Iot Based Smart Applications
Iot Based Smart Applications
Nidhi Sindhwani · Rohit Anand ·
M Niranjanamurthy ·
Dinesh Chander Verma ·
Emilia Balas Valentina Editors
IoT Based
Smart
Applications
EAI/Springer Innovations in Communication
and Computing
Series Editor
Imrich Chlamtac, European Alliance for Innovation
Ghent, Belgium
The impact of information technologies is creating a new world yet not fully
understood. The extent and speed of economic, life style and social changes already
perceived in everyday life is hard to estimate without understanding the technological
driving forces behind it. This series presents contributed volumes featuring the
latest research and development in the various information engineering technologies
that play a key role in this process. The range of topics, focusing primarily on
communications and computing engineering include, but are not limited to, wireless
networks; mobile communication; design and learning; gaming; interaction;
e-health and pervasive healthcare; energy management; smart grids; internet of
things; cognitive radio networks; computation; cloud computing; ubiquitous
connectivity, and in mode general smart living, smart cities, Internet of Things and
more. The series publishes a combination of expanded papers selected from hosted
and sponsored European Alliance for Innovation (EAI) conferences that present
cutting edge, global research as well as provide new perspectives on traditional
related engineering fields. This content, complemented with open calls for
contribution of book titles and individual chapters, together maintain Springer’s and
EAI’s high standards of academic excellence. The audience for the books consists
of researchers, industry professionals, advanced level students as well as practitioners
in related fields of activity include information and communication specialists,
security experts, economists, urban planners, doctors, and in general representatives
in all those walks of life affected ad contributing to the information revolution.
Indexing: This series is indexed in Scopus, Ei Compendex, and zbMATH.
About EAI - EAI is a grassroots member organization initiated through cooperation
between businesses, public, private and government organizations to address the
global challenges of Europe’s future competitiveness and link the European
Research community with its counterparts around the globe. EAI reaches out to
hundreds of thousands of individual subscribers on all continents and collaborates
with an institutional member base including Fortune 500 companies, government
organizations, and educational institutions, provide a free research and innovation
platform. Through its open free membership model EAI promotes a new research
and innovation culture based on collaboration, connectivity and recognition of
excellence by community.
Nidhi Sindhwani • Rohit Anand
M Niranjanamurthy
Dinesh Chander Verma • Emilia Balas Valentina
Editors
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature
Switzerland AG 2023
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of
illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the
editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
The Internet of Things (IoT) is emerging as one of the most prominent technologi-
cal concepts in the twenty-first century. We live in a world where new objects are
connected to the Internet with the aim of improving and facilitating people’s lives.
In addition, objects that we did not even imagine a few years ago as part of the net-
work are now beginning to be connected, offering a new immense range of possi-
bilities. The main motive of this book is to provide insights into IoT, its applications,
and implementation techniques. Today, IoT has become a promising technology
that connects the different objects embedded with sensors and software to exchange
information without human intervention. Here, various IoT-enabled technologies
and applications will be discussed along with their pros, cons, and future directions.
This book will also cover the future of IoT in various sectors and will discuss
how IoT will be proven to game-changing technology. In this book, the IoT design
methodology to define the domain model will be discussed. The designing process
using Arduino that offers smart, connected, and secure elements will also be empha-
sized in this book. The integration of IoT with blockchain, cloud, machine learning,
big data, embedded software, and sensors will be covered here. At last, we also
intend to cover the various technologies that can be integrated with IoT to get the
optimized use of this technology. That is why this book, IoT Based Smart
Applications, has been written with the collaboration of international scientists who
provide different visions and solutions to some of the most important current prob-
lems from the point of view of the Internet of Things community and from an even
more interesting mixed point of view.
Chapter 1 is entitled “A Study on COVID-19, Its Origin, Phenomenon, Its
Variants and IoT-Based Framework to Detect the Presence of Coronavirus.” In this
chapter, the authors focus on finding out solutions for the detection of this conta-
gious viral infection at the earliest. Computer-based artificial intelligence can be
used to monitor and detect the symptoms of coronavirus. For detection of coronavi-
rus infection, computers or smartphones can be embedded with biosensors that will
perceive the information and will convert the information into digital data. In this
chapter, a study on the coronavirus is done and an IoT-based framework is proposed
to detect the coronavirus using IoT-based sensors. The proposed approach will be
v
vi Preface
able to detect the pandemic in its early stages, and so better options will be there to
prevent and cure.
Chapter 2 is entitled “Blockchain for Internet of Things (IoT): Research Issues,
Challenges and Future Directions.” The authors explain the importance of the
blockchain for the Internet of Things. Traditional electronics has become smarter as
a result of seeing things on the Internet. Whereas this era known as Blockchain
appears as a first-rate deliver of presenting safety to this new age of technological
programs, the speedy evolvement of smart devices demands trusted security for the
maintenance of the IoT containing application’s knowledge safety, security, and
authentication. This research inspects the IoT protection answers by using integrat-
ing IoT programs with blockchain. The evaluation consists of blockchain basics,
kinds, and layout for the Internet of Things. It will also look at the hurdles and
problems of IoT in blockchain adoption, particularly in terms of security, privacy,
throughput, block size, multichain management, and social control.
Chapter 3 is entitled “Smart Healthcare by Harnessing the Internet of Things
(IoT): Applications, Challenges and Future Aspects.” In this chapter, the authors
discussed IoT-enabled devices that have helped in solving many problems in the
healthcare sector. The improved potential to keep patients safe and healthy has
empowered physicians to provide superlative care. These devices range from sen-
sors that monitor patient’s gluten and glucose levels in the blood, blood pressure,
and heart rate to even monitoring food and water intake. This chapter intends to
provide a detailed overview of how IoT has spread its branches far and wide into the
field of healthcare. The real-time applications of IoT, such as the diagnosis of dis-
eases, surgery, and clinical trials, have been explained in detail. Moreover, various
important aspects like biosafety, security, and legal challenges with respect to its
commercialization have also been discussed.
Chapter 4 is entitled “Applications of IoT in Smart Homes and Cities.” This is a
summarized chapter in which the authors focus on some of the most interesting
concepts behind IoT, like the different possible applications of IoT in smart homes
and smart cities, the components related to IoT architectures, the importance and
type of sensors, the main network technologies, implementation of IoT, the most
relevant current challenges, and some possible lines of future work.
Chapter 5 is entitled “Gesture-Based Smart Assistive Device for Elderly and
Disabled People Using IoT.” In this chapter, the authors introduce the design in a
manner that many elderly people and people with disabilities receive daily benefits.
This is done using sensors and microcontrollers to achieve automation with the
widely used Android mobile operating system. Home appliances and electrical
devices can be controlled via Bluetooth wireless communication protocol and
Android mobile from anywhere outside of the house when the appliances are not
switched off. Numerous home appliances and electrical devices such as fans, refrig-
erators, and lights can be controlled via the Android OS. Home automation can
include the control of HVAC (heating, ventilation, and air conditioning), lighting,
security locks of gates and doors, home appliances, and devices to provide and
improve convenience, comfort, energy efficiency, and security. Home automation
can provide a better quality of life for those who may need care or nursing facilities,
Preface vii
people with disabilities, and the elderly. To address the problem, solutions and
related technologies are reviewed and presented.
Chapter 6 is entitled “IoT-Enabled Intelligent Traffic Management System.” In
this chapter, the authors address the problem of rapidly rising vehicle count and
propose intelligent transportation problem using various sensors. The chapter
focuses on providing a review of some challenges and emerging trends, and com-
pares various sensor frameworks in terms of cost, reliability, accuracy, performance,
and maintenance. The number of automobiles on the road has risen dramatically in
recent years. Traffic congestion is a rising issue that everybody deals with daily.
Manual traffic control by traffic cops has not proven to be successful. The signal’s
fixed set time in all conditions (low and high traffic density) hasn’t solved the issue.
The use of the Internet of Things (IoT) is proposed as a model for effectively solv-
ing the problems described above. For Internet-based computing, we use the cloud,
which provides various resources such as servers, storage, and application for traffic
management. To track the number of vehicles and traffic congestion on a road, a
network of sensors is used, and rerouting is done according to the traffic density on
the lanes.
Chapter 7 is entitled “A Survey and Challenges: Embedded System on IoT.” An
embedded system is made up of electronic hardware and software. It contains a sen-
sor to sense the environment and actuators to respond. There are millions of such
embedded devices available in the environment, but interoperability between them
is a significant issue. IoT is a technology that provides communication between
such embedded devices over the Internet. Therefore, the existence of IoT is an out-
come of the fourth industrial revolution of disruptive communication technologies.
It is integrated with sensors, embedded systems, computing, and communication
technologies. Embedded system is the heart of IoT. IoT computes and communi-
cates data and stores it in the cloud for future data analysis. IoT is mainly used to
provide seamless data storing and analyze the environment. This chapter addresses
the design aspects of a system required for IoT to use in any general application.
This chapter presents system architectural comparison, interrupts, task execution,
scheduling, switching tasks and latency, prioritization of tasks, real-time tasks, real-
time operating system, multitasking, sensors, actuators, memory footprints, and
communication standards. This chapter summarizes the architecture and its proces-
sors recommended for IoT.
Chapter 8 is entitled “Integration of Big Data and IoT in Modern Era.” This is a
summary chapter in which the authors focus on some of the most interesting con-
cepts about big data, existing attacks, and an integration technique of big data and
IoT that will help reduce the data generated in an IoT environment.
Chapter 9 is entitled “Internet of Things (IoT) for Sensor-Based Smart Farming:
Challenges and Opportunities.” In this chapter, the authors talk about the implemen-
tation of IoT in the smart farming and agriculture industry and its various applica-
tions in the field of technological advancements. In the past couple of years, the
agriculture sector has grown a lot because of the advancements in technology. For
instance, with the assistance of the Internet of Things (IoT), farmers can now moni-
tor soil humidity, crop health, and many other parameters using various sensors
viii Preface
without even going to the field. Thus, by reducing human intervention through auto-
mation, Internet of Things (IoT) technology can make the agriculture industry more
efficient and effective, and can lower the production cost. Internet of Things is a
gateway to the solution of smart farming which will certainly mitigate problems like
famines.
Chapter 10 is entitled “Implementation of IoT in Various Domains.” In this chap-
ter, the authors discuss IoT for industrial applications and how these systems are
being implemented in various fields. Moreover, the authors focus on the implemen-
tation, advantages, disadvantages, and applications for Industry 4.0. The authors
also analyze the usage of artificial intelligence (AI) that has moved H-IoT to almost
the next level in various domains in which a range of different sensors is com-
monly used.
Chapter 11 is entitled “Application of IoT in Wearable Technology.” According
to the authors, Internet of Wearable Things is among the expert improvements that
have adapted to the digital age. Wearables are finding a wider range of applications
in our everyday lives. A wide range of digital gadgets referred to as “wearables”
includes sensors that offer the thrilling possibility for features used in tracking and
sending alert signs. Wearables are grouped into four dominating bunches: (i) well-
ness, (ii) sports exercises and ordinary distraction, (iii) observing and confinement,
and (iv) security. They depict how different sensors may provide a wide range of
readings that could be useful for a range of methods. Wearables come in a variety of
shapes and sizes; they all have a certain purpose to perform in different sectors. One
of the important attacks on the wearable era is the authentication among other trou-
bles viz-a-viz erroneous sensors, battery/energy problems, limiting the users in
monitoring location/space, and lack of interoperability. This chapter furthermore
addresses the chances and applications and also discusses the circumstances identi-
fied with executing.
Chapter 12 is entitled “Role of IoT in Smart Homes and Smart Cities: Challenges,
Benefits and Applications.” In this chapter, the authors describe IoT and its applica-
tion to smart homes and smart cities, how to create and use these applications using
IoT, the various hardware and software features required for IoT use, the challenges
and weaknesses of IoT usage for smart homes and smart cities, and benefits of using
IoT in smart homes and smart cities. This chapter examines the current and future
examples of IoT, and it will show readers how IoT will interact with our lives in
the future
Chapter 13 is entitled “Investigating Role of IoT in Development of Smart
Application for Security Enhancement.” This chapter presents IoT solutions to
enable the customers to automate, analyze, and integrate their systems to a greater
extent. The Internet of Things includes sensors, networks, and robotics, and it
employs both old and new technologies. The Internet of Things makes use of soft-
ware breakthroughs, lower hardware costs, and a contemporary approach to tech-
nology. This research has focused on IoT-based smart applications that could be
used for security enhancement in industries as well as homes. In other words, this
research has introduced smart applications to maintain security from threats such as
theft, fire, and other unexpected events that may result in financial loss.
Preface ix
Chapter 19 entitled “Intelligence and Cognitive Computing at the edge for IoT:
Architecture, Challenges, and Applications” discusses the intelligence and cogni-
tive computing at the edge for IoT with its Architecture, Challenges and Applications
where the cognitive computing is the development of computerized models to
mimic human behavior. The best examples are virtual assistants such as Siri, Alexa,
and Cortana. Cognitive computing and AI play a big role in solving problems and
building applications to support several domains in Internet of Things (IoT). The
downside to AI and cognitive computing is the complexity of the architecture
involved in building models that support IoT.
Chapter 20 is entitled “IOT Sensors-Based Smart Agriculture Using AGRO-
ROBOT” that discusses the current investigation and research innovation of Agro-
robot to define the technical work in the form of project and prototype which
illustrates how Robots are capable and useable in field of farming and other works
to solve the challenges of agriculture by using robotics.
Chapter 21 is entitled “Role of the Internet of Things (IoT) in Digital Financial
Inclusion.” This chapter aims to identify the underlying factors affecting the role of
IoT in digital financial inclusion. The chapter is based on a sample size of 120
respondents from the National Capital Region of India. The principal components
analysis method is used to find the factors. Many of the significant factors are identi-
fied, viz. IoT awareness, financial service awareness, usability, benefits, trust, secu-
rity, and privacy, as well as accessibility.
Chapter 22 is entitled “Diagnosis of COVID-19 Using Low Energy IoT-Enabled
System.” This chapter focuses on Web of Things / Internet of Things (IoT) which is
an innovation used to give data and check the framework during COVID-19 scourge.
This innovative stage can be utilized to handle difficulties during lockdown-like
circumstances. IoT would assist in giving a mechanized and straightforward treat-
ment procedure to handle COVID-19 epidemic (pandemic situations) circumstance.
With Internet of Things (IoT), machine learning and artificial intelligence, the dis-
tributed computing phase is highly accurate as it enables to provide active feedback
from management and evaluators. For additional useful applications, we can also
point out the most checked slots and ranking reasons.
The editors are indebted to Almighty God for giving blessings to complete this
book. Completing a book is not an easy task; it starts with consuming many hours,
months, and more. We can attest that during that time, we were working closely
with publishers, editors, and authors. We are very much thankful to our beloved
Eliska Vickova, Managing Editor, European Alliance for Innovation (EAI), for hav-
ing faith and giving us a chance to edit this book. From proposal submission till
completion, your support was very helpful to us. We are sincerely thankful to the
EAI Springer Group. We want to convey our thanks to all the authors who partici-
pated in this book project; due to scope and quality, we could not accept many good
chapters, but we are sure that the work included in this book will prove helpful to
young researchers and industry entrants in the field of IoT and big data. Our book
will help them build their planning strategy and will prove to solve their real-time
problems. We will be very happy to hear your feedback about this book. Though
utmost care was taken in selecting the chapters and authors’ work, which was
Preface xi
closely monitored and revised with rigorous peer review, authors’ or readers’
reviews and feedback will be very useful for us, to ensure their points are addressed
in our forthcoming books. We request you to purchase this book for your institution
library and research lab, and to take advantage of the cutting-edge technology
exploration information throughout this book.
xiii
xiv Contents
8
Integration of Big Data and IoT in the Modern Era���������������������������� 131
Ashwani Kumar, Deena Nath Gupta, and Rajendra Kumar
9 Internet of Things (IoT) for Sensor-Based Smart Farming:
Challenges and Opportunities���������������������������������������������������������������� 151
Jaspinder Kaur, Sudeep Yadav, and Harjot Singh Gill
10 Implementation
of IoT in Various Domains������������������������������������������ 165
Jaspinder Kaur, Jaskaran, Nidhi Sindhwani, Rohit Anand,
and Digvijay Pandey
11 Application
of IoT in Wearable Technology������������������������������������������ 179
Shivam Dhoot, Komal Saxena, and Ajay Rana
12 Role
of IoT in Smart Homes and Smart Cities: Challenges,
Benefits, and Applications ���������������������������������������������������������������������� 199
Aditya Tripathi, Nidhi Sindhwani, Rohit Anand, and Aman Dahiya
13 Investigating
Role of IoT in the Development of Smart
Application for Security Enhancement�������������������������������������������������� 219
Jay Kumar Pandey, Rituraj Jain, R. Dilip, Makhan Kumbhkar,
Sushma Jaiswal, Binay Kumar Pandey, Ankur Gupta,
and Digvijay Pandey
14 Role
of Augmented Reality and Internet of Things in Education
Sector�������������������������������������������������������������������������������������������������������� 245
Monika Nijhawan, Nidhi Sindhwani, Sarvesh Tanwar,
and Shishir Kumar
15 Raspbian
Magic Mirror: A Smart Mirror System to Assist
on IoT Platform���������������������������������������������������������������������������������������� 261
D. S. Sahana and C. Gopala Krishnan
16 Use
of Machine Learning and IoT in Agriculture�������������������������������� 277
Anuj Mehla and Sukhvinder Singh Deora
17 Intelligent
Technology, Systems Support, and Smart Cities���������������� 295
Rahul Gupta
18 Deep
Learning Approach for IOT-Based Multiclass Weed
Classification Using YOLOv5 ���������������������������������������������������������������� 309
K. Sandeep Kumar, Rajeswari, S. Lakshmikanth,
and Himanshu Sharma
19 Intelligence
and Cognitive Computing at the Edge for IoT:
Architecture, Challenges, and Applications������������������������������������������ 325
S. M. Kusuma, K. N. Veena, K. S. Kavya, and B. P. Vijaya Kumar
20 IOT
Sensor-Based Smart Agriculture Using Agro-robot �������������������� 345
Dinesh Dattatray Patil, Ashutosh Kumar Singh, Anurag Shrivastava,
and Devendra Bairagi
Contents xv
21 Role
of the Internet of Things (IoT) in Digital Financial
Inclusion���������������������������������������������������������������������������������������������������� 363
Jitender Kumar and Anjali
22 Diagnosis
of COVID-19 Using Low-Energy IoT-Enabled
System ������������������������������������������������������������������������������������������������������ 375
Yogini Dilip Borole, Anurag Shrivastava, and M. Niranjanamurthy
Index������������������������������������������������������������������������������������������������������������������ 395
Chapter 1
A Study on COVID–19, Its Origin,
Phenomenon, Variants, and IoT-Based
Framework to Detect the Presence
of Coronavirus
1.1 Introduction
In 1965 a common cold named B814 came into existence when Tyrrell and Bynoe
were studying samples of human embryonic trachea taken from the respiratory tract
of an adult. At the same time, Hamre and Prock now obtained samples from medical
students with cold and cultured a virus in tissue culture showing unusual properties
they named it Hamre’s virus, later on known as 229E. The relationship between
B814 and 229E viruses with myxoviruses or paramyxoviruses known at that time
was not found to be close enough. In the late 1960s, morphological constraints were
found to be having similarities between certain animal viruses such as mouse
V. Menon · M. Kaur
Department of Biotechnology, Chandigarh College of Technology, Landran, India
e-mail: [email protected]; [email protected]
D. Pandey (*)
Department of Technical Education, IET, Dr. A.P.J. Abdul Kalam Technical University,
Lucknow, Uttar Pradesh, India
D. Khosla
Department of Computer Science, Chandigarh Group of Colleges, Landran, India
e-mail: [email protected]
H. K. Vashishtha
Lead Product Validation Engineer, Cadence Design System, Noida, India
A. S. George
Department of Information and Communication Technology, Crown University, Int’l.
Chartered Inc. (CUICI), Santa Cruz, Argentina
B. K. Pandey
Department of Information Technology, College of Technology, Govind Ballabh Pant
University of Agriculture and Technology, Pantnagar, Uttarakhand, India
hepatitis virus, swine flu, gastroenteritis virus, and infectious bronchitis virus with
some human strains as studied by Tyrrell along with a group of virologists working
together. This new group of viruses having the crown-like appearance of the surface
projections was later officially accepted as coronavirus. Research studies conducted
on the coronaviruses revealed that in humans living in temperate regions, the occur-
rence of respiratory coronavirus infections was more often observed in the winter
and spring as compared to the summer season [1, 2].
Coronaviruses are enveloped viruses with a positive-sense single-stranded RNA
genome and a nucleocapsid of helical symmetry constituting the family
Coronaviridae, subfamily Orthocoronavirinae, and order Nidovirales. Coronaviruses
are the largest among known RNA viruses with genome sizes ranging from approxi-
mately 27–34 kilobases. Coronaviruses can cause severe illnesses ranging widely in
any age group. China has been said to be the forefront country where the emergence
of viral infections occur, and this may be due to the consumption of poultry, bats,
snakes, and other wildlife animals. In 1997, China witnessed avian influenza in
2003, the severe acute respiratory syndrome (SARS caused by a coronavirus), and
in 2010 a severe fever with thrombocytopenia syndrome (SFTS). In 2012 a severe
illness outbreak began in Saudi Arabia with the Middle East Respiratory Syndrome
(MERS). On 12 December 2019, 27 cases of viral pneumonia with an unknown
causal agent as an outbreak were reported in the city of Wuhan, China, by the Wuhan
Municipal Health Commission (WMHC). On December 31, 2019, Chinese authori-
ties declared the outbreak of a novel strain of coronavirus causing severe illness and
named it SARS-CoV-2. WHO declared 2019-nCoV an epidemic for world public
health on 30 January 2020 [3]. The basis of their studies summarized that the genetic
makeup of bat coronavirus has most similarities with 2019-nCoV and has maxi-
mum similar codons as with snakes. They also, depicted that viral receptor-binding
spike glycoproteins are responsible for homologous recombination that determines
cross-species transmission. The information derived from their evolutionary analy-
sis can be highly significant in the future for effectively controlling the pandemic
2019-nCoV [4, 5].
The COVID-19 has proven a big challenge since 2019 for the whole world.
Human civilization needs to battle the COVID-19 with effective measures and pre-
cautions. Researchers and doctors from all over the world are consistently working
on generating solutions for the problem. One of the biotechnological reports
revealed that real-time PCR used for COVID-19 can de reframed with the Internet
of Things (IoT). This trial will collect real-time data from users which can further
be used to identify the suspected cases. This methodology will monitor the post-
virus recovery response. This system is composed of five main components: data
collection system and sensors for uploading, isolation spots, algorithms for data
analysis, health workers, and cloud infrastructure. Various algorithms used are vec-
tor machine, neural network, Naive-Bayes, K-nearest neighbor, decision table, deci-
sion stump, One R, and Zero R. This experiment has given effective and reliable
results with 90% accuracy. Based on this study, we believe that this real-time data
and IoT-based framework have the potential for identification and management of
COVID-19.
1 A Study on COVID–19, Its Origin, Phenomenon, Variants, and IoT-Based… 3
1.2 Origin of 2019-nCoV
person comes in direct contact can get transmitted either through eyes, nose, and
mouth or possibly be inhaled into the lungs of those within close proximity [11].
However, the probability of airborne transmission from person to person over long
distances is not verified (CDC 2020). 2019-nCoV is an RNA virus, having a high
mutation rate, due to genome-encoded exonuclease mutation rate in the coronavi-
ruses might be somewhat lower than that of other RNA viruses. This mutation rate
increases the possibility for this newly introduced epidemic viral pathogen to
become more virulent and more efficient to be transmitted from person to person
[12, 13].
Until April 2020, 2019-nCoV positive cases were increasing throughout the world.
As of 9th April, there were a total of 14, 90,790 cases confirmed in the whole world,
including 88,982 deaths and 3, 32,486 cured cases. For combating epidemic 2019-
nCoV, the central and state governments of all countries throughout the world have
taken a series of desperate measures. All government agencies have started to con-
duct laboratory exploration for characterization and treatment of the disease, includ-
ing quarantining of suspected patients, monitoring clinical status of patients
individually, and developing diagnostic and treatment protocols [14–16]. Africa
Task Force for the Novel Coronavirus on Feb 3 was established by the Africa
Centres for Disease Control and Prevention [17]. A lot of countries including India
have gone for 1–3 weeks lockdown so that patients infected with the coronavirus
remain in quarantine to minimize the spreading of the virus.
For the status in India, as per statistical survey analysis till 2019, 88.5% of case-
load was observed in states such as Maharashtra, Delhi, Tamil Nadu, Madhya
Pradesh, Gujarat, Rajasthan, and Uttar Pradesh. In comparison to these stats, very
few state and union territories of India affected by this disease are Northeastern
states like Meghalaya, Mizoram, and Nagaland and union territories like Andaman
Nicobar, Dadra and Nagar Haveli, and Daman and Diu. Maximum expression of
this disease was reported in Maharashtra (107958) followed by Tamil Nadu (44661)
and Delhi (41182). The fatality rate concluded was 2.9%.
The key factors which contribute to the progression of the disease are migration
and population density. Delhi, Uttar Pradesh, Madhya Pradesh, and Maharashtra
have shown maximum migration of labor.
The maximum cases reported of cases are between the age group 25–59.
