Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the...Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.展开更多
Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of thi...Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of things (devices) that can be connected through the internet. The purpose: this paper aims to explore the concept of the Internet of Things (IoT) generally and outline the main definitions of IoT. The paper also aims to examine and discuss the obstacles and potential benefits of IoT in Saudi universities. Methodology: the researchers reviewed the previous literature and focused on several databases to use the recent studies and research related to the IoT. Then, the researchers also used quantitative methodology to examine the factors affecting the obstacles and potential benefits of IoT. The data were collected by using a questionnaire distributed online among academic staff and a total of 150 participants completed the survey. Finding: the result of this study reveals there are twelve factors that affect the potential benefits of using IoT such as reducing human errors, increasing business income and worker’s productivity. It also shows the eighteen factors which affect obstacles the IoT use, for example sensors’ cost, data privacy, and data security. These factors have the most influence on using IoT in Saudi universities.展开更多
Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sen...Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sensors and actuators improved by communication technologies to powerful computing systems utilizing advanced Artificial Intelligence(AI)algorithms have rapidly driven the development of MRS,so the Internet of Things(IoT)in MRS has become a new topic,namely the Internet of Robotic Things(IoRT).This paper summarizes a comprehensive survey of state-of-the-art technologies for mobile robots,including general architecture,benefits,challenges,practical applications,and future research directions.In addition,remarkable research of i)multirobot navigation,ii)network architecture,routing protocols and communications,and iii)coordination among robots as well as data analysis via external computing(cloud,fog,edge,edge-cloud)are merged with the IoRT architecture according to their applicability.Moreover,security is a long-term challenge for IoRT because of various attack vectors,security flaws,and vulnerabilities.Security threats,attacks,and existing solutions based on IoRT architectures are also under scrutiny.Moreover,the identification of environmental situations that are crucial for all types of IoRT applications,such as the detection of objects,human,and obstacles,is also critically reviewed.Finally,future research directions are given by analyzing the challenges of IoRT in mobile robots.展开更多
In this paper,the application of transportation systems in realtime traffic conditions is evaluated with data handling representations.The proposed method is designed in such a way as to detect the number of loads tha...In this paper,the application of transportation systems in realtime traffic conditions is evaluated with data handling representations.The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system.Compared to the existing approach,the design model in the proposed method is made by dividing the computing areas into several cluster regions,thereby reducing the complex monitoring system where control errors are minimized.Furthermore,a route management technique is combined with Artificial Intelligence(AI)algorithm to transmit the data to appropriate central servers.Therefore,the combined objective case studies are examined as minimization and maximization criteria,thus increasing the efficiency of the proposed method.Finally,four scenarios are chosen to investigate the projected design’s effectiveness.In all simulated metrics,the proposed approach provides better operational outcomes for an average percentage of 97,thereby reducing the amount of traffic in real-time conditions.展开更多
With the increased emphasis on data security in the Internet of Things(IoT), blockchain has received more and more attention.Due to the computing consuming characteristics of blockchain, mobile edge computing(MEC) is ...With the increased emphasis on data security in the Internet of Things(IoT), blockchain has received more and more attention.Due to the computing consuming characteristics of blockchain, mobile edge computing(MEC) is integrated into IoT.However, how to efficiently use edge computing resources to process the computing tasks of blockchain from IoT devices has not been fully studied.In this paper, the MEC and blockchain-enhanced IoT is considered.The transactions recording the data or other application information are generated by the IoT devices, and they are offloaded to the MEC servers to join the blockchain.The practical Byzantine fault tolerance(PBFT) consensus mechanism is used among all the MEC servers which are also the blockchain nodes, and the latency of the consensus process is modeled with the consideration of characteristics of the wireless network.The joint optimization problem of serving base station(BS) selection and wireless transmission resources allocation is modeled as a Markov decision process(MDP), and the long-term system utility is defined based on task reward, credit value, the latency of infrastructure layer and blockchain layer, and computing cost.A double deep Q learning(DQN) based transactions offloading algorithm(DDQN-TOA) is proposed, and simulation results show the advantages of the proposed algorithm in comparison to other methods.展开更多
the world is experiencing a strong rush towards modern technology, while specialized companies are living a terrible rush in the information technology towards the so-called Internet of things IoT or Internet of objec...the world is experiencing a strong rush towards modern technology, while specialized companies are living a terrible rush in the information technology towards the so-called Internet of things IoT or Internet of objects,</span><span style="font-family:""> </span><span style="font-family:Verdana;">which is the integration of things with the world of Internet, by adding hardware or/and software to be smart and so be able to communicate with each other and participate effectively in all aspects of daily life,</span><span style="font-family:""> </span><span style="font-family:Verdana;">so enabling new forms of communication between people and things, and between things themselves, that’s will change the traditional life into a high style of living. But it won’t be easy, because there are still many challenges an</span><span style="font-family:Verdana;">d</span><span style="font-family:Verdana;"> issues that need to be addressed and have to be viewed from various aspects to realize </span><span style="font-family:Verdana;">their</span><span style="font-family:Verdana;"> full potential. The main objective of this review paper will provide the reader with a detailed discussion from a technological and social perspective. The various IoT challenges and issues, definition and architecture were discussed. Furthermore, a description of several sensors and actuators and </span><span style="font-family:Verdana;">their</span><span style="font-family:Verdana;"> smart communication. Also, the most important application areas of IoT were presented. This work will help readers and researchers understand the IoT and its potential application in the real world.展开更多
