Pub Date : 2021-12-01DOI: 10.1109/miot.2021.9712460
V. Chamola, F. Yu, B. Sikdar, S. Kanhere, M. Guizani
{"title":"Guest Editorial: Internet of Drones: Novel Applications, Recent Deployments, and Integration","authors":"V. Chamola, F. Yu, B. Sikdar, S. Kanhere, M. Guizani","doi":"10.1109/miot.2021.9712460","DOIUrl":"https://doi.org/10.1109/miot.2021.9712460","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130280816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/miot.2021.9712395
N. Narang
{"title":"Mentor's Musings on Standardization Landscape & Imperatives for the Internet of Drones","authors":"N. Narang","doi":"10.1109/miot.2021.9712395","DOIUrl":"https://doi.org/10.1109/miot.2021.9712395","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121860509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-01DOI: 10.1109/MIOT.2021.9548995
Deepak Gupta, V. Albuquerque, Sheng-Lung Peng, Ashish Khanna, G. Nguyen, Oscar Castillo
{"title":"GUEST EDITORIAL: Internet of Things for e-Health Applications","authors":"Deepak Gupta, V. Albuquerque, Sheng-Lung Peng, Ashish Khanna, G. Nguyen, Oscar Castillo","doi":"10.1109/MIOT.2021.9548995","DOIUrl":"https://doi.org/10.1109/MIOT.2021.9548995","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115833704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/MIOT.2020.9319622
N. Narang
IoT Standards Matters will look at different segments of the IoT market as it relates to implementation and use of standards. Each column will select a particular vertical, and lay out the relevant standards and technologies that affect the evolving IoT hyperspace. The pace of the columns will start broadly with the vision of narrowing the subject of subsequent articles toward more specific applications of standards, whether in the development, application, test, or commissioning of IoT technologies.
{"title":"Mentor's Musings on Artificial Computational Intelligence and the Internet of Everything","authors":"N. Narang","doi":"10.1109/MIOT.2020.9319622","DOIUrl":"https://doi.org/10.1109/MIOT.2020.9319622","url":null,"abstract":"IoT Standards Matters will look at different segments of the IoT market as it relates to implementation and use of standards. Each column will select a particular vertical, and lay out the relevant standards and technologies that affect the evolving IoT hyperspace. The pace of the columns will start broadly with the vision of narrowing the subject of subsequent articles toward more specific applications of standards, whether in the development, application, test, or commissioning of IoT technologies.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125353671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/MIOT.2020.9319621
R. Giaffreda, Mattia Antonini
In this column we plan to take a tour around different physical locations in the world with the objective of highlighting the peculiarities of the trendiest IoT-related applications in selected regions. Thus, the “IoT World” will certainly be physical, but traveling around it shall also expose to the readers how different application domains have been addressed, with particular attention to business sustainability.
{"title":"IoT Technologies and Privacy in a Data-Bloated Society: Where Do We Stand in the Fight to Prepare for the Next Pandemic?","authors":"R. Giaffreda, Mattia Antonini","doi":"10.1109/MIOT.2020.9319621","DOIUrl":"https://doi.org/10.1109/MIOT.2020.9319621","url":null,"abstract":"In this column we plan to take a tour around different physical locations in the world with the objective of highlighting the peculiarities of the trendiest IoT-related applications in selected regions. Thus, the “IoT World” will certainly be physical, but traveling around it shall also expose to the readers how different application domains have been addressed, with particular attention to business sustainability.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126553665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/mwc.2020.9116082
Z. Fadlullah, M. Fouda, A. Pathan, N. Nasser, A. Benslimane, Ying-Dar Lin
The articles in this special issue that focuses on smart Internet of Things (IoT) solutions for combating the COVID-19 pandemic.
本期特刊关注的是应对COVID-19大流行的智能物联网(IoT)解决方案。
{"title":"Smart IoT Solutions for Combating the COVID-19 Pandemic","authors":"Z. Fadlullah, M. Fouda, A. Pathan, N. Nasser, A. Benslimane, Ying-Dar Lin","doi":"10.1109/mwc.2020.9116082","DOIUrl":"https://doi.org/10.1109/mwc.2020.9116082","url":null,"abstract":"The articles in this special issue that focuses on smart Internet of Things (IoT) solutions for combating the COVID-19 pandemic.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130860243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/miot.2020.9125420
Lei Zhang, Sanjay Bakshi, J. Zao
Trustworthiness and privacy are of primary concern as companies connect their manufacturing and logistic infrastructures to the Internet of Things (IoT). They want to reap the benefit of automated asset management, process control and predictive maintenance. However, to do so effectively, companies need to facilitate information sharing among trustworthy partners while complying with data protection and privacy preserving regulations. In this respect, Distributed Ledgers (a.k.a. Blockchains) offer a viable solution by enabling their participants to discover one another and establish peer-to-peer trust relations without a centralized intermediary. Nonetheless, this approach comes with a caveat: Blockchains may not scale well. Since each Blockchain-based transaction must be attested by multiple Blockchain participants, it may take time to complete a transaction. Besides, since each transaction is processed by multiple participants, information privacy is sacrificed in exchange for Byzantine fault tolerance and trustworthiness of the results. To overcome these shortcomings of on-chain computing, OffChain Trusted Computing was devised to offload the bulk of transaction workload to the Trusted Execution Environments (TEEs) established in the off-chain computing nodes that are trusted by the Blockchain participants, leaving only the execution of business logic to on-chain computing. This hybrid approach greatly increases the efficiency and speed of the transactions. Moreover, by concealing the input and output of the TEEs with data encryption and verifying the states of transaction execution in the TEEs through remote attestation, Off-Chain Trusted Computing can preserve the information privacy of data providers and confirm the proper execution of the business logic. This column provides an introduction to this new technology by explaining its operation, surveying its standardized application programming interfaces (APIs) and mentioning an example application.
