Jian An, Xiao-Lin Gui, Xin He, ”Study on the Architecture and Key Technologies for Internet of Things,” in Advances in Biomedical Engineering, Vol.11, IERI-2012, pp. 329-335 [12] ”The Internet of Things,” ITU Report, Nov 2005 [13] Aggarwal, R. and Lal Das, M. (2012) RFID Security in the Context of “Internet of Things”. First International Conference on Security of Internet of Things, Kerala, 17-19 August 2012, 51-56