Telangana has reported maximum COVID-19 cases due to migration in the earlier
part of May 2020. Another promising factor responsible for disease transmission is
population density as shown in Fig. 1.1. Highly dense states and localities were
declared 123 hot spots by the government of India based on census.
1 A Study on COVID–19, Its Origin, Phenomenon, Variants, and IoT-Based… 5
For smart network and proper health management systems, IoT-enabled intercon-
nected devices are very crucial for fighting with pandemics. With the decisions-
making process, the system can track and alert the patient to improve security. IoT
can be used as countermeasure technique for COVID-19 pandemic. Table 1.1 shows
IoT application.
The framework based on the Internet of Things (IoT) [18–20] is explained which
are cheaper, user friendly, and readily available [21–24]. In the first step, for a sus-
pected patient, the symptoms of SARS-CoV-2 are to be detected properly and accu-
rately. The common symptoms of SARS-CoV-2 are breath soreness, fever, dry
cough, pain, drop in SPO2 level, and weakness. In the proposed framework, IoT-
based sensors can take input from the user, measure the level of each symptom
explained, and provide data processing for analytics. In the framework, IoT-based
sensors include a heart rate sensor, temperature control, microphone, and proximity
sensor which enable the system to detect the symptoms of coronavirus easily.
Each sensor reading has the application of a different algorithm owing to the different
symptoms of the disease. For example, fever can be detected with the help of an IoT-based
temperature sensor. The human fatigue can be detected using the IoT-based camera where
a human is asked to do 30 sit-ups and the situ-ups can be analyzed. Also, samples of lung
CT scans and x-rays of the chest can be uploaded via the same IoT-based camera [25]. The
IoT-based microphone sensor can be used to identify the cough type whether it is a dry
cough or not.
In the proposed framework, the abovementioned sensors have been used. Using the
sensors to collect the data and analyze and gather the results, the prediction of
symptoms is done. The data is stored for analysis purposes.
After collecting the records and data from various patients, they are used as inputs to the
various techniques of machine learning. The techniques of machine learning in the medical
field include neural networks and k-nearest neighbor. There are various deep learning [26]
methods in the machine learning techniques which are quite accurate and come under the
family of neural networks. CNN and RNN are the two main algorithms for deep learning
which are used for recognition and classification.
Recurrent neural network (RNN) and convolution neural network (CNN) imply
recursive neural network [26, 27]. In RNN, the next layer input will be the output of
the previous layer saved. The measurement of signals and tests is mostly done by
RNN. CNN is used for spatial data whereas RNN is used for saving temporal data.
Figure 1.2 shows the proposed framework.
In the first step, the collection of the data IoT sensors is done. For example, the
computed tomography (CT) scan of the lungs, x-ray scan of the chest and lungs, and
videos are captured through an IoT-enabled high-quality camera sensor, and stand-
sit measurements of the suspected patient is collected by it; through the IoT-based
microphone, the cough sound is taken and identification can then be done. Using the
IoT-enabled heart rate sensor, heart rate can be recorded, the oxygen level of a per-
son can be detected using SPO2 sensor, and the IoT-based temperature sensor is
used to measure the degree of temperature. In the next step, for further processing
of the data, the received data in the analog form is converted into digital form. After
digitizing the data, the next step includes the preprocessing and standardization of
the data which is moved to the cloud network. Then, the analysis and management
Cloud Server
Machine Learning Techniques (RNN and CNN) for COVID-19 Initial Result
of data are done. This is done when the health-care [28] personnel receive the symp-
toms of the patient through a cloud network in the form of data. The doctor who is
authorized to access the cloud network detects the symptoms and diagnoses the
disease COVID-19 to be either positive or negative [29]. The progressive CT scan
images of the lungs are shown in Fig. 1.3.
Using x-Ray images, the presence of coronavirus with the use of deep learning is
possible and being used with the accuracy of training model of 99% and 98% of the
confusion matrix [30]. With the presence of coronavirus COVID-19, the epithelial
cells of respiratory systems are affected. So, x-rays can be used to analyze the pres-
ence of COVID-19. In the work to detect the presence, the dataset of x-rays of
COVID-19 affected and x-rays of normal people is used to train the model for deep
learning. Then with deep learning and CNN, the model was able to detect the pres-
ence of COVID-19 virus through x-ray image [25, 31]. Figure 1.4 shows the x-ray
dataset of normal and COVID-19-positive persons, and Fig. 1.5 shows the detection
of COVID-19 using algorithm.
Diagnosis methods are used for checking the absence and presence of disease. The
screening objective is to detect the potential indicators with high sensitivity.
In addition to this screening, a methodology is sometimes carried out to remove
any suspicion or doubts of diseases. As screening is economical, it becomes
10 V. Menon et al.
beneficial to diagnose a large target population that may contain fewer and small
potential cases. Successful screening results in accurate identification and precise
investigation and treatment of patients at risk. Seeing the prevalence and impact of
coronavirus disease, rapid and effective methods are highly advantageous. This
method is also useful for places where advanced and sophisticated facilities cannot
be found. So by adopting the novel methods, we can overcome the hurdles like lack
of medical equipment and experts in disease management. The nonexperts from
remote areas can transmit the data to the expert via IoT-based technology. In the
paper, a framework for remotely screening COVID-19 using wearable sensory
devices similar to some of the prior approaches. Our proposed method, however,
differs from previous techniques in that it includes several innovative aspects for
starters, the sensors we are using are less expensive and can be simply incorporated
to sense a variety of symptoms. Our devices sensors are inexpensive, costing only
a few dollars each. The advantage is that if a gadget is found to be contaminated, it
may be quickly discarded. The sensors can be replaced into a better gadget because
they are generic. Second, method is unique in that the assessment can be performed
by both professionals and nonexperts, and the findings may be deduced by any-
body. The sensors and the supporting framework handle all of the processing.
Third, the outcomes can be tracked and analyzed from afar [32]. That means the
wearable device has application over long distances while the findings are moni-
tored by professionals in medical centers and clinics across the country. Because
the virus is spreading all over the world, governments have partial resources to
deploy medical personnel to remote places; this is an extremely crucial part of
disease diagnosis. With this method of solution, the signs may be patterned. This
method is beneficial as a big variety of sufferers may be screened for the infection
in a brief time.
Wi-Fi is connected to sensors which are required for transferring and sending
the received information to the target without the manual intervention where the
transferring is completed at near places in real time. The use of IoT infrastructure
ensures efficient stream processing and data. The algorithm of this tool is faster
and has a better response for any data scale. In addition, our scheme can be useful
in identifying segments of the population in need of urgent treatment. By analyz-
ing the data of many people in one area, the authorities can assess the severity of
the disease and take urgent action depending on the result [33–39]. Finally,
because the technique includes transportable devices, it is straightforward to move
them from location to location, easily. The rules and regulations are code tips
extracted from professionals to change a professional or lower the intervention of
a professional, in scientific decision-making. These regulations permit categoriz-
ing someone as healthful or having a possibility of contamination with the aid of
using the coronavirus [40]. The gain of the use of regulations for patient’s cate-
gory is that the regulations may be up to date and advanced with dynamic exper-
tise from the mixing of latest scientific recommendations as new findings emerge
from time to time.
1 A Study on COVID–19, Its Origin, Phenomenon, Variants, and IoT-Based… 11
1.6 Conclusion
References
14. Wang C, Horby P W, Hayden F G and Gao G F (2020) A novel coronavirus outbreak of global
health concern. The Lancet. 395(10223): 470–473.
15. Song, Yang, Min Zhang, Ling Yin, Kunkun Wang, Yiyi Zhou, Mi Zhou, and Yun Lu.
“COVID-19 treatment: close to a cure?–a rapid review of pharmacotherapies for the novel
coronavirus.” International journal of antimicrobial agents (2020): 106080.
16. Liu, Ming, YaGao, Yuan Yuan, Kelu Yang, Shuzhen Shi, Junhua Zhang, and JinhuiTian.
“Efficacy and Safety of Integrated Traditional Chinese and Western Medicine for Corona
Virus Disease 2019 (COVID-19): a systematic review and meta-analysis.” Pharmacological
research 158 (2020): 104896.
17. Huda, MdNazmul, Rubana Islam, Mohammed OwaisQureshi, SunithaPillai, and
SyedaZakiaHossain. “Rumour and social stigma as barriers to the prevention of coronavirus
disease (COVID-19): What solutions to consider?.” Global Biosecurity 1, no. 4 (2020).
18. Srivastava, A., Gupta, A., & Anand, R. (2021). Optimized smart system for transportation
using RFID technology. Mathematics in Engineering, Science and Aerospace (MESA), 12(4),
953–965.
19. Anand, R., Sinha, A., Bhardwaj, A., & Sreeraj, A. (2018). Flawed Security of Social Network of
Things. In Handbook of Research on Network Forensics and Analysis Techniques (pp. 65–86).
IGI Global.
20. Sindhwani, N., Maurya, V. P., Patel, A., Yadav, R. K., Krishna, S., & Anand, R. (2022).
Implementation of Intelligent Plantation System Using Virtual IoT. In Internet of Things and
Its Applications (pp. 305–322). Springer, Cham.
21. Sharma, Manvinder, and Harjinder Singh. “Substrate integrated waveguide based leaky wave
antenna for high frequency applications and IoT.” International Journal of Sensors Wireless
Communications and Control 11, no. 1 (2021): 5–13.
22. Singh, Sohni, BhimSainSingla, Manvinder Sharma, SumeetGoyal, and Abdulrashid Sabo.
“Comprehensive Study on Internet of Things (IoT) and Design Considerations of Various
Microstrip Patch Antennas for IoT Applications.” In Mobile Radio Communications and 5G
Networks, pp. 19–30. Springer, Singapore, 2021.
23. Sharma, M., Pandey, D., Palta, P. et al. Design and Power Dissipation Consideration of PFAL
CMOS V/S Conventional CMOS Based 2:1 Multiplexer and Full Adder. Silicon (2021).
https://doi.org/10.1007/s12633-021-01221-1
24. Sharma, Manvinder, Bikramjit Sharma, Anuj Kumar Gupta, and Bhim Sain Singla. “Design of
7 GHz Microstrip Patch Antenna for Satellite IoT-and IoE-Based Devices.” In The International
Conference on Recent Innovations in Computing, pp. 627–637. Springer, Singapore, 2020.
25. Ravi Manne, SnigdhaKantheti, (2020), “COVID-19 and Its Impact on Air Pollution”,
International Journal for Research in Applied Science & Engineering Technology (IJRASET),
ISSN: 2321-9653, Vol.08, Issue 11, pp. 344–346. https://doi.org/10.22214/ijraset.2020.32139
26. Juneja, S., & Anand, R. (2018). Contrast Enhancement of an Image by DWT-SVD and DCT-
SVD. In Data Engineering and Intelligent Computing (pp. 595–603). Springer, Singapore.
27. Anand, R., Shrivastava, G., Gupta, S., Peng, S. and Sindhwani, N. (2018) ‘Audio watermark-
ing with reduced number of random samples’, Shrivastava, G., Kumar, P., Gupta, B., Bala,
S. and Dey, N. (Eds.): Handbook of Research on Network Forensics and Analysis Techniques,
IGI Global. 372–394
28. Juneja, S., Juneja, A., & Anand, R. (2020). Healthcare 4.0-Digitizing Healthcare Using Big
Data for Performance Improvisation. Journal of Computational and Theoretical Nanoscience,
17(9–10), 4408–4410.
29. Quer, Giorgio, Jennifer M. Radin, MatteoGadaleta, Katie Baca-Motes, Lauren Ariniello,
Edward Ramos, VikKheterpal, Eric J. Topol, and Steven R. Steinhubl. “Wearable sen-
sor data and self-reported symptoms for COVID-19 detection.” Nature Medicine 27, no. 1
(2021): 73–77.
30. Gupta, Anuj Kumar, Manvinder Sharma, Ankit Sharma, and Vikas Menon. “A Study on SARS-
CoV-2 (COVID-19) and Machine Learning Based Approach to Detect COVID-19 Through
X-Ray Images.” International Journal of Image and Graphics (2020): 2140010.
1 A Study on COVID–19, Its Origin, Phenomenon, Variants, and IoT-Based… 13
31. Bokam, Y., Guntupalli, C., Gudhanti, S., Kulandaivelu, U., Alavala, R., Alla, N., & Manne,
R. (2021). Importance of Pharmacists as a Front Line Warrior in Improving Medication
Compliance in Covid 19 Patients. Indian Journal of Pharmaceutical Sciences, 83(2), 393–396.
32. Automatic oxygen level control using arduino”, Vemuri Richard Ranjan Samson , U Bharath
Sai , P Malleswara Rao and S Pradeep Kumar 2017 International Conference on Big Data
Analytics and Computational Intelligence Year: 2017 | Conference Paper | Publisher: IEEE.
33. Radwan, E., Radwan, A., Radwan, W., & Pandey, D. (2021). Prevalence of depression, anxiety
and stress during the COVID-19 pandemic: a cross-sectional study among Palestinian students
(10–18 years). BMC psychology, 9(1), 1-12.
34. Parthiban, K., Pandey, D., & Pandey, B. K. (2021). Impact of SARS-CoV-2 in online educa-
tion, predicting and contrasting mental stress of young students: a machine learning approach.
Augmented Human Research, 6(1), 1-7.
35. Meivel, S., Sindhwani, N., Anand, R., Pandey, D., Alnuaim, A. A., Altheneyan, A. S., ... &
Lelisho, M. E. (2022). Mask Detection and Social Distance Identification Using Internet of
Things and Faster R-CNN Algorithm. Computational Intelligence and Neuroscience, 2022.
36. Pandey, D., Islam, T., Magray, J. A., Gulzar, A., & Zargar, S. A. (2021). Use of statistical anal-
ysis to monitor novel coronavirus-19 cases in Jammu and Kashmir, India. European Journal of
Biological Research, 11(3), 274-282.
37. Pandey, D., Ogunmola, G. A., Enbeyle, W., Abdullahi, M., Pandey, B. K., & Pramanik,
S. (2021). COVID-19: A framework for effective delivering of online classes during lockdown.
Human Arenas, 1-15.
38. Khongsai, L., Anal, T. S., AS, R., Shah, M., & Pandey, D. (2021). Combating the spread of
COVID-19 through community participation. Global Social Welfare, 8(2), 127-132
39. Meslie, Y., Enbeyle, W., Pandey, B. K., Pramanik, S., Pandey, D., Dadeech, P., ... & Saini,
A. (2021). Machine intelligence-based trend analysis of COVID-19 for total daily confirmed
cases in Asia and Africa. In Methodologies and Applications of Computational Statistics for
Machine Intelligence (pp. 164-185). IGI Global.
40. Zhu, Y.; Chen, L.; Ji, H.; Xi, M.; Fang, Y.; Li, Y. The risk and prevention of novel coronavi-
rus pneumonia infections among inpatients in psychiatric hospitals. Neurosci. Bull. 2020, 36,
299–302.
41. Anand, R., Sindhwani, N., & Saini, A. (2021). Emerging Technologies for COVID-19.
Enabling Healthcare 4.0 for Pandemics: A Roadmap Using AI, Machine Learning, IoT and
Cognitive Technologies, 163–188.
42. Ayenew, B., & Pandey, D. (2020). Challenges and opportunities to tackle COVID-19 spread in
Ethiopia. Journal of PeerScientist, 2(2), e1000014.
Chapter 2
Blockchain for Internet of Things (IoT):
Research Issues, Challenges, and Future
Directions
2.1 Introduction
The IoT market, which is largely unregulated, offers opportunities for device hack-
ing. At a glance, the absence of safety can be a serious problem, particularly with
smart home or smart car applications. [1–3]. For example, a hacker could steal an
autonomous vehicle from someone or buy it according to the level of access granted
to the IoT system. Increased security is essential, along with all data collected and
transferred between IoT devices. As we are aware of some security-related recom-
mendations such as dual authentication and biometrics, one of the potential solu-
tions is IoT blockchain security [4]. The most well-known blockchain such as
Bitcoin and Ethereum grants a powerful solution for IoT security. The blockchain
includes powerful protection for data modulation, which can lock access to IoT
devices and shut down corrupted devices in IoT networks [5–7]. The name “block-
chain” was derived by its form of technicality (chain blocks), which refers to the
union of every block in association with the previous one. The whole blockchain
idea is to interlink the relationship of data within clusters. By cluster, we mean a
data structure including several monetary transactions, people, or entities [8]. The
transactions are monetary and typical (smart contracts). Any institution can play the
role of blockchain participants that takes protocol strings and assist in their develop-
ment. These network organizers or those accountable for the maintenance of soft-
ware do not share the blockchain.
Blockchain technology has evolved to provide convention validation technology
over a network to ease peer-to-peer transactions and all monetary transactions. The
procedure then minimizes the involvement of third parties in transactions that are
monetary like banks, agents, intermediaries, or any other authorities required for the
confirmation and completion of the data [4]. It is then ensured that every transac-
tional currency is right and recorded as a fresh transactional block. Transactions
recorded within the chain cannot be rewritten or canceled requiring a high level of
needed transparency as well as security.
2.1.1.1 Decentralization
2.1.1.2 Immutability
2.1.1.3 Transparency
The aid of public blockchain systems, for example, Bitcoin and Ethereum, gives the
user accessibility and interaction with an identical right in the blockchain system.
Also, each and every transaction performs validation and is saved in the blockchain
making it available for every user [8]. Hence, the data in blockchain maintains
transparency to those users who will be able to access and perform verification of
performed transactions.
2.1.1.4 Traceability
Please make sure the Volume Editor understands how you want to be listed in the
author index if you have several surnames.
IoT interconnects smart devices for gathering data and making decisions accord-
ingly. When we merge blockchain along Internet objects, things will remove the
lacking security in web objects as this technology needs design with security.
Blockchain traits like incompatibility, transparency, readability, encoding, and flex-
ibility of operation will be getting utilized to overcome IoT difficulties. One of the
advantages of using blockchain in many applications, not just IoT, is that there is a
record of all transactions in between. Once these records are posted to the ledger, no
one can change them. This is proof of the effectiveness of hacking. Additionally,
IoT on the blockchain allows for a much trimmer process from producer to receiver
and at every stage [8]. One of the reasons that older systems do not perform well is
the fast document processing. It is much faster because now everyone has a simple
and secure way to access and sign documents.
Table 2.1 indicates the differences between IoT and blockchain.
18 S. Karagwal et al.
Blockchain IOT
Decentralized Centralized
Resource consuming Resource restricted
Block mining is time-consuming Demands low latency
Scale poorly with large network IOT considered to contains large number or
devices
High bandwidth consumption IOT devices have limited bandwidth and
resources
Has better security Security is one of the big challenges of IOT
2.1.3.1 Interoperability
This refers to the capacity to communicate along with physical systems and transfer
data between IoT systems. The hybrid layer of blockchain is located on the peak of
an overlapping peer-to-peer network along with consistent reachability across
diverse IoT devices.
2.1.3.2 Scalability
With the growth of IoT networks, the authentication and authorization on every
device become tough on a centralized network due to the large amount of resources
required. Hence, there comes a need of a large number of strong services to over-
come this. Combined with blockchain technology, it solves the problem by validat-
ing all devices. It also eliminates the urgent need for large gateway devices [9].
The top priority for many companies is to make their supply chains more efficient.
However, many economic and global issues make this process more difficult. By
removing the middleman, blockchain and IoT can improve supply chain efficiency,
speed up transactions, and reduce costs. With a blockchain that acts as an auditor to
some extent, there are no fees associated with each jump, as unreliable parties can
exchange data directly with each other.
Reliability
The reliability of information is trustworthy, involving asymmetric encryption
algorithms.
2 Blockchain for Internet of Things (IoT): Research Issues, Challenges, and Future… 19
The blockchain can protect IoT data because it is encrypted and stored as a block-
chain transaction that is digitally signed with an encryption key. Also, with the well-
suited integration of blockchain technologies (such as a smart contract) in IoT, an
automatic update of IoT device firmware takes place for preventing risky breaches,
resulting in overall system security.
2.1.3.5 Cost Reduction
Reduction of operational costs is one of the most needed features for an enterprise.
The blockchain allows data to be transferred on a peer-to-peer basis by not needing
centralizing control, giving lowered business costs. With the automation of validat-
ing the transaction and purifying each blockchain step, the ecosystem as a whole
can be created proactive at less cost.
2.1.3.6 Tolerance of Fault
2.2 Motivation
Since IoT and IoT security are the recent areas in the direction of improvement and
research, it is a need to bring some light to this strong combination of blockchain
with IoT. The research of this study will help with a fresh construction IoT frame-
work with blockchain technology for existing education systems. In the future,
researchers may improve this study so that it can be applied to the whole kingdom.
Some points below recommend using my approach to work in the IoT security and
its environment using the blockchain approach:
(a) How does blockchain integrate IoT to secure data and make data privacy
possible?
(b) What are the new developments underway inside the field of IoT and block-
chain technology? Also, what are the new areas of future growth for?
(c) What are the applications of the above techniques to the new researcher and the
challenges of the new field of research?
(d) In what fields can IoT and blockchain technology be applied?
20 S. Karagwal et al.
(e) Are there any future boundaries and directions for developing in the dual areas?
The present centralized IoT design relies on a centralized third-party instance
with complete control over data collection and a slew of IoT devices, with no clear
restrictions on how the information gathered may be utilized. As a result, the central
IoT agency uses a block box, which is a desirable situation for the vast majority of
IoT device owners. By leveraging the processing power of all contributing users in
a decentralized manner, blockchain technology, on the other hand, provides a self-
sufficient and trustworthy decentralized ecosystem. This increases productivity
while removing single points of failure.
Recent reviews of blockchain research show that most academic research focuses
on improving and challenging current protocols, mainly about cryptocurrencies in
general, especially Bitcoin. There is little research on the potential of blockchain.
Research in some areas, especially cryptocurrencies and payments, is well devel-
oped, but usually lacks a complete understanding of its applications and use cases.
The analysis is divided into three parts:
1. Architecture
2. Recent challenges and blockchain in IoT applications issues
3. Future trends
This technique is employed succeeding to more than a single domain and scenario.
It has been studied that the development within the applications of blockchain
started after Bitcoin as blockchain v1.0 and so on, and it got modified with sensible
conventions as blockchain v2.0 and later on showed progression to justice, effi-
ciency, and blockchain v3.0.
The era of blockchain can ensure better executions in this situation, by removing
intercessors and lowering the price. Transactive energy, while enabling the devices
to trade energy, also ensures good executions removing exceeding price [9].
2 Blockchain for Internet of Things (IoT): Research Issues, Challenges, and Future… 21
2.2.2.3 Smart Contract
Despite the actual thing that blockchain delivers several answers to the IoT prob-
lems, the peaked procedure demands want resource taking procedure not much time
and price effectiveness. Ethereum is supported for the implementation of smart con-
tracts for blockchain in IoT [9].
2.2.2.4 Decentralization and Expandability
As we are aware of the centralization of IoT, which creates a difficulty level by mak-
ing an ascendable ecosystem in IoT. But with the emergence of blockchain with IoT,
this scalability issue can be solved. With the replacement of the possession of homo-
geneous blockchain-to-blockchain IoT devices, bottom-up peer-to-peer recognition
procedures are planned [11].
2.2.2.5 Industrial IoT
An overall change can be brought by IoT in the blockchain, health care, etc. Smart
manufacturing is achieved, assets are tracked, latency is reduced, and supply chain
is managed. Due to the immutability and information provenance of blockchain, it
has the potential to protect industrial IoT devices.
2.3 Research Gaps
single-point errors, and DDoS. The following risks not only make the services
unavailable but also lead to the deluge of sensor data, overweighing the crucial ben-
efits of the IoT system [4, 8].
Also, there arrives a question of collected data reliability when there is a possi-
bility of data interception in transferring the data between IoT devices. The idea of
uniting blockchain in IoT has been gaining architecture in the eyes of researchers to
look after the mentioned issues. The adoption of blockchain is not easy as it holds
some challenges such as the capacity of unequal resources in IoT devices as well as
the nodes of blockchain as well as dissimilar mining rates.
As IoT continues to spread its reach across the world, a lot of restrictions and
security issues come along associated with IoT such as the privacy of data, security
of data, heterogeneity, confirmed working of a secure IoT system working, efficient
data management, and timely delivery of data.
(a) How is it possible to achieve scalability for IoT security with the help of the
blockchain approach?
(b) Prevention of malicious nodes for the security of IoT devices for the users, who
are authorized, and the systems?
(c) How will the IoT devices be able to manage the heterogeneity
(d) How can IoT get benefitted from the smart contracts of blockchain?
2.4 Objectives
The primary objective is to study why the blockchain approach is needed to over-
come the issues in IoT. The following objectives are set for this chapter:
(a) To study the integration of IoT and blockchain, knowing the blockchain func-
tionalities and differences between IoT and blockchain
(b) To study the advanced application areas and research challenges and issues in
terms of technologies for new researchers
(c) To research recent developments in the sectors of IoT and blockchain technol-
ogy, as well as to identify new subjects for future scope
(d) To study any recent transformation of blockchain in IoT that took place in the
pandemic
2.5 Architecture
• Distributed ledger
(d) Big Data Analytics
It makes blockchain an ideal medium for data storage done online. Many trans-
actional data from several parties are kept in structured forms of ledgers, making it
a convenient resource for extended research. These parties have accessibility to a
single network and can track them as and when they choose.
(e) Smart Contract
It may be a business operation that is called by an external client application for
controlling both access and charge inside the ledger. Installation and instantiation
are carried out on each network peer.
