Skip to main content

Convergence of Communication Technologies with Internet of Things

  • Conference paper
  • First Online:
Intelligent Cyber Physical Systems and Internet of Things (ICoICI 2022)

Abstract

Internet of Things (IoT) is the term used to describe a network of physical things such as mobile devices and household appliances that are embedded with electronics, software, sensors, and network connection that enables these objects to gather and exchange data. Sensors, recognition and remote control of items are all made possible by the Internet of Things (IoT). Once this property is combined with sensors and actuators, it becomes an example of a cyber-physical system, which includes technologies like intelligent power grids (grids), intelligent homes (smart homes), smart cities (smart cities), and intelligent transportation systems (ITS). Integrating MANET and WSN with IoT is covered in this study. Technology and protocols needed to deploy the Internet of Things (IoT) are explored in this article.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Andrea I, Chrysostomou C, Hadjichristofi G (2015) Internet of things: security vulnerabilities and challenges. In: Computers and communication (ISCC), IEEE symposium. IEEE, pp 180–187

    Google Scholar 

  2. Atakli IM, Hu H, Chen Y, Ku WS, Su Z (2008) Malicious node detection in wireless sensor networks using weighted trust evaluation. In: Proceedings of the 2008 Spring simulation multi conference. Society for Computer Simulation International, pp 836–843

    Google Scholar 

  3. Penna M, Jijesh JJ, Shivashankar (2017) Design and implementation of automatic medicine dispensing machine. In: RTEICT 2017—2nd IEEE international conference on recent trends in electronics, information and communication technology, proceedings, pp 1962–1966. https://doi.org/10.1109/RTEICT.2017.8256941

  4. Christin D, Reinhardt A, Mogre PS, Steinmetz R (2009) Wireless sensor networks and the internet of things: selected challenges. In: Proceedings of the 8th GI/ITG KuVS Fachespräch Drahtlose sensornetze, pp 31–34

    Google Scholar 

  5. Kishore DV, Shivashankar, Mehta S (2016) MANET topology for disaster management using wireless sensor network. In: International conference on communication and signal processing, ICCSP 2016, pp 0736–0740. https://doi.org/10.1109/ICCSP.2016.7754242

  6. Varun CA, Shivashankar, Sahana M, Varun RS, Rajesh T (2018) Implementation of swarm intelligence in obstacle avoidance. In: RTEICT 2017—2nd IEEE international conference on recent trends in electronics, information and communication technology, proceedings, 2017, pp 525–528. https://doi.org/10.1109/RTEICT.2017.8256652

  7. Sridhara SB, Naveen KB, Ramesha M, Pai GN (2020) Internet of things: internet revolution, impact, technology road map and features. Adv Math Sci J 9(7):4405–4414. https://doi.org/10.37418/amsj.9.7.11

    Article  Google Scholar 

  8. Ramesh Naidu P, Guruprasad N (2020) Design and implementation of cryptcloud system for securing files in cloud. Adv Math Sci J 9(7):4485–4493. https://doi.org/10.37418/amsj.9.7.17

  9. Isaiadis S, Getov V (2005) Integrating mobile devices into the grid: design considerations and evaluation. In: European conference on parallel processing LNCS, vol 3648. Springer, pp 1080–1088

    Google Scholar 

  10. Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito MA (2013) DEMO: an IDS framework for internet of things empowered by 6LoWPAN. In: Proceedings of the 2013 ACM SIGSAC conference on computer and communications security. ACM, pp 1337–1340

    Google Scholar 

  11. Ramesha M, Sridhara SB, Naveena Pai G (2020) FPGA implementation of low power high speed BTED algorithm for 8 bit error correction in cryptography system. Int J Emerg Trends Eng Res 8(7):3893–3897. https://doi.org/10.30534/ijeter/2020/158872020

  12. Kolias C, Kolias V, Kambourakis G (2017) TermID: a distributed swarm intelligence-based approach for wireless intrusion detection. Int J Inf Secur 16(4):401–416

    Article  Google Scholar 

  13. Lazarescu MT (2013) Design of a WSN platform for long-term environmental monitoring for IoT applications. IEEE J Emerg Sel Top Circ Syst 3(1):45–54

    Article  Google Scholar 

  14. Mamun MSI, Kabir AFM (2012) Hierarchical design based intrusion detection system for wireless ad hoc network. Int J Netw Secur Appl (IJNSA) 2(3):102–117

    Google Scholar 

  15. Nadeem A, Howarth MP (2013) A survey of MANET intrusion detection and prevention approaches for network layer attacks. IEEE Commun Surv Tutorials 15(4):2027–2045

    Article  Google Scholar 

  16. Reina DG, Toral SL, Barrero F, Bessis N, Asimakopoulou E (2013) The role of ad hoc networks in the internet of things: a case scenario for smart environments. In: Internet of things and inter-cooperative computational technologies for collective intelligence. Springer, Berlin, Heidelberg, pp 89–113

    Chapter  Google Scholar 

  17. Schumacher C, Kushalnagar N, Montenegro G (2007) IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals. Available: https://tools.ietf.org/html/rfc4919

  18. Verma SS, Patel RB, Lenka SK (2015) Investigating variable time flood request impact over QOS in MANET. Procedia Comput Sci 57:1036–1041

    Article  Google Scholar 

  19. Watteyne T, Vilajosana X, Kerkez B, Chraim F, Weekly K, Wang Q, Pister K (2012) OpenWSN: a standards-based low-power wireless development environment. Trans Emerg Telecommun Technol 23(5):480–493

    Article  Google Scholar 

  20. Smys S (2019) Energy-aware security routing protocol for WSN in big-data applications. J ISMAC 1(01):38–55

    Google Scholar 

  21. Chen JI, Iong Z (2020) Optimal multipath conveyance with improved survivability for WSN’s in challenging location. J ISMAC 2(02):73–82

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Dankan Gowda .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dankan Gowda, V., Jacob, S.S., Hussain, N., Chennappan, R., Sakhare, D.T. (2023). Convergence of Communication Technologies with Internet of Things. In: Hemanth, J., Pelusi, D., Chen, J.IZ. (eds) Intelligent Cyber Physical Systems and Internet of Things. ICoICI 2022. Engineering Cyber-Physical Systems and Critical Infrastructures, vol 3. Springer, Cham. https://doi.org/10.1007/978-3-031-18497-0_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-18497-0_48

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-18496-3

  • Online ISBN: 978-3-031-18497-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics