Advertisement

Introduction

  • Gitanjali Rahul ShindeEmail author
  • Prashant Shantaram Dhotre
  • Parikshit Narendra Mahalle
  • Nilanjan Dey
Chapter
  • 11 Downloads
Part of the SpringerBriefs in Applied Sciences and Technology book series (BRIEFSAPPLSCIENCES)

Abstract

Mark Weiser proposed notion of the ubiquitous or ever-present computing in 1998, which improve efficiency of human activities by keeping technology behind services.

References

  1. 1.
    Project CASAGRAS (2009) CASAGRAS Final Report: RFID and the Inclusive Model for the Internet of ThingsGoogle Scholar
  2. 2.
    Overview of the Internet of Things Y.2060 (2012) In International Telecommunication Union (ITU), pp 1–18Google Scholar
  3. 3.
    Myoung L et al (2011) The Internet of Things concept and problem statement draft lee IoT problem statement statusGoogle Scholar
  4. 4.
    Dorsemaine B, Gaulier JP, Wary JP, Kheir N, Urien P (2016) Internet of Things: a definition and taxonomy. In: Proceedings—NGMAST 2015: the 9th international conference on next generation mobile applications, services and technologies, pp 72–77Google Scholar
  5. 5.
    Chen Y-K (2012) Challenges and opportunities of Internet of Things. In: 17th Asia and South Pacific design automation conference, pp 383–388Google Scholar
  6. 6.
    Botterman M (2009) Internet of Things in 2020: roadmap for the futureGoogle Scholar
  7. 7.
    Rayes A, Salam S (2017) Internet of Things (IoT) overview, in Internet of Things from hype to reality. Springer International Publishing, Cham, pp 1–34CrossRefGoogle Scholar
  8. 8.
    Miranda J et al (2015) From the Internet of Things to the Internet of People. IEEE Internet Comput 19(2):40–47Google Scholar
  9. 9.
    Soriano J et al (2013) Internet of services. In the convergence of Telecom and Internet on evolution of telecommunication services, vol 7768, pp 283–325Google Scholar
  10. 10.
  11. 11.
  12. 12.
    EnGenius Technologies (2017) Wi-Fi beacon frames simplified. Online available: https://www.engeniustech.com/wi-fi-beacon-frames-simplified/
  13. 13.
    Henrik S, Mikko S, Jere K, Pasi R, Bluetooth® 5, Refined for the IoT. Online available: https://www.silabs.com/documents/public/white-papers/bluetooth-5-refined-for-the-IoT.pdf
  14. 14.
    LoRaWAN Alliance, Online available: https://lora-alliance.org/about-lorawan
  15. 15.
    Jacoby D, IoT: how I hacked my home, online available on https://securelist.com/iot-how-i-hacked-my-home/66207/
  16. 16.
    Westerlund M, Leminen S, Rajahonka M (2014) Designing business models for the Internet of Things. Technol Innov Manage Rev 4(7):5–14CrossRefGoogle Scholar
  17. 17.
    Rose K, Eldridge S, Chapin L (2015) The Internet of Things: an overview understanding the issues and challenges of a more connected world. Internet Soc (ISOC) 22Google Scholar
  18. 18.
    Tamane S, Solanki VK, Dey N (eds) (2017) Privacy and security policies in big data. IGI GlobalGoogle Scholar
  19. 19.
    Vimal S, Khari M, Crespo RG, Kalaivani L, Dey N, Kaliappan M (2020) Energy enhancement using multiobjective ant colony optimisation with Double Q learning algorithm for IoT based cognitive radio networks. Comput CommunGoogle Scholar
  20. 20.
    Dey N, Fong S, Song W, Cho K (2017) Forecasting energy consumption from smart home sensor network by deep learning. In: International conference on smart trends for information technology and computer communications. Springer, Singapore, pp 255–265Google Scholar
  21. 21.
    Mukherjee A, Dey N (2019) Smart computing with open source platforms. CRC PressGoogle Scholar
  22. 22.
    Mukherjee A, Panja AK, Dey N (2020) A beginner’s guide to data agglomeration and intelligent sensing. Academic PressGoogle Scholar
  23. 23.
    Mhetre NA, Deshpande AV, Mahalle PN (2016) Trust management model based on fuzzy approach for ubiquitous computing. Int J Ambient Comput Intell (IJACI) 7(2):33–46CrossRefGoogle Scholar
  24. 24.
    Babar S, Mahalle P, Stango A, Prasad N, Prasad R (2010) Proposed security model and threat taxonomy for the Internet of Things (IoT). In: International conference on network security and applications. Springer, Berlin, pp 420–429Google Scholar
  25. 25.
    Mahalle PN, Anggorojati B, Prasad NR, Prasad R (2013) Identity authentication and capability based access control (IACAC) for the internet of things. J Cyber Secur Mobil 1(4):309–348Google Scholar

Copyright information

© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021

Authors and Affiliations

  • Gitanjali Rahul Shinde
    • 1
    Email author
  • Prashant Shantaram Dhotre
    • 2
  • Parikshit Narendra Mahalle
    • 1
  • Nilanjan Dey
    • 3
  1. 1.Department of Computer EngineeringSTES’s Smt. Kashibai Navale College of EngineeringPuneIndia
  2. 2.Department of Information TechnologyJSPM’s Rajarshi Shahu College of Engineering (An Autonomous Institute)PuneIndia
  3. 3.Department of Information TechnologyTechno India College of TechnologyKolkataIndia

Personalised recommendations