• OpenAccess
    • List of Articles IOT

      • Open Access Article

        1 - Safe Use of the Internet of Things for Privacy Enhancing
        Hojatallah Hamidi
        New technologies and their uses have always had complex economic, social, cultural, and legal implications, with accompanying concerns about negative consequences. So it will probably be with the IoT and their use of data and attendant location privacy concerns. It must More
        New technologies and their uses have always had complex economic, social, cultural, and legal implications, with accompanying concerns about negative consequences. So it will probably be with the IoT and their use of data and attendant location privacy concerns. It must be recognized that management and control of information privacy may not be sufficient according to traditional user and public preferences. Society may need to balance the benefits of increased capabilities and efficiencies of the IoT against a possibly inevitably increased visibility into everyday business processes and personal activities. Much as people have come to accept increased sharing of personal information on the Web in exchange for better shopping experiences and other advantages, they may be willing to accept increased prevalence and reduced privacy of information. Because information is a large component of IoT information, and concerns about its privacy are critical to widespread adoption and confidence, privacy issues must be effectively addressed. The purpose of this paper is which looks at five phases of information flow, involving sensing, identification, storage, processing, and sharing of this information in technical, social, and legal contexts, in the IoT and three areas of privacy controls that may be considered to manage those flows, will be helpful to practitioners and researchers when evaluating the issues involved as the technology advances. Manuscript profile
      • Open Access Article

        2 - A Survey of Two Dominant Low Power and Long Range Communication Technologies
        Yas Hosseini Tehrani Seyed Mojtaba Atarodi ZIba Fazel
        The Internet of Things (IoT) connects various kinds of things such as physical devices, vehicles, home appliances, etc. to each other enabling them to exchange data. The IoT also allows objects to be sensed or controlled remotely and results in improved efficiency, accu More
        The Internet of Things (IoT) connects various kinds of things such as physical devices, vehicles, home appliances, etc. to each other enabling them to exchange data. The IoT also allows objects to be sensed or controlled remotely and results in improved efficiency, accuracy and economic benefits. Therefore, the number of connected devices through IoT is increasing rapidly. Machina Research estimates that the IoT will consist of about 2.6 billion objects by 2020. Different network technologies have been developed to provide connectivity of this large number of devices, like WiFi for cellular-based connections, ZigBee and Bluetooth for indoor connections and Low Power Wide Area Network's (LPWAN) for low power long-distance connections. LPWAN may be used as a private network, or may also be a service offered by a third party, allowing companies to deploy it without investing in gateway technology. Two available leading technologies for LPWAN are narrow-band systems and wide-band plus coding gain systems. In the first one, receiver bandwidth is scaled down to reduce noise seen by the receiver, while in the second one, coding gain is added to the higher rate signal to combat the high receiver noise in a wideband receiver. Both LoRa and NB-IoT standards were developed to improve security, power efficiency, and interoperability for IoT devices. They support bidirectional communication, and both are designed to scale well, from a few devices to millions of devices. LoRa operates in low frequencies, particularly in an unlicensed spectrum, which avoids additional subscription costs in comparison to NB-IoT, but has lower Quality of Service. NB-IoT is designed to function in a 200kHz carrier re-farmed from GSM, with the additional advantage of being able to operate in a shared spectrum with an existing LTE network. But in the other hand, it has lower battery lifetime and capacity. This paper is a survey on both systems. The review includes an in-depth study of their essential parameters such as battery lifetime, capacity, cost, QoS, latency, reliability, and range and presents a comprehensive comparison between them. This paper reviews created testbeds of recent researches over both systems to compare and verify their performance. Manuscript profile
      • Open Access Article

