{"title":"智能物联网系统","authors":"Ritu Chauhan, Sandhya Avasthi, Bhavya Alankar, Harleen Kaur","doi":"10.4018/978-1-7998-7541-3.CH007","DOIUrl":null,"url":null,"abstract":"The IoT or the internet of things started as a technology to connect everyday objects over the internet, which has evolved into something big and invaded into every single aspect of our lives. As technology is gaining momentum, IoT-based smart devices usage among users is expanding, which generates massive data at our disposal across various domains. The authors have systematically studied the taxonomy of data analytics and the benefits of using advanced machine learning techniques in converting data into valuable assets. In the studies, they have identified and did due diligence on different smart home systems, their features, and configuration. During this course of study, they have also identified the vulnerability of such a system and threats associated with these vulnerabilities in a secure smart home environment.","PeriodicalId":285977,"journal":{"name":"Transforming the Internet of Things for Next-Generation Smart Systems","volume":"86 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Smart IoT Systems\",\"authors\":\"Ritu Chauhan, Sandhya Avasthi, Bhavya Alankar, Harleen Kaur\",\"doi\":\"10.4018/978-1-7998-7541-3.CH007\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The IoT or the internet of things started as a technology to connect everyday objects over the internet, which has evolved into something big and invaded into every single aspect of our lives. As technology is gaining momentum, IoT-based smart devices usage among users is expanding, which generates massive data at our disposal across various domains. The authors have systematically studied the taxonomy of data analytics and the benefits of using advanced machine learning techniques in converting data into valuable assets. In the studies, they have identified and did due diligence on different smart home systems, their features, and configuration. During this course of study, they have also identified the vulnerability of such a system and threats associated with these vulnerabilities in a secure smart home environment.\",\"PeriodicalId\":285977,\"journal\":{\"name\":\"Transforming the Internet of Things for Next-Generation Smart Systems\",\"volume\":\"86 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Transforming the Internet of Things for Next-Generation Smart Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/978-1-7998-7541-3.CH007\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transforming the Internet of Things for Next-Generation Smart Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-7998-7541-3.CH007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The IoT or the internet of things started as a technology to connect everyday objects over the internet, which has evolved into something big and invaded into every single aspect of our lives. As technology is gaining momentum, IoT-based smart devices usage among users is expanding, which generates massive data at our disposal across various domains. The authors have systematically studied the taxonomy of data analytics and the benefits of using advanced machine learning techniques in converting data into valuable assets. In the studies, they have identified and did due diligence on different smart home systems, their features, and configuration. During this course of study, they have also identified the vulnerability of such a system and threats associated with these vulnerabilities in a secure smart home environment.