(f) Event Management
It sends the event whenever a new block gets added to the ledger.
(g) API Interface
The function of this is exposing the servicing given by the network of blockchain
as the services that may get invoked by the client application for accessing and
managing the network.
(h) Application Layer
It is the topmost layer, in which many interfaces are needed for data visualization
with the help of physical devices to control the devices.
2.6.1 Challenges in IoT
2.6.1.1 Authentication
2.6.1.2 Authorization
It makes sure that the accessibility of IoT entities is given to only authorized
users [13].
2.6.1.3 Availability
It makes positive that even if the malicious attacks happened to the services and
networks ought to be obtainable regularly.
2 Blockchain for Internet of Things (IoT): Research Issues, Challenges, and Future… 25
2.6.1.4 Confidentiality
It makes positive that solely authorized bodies should be aware regarding the data
[13] as well as routing information.
2.6.1.5 Integrity
The transfer of knowledge ensures that all the involved routing information has not
been altered by a mediator or a malicious individual.
2.6.1.6 Privacy
It assures that the identities of the IoT entities ought to be extremely protected
against negotiation.
2.6.1.7 Trust
2.6.2 Challenges of Blockchain
2.6.2.1 Privacy
The users of blockchain are aware of their public keys. This indicates that obscurity
was not accomplished as the entire transactions are shared and third parties can
investigate as well as determine these transactions and infer the participants’ iden-
tity [14].
26 S. Karagwal et al.
2.6.2.2 Energy Efficiency
Blockchain in IoT endpoints generally gets benefitted from the giver of power-
based powerful instrumentation with batteries. Therefore, for permission of long-
run node placement, energy efficiency was needed.
2.6.2.3 Security
For a single user, the desired security idea is to ideally manage the specific keys of
the user in his possession, because the criminal would like in combination with the
public key to steal something from him [14].
2.6.2.4 Throughput and Latency
The position in blockchain for IoT could need a blockchain network capability to
come up with vast “amounts of transactions per time element in clear networks. As
for the assent latency, it should be determined that the issue of the agreement proce-
dure was a lot of vital concerning latency than uncommon hashing.”
2.6.2.5 Block Size
2.6.2.6 Bandwidth
2.6.2.7 Multichain Management
In numerous ways, the spread of blockchain slammed from the need to negotiate
with several of them at once. This is also possible only in the case of blockchain in
IoT [14].
2.6.2.8 Autonomy and Enforcement
The rules emphasize that smart contracts must be legally implemented and dispute
resolution development should take place.
2 Blockchain for Internet of Things (IoT): Research Issues, Challenges, and Future… 27
The processed power and the needed time required to implement encryption for
every entity related to blockchain-based ecosystems. The IoT ecosystem is diverse.
Unlike typical computer networks, IoT networks consist of every other devices with
computing capabilities, and not everyone can run the same encryption algorithm at
their own pace [15].
2.6.3.2 Scalability
2.6.3.3 Storage
Storage is also an obstacle. The blockchain does not require storing transactions and
device IDs on a central server, but the public ledger must be stored on the nodes
only [15]. Ledger grows in size over time. This extends beyond the capability of a
variety of smart devices, such as low-capacity sensors.
2.6.3.4 Lack of Skills
Not many people are aware of the working of blockchain technology when you add
IoT to your mix that ratio drops sharply [16].
Because this industry is new in every way, there are no rules or compliance stan-
dards to follow. This is a key issue for manufacturers and service providers. This
impediment alone will frighten many organizations that do not adopt blockchain
technology [15, 16].
COVID-19 has presented a logistical nightmare for vaccine distributors and health-
care professionals around the world. The two most common vaccines, Pfizer and
Moderna, should be stored at a temperature less than 0 degrees Celsius. Otherwise,
28 S. Karagwal et al.
2015 and 2020, integrating IoT into everyday applications in more industries.
Blockchain, on the other hand, is becoming more and more popular as manufactur-
ers in more and more industries understand how to use it to improve their business.
If we consider Gartner’s research, blockchain technology will add up to $ 3.1 tril-
lion in business value by 2030. Blockchain technology and IoT are growing expo-
nentially in the market and this is just the starting. The most interesting development
is how the two technologies are brought together [18, 20]. Because of the character-
istics of blockchain technology and IoT, both merge. While hurdles remain for
blockchain and IoT, the merging of the two could have fundamental implications for
our world. By the end of 2026, hardware will be the most profitable sector.
Figure 2.3 shows the future of blockchain in IoT market.
The integration of blockchain with IoT is the most significant technological
advancement since the merging of IT and transaction processing systems. Because
their acceptance has such a significant influence on our society, it is impossible to
imagine a future in which blockchain and IoT are not deeply intertwined in our
everyday lives. No other technological breakthrough in the last decade is projected
to have the same impact on our lives as these two. “Blockchain adoption and IoT
adoption are merged – and flourishing,” according to a poll.
Various present and potential use cases of blockchain where IoT and blockchain
technology combine are more or less common; therefore studying why and where
IoT implementers in the United States are employing blockchain technology is fas-
cinating, but not particularly unexpected.
As you may be aware, there are several initiatives in the IoT and blockchain sec-
tor where one may put their faith in security and reliability right now. The majority
of respondents cited “improved security and trust” as a primary or secondary reason
for integrating IoT with blockchain networks [21] (almost a third of respon-
dents to b).
According to research, approximately 75% of those who have implemented IoT
technology in the United States have either used blockchain or aim to do so by the
end of 2020. Of those who have used blockchain, 86% use both technologies
together in a variety of initiatives. Blockchain adoption is not uniformly strong
across all industries where respondents have required IoT. While security is a must
in many businesses, in some, trust and security are more crucial [22]. Blockchain
adoption is strongest in prescription drugs, energy, natural resources, utilities com-
merce, and transportation, according to Gartner [21].
According to Gartner, the adoption rate of blockchain will be highest among IoT
implementers in the areas of prescription medications, energy, natural resources,
utilities, and transportation.
2.8 Conclusion
This analysis has bestowed a scientific perspective in the eyes of researchers within
IoT and blockchain integration. Research shows a good sign for technology on an
individual and collective basis. With the Internet of Things and blockchain, security
and privacy [23–26] are still key considerations that businesses should consider.
Furthermore, research reveals that combining blockchain and IoT items can give
several alternatives that will be useful in identifying exact solutions to blockchain
security concerns. IoT objects. The integration of each technology can solve the
current security problem of primarily IoT-based fields.
2.9 Future Directions
The blend between IoT and blockchain can propose a well-built methodology by
creating a new path for business models and extended applications.
2.9.2 Voting Transparency
Electronic voting methods are now plagued by a design problem. A single provider
has control over the code base, database, and system outputs by design. The moni-
toring tools are controlled by the same vendor. Due to those centralized arrange-
ments, there is a lack of confidence that voters and election organizers demand [20].
In this situation, blockchain can assist in the creation of a secure transaction data-
base that can be used to log votes and audit vote outcomes in a more reliable manner.
2.9.3 Edge Computing
It is a scalable virtual system that enables the processing and capacity between buy-
ers and also the server of the cloud computing system. No strangers request, fog
devices can talk to each other. Blockchain can be used to accommodate the mis-
match between fog centers and blockchain in IoT utilities. Information store can
manage various information assets for blockchain in IoT data storage frameworks.
Consistent approaches to sharing and securing this important information are key
issues in storing both the information [20, 21].
IoT and blockchain will change monetization by sharing IoT data generated by
device and sensor owners in exchange for small payments made in real-time. Tile
pay, for example, provides a secure and decentralized online marketplace that
allows users to register their devices and sell their data in real-time. As a result, they
receive digital currency.
Most of the IoT blockchain applications that have come so far from concerns of
scalability, security, and privacy have required some form of blockchain focus
added. Research and investigation should be conducted to support the decentraliza-
tion of blockchain in IoT applications and the transition to a truly decentralized,
scalable architecture.
32 S. Karagwal et al.
The number of connections and transactions through the IoT system is growing
exponentially. As a result, the demand for computing/processing power continues to
grow. Using blockchain requires a consistently high level of CPU performance. The
system can solve this problem by opening the ability to buy and sell anonymous
data from connected devices (i.e., data monetization). In addition to all authorized
independent third-party resellers, OEMs and data providers can also conduct these
data transactions (of course, payments are made via Bitcoin). Purchasing and mak-
ing this data accessible will power the entire blockchain and IoT setup by motivat-
ing external parties to power more CPUs and invest in technically renewable
resources.
2.9.7 Security
BIoT system can implement a few numbers of proposed methods which are estab-
lished by machine learning techniques [22]. These intrusion detection systems iden-
tify attacks on networks and systems [20]. Signature-based and anomaly-based are
the two common ways of detection. An IDS of any kind can identify attacks depen-
dent on anomalies, signatures, or both.
The top media circulation in BIoT that network service providers have recently
experienced has provided for a decentralized media transfer brokerage methodol-
ogy that supports collaborative blockchain.
References
1. L. Kohli, M. Saurabh, I. Bhatia, U.S. Shekhawat, M. Vijh and N. Sindhwani, “Design and
Development of Modular and Multifunctional UAV with Amphibious Landing Module”.
In Data-Driven Approach Towards Disruptive Technologies: Proceedings of MIDAS 2020
(pp. 405–421). Springer Singapore, 2021
2 Blockchain for Internet of Things (IoT): Research Issues, Challenges, and Future… 33
2. M.K. Saini, R. Nagal, S. Tripathi, N. Sindhwani and A. Rudra, “PC Interfaced Wireless
Robotic Moving Arm”. In AICTE Sponsored National Seminar on Emerging Trends in
Software Engineering (Vol. 50), 2008.
3. L. Singh, M.K. Saini, S. Tripathi and N. Sindhwani, “An Intelligent Control System For Real-
Time Traffic Signal Using Genetic Algorithm”. In AICTE Sponsored National Seminar on
Emerging Trends in Software Engineering (Vol. 50), 2008.
4. Vyas, A., Kadakia, U., & Jat, P. M., Extraction of professional details from web-urls using
deepdive. Procedia computer science, 132, pp. 1602–1610, 2018.
5. Srivastava, A., Gupta, A., & Anand, R. (2021). Optimized smart system for transportation
using RFID technology. Mathematics in Engineering, Science and Aerospace (MESA), 12(4),
953–965.
6. R. Anand, A. Sinha, A. Bhardwaj and A. Sreeraj, “Flawed Security of Social Network
of Things”. In Handbook of Research on Network Forensics and Analysis Techniques
(pp. 65–86). IGI Global, 2018.
7. Gupta, A., Srivastava, A., & Anand, R. (2019). Cost-effective smart home automation using
internet of things. Journal of Communication Engineering & Systems. 9(2), 1–6.
8. Zeinab, K. A. M., & Elmustafa, S. A. A. (2017). Internet of things applications, challenges and
related future technologies. World Scientific News, 2(67), 126–148.
9. Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of
things. Ieee Access, 4, 2292–2303.
10. Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. A Roadmap for Security Challenges in
Internet of Things. Digit. Commun. Netw.(2018).
11. Moin, S., Karim, A., Safdar, Z., Safdar, K., Ahmed, E., & Imran, M. (2019). Securing IoTs in
distributed blockchain: Analysis, requirements and open issues. Future Generation Computer
Systems, 100, 325–343.
12. Ammar, M., Russello, G., & Crispo, B. (2018). Internet of Things: A survey on the security of
IoT frameworks. Journal of Information Security and Applications, 38, 8–27.
13. Hou, J., Qu, L., & Shi, W. (2019). A survey on internet of things security from data perspec-
tives. Computer Networks, 148, 295–306.
14. Nguyen, D. C., Pathirana, P. N., Ding, M., & Seneviratne, A. (2020). Integration of blockchain
and cloud of things: Architecture, applications and challenges. IEEE Communications Surveys
& Tutorials, 22(4), 2521–2549.
15. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer net-
works, 54(15), 2787–2805.
16. Medini, G., Sarvesh, T., Ajay, R., Sumit, B. (2022). “A Systematic Review on Blockchain
in Transforming the Healthcare Sector”, Transformations Through Blockchain Technology,
pp. 181–200, ISBN: 978-3-030-93343-2, March 2022, Springer 2022. [https://doi.
org/10.1007/978-3-030-93344-9_8].
17. Kim, Y., Nam, J., Park, T., Scott-Hayward, S., & Shin, S. (2019). SODA: A software-defined
security framework for IoT environments. Computer Networks, 163, 106889.
18. Shala, B., Trick, U., Lehmann, A., Ghita, B., & Shiaeles, S. (2019). Novel trust consensus
protocol and blockchain-based trust evaluation system for M2M application services. Internet
of Things, 7, 100058.
19. Zhu, Loke, jiang, and xiang.” Applications of Distributed Ledger Technologies to the Internet
of Things: A Survey”, ACM, 2019.
20. Sengupta, J., Ruj, S., & Bit, S. D. (2020). A comprehensive survey on attacks, security issues
and blockchain solutions for IoT and IIoT. Journal of Network and Computer Applications,
149, 102481.
21. Mohanta, B. K., Jena, D., Panda, S. S., & Sobhanayak, S. (2019). Blockchain technology: A
survey on applications and security privacy challenges. Internet Things 8 (2019), 1–19.
22. Singh, H., Rehman, T. B., Gangadhar, C., Anand, R., Sindhwani, N., & Babu, M. (2021).
Accuracy detection of coronary artery disease using machine learning algorithms. Applied
Nanoscience, 1–7.
34 S. Karagwal et al.
23. S. Badotra, D. Nagpal, S. N. Panda, S. Tanwar and S. Bajaj, “IoT-Enabled Healthcare Network
With SDN”, 2020 8th International Conference on Reliability, Infocom Technologies and
Optimization (Trends and Future Directions) (ICRITO), Noida, India, 2020, pp. 38–42
24. Kakkar L., Gupta D., Saxena S., Tanwar S., “IoT Architectures and Its Security: A Review”,
Second International Conference on Information Management and Machine Intelligence,
Lecture Notes in Networks and Systems, vol 166, Pp. 87–94, 2021, Springer, Singapore.
25. Anand, R., Shrivastava, G., Gupta, S., Peng, S. L., & Sindhwani, N. (2018). Audio watermark-
ing with reduced number of random samples. In Handbook of Research on Network Forensics
and Analysis Techniques (pp. 372-394). IGI Global.
26. Gupta, A., Asad, A., Meena, L., & Anand, R. (2023). IoT and RFID-Based Smart Card System
Integrated with Health Care, Electricity, QR and Banking Sectors. In Artificial Intelligence on
Medical Data (pp. 253-265). Springer, Singapore.
Chapter 3
Smart Health Care by Harnessing
the Internet of Things (IoT): Applications,
Challenges, and Future Aspects
3.1 Introduction
distribution, and drip irrigation has allowed farmers to come up with more fruitful
produce as a result of this while utilizing their resources more efficiently and cutting
down wastage to the minimum. All these developments make headway toward
“smart agriculture” [7, 8]. This chapter examines how the Internet of Things (IoT)
and its various features can be used to improve health care. In recent times, health
care has become the next big opportunity for the Internet of Things (IoT). IoT solu-
tions of today have a huge potential to boost health-care operations more than ever,
thus improving results, expenditure, and efficiency alike. By integrating devices
such as sensors and actuators [9, 10] in patients and capturing medicine intake data
for monitoring and tracking purposes, smart health care plays a vital part in health-
care applications. Clinical care employs the Internet of Things to monitor a patient’s
physiological conditions by collecting and analyzing data from qualitative sensors
and then transmitting the processed data to processing centers to take appropriate
actions [11]. These devices are valuable for everyone who wants to keep track of
their health, not just patients. IoT technologies such as cloud computing, wireless
sensor networks, micro-electromechanical systems (MEMS), and the future Internet
enable communication anytime, anywhere, known as the “Internet of
Everything” [12].
In the health-care industry, there is a growing demand for connected devices. In
health care, IoT has a wide range of applications. Apart from remote monitoring and
tracking of patients’ health, health-care equipment is being upgraded with IoT, such
as smart beds that detect occupancy, smart pill dispensers that monitor the patient’s
drug intake and send alert signals to the caregiver, and so on. IoT can also aid in the
early diagnosis of specific patient health issues and give timely responses to medical
emergencies [13]. As a result, it has proven to be useful in diagnosing and treatment
of disorders. It is feasible to collect evidence and diagnose numerous digestive and
gastric illnesses using swallowable sensors in a far less-invasive manner.
The Internet of Things has amended the health-care industry with its immeasurable
applications. The implementation of IoT in health care first began with its usage in
remote patient monitoring and retrieving data from devices that were placed on the
bedside of the patients. These helped doctors and physicians to make the right medi-
cal decisions, abolishing any kind of human errors. IoT has immense potential in the
provision of advanced health-care devices and equipment. To the health-care indus-
try that had almost given up hope due to the surging prices spent on treatment due
to the increase in chronic diseases, IoT became the source of light with the introduc-
tion of its X-ray machines to monitor patients and thus enhance the mode of opera-
tions. Ever since, IoT has made a remarkable contribution in making health-care
3 Smart Health Care by Harnessing the Internet of Things (IoT): Applications… 37
Fig. 3.1 The timeline of major events in the history of the Internet of Things (IoT)
3.2.2 Predominant Techniques
Internet of Things (IoT) technology has been molding today’s world. Connectivity,
interaction, and efficient data sharing have been key aspects of IoT’s success. IoT
cannot be just a device or a piece of data alone; it is the fluently orchestrated inter-
face between devices, technologies, and vital data, rightly calling it the IoT ecosys-
tem. An (IoT) ecosystem consists of smart devices and systems that run on the
Internet, like sensors, processors, and communication devices that act on data
extracted from different environments that they are used in IoT devices connect to
an IoT gateway or other devices. Here, the data is stored in the cloud and may be
analyzed later or locally [14]. This is how the devices share data. Figure 3.2 depicts
the advantages of various IoT-based medical technology for the stockholders.
38 C. V. S. Aishwarya et al.
Fig. 3.2 The advantages of IoMT devices and technologies and how they benefit all the stakehold-
ers in the health-care sector
3.2.2.1 Data Mining
Data mining is the processing of huge amounts of data that helps companies to
troubleshoot, cut down on risks, and explore new opportunities in a variety of fields.
This branch of data science draws similarities to mining a mountain for ore; the only
difference is that here we search for important information in a large database,
hence the name data mining. This is not a technique that was founded during the
digital age [15]. Data scientists now play a vital role in various business organiza-
tions across the globe as companies try to stay ahead of the competition, which has
increased the importance of data science more than ever before. Data mining can
solve various problems that were too impossible to solve traditionally and were
often time-consuming when done manually. A large range of statistical techniques
is used to analyze data in various ways, whose findings can now be applied to pre-
dict future outcomes and take the necessary actions to achieve them [16].
In health care, data mining has become increasingly popular and would not be
wrong if we said it is increasingly essential. As mentioned in Fig. 3.2, data mining
can benefit all characters involved in the health-care industry greatly. To put things
into perspective, data mining helps health-care insurers to detect insurance fraud
and abuse. Health-care organizations make customer-physician relationships and
management decisions better, help provide treatment effectively, and make health-
care services affordable for the com. The humongous quantity of data that is gener-
ated by the health-care transactions is way too complex to be processed and analyzed
by standard traditional methods [17, 18]. Data mining provides us the methodology
and technology to transform this mammoth amount of data into useful and accurate
information for decision-making.
3 Smart Health Care by Harnessing the Internet of Things (IoT): Applications… 39
3.2.2.2 Artificial Intelligence
In the medical world, smart devices have been crucial for monitoring patients in the
intensive care and continuous supervision units. Artificial intelligence enhances the
ability to identify deterioration and deviation from normalcy and senses the devel-
opment of complications. This significantly reduces fatality risks and hospital-
acquired conditions. Neurological diseases can disable patients’ speech, mobility,
and interaction with their surroundings. However, brain-computer interfaces (BCIs)
have the potential to restore these fundamental experiences to those who lost them
forever [19, 20]. Artificial intelligence also has the potential to bring the next gen-
eration of radiology tools into active usage, making them good enough to replace
the tissue sampling from biopsies that could be risky in some cases [21, 22].
Electronic health records (EHRs) have been an important part of the health-care
industry’s digitization journey, but the changeover has resulted in a slew of issues
such as cognitive overload, endless documentation, and user burnout. Artificial
intelligence is now being used by EHR developers to provide more intuitive inter-
faces and automate time-consuming repetitive operations. Artificial intelligence can
help process routine inbox requests, like regular med supply and notifying about
results. Artificial intelligence has now won the trust in taking over tasks that require
the intensive clinician’s attention [23].
Almost everyone nowadays has access to devices with embedded sensors that col-
lect useful information from the user. From cellphones with distance trackers to
wearables that monitor heart rate around the clock, a significant amount of health-
related data is created “on the go” [24]. Wearable biosensors have attracted a lot of
attention because of their ability to give consistent real-time, precise data through
noninvasive assessments of biochemical indicators like sweat, tears, and saliva,
among other things. We can now infer data about metabolites, microbes, and hor-
mones, thanks to recent improvements in electrochemical and optical biosensors, as
well as advances in the noninvasive monitoring of biomarkers [25]. Integration,
miniaturization, and mass manufacture of biosensor devices have all been achieved
using micromachining, which is also known as microfabrication [26]. In Fig. 3.2,
we see that sensors and monitoring devices have helped increase the accuracy of
diagnosis, which in turn increases the effectiveness of treatment provided and
reduces errors and complications to a great extent. In the last few years, tremendous
advancements have been achieved in the design and development of biosensors
[27]. The biosensor market has grown significantly as a result of recent advances in
molecular biology. Biosensors are anticipated to play a significant role in the detec-
tion of diseases and microorganisms such as HIV and COVID-19 in the future. The
global biosensor market is expanding at a breakneck pace, with projections of $50
billion by 2025 [28].
40 C. V. S. Aishwarya et al.
3.2.3 Trends of Today
Traditional health care will not suffice the needs of everyone owing to the increasing
growth in population. Medical services are not accessible to people despite advanced
technologies and excellent infrastructure. The IoT-based health-care system not
only helps monitor patients, reducing the cost of care provided but also helps the
physicians to expand their services without being limited by any kinds of geograph-
ical barriers. Its broad range of applications enhances the lifestyle and communica-
tion of people, especially those in need of special care [29]. With the idea of “smart
cities” in trend, a smart and effective health-care system will improve the lives and
health of people. Today, our health care has become more expensive than ever. The
use of devices that allow remote monitoring of patients can be beneficial in cases
where they require hospitalization during treatment. IoT technologies thus make it
possible to cure any ailments before they become critical and move out of hand.
This is why there is an utter need for several IoT-based technologies and applica-
tions to be developed, especially in the field of health care. Figure 3.3 illustrates the
expenditure on IoT solutions from 2017 to 2025.
The following are the trends of IoT:
• Apart from artificial intelligence, virtual reality, robotics, and quantum comput-
ing, the “Internet of Things” is one of the trending technologies, according to a
2018 research by Accenture, encompassing 25 countries Tech Vision.
• Just in the European Union (EU), the number of IoT-based fitness and health-
care units has nearly increased by twofold from 2017 to 2020.
• By 2023, the number of devices connected to the Internet of Things throughout
the world is expected to reach 43 billion, nearly a threefold increase from 2018.
• By 2021, the investments being made in the field of IoT-based technology are
expected to grow at an average rate of 13.6 percent per year.
• The total number of business organizations that make use of IoT-based technolo-
gies today has increased drastically from 13% in the year of 2014 to 25%.
2000
1567
1500
1079
1000 800
594
418
500 248
151 212
110
0
2017 2018 2019 2020 2021 2022 2023 2024 2025
Fig. 3.3 Forecast end-user spending on IoT solutions worldwide from 2017 to 2025 (in billion US
dollars). (Source: https://www.statista.com/)
3 Smart Health Care by Harnessing the Internet of Things (IoT): Applications… 41
• According to IoT analytics, the number of active IoT devices hits 9.5 billion in
2019, up from the previous estimate of 8.3 billion.
• According to Vodafone, more than one-third of the companies today use IoT
solutions.
The ongoing pandemic (COVID-19) has also accelerated the need to adopt a
more technology-driven health-care system. The number of online appointments
with health-care professionals in the United States is estimated to be over 36 mil-
lion. In actuality, this figure is close to 1 billion, and it will undoubtedly increase as
infrastructure and patient knowledge improve.
Devices that allow older individuals to remain independent while at home have
shown strong growth as well. These include AI-aided tools to detect any changes in
the daily routines and immediately alert the health-care providers.
Remote monitoring of patients not only increases the quality of health care but also
reduces costs by recognizing the diseases and preventing any critical situations [31].
The reliance of the health-care system on IoT-based technologies will increase fur-
ther because this sector always pushes for advanced and improved services.
These IoT-based devices like blood pressure (BP) monitoring and fitness tracking
devices are extensively used to maintain one’s health by self-care principles through-
out the world. Developments in Radio Frequency Identification (RFID) tags, imag-
ing devices, and biosensors are among the major causes for the increase in the
number of predominant medical prototypes. Most wearables rely on a variety of
biosensors such as pulse sensors that have pressure, ultrasound, and radiofrequency
(RF) sensors. These have been useful in detecting cardiac arrests. Sensors that have
been created to record the respiration rate in humans have the potential to identify
respiratory illnesses like asthma, lung cancer, etc. Other sensors like EEG and pulse
oximeter are also gaining popularity in the market. Consolidation of this data in an
organized manner can be used to predict future trends by detecting health patterns.