{"title":"Off-Chain Trusted Computing","authors":"Lei Zhang, Sanjay Bakshi, J. Zao","doi":"10.1109/miot.2020.9125420","DOIUrl":"https://doi.org/10.1109/miot.2020.9125420","url":null,"abstract":"Trustworthiness and privacy are of primary concern as companies connect their manufacturing and logistic infrastructures to the Internet of Things (IoT). They want to reap the benefit of automated asset management, process control and predictive maintenance. However, to do so effectively, companies need to facilitate information sharing among trustworthy partners while complying with data protection and privacy preserving regulations. In this respect, Distributed Ledgers (a.k.a. Blockchains) offer a viable solution by enabling their participants to discover one another and establish peer-to-peer trust relations without a centralized intermediary. Nonetheless, this approach comes with a caveat: Blockchains may not scale well. Since each Blockchain-based transaction must be attested by multiple Blockchain participants, it may take time to complete a transaction. Besides, since each transaction is processed by multiple participants, information privacy is sacrificed in exchange for Byzantine fault tolerance and trustworthiness of the results. To overcome these shortcomings of on-chain computing, OffChain Trusted Computing was devised to offload the bulk of transaction workload to the Trusted Execution Environments (TEEs) established in the off-chain computing nodes that are trusted by the Blockchain participants, leaving only the execution of business logic to on-chain computing. This hybrid approach greatly increases the efficiency and speed of the transactions. Moreover, by concealing the input and output of the TEEs with data encryption and verifying the states of transaction execution in the TEEs through remote attestation, Off-Chain Trusted Computing can preserve the information privacy of data providers and confirm the proper execution of the business logic. This column provides an introduction to this new technology by explaining its operation, surveying its standardized application programming interfaces (APIs) and mentioning an example application.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126285755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/miot.2020.9125422
N. Narang
{"title":"Standards Matters/Mentor's Musings on a Standardization Conundrum: Blockchain vs. DLTs","authors":"N. Narang","doi":"10.1109/miot.2020.9125422","DOIUrl":"https://doi.org/10.1109/miot.2020.9125422","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134043588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/miot.2020.9125421
N. Narang
{"title":"Standards Matters/Mentor's Musings on IoT 2.0: IoT Coming of Age","authors":"N. Narang","doi":"10.1109/miot.2020.9125421","DOIUrl":"https://doi.org/10.1109/miot.2020.9125421","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123641087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/miot.2020.9063396
Chris Laughlin
Exploited spectrum vulnerabilities can result in a range of consequences. At their most inconsequential, they may disrupt an individual or small group from communicating. More significantly, they can facilitate large-scale disruptions to communications, resulting in social, economic, and perhaps even unintended physical harm. At their worst, spectrum vulnerabilities can be used to cause intentional physical injuries. For example, individual and small-scale bad actors could use GPS spoofing to direct a person into harm’s way, disrupt vehicle-to-vehicle communications to cause accidents, or hack automated medical devices, such as insulin pumps or heart defibrillators, with fatal results. In a military setting, techniques like spectral herding can force enemies to communicate on chosen spectrum bands with greater vulnerabilities that can then be used to locate targets or send conflicting communications, as is thought to have occurred to Ukrainian forces during Russia’s 2014 annexation of Crimea. Despite these risks, most spectrum vulnerabilities remain unaddressed. In Part I of this column, I discussed the systematic and technological challenges to identifying and understanding spectrum vulnerabilities. These challenges were identified at a roundtable discussion convened by Silicon Flatirons, which included experts from government, academia, and industry. I was permitted to report on conclusions reached from the discussion. In Part II, I reveal some of the solutions offered by the roundtable participants to the challenges they identified. These solutions are a starting point, they are not fully developed, nor do they fully address each challenge. Nevertheless, I take a similar approach to presenting the solutions as I did in Part I, beginning with those that address systematic challenges and concluding with those that address technological challenges.1
{"title":"Spectrum Vulnerabilities - Part II : Recommendations for Identifying and Understanding Spectrum Vulnerabilities","authors":"Chris Laughlin","doi":"10.1109/miot.2020.9063396","DOIUrl":"https://doi.org/10.1109/miot.2020.9063396","url":null,"abstract":"Exploited spectrum vulnerabilities can result in a range of consequences. At their most inconsequential, they may disrupt an individual or small group from communicating. More significantly, they can facilitate large-scale disruptions to communications, resulting in social, economic, and perhaps even unintended physical harm. At their worst, spectrum vulnerabilities can be used to cause intentional physical injuries. For example, individual and small-scale bad actors could use GPS spoofing to direct a person into harm’s way, disrupt vehicle-to-vehicle communications to cause accidents, or hack automated medical devices, such as insulin pumps or heart defibrillators, with fatal results. In a military setting, techniques like spectral herding can force enemies to communicate on chosen spectrum bands with greater vulnerabilities that can then be used to locate targets or send conflicting communications, as is thought to have occurred to Ukrainian forces during Russia’s 2014 annexation of Crimea. Despite these risks, most spectrum vulnerabilities remain unaddressed. In Part I of this column, I discussed the systematic and technological challenges to identifying and understanding spectrum vulnerabilities. These challenges were identified at a roundtable discussion convened by Silicon Flatirons, which included experts from government, academia, and industry. I was permitted to report on conclusions reached from the discussion. In Part II, I reveal some of the solutions offered by the roundtable participants to the challenges they identified. These solutions are a starting point, they are not fully developed, nor do they fully address each challenge. Nevertheless, I take a similar approach to presenting the solutions as I did in Part I, beginning with those that address systematic challenges and concluding with those that address technological challenges.1","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126430997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}