Internet of things (IoT) has become an interesting topic in the field of technological research. It is basically interconnecting of devices with each other over the internet. Beside its general use in terms of autonom...Internet of things (IoT) has become an interesting topic in the field of technological research. It is basically interconnecting of devices with each other over the internet. Beside its general use in terms of autonomous cars and smart homes, but some of the best applications of IoT technology in fields of health care monitoring is worth mentioning. The main purpose of this research work is to provide comport services for patients. It can be used to promote basic nursing care by improving the quality of care and patient safety from patient home environment. Rural area of a country lacks behind the proper patient monitoring system. So, remote monitoring and prescribing by sharing medical information in an authenticated manner is very effective for betterment of medical facilities in rural area. We have proposed a healthcare system which can analyze ECG report using supervise machine learning techniques. Analyzing report can be stored in cloud platform which can be further used to prescribe by the experienced medical practitioner. For performance evaluation, ECG data is analyzed using six supervised machine learning algorithms. Data sets are divided into two groups: 75 percent data for training the model and rest 25 percent data for testing. To avoid any kind of anomalies or repetitions, cross validation and random train-test split was used to obtain the result as accurate as possible.展开更多
This paper presents a comprehensive review of emerging technologies for the internet of things(IoT)-based smart agriculture.We begin by summarizing the existing surveys and describing emergent technologies for the agr...This paper presents a comprehensive review of emerging technologies for the internet of things(IoT)-based smart agriculture.We begin by summarizing the existing surveys and describing emergent technologies for the agricultural IoT,such as unmanned aerial vehicles,wireless technologies,open-source IoT platforms,software defined networking(SDN),network function virtualization(NFV)technologies,cloud/fog computing,and middleware platforms.We also provide a classification of IoT applications for smart agriculture into seven categories:including smart monitoring,smart water management,agrochemicals applications,disease management,smart harvesting,supply chain management,and smart agricultural practices.Moreover,we provide a taxonomy and a side-by-side comparison of the state-ofthe-art methods toward supply chain management based on the blockchain technology for agricultural IoTs.Furthermore,we present real projects that use most of the aforementioned technologies,which demonstrate their great performance in the field of smart agriculture.Finally,we highlight open research challenges and discuss possible future research directions for agricultural IoTs.展开更多
Ubiquitous data monitoring and processing with minimal latency is one of the crucial challenges in real-time and scalable applications.Internet of Things(IoT),fog computing,edge computing,cloud computing,and the edge ...Ubiquitous data monitoring and processing with minimal latency is one of the crucial challenges in real-time and scalable applications.Internet of Things(IoT),fog computing,edge computing,cloud computing,and the edge of things are the spine of all real-time and scalable applications.Conspicuously,this study proposed a novel framework for a real-time and scalable application that changes dynamically with time.In this study,IoT deployment is recommended for data acquisition.The Pre-Processing of data with local edge and fog nodes is implemented in this study.The thresholdoriented data classification method is deployed to improve the intrusion detection mechanism’s performance.The employment of machine learningempowered intelligent algorithms in a distributed manner is implemented to enhance the overall response rate of the layered framework.The placement of respondent nodes near the framework’s IoT layer minimizes the network’s latency.For economic evaluation of the proposed framework with minimal efforts,EdgeCloudSim and FogNetSim++simulation environments are deployed in this study.The experimental results confirm the robustness of the proposed system by its improvised threshold-oriented data classification and intrusion detection approach,improved response rate,and prediction mechanism.Moreover,the proposed layered framework provides a robust solution for real-time and scalable applications that changes dynamically with time.展开更多
The advancement of the Internet of Things(IoT)brings new opportunities for collecting real-time data and deploying machine learning models.Nonetheless,an individual IoT device may not have adequate computing resources...The advancement of the Internet of Things(IoT)brings new opportunities for collecting real-time data and deploying machine learning models.Nonetheless,an individual IoT device may not have adequate computing resources to train and deploy an entire learning model.At the same time,transmitting continuous real-time data to a central server with high computing resource incurs enormous communication costs and raises issues in data security and privacy.Federated learning,a distributed machine learning framework,is a promising solution to train machine learning models with resource-limited devices and edge servers.Yet,the majority of existing works assume an impractically synchronous parameter update manner with homogeneous IoT nodes under stable communication connections.In this paper,we develop an asynchronous federated learning scheme to improve training efficiency for heterogeneous IoT devices under unstable communication network.Particularly,we formulate an asynchronous federated learning model and develop a lightweight node selection algorithm to carry out learning tasks effectively.The proposed algorithm iteratively selects heterogeneous IoT nodes to participate in the global learning aggregation while considering their local computing resource and communication condition.Extensive experimental results demonstrate that our proposed asynchronous federated learning scheme outperforms the state-of-the-art schemes in various settings on independent and identically distributed(i.i.d.)and non-i.i.d.data distribution.展开更多
Exploiting random access for the underlying connectivity provisioning has great potential to incorporate massive machine-type communication(MTC)devices in an Internet of Things(Io T)network.However,massive access atte...Exploiting random access for the underlying connectivity provisioning has great potential to incorporate massive machine-type communication(MTC)devices in an Internet of Things(Io T)network.However,massive access attempts from versatile MTC devices may bring congestion to the IIo T network,thereby hindering service increasing of IIo T applications.In this paper,an intelligence enabled physical(PHY-)layer user signature code acquisition(USCA)algorithm is proposed to overcome the random access congestion problem with reduced signaling and control overhead.In the proposed scheme,the detector aims at approximating the optimal observation on both active user detection and user data reception by iteratively learning and predicting the convergence of the user signature codes that are in active.The crossentropy based low-complexity iterative updating rule is present to guarantee that the proposed USCA algorithm is computational feasible.A closed-form bit error rate(BER)performance analysis is carried out to show the efficiency of the proposed intelligence USCA algorithm.Simulation results confirm that the proposed USCA algorithm provides an inherent tradeoff between performance and complexity and allows the detector achieves an approximate optimal performance with a reasonable computational complexity.展开更多