The combination of these sensors can also highly reduce the risk of sudden infant
death syndrome (SIDS) [32].
Systems with the ability to address critical health conditions providing independent
lifestyle especially to the elderly people are known as ambient-assisted living
(AAL). This makes use of the idea of keep-in-touch (KIT) and closed-loop health-
care services and devices. Recent neurotechnology-based innovations make use of
sensors that can control neural functioning. Moodles is the umbrella term for devices
that help enhance patient mood. They help improve and repair brain processes. Halo
Neurosciences and Thync are two leading companies that make wearables that are
designed to elevate an individual’s mood by sending low-intensity current.
Different dimensionalities and online services of mobile health care (m-health care)
are made possible with the application of IoT [33]. For various fatal and chronic
diseases, it is considered indispensable to diagnose diseases and monitor patients’
health conditions continuously before any serious disorder or infection occurs. IoT
gives this challenge a solution through various techniques like artificial intelligence
3 Smart Health Care by Harnessing the Internet of Things (IoT): Applications… 43
and ingestible sensors [34]. Ingestible electronic devices are small capsules that
comprise a microprocessor, a power supply, sensors, controller, etc. which are all
made of biocompatible materials. These components enable the devices to transmit
signals and data to physicians for the diagnosis of diseases and their monitoring.
These devices are noninvasive, real-time health-care technology that show potential
for far-reaching implications, more than what current sensors and monitoring
devices are capable of. The market for ingestible sensors has been estimated to be
around $491 million (2016), which is expected to increase at an annual growth rate
of around 19% by 2024 [35]. In an article cited the journal “Science” dated May
2018, an innovative ingestible micro-bio-electronic device (IMBED) was presented
by researchers. This device can be used to monitor the health of the gut. Researchers
created a “heme-sensitive probiotic biosensor” that can detect gastrointestinal (GI)
bleeding [36]. Previously, ingestible sensors were limited to just pH sensing, tem-
perature measurement, and blood pressure indication; with these ingestible sensors,
we can push toward particular diagnostics. Bacterial species can also be modified as
a nanobiosensor. Certain bacteria can sense a surfeit of both exochemical and physi-
cal conditions via specific metabolic pathways. Scientists use the heme-sensing
genes of Lactococcus lactis and Escherichia coli O157:H7 bacteria to sense blood
and associated components in the external environment. A modified output signal is
then produced. This signal is observed as bioluminescence (Photorhabdus lumines-
cens luxCDABE) [37]. This system is later inserted into gut-friendly bacteria. This
pill works on an energy source that runs on the acid present in the gastric cavity. Our
gut can synonymously be called a hot soup of life; food boluses undergo various
chemical and physical reactions and changes. This is why real-time monitoring of
our gut provides a wide range of gut events that have never been observed. Gases
released in the gut can be measured to indicate the bacterial biomass present and
identify the bacterial metabolites present in the gut. Hence, analysis of the gas in the
gut can be used for the development of biomarkers to treat gastrointestinal tract
disorders [38].
During surgery, surgeons are always expected to maintain precision while making
incisions or performing other surgical operations on a patient. Tasks like these that
constantly require repetition are very challenging and demanding. To assist sur-
geons with maintaining such precision, the industry is now using artificial intelli-
gence (AI) and robots in surgical procedures [39]. Surgical robots can control the
depth, speed, and trajectory of their hydraulic maneuvers with much greater preci-
sion. They are customized specially for such repetitive movements while working
without fatigue. Robots can still go where traditional surgical tools cannot and can
remain completely still for a longer duration of time [40]. Experience is invaluable
for any surgery, but they are also physically demanding, and fatigue is always a
limiting factor. The skillset and the knowledge that surgeons have amassed
44 C. V. S. Aishwarya et al.
throughout their careers are overshadowed by a limited motor ability. These col-
laborative robots can help eliminate the problem of hand tremors and avoid collat-
eral tissue damage that is often unintentional. Manufacturers have now realized that
observatory data and deep machine learning data are more important to automate
over a machine programmed by a software engineer who does not know about real-
time scenarios [41]. AI can also be used with a machine for the analysis of scanning
images which helps detect malignant tumors, ulcers, and other orthopedic issues.
Laparoscopic analysis of surgeries such as sleeve gastrostomy procedures helps
identify unexpected process deviations in real-time. Robots are capable of repeating
the exact motions without variation in force or displacement. This makes it extremely
useful for repetitive and precise procedures like hair transplant surgery.
3.3.4 Fitness and Nutrition
People are getting more aware of their health and are very conscious about main-
taining a healthy and proper physical shape. This is why the products that aid them
in this process are also on the rise. Due to the continuous drift toward digital fitness
tools, various devices including wearables like smartwatches, fitness trackers, smart
shoes, and IoT-powered gym machinery have emerged in recent times and will con-
tinue to grow in number and efficiency. IoT-based devices in the fitness industry:
1. Help in providing enticing training employing technology based on virtual real-
ity. For instance, headsets provide the opportunity to the users to exercise in any
suitable environment they prefer whenever they want.
2. Help in personalizing the workouts according to the individual needs. The inte-
gration of IoT in training centers and gyms works based on the data received
from sensors and smart equipment. Thus, the exercises can be customized
according to the needs of the person using them. Such devices also make it easy
to track the progress and consequently the health of the users [42].
Tables 3.1 and 3.2 summarize some of the popular IoT-based fitness devices being
used extensively by several fitness enthusiasts. IoT devices used in the fitness realm
provide health and body’s endurance status including how much proteins, fats, or
carbohydrates are being consumed in a diet, thus enhancing the work of both fitness
trainers and nutritionists. For one to stay fit, sleep and rest are also equally impor-
tant. IoT fitness devices monitor how much sleep an athlete or even an individual, in
general, should have and for how much time they should go on with their workout
and training. When such devices are integrated into the body of the individual, they
can control all the related variables on a smartphone by themselves [43]. In the case
of athletes, the risks of getting injured or even death due to strenuous pressure on the
body can be avoided.
IoT fitness apps enable users to share their current status with friends and others.
This can be an excellent source of motivation for any fitness enthusiast. These apps
can provide the user with an online trainee who guides them with personalized
3 Smart Health Care by Harnessing the Internet of Things (IoT): Applications… 45
Table 3.1 Some IoT devices used in the fitness industry along with their key features
S
no Company Device Key features Price Website
1 Polar Polar Verity
Optical heart rate sensor with $130 https://www.
Sense options for viewing and recording polar.com/en
workouts
2 LARQ LARQ Bottle Make use of a UV C-LED chip to $120 https://www.
PureVis eradicate odor-causing germs livelarq.com
3 Kolibree Ara First-ever AI-connected smart £129 https://www.
toothbrush kolibree.com
4 Tellspec TellSpec Analyzes the ingredients in one’s $320 https://tellspec.
Preemie meal through an app connected via a com
Sensor smartphone
5 FoodMarble Food Marble Measures the hydrogen released by $299 https://
AIRE undigested food particles and helps foodmarble.com
find what is right for the gut
6 Beddit Beddit sleep Tracks sleeping pattern, snoring, $150 https://www.
monitor heart rate, and breathing while beddit.com/
sleeping
7 Nima Nima gluten Detects gluten. Uses capsules and $229 https://blog.
sensor associated apps to track the data nimasensor.
com/
8 Yogifi Smart yoga Detects when the person is out of $297 https://www.
mat alignment and gives real-time yogifi.fit/
feedback on how to correct the pose
9 JAXJOX Kettlebell 6-in-1 adjustable kettle bell with $249 https://jaxjox.
Connect 2.0 real-time performance tracking com/
workouts. For example, Google Fit is one such application that tracks heart health
and other related activities through the sensors present on the wearable [44].
3.3.5 IoT in Pharmaceuticals
Quality control and pristine production are always one of the major challenging
tasks in the pharma industry. In the production of a potentially life-saving product,
one of many parameters could go wrong and these may include leakage of a danger-
ous liquid or gas, a fire hazard, and improperly produced medicine becoming toxic,
or even an equipment failure that could lead to the breakdown of the entire produc-
tion. However, a network of several connected devices can greatly reduce these
malfunctions and provide accurate production results by detecting and adjusting
problems before they become major.
Technologies like 3D printing, artificial intelligence, and blockchain to improve
various systems have innumerable applications in manufacturing and distribution
alongside supply chain which help the industry to make its systems transparent and
fast. Services like “Amazon Key” launched by Amazon are a great example of the
46 C. V. S. Aishwarya et al.
required for a specific drug to reach the market but also the real-time data produced
can be reverted to detect active errors that cross the value chain. Data from wearable
devices can be used by health-care professionals to prescribe personalized medi-
cines (PM) that will improve the drug efficacy while reducing the time spent for the
treatment otherwise.
3.4 Problems and Challenges
The expansion of IoT across the globe has been very rapid in a very short period.
Almost every country has access to some form of smart device. IoT has also become
an integral part of military and defense technology. With IoT setting a strong foot
toward smart health care, certain challenges lie ahead from making it easily acces-
sible to each and every person [46]. The Consumer Electronics Show that took place
at the beginning of January 2017 in Las Vegas already showed us quite a few prom-
ising innovations in this field. It also proved that there are many missing pieces to
the puzzle. Many IoMT initiatives that have been directed toward fighting chronic
diseases still need more enlightenment [47]. This technology specialty will need to
expand significantly before it can begin to provide consistent improvement results.
Moreover, many devices are said to be highly accurate based on their theoretical
probabilities. On-field testing and variable factors that affect the performance are
always in question [48]. There are many unforeseen and unexpected situations or
outcomes of these devices, and they are hard to predict which need the most care
and supervision to avoid them. In an industry like health care where there is no
margin for error, such factors can make them unreliable, which in turn makes it hard
to convince potential consumers to use them.
With many hardware platforms, there is also a lot of software to power and man-
age it all. To work effectively and keep up to date, this software and hardware should
be periodically updated. And this is where regular updating becomes important,
which will take time and work and may result in a slew of technological troubles
[49]. The IoMT must yet be certified by international health-care regulatory agen-
cies. Inventors and patent applicants find it difficult to procure parts and get approval
for their novel technologies and gadgets because of the numerous laws and restric-
tions about ethical and legal issues surrounding that political state. This tends to
demotivate independent innovators and all their ideas tend to remain in paper
alone [50].
The most common challenge in an IoT world would be the colossal amount of data
coming continuously from several devices connected over a system. Managing this
data is tactful. This myriad of information is collected in various forms that include
48 C. V. S. Aishwarya et al.
sensor data, diagnostic data, digital pathology data, imaging data, and others which
collectively lead to excessive accumulation of data. It will be critical to establishing
approaches that allow for the translation of this raw data into meaningful informa-
tion. Raw data should be translated into the concept of precision behaviors of a
person, such as inadequate breathing, eating, or symptoms of depression or sick-
ness, in the medical area, for example [51].
Although IoT has made huge advancements, with its techniques such as artificial
intelligence (AI) in health care, several other streams of networks have to be enabled
to act as primitives in case of any future inferences that are often unexpected.
However, the reality that no reasoning technique is completely accurate still holds.
As a result, users may be hesitant to trust the system if the analyzed data is ambigu-
ous. This is why various medical organizations are still very skeptical about the
usage of these advanced technology-based devices and are cautious when it comes
to proceeding with such vulnerable system-connected equipment.
3.4.2 Security
3.4.3 Privacy
Because much of the data in an IoT system, specifically when used in health care,
may be personal, maintaining anonymity and restricting the processing of individ-
ual data are critical. To keep IoT devices prevalent, a variety of confidentiality con-
siderations must be addressed, including:
3 Smart Health Care by Harnessing the Internet of Things (IoT): Applications… 49
Because of its automated sensor operations at relatively cheap prices, the Internet of
Things (IoT) is increasingly popular in many sectors. In health-care applications,
these devices form an ecosystem of connected technologies that sense a patient’s
pro-medical conditions such as blood pressure, oxygen level, heartbeat, tempera-
ture, and more. They can also take appropriate emergency actions if needed. Various
systems have been presented to monitor a patient’s state utilizing Wireless Body
Area Network (WBAN) based on low-powered biosensor nodes [53]. With so many
upgraded medical devices, technology-driven services in the health-care industry
become pertinent to secure these innovative services and products. This is where a
patent comes into play. A patent serves as a means through which an entity can get
all the rights to their original idea and can also earn monetarily after due process of
patent valuation determines its actual value in the market. In simple words, the
inventor gets sovereign rights over his/her product and no other entity can make the
same product or sell it unless they have the inventor’s assent.
Medical devices are classified into three classes by the Food and Drug
Administration (FDA), i.e., Class 1, Class 2, and Class 3 based on the field of usage
and the risk level the medical device handles, i.e., Class 1 for low-risk scenarios,
Class 2 for moderate risk involvement, and Class 3 for high-risk devices. As the risk
increases from Class 1 to Class 3, so does the related control of the device. Within
the FDA the Center for Devices and Radiological Health (CDRH) is responsible for
ensuring the safety and effectiveness of the medical device and eliminating hazard-
ous exposure to corrosive chemicals and electrically unsafe and radiation-emitting
products. Class 1 medical device has the least amount of regulatory control, and
these include about 47% of all medical devices [54]. For these devices, the “Pink
Market” notification application and the Fixed Deposit (FD) clearance are not
required, before marketing the devices. However, the manufacturer is supposed to
register its establishment and raise its generic product with the Fulfillment by
Amazon (FBA). Class 2 medical devices are those where general control is not
enough to assure their effectiveness and the physician needs special control. These
devices make up almost 43% of all medical devices. About 10–15% of clinical trials
come under Class 2 devices. These are moderate-risk devices [55]. In the case of
50 C. V. S. Aishwarya et al.
Class 3 medical devices, the risk level is very high to the end-user and therefore
requires general control, special control, and premarket control as well. Class 3
devices make up the remaining 10% of the medical devices. Normally all the Class
3 devices are generally life-supporting or life-sustaining devices [56].
The most relevant patent classifications (USC or US Class) are based on highly
active patent classes:
340/572.1 – Communicational (on a protected article, a detectable device (e.g.,
a “tag”))
600/300 – Devices for diagnostic testing
600/509 –Heartbeat electric signals detection
600/508 –Devices for the evaluation of heart condition
607/36 – Electrical applications (stimulator housing or encapsulation feature)
Several notable medical patent developments have recently made headlines.
Some of these medical patients include:
–– The superbug test: Translational Genomics Research Institute (TGen) and
Northern Arizona University (NAU) have secured an Australian patent [57].
–– Reprogramming human skin cells: Converts human skin cells into engines of
tissue regeneration (patent number 9,290,740).
–– BioStack 4 Microplate Stacker: Automatic de-lidding and re-lidding of micro-
plates is a one-of-a-kind technology (patent number 9,366,686).
Patents and innovations in the health-care industry improve the quality of medi-
cal facilities provided and improve the lives of hundreds of millions of people
throughout the world. Challenges remain in finding the most effective device or
technology that is error-free and 100% accurate and complete. Making these
advances available to individuals in dire need while making them affordable and
easily accessible is also important. The number of patent cooperation treaties
(PCTs) has been exponential, and these ideals and devices are entering the con-
sumer market and its popularity is increasing among business cooperatives and
potential customers alike. The United States system governing innovation and
implementation of medical patents insists on a balance between commercial inter-
ests and safety efficacy concerns; while time-consuming and expensive, this pro-
vides applicants a measured framework within which societal health care benefit
through products created by them may be realized [57].
3.6 Conclusion
There are countless predictions about the potential of the Internet of Things (IoT) to
bring about a revolution in the health-care sector by improving the quality standards
while dramatically reducing the costs. As mentioned in the International Conference
on Intelligent Computing and Communication Technologies (ICICCT), about 8.5%
of the global population is of age 65 years or older and this is expected to rise to
3 Smart Health Care by Harnessing the Internet of Things (IoT): Applications… 51
17% by 2050. Life expectancy will increase from 68.6 years (as of 2015) to 76.2
years in 2050. This would mean more cases of chronic diseases in people and lim-
ited resources while society continues to have higher expectations from technology.
Although, when compared to the other sectors, the market for IoT in the health-care
sector is at infancy, it is still said to be growing considerably. With its increased
sophistication in sensing, control, communications, and ability to handle mammoth
amounts of data seamlessly, IoT is breaking the boundaries of traditional medicine
while increasing accuracy and effectiveness and downsizing the number of errors.
The ability and efficiency of different health-care organizations to convert the data
gathered by IoT into significant insights will greatly influence the future of IoT. New
challenges are bound to arise due to the gigantic number of devices, the connection
of both the physical world and the world of the Internet. The transparency of sys-
tems and the ever-persistent problems of privacy and security may slow down the
progress and popularity of these technologies.
However, these challenges will help expose flaws in these devices and push
toward the advancement in the ever-transforming world of IoMT technology [58,
59] for the future. The implementation and the deployment of these high-end tech-
nologies, especially in the health-care sector will bring about more and more signifi-
cant benefits to all the health-care stakeholders. IoT in health care is expected to
flourish, overcoming all its challenges and transforming the conventional health-
care models of today’s world and making smart health care a ubiquitous reality of
our future.
References
1. Perera, C., Zaslavsky, A., Christen, P. and Georgakopoulos, D.: Context-aware computing for
the internet of things: A survey. IEEE communications surveys & tutorials, 16, 414–454 (2013)
2. Srivastava, A., Gupta, A., & Anand, R. (2021). Optimized smart system for transportation
using RFID technology. Mathematics in Engineering, Science and Aerospace (MESA), 12(4),
953–965.
3. Gupta, A., Srivastava, A., & Anand, R. (2019). Cost-effective smart home automation using
internet of things. Journal of Communication Engineering & Systems. 9(2), 1–6.
4. Bakshi, G., Shukla, R., Yadav, V., Dahiya, A., Anand, R., Sindhwani, N., & Singh, H. (2021).
An Optimized Approach for Feature Extraction in Multi-Relational Statistical Learning.
Journal of Scientific and Industrial Research (JSIR), 80(6), 537–542.
5. Haleem, A., Javaid, M. and Khan, I.H.: Current status and applications of Artificial
Intelligence (AI) in the medical field: An overview. Current Medicine Research and Practice,
9, 231–237 (2019)
6. Juneja, S., Juneja, A., & Anand, R. (2020). Healthcare 4.0-Digitizing Healthcare Using Big
Data for Performance Improvisation. Journal of Computational and Theoretical Nanoscience,
17(9–10), 4408–4410.
7. Grewal, D., Hulland, J., Kopalle, P.K. and Karahanna, E.: The future of technology and mar-
keting: A multidisciplinary perspective (2020)
8. Sindhwani, N., Maurya, V. P., Patel, A., Yadav, R. K., Krishna, S., & Anand, R. (2022).
Implementation of Intelligent Plantation System Using Virtual IoT. In Internet of Things and
Its Applications (pp. 305–322). Springer, Cham.
52 C. V. S. Aishwarya et al.
9. M.K. Saini, R. Nagal, S. Tripathi, N. Sindhwani and A. Rudra, “PC Interfaced Wireless
Robotic Moving Arm”. In AICTE Sponsored National Seminar on Emerging Trends in
Software Engineering (Vol. 50), 2008.
10. L. Singh, M.K. Saini, S. Tripathi and N. Sindhwani, “An Intelligent Control System For Real-
Time Traffic Signal Using Genetic Algorithm”. In AICTE Sponsored National Seminar on
Emerging Trends in Software Engineering (Vol. 50), 2008.
11. Ruiz-Fernández, D., Marcos-Jorquera, D., Gilart-Iglesias, V., Vives-Boix, V. and Ramírez-
Navarro, J.: Empowerment of patients with hypertension through BPM, IoT and remote sens-
ing. Sensors, 17, 2273 (2017)
12. Posted, S.: Ubiquitous computing: smart devices, environments and interactions. John Wiley
& Sons (2011)
13. DeVita, M.A., Smith, G.B., Adam, S.K., Adams-Pizarro, I., Buist, M., Bellomo, R., Bonello,
R., Cerchiari, E., Farlow, B., Goldsmith, D. and Haskell, H.: "Identifying the hospitalized
patient in crisis"—a consensus conference on the afferent limb of rapid response systems.
Resuscitation, 81, 375–382 (2010)
14. Ray, P.P.: A survey on Internet of Things architectures. Journal of King Saud University-
Computer and Information Sciences, 30, 291–319 (2018)
15. Kittler, F.A.: 13. The Artificial Intelligence of World War: Alan Turing. In The Truth of the
Technological World, 178–194 (2020)
16. Kantardzic, M.: Data mining: concepts, models, methods, and algorithms. John Wiley &
Sons (2011)
17. Normann, R. and Arvidsson, N. eds.: People as Care Catalysts: From being patient to becom-
ing healthy. John Wiley & Sons (2006)
18. Glasgow, M.E.S., Colbert, A., Viator, J. and Cavanagh, S.: The nurse-engineer: a new role to
improve nurse technology interface and patient care device innovations. Journal of Nursing
Scholarship, 50, 601–611 (2018)
19. Maddox, T.M., Rumsfeld, J.S. and Payne, P.R.: Questions for artificial intelligence in health
care. Jama, 321, 31–32 (2019)
20. Mikołajewska, E. and Mikołajewski, D.: Neuroprostheses for increasing disabled patients’
mobility and control. Adv Clin Exp Med, 21, 263–272 (2012)
21. Goldenberg, S.L., Nir, G. and Salcudean, S.E.: A new era: artificial intelligence and machine
learning in prostate cancer. Nature Reviews Urology, 16, 391–403 (2019)
22. Petroze, R.T., Nzayisenga, A., Rusanganwa, V., Ntakiyiruta, G. and Calland, J.F.:
Comprehensive national analysis of emergency and essential surgical capacity in Rwanda.
Journal of British Surgery, 99, 436–443 (2012)
23. Kilker, S.J.: Effectiveness of federal regulation of mobile medical applications. Wash. UL
Rev., 93, 1341 (2015)
24. Madou, M.J.: Fundamentals of microfabrication: the science of miniaturization. CRC
press (2018)
25. Mohankumar, P., Ajayan, J., Mohanraj, T. and Yasodharan, R.: Recent developments in biosen-
sors for healthcare and biomedical applications: A review. Measurement, 167, 108293 (2021)
26. Khokhar, D., Jadoun, S., Arif, R. and Jabin, S.: Functionalization of conducting polymers
and their applications in optoelectronics. Polymer-Plastics Technology and Materials, 60,
463–485 (2021)
27. Orooji, Y., Sohrabi, H., Hemmat, N., Oroojalian, F., Baradaran, B., Mokhtarzadeh, A.,
Mohaghegh, M. and Karimi-Maleh, H.: An overview on SARS-CoV-2 (COVID-19) and other
human coronaviruses and their detection capability via amplification assay, chemical sensing,
biosensing, immunosensing, and clinical assays. Nano-micro letters, 13, 1–30 (2021)
28. Ahmad, N., George, R.P. and Jahan, R.: July. Emerging trends in IoT for categorized health
care. In 2019 2nd International Conference on Intelligent Computing, Instrumentation and
Control Technologies (ICICICT) (Vol. 1, 1438–1441). IEEE (2019)
3 Smart Health Care by Harnessing the Internet of Things (IoT): Applications… 53
29. Ženko, J., Kos, M. and Kramberger, I.: May. Pulse rate variability and blood oxidation con-
tent identification using miniature wearable wrist device. In 2016 International Conference on
Systems, Signals and Image Processing (IWSSIP) (1–4). IEEE (2016)
30. Balandina, E., Balandin, S., Koucheryavy, Y. and Mouromtsev, D.: IoT use cases in health-
care and tourism. In 2015 IEEE 17th conference on business informatics (Vol. 2, 37–44).
