Internet of Things

Part of the Real-Time Systems Series book series (RTSS)

Abstract

The connection of physical things to the Internet makes it possible to access remote sensor data and to control the physical world from a distance. The mash-up of captured data with data retrieved from other sources, e.g., with data that is contained in the Web, gives rise to new synergistic services that go beyond the services that can be provided by an isolated embedded system. The Internet of Things is based on this vision. A smart object, which is the building block of the Internet of Things, is just another name for an embedded system that is connected to the Internet. There is another technology that points in the same direction – the RFID technology. The RFID technology, an extension of the ubiquitous optical bar codes that are found on many every-day products, requires the attachment of a smart low-cost electronic ID-tag to a product such that the identity of a product can be decoded from a distance. By putting more intelligence into the ID tag, the tagged thing becomes a smart object. The novelty of the Internet-of-Things (IoT) is not in any new disruptive technology, but in the pervasive deployment of smart objects.

Keywords

Transportation Remote Sensor Adapter 

References

  1. [Bar07]
    Baronti, P., et al. (2007). Wireless Sensor Networks: A Survey on the State of the Art and the 802.15.4 and Zigbee Standards. Computer Communication, Vol. 30. Elsevier. (pp. 1655-1695).Google Scholar
  2. [Bha10]
    Bhattacharayya, R. et al. (2010). Low-Cost, Ubiquitous RFID-Tag-Antenna-Based Sensing. Proc. of the IEEE. Vol. 98(10). (pp. 1593-1600).CrossRefGoogle Scholar
  3. [Fin03]
    Finkenzeller, K. (2003). RFID Handbook. John Wiley and Sons.Google Scholar
  4. [Gad10]
    Gadh, R., et al. (2010). RFID: A unique Radio Innovation for the 21st Century. Proc. of the IEEE. Vol. 98(2). (pp. 1541-1680).Google Scholar
  5. [Hue08]
    Huebscher, M.C. & J.A. McCann. (2008). A Survey of Autonomic Computing–Degrees, Models and Applications. ACM Computing Surveys. Vol. 40(3). (pp. 7.1-7.28).CrossRefGoogle Scholar
  6. [Jue05]
    Juels, A. & S.A. Weis. (2005). Authenticating Pervasive Devices with Human Protocols. In: Proc. of CRYPTO 2005. Springer Verlag. (pp. 293-308).Google Scholar
  7. [Kor10]
    Kortuem, G., et al. (2010). Smart Objects as the Building Block for the Internet of Things. IEEE Internet Computing, Jan 2010). (pp. 44-50).Google Scholar
  8. [Kum10]
    Kumar, K. & Y.H. Lu (2020). Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? IEEE Computer, April 2010. (pp. 51-56).Google Scholar
  9. [Lan09]
    Langley, P., J.E. Laird, & S. Rogers. (2009). Cognitive Architectures: Research Issues and Challenges. Cognitive System Research. Vol. 10(2). (pp. 141-160).CrossRefGoogle Scholar
  10. [Lan97]
    Landwehr, C.E. & D.M. Goldschlag. (1997). Security Issues in Networks with Internet Access. Proc. of the IEEE. Vol. 85(12). (pp. 2034-2051).CrossRefGoogle Scholar
  11. [Pap02]
    Pappu, R., et al. (2002). Physical One-Way Functions. Science. Vol. 297. (pp. 2026-2030).CrossRefGoogle Scholar
  12. [Ver09]
    Vermesan, O. et al. (2009). Internet of Things—Strategic Research Roadmap. European Commission-Information Society and Media DG. Brussels.Google Scholar
  13. [Wik10]

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  1. 1.Department of Computer Engineering Real Time Systems GroupVienna University of TechnologyWienAustria

Personalised recommendations