IEEE 2017 / 18 - Internet of Things (IOT) Projects


IEEE 2017:  Child Safety Wearable Device

Abstract: This paper discusses the concept of a smart wearable device for little children. The major advantage of this wearable over other wearable is that it can be used in any cell phone and doesn't necessarily require an expensive smart phone and not a very tech savvy individual to operate. The purpose of this device is to help parents locate their children with ease. At the moment there are many wearable’s in the market which help track the daily activity of children and also help find the child using Wi-Fi and Bluetooth services present on the device. But Wi-Fi and Bluetooth appear to be an unreliable medium of communication between the parent and child. Therefore, the focus of this paper is to have an SMS text enabled communication medium between the child's wearable and the parent as the environment for GSM mobile communication is almost present everywhere. The parent can send a text with specific keywords such as "LOCATION" "TEMPERA TURE" "UV" "SOS" "BUZZ", etc., the wearable device will reply back with a text containing the real time accurate location of the child which upon tapping will provide directions to the child's location on Google maps app and will also provide the surrounding temperature, UV radiation index so that the parents can keep track if the temperature or UV radiation is not suitable for the child. The Prime motivation behind this project  is that we know how important technology is in our lives but it can sometimes can't be trusted, and we always need to have a secondary measure at hand. The secondary measure used in this project is the people present in the surrounding of the child who could instantly react for the Child’s safety till the parents arrives or they could contact the parents and help locate them. The secondary measure implemented was using a bright SOS Light and distress alarm buzzer present on the wearable device which when activated by the parents via SMS text should display the SOS signal brightly and sound an alarm which a bystander can easily spot as a sign of distress.


IEEE 2017:  Blind Aid Stick: Hurdle Recognition, Simulated Perception, Android Integrated Voice Based Cooperation via GPS Along With Panic Alert System
Abstract: Evolution of technology has always been endeavored with making daily life simple. With a fast paced life everybody today is harnessing the benefits of technology except some parts of the society .One of them is the visually impaired who have to rely on others for travelling and other activities. This paper aims at providing one such theoretical model which incorporates the latest technologies to provide efficient and smart electronic aid to the blind. We have used IR sensors along with ultrasonic range finder circuit for hurdle detection. Bluetooth module which along with GPS technology and an Android application for blind, will provide voice assistance to desired location and in panic situations will send SMS alert to registered mobile numbers The basic objective of the system is to provide a convenient and easy navigation aid for unsighted which helps in artificial vision by providing information about the environmental scenario of static and dynamic objects around them.


IEEE 2017:  Poster Abstract: Data-Centric IoT Services Provisioning in Fog-Cloud Computing Systems
Abstract: Fog computing is mainly proposed for IoT applications that are geospatially distributed, large-scale, and latency sensitive. .is poses new research challenges in real-time and scalable provisioning of IoT services distributed across Fog-Cloud computing platforms. Data-centric IoT services, as a dominant type of IoT services in large-scale deployments, require design solutions to speed up data processing and noti€cation, and scale up with the data volume. In this paper, we propose a service-oriented design architecture which is particularly focused on provisioning and processing data-centric IoT services over Fog-Cloud systems. In the proposed architecture, data-centric IoT services are organized in a service integrating tree structure, adhering to the hierarchical fog-based IoT computing models. A service node in the tree is empowered with features for real-time service data noti€cation, local data processing and multi-level IoT data access. .e initial results show that, along the design advantages of the proposed model, it does not impose any additional overhead as compared to state-of-the-art solutions.

IEEE 2017:  An NFC featured three level authentication system for tenable transaction and abridgment of ATM card blocking intricacies

Abstract: The flexible use of credit and debit card transactions has become increasingly ubiquitous and so have the associated vulnerabilities that make them a common target for cyber criminals. Furthermore, a prevalent complication associated with blocking of ATM cards involves tedious interactive processes and even possibly long waiting times during interaction with customer care services. Using a three factor authentication scheme employing NFC (Near Field Communication: an emerging technology evolved from a combination of contact-less identification and inter connection providing data exchange), Dash Matrix Algorithm and One-time password, we describe and quantify the potential to overcome common transaction liabilities (brute force attack, Shoulder surfing, skimming of ATM cards, etc.). The auxiliary feature of blocking ATM cards is implemented using a QR code authentication scheme and NFC technology, implemented both in NFC enabled phones and non-NFC phones (with the help of an NFC transmitter, receiver and Bluetooth). The proposed system, therefore, ensures both secure usage of ATM cards and cost effectiveness by utility of novel and increasingly common technology, when also simultaneously proving to be user.