IEEE. (2015)
31. Adhikary, T., Jana, A.D., Chakrabarty, A. and Jana, S.K.: The internet of things (iot) augmenta-
tion in healthcare: An application analytics. In International conference on intelligent comput-
ing and communication technologies, 576–583 (2019)
32. Ahmed, S.B. and Jabarullah, B.M.: Intelligent Healthcare Solutions. In Internet of Things
(IoT), 371–389 (2020)
33. Ahmed, M.U., Zourob, M. and Tamiya, E. eds.: Food biosensors. Royal Society of
Chemistry (2016)
34. Mandsberg, N.K., Christfort, J.F., Kamguyan, K., Boisen, A. and Srivastava, S.K.: Orally
ingestible medical devices for gut engineering. Advanced drug delivery reviews, 165,
142–154 (2020)
35. Mimee, M., Nadeau, P., Hayward, A., Carim, S., Flanagan, S., Jerger, L., Collins, J., McDonnell,
S., Swartwout, R., Citorik, R.J. and Bulović, V.: An ingestible bacterial-electronic system to
monitor gastrointestinal health. Science, 360, 915–918 (2018)
36. Kalantar-Zadeh, K., Berean, K.J., Ha, N., Chrimes, A.F., Xu, K., Grando, D., Ou, J.Z., Pillai,
N., Campbell, J.L., Brkljača, R. and Taylor, K.M.: A human pilot trial of ingestible electronic
capsules capable of sensing different gases in the gut. Nature Electronics, 1, 79–87 (2018)
37. Pepito, J.A., Vasquez, B.A. and Locsin, R.C.: Artificial intelligence and autonomous machines:
Influences, consequences, and dilemmas in human care. Health, 11, 932 (2019)
38. Cerfolio, R.J., Bryant, A.S., Skylizard, L. and Minnich, D.J.: Initial consecutive experience
of completely portal robotic pulmonary resection with 4 arms. The Journal of thoracic and
cardiovascular surgery, 142, 740–746 (2011)
39. MacLachlan, R.A., Becker, B.C., Tabarés, J.C., Podnar, G.W., Lobes, L.A. and Riviere, C.N.:
Micron: an actively stabilized handheld tool for microsurgery. IEEE transactions on robotics,
28, 195–212 (2011)
40. Lay-Ekuakille, A., Griffo, G. and Kidiamboko, S.: 18) Sensing and Actuating System for
Indoor Medical Gas Detection. In IEEE Workshop 2017 (Vol. 11, No. 11, 42) (2011)
41. Lotan, M., Yalon-Chamovitz, S. and Weiss, P.L.T.: Virtual reality as means to improve physical
fitness of individuals at a severe level of intellectual and developmental disability. Research in
developmental disabilities, 31, 869–874 (2010)
42. Guo, X., Liu, J., Shi, C., Liu, H., Chen, Y. and Chuah, M.C.: Device-free personalized fit-
ness assistant using WiFi. Proceedings of the ACM on Interactive, Mobile, Wearable and
Ubiquitous Technologies, 2, 1–23 (2018)
43. Kurti, A.N., Davis, D., Redner, R., Jarvis, B., Zvorsky, I., Keith, D.R., Bolivar, H., White, T.J.,
Rippberger, P., Markeish, C. and Atwood, G.: A review of the literature on remote monitoring
technology in incentive-based interventions for health-related behavior change. Translational
issues in psychological science, 2,128 (2016)
44. Kaewkannate, K. and Kim, S.: A comparison of wearable fitness devices. BMC public health,
16, 1–16 (2016)
45. Sayeed, M.A., Mohanty, S.P., Kougianos, E. and Zaveri, H.P.: Neuro-Detect: A machine
learning-based fast and accurate seizure detection system in the IoMT. IEEE Transactions on
Consumer Electronics, 65, 359–368 (2019)
46. Baker, S.B., Xiang, W. and Atkinson, I.: Internet of things for smart healthcare: Technologies,
challenges, and opportunities. IEEE Access, 5, 26521–26544 (2017)
47. Merson, M.H., Black, R.E. and Mills, A.J.: Global health: Diseases, programs, systems, and
policies. Jones & Bartlett Publishers. (2011)
48. Pava, C.H.: Managing new office technology: An organizational strategy. Simon and
Schuster (1983)
54 C. V. S. Aishwarya et al.
49. Lin, H. and Bergmann, N.W.: IoT privacy and security challenges for smart home environ-
ments. Information, 7, 44 (2016)
50. Saichaitanya, P., Karthik, N. and Surender, D.: Recent trends in IoT. International Journal of
Electrical and Electronics Engineering, 8 (2016)
51. Nikoletseas, S. and Rolim, J.D.: Theoretical aspects of distributed computing in sensor net-
works, 439–477 (2011)
52. Conti, M., Kumar, E.S., Lal, C. and Ruj, S.: A survey on security and privacy issues of bitcoin.
IEEE Communications Surveys & Tutorials, 20, 3416–3452 (2018)
53. Chi, Y.J. and Chen, F.C.: July. A novel planar antenna for wireless body area network. In
Proceedings of the 2012 IEEE International Symposium on Antennas and Propagation, 1–2,
IEEE (2012)
54. Maisel, W.H.: Medical device regulation: an introduction for the practicing physician. Annals
of internal medicine, 140, 296–302 (2004)
55. Piantadosi, S.: Clinical trials: a methodologic perspective. John Wiley & Sons. (2017)
56. Johnson, J.A.: FDA regulation of medical devices (2012)
57. Mayfield, D.L.: Medical patents and how new instruments or medications might be patented.
Missouri medicine, 113, 456 (2016)
58. Khongsai, L., Anal, T. S. C., Rapheileng, A. S., Kh, T. S., Shah, M. K., & Pandey, D. (2021).
Combating the spread of COVID-19 through community participation. Global Social Welfare,
8(2), 127–132.
59. Anand, R., Sindhwani, N., & Juneja, S. (2022). Cognitive Internet of Things, Its Applications,
and Its Challenges: A Survey. In Harnessing the Internet of Things (IoT) for a Hyper-Connected
Smart World (pp. 91-113). Apple Academic Press.
Chapter 4
Applications of IoT in Smart Homes
and Cities
4.1 Introduction
Smart homes and smart cities, as key components of IoT, efficiently serve custom-
ers by interacting with various digital gadgets that are based on IoT. All equipment
in smart homes and smart cities interact with one another in the ideal vision of a
wired future. IoT-based smart technologies have revolutionized human existence by
bringing connectivity to everyone, regardless of their location and time [1–4].
4.1.1 Concepts
Due to the rapid growth in population density inside urban regions, substruc-
tures and services have been necessary to fulfill inhabitants’ demands. As a
result, the number of digital devices, such as sensors, actuators, smartphones,
and smart appliances, has increased significantly, enabling the Internet of Things
(IoT) broad business objectives to be achieved, as it is now possible to connect
all devices and establish connections between them via the Internet. Combining
these digital gadgets was difficult, if not impossible, in the past [5]. Obtaining
their data is needed for both daily operations and long-term growth plans [6].
Gunjan (*)
SRM University, Delhi-NCR, Sonepat, India
e-mail: [email protected]
S. Agarwal · D. Rai · S. Talreja
Bennett University, Greater Noida, India
e-mail: [email protected]; [email protected]; [email protected]
4.1.2 Motivation
In this work, IoT and its applications in smart homes and cities are the main
works. This phrase excludes non-IoT smart house or city applications, such as
smart grids, and nonapplication-based smart city usage. All IoT applications in
smart homes and cities were considered. The digital India program will soon turn
Indian cities into smart cities – a smart city where communication and services
primarily rely on the Internet. As a result, IoT is vital in the development of smart
cities. Smart homes are proposed as part of a smart city. This research aims to
enable a smart home system for India’s smart cities. Syed et al. highlighted future
smart city features. Smart cities have smart people, energy, buildings, transporta-
tion, technology, health care, infrastructure, government, education, and security.
Technology has built a substructure that allows numerous individuals to connect.
It may become easier to create appropriate connections between objects as the
Internet evolves [8]. The number of linked things exceeded the population in
2011. It may provide both virtual and real buddies in personal and home applica-
tions. Home energy management is enhanced with IoT-controlled equipment like
refrigerators and washers. Expanding body area networks at home can monitor
the health of the elderly, lowering treatment costs. Facebook can bring a city’s
people together for an event or celebration. It is helpful for texting, video, and
phone calls with self-created groups.
4 Applications of IoT in Smart Homes and Cities 57
IoT connects devices and things wirelessly. Data may be shared and transmitted
through the Internet at any time and from anywhere [5]. The Internet of Things
offers interconnectivity, security, heterogeneity, massive size, dynamic changes,
and connection. The need to shift toward the latest tech known as the “Internet of
Things” to improve productivity, efficiency, and global marketplace, as well as to
reduce human involvement, effort, and expense. IoT is a connection of devices that
allows data to be transferred without the use of wires [9]. It is utilized in real-time
applications as described in Fig. 4.1.
• Internet of Things in Smart Cities Domain
• One example of an IoT smart city application is smart parking. Other IoT smart
city applications include intelligent transportation systems and smart buildings.
Smart cities employ RFID (radiofrequency identification), wireless sensor net-
works, and single sensors as IoT components [10].
• Internet of Things in Energy Domain
• IoT can help businesses save money on electricity and increase productivity.
Energy management is becoming increasingly essential for utilities and busi-
nesses. The Internet of Things is changing energy management systems. It
improves energy efficiency and introduces a new method for energy saving. This
will help you to use less energy while saving money [11].
• Internet of Things in Health Care Domain
• Equipment integration and remote monitoring are examples of IoT usage in
health care. It has the potential to change the way doctors treat patients while
keeping them safe. A linked health-care system and smart medical devices can
substantially improve people’s health [12, 13].
• Internet of Things in Smart Homes Domain
• The smart connected home may integrate a range of smart home services to pro-
vide a more convenient, useful, and secure environment for the household mem-
bers, as well as to assist them in doing household tasks more effectively. Four
types of smart connected home systems exist: safety, medical services, energy,
and entertainment content [11].
• Internet of Things in Agriculture Domain
• Because of the world’s population, the need for food has expanded significantly.
To increase the level of agriculture, advanced techniques are currently used in
farming [14, 15]. It improves decisions, decreases cost, and boosts production.
• IoT in Biometrics Domain
• IoT is crucial in biometric security systems like eye scanners, fingerprint scan-
ners, and voice recognition systems. Biometrics is a method of identifying a user
based on physiological and behavioral features. Because these characteristics are
unique to each person, they can be utilized as a safe authentication method.
• IoT in Transportation Domain
• The potential for safety is one of the most exciting aspects of IoT in transporta-
tion. Cars that communicate with one another would make up smart transporta-
tion via IoT. IoT’s better navigation makes it easier for people to commute to
work and enhances safety.
• IoT in Business and Industrial Domain
Wireless connections and protocols were designed for low-cost business strategies.
We examine several sensor-linking methods. Because of its speed, accessibility, and
remote work, IoT is vital in development. The Industrial Internet of Things (IIoT) is
the newest buzz in the business (IIoT). And it is all because of industrial engineering
and big data analytics.
Some of the popular applications of IoT in smart cities are listed in Fig. 4.2.
4 Applications of IoT in Smart Homes and Cities 59
Some of the most popular application areas of IoT in smart homes are given in
Fig. 4.3.
• Health Care and Smart Wearable
• The health-care services industry focuses on offering mobile health care and fit-
ness support to those who wish to live healthier lives on their own. Sensors and
software are used to collect data and information about users on gadgets. After
that, the data is analyzed to obtain the necessary user insights. Smartwatches are
the most common kind of wearable electronics. A fitness tracker is a piece of
equipment that records your everyday activity. Google glass is a hands-free
headgear that displays information and lets users communicate with the device
by speaking instructions.
• Security Services
Remote entrance monitoring services for systems that automatically recognize
physical dangers, such as a fire or a burglary, and take appropriate action autono-
mously are included in smart home security and safety systems. This section
includes alarm systems, cameras, and smart door locks.
4 Applications of IoT in Smart Homes and Cities 61
Healthcare &
Smart Wearable
Security of
ind ividual IoT in Energy
&home Smart Homes Management
Entertainment
• Energy
• The goal of energy systems for the home is to provide efficient energy usage and
management. Smart meters, smart thermostats, and adaptive lighting systems are
some of the examples used in the energy domain.
• Entertainment
• Smart speaker systems connected to televisions (TVs) and game consoles are all
widespread in the entertainment industry. By analyzing the acquired data and
presenting the appropriate information on the customer’s table, the entertainment
business can forecast and understand consumer behavior. IoT can give users
highly adaptable and multimodal experiences by using sensors and actuators.
IoT involves smart sensors and other gadgets. Weather data, for example, is accu-
mulated at the corporate level of IoT. IoT provides metropolises with new opportu-
nities to use data to manage traffic, reduce carbon emissions, make better use of
infrastructure, and keep citizens nice and secure in short livable smart homes. IoT
opens new possibilities, such as the capacity to constantly organize devices, as well
as monitor and act on data from numerous real-time traffic data channels [16]. Cities
are evolving because of IoT products that improve the structure, provide more
62 Gunjan et al.
POWER SUPPLY
Transceiver Sensor
Sensor
Microcontroller ADC Sensor
Sensor
Memory
• Smart locks
• Sensor strips
• Wireless connectivity and power
• Solar powers
4.5 IoT Architecture
depicts the architecture of an IoT smart home. Figure 4.6 describes the IoT archi-
tecture for smart homes.
It links the smart home to its occupants through GSM wireless communica-
tion. The architecture is defined on the web by delivering SMS messages that are
translated from the user’s inputs and then transmitted to the GSM network,
which controls electrical equipment.
It uses GSM SMS for data collection and transmission, as well as the capacity
to identify and benchmark devices in a certain region using a pattern, for a vari-
ety of benefits including rapid delivery, data loss protection, cheap cost, and
energy efficiency. IoT is a hardware and software gadget that continually moni-
tor the webserver and GSM module [5].
A key source of economic advantage for the USA according to the National
Intelligence Council is IoT. People, organizations, and communities across the
world are advocating for a better IoT experience.
4 Applications of IoT in Smart Homes and Cities 65
Table 4.1 Some more examples of IoT impact in cities and countries
Amsterdam [24] Reduced traffic, energy efficiency, and more security are all goals
Fujisawa in Japan Reduce carbon footprints
[25]
Santander in Smart parking systems
Spain [25]
Stockholm [24] Providing Stockholm with global fiber-optic networks
Italy [26] Providing Stockholm with global fiber-optic networks.
Barcelona [26] Sensor technology implementation, data analysis of traffic flows to create a
new bus network and smart traffic implementation
Santa Cruz [26] Analyze crime data to estimate police demands and ensure that officers are
present when they are needed
4.7 IoT Challenges
All areas of our existence will be digital because of IoT technology. The integration
of technology is required to execute the smart city ecosystem. Many smart city
implementations are now built on unique services and solutions, but these are not
always applicable to other cities around the world and, in some cases, only cover a
portion of the numerous components that should be considered.
66 Gunjan et al.
This article explores IoT integration in smart cities and smart homes. Following an
overview of IoT as a key source of the city of the future and smart home services, we
examine the smart city and smart home architectures and the challenges they face.
Sensing and communication technologies in smart cities and households are exam-
ined [7]. Each submission’s technology and design were reviewed to offer an over-
view of current research in IoT-based smart cities and smart homes. This study’s
application is not restricted to certain sectors. The Internet of Things is a hot study
topic right now. The IoT is extensively utilized due to its many benefits, and this
research attempts to provide an overview of different IoT systems. The facts are
argued with the aid of its benefits. The findings suggest that new researchers may
benefit from IoT technology in the future. The proposed technique is highly beneficial
in monitoring and managing smart home and city environments. The work [32] is
68 Gunjan et al.
References
11. Y. Perwej, K. Haq, F. Parwej, M. Mumdouh, and M. Hassan, “The internet of things (iot) and
its application domains,” International Journal of Computer Applications, vol. 975, no. 8887,
p. 182, 2019.
12. Y. Perwej, M. A. AbouGhaly, B. Kerim, and H. A. M. Harb, “An extended review on internet
of things (iot) and its promising applications,” Communications on Applied Electronics (CAE),
ISSN, pp. 2394–4714, 2019.
13. Juneja, S., Juneja, A., & Anand, R. (2020). Healthcare 4.0-Digitizing Healthcare Using Big
Data for Performance Improvisation. Journal of Computational and Theoretical Nanoscience,
17(9–10), 4408–4410.
14. S. Dhiviya, S. Malathy, and D. R. Kumar, “Internet of things (iot) elements, trends and
applications,” Journal of computational and theoretical nanoscience, vol. 15, no. 5,
pp. 1639–1643, 2018.
15. Shukla, R., Dubey, G., Malik, P., Sindhwani, N., Anand, R., Dahiya, A., & Yadav, V.(2021).
“Detecting crop health using machine learning techniques in smart agriculture system”,
Journal of Scientific & Industrial Research, 80, 699–706.
16. K. A. M. Zeinab and S. A. A. Elmustafa, “Internet of things applications, challenges and
related future technologies,” World Scientific News, vol. 2, no. 67, pp. 126–148, 2017.
17. C. M. de Morais, D. Sadok, and J. Kelner, “An iot sensor and scenario survey for data research-
ers,” Journal of the Brazilian Computer Society, vol. 25, no. 1, pp. 1–17, 2019.
18. K. Evangelos A, T. Nikolaos D, and B. Anthony C, “Integrating rfids and smart objects into a
unified internet of things architecture,” Advances in Internet of Things, vol. 2011, 2011.
19. G. P. Hancke, G. P. Hancke Jr et al., “The role of advanced sensing in smart cities,” Sensors,
vol. 13, no. 1, pp. 393–425, 2013.
20. C. Zhu, V. C. Leung, L. Shu, and E. C.-H. Ngai, “Green internet of things for smart world,”
IEEE access, vol. 3, pp. 2151–2162, 2015.
21. Meelu, R., & Anand, R. (2010, November). Energy Efficiency of Cluster-based Routing
Protocols used in Wireless Sensor Networks. In AIP Conference Proceedings (Vol. 1324, No.
1, pp. 109–113). American Institute of Physics.
22. L. Kohli, M. Saurabh, I. Bhatia, N. Sindhwani and M. Vijh, “Design and Development of
Modular and Multifunctional UAV with Amphibious Landing, Processing and Surround Sense
Module”. Unmanned Aerial Vehicles for Internet of Things (IoT) Concepts, Techniques, and
Applications, 207–230, 2021.
23. J. K. D. Barriga, C. D. G. Romero, and J. I. R. Molano, “Proposal of a standard architec-
ture of iot for smart cities,” in International Workshop on Learning Technology for Education
Challenges. Springer, 2016, pp. 77–89.
24. H. Arasteh, V. Hosseinnezhad, V. Loia, A. Tommasetti, O. Troisi, M. Shafie-khah, and
P. Siano, “Iot-based smart cities: A survey,” in 2016 IEEE 16th International Conference on
Environment and Electrical Engineering (EEEIC). IEEE, 2016, pp. 1–6. S. Talari, M. Shafie-
khah, P. Siano, V. Loia, A. Tommasetti, and J. P. Catal˜ao, “A review of smart cities based on
the internet of things concept.”
25. Farooqi, A. Gutub, and M. O. Khozium, “Smart community challenges: enabling iot/m2m
technology case study,” Life Science Journal, vol. 16, no. 7, 2019.
26. Zanella, Andrea, et al. "Internet of things for smart cities." IEEE Internet of Things journal
1.1 (2014): 22–32.
27. L. Belli, A. Cilfone, L. Davoli, G. Ferrari, P. Adorni, F. Di Nocera, A. Dall’Olio, C. Pellegrini,
M. Mordacci, and E. Bertolotti, “Iot-enabled smart sustainable cities: challenges and
approaches,” Smart Cities, vol. 3, no. 3, pp. 1039–1071, 2020.
28. D. Blaauw, D. Sylvester, P. Dutta, Y. Lee, I. Lee, S. Bang, Y. Kim, G. Kim, P. Pannuto,
Y.-S. Kuo et al., “Iot design space challenges: Circuits and systems,” in 2014 Symposium on
VLSI Technology (VLSI-Technology): Digest of Technical Papers. IEEE, 2014, pp. 1–2.
29. A. Botta, W. De Donato, V. Persico, and A. Pescap´e, “Integration of cloud computing and
internet of things: a survey,” Future generation computer systems, vol. 56, pp. 684–700, 2016.
70 Gunjan et al.
30. R. Śanchez-Corcuera, A. Nun˜ez-Marcos, J. Sesma-Solance, A. Bilbao-Jayo, R. Mulero,
U. Zulaika, G. Azkune, and A. Almeida, “Smart cities survey: Technologies, application
domains and challenges for the cities of the future,” International Journal of Distributed
Sensor Networks, vol. 15, no. 6, p. 1550147719853984, 2019.
31. M. Alaa, A. A. Zaidan, B. B. Zaidan, M. Talal, and M. L. M. Kiah, “A review of smart home
applications based on internet of things,” Journal of Network and Computer Applications, vol.
97, pp. 48–65, 2017.
32. F. Alam, R. Mehmood, I. Katib, and A. Albeshri, “Analysis of eight data mining algorithms
for smarter internet of things (iot),” Procedia Computer Science, vol. 98, pp. 437–442, 2016.
33. Singh, L., Saini, M. K., Tripathi, S., & Sindhwani, N. (2008). An Intelligent Control System
for Real-Time Traffic Signal Using Genetic Algorithm. In AICTE Sponsored National Seminar
on Emerging Trends in Software Engineering (Vol. 50).
34. Anand, R., Sindhwani, N., & Juneja, S. (2022). Cognitive Internet of Things, Its Applications,
and Its Challenges: A Survey. In Harnessing the Internet of Things (IoT) for a Hyper-Connected
Smart World (pp. 91-113). Apple Academic Press.
Chapter 5
Gesture-Based Smart-Assistive Device
for Elderly and Disabled People Using IoT
5.1 Introduction
Nowadays, home automation systems become more popular and are being installed
in a growing number of homes throughout the world. It has tons of advantages to
users, even more to the disabled and/or elderly users, and it can make it very easy
for them to control their home appliances [1]. Use of wireless sensors to sense data
and sends it to the base station in multi hop environment for which routing path is
essential.
In this perspective, our project has been designed for disabled people and many
elders would benefit in their day-to-day life. This is done with the help of sensors
and a microcontroller [2–4]. Our project also aims at achieving automation using an
android operating system. The home appliances and electrical devices can be con-
trolled by Bluetooth wireless communication protocol and android mobile from
anywhere out of the house when the appliances are not switched off.
The Internet of Things (IoT) is the network of home appliances, vehicles, physical
devices, and other various devices that can be embedded with wireless sensors, actu-
ators, electronics, connections, and software that can enable these devices to connect
and exchange data [5–10]. Each device can be identified by the unique identifier
through the embedded system and it can interact with each other within the existing
infrastructure. The number of online accomplished devices can be increased 31%
S. Saraswathi (*)
Department of Computer Science and Engineering, Saveetha School of Engineering,
Chennai, India
C. Gopala Krishnan · P. V. Theerthagiri
Department of Computer Science and Engineering, GITAM School of Technology, GITAM
University, Bengaluru, India
e-mail: [email protected]; [email protected]
from 2018 to 8.4 billion in 2017. The estimation of 2020 IoT devices can reach about
30 billion objects. It can also estimate the global market values of IoT which can
reach $7.1 trillion by 2020. In addition to using less human interaction, economic
and accuracy benefits are possible [11]. The term “Things” in the Internet of Things
(IoT) will be used to describe a variety of electronic items, including heart monitor-
ing systems, streaming cameras for the live feed of wild animals, cars, DNA analysis
equipment, and field operation equipment that helps firemen and rescue workers. The
valid information can collect from IoT devices that can be used in the existing tech-
nologies and automatically data can transfer between other devices [12]. The name
IoT was introduced in 1999 by Kevin Ashton of Procter and Gamble and later it
changed to the center of Auto-ID at MIT.
Internet, things, Internet of Things, Internet of Everything are some common words
that may have been heard, read, and most likely uttered without interruption. IoT is
not a keyword; it is a concept of technology and/or architecture that is a synthesis of
already existing technologies [13]. Just as the Internet has changed the way we
(humans) communicate through the World Wide Web, the IoT seeks to take this
connectivity to the next level by connecting various devices to the Internet, making
it easier for humans to interact with the machine. Visionaries also recognized that
this IoT ecosystem has business applications in home automation, automotive, fac-
tory/assembly line automation, retail, health care/prevention, and more. Figure 5.1
shows the building blocks of IoT.
The sensors ate used to sense a variety of information ranging from location,
weather/environmental conditions, network parameters, movement on an assembly
line, and jet engine maintenance data to basic patient health information [14–16].
5.1.1.2 IoT Gateways
An IoT gateway, as the name suggests, is a gateway to the Internet through which
things/devices can communicate with each other. Gateways help connect the sensor
nodes which are in the internal network to the external Internet or the World Wide
Web. It collects data from sensor nodes and transfers it to the Internet infrastructure.
The evolution of the IoT gateway determines the success of the IoT deployment.
The design of the gateway depends on the area of application.
The data sent over the gateway is safely stored and analyzed using big data analytics
in the cloud infrastructure [5]. This data can use to perform intelligent actions, mak-
ing all of our devices “smart.”
End users will be able to manage and monitor their devices (ranging from room
thermostats to jet engines and production lines) from remote areas using the easy
smartphone apps. These apps deliver critical information to your mobile devices
and assist users by sending commands to smart devices.
5.1.1.5 IPv6
IP addresses are the backbone of the IoT ecosystem. The Internet only cares about
IP addresses, not whether you are a human or a money lender. There are very few
IPv4 IPs, but there are 3.4 * 1038 IPv6 IPs [17].
5.2 Proposed Methodology
The elderly and/or disabled people can control their home appliances. Home appli-
ances can also be controlled via mobile phones from anywhere away from the house
through the Internet. The home appliances and electrical devices can control by
Bluetooth Wireless Communication Protocol and android mobile phones from any-
where out of the house when the appliances are not switched off. Home automation
for people with disabilities and elders can provide a better quality of life for those
who may need care or nursing facilities.
74 S. Saraswathi et al.
5.3 Architecture
Figure 5.2 shows the main module of the product which has a PIC microcontroller,
which acts as the main functioning object, a Bluetooth module that connects the PIC
with the android mobile phone, and an LCD that helps to show the message. The
message can be sent from the client system (android mobile) which can be received
at the server end (android) and is then transferred to the kit via a Bluetooth module
to the PIC microcontroller. The PIC microcontroller controls the system by sending
data to and for the system.
Data from the server device that is an android device can receive from the micro-
controller and sends to the LCD which shows the electronic device that glows at
present and also to the electronic device. The message sent from the client is received
at the server end and is then transferred to the PIC microcontroller and which turns
to give the respective electronic device to perform the respective operations.
Consider all the devices are turned off. Now in the android application, all the
buttons would be in the OFF state. Now click the start button in the android applica-
tion from the client end. This would start our device and the system. Now there are
respective buttons for all the devices that are to be controlled. Consider a device A
that is to be controlled. Now the button is in OFF state. By toggling the button the
device is switched ON.