        3 - Using Decision Lattice Analysis to Model IOT-based Companies’ profit
        Nazanin Talebolfakhr Seyed Babak Ebrahimi Donya Rahmani
        Demand uncertainty and high initial investments for IOT-based projects lead to analyzing various types of options, especially real options in project execution to decrease these uncertainties. In this study, we investigate the firms’ expected profits that resulted from More
        Demand uncertainty and high initial investments for IOT-based projects lead to analyzing various types of options, especially real options in project execution to decrease these uncertainties. In this study, we investigate the firms’ expected profits that resulted from appropriate chosen static and dynamic pricing strategies namely low-pricing, high-pricing, and contingent pricing combined with binomial decision lattices. Besides, the reciprocal influence between pricing strategies and IOT investment could provide useful insights for the firms that confront demand uncertainties in selling the firms’ products. We propose a model which is the integration of binomial decision lattices, which have been calculated by Real Option Super Lattice Solver 2017 software, and pricing policies under uncertainty. The results provide insights into what pricing strategies to choose based on the project’s real option value and the level of the firm uncertainty about the purchasing of the high-value consumer. Among the mentioned static and dynamic pricing strategies, high-pricing and contingent pricing strategies under different situations can be selected and expected profits of each of the strategies will be calculated and compared with each other. On the contrary, as the low-pricing strategy resulted in the lowest option value, it will not be scrutinized in this study. Experimental results show that if the IOT investment level and high-value consumer purchasing likelihood are high, the firm will implement the high-pricing strategy, otherwise choosing the contingent pricing due to the demand uncertainty would be appropriate. Manuscript profile
      • Open Access Article

        4 - Reducing Energy Consumption in Sensor-Based Internet of Things Networks Based on Multi-Objective Optimization Algorithms
        Mohammad sedighimanesh Hessam  Zandhessami Mahmood  Alborzi Mohammadsadegh  Khayyatian
        Energy is an important parameter in establishing various communications types in the sensor-based IoT. Sensors usually possess low-energy and non-rechargeable batteries since these sensors are often applied in places and applications that cannot be recharged. The mos More
        Energy is an important parameter in establishing various communications types in the sensor-based IoT. Sensors usually possess low-energy and non-rechargeable batteries since these sensors are often applied in places and applications that cannot be recharged. The most important objective of the present study is to minimize the energy consumption of sensors and increase the IoT network's lifetime by applying multi-objective optimization algorithms when selecting cluster heads and routing between cluster heads for transferring data to the base station. In the present article, after distributing the sensor nodes in the network, the type-2 fuzzy algorithm has been employed to select the cluster heads and also the genetic algorithm has been used to create a tree between the cluster heads and base station. After selecting the cluster heads, the normal nodes become cluster members and send their data to the cluster head. After collecting and aggregating the data by the cluster heads, the data is transferred to the base station from the path specified by the genetic algorithm. The proposed algorithm was implemented with MATLAB simulator and compared with LEACH, MB-CBCCP, and DCABGA protocols, the simulation results indicate the better performance of the proposed algorithm in different environments compared to the mentioned protocols. Due to the limited energy in the sensor-based IoT and the fact that they cannot be recharged in most applications, the use of multi-objective optimization algorithms in the design and implementation of routing and clustering algorithms has a significant impact on the increase in the lifetime of these networks. Manuscript profile
      • Open Access Article

        5 - Energy Efficient Routing-Based Clustering Protocol Using Computational Intelligence Algorithms in Sensor-Based IoT
        Mohammad sedighimanesh Hessam  Zandhessami Mahmood  Alborzi Mohammadsadegh  Khayyatian
        Background: The main limitation of wireless IoT sensor-based networks is their energy resource, which cannot be charged or replaced because, in most applications, these sensors are usually applied in places where they are not accessible or rechargeable. Objective: The p More
        Background: The main limitation of wireless IoT sensor-based networks is their energy resource, which cannot be charged or replaced because, in most applications, these sensors are usually applied in places where they are not accessible or rechargeable. Objective: The present article's main objective is to assist in improving energy consumption in the sensor-based IoT network and thus increase the network’s lifetime. Cluster heads are used to send data to the base station. Methods: In the present paper, the type-1 fuzzy algorithm is employed to select cluster heads, and the type-2 fuzzy algorithm is used for routing between cluster heads to the base station. After selecting the cluster head using the type-1 fuzzy algorithm, the normal nodes become the members of the cluster heads and send their data to the cluster head, and then the cluster heads transfer the collected data to the main station through the path which has been determined by the type-2 fuzzy algorithm. Results: The proposed algorithm was implemented using MATLAB simulator and compared with LEACH, DEC, and DEEC protocols. The simulation results suggest that the proposed protocol among the mentioned algorithms increases the network’s lifetime in homogeneous and heterogeneous environments. Conclusion: Due to the energy limitation in sensor-based IoT networks and the impossibility of recharging the sensors in most applications, the use of computational intelligence techniques in the design and implementation of these algorithms considerably contributes to the reduction of energy consumption and ultimately the increase in network’s lifetime. Manuscript profile
      • Open Access Article