IEEE 2017:  A Provably Secure General Construction for Key Exchange Protocols Using Smart Card and Password
Abstract: Key exchange protocols using both smart card and password are widely used nowadays since they provide greater convenience and stronger security than protocols using only a password. Most of these protocols are often limited to simple network systems, and they may have security risks. We propose a general construction for key exchange protocols using smart card and password to avoid these flaws. The constructed protocol from the general construction has only one additional communication round than the original public encryption scheme. This construction is proven secure under random oracle model, so it can resist several common types of attacks. It is also adapted well to various networks. Compared with related protocols, the proposed key exchange protocol generated from the general construction has better secure properties and good computational efficiency in storage cost and operation time.

IEEE 2017:  Wearable 2.0: Enabling Human-Cloud Integration in Next Generation Healthcare Systems
Abstract: With the rapid development of the Internet of Things, cloud computing, and big data, more comprehensive and powerful applications become available. Meanwhile, people pay more attention to higher QoE and QoS in a “terminal- Cloud” integrated system. Specifically, both advanced terminal technologies (e.g., smart clothing) and advanced cloud technologies (e.g., big data analytics and cognitive computing in clouds) are expected to provide people with more reliable and intelligent services. We propose a Wearable 2.0 healthcare system to improve QoE and QoS of the next generation healthcare system. In the proposed system, washable smart clothing, which consists of sensors, electrodes, and wires, is the critical component to collect users’ physiological data and receive the analysis results of users’ health and emotional status provided by cloud-based machine intelligence.


IEEE 2017:  IOT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT
Abstract: With the rapid growth of the Internet-of-Things(IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from Flawed security designs and implementations. They also tend to lack mechanisms for firmware updates or patches that can help eliminate security vulnerabilities. Securing networks where the presence of such vulnerable devices is given, requires a brownfield approach: applying necessary protection measures within the network so that potentially vulnerable devices can coexist without endangering the security of other devices in the same network. In this paper, we present IOT SENTINEL, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise. We show that IOT SENTINEL is effective in identifying device types and has minimal performance overhead.


IEEE 2016: Cloud Based Web Application Supporting Vehicle Toll Payment System

Abstract: The requirements for new web applications supporting different types of devices and purposes are continuously growing. The main advantages of web application development as well as popular development features covering integration with different technologies are considered initially in this paper. Integration and possibilities of application of cloud based web applications in real scenarios with different embedded Internet of Things (loT) devices are considered and described in this paper. The design and implementation of a cloud based web application supporting vehicle toll payment system using loT device is presented and described. The development framework as well as featured and popular technologies used to realize a vehicle toll payment by loT device is described. The concept of vehicle toll payment over an online payment system is also described. Processing, monitoring and control in the cloud based web application of such payments using loT devices are described and presented.


IEEE 2016: HIVE: Home Automation System for Intrusion Detection

Abstract: Home intrusion plays a role and requires a system to notify and activate homeowners to be alert and protect their home assets in time. HIVE is proposed for home intrusion detection and devised in three parts. First, sensor manager is composed of sensor manager acting as ZigBee coordinator communicating with ZigBee sensors and actuators. Three different sensor types are passive infrared for detecting motion, magnetic switch for opening/closing of door detection, and load cell for the weight gauge from pressing steps on the floor. Two actuators, composing of piezo alarm and LED, are activated by sensor manager. Second, Firebase is developed as cloud database and user authentication service. Third, an android application is deployed for end-user for monitoring, configuring, and being notified remotely. As a result, sensor and actuator modules can join the ZigBee network automatically. Sensor Manager sends updated sensors' and actuators' data to Firebase, consequently, home users can be notified intrusion events via the android application, and remotely configure events, sensors, and actuators anywhere anytime via the Internet. Therefore, this system can enhance security and safety for home assets.