This data is transferred from the client end to the server end and the device via
the PIC microcontroller. Thus the data reached the respective device A and that
particular device turns ON. This can also be turned off from the same application by
simply toggling the same button which indicates the OFF stage on the application
and transfers data to the device through the PIC microcontroller. When the devices
are turned ON the application in the client end shows the status of the device as ON
and shows OFF when the devices are turned OFF.
5.3.1 Flex Module
and expected to. Thus the electronic device was powered OFF. This way the flex
module works for all the other flex sensors that were connected to it.
5.3.2.1 Pin Diagram
An RF receiver module gets the tweaked RF signal and demodulates it. Recipient
modules are normally executed close by the equivalent microcontroller which will
give information to the module which can be gotten. The beneficiary module has
eight pins as displayed in Table 5.2 The Vcc pin ought to be controlled with a
directed 5V stock. The working current of this module is under 5.5 mA. The pins
data out and linear out are shorted together to get the 433 MHz signal from the air.
This sign is then demodulated to get the information and is conveyed through the
information pin. The RF getting recurrence is 433 MHz [21]. The other four pins
that are associated with the RF collector are the Vcc (supply voltage), two ground
pins, and a receiving wire input pin. The Vcc pin has a wide reach input voltage
from 3V to 12V. The RF recipient gets the tweaked signal through the receiving
wire; plays out a wide range of preparing, sifting, demodulation, and so on; and
gives out sequential information. This sequential information is then changed over
to a level rationale information, which is the very information that the client
has input.
5.3.3 Bluetooth Module
Bluetooth is a wireless technology for trading information over brief distances (uti-
lizing short-frequency UHF radio waves in the ISM band from 2.4 to 2.485 GHz)
from fixed and cell phones and building individual region organizations (PANs)
[22]. Concocted by telecom seller Ericsson in 1994, it was initially considered as a
remote option in contrast to RS-232 information links. It can associate a few gad-
gets, beating issues of synchronization.
Bluetooth UART enables you to wireless transmit and receive serial data. Devices
equipped with Bluetooth technology support wireless point-to-point connections, as
well as wireless access to mobile phones. This can use it as a serial port that can
replace and establish a connection between MCU and PC for data transfer. It deliv-
ers the received data and receives the data to be transmitted to and from a host sys-
tem through a host controller interface. Bluetooth module is shown in Fig. 5.5.
Features
• The supply voltage is 5VDC.
• The range of distance can be 20m.
• It can easily pair with a mobile phone.
• It has a distance range of 20 m.
• It has UART interface.
Applications
• It is used in wireless telemetry.
• It can support data logging in a remote system.
• Robotics.
5.3.4 Flex Sensor
The flex sensor (shown in Fig. 5.6) by Spectra Symbol is a 4.5″ bendable substrate
that offers increased resistance measurements as it flexes tighter [21]. The output
feedback of this 10 K sensor requires very little power. The resistance can rise to
five times its base or flat state value. Resistance can be used to calculate the degree
5 Gesture-Based Smart-Assistive Device for Elderly and Disabled People Using IoT 79
of flexure or the bend radius. Measuring finger traction, robotics, and gaming are all
common applications. The flex sensor’s low profile allows it to wrap around objects
and fit into tight areas. Its durability is ideal for a wide range of consumer applica-
tions, with a life cycle of over 1 million flexes.
Flex sensors are passive-resistive devices that detect the bending or flexing of
objects. It is a bidirectional flex sensor with resistance that reduces in proportion to
how far it is bent in either direction. On a thin flexible substrate, the flex sensor
achieves a wonderful form factor. The sensor gives a resistance output. The higher
the resistance value, the smaller the radius. It is possible to connect it to a microcon-
troller. The sensor produces an analog output.
80 S. Saraswathi et al.
5.3.5 Relay
5.4 Results and Discussion
Some of the systems can allow multiple users to control the home appliances
using android applications through the website Home computerization and security
assist impaired and old matured individuals, which will empower them to control
home apparatuses and alarm them in basic circumstances. The home devices are
associated with ADK and set up with the smart mobile phone. The module of GSM
can be conveyed to send all collected data by this module.
The primary aim of this report is to build the home automation system based on
wireless communication that can manage by the smartphone especially android
smartphone, and it can develop and implement at an effective cost with an efficient
home automation system. This study paper contains a GUI that can support a user-
friendly and secure system, operate home appliances, and assist the elderly and the
disabled. Use MP LAB, a free integrated development environment (IDE) created
by Micro Technology, to develop embedded applications for dsPIC and PIC micro-
controllers. The latest version of MPLAB is X, and it is developed on the Netbeans
platform. Both versions, MPLAB and MPLAB X, can support project management,
debugging, code editing, and programming of a microchip that can support 32 bit,
8 bit, and 16 bit PIC microcontrollers.
For programming and debugging PIC microcontrollers using a personal com-
puter, MPLAB is meant to work with MPLAB-certified devices such as the MPLAB
ICD 3 and MPLAB REAL ICE. MPLAB also supports PIC kit programmers. The
MPLAB code configurator and MPLAB harmony configurator plugins in MPLAB
X provide automatic code generation.
5.4.1 Local Application
Figure 5.7 shows the screenshot of the local application that controls the electronic
devices around a range of 100 m via Bluetooth module. The start button initiates the
connection between the application and the kit that sends data to the electronic
device. Using of PIC microcontroller, we can control the electronic devices where
the received signals from the application via the Bluetooth module was connected
with the main module. The application consists of buttons that toggle between ON
and OFF for each electronic device.
First, turn ON the Bluetooth in the mobile phone where the application was
installed in. The search icon in the top right corner of the application is clicked for
the first time for the configuration of the system. Then the device is connected by
pairing it with the android phone. Then the android device was connected to the kit
via Bluetooth. Once connected a message “connected to the device” popup would
be shown and also the description below the main heading “Home Control” would
change from “not connected” to “connected to the device name.” Thus it would be
known that the device is connected. Then the start button in the android application
was clicked so that the connection established between the application and the elec-
tronic device was started. Now there are respective buttons with toggling capability
for each of the electronic devices that are needed to be controlled. Consider an
82 S. Saraswathi et al.
electronic device A (say fan). There is a button for the electronic device A. This but-
ton is initially in the OFF state. Now toggling ON the button would send a message
to the receiver kit (main module) which in turn is sent to device A as an electric
signal. Thus the device A is powered ON. Now again toggling the button corre-
sponding to A would again send a message to the receiver kit which in turn sends an
electric signal to turn OFF the system and thus the device A was powered OFF.
5.4.2 Server Application
The application that would be used to control the electronic devices from outside
via the Internet is shown in Fig. 5.8. Here too there is a start button that would initi-
ate the system and run the system. There are respective buttons for each of the
electronic devices that are needed to be controlled via the Internet as shown in
Fig. 5.8. The electronic devices were controlled with the help of the PIC microcon-
troller where the signals are received from the application via the Internet. The
application consists of buttons that toggle between ON and OFF for each electronic
device. First, the Internet is turned ON in the mobile phone in which the application
was installed. Once the device is connected to the Internet, it would also connect
with the receiver kit. Then the android device was connected to the kit via the
Internet. Once connected, a message “connected to the device” popup would be
shown and also the description below the main heading “Home Control” would
change from “not connected” to “connected to the device name.” Thus it would be
known that the device is connected to the receiver kit. Then the start button in the
android application was clicked so that the connection established between the
application and the electronic device was started. Now there are respective buttons
5 Gesture-Based Smart-Assistive Device for Elderly and Disabled People Using IoT 83
Fig. 5.8 Server
application
with toggling capability for each of the electronic devices that are needed to be
controlled. Consider an electronic device A (say fan). There is a button for the elec-
tronic device A. This button is initially in the OFF state. Now toggling ON the but-
ton would send a message to the receiver kit (main module) which in turn is sent to
device A as an electric signal. Thus the device A is powered ON. Now again tog-
gling the button corresponding to A would again send a message to the receiver kit
which in turn sends an electric signal to turn OFF the system and thus the device A
was powered OFF.
5.4.3 Working Module
Figure 5.9 shows the working model for the kit controlling the electronic devices. In
the model, there are four bulbs, say A, B, C, D, which act as electronic devices.
There is a display to show the message of which bulb is glowing at the moment. Say
if A is glowing, the message would be A in the display and if A is in OFF state then
“a” would be shown in the display. By this, the electronic device being controlled at
the moment would be known instantly. Once a message or electric signal is received
from either the Bluetooth module, Internet, or the flex module, the PIC microcon-
troller would process the message and shows the respective electronic device in the
display and send the signal to the respective devices as well. There is a reset button
to reset the device when needed. Relay can operate by the electric switches. Many
relays utilize an electromagnet to work an exchanging component precisely; yet
other working standards are likewise utilized.
84 S. Saraswathi et al.
5.4.4 Flex Module
Figure 5.10 depicts the flex module for the kit. The flex sensors are connected to the
kit as shown in Fig. 5.10. It consists of a PIC microcontroller that controls the flex
module and is also responsible for the sending and receiving of messages/signals to
and from the receiver kit. The flex sensor on any motion gives away electrical sig-
nals. These electrical signals are then sent to the PIC microcontroller which reads
the signal and finds the device to be controlled and sends the message to the receiver
kit. Then the signal is transferred to the respective electronic device that was meant
to be controlled and for which the flex sensor is connected. The display in this flex
module is used to show the details of the sensors that are moved up at the moment.
It would show the position of the sensor and as the sensors are moved the values
would change in the display instantly. By this, the sensor values can be obtained.
Once obtained, the sensor values could be used while controlling the device via
these sensors so that no two sensors can have the same electronic device controlled.
There is also an RF RX transmitter which is used to send the data from the flex
module to the receiver kit. This transmitter sends the signal from the sensors to the
receiver kit. Once the sensors are bent, an electrical signal is generated which is then
sent to the receiver kit via the RF transmitter.
5.4.5 Main Module
Figure 5.11 shows the main module which consists of the PIC microcontroller that
is used to control the entire kit and relay to switch between the devices and also
some electronic devices; here we consider bulbs are electronic devices. The main
module is where the electronic device is controlled through the PIC microcontroller.
A Bluetooth module is also used to receive the signals from the other modules such
as the android application, flex module, etc. When any modules send m essages/
5 Gesture-Based Smart-Assistive Device for Elderly and Disabled People Using IoT 85
signals to the kit, the Bluetooth module receives the message and sends it to the PIC
microcontroller which turns signal to send to the electronic device needed to be
controlled. Consider an electronic device A that is needed to be controlled. This
electronic device A that is connected to the kit of the receiver. Now a signal would
be received from any of the modules, and this signal would be read from the
Bluetooth module and is transferred to the PIC microcontroller. Then the signal is
received by the microcontroller and sends it to the respective electronic device
A. Now the device is turned ON. Simultaneously a message is sent to the applica-
tion of android mobile that the device is powered ON which shifts the state of the
86 S. Saraswathi et al.
button shown in the application from OFF state to ON state. Again another message
signal to turn OFF the device A could be sent which again goes through the PIC
microcontroller and turns the device OFF. Again a message indicating the device is
turned OFF and is sent to the application.
5.5 Conclusion
This research concludes the objectives of this paper are met which are the following:
• A wireless home automation system was constructed and controlled using an
android smartphone.
• Designed and executed a cost-effective yet efficient home automation system.
• Protected framework and easy to use to control the various devices in the home
especially to help the elders and physically challenged people.
This system would help many elderly/disabled people who need others to help
them. This would help the elderly people to be free without the help of others for
controlling the appliances around. The disabled people can also move freely and
operate the appliances freely on their own without disturbing others. In future
enhancements, the kit would be reduced to smaller in size using the latest technolo-
gies and making it even easier to use by all who feel comfortable to control the
appliances from where they are without moving.
5.6 Future Work
The future work of this paper can create a solution for the cross platform that can be
used in various platforms like Windows and iOS. This work’s limitation is that it
only controls a limited number of devices that can be removed by further automat-
ing other household equipment [24, 25]. The module can be flexible to support both
technologies such as Wi-Fi and Zigbee.
References
1. P. Siva Nagendra Reddy, K. Tharun Kumar Reddy, P. Ajay Kumar Reddy, Dr. G. N. Kodanda
Ramaiah, S. Nanda Kishor “An IoT based Home Automation Using Android Application”,
International Conference on Signal Processing, Communication, Power and Embedded
System (SCOPES)-2016.
2. Saini, M. K., Nagal, R., Tripathi, S., Sindhwani, N., & Rudra, A. (2008). PC Interfaced
Wireless Robotic Moving Arm. In AICTE Sponsored National Seminar on Emerging Trends in
Software Engineering (Vol. 50).
3. Singh, L., Saini, M. K., Tripathi, S., & Sindhwani, N. (2008). An Intelligent Control System
For Real-Time Traffic Signal Using Genetic Algorithm. In AICTE Sponsored National Seminar
on Emerging Trends in Software Engineering (Vol. 50).
5 Gesture-Based Smart-Assistive Device for Elderly and Disabled People Using IoT 87
4. L. Kohli, M. Saurabh, I. Bhatia, U.S. Shekhawat, M. Vijh and N. Sindhwani, “Design and
Development of Modular and Multifunctional UAV with Amphibious Landing Module”.
In Data Driven Approach Towards Disruptive Technologies: Proceedings of MIDAS 2020
(pp. 405–421). Springer Singapore, 2021.
5. N. Sriskanthan and Tan Karand. “Bluetooth Based Home Automation System”. Journal of
Microprocessors and Microsystems, Vol. 26, pp. 281–289, 2002.
6. Bakshi, G., Shukla, R., Yadav, V., Dahiya, A., Anand, R., Sindhwani, N., & Singh, H. (2021).
An Optimized Approach for Feature Extraction in Multi-Relational Statistical Learning.
Journal of Scientific and Industrial Research (JSIR), 80(6), 537–542.
7. R. Anand, A. Sinha, A. Bhardwaj and A. Sreeraj, “Flawed Security of Social Network
of Things”. In Handbook of Research on Network Forensics and Analysis Techniques
(pp. 65–86). IGI Global, 2018.
8. Srivastava, A., Gupta, A., & Anand, R. (2021). Optimized smart system for transportation
using RFID technology. Mathematics in Engineering, Science and Aerospace (MESA), 12(4),
953–965.
9. Sindhwani, N., Maurya, V. P., Patel, A., Yadav, R. K., Krishna, S., & Anand, R. (2022).
Implementation of Intelligent Plantation System Using Virtual IoT. In Internet of Things and
Its Applications (pp. 305–322). Springer, Cham.
10. Shukla, R., Dubey, G., Malik, P., Sindhwani, N., Anand, R., Dahiya, A., & Yadav, V. (2021).
Detecting crop health using machine learning techniques in smart agriculture system. Journal
of Scientific and Industrial Research (JSIR), 80(08), 699–706.
11. Pradeep, G, B. Santhi Chandra, M. Venkateswarao, “Ad-Hoc Low Powered 802.15.1
Protocol Based Automation System for Residence using Mobile Devices”, Dept. of ECE, K L
University, Vijayawada, Andhra Pradesh, India IJCST Vo l. 2, SP 1, December 2011.
12. http://source.android.com/tech/accessories/index.html
13. Gurek A., Gur C., Gurakin C., Akdeniz M., Metin S. K., Korkmaz I., (2013), “An Android
Based Home Automation System”, High Capacity Optical Networks and Enabling
Technologies, IEEE 10th International Conference on, pp.121125.
14. Ying-Tsung Lee, Wei-Hsuan Hsiao, Yan-Shao Lin, and Seng-Cho T. Chou “Privacy-Preserving
Data Analytics in Cloud-Based Smart Home with Community Hierarchy”, IEEE Transactions
on Consumer Electronics, Vol. 63, No. 2, May 2017.
15. Juneja, S., Juneja, A., & Anand, R. (2020). Healthcare 4.0-Digitizing Healthcare Using Big
Data for Performance Improvisation. Journal of Computational and Theoretical Nanoscience,
17(9–10), 4408–4410.
16. Singh, H., Rehman, T. B., Gangadhar, C., Anand, R., Sindhwani, N., & Babu, M. (2021).
Accuracy detection of coronary artery disease using machine learning algorithms. Applied
Nanoscience, 1–7.
17. Zhai Y., Cheng X., (2011), “Design of Smart Home Remote Monitoring System Based on
Embedded System”, Control and Industrial Engineering, IEEE 2nd International Conference,
pp. 41–44.
18. Muhammad Izhar Ramli, Mohd Helmy Abd Wahab, Nabihah, “TOWARDS SMART
HOME: CONTROL ELECTRICAL DEVICES ONLINE”, Nornabihah Ahmad International
Conference on Science and Technology: Application in Industry and Education (2006).
19. Saraswathi, S., Suresh, G.R. & Katiravan, J. False alarm detection using dynamic threshold in
medical wireless sensor networks. Wireless Netw 27, 925–937 (2021).
20. Al-Ali, Member, IEEE & M. AL-Rousan, “Java-Based Home Automation System R.” IEEE
Transactions on Consumer Electronics, Vol. 50, No. 2, MAY 2004.
21. http://developer.android.com/about/index.html
22. http://developer.android.com/guide/topics/connectivity/usb/accessory.html#manifest
23. Javale D., Mohsin M., Nandanwar S., Shingate M., (2013), “Home Automation and Security
System Using Android ADK”, International Journal of Electronics Communication and
Computer Technology, vol. 3, pp. 382–385.
88 S. Saraswathi et al.
24. Sengupta, R., Sengupta, D., Kamra, A. K., & Pandey, D. (2020). Artificial Intelligence and
Quantum Computing for a Smarter Wireless Network. Artificial Intelligence, 7(19), 2020.
25. Anand, R., Sindhwani, N., & Juneja, S. (2022). Cognitive Internet of Things, Its Applications,
and Its Challenges: A Survey. In Harnessing the Internet of Things (IoT) for a Hyper-Connected
Smart World (pp. 91-113). Apple Academic Press.
Chapter 6
IoT-Enabled Intelligent Traffic
Management System
Subodh Bansal and Amit Gupta
6.1 Introduction
During the last decade, the trend has been to transfer computers, controls, and data
stores to the cloud. The main data center, backbone IP networks, and cellular core
networks have in particular been converted from storage, shops, and network man-
agement functions. Nevertheless, cloud computing today faces growing difficulties
in meeting various evolving IoT new requirements. There are many technological
challenges [1] in the IoT, which create an immense network of trillions or thousands
of “things” that interact with each other. The IoT in the global information industry
after the Internet is perceived as a technology and an economic stream. IoT [2–5] is
intelligent by agreed-upon protocols, and Internet-enabled network enables infor-
mation exchange and communication through information sensing devices. The aim
is to define, locate, map, control, and manage matters intelligently. The network that
enhances the connectivity from humans to people and things or things and stuff is
the Internet-based network [6].
Wireless sensor network (WSN) consist of sensor nodes that can be utilized via
Internet connectivity in various areas of applications (e.g., health care, militants,
and agriculture), which establishes a sense of IoT. As a result of the Internet of
Things (IoT), physical objects with embedded sensors, actuators, and network com-
munication can process and share data. Among the WSN system’s parameters are
energy consumption and scalability.
The IoT refers to a widening network between physical objects and other Internet
devices and systems that have an Internet protocol (IP) interface between them. The
S. Bansal (*)
Chandigarh University, Gharuan, Punjab, India
A. Gupta
I.K.G.P.T.U, Jalandhar, Punjab, India
fundamental aim of IoT is to allow things to be linked to anything and anyone who
ideally utilizes all paths, networks, and services [7].
6.1.1 Characteristics of IoT
Dynamic nature: The primary task of IoT is to collect data from its surroundings,
accomplished by dynamic interface changes. Such devices adjust the status
dynamically, including the temperature, position, and speed of their devices, e.g.,
sleep and waking connects and/or disconnects. In addition to the device state, the
number of devices varies dynamically with the user, position, and time.
Enormous scale: There will be a far greater number of devices to control and com-
municate with other devices associated with the current Internet. For applica-
tions, it is more important to control and analyze data generated from these
devices.
The IoT provides numerous benefits in the business sector’s everyday lives. The
following are some of the benefits and challenges of IoT:
Automation: Because physical objects are digitally controlled and connected to
wireless networks, a great deal of automation and operational control exist. This
allows all machines to communicate without human intervention, which speeds
up production.
Cost-effectiveness: When used in everyday life, it allows electronic devices to inter-
act with one another efficiently, conserving energy and reducing costs. By per-
mitting data to be exchanged and transmitted between electronic devices, IoT
makes our systems more productive.
Time: The time saved in supervision and the number of other trips will be immense.
Cost-effectiveness: M2M, or machine-to-machine communication, is one of the
most well-known examples of IoT. As a result, physical devices can stay con-
nected and comprehensive transparency can be achieved with less inefficiency
but better quality.
Money: One of the key advantages of the IoT is that it allows for significant cost
savings. So far, IoT has been widely adopted if the cost of tags and monitoring
equipment is less than what is saved. In the long run, the Internet of Things is a
boon to people because it allows appliances to communicate with each other
efficiently, economizing energy and money. In addition, it improves the effi-
ciency of our systems by allowing data to be exchanged across devices.
Monitor: Monitoring is the second most evident benefit of IoT, just after security.
Knowledge of someone’s home exact supply levels and air quality can offer you
the additional information that was previously difficult to collect. By knowing
when your milk or printer ink runs out, you may avoid a trip to the store in the
near future. Determining expiration dates for products is another way to ensure
customer safety.
The disadvantages of IoT technology are mentioned below:
92 S. Bansal and A. Gupta
The IoT application area is very diverse and IoT applications are used by different
users. There are dissimilar categories of users with different driving needs. The IoT
framework covers “smart” spaces/environments in areas like transport, construc-
tion, regional, lifestyle, retail, supply chain, agriculture, emergency, health care, and
manufacturing [11, 12]. Table 6.1 shows some areas for IoT applications [13].
FIWАRE
FIWARE is an open standard platform for applications in smart cities, was launched
by the European Commission, and plans to grow new technologies in the IoT pro-
totype. On the other hand, it relies on a set of software components called generic
enablers. To increase interoperability, these components have several functions in
common to the various vertical segments of an organization, as well as the ability to
communicate between them. FIWARE-enabling technologies for IoT are catego-
rized into seven major technological categories: cloud-hosted applications and ser-
vices, data conveyance, data/context management, security interfaces to networks
and devices, enhanced web, and IoT services enablement. FIWARE lays out an
easy-to-use collection of APIs that facilitate the creation of smart applications. The
lack of a complete set of functions is a major concern despite several benefits
of FIWARE.
ОСEАN
KETI (Kоrea Electronics Teсhnоlоgy Institute) and the Korean government
launched OCEAN (Open Alliаnce for IoT standard) in January 2015. As a global
alliance, it works to develop open-source solutions for smart cities based on IoT
standards. It also seeks to promote the creation and commercialization of platforms,
products, and services through the widespread use of IoT standards that are open-
source. As part of the global cooperation, when it comes to distributing the source
code for IoT standards with manufacturers and developers, OCEAN is in charge.
94 S. Bansal and A. Gupta
СONTIKI
CONTIKI is also an open platform that allows for the quick and easy development
of a variety of IoT-based smart city applications. Tiny microcontrollers can use it to
communicate with the Internet, and it operates at a very low cost and power.
Furthermore, it is compatible with IPv4 and IPv6, including user dаtаgrаm prоtосоl,
TCP, and HTT. It also provides support for the most recent low-power remotes and
mobile networks, such as 6LоwN and RL multi-hор routing prоtосоl. A wide range
of smart city applications can benefit from its very efficient memory allocation
techniques.
ОM2M6
When the ECLIPSE Foundation started this project, it intended to provide an open-
source implementation of the standards One-to-One and SmartM2M. The project is
funded by the ECLIPSE Foundation and the European Commission. By offering a
horizontal OM2M service platform for designing services independent of the under-
lying network, this endeavor will facilitate the implementation of vertical apps and
heterogeneous devices. This initiative is funded by the National Science Foundation.
As a result, the horizontal Common Service Entity (CSE) is provided by this
ECLIPSE that could be deрlоуеd in а M2M device, а gаtеwау, or а worker. The key
CSE functions are application enablement, starting up, notification, security, persis-
tence, between working, and device management RESTful interfaces are also pro-
vided to provide synchronized and asynchronous interactions and bunch association.
Following is a breakdown of the rest of the document. The role of traffic manage-
ment in IoT is defined in Sect. 6.2, and the literature evaluations are discussed in
Sect. 6.3. Section 6.4 discusses the system’s methodology. In Sect. 6.5, an experi-
mental finding is discussed. Last but not least, the final section discusses the study’s
limits, future directions, and implications.