With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originatin...With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originating from IoT devices.In this paper we propose an innovative trust model for IoT devices to prevent potential DDoS attacks by evaluating their trustworthiness,which can be deployed in the access network of 6G IoT.Based on historical communication behaviors,this model combines spatial trust and temporal trust values to comprehensively characterize the normal behavior patterns of IoT devices,thereby effectively distinguishing attack traffic.Experimental results show that the proposed method can efficiently distinguish normal traffic from DDoS traffic.Compared with the benchmark methods,our method has advantages in terms of both accuracy and efficiency in identifying attack flows.展开更多
The Internet of Things(IoT)will significantly impact our social and economic lives in the near future.Many Internet of Things(IoT)applications aim to automate multiple tasks so inactive physical objects can behave ind...The Internet of Things(IoT)will significantly impact our social and economic lives in the near future.Many Internet of Things(IoT)applications aim to automate multiple tasks so inactive physical objects can behave independently of others.IoT devices,however,are also vulnerable,mostly because they lack the essential built-in security to thwart attackers.It is essential to perform the necessary adjustments in the structure of the IoT systems in order to create an end-to-end secure IoT environment.As a result,the IoT designs that are now in use do not completely support all of the advancements that have been made to include sophisticated features in IoT,such as Cloud computing,machine learning techniques,and lightweight encryption techniques.This paper presents a detailed analysis of the security requirements,attack surfaces,and security solutions available for IoT networks and suggests an innovative IoT architecture.The Seven-Layer Architecture in IoT provides decent attack detection accuracy.According to the level of risk they pose,the security threats in each of these layers have been properly categorized,and the essential evaluation criteria have been developed to evaluate the various threats.Also,Machine Learning algorithms like Random Forest and Support Vector Machines,etc.,and Deep Learning algorithms like Artificial Neural Networks,Q Learning models,etc.,are implemented to overcome the most damaging threats posing security breaches to the different IoT architecture layers.展开更多
Recently,sharded-blockchain has attracted more and more attention.Its inherited immutabili-ty,decentralization,and promoted scalability effectively address the trust issue of the data sharing in the Internet of Things...Recently,sharded-blockchain has attracted more and more attention.Its inherited immutabili-ty,decentralization,and promoted scalability effectively address the trust issue of the data sharing in the Internet of Things(IoT).Nevertheless,the traditional random allocation between validator groups and transaction pools ignores the differences of shards,which reduces the overall system per-formance due to the unbalance between computing capacity and transaction load.To solve this prob-lem,a load balance optimization framework for sharded-blockchain enabled IoT is proposed,where the allocation between the validator groups and transaction pools is implemented reasonably by deep reinforcement learning(DRL).Specifically,based on the theoretical analysis of the intra-shard consensus and the final system consensus,the optimization of system performance is formed as a Markov decision process(MDP),and the allocation of the transaction pools,the block size,and the block interval are jointly trained in the DRL agent.The simulation results show that the proposed scheme improves the scalability of the sharded blockchain system for IoT.展开更多
The Internet of Things(IoT)has revolutionized how we interact with and gather data from our surrounding environment.IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to...The Internet of Things(IoT)has revolutionized how we interact with and gather data from our surrounding environment.IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to derive valuable insights.The rapid proliferation of Internet of Things(IoT)devices has ushered in an era of unprecedented data generation and connectivity.These IoT devices,equipped with many sensors and actuators,continuously produce vast volumes of data.However,the conventional approach of transmitting all this data to centralized cloud infrastructures for processing and analysis poses significant challenges.However,transmitting all this data to a centralized cloud infrastructure for processing and analysis can be inefficient and impractical due to bandwidth limitations,network latency,and scalability issues.This paper proposed a Self-Learning Internet Traffic Fuzzy Classifier(SLItFC)for traffic data analysis.The proposed techniques effectively utilize clustering and classification procedures to improve classification accuracy in analyzing network traffic data.SLItFC addresses the intricate task of efficiently managing and analyzing IoT data traffic at the edge.It employs a sophisticated combination of fuzzy clustering and self-learning techniques,allowing it to adapt and improve its classification accuracy over time.This adaptability is a crucial feature,given the dynamic nature of IoT environments where data patterns and traffic characteristics can evolve rapidly.With the implementation of the fuzzy classifier,the accuracy of the clustering process is improvised with the reduction of the computational time.SLItFC can reduce computational time while maintaining high classification accuracy.This efficiency is paramount in edge computing,where resource constraints demand streamlined data processing.Additionally,SLItFC’s performance advantages make it a compelling choice for organizations seeking to harness the potential of IoT data for real-time insights and decision-making.With the Self-Learning process,the SLItFC model monitors the network traffic data acquired from the IoT Devices.The Sugeno fuzzy model is implemented within the edge computing environment for improved classification accuracy.Simulation analysis stated that the proposed SLItFC achieves 94.5%classification accuracy with reduced classification time.展开更多
The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the d...The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device itself.Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features.This paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in homes.We have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT devices.Our system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing devices.We have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache server.The feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time settings.It is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation systems.Additionally,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber threats.The trial results support the proposed system and demonstrate its potential for use in everyday life.展开更多