IEEE 2016: Fog Computing May Help to Save Energy in Cloud Computing

Abstract: Tiny computers located in end-user premises are becoming popular as local servers for Internet of Things (IoT) and Fog computing services. These highly distributed servers that can host and distribute content and applications in a peer-to-peer (P2P) fashion are known as nano data centers (nDCs). Despite the growing popularity of nano servers, their energy consumption is not well-investigated. To study energy consumption of nDCs, we propose and use flow-based and time-based energy consumption models for shared and unshared network equipment, respectively. To apply and validate these models, a set of measurements and experiments are performed to compare energy consumption of a service provided by nDCs and centralized data centers (DCs). A number of findings emerge from our study, including the factors in the system design that allow nDCs to consume less energy than its centralized counterpart. These include the type of access network attached to nano servers and nano server‟s time utilization (the ratio of the idle time to active time). Additionally, the type of applications running on nDCs and factors such as number of downloads, number of updates, and amount of preloaded copies of data influence the energy cost. Our results reveal that number of hops between a user and content has little impact in the total energy consumption compared to the above-mentioned factors. We show that nano servers in Fog computing can complement centralized DCs to serve certain applications, mostly IoT applications for which the source of data is in end-user premises, and lead to energy saving if the applications (or a part of them) are off-loadable from centralized DCs and run on nDCs.


IEEE 2016: RISE: Role-based Internet of Things Service Environment

Abstract: Internet of Things (IoT) devices are predicated to reach 50 billion by 2022. Therefore, the IoT device data is too large to be managed efficiently by the existing platforms. Because of huge data centralized on the IoT platform, the privacy issues are on the rise due to some sensitive data that able to expose secretly and indirect way. So, we propose the role-based IoT service environment that is decentralized manner architecture. Moreover, we show the evaluation and implementation results according to the example scenario.



IEEE 2015: Smart Garbage Collection System in Residential Area

Abstract: As the name suggests we are developing an Automatic garbage collection and information gathering system which is based on Image processing as well as on GSM module. The main concept is that a Camera will be placed at every garbage collection point along with load cell sensor at bottom of the garbage can. The camera will take continuous snapshots of the garbage can. A threshold level is set which compares the output of camera and load sensor .The comparison is done with help of microcontroller. After analysing theimage we get an idea about level of garbage in the can and from the load cell sensor we get to know weight of garbage. Accordingly information is processed that is controller checks if the threshold level is exceeded or not. The controller sends a message with the help of GSM module to Garbage collection local central office to notify that garbage can is exceeded its capacity and disposal of waste is required. Accordingly the authority sends the garbage can collecting vehicle to collect the garbage, which is done with the help of robot mechanism.


IEEE 2015: NFC Based Secure Mobile Healthcare System

Abstract: With the recent increase in usage of mobile devices especially in developing countries, they can be used for an efficient healthcare management. In this work, we have proposed a novel architecture for improving health care system with the help of Android based mobile devices with NFC [II and Bluetooth interfaces, smartcard technology on tamper resistant secure element (SE) for storing credentials and secure data, and a HealthSecure service on a hybrid cloud for security and health record management. The main contribution of this paper is proposal of applications for i) Secure Medical Tags for reducing medical errors and ii) Secure Healthcard for storing Electronic Health Record (EHR) based on Secure NFC Tags, mobile device using NFC P2P Mode or Card Emulation Mode. We have also briefly mentioned a basic security framework requirement for the applications. Since NFC NDEF format is prone to security attacks [2], we have utilized low level APIs on Android based mobile devices, to securely access NFC tags such as MIF ARE Classic tags with NFC-A (ISO I443-3A) properties. Simple touch of NFC enabled mobile devices can benefit both the patient as well as the medical doctors by providing a robust and secure health flow. It can also provide portability of devices and usability for health management in emergency situation, overpopulated hospitals and remote locations.





























































IEEE 2016: Centralized Web Application Supporting Vehicle Toll Payment System

IST-Africa 2016 on Internet of Things


Abstract— The requirements for new web applications supporting different types of devices and purposes are continuously growing. The main advantages of web application development as well as popular development features covering integration with different technologies are considered initially in this paper. Integration and possibilities of application of Centralized web applications in real scenarios with different embedded Internet of Things (IOT) devices are considered and described in this paper. The design and implementation of a centralized web application supporting vehicle toll payment system using IOT device is presented and described. The development frameworks as well as featured and popular technologies used to realize a vehicle toll payment by IOT device are described. The concept of vehicle toll payment over an online payment system is also described. Processing, monitoring and control in the centralized web application of such payments using IOT devices are described and presented.