IoT is a new research methodology, and the information related to IoT seems to be
in its early stages. As a result, the precise description, design, scope, and norm are
still unknown. Most academics, on the other hand, agree on the importance of
extending and understanding Kevin Ashton’s groundbreaking philosophical descrip-
tion of IoT, which he described as “a systematic way for computers to understand
the real world.” People with disabilities and diabetes can benefit from IoT in a vari-
ety of ways, as well as miners who can benefit from safer mining operations and
people who can benefit from an intelligent relationship based on responsiveness and
intelligence in the workplace to support human decisions and/or operations. The
only difference is that for Ubicomp there is no requirement for an Internet connec-
tion so that objects can communicate with one another. It is used to define smart
ecology in a wider context than IoT. Applying sensor technology to collect data to
make a specific response, for example, is Unicom but not IoT. IoT can be related to
6 IoT-Enabled Intelligent Traffic Management System 95
human sensors. Humans, for example, have biological sensors such as ears, eyes,
skin, taste buds, and other sense organs that enable them to perceive what is going
on around them. Humans use their bodies to produce and obtain sounds, and they
need a name for others to pay attention to them. Communication is only possible
when a communication channel, such as a telephone network, a mobile network, or
the air, is available. Sensors must be attached to physical objects being regarded for
them to have human-like properties. Objects must have both sender detail and recip-
ient detail, and only digital communication is required. The contact between cars,
processing units, and traffic lights is the subject of this paper. Each vehicle serves as
an eye in this scenario, transmitting traffic data. The contact is built through socket
programming over a Wi-Fi link, and the ports serve as the sender and receiver’s
respective “mouth” and “ear.” By calling the RFID reader name, vehicles can
“name” each other. In this instance, IoT can be used to replace human workers in
undertaking repetitive, time-consuming tasks. For example, traffic statistics may be
acquired and sent out regularly, which is nearly difficult with manual interac-
tion [14].
6.2.1 Traffic Management
Transport, travel, and roads are an integral part of every country and make a differ-
ence in every citizen’s life. The well-being and development of a country signifi-
cantly depend on the road and traffic of the country. One of the most significant
infrastructure challenges that developing countries confront today is traffic manage-
ment. Developed countries and smart cities are already leveraging IoT to reduce
traffic-related challenges. The car culture has spread rapidly among people from all
walks of life. People in most cities prefer to drive their cars regardless of how good
or poor public transportation is or how much time and money it would take them to
get to their destination.
IoT has proved its potential in vehicle maintenance, navigation, and monitoring
leading to improved transportation [15]. IoT can improve road transportation in the
following ways:
Intelligent traffic lights interface with the sensors of connected automobiles, provid-
ing the driver with important information about the traffic light state, such as color
or time to green. This aims to reduce accidents around traffic lights and reduce their
violation too through better real-time monitoring.
96 S. Bansal and A. Gupta
6.2.1.2 Telematics
6.2.1.3 Autonomous Cars
6.2.2 Advantages
6.2.2.1 Communication
6.2.2.2 Automation and Control
Physical things will be linked and operated digitally, centrally, and wirelessly.
Without human intervention, machines will communicate with each other and pro-
duce goods faster and more efficiently.
6.2.2.3 Information
It will give additional information to help you make more informed choices, for
example, deciding the things to buy in the supermarket or determining if your firm
has adequate widgets and supplies; information is power, and more knowledge
makes you stronger.
6.2.2.4 Monitoring
This technology will promote comfort, ease, and management, all of which will
improve people’s quality of life.
6.2.3 Disadvantages
6.2.3.1 Compatibility
6.2.3.2 Safety and Privacy
Unskilled workers and assistance may lose their jobs consequently of daily operat-
ing automation. As a result, there will be a societal unemployment crisis. Due to the
automation of daily operations, there will be less demand for human resources,
especially employees and less trained personnel.
Smart traffic management [16] regulates traffic flow as needed, as a result of the
centrally controlled system of traffic signals and sensors. An automated algorithm
and sensor data will be used to construct a smart traffic control system to keep traffic
flowing more smoothly. To track the movement of vehicles, a smart traffic signal
monitoring (TMS) system based on IoT is deployed at the lights. For real-time traf-
fic monitoring, powerful data analytics solutions connect GIS-enabled digital road-
maps with traffic lights and traffic control rooms.
Traffic lights, subsurface queue detectors and/or cameras, and a central control sys-
tem are the three components. The queue detectors provide information to the con-
trol system on the flow of traffic on all of the city’s principal thoroughfares. In turn,
the system manages the traffic signals to guarantee that traffic flows smoothly
6 IoT-Enabled Intelligent Traffic Management System 99
around the city. Every 2 seconds, the algorithm evaluates whether modifying the
phasing of any of the lights is advantageous using a model of real-world situations.
An intelligent IoT-based TMS system collects the image of traffic (which serves
as input) at a crossroads using digital image processing technologies. The system
then employs wireless sensors to transmit data (serving as output) to the control
room or users.
Along with RFID tags and scanners for car tracking, the system can minimize
traffic congestion at intersections, trace a stolen vehicle, and free up traffic for emer-
gency vehicles. The emergency vehicles must be equipped with RFID tags for RFID
readers to track them in real-time by scanning the signal. Because of this, emer-
gency vehicles can be given priority.
The Internet of Things (IoT) makes use of the Internet to connect various diversified
devices. All current things must be connected to the Internet in a convenient way
and by the rules of the game. For example, to improve energy efficiency in smart
cities, sensor networks [17, 18] must be connected online to remotely monitor their
treatment. Data may be gathered and analyzed by adding sensors at different loca-
tions. Below are a few of the important goals in this branch of knowledge:
6.3.2.1 Smart Parking
To assess whether parking spaces are occupied or available, smart parking systems
use GPS data from drivers’ smartphones or road-surface sensors put in the ground
on parking spots to create an interactive map of available and occupied parking
spots in real-time. As a bonus, drivers are alerted when the closest parking spot
becomes available, allowing them to use the map on their phone to find a parking
spot faster and easier rather than driving around aimlessly.
100 S. Bansal and A. Gupta
6.3.2.2 Public Trаnsроrt
As a result of IoT sensors, it is possible to identify patterns in how citizens use pub-
lic transportation services. Public transportation operators can use this data to
improve the traveling experience, as well as safety and punctuality.
As an example, several London-based train companies postpone passenger car
loading for excursions in and out of the city. Ticket sales data, motion sensors, and
TV cameras located along the platform are all combined. Using this information,
train operators can predict how many people will be in each car at any given time
Passengers are encouraged to spread out while waiting for a train to be fully loaded
before it leaves. Because they maximize available capacity, train operators
avoid delays.
6.3.2.3 Street Lightning
Smart cities based on IoT make road maintenance and control simpler and more
cost-effective. The use of sensors in streetlights and their connection to a cloud-
based management aids in the adaptation of lighting schedules to the illumina-
tion zone.
Data about illumination effect and movement of people and vehicles are gathered
by smart lighting solutions, and it should be used in conjunction with historical data
such as special events, public transportation schedules, time of day and year, etc.
This means that smart lighting tells a streetlamp to fade, light up, or turn on and off
dependent on the surrounding conditions.
Some examples include turning on a more dazzling setting when people are
crossing the street or when a bus is expected to arrive at a stop, turning on a brighter
setting than those further away, and so on.
6.3.2.4 Wаste Management
Empty cоntаinеrs are used by most waste collection operators according to prede-
termined schedules. This is not a particularly efficient approach because it results in
unnecessary trash container use and unnecessary fuel use by waste collection trucks.
IoT enables smart city aid in waste collection process improvement by measuring
waste levels and offering route optimization [19–21] and operational insights.
Garbage containers are equipped with sensors that measure how much waste is in
them. Whenever the waste management system is approaching a given threshold, it
receives a sensor record, processes it, and then sends a notification to everyone. As
a result, rather than emptying a half-full container, the truck driver dumps a full one.
6 IoT-Enabled Intelligent Traffic Management System 101
Smart city solutions powered by the Internet of Things (IoT) enable the tracking of
parameters essential to maintain a healthy environment at an optimal level. Cities
can install a network of sensors across their water system and connect them to a
cloud-based management system to monitor water quality. Some sensors can tell
you how acidic or alkaline the water is. Leakages and chemical changes in water
cause cloud platforms to commence an output that is characterized by clients.
6.3.3.1 Amsterdam, the Netherlands
In Chicago City and Chicago’s South Side, utilizing IoT-based instruments includ-
ing the portable, web, and SMS, people groups like residents, associations, and
public networks attempt to trade data and beat vicious wrongdoing. This undertak-
ing was upheld by the University of Chicago by creating trust among neighboring
urban communities and neighborhood associations. Moreover, unique information
gathered by the police, clients, and foundations will be accessible for a cell phone
102 S. Bansal and A. Gupta
In Busan, a city in South Korea, the overseeing body perceived the potential for
working with open positions for college graduates and financial development
through ICT. Busan has made a decent correlation framework which empowered the
public authority to extend the cloud foundation. It associates different organizations
like colleges, businesses, residents, and government for driving manageable metro-
politan turn of events. These days, the cloud framework interfaces the Busan neigh-
borhood government, Busan Mobile Application Center (BMAC), and different
colleges. BMAC provides an actual workspace like task and meeting rooms for
normal application improvement, cloud stages for Windows or Mac OS gadgets,
counseling places for new businesses and little office experts, the library for appli-
cations, different instruments, an API for openness to nearby city information which
gives. It can assist with working on the city’s essential activities and personal
satisfaction.
6.3.3.4 Nice, France
At a recent conference in Nice, France, the potential of the Internet of energy (IoE)
was examined, and the IP-enabled innovation engineering model, financial model,
and social benefits of IoE were tested and accepted. Then, four astute city adminis-
trations were established, including brilliant lighting, astute course, astute waste
administration, and astute natural observation. For example, information obtained
by sensors for traffic examples can also be used for halting and natural observing
through a standard stage that can collaborate with the city to fabricate keen city
administrations.
6 IoT-Enabled Intelligent Traffic Management System 103
6.3.3.5 Pаdоvа, Itаly
In Pаdovа, Itаly, the University of Pаdovа, as part of a joint venture with the city, a
project called Padova Smart City was launched. This project is funded by the local
government as a financial sponsor. The college serves as a theoretical partner and
helps to further develop smart city concepts.
6.3.4 Challenges
The rising usage of automobiles has resulted in massive traffic congestion. Several
countries are addressing this traffic issue by extracting data from CCTV feeds and
communicating vehicle-related data to city traffic management centers to aid in the
development of changes. As a result of better-organized traffic infrastructure, there
are fewer cars, buses, and trucks stuck in traffic jams. All of this results in shorter
run times, more efficient use of natural resources (gas), and lower emissions. The
amount of gas emitted is highest during stop-start driving, which occurs in regions
where traffic is controlled by lights. As a result, opting for smart traffic helps to
reduce pollution around the city [22].
Smart traffic management, on the other hand, includes features such as smart
parking sensors, smart streetlights, smart motorways, and smart accident assistance,
among others.
6.3.4.1 Traffic Lights
To smooth traffic flow, traffic lights that use real-time data feeds are being used.
Sensors set in strategic locations can collect data on busy traffic intersections and
regions where vehicles are steered away from these sites using IoT technology. Big
data may be used to further analyze this information and discover alternative routes,
as well as improve traffic signaling to ease congestion. Meanwhile, weather sensors
installed on roadside lights allow them to operate. The light dims not just as a result
of the day-night cycle but also when the sky darkens. These signals can be detected
by roadside light sensors, which can then turn the lights on and off as needed.
6.3.4.2 Smart Parking
In the urban planning context, parking has become an Achilles heel. Parking short-
ages, as well as parallel parking, have exacerbated traffic congestion at important
metropolitan junctions. In parking lots, IoT-based sensors can provide real-time
information on available parking spaces to vehicles approaching from a consider-
able distance. This type of sensor has previously been installed in European cities
104 S. Bansal and A. Gupta
such as Paris, France, and Kansas, USA. They have all had excellent outcomes, with
a double-digit percentage reduction in parking complaints documented in a year.
6.3.4.3 Smart Assistance
Road traffic accidents are one of the biggest causes of death in the globe. However,
what contributes to this bleak figure is the victims’ inability to receive prompt care
and support in these catastrophes. Roadside CCTV and sensors can assist in detect-
ing accident sites and communicating them to the local emergency rooms.
Everything else will be easier to handle once this contact is established.
6.4 Research Challenges
There must be proper feasibility in the various fields for some of the IoT’s potential
applications. For IoT to succeed, it must overcome its limits and limitations. IoT
technologies have made enormous strides over the past few years, but there are still
several issues that need to be addressed, clearing the way for new types of research
to be conducted. An inescapable set of research difficulties arises as a direct result
of the Internet of Things’ reliance on heterogeneous technologies for data collection
and management as well as processing and action. As a result, there are a variety of
research difficulties that need to be addressed in a wide range of research fields [23].
6.4.1 Privacy and Security
With its expanding use, IoT has become a critical component of the web’s future,
necessitating the need to appropriately address There must be proper feasibility in
the various fields for some of the IoT’s potential applications. security and trust
functions. Currently, researchers are aware of the flaws in various IoT devices. In
addition, IoT’s foundation is based on existing remote sensing networks; therefore
it is protected by the same level of privacy and security vulnerabilities as WSN. IoT
frameworks have been subjected to several attacks and flaws, proving the need for
comprehensive security plans that maintain the security of data and from beginning
to end. A comprehensive security solution is needed to close this gap, which includes
research into effective cryptography for data and framework security, non-
cryptographic approaches, and frameworks. There is a need to do additional research
on cryptographic security services that can work on IoT devices with limited
resources. This would make it possible for clients with specialized skills to safely
hire and deploy. There are IoT frameworks available for all IoT devices, even though
the client interfaces are not very good. Additionally, the Internet of Things has pro-
tection and security components, and there are other areas such as confidentiality in
6 IoT-Enabled Intelligent Traffic Management System 105
Problems arise owing to the heterogeneous nature of IoT and the huge amount of
data created in this “big data” era. Now, the vast majority of cloud-based frame-
works are geared toward dumping data and conducting computationally heavy tasks
on an international cloud. However, standard cloud architectures have been criti-
cized for their inability to handle the huge amounts of data produced and consumed
by IoT-enabled devices, as well as the associated compute. The majority of frame-
works are addressing this issue by depending on current solutions such as mobile
cloud computing and fog computing, two technologies that are based on edge
processing.
6.4.3 Monitoring and Sensing
While monitoring and detection technologies have made enormous strides, they
continue to evolve, focusing in particular on energy efficiency and shape. It is com-
mon for sensors and tags to be on all the time to collect vital data, making this fea-
ture necessary for energy management. Progress in nano-/biotechnologies and
miniaturization have permitted the development of actuators and sensors at the
nanoscale at the same time.
6.4.5 Interoperability
Web interoperability has always been and will continue to be a vital goal because
the first prerequisite in Internet connectivity necessitates that “connected” frame-
works can “speak the same language” in terms of encodings and protocols. As of
right now, various companies employ several standards to support their applica-
tions. This is due to the sheer volume of data and the variety of different devices,
using standard interfaces in such a variety of substances is highly significant, and
much more so for applications that support cross-organizational, in addition to tra-
ditional applications. Because of this, IoT frameworks are being redesigned to sup-
port far higher degrees of interconnectivity than before.
6.5 Related Work
Kadar Muhammad Masum et al. [25] proposed leveraging the IoT and data analyt-
ics to create a real-time TMS. Traffic density is measured using ultrasonic sensors.
Following an examination of the sensor data, the system controller uses a traffic
management algorithm to regulate traffic signal timing and transfers data to a cloud
server via a Wi-Fi module. Using the proposed method, traffic congestion at the
crossing can be predicted ahead of time. To allow an emergency vehicle to proceed
through a junction with a long signal time, the emergency vehicle must be identi-
fied. A car that violates a traffic signal can be identified, and a fine is levied, which
is paid via the Traffic Wallet smartphone app. As a result of this work, a system that
is low cost, easy to install, as well as easy to maintain has been presented.
Sarab et al. [26] proposed a system paradigm based on IoT for collecting, analyz-
ing, and storing real-time traffic data. Traffic monitoring in real-time with this tech-
nology sends traffic information to drivers via roadside messaging devices.
Authorities can also send notifications to the corresponding messaging units about
VIP visits or medical emergencies or accidents, which will assist the people to make
informed decisions and save time on the roadways. Magnetic sensor nodes are used
to capture real-time vehicle data in the proposed system. Most likely, the technology
will be considered for inclusion in any smart city endeavor, in the form of an intel-
ligent university campus or other intelligent closed facilities.
IoT systems for traffic management were promoted by Chong et al. [27].
Microsoft Azure IoT cloud server with Intel Edison monitors real-time traffic flow.
As traffic increases, the cloud server assigns priority to each road-bound. Greenlight
phase time (GLPT) is determined using the dynamic approach in MATLAB. The
line length and waiting time at a traffic intersection is reduced by 68 and 67 percent,
respectively, when using dynamic cycle TLS. According to simulation data, for
each road bound for dynamic cycle TLS, the queue length and waiting time are
significantly reduced when compared to fixed cycle TLS. Currently, traffic cops are
on duty in the morning and evening rush hours. E, S, N, and W are the four route
6 IoT-Enabled Intelligent Traffic Management System 107
directions with a maximum backlog length of 75 vehicles. The use of the Microsoft
Azure IoT cloud server significantly increased TLS security. As long as this tech-
nology is installed at every road crossing in urban areas, traffic congestion can be
alleviated to some extent.
Using light intensity, Saifuzzaman et al. [28] developed an intelligent lighting
control system that can determine judgments (ON/OFF/DIM). To distinguish
between day and night modes, set a specified infrared sensor which can be used to
regulate the street light, and the LDR sensor can be used in this scenario. Installing
solar cells for power is the most intriguing element of this project; however, if the
solar cells fail, then a secondary DC will take over. In addition to the autonomous
traffic signal maintenance, the complete system can be monitored through the
Internet by installing surveillance cameras. Effortless and economical components
are used to build a trustworthy intelligence system.
According to Al-Shammari et al. [29], a WSN gateway access element provides
an overlaying access channel between MTDs and EPS, as a traffic flow management
strategy. It distributes and organizes network resource sharing for MTC traffic flows
within the evolved packet system. It also addresses the influence and interaction of
application, service, and terminal device heterogeneity, as well as the related QoS
issues among them. By preventing network performance deterioration, this study
solves the issue of network resource depletion. Using simulation, the suggested traf-
fic flow management strategy beats the current traffic management policy, accord-
ing to the study. For example, the proposed model has a 99.45% decrease in packet
loss ratio (PLR) and a 99.89% decrease in packet end-to-end (E2E) delay as well as
a 99.21% decrease in packet delay variability, according to simulation results
(PDV). Because of this, it was established that the proposed policy for managing
HTCs and MTCs traffic flows inside the LTE-APro network infrastructure outper-
forms the current approach in terms of NQoS levels.
Using IR sensors, Rani et al. [30] developed an automated traffic control system.
The previous approach has a fundamental disadvantage in that it changes the traffic
controller in a clockwise direction, which does not account for traffic density. The
traffic density is calculated, and the timer display shifts dynamically. This signifi-
cant advantage eliminates the possibility of an “unwanted wait” for automobiles in
congested areas.
Das et al. [31] provided an efficient algorithm that meets criteria such as low
cost, simple installation, and good traffic management. Measurement, control, and
traffic avoidance are all addressed by the suggested system, which meets all the
requirements.
Kadar Muhammad Masum et al. [25] advocated using IoT and data analytics to
construct a real-time TMS. Ultrasonic sensors are used to determine traffic density.
Following the analysis of sensor data, the system controller uses a traffic manage-
ment algorithm to regulate traffic signal timing and transfers data to a cloud server
via a Wi-Fi module. Using the proposed method, traffic congestion at the crossing
can be predicted ahead of time. To allow an emergency vehicle to proceed through
a junction with a long signal time, the emergency vehicle must be identified. A car
that violates a traffic signal can be identified, and a fine is levied, which is paid via
108 S. Bansal and A. Gupta
the Traffic Wallet smartphone app. As a result of this work, a system that is low cost,
easy to install, as well as easy to maintain has been presented.
Mostafa et al. [32], heavy loads without having to transfer to a higher layer or
cloud distant from the edge, minimizing network traffic and latency, on horizontal
offloading in FC.
Internet of Things (IoT) initiatives for demand- and supply-side mechanisms
were implemented in Vietnam, according to Le et al. [33]. The authors advised a
BMC output for emerging economies to adopt an integrated global value chain ver-
tical integration strategy and improve IoT-based competitive advantages.
6.6 Limitations
As exciting as IoT and big data are for smart traffic management and solutions, they
are not without their drawbacks as well.
(i) With the introduction of IoT technology, modern cities already face infrastruc-
ture issues such as road design, zoning, and other construction-related hurdles.
(ii) As a result of the high-speed data transfer required by these advanced high-
tech solutions, they can only be used in cities with good Internet access [34].
In the event this connectivity is broken for any reason, the entire smart city
might come crashing down.
(iii) Thirdly, the increased number of devices that may connect to the central net-
work means that hackers have more opportunities to launch malicious attacks
on the central network [35]. It will be necessary to add a layer of protection on
top of the standard one to establish a hacker-proof smart traffic solution.
Privacy must be safeguarded, which means both politicians and technologists
must be involved.
6.7 Summary
Data is essential in every field of work in today’s age of new technology. IoT has
proven its worth in vehicle maintenance, navigation, and monitoring, resulting in
better mobility. Despite significant developments, the signals are still managed
manually by humans in the hub. People encounter traffic congestion, particularly in
downtown regions. The wide variety of motors on the street has risen dramatically
in current years. Congestion is a rising issue that everyone faces daily. Manual site
visitor management via site visitor law enforcement authorities is no longer proven
to be effective. A version is intended to effectively resolve the aforementioned
issues through the use of the Internet of Things.
This paper examines the limitations of conventional traffic management systems,
as well as smart traffic control structures used in a few cities. RFID and big data
6 IoT-Enabled Intelligent Traffic Management System 109
analytics can help you achieve your goals, as well as IoT, and an effective frame-
work is proposed. The proposed system’s architecture and functionalities are
defined, as well as how supervised learning was used to decide traffic management
attributes. When introduced, this advanced device would significantly reduce traffic
congestion in major cities while also improving vehicle protection. Cars increase on
the road as people move from rural to urban locations. It places strain on transporta-
tion infrastructure, particularly traffic management practices in cities and towns
throughout the metropolitan area.
Moreover, in this work, the difficulties which happen while executing the IoT
framework were clarified. As a feature of our future work, we intend to overview the
various answers for existing issues and proposals to moderate a few difficulties of
IoT and keen urban communities.
References
1. Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I., “Internet of things (IoT) security:
Current status, challenges and prospective measures,” 2015 10th International Conference for
Internet Technology and Secured Transactions (ICITST), pp. 336–341, 2015.
2. Patel, K. K., and Patel S. M., “Internet of Things-IoT: Definition, Characteristics,
Architecture, Enabling Technologies, Application & Future Challenges,” IJESC, vol. 6, no. 5,
pp. 6122–6131, 2016.
3. Srivastava, A., Gupta, A., & Anand, R. (2021). Optimized smart system for transportation
using RFID technology. Mathematics in Engineering, Science and Aerospace (MESA), 12(4),
953–965.
4. Anand, R., Sinha, A., Bhardwaj, A., and Sreeraj, A. “Flawed Security of Social Network
of Things”. In Handbook of Research on Network Forensics and Analysis Techniques
(pp. 65–86). IGI Global, 2018.
5. Sindhwani, N., Maurya, V. P., Patel, A., Yadav, R. K., Krishna, S., & Anand, R. (2022).
Implementation of Intelligent Plantation System Using Virtual IoT. In Internet of Things and
Its Applications (pp. 305–322). Springer, Cham.
6. Sethi, P., & Sarangi, S. R., “Internet of Things: Architectures, Protocols, and Applications,”
Journal of Electrical and Computer Engineering, vol. 2017, pp. 1–25, 2017.
7. Ray, P. P., “A survey on Internet of Things architectures,” Journal of King Saud University –
Computer and Information Sciences, vol. 30, no. 3, pp. 291–319, 2018.
8. Divyashree, M., & Rangaraju, H. G., “Internet of Things (IoT): A Survey,” 2018 International
Conference on Networking, Embedded and Wireless Systems (ICNEWS), 2018.
9. Ang, L.-M., & Seng, K. P., “Application Specific Internet of Things (ASIoTs): Taxonomy,
Applications, Use Case and Future Directions,” IEEE Access, vol. 7, pp. 56577–56590, 2019.
10. Singh A., and Mukherjee A., “A comprehensive Survey on IoT Networking,” 2019.
11. Shukla, R., Dubey, G., Malik, P., Sindhwani, N., Anand, R., Dahiya, A., and Yadav,
V. “Detecting crop health using machine learning techniques in smart agriculture system,”.
Journal of Scientific & Industrial Research, vol 80, pp. 699–706, 2021.
12. Juneja, S., Juneja, A., & Anand, R. (2020). Healthcare 4.0-Digitizing Healthcare Using Big
Data for Performance Improvisation. Journal of Computational and Theoretical Nanoscience,
17(9–10), 4408–4410.
13. Chiang, M., & Zhang, T., “Fog and IoT: An Overview of Research Opportunities,” IEEE
Internet of Things Journal, vol. 3, no. 6, pp. 854–864, 2016.
110 S. Bansal and A. Gupta
14. Avatefipour, O., & Sadry, F., “Traffic Management System Using IoT Technology – A
Comparative Review,” 2018 IEEE International Conference on Electro/Information
Technology (EIT), 1–7, 2018.
15. Misbahuddin, S., Zubairi, J. A., Saggaf, A., Basuni, J., A-Wadany, S., & Al-Sofi, A. (2015). IoT
based dynamic road traffic management for smart cities. 2015 12th International Conference
on High-Capacity Optical Networks and Enabling/Emerging Technologies (HONET),
142–146, 2015.
16. Javaid, S., Sufian, A., Pervaiz, S., & Tanveer, M., “Smart traffic management system using
Internet of Things,” 2018 20th International Conference on Advanced Communication
Technology (ICACT), 393–398, 2018.