        6 - Remote Monitoring System of Heart Conditions for Elderly Persons with ECG Machine Using IOT Platform
        Ngangbam Phalguni Singh Aditya  Kanakamalla Shaik Azhad  Shahzad Guntupalli Divya Sai Shruti  Suman
        These days, heart illnesses are viewed as the essential purposes behind unforeseen passing. Along these lines, different clinical gadgets have been created by designers to analyze and examine different infections. Clinical consideration has gotten one of the main issues More
        These days, heart illnesses are viewed as the essential purposes behind unforeseen passing. Along these lines, different clinical gadgets have been created by designers to analyze and examine different infections. Clinical consideration has gotten one of the main issues for the two individuals and government considering enthusiastic advancement in human people and clinical use. Numerous patients experience the ill effects of heart issues making some basic dangers their life, consequently they need ceaseless observing by a conventional checking framework for example, Electrocardiographic (ECG) which is the main procedure utilized in estimating the electrical movement of the heart, this method is accessible just in the emergency clinic which is exorbitant and far for distant patients. The improvement of far-off advancements enables to develop an association of related devices by methods for the web. The proposed ECG checking framework comprises of AD8382 ECG sensor to peruse patient's information, Arduino Uno, ESP8266 Wi-Fi module, and site page. The usage of the proposed ECG medical care framework empowers the specialist to screen the patient's distantly utilizing IoT http application library utilized in Arduino ide compiler to such an extent that it can send that information to website page made, on imagining the patient's ECG signal without human presence site page itself can book arrangement for that persistent, if it is anomalous. The observing cycle should be possible at whenever and anyplace without the requirement for the emergency clinic. Manuscript profile
      • Open Access Article

        7 - Detection of Attacks and Anomalies in the Internet of Things System using Neural Networks Based on Training with PSO Algorithms, Fuzzy PSO, Comparative PSO and Mutative PSO
        Mohammad  Nazarpour navid nezafati Sajjad  Shokouhyar
        Integration and diversity of IOT terminals and their applicable programs make them more vulnerable to many intrusive attacks. Thus, designing an intrusion detection model that ensures the security, integrity, and reliability of IOT is vital. Traditional intrusion detect More
        Integration and diversity of IOT terminals and their applicable programs make them more vulnerable to many intrusive attacks. Thus, designing an intrusion detection model that ensures the security, integrity, and reliability of IOT is vital. Traditional intrusion detection technology has the disadvantages of low detection rates and weak scalability that cannot adapt to the complicated and changing environment of the Internet of Things. Hence, one of the most widely used traditional methods is the use of neural networks and also the use of evolutionary optimization algorithms to train neural networks can be an efficient and interesting method. Therefore, in this paper, we use the PSO algorithm to train the neural network and detect attacks and abnormalities of the IOT system. Although the PSO algorithm has many benefits, in some cases it may reduce population diversity, resulting in early convergence. Therefore,in order to solve this problem, we use the modified PSO algorithm with a new mutation operator, fuzzy systems and comparative equations. The proposed method was tested with CUP-KDD data set. The simulation results of the proposed model of this article show better performance and 99% detection accuracy in detecting different malicious attacks, such as DOS, R2L, U2R, and PROB. Manuscript profile