Far-field wireless power transfer(WPT)is a major breakthrough technology that will enable the many anticipated ubiquitous Internet of Things(IoT)applications associated with fifth generation(5G),sixth generation(6G),a...Far-field wireless power transfer(WPT)is a major breakthrough technology that will enable the many anticipated ubiquitous Internet of Things(IoT)applications associated with fifth generation(5G),sixth generation(6G),and beyond wireless ecosystems.Rectennas,which are the combination of rectifying circuits and antennas,are the most critical components in far-field WPT systems.However,compact application devices require even smaller integrated rectennas that simultaneously have large electromagnetic wave capture capabilities,high alternating current(AC)-to-direct current(DC)(AC-to-DC)conversion efficiencies,and facilitate a multifunctional wireless performance.This paper reviews various rectenna miniaturization techniques such as meandered planar inverted-F antenna(PIFA)rectennas;miniaturized monopole-and dipole-based rectennas;fractal loop and patch rectennas;dielectric-loaded rectennas;and electrically small near-field resonant parasitic rectennas.Their performance characteristics are summarized and then compared with our previously developed electrically small Huygens rectennas that are proven to be more suitable for IoT applications.They have been tailored,for example,to achieve batteryfree IoT sensors as is demonstrated in this paper.Battery-free,wirelessly powered devices are smaller and lighter in weight in comparison to battery-powered devices.Moreover,they are environmentally friendly and,hence,have a significant societal benefit.A series of high-performance electrically small Huygens rectennas are presented including Huygens linearly-polarized(HLP)and circularly-polarized(HCP)rectennas;wirelessly powered IoT sensors based on these designs;and a dual-functional HLP rectenna and antenna system.Finally,two linear uniform HLP rectenna array systems are considered for significantly larger wireless power capture.Example arrays illustrate how they can be integrated advantageously with DC or radio frequency(RF)power-combining schemes for practical IoT applications.展开更多
The rapid development of the Internet of Things(IoT)in the industrial domain has led to the new term the Industrial Internet of Things(IIoT).The IIoT includes several devices,applications,and services that connect the...The rapid development of the Internet of Things(IoT)in the industrial domain has led to the new term the Industrial Internet of Things(IIoT).The IIoT includes several devices,applications,and services that connect the physical and virtual space in order to provide smart,cost-effective,and scalable systems.Although the IIoT has been deployed and integrated into a wide range of industrial control systems,preserving security and privacy of such a technology remains a big challenge.An anomaly-based Intrusion Detection System(IDS)can be an effective security solution for maintaining the confidentiality,integrity,and availability of data transmitted in IIoT environments.In this paper,we propose an intelligent anomalybased IDS framework in the context of fog-to-things communications to decentralize the cloud-based security solution into a distributed architecture(fog nodes)near the edge of the data source.The anomaly detection system utilizes minimum redundancy maximum relevance and principal component analysis as the featured engineering methods to select the most important features,reduce the data dimensionality,and improve detection performance.In the classification stage,anomaly-based ensemble learning techniques such as bagging,LPBoost,RUSBoost,and Adaboost models are implemented to determine whether a given flow of traffic is normal or malicious.To validate the effectiveness and robustness of our proposed model,we evaluate our anomaly detection approach on a new driven IIoT dataset called XIIoTID,which includes new IIoT protocols,various cyberattack scenarios,and different attack protocols.The experimental results demonstrated that our proposed anomaly detection method achieved a higher accuracy rate of 99.91%and a reduced false alarm rate of 0.1%compared to other recently proposed techniques.展开更多
The Internet of Things(IoT)has been deployed in diverse critical sectors with the aim of improving quality of service and facilitating human lives.The IoT revolution has redefined digital services in different domains...The Internet of Things(IoT)has been deployed in diverse critical sectors with the aim of improving quality of service and facilitating human lives.The IoT revolution has redefined digital services in different domains by improving efficiency,productivity,and cost-effectiveness.Many service providers have adapted IoT systems or plan to integrate them as integral parts of their systems’operation;however,IoT security issues remain a significant challenge.To minimize the risk of cyberattacks on IoT networks,anomaly detection based on machine learning can be an effective security solution to overcome a wide range of IoT cyberattacks.Although various detection techniques have been proposed in the literature,existing detection methods address limited cyberattacks and utilize outdated datasets for evaluations.In this paper,we propose an intelligent,effective,and lightweight detection approach to detect several IoT attacks.Our proposed model includes a collaborative feature selection method that selects the best distinctive features and eliminates unnecessary features to build an effective and efficient detection model.In the detection phase,we also proposed an ensemble of learning techniques to improve classification for predicting several different types of IoT attacks.The experimental results show that our proposed method can effectively and efficiently predict several IoT attacks with a higher accuracy rate of 99.984%,a precision rate of 99.982%,a recall rate of 99.984%,and an F1-score of 99.983%.展开更多
Smart appliances and renewable energy resources are becoming an integral part of smart homes. Nowadays,home appliances are communicating with each other with home gateways,using existing short-range home area network ...Smart appliances and renewable energy resources are becoming an integral part of smart homes. Nowadays,home appliances are communicating with each other with home gateways,using existing short-range home area network communication protocols such as Zig Bee,Bluetooth,RFID,and Wi Fi. A Gateway allows homeowners and utilities to communicate remotely with the appliances via long-range communication networks such as GPRS,Wi Max,LTE,and power liner carrier. This paper utilizes the Internet of Things(Io T) concepts to monitor and control home appliances. Moreover,this paper proposes a framework that enables the integration and the coordination of Human-to-Appliance,Utility-toAppliance,and Appliance-to-Appliance. Utilizing the concepts of Internet of Things leads to one standard communication protocols,TCP/IPV6,which overcomes the many diverse home area networks and neighborhood area networks protocols. This work proposes a cloud based framework that enables the Io Ts integration and supports the coordination between devices,as well as with device-human interaction. A prototype is designed,implemented,and tested to validate the proposed solution.1 Index TermsInternet of things(Io T),Internet of things(Io T) cloud framework,smart homes,smart appliances.展开更多
基金supported in part by the National Natural Science Foundation of China (62072248, 62072247)the Jiangsu Agriculture Science and Technology Innovation Fund (CX(21)3060)。
文摘Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.