IEEE 2016: RISE: Role-based Internet of Things Service Environment

IST-Africa 2016 on Internet of Things

Abstract—Internet of Things (IoT) devices are predicated to reach 50 billion by 2022. Therefore, the IoT device data is too large to be managed efficiently by the existing platforms. The IoT enables devices to sense surrounding situations and to perform certain motion by connecting them through the various internet protocols. We propose the Role-based IoT Service Environment (RISE). It assigns roles to each devices to provide complicated and diversified services in the decentralized manner. To separates data and control, the devices of RISE just send a data between collaborative devices to avoid privacy issues. Also, we propose the role binding to optimize devices without role confliction when new role is added.
e are described. The concept of vehicle toll payment over an online payment system is also described. Processing, monitoring and control in the centralized web application of such payments using IOT devices are described and presented.



IST-Africa 2016: The Internet of Things for South African Tourism

IST-Africa 2016 on Internet of Things

Abstract: This paper presents examples of internet of things (IoT) applications that could enhance the management of tourism activities in South Africa. Although information and communication technologies (ICT) have been adopted in some aspects of the tourism industry, there is further room to enhance this functionality through the adoption of IoT technologies. The IoT technologies in this research have been categorised under wildlife monitoring and tracking, monitoring seas and waters, monitoring birds, plant species monitoring, tourist information services, hospitality services, tourism marketing and mountaineering and weather monitoring as identified from the South African Department of Tourism website. A literature review was conducted to identify IoT applications in tourism in the international arena that would apply in the South African environment. An architecture of a wildfire detection and alert system using IoT is given as an example. The question that this research answers therefore is, “What IoT technologies can be adopted to impact on South Africa’s tourism industry”.

IEEE 2016: Cloud Based Web Application Supporting Vehicle Toll Payment System

IEEE Transaction on Embedded Computing

Abstract-The requirements for new web applications supporting different types of devices and purposes are continuously growing. The main advantages of web application development as well as popular development features covering integration with different technologies are considered initially in this paper. Integration and possibilities of application of cloud based web applications in real scenarios with different embedded Internet of Things (loT) devices are considered and described in this paper. The design and implementation of a cloud based web application supporting vehicle toll payment system using loT device is presented and described. The development framework as well as featured and popular technologies used to realize a vehicle toll payment by loT device is described. The concept of vehicle toll payment over an online payment system is also described. Processing, monitoring and control in the cloud based web application of such payments using loT devices are described and presented.


IEEE 2016: HIVE:  Home Automation System for Intrusion Detection

IEEE Transaction on ICT 

Abstract- Home intrusion plays a role and requires a system to  notify  and  activate  homeowners  to  be  alert  and  protect  their home  assets  in  time.  HIVE is proposed for home intrusion detection and devised in three parts. First, sensor manager is composed of sensor manager acting as ZigBee coordinator communicating with ZigBee sensors and actuators.  Three different sensor  types  are  passive  infrared  for detecting  motion, magnetic  switch  for  opening/closing  of  door  detection,  and  load cell for  the  weight  gauge  from  pressing  steps  on  the  floor.  Two actuators, composing of piezo alarm and LED, are activated by sensor manager. Second, Firebase is developed as cloud database and user authentication service.  Third, an  android  application  is deployed  for  end-user  for  monitoring,  configuring,  and  being notified remotely.  As a result, sensor and actuator modules can join the ZigBee network automatically.  Sensor Manager sends updated sensors' and actuators' data to Firebase, consequently, home users can be notified intrusion events via the android application,  and  remotely  configure  events,  sensors,  and actuators anywhere anytime  via the  Internet.  Therefore, this system can enhance security and safety for home assets.

