Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Applications for Innovative Internet of Things Using Smart Surveillance System


     

   Subscribe/Renew Journal


In  the logistics  and  supply  chain,  the  traditional  supply  of  goods  is  based  on  established agreements  between  manufacturers  and  suppliers.    Orders  are  made  in  advance  and tracking   is   done   by   various   stakeholders   in   the   supply   chain,   i.e.,   assembly   lines, manufacturers  and  logistics  managers.    With  the  use  of  smart  technologies  such  as  active RFID  (executable  codes  in  tag),  it  is  possible  to  envision  that  goods  may  be  transported without  human  intervention  from manufacturers to suppliers. Warehouses  will  become completely automatic with goods moving in and out; forwarding of the goods will be made, using  intelligent  decisions  based  on  information  received  via  readers  and  positioning systems  to  optimise  transiting  routes The concept of Internet of Things (IoT) has become the most popular term through the widespread of its applications such as greenhouse and telemedicine monitoring. Actually, building IoT systems requires an accurate infrastructure planning. Furthermore, management and security of these systems are considered as the most important challenges facing system developers. As security will be a fundamental enabling factor of most IoT applications, mechanisms must also be designed to protect communications enabled by such technologies. This survey analyses existing protocols and mechanisms to secure communications in the IoT, as well as open research issues. We analyse how existing approaches ensure fundamental security requirements and protect communications on the IoT, together with the open challenges and strategies for future research work in the area. This is, as far as our knowledge goes, the first survey with such goals. In this paper, the traditional techniques are studied and evaluated. Accordingly, analysis and design of innovative general purpose system, which protect the IoT resources such as devices and data against hacking or stealing, are proposed.

Keywords

Internet of Things, End-to-End Security, Network Security, QoS, Internetworking.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 215

PDF Views: 4




  • Applications for Innovative Internet of Things Using Smart Surveillance System

Abstract Views: 215  |  PDF Views: 4

Authors

Abstract


In  the logistics  and  supply  chain,  the  traditional  supply  of  goods  is  based  on  established agreements  between  manufacturers  and  suppliers.    Orders  are  made  in  advance  and tracking   is   done   by   various   stakeholders   in   the   supply   chain,   i.e.,   assembly   lines, manufacturers  and  logistics  managers.    With  the  use  of  smart  technologies  such  as  active RFID  (executable  codes  in  tag),  it  is  possible  to  envision  that  goods  may  be  transported without  human  intervention  from manufacturers to suppliers. Warehouses  will  become completely automatic with goods moving in and out; forwarding of the goods will be made, using  intelligent  decisions  based  on  information  received  via  readers  and  positioning systems  to  optimise  transiting  routes The concept of Internet of Things (IoT) has become the most popular term through the widespread of its applications such as greenhouse and telemedicine monitoring. Actually, building IoT systems requires an accurate infrastructure planning. Furthermore, management and security of these systems are considered as the most important challenges facing system developers. As security will be a fundamental enabling factor of most IoT applications, mechanisms must also be designed to protect communications enabled by such technologies. This survey analyses existing protocols and mechanisms to secure communications in the IoT, as well as open research issues. We analyse how existing approaches ensure fundamental security requirements and protect communications on the IoT, together with the open challenges and strategies for future research work in the area. This is, as far as our knowledge goes, the first survey with such goals. In this paper, the traditional techniques are studied and evaluated. Accordingly, analysis and design of innovative general purpose system, which protect the IoT resources such as devices and data against hacking or stealing, are proposed.

Keywords


Internet of Things, End-to-End Security, Network Security, QoS, Internetworking.