文摘Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of things (devices) that can be connected through the internet. The purpose: this paper aims to explore the concept of the Internet of Things (IoT) generally and outline the main definitions of IoT. The paper also aims to examine and discuss the obstacles and potential benefits of IoT in Saudi universities. Methodology: the researchers reviewed the previous literature and focused on several databases to use the recent studies and research related to the IoT. Then, the researchers also used quantitative methodology to examine the factors affecting the obstacles and potential benefits of IoT. The data were collected by using a questionnaire distributed online among academic staff and a total of 150 participants completed the survey. Finding: the result of this study reveals there are twelve factors that affect the potential benefits of using IoT such as reducing human errors, increasing business income and worker’s productivity. It also shows the eighteen factors which affect obstacles the IoT use, for example sensors’ cost, data privacy, and data security. These factors have the most influence on using IoT in Saudi universities.
基金This research was supported by the Ministry of Higher Education,Malaysia(MoHE)through Fundamental Research Grant Scheme(FRGS/1/2021/TK0/UTAR/02/9)The work was also supported by the Universiti Tunku Abdul Rahman(UTAR),Malaysia,under UTAR Research Fund(UTARRF)(IPSR/RMC/UTARRF/2021C1/T05).
文摘Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sensors and actuators improved by communication technologies to powerful computing systems utilizing advanced Artificial Intelligence(AI)algorithms have rapidly driven the development of MRS,so the Internet of Things(IoT)in MRS has become a new topic,namely the Internet of Robotic Things(IoRT).This paper summarizes a comprehensive survey of state-of-the-art technologies for mobile robots,including general architecture,benefits,challenges,practical applications,and future research directions.In addition,remarkable research of i)multirobot navigation,ii)network architecture,routing protocols and communications,and iii)coordination among robots as well as data analysis via external computing(cloud,fog,edge,edge-cloud)are merged with the IoRT architecture according to their applicability.Moreover,security is a long-term challenge for IoRT because of various attack vectors,security flaws,and vulnerabilities.Security threats,attacks,and existing solutions based on IoRT architectures are also under scrutiny.Moreover,the identification of environmental situations that are crucial for all types of IoRT applications,such as the detection of objects,human,and obstacles,is also critically reviewed.Finally,future research directions are given by analyzing the challenges of IoRT in mobile robots.
基金funded by the Research Management Centre(RMC),Universiti Malaysia Sabah,through the Journal Article Fund UMS/PPI-DPJ1.
文摘In this paper,the application of transportation systems in realtime traffic conditions is evaluated with data handling representations.The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system.Compared to the existing approach,the design model in the proposed method is made by dividing the computing areas into several cluster regions,thereby reducing the complex monitoring system where control errors are minimized.Furthermore,a route management technique is combined with Artificial Intelligence(AI)algorithm to transmit the data to appropriate central servers.Therefore,the combined objective case studies are examined as minimization and maximization criteria,thus increasing the efficiency of the proposed method.Finally,four scenarios are chosen to investigate the projected design’s effectiveness.In all simulated metrics,the proposed approach provides better operational outcomes for an average percentage of 97,thereby reducing the amount of traffic in real-time conditions.
基金Supported by the National Key Research and Development Program of China(No.2020YFC1807903)the Natural Science Foundation of Beijing Municipality(No.L192002)。
文摘With the increased emphasis on data security in the Internet of Things(IoT), blockchain has received more and more attention.Due to the computing consuming characteristics of blockchain, mobile edge computing(MEC) is integrated into IoT.However, how to efficiently use edge computing resources to process the computing tasks of blockchain from IoT devices has not been fully studied.In this paper, the MEC and blockchain-enhanced IoT is considered.The transactions recording the data or other application information are generated by the IoT devices, and they are offloaded to the MEC servers to join the blockchain.The practical Byzantine fault tolerance(PBFT) consensus mechanism is used among all the MEC servers which are also the blockchain nodes, and the latency of the consensus process is modeled with the consideration of characteristics of the wireless network.The joint optimization problem of serving base station(BS) selection and wireless transmission resources allocation is modeled as a Markov decision process(MDP), and the long-term system utility is defined based on task reward, credit value, the latency of infrastructure layer and blockchain layer, and computing cost.A double deep Q learning(DQN) based transactions offloading algorithm(DDQN-TOA) is proposed, and simulation results show the advantages of the proposed algorithm in comparison to other methods.
文摘the world is experiencing a strong rush towards modern technology, while specialized companies are living a terrible rush in the information technology towards the so-called Internet of things IoT or Internet of objects,</span><span style="font-family:""> </span><span style="font-family:Verdana;">which is the integration of things with the world of Internet, by adding hardware or/and software to be smart and so be able to communicate with each other and participate effectively in all aspects of daily life,</span><span style="font-family:""> </span><span style="font-family:Verdana;">so enabling new forms of communication between people and things, and between things themselves, that’s will change the traditional life into a high style of living. But it won’t be easy, because there are still many challenges an</span><span style="font-family:Verdana;">d</span><span style="font-family:Verdana;"> issues that need to be addressed and have to be viewed from various aspects to realize </span><span style="font-family:Verdana;">their</span><span style="font-family:Verdana;"> full potential. The main objective of this review paper will provide the reader with a detailed discussion from a technological and social perspective. The various IoT challenges and issues, definition and architecture were discussed. Furthermore, a description of several sensors and actuators and </span><span style="font-family:Verdana;">their</span><span style="font-family:Verdana;"> smart communication. Also, the most important application areas of IoT were presented. This work will help readers and researchers understand the IoT and its potential application in the real world.