IEEE 2016: Fog Computing May Help to Save Energy in Cloud Computing

IEEE Transaction on Selected Areas Communications

Abstract—Tiny computers located in end-user premises are becoming popular as local servers for Internet of Things (IoT) and Fog computing services. These highly distributed servers that can host and distribute content and applications in a peer-to-peer (P2P) fashion are known as nano data centers (nDCs). Despite the growing popularity of nano servers, their energy consumption is not well-investigated. To study energy consumption of nDCs, we propose and use flow-based and time-based energy consumption models for shared and unshared network equipment, respectively. To apply and validate these models, a set of measurements and experiments are performed to compare energy consumption of a service provided by nDCs and centralized data centers (DCs). A number of findings emerge from our study, including the factors in the system design that allow nDCs to consume less energy than its centralized counterpart. These include the type of access network attached to nano servers and nano server’s time utilization (the ratio of the idle time to active time). Additionally, the type of applications running on nDCs and factors such as number of downloads, number of updates, and amount of pre-loaded copies of data influence the energy cost. Our results reveal that number of hops between a user and content has little impact in the total energy consumption compared to the above-mentioned factors. We show that nano servers in Fog computing can complement centralized DCs to serve certain applications, mostly IoT appli-cations for which the source of data is in end-user premises, and lead to energy saving if the applications (or a part of them) are off-loadable from centralized DCs and run on nDCs.

IEEE 2016: Effective Ways to Use Internet of Things in the Field of Medical and Smart Health Care

IEEE Transaction on Intelligent Systems Engineering

Abstract— The recent advancements in technology and the availability of the Internet make it possible to connect various devices that can communicate with each other and share data. The Internet of Things (IoT) is a new concept that allows users to connect various sensors and smart devices to collect real-time data from the environment. However, it has been observed that a comprehensive platform is still missing in the e-Health and m-Health architectures to use smartphone sensors to sense and transmit important data related to a patient’s health. In this paper, our contribution is twofold. Firstly, we critically evaluate the existing literature, which discusses the effective ways to deploy IoT in the field of medical and smart health care. Secondly, we propose a new semantic model for patients’ e-Health. The proposed model named as ‘k-Healthcare’ makes use of 4 layers; the sensor layer, the network layer, the Internet layer and the services layer. All layers cooperate with each other effectively and efficiently to provide a platform for accessing patients’ health data using smart phones.


IEEE 2016:  EyeSim: A Mobile Application for Visual-Assisted Wormhole Attack Detection in IoT-enabled WSNs

IEEE Transaction on Wireless and Mobile Networking

Abstract—Internet of Things (IoT) have emerged as a valuable, flexible, and interoperable network of devices, objects, items, and electronics. Fuelled by recent advances in networking, communi-cations, computation, software, and hardware technologies, IoT has stepped out of its infancy and is considered as the next breakthrough technology in transforming the Internet into a fully integrated Future Internet. Wireless Sensor Networks (WSNs) are utilized by IoT to collect, exchange, and deliver data remotely leveraging the potential of IoT in practical applications and services. However, delivering data remotely might be threatened by various and serious security attacks. This work focuses on developing a visual-assisted tool for exposing security threats in IP-enabled WSNs. The proposed tool, called EyeSim, is a human-interactive visual-based anomaly detection system that is capable of monitoring and promptly alerting for the presence of wormhole links. In addition, it is capable of indicating the malicious nodes that form the wormhole link. EyeSim may expose adversaries by conducting cognitive network data analysis based on dynamic routing information. The efficacy of EyeSim is assessed in terms of detection accuracy. The simulation results show that EyeSim has the capabilities to accurately detect multiple wormhole attacks in real-time.


 
IEEE 2016:  A conceptual FrameWork for IoT-based Healthcare System Using Cloud Computing

IEEE Transaction on Cloud System  and Big Data Engineering

Abstract: Internet of Things (IoT) envisions a future in which anything/anyone/anyservice can be linked by means of appropriate information and communication technologies which will bring technological revolution in the fields of domestics, smart homes, healthcare systems, goods monitoring and logistics. This paper presents the applications of IoT and addresses some essential parameters and characteristics of each of the applications of IoT. In this paper, we have deeply explored the role of IoT in healthcare delivery and its technological aspects that make it a reality and examine the opportunities. A cloud based conceptual framework has been proposed which will be beneficial to the healthcare industry implementing IoT healthcare solutions.

2 comments:

  1. Very informative piece of article, this blog has helped me to understand the concept even better. Keep on blogging IEEE latest Projects | Final year Project IT

    ReplyDelete
  2. We are experts in industrial automation technologies like PLC, SCADA, HMI, DCS, PANEL CONTROL , SENSORS, DRIVES, MOTORS, Instrumentation and related technologies. Call us 9310096831. or visit diac.co.in

    ReplyDelete