scholarly journals Comparative analysis and practical implementation of the ESP32 microcontroller module for the internet of things

Author(s):  
Alexander Maier ◽  
Andrew Sharp ◽  
Yuriy Vagapov
Sensors ◽  
2019 ◽  
Vol 19 (14) ◽  
pp. 3078 ◽  
Author(s):  
Hilal Bello ◽  
Zeng Xiaoping ◽  
Rosdiadee Nordin ◽  
Jian Xin

Wake-up radio is a promising approach to mitigate the problem of idle listening, which incurs additional power consumption for the Internet of Things (IoT) wireless transmission. Radio frequency (RF) energy harvesting technique allows the wake-up radio to remain in a deep sleep and only become active after receiving an external RF signal to ‘wake-up’ the radio, thus eliminating necessary hardware and signal processing to perform idle listening, resulting in higher energy efficiency. This review paper focuses on cross-layer; physical and media access control (PHY and MAC) approaches on passive wake-up radio based on the previous works from the literature. First, an explanation of the circuit design and system architecture of the passive wake-up radios is presented. Afterward, the previous works on RF energy harvesting techniques and the existing passive wake-up radio hardware architectures available in the literature are surveyed and classified. An evaluation of the various MAC protocols utilized for the novel passive wake-up radio technologies is presented. Finally, the paper highlights the potential research opportunities and practical challenges related to the practical implementation of wake-up technology for future IoT applications.


2018 ◽  
Vol 2018 ◽  
pp. 1-30 ◽  
Author(s):  
Michele De Donno ◽  
Nicola Dragoni ◽  
Alberto Giaretta ◽  
Angelo Spognardi

The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far.


Author(s):  
Aleksandr Smuskin

The author states that the era of the Internet of Things has come. It is noted that Russian law publications do not pay sufficient attention to the practical issues of law enforcement that arise from the implementation of the Internet of Things, specifically, criminalistic research and the use of smart things by law enforcement bodies. This study a first attempt at a general criminalistic analysis of implementing the concept of the Internet of Things in Russian research publications. While analyzing the practical implementation of this concept, the author concludes that it is necessary not just to single out a smart house, a smart car or smart things as different categories, but to unite them into a system of smart environment. It is noted that the elements of the public sphere of application for the Internet of Things deserve separate studies, while this article will only focus on everyday application. Modern obstacles to a large-scale implementation of the Internet of Things are identified. The criminalistic research of the Internet of Things and smart environment makes it possible to identify key systems that modern appliances form in this sphere, requirements to them, subsystems of a smart house, functions of smart cars and gadgets. It is stated that the criminalistic research of the subsystems of smart environment is possible with the help of scientific criminalistic findings in the sphere of electronic digital traces and electronic evidence. Key points of finding these traces are identified. The author methodically analyzes the kinds of criminalistically relevant information that could be obtained through the examination of sensors and the memory of smart things, a smart car and a smart house. The author also determines the functions whose analysis is vital for collecting evidentiary and orientation information. It is stated that all information from sensors and information devices is, in the end, accumulated in the management center, as well as in cloud and network services servers that work with the Internet of Things. It is stressed that all interactions with electronic digital traces in the devices that implement the concept of the Internet of Things should happen with the participation of a specialist to avoid a loss of data.


Author(s):  
Meriem Aziez ◽  
Saber Benharzallah ◽  
Hammadi Bennoui

Abstract—The Internet of Things (IOT) has gained a significant attention in the last years. It covers multiple domains and applications such as smart home, smart healthcare, IT transportation...etc. the highly dynamic nature of the IOT environment brings to the service discovery new challenges and requirements. As a result, discovering the desirable services has become very challenging. In this paper, we aim to address the IoT service discovery problem and investigate the existing solutions to tackle this problem in many aspects, therefore we present a full comparative analysis of the most representative (or outstanding) service discovery approaches in the literature over four perspectives: (1) the IoT service description model, (2) the mechanism of IoT service discovery, (3) the adopted architecture and (4) the context awareness.


2021 ◽  
Vol 11 (4) ◽  
pp. 14-41
Author(s):  
Ishtiaq Ahammad ◽  
Ashikur Rahman Khan ◽  
Zayed Us Salehin

The internet of things (IoT) offers a range of benefits for its users, ranging from quicker and more precise perception of our ecosystem to more cost-effective monitoring of manufacturing applications, by taking internet access to the things. Due to the ubiquitous existence of the internet, there's been an increasing pace in the IoT. Such a growing pace has brought about the term of IoT ecosystem. This exponential growing IoT ecosystem will encounter several challenges in its path. Computing domains were used from very initial stage to assist the IoT ecosystem and mitigate those challenges. To understand the impact of computing domains in IoT ecosystem, this paper performs the elaborative study on cloud, fog, roof, and dew computing including their interaction, benefits, and limitations in IoT ecosystem. The brief comparative analysis on these four computing domains are then performed. The impact of internet and offline computing on these computing domains are then analyzed in depth. Finally, this paper presents the suggestions of potential appropriate computing domain strategies for IoT ecosystems.


2020 ◽  
Vol 12 (8) ◽  
pp. 138
Author(s):  
Andrew John Poulter ◽  
Steven J. Ossont ◽  
Simon J. Cox

This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores the practical implementation of a mitigation technique for some of the key weaknesses of a conventional dynamic identity model. This paper explores human-centric and machine-based observer approaches for confirming device identity, permitting automated identity confirmation for deployed systems. It also assesses the advantages of dynamic identity in the context of identity revocation permitting secure change of ownership for IoT devices. The paper explores use-cases for human and machine-based observation for authentication of device identity when devices join a Command and Control(C2) network, and considers the relative merits for these two approaches for different types of system.


Sign in / Sign up

Export Citation Format

Share Document