文摘Internet of things (IoT) has become an interesting topic in the field of technological research. It is basically interconnecting of devices with each other over the internet. Beside its general use in terms of autonomous cars and smart homes, but some of the best applications of IoT technology in fields of health care monitoring is worth mentioning. The main purpose of this research work is to provide comport services for patients. It can be used to promote basic nursing care by improving the quality of care and patient safety from patient home environment. Rural area of a country lacks behind the proper patient monitoring system. So, remote monitoring and prescribing by sharing medical information in an authenticated manner is very effective for betterment of medical facilities in rural area. We have proposed a healthcare system which can analyze ECG report using supervise machine learning techniques. Analyzing report can be stored in cloud platform which can be further used to prescribe by the experienced medical practitioner. For performance evaluation, ECG data is analyzed using six supervised machine learning algorithms. Data sets are divided into two groups: 75 percent data for training the model and rest 25 percent data for testing. To avoid any kind of anomalies or repetitions, cross validation and random train-test split was used to obtain the result as accurate as possible.
基金supported in part by the Research Start-Up Fund for Talent Researcher of Nanjing Agricultural University(77H0603)in part by the National Natural Science Foundation of China(62072248)。
文摘This paper presents a comprehensive review of emerging technologies for the internet of things(IoT)-based smart agriculture.We begin by summarizing the existing surveys and describing emergent technologies for the agricultural IoT,such as unmanned aerial vehicles,wireless technologies,open-source IoT platforms,software defined networking(SDN),network function virtualization(NFV)technologies,cloud/fog computing,and middleware platforms.We also provide a classification of IoT applications for smart agriculture into seven categories:including smart monitoring,smart water management,agrochemicals applications,disease management,smart harvesting,supply chain management,and smart agricultural practices.Moreover,we provide a taxonomy and a side-by-side comparison of the state-ofthe-art methods toward supply chain management based on the blockchain technology for agricultural IoTs.Furthermore,we present real projects that use most of the aforementioned technologies,which demonstrate their great performance in the field of smart agriculture.Finally,we highlight open research challenges and discuss possible future research directions for agricultural IoTs.
文摘Ubiquitous data monitoring and processing with minimal latency is one of the crucial challenges in real-time and scalable applications.Internet of Things(IoT),fog computing,edge computing,cloud computing,and the edge of things are the spine of all real-time and scalable applications.Conspicuously,this study proposed a novel framework for a real-time and scalable application that changes dynamically with time.In this study,IoT deployment is recommended for data acquisition.The Pre-Processing of data with local edge and fog nodes is implemented in this study.The thresholdoriented data classification method is deployed to improve the intrusion detection mechanism’s performance.The employment of machine learningempowered intelligent algorithms in a distributed manner is implemented to enhance the overall response rate of the layered framework.The placement of respondent nodes near the framework’s IoT layer minimizes the network’s latency.For economic evaluation of the proposed framework with minimal efforts,EdgeCloudSim and FogNetSim++simulation environments are deployed in this study.The experimental results confirm the robustness of the proposed system by its improvised threshold-oriented data classification and intrusion detection approach,improved response rate,and prediction mechanism.Moreover,the proposed layered framework provides a robust solution for real-time and scalable applications that changes dynamically with time.
文摘The advancement of the Internet of Things(IoT)brings new opportunities for collecting real-time data and deploying machine learning models.Nonetheless,an individual IoT device may not have adequate computing resources to train and deploy an entire learning model.At the same time,transmitting continuous real-time data to a central server with high computing resource incurs enormous communication costs and raises issues in data security and privacy.Federated learning,a distributed machine learning framework,is a promising solution to train machine learning models with resource-limited devices and edge servers.Yet,the majority of existing works assume an impractically synchronous parameter update manner with homogeneous IoT nodes under stable communication connections.In this paper,we develop an asynchronous federated learning scheme to improve training efficiency for heterogeneous IoT devices under unstable communication network.Particularly,we formulate an asynchronous federated learning model and develop a lightweight node selection algorithm to carry out learning tasks effectively.The proposed algorithm iteratively selects heterogeneous IoT nodes to participate in the global learning aggregation while considering their local computing resource and communication condition.Extensive experimental results demonstrate that our proposed asynchronous federated learning scheme outperforms the state-of-the-art schemes in various settings on independent and identically distributed(i.i.d.)and non-i.i.d.data distribution.
基金supported in part by Natural Science Foundation of Heilongjiang Province of China under Grant YQ2021F003in part by the National Natural Science Foundation of China under Grant 61901140+1 种基金in part by China Postdoctoral Science Foundation Funded Project under Grant 2019M650067in part by Science and Technology on Communication Networks Laboratory under Grant SCX21641X003。
文摘Exploiting random access for the underlying connectivity provisioning has great potential to incorporate massive machine-type communication(MTC)devices in an Internet of Things(Io T)network.However,massive access attempts from versatile MTC devices may bring congestion to the IIo T network,thereby hindering service increasing of IIo T applications.In this paper,an intelligence enabled physical(PHY-)layer user signature code acquisition(USCA)algorithm is proposed to overcome the random access congestion problem with reduced signaling and control overhead.In the proposed scheme,the detector aims at approximating the optimal observation on both active user detection and user data reception by iteratively learning and predicting the convergence of the user signature codes that are in active.The crossentropy based low-complexity iterative updating rule is present to guarantee that the proposed USCA algorithm is computational feasible.A closed-form bit error rate(BER)performance analysis is carried out to show the efficiency of the proposed intelligence USCA algorithm.Simulation results confirm that the proposed USCA algorithm provides an inherent tradeoff between performance and complexity and allows the detector achieves an approximate optimal performance with a reasonable computational complexity.
基金This work was supported in part by the National Key R&D Program of China under Grant 2020YFA0711301in part by the National Natural Science Foundation of China under Grant 61922049,and Grant 61941104in part by the Tsinghua University-China Mobile Communications Group Company Ltd.,Joint Institute.
文摘With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originating from IoT devices.In this paper we propose an innovative trust model for IoT devices to prevent potential DDoS attacks by evaluating their trustworthiness,which can be deployed in the access network of 6G IoT.Based on historical communication behaviors,this model combines spatial trust and temporal trust values to comprehensively characterize the normal behavior patterns of IoT devices,thereby effectively distinguishing attack traffic.Experimental results show that the proposed method can efficiently distinguish normal traffic from DDoS traffic.Compared with the benchmark methods,our method has advantages in terms of both accuracy and efficiency in identifying attack flows.
文摘The Internet of Things(IoT)will significantly impact our social and economic lives in the near future.Many Internet of Things(IoT)applications aim to automate multiple tasks so inactive physical objects can behave independently of others.IoT devices,however,are also vulnerable,mostly because they lack the essential built-in security to thwart attackers.It is essential to perform the necessary adjustments in the structure of the IoT systems in order to create an end-to-end secure IoT environment.As a result,the IoT designs that are now in use do not completely support all of the advancements that have been made to include sophisticated features in IoT,such as Cloud computing,machine learning techniques,and lightweight encryption techniques.This paper presents a detailed analysis of the security requirements,attack surfaces,and security solutions available for IoT networks and suggests an innovative IoT architecture.The Seven-Layer Architecture in IoT provides decent attack detection accuracy.According to the level of risk they pose,the security threats in each of these layers have been properly categorized,and the essential evaluation criteria have been developed to evaluate the various threats.Also,Machine Learning algorithms like Random Forest and Support Vector Machines,etc.,and Deep Learning algorithms like Artificial Neural Networks,Q Learning models,etc.,are implemented to overcome the most damaging threats posing security breaches to the different IoT architecture layers.
基金Supported by the National Natural Science Foundation of China(No.61901011)the Foundation of Beijing Municipal Commission of Edu-cation(No.KM202010005017,KM202110005021).
文摘Recently,sharded-blockchain has attracted more and more attention.Its inherited immutabili-ty,decentralization,and promoted scalability effectively address the trust issue of the data sharing in the Internet of Things(IoT).Nevertheless,the traditional random allocation between validator groups and transaction pools ignores the differences of shards,which reduces the overall system per-formance due to the unbalance between computing capacity and transaction load.To solve this prob-lem,a load balance optimization framework for sharded-blockchain enabled IoT is proposed,where the allocation between the validator groups and transaction pools is implemented reasonably by deep reinforcement learning(DRL).Specifically,based on the theoretical analysis of the intra-shard consensus and the final system consensus,the optimization of system performance is formed as a Markov decision process(MDP),and the allocation of the transaction pools,the block size,and the block interval are jointly trained in the DRL agent.The simulation results show that the proposed scheme improves the scalability of the sharded blockchain system for IoT.
基金This research is funded by 2023 Henan Province Science and Technology Research Projects:Key Technology of Rapid Urban Flood Forecasting Based onWater Level Feature Analysis and Spatio-Temporal Deep Learning(No.232102320015)Henan Provincial Higher Education Key Research Project Program(Project No.23B520024)a Multi-Sensor-Based Indoor Environmental Parameters Monitoring and Control System.
文摘The Internet of Things(IoT)has revolutionized how we interact with and gather data from our surrounding environment.IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to derive valuable insights.The rapid proliferation of Internet of Things(IoT)devices has ushered in an era of unprecedented data generation and connectivity.These IoT devices,equipped with many sensors and actuators,continuously produce vast volumes of data.However,the conventional approach of transmitting all this data to centralized cloud infrastructures for processing and analysis poses significant challenges.However,transmitting all this data to a centralized cloud infrastructure for processing and analysis can be inefficient and impractical due to bandwidth limitations,network latency,and scalability issues.This paper proposed a Self-Learning Internet Traffic Fuzzy Classifier(SLItFC)for traffic data analysis.The proposed techniques effectively utilize clustering and classification procedures to improve classification accuracy in analyzing network traffic data.SLItFC addresses the intricate task of efficiently managing and analyzing IoT data traffic at the edge.It employs a sophisticated combination of fuzzy clustering and self-learning techniques,allowing it to adapt and improve its classification accuracy over time.This adaptability is a crucial feature,given the dynamic nature of IoT environments where data patterns and traffic characteristics can evolve rapidly.With the implementation of the fuzzy classifier,the accuracy of the clustering process is improvised with the reduction of the computational time.SLItFC can reduce computational time while maintaining high classification accuracy.This efficiency is paramount in edge computing,where resource constraints demand streamlined data processing.Additionally,SLItFC’s performance advantages make it a compelling choice for organizations seeking to harness the potential of IoT data for real-time insights and decision-making.With the Self-Learning process,the SLItFC model monitors the network traffic data acquired from the IoT Devices.The Sugeno fuzzy model is implemented within the edge computing environment for improved classification accuracy.Simulation analysis stated that the proposed SLItFC achieves 94.5%classification accuracy with reduced classification time.
基金funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2024R333)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device itself.Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features.This paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in homes.We have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT devices.Our system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing devices.We have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache server.The feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time settings.It is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation systems.Additionally,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber threats.The trial results support the proposed system and demonstrate its potential for use in everyday life.
基金supported by the University of Technology Sydney (UTS) Chancellor’s Postdoctoral Fellowship (PRO18-6147)Australian Research Council (ARC) Discovery Early Career Researcher Award (DECRA) (PRO20-9959)
文摘Far-field wireless power transfer(WPT)is a major breakthrough technology that will enable the many anticipated ubiquitous Internet of Things(IoT)applications associated with fifth generation(5G),sixth generation(6G),and beyond wireless ecosystems.Rectennas,which are the combination of rectifying circuits and antennas,are the most critical components in far-field WPT systems.However,compact application devices require even smaller integrated rectennas that simultaneously have large electromagnetic wave capture capabilities,high alternating current(AC)-to-direct current(DC)(AC-to-DC)conversion efficiencies,and facilitate a multifunctional wireless performance.This paper reviews various rectenna miniaturization techniques such as meandered planar inverted-F antenna(PIFA)rectennas;miniaturized monopole-and dipole-based rectennas;fractal loop and patch rectennas;dielectric-loaded rectennas;and electrically small near-field resonant parasitic rectennas.Their performance characteristics are summarized and then compared with our previously developed electrically small Huygens rectennas that are proven to be more suitable for IoT applications.They have been tailored,for example,to achieve batteryfree IoT sensors as is demonstrated in this paper.Battery-free,wirelessly powered devices are smaller and lighter in weight in comparison to battery-powered devices.Moreover,they are environmentally friendly and,hence,have a significant societal benefit.A series of high-performance electrically small Huygens rectennas are presented including Huygens linearly-polarized(HLP)and circularly-polarized(HCP)rectennas;wirelessly powered IoT sensors based on these designs;and a dual-functional HLP rectenna and antenna system.Finally,two linear uniform HLP rectenna array systems are considered for significantly larger wireless power capture.Example arrays illustrate how they can be integrated advantageously with DC or radio frequency(RF)power-combining schemes for practical IoT applications.
文摘The rapid development of the Internet of Things(IoT)in the industrial domain has led to the new term the Industrial Internet of Things(IIoT).The IIoT includes several devices,applications,and services that connect the physical and virtual space in order to provide smart,cost-effective,and scalable systems.Although the IIoT has been deployed and integrated into a wide range of industrial control systems,preserving security and privacy of such a technology remains a big challenge.An anomaly-based Intrusion Detection System(IDS)can be an effective security solution for maintaining the confidentiality,integrity,and availability of data transmitted in IIoT environments.In this paper,we propose an intelligent anomalybased IDS framework in the context of fog-to-things communications to decentralize the cloud-based security solution into a distributed architecture(fog nodes)near the edge of the data source.The anomaly detection system utilizes minimum redundancy maximum relevance and principal component analysis as the featured engineering methods to select the most important features,reduce the data dimensionality,and improve detection performance.In the classification stage,anomaly-based ensemble learning techniques such as bagging,LPBoost,RUSBoost,and Adaboost models are implemented to determine whether a given flow of traffic is normal or malicious.To validate the effectiveness and robustness of our proposed model,we evaluate our anomaly detection approach on a new driven IIoT dataset called XIIoTID,which includes new IIoT protocols,various cyberattack scenarios,and different attack protocols.The experimental results demonstrated that our proposed anomaly detection method achieved a higher accuracy rate of 99.91%and a reduced false alarm rate of 0.1%compared to other recently proposed techniques.
文摘The Internet of Things(IoT)has been deployed in diverse critical sectors with the aim of improving quality of service and facilitating human lives.The IoT revolution has redefined digital services in different domains by improving efficiency,productivity,and cost-effectiveness.Many service providers have adapted IoT systems or plan to integrate them as integral parts of their systems’operation;however,IoT security issues remain a significant challenge.To minimize the risk of cyberattacks on IoT networks,anomaly detection based on machine learning can be an effective security solution to overcome a wide range of IoT cyberattacks.Although various detection techniques have been proposed in the literature,existing detection methods address limited cyberattacks and utilize outdated datasets for evaluations.In this paper,we propose an intelligent,effective,and lightweight detection approach to detect several IoT attacks.Our proposed model includes a collaborative feature selection method that selects the best distinctive features and eliminates unnecessary features to build an effective and efficient detection model.In the detection phase,we also proposed an ensemble of learning techniques to improve classification for predicting several different types of IoT attacks.The experimental results show that our proposed method can effectively and efficiently predict several IoT attacks with a higher accuracy rate of 99.984%,a precision rate of 99.982%,a recall rate of 99.984%,and an F1-score of 99.983%.
基金supported in part by the Department of Computer Science and Engineering at the American University of Sharjah,UAE
文摘Smart appliances and renewable energy resources are becoming an integral part of smart homes. Nowadays,home appliances are communicating with each other with home gateways,using existing short-range home area network communication protocols such as Zig Bee,Bluetooth,RFID,and Wi Fi. A Gateway allows homeowners and utilities to communicate remotely with the appliances via long-range communication networks such as GPRS,Wi Max,LTE,and power liner carrier. This paper utilizes the Internet of Things(Io T) concepts to monitor and control home appliances. Moreover,this paper proposes a framework that enables the integration and the coordination of Human-to-Appliance,Utility-toAppliance,and Appliance-to-Appliance. Utilizing the concepts of Internet of Things leads to one standard communication protocols,TCP/IPV6,which overcomes the many diverse home area networks and neighborhood area networks protocols. This work proposes a cloud based framework that enables the Io Ts integration and supports the coordination between devices,as well as with device-human interaction. A prototype is designed,implemented,and tested to validate the proposed solution.1 Index TermsInternet of things(Io T),Internet of things(Io T) cloud framework,smart homes,smart appliances.