17. Kohli, L., Saurabh, M., Bhatia, I., Shekhawat, U. S., Vijh, M., & Sindhwani, N. (2021). Design
and Development of Modular and Multifunctional UAV with Amphibious Landing Module.
In Data Driven Approach Towards Disruptive Technologies: Proceedings of MIDAS 2020
(pp. 405–421). Springer Singapore.
18. Kohli, L., Saurabh, M., Bhatia, I., Sindhwani, N., & Vijh, M. (2021). Design and Development
of Modular and Multifunctional UAV with Amphibious Landing, Processing and Surround
Sense Module. Unmanned Aerial Vehicles for Internet of Things (IoT) Concepts, Techniques,
and Applications, 207–230.
19. Anand, R. & Chawla, P., “A review on the optimization techniques for bio-inspired antenna
design,” In 2016 3rd International Conference on Computing for Sustainable Global
Development (INDIACom) (pp. 2228–2233). IEEE, 2016.
20. Sindhwani, N., & Bhamrah, M.S., “An optimal scheduling and routing under adaptive
spectrum-matching framework for MIMO systems,” International Journal of Electronics,
104(7), 1238–1253, 2017.
21. Sindhwani, N., & Singh, M., “Performance analysis of ant colony based optimization algo-
rithm in MIMO systems,” In 2017 International Conference on Wireless Communications,
Signal Processing and Networking (WiSPNET) (pp. 1587–1593). IEEE, 2017.
22. Soni, N. B., & Saraswat, J., “A review of IoT devices for traffic management system,” 2017
International Conference on Intelligent Sustainable Systems (ICISS), 1052–1055, 2017.
23. Sharif, A., Li, J., Khalil, M., Kumar, R., Sharif, M. I., & Sharif, A., “Internet of things – smart
traffic management system for smart cities using big data analytics,” 2017 14th International
Computer Conference on Wavelet Active Media Technology and Information Processing
(ICCWAMTIP), 281–284, 2017.
24. Chowdhury, A., “Priority based and secured traffic management system for emergency vehicle
using IoT,” 2016 International Conference on Engineering & MIS (ICEMIS), 1–16, 2016.
25. Kadar Muhammad Masum, A., Kalim Amzad Chy, M., Rahman, I., Nazim Uddin, M., & Islam
Azam, K., “An Internet of Things (IoT) based Smart Traffic Management System: A Context
of Bangladesh,” 2018 International Conference on Innovations in Science, Engineering and
Technology (ICISET), 2018.
26. Sarrab, M., Pulparambil, S., & Awadalla, M., “Development of an IoT based real-time traffic
monitoring system for city governance,” Global Transitions, vol. 2, pp. 230–245, 2020.
27. Chong, H. F., & Ng, D. W. K., “Development of IoT device for traffic management system,”
2016 IEEE Student Conference on Research and Development (SCOReD), 2016.
28. Saifuzzaman, M., Moon, N. N., & Nur, F. N., “IoT based street lighting and traffic manage-
ment system,” 2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC), 2017.
29. Al-Shammari, B. K. J., Al-Aboody, N., & Al-Raweshidy, H. S., “IoT Traffic Management and
Integration in the QoS Supported Network,” IEEE Internet of Things Journal, vol. 5, no. 1,
pp. 352–370, 2018.
30. Rani, L. P. J., Kumar, M. K., Naresh, K. S., & Vignesh, S., “Dynamic traffic management sys-
tem using infrared (IR) and Internet of Things (IoT),” 2017 Third International Conference on
Science Technology Engineering & Management (ICONSTEM), 2017.
6 IoT-Enabled Intelligent Traffic Management System 111
31. Das, A., Dash, P., & Mishra, B. K., “An Innovation Model for Smart Traffic Management
System Using Internet of Things (IoT)”. Lecture Notes on Data Engineering and
Communications Technologies, pp. 355–370, 2017.
32. Mostafa, M. A. A.-A., & Khater, A. M., “Horizontal Offloading Mechanism for IoT Application
in Fog Computing Using Microservices Case Study: Traffic Management System,” 2019 IEEE
Jordan International Joint Conference on Electrical Engineering and Information Technology
(JEEIT), 640–647, 2019.
33. Le, D. N., Le Tuan, L., & Dang Tuan, M. N., “Smart-building management system: An
Internet-of-Things (IoT) application business model in Vietnam,” Technological Forecasting
and Social Change, vol. 141, pp. 22–35, 2019.
34. Anand, R., Sindhwani, N., & Juneja, S. (2022). Cognitive Internet of Things, Its Applications,
and Its Challenges: A Survey. In Harnessing the Internet of Things (IoT) for a Hyper-Connected
Smart World (pp. 91-113). Apple Academic Press.
Chapter 7
A Survey and Challenges: Embedded
System on IoT
P. Venkateshwari and Suresh Subramaniam
7.1 Introduction
Individual organizations are encouraged to set up their system. That system should
be able to retain the data before its memory fades away [1]. The system which could
retain the data is called as Internet of Things, which has become a platform for the
transmission of the data nowadays. Internet of Things is the name first termed by
Kevin Ashton in 1999 [2]. It deals with the history of information to make any deci-
sion related to the dedicated application [1]. IoT is a quickly growing technology
and it brings more security problems. Internet of Things connects billions of devices
for data collection and sharing of those data [3–6]. But at the same time, it puts
highly sensitive data at risk [7]. According to the statistical record, it seems that the
number of connected objects increases to 75.44 billion in the year 2025 [8] and the
estimated economic growth due to the impact of IoT increases to 6.2 trillion by the
year 2025. IoT is a device that has a unique identification and connects to the
Internet [9]. Forbes has estimated that 2.5 quintillion amounts of data are produced
each day by people, machines, and things.
IoT has an impact on many applications like smart home, smart wearable, smart
city, smart farming, smart agriculture, industry automation, health care, etc. Smart
wearables are classified into four types based on their applications like health, sport,
tracking, and safety [10]. There are several IoT applications out of which require
very short response time to accomplish, some need private information from other
sources and some require a larger amount of data which could lead to a heavy load
P. Venkateshwari (*)
ECE Department, GB Pant DSEU Okhla-I Campus, New Delhi, India
S. Subramaniam
Skarduino Labs, Chennai, India
e-mail: [email protected]
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 113
N. Sindhwani et al. (eds.), IoT Based Smart Applications,
EAI/Springer Innovations in Communication and Computing,
https://doi.org/10.1007/978-3-031-04524-0_7
114 P. Venkateshwari and S. Subramaniam
of a system and it takes longer time for processing [11]. Nowadays based on the
application domain, application-specific IoTs (ASIoTs) are designed. The ASIC is
used to design different applications because each application requires different
design parameters. ASIoT is an emerging research area and it works on different
applications like Underwater Things, Medical Things, Battlefield Things, Waste
Things, Nano Things, Animal Things, and Mobile Things [12].
IoT technology offers many opportunities. Multiple communication standards,
messaging protocols, security algorithms, computation technologies, sensors, and
devices for IoT are under development. Communication standards are classified
into short-range and long-range. Short-range communication standards are BLE,
WiFi, Zigbee, RFID, Z-Wave, etc. Long-range communication standards are Sigfox,
LoRa, GSM, 3G, 4G, 5G, satellite communication, NB-IoT, etc. IoT applications
use different messaging protocols like MQTT, XMPP, DDS, AMQP, HTTP, and
CoAP. Various security algorithms for IoT applications are Blockchain, DES, AES,
RSA, Twofish, Triple data encryption standard, etc. IoT uses computation technolo-
gies such as edge, fog, mist, and clouds to store and process the data. The types of
sensors used for IoT applications are temperature, position, motion, pressure, prox-
imity, chemical, humidity, moisture, etc. [13]. The different vendor processors used
in IoT are ARM, Intel, Altium, Atmel, Silicon Labs, Texas Instruments, Samsung,
NVIDIA, etc.
The most primary requirements of IoT are computation and communication
standards. The resources of IoT should be utilized efficiently otherwise it causes
resource constraint issues in handling applications. There are many constraints in
IoT devices like interoperability, heterogeneity, robustness, energy efficiency, and
other issues like data and device management. Quality of service parameters need
to be considered and privacy and security. This paper deliberates about the system
architectural comparison, interrupts, task execution, scheduling, switching tasks
and latency, prioritization of tasks, real-time tasks, real-time operating system, mul-
titasking, sensors, actuators, memory footprints, and communication standards.
There are several survey papers published in this area that covers the various char-
acteristics and technical parts of an IoT. F. John [10] discussed the various wearable
devices and their classification based on the type of application. The author has also
discussed wearable challenges and issues. Narasimha Swamy [14] discussed the
various communication standards, functional pillars of IoT, various privacy and
security issues, three- and five-layered architecture and also the emerging applica-
tions and classifications. K. K. Goyal [15] discussed the five-layered architecture
and four main technologies used for communication like RFID, NFC, M to M, and
V to V and also its applications and challenges are discussed in the work. Mohammed
El-hajji [16] discussed the generic IoT architecture and the issues and requirements
of each and every layer in the IoT architecture. Hamdan Hejazi [17] provided a
detailed survey of the components of an IoT platform necessary for all kinds of
7 A Survey and Challenges: Embedded System on IoT 115
applications. Routh et al. [18] proposed technology challenges of IoT and also ana-
lyzed several survey papers from a business point of view and also analyzed the
various social limitations in which IoT lags. Liya et al. [19] focused on single com-
munication technology over IoT, i.e., LoRaWAN. Rafique et al. [20] focused on
software-defined networks and edge computing to solve the complex IoT manage-
ment. Subbarao et al. [21] proposed a green campus and intelligent campus by sur-
veying several papers on smart campus systems using IoT and also discussed the
working model of a proposed system. Dhanalaxmi et al. [22] focused on the system
of IoT and discussed the DMA controller in IoT. Dhanalaxmi et al. [23] discussed
the network management protocols and their challenges. IoT devices management
and its taxonomy are discussed in their work. Datta et al. [24] provided a simple
survey on IoT architecture, protocols, SMART IoT-based applications, and security
policies.
7.1.2 Motivation
IoT applications and devices made up of IoT are increasing day by day. In most of
the literature, the authors described the various strands of IoT. However, none of the
works described the IoT system design in deep. Therefore, more attention to be
imparted in the system design concepts. Hence, this survey provides a detailed
study of a system in IoT.
7.1.3 Contribution
The IoT-based smart devices are used in various applications and it provides a lot of
research opportunities. But, still, many of the research works did not address the
current issues and developments. This paper provides the levels in architecture,
communication standards, computations, scheduling, and RTOS. In summary, this
paper aims:
• To review the IoT architectures and examines the relationship of each layer with
IoT device
• To analyze the various communication standards and application layers in IoT
• To review the computing standards like edge, fog, mist, cloudlet, and cloud
• To analyze the different OS for IoT
• To analyze the various scheduling methods of IoT
The other remaining parts of this paper are organized as follows. Section 7.2
provides the architectural design of IoT. Section 7.3 provides the task scheduling
policies of an IoT. Section 7.4 provides computing methods of an IoT. Section 7.5
describes the processors. Section 7.6 describes the RTOS of an IoT. Section 7.7
describes the issues and future directions. Finally, Sect. 7.8 is concluding the
remarks of this article.
116 P. Venkateshwari and S. Subramaniam
7.2 Architecture of IoT
Fig. 7.1 IoT-layered architecture. (a) Three-layered architecture. (b) Five-layered architecture. (c)
Twelve-layered architecture
application layer. This layer is responsible for storing and processing the data
with middleware support. The application layer is the layer responsible for deliv-
ering the data in the application-specific user format [32–35].
Five-layered architecture: Five-layered architecture is consisting of business, appli-
cation, service management, transport, and application layers [32–35]. The busi-
ness layer is used to build business-oriented models, graphs, and flow charts.
This layer is specifically used to analyze the data received from the application
layer. The service management layer is also called a processing layer. This layer
provides services in storing, processing, and analyzing the data. The transport
layer works the same as a network layer in three-layered architecture (Fig. 7.1).
Twelve-layered architecture: This architecture is more focused on the cloud envi-
ronment [36]. Layers are classified based on their syntactic and semantic analy-
sis to understand the functionalities of each layer [37]. Layer 1 (physical layer)
is used to connect sensors required for the application, connect all the hardware,
and help to build an IoT structure for an application. Layer 2 (virtualization tech-
nologies) is used to virtualize the connected devices using the technologies inter-
connected with the architecture. Layer 3 (virtualization infrastructure) is used to
instantiate the virtual objects. Layer 4 (interconnection) is used to interconnect
the devices by using short-range communication standards. Layer 5 (access
layer) is used to access the gateways, routers, and switches. Layer 6 (network
layer) is used to store and process the data in the server. Layer 7 (middleware
layer) is an application peripheral interface layer used to provide interoperability
between the network and the service providing layer. It manages the services for
storing, processing, and analyzing the data. Layer 8 (business layer) is used to
118 P. Venkateshwari and S. Subramaniam
build a business model for the end-user. Layer 9 (cloud layer) is used to store,
process, and analyze the data fed in the cloud. This layer is also called as data
center. Layer 10 (application layer) is used to deliver the data to the platform
accessed through a specific application by the end-user. Layer 11 (application
virtualization) is used to virtualize the application. Layer 12 (access, manage-
ment, and security) is used to provide access to the applications (Fig. 7.1).
7.3 Scheduling of IoT
Real-time systems function not only depends on their correct result but also on their
response time. The real-time embedded system computes the results and meets its
requirements within the specified time limit. To accomplish the requirements within
the given time limit, the system divides its process into several tasks and schedules
these tasks in such order to execute within the given time frame. The real-time task
should be completed within a given time frame otherwise it misses its deadline,
which causes partial function or complete failure of the system [38, 39]. There are
many different sensors used for different applications of IoT. Many sensor devices
are utilized in real-world applications. Most of the control system includes periodic
and nonperiodic tasks. Periodic tasks work with respect to time. The periodic task
activation rate always depends on the state variable of an application. If this activa-
tion rate increase causes the system utilization factor to increase beyond the limit.
An increase in system utilization factor beyond the limit is called an overload condi-
tion. The overload condition makes the control system to malfunction. To reduce the
overload condition, delays can be introduced but it generates a functionality loss of
a system [40]. So better scheduling can reduce overload and offload conditions.
Rate adaptive task: Giorgio C. Buttazzo proposed the rate-adaptive task method
[41]. This method adjusts the rate of activities by itself. In this paper, the RAT
method is used to control the speed of the engine. The engine operates at differ-
ent speed intervals for different levels of functionality. These scheduling method
results are derived from the EDF method, and it works for both steady-state and
dynamic conditions.
The CPU utilization to handle ‘n’ number of tasks in steady-state condition is
given by
(ωiCi (ωi ) )
Ui∗ = max
ωi Ωi
2π (7.1)
where U is the utilization factor, ω is related to angular velocity, C is the execution
time, and Ω is the switching speed with respect to ω.
7 A Survey and Challenges: Embedded System on IoT 119
α Ci ( ω )
Ui∗ (α ) = max
ωi Ωi
ω 2 + 2α∆θ − ω
(7.2)
where α is the acceleration and θ is the rotation angle.
The minimum switching time between tasks is
2 ∆θ Ci( ) / Uid
k
Ti ( ) =
k
( )
2
2 ∆θ − α Cik / Uid
(7.3)
where U is the maximum task utilization factor.
i
d
T2 − C2
C1∗ =
T2
T1∗
(7.4)
∗ ∗
where C and T is a rhythmic task and C2T2 is a periodic task.
1 1
The positive acceleration is an event from the scheduler’s perspective, where α is
the rate of a period of a task. fc∗ is a function that returns the computation time of
different cases such as constant computation, constant utilization, and general com-
putation. n ap is the number of preemption which periodic tasks experience in
decreasing the time of a rhythmic task.
n ap − 2 n ap − 2
∑ { ( )} fc∗ T1∗,i + C2 ≤ ∑T 1
∗. i
i =0 i =0 (7.5)
The negative acceleration is an event of an engine to decelerate the speed. n dp is the
number of preemption which periodic tasks experience in increasing the time of a
rhythmic task.
120 P. Venkateshwari and S. Subramaniam
n dp − 2 n dp − 2
∑ { f (T )} + C ≤ ∑T
c
∗
1
∗,i
2 1
∗. i
i =0 i =0 (7.6)
EDF Scheduling
In EDF the priority of the task is based on its deadline. If any task has the earliest
deadline, then those tasks will be scheduled first. EDF algorithm works for the peri-
odic tasks. But the IEDF (improved earliest deadline first) tasks are nonperiodic in
nature [43], and their priority depends on static priority, deadline, and execution
time together.
Least Laxity Scheduling
The least laxity tasks are executed at any time in a given time frame. It is a dynamic
priority-based algorithm. The laxity means the urgency of a task.
L (i ) = D (i ) − C (i )
(7.7)
where L is the laxity, D means deadline of task i, and C is the computation time
of task i.
A task with zero laxity is executed first and any task with a negative laxity value
is stopped due to deadline miss. The least laxity algorithm changes the priority of
the job at any time [44].
The least laxity first algorithm works optimal for the uniprocessor system and it
outperforms in multiprocessor jobs with fixed priorities. LLF causes more context
switching if more than one job has the same laxity. This problem is overcome by
using the MLLF algorithm, and if more than one job has the same laxity, it uses
priority inversion to avoid context switching time [45].
EDZL Scheduling
The LCPS system has enough computation power to handle all real-world data
received from sensor devices. Tseng-Yi Chen proposed an early deadline first until
zero laxity scheduling algorithm to ensure the sensor jobs reduce the deadline miss
in the LCPS system. EDZL method works better than the EDF method. Earliest
deadline first is the scheduling algorithm, which cares for and handles the deadline
miss operation. In EDZL the urgent task is serviced first than the normal task. If
there is any positive laxity or zero laxity, it preempts the current task in a system. If
J jobs in a m process unit miss their deadline, then zero laxity scheduling will be
applied. The system services m + 1 jobs at some time before the time t. EDZL
schedule uses priority promotion. If a greater number of jobs have higher priority
than other jobs, those jobs are scheduled as priority promotion [46].
7 A Survey and Challenges: Embedded System on IoT 121
7.4 Computing Methods
IoT offers different types of computing technologies like end node, mist or edge,
fog, and cloud computing. End nodes are sensors and signal conditioning circuits,
and these are deployed in massive numbers to capture various physical parameters
of the environment. End nodes have sensed raw data. These end nodes are further
connected to an edge node. The edge node is also called a mist node. Edge node is
comprised of processors or an embedded device. This embedded device will process
the sensed raw data. To communicate processed data to a router, bridge, hubs, or
gateway, the edge is connected to a fog node. A fog node is a device that provides
long-range communication. The computing resource is available in between data
source and cloud. Cloud computing is used for larger storage of data. The service
cost needs to be paid to the service providers. Cloud computing is an on-demand
delivery of data.
End nodes: It is generally a sensor; signal conditioning devices are connected to
collect various physical parameters measurement of the environment. These end
nodes are gas input to the edge nodes for further computation.
Edge computing: End nodes are grouped connected to an edge node. Edge node
serves as the head of that group. It preprocesses the data before transmitting. It
processes the data directly from the connected devices in a faster manner. IoT
devices determine where to store data either locally or in a cloud. Edge comput-
ing supports all real-time analytics and it helps in optimizing performance. Edge
computing is having interoperability issues and it is incompatible to serve cloud-
based services. And also, the edge computing devices never support resource
pooling.
Mist computing: It uses sensors and microcontrollers for collecting and processing
the data respectively. Mist computing architecture uses microcomputers and
microcontrollers to transfer their data to the cloud for storage and further pro-
cessing. It uses microcontrollers to make decisions locally. It helps in saving
bandwidth and battery power by transferring the data to the cloud. It uses a data
access layer to ensure the safety and security of the data at the local host level.
This kind of computing is used for limited applications not suited for high-end
processing [47].
Fog computing: This is an architecture used for data storage. Any device which is
capable of computing, storage, and network connectivity can use this method.
This method is used in routers, switches, gateways, and cloud services. This
method is used for real-time data analytics to store the data in the cloud. It has a
low latency to compute and process the data. It can process larger data compared
with the above computing methods. The disadvantage of this method is that it
uses multiple links to transfer data from the physical layer.
Cloud computing: This architecture is mainly for sharing the resource pool. It pro-
vides five main types of cloud services like a service provider, consumer, broker
or agent, carrier, and auditor. The cloud service provider is used to provide a
cloud service for the interested groups. A consumer is a unit that is used to
122 P. Venkateshwari and S. Subramaniam
7.5 Processor
The processor is a component required for computing the received inputs and takes
decisions according to the results. Processors are used in various applications for
processing variants of data. Most of the IoT devices are from 8/16/31 bit processors
like Arduino, ARM, PIC, and Intel Galileo. There are several criteria’s need to be
checked before designing any system like power utilization, device performance,
integrability, time to market, and cost [49].
Tables 7.1 and 7.2 indicate the reasons for selecting a lower DSP and commonly
used controllers used in IoT respectively.
7.6 IoT Platforms
The OS is the most essential part of any IoT device, which acts as an interface to
connect the physical world with the user applications. The kernel is the main core of
the OS and it is a central part of a system. The kernel permits to access the resources
in the system. System shell can be used to access the kernel for granting the resources
to perform any task. Software utility takes care of the system software like assem-
bler, compilers, and code debuggers. Some of the low-powered devices’ IoT OS are
discussed.
Fig. 7.2 According to the StatCounter data released about the operating system market share
worldwide
Contiki Os is more or less like windows and Linux. This OS is used in building
up a highly complex wireless system. This OS supports network simulator Cooja,
which is used to create, analyze, and test the network scenario. Figure 7.2 shows
that the android OS is used 40% than the other OS. Network memory can be
accessed for storing and processing the data. This OS is used most of the smart
device-based applications to operate the system remotely. Its configuration has 2KB
RAM and 40KB ROM [48]. FreeRTOS is a freely available OS. This real-time
operating system is used for microcontrollers to make an edge computing device
operating at low power for any applications. This OS is used to connect all the
devices using the cloud. The most used cloud services are AW IoT and AWS IoT
Greengrass to store the message, process the message, and route the message over
trillions of devices connected across. It needs 6-15 Kb memory to run an OS in a
microcontroller. It has limited computing power and memory capacity [50, 51].
RIOT requires less memory space and it handles the architecture with 8 to 32 bit
wide instructions [52]. It has a low-level address space management, task manage-
ment, and resource management. Tiny OS is a component-based OS. If the devices
are similar in the sense, tiny OS programs can be reused on the other devices. It is
mainly used in a small sensor-based network [53]. The size of the OS is around
400B. Windows 10 IoT is a part of Microsoft Windows 10 OS. OpenWrt is another
124 P. Venkateshwari and S. Subramaniam
open-source type of Linux OS. It is mainly used in routing components and switches
to transfer the data securely over a network. Micropython is very compact. Python
coding is used in microcontrollers. It is built up with the combination of low-level
C/C++ and faster-level python programming. Embedded Linux is specially built for
embedded devices and it is a Linux Kernel variant. It runs on high-end processors
like the cortex-A series.
Table 7.3 shows the famous operating systems for IoT devices.
Scheduling Methods
Scheduling algorithms developed for any basic OS are not applicable for real-time
applications. RTOS uses the preemptive scheduling algorithm; it preempts the
resource forcefully from the running process and handover it to a high priority pro-
cess. Because of this preemption, sometimes the high-priority task may not execute
on time and the low priority task may wait for a longer period. So the primary con-
cern is that designing a context-aware scheduling algorithm and its compatible OS
should be developed. Based on the type of application, suitable scheduling algo-
rithm should be chosen and operated by the system itself
Computing Paradigms
Edge computing depends on the edge node. Edge node provides quick response, fast
data analytics, highly intelligent, and most secured [54, 55]. Nowadays, deep learn-
ing, machine learning, artificial intelligence, and soft computing are used in IoT
applications. DL, ML, and AI algorithms are complex and time-consuming, and it
will consume more energy to execute the code in IoT. So, these algorithms should
be designed in such a manner as to improve energy efficiency and reduce computa-
tion time. Edge computing should support various features like computation time,
mobility, scheduling, resource utilization, and scalability because it works on the
edge node. Edge nodes are nothing but the embedded system; embedded system has
all these characteristics. Fog, mist, and cloud are depending on the server; if the
server faces any downtime issues, security issues, and limited control over any ser-
vices, then this computing suffers a lot and takes much time to respond.
IoT Platforms
A wide range of OS is available like Linux, Ecos, FreeRTOS, CosCox, Rocket OS,
QNX, VxWorks, safe RTOS, Tiny OS, RIOT, Contiki OS, Lite OS, Ubuntu, Android,
etc. IoT protocols should also be added to the OS like DDS, WebSocket, AMQP, etc.
Interoperability issue is there to integrate multiple applications carrying different
OS. As per the IEEE spectrum report, the most commonly used programming lan-
guages are Python, Java, C, C++, Javascript, C#, R, SQL, etc. The prime concern is
to develop an RTOS compatible with all these languages.
7.8 Conclusion
In this work, the basic understanding of IoT and the embedded system is discussed.
The architecture of IoT is discussed in the next section and later its issues are also
addressed. Then various scheduling algorithms are discussed and its challenges are
also addressed. Next computing paradigms are discussed and each computing is
explained in a detailed manner. Edge computing issues are also addressed. If
edge computing issues are resolved, then it will be useful for developing better IoT. The
characteristics of an embedded system and IoT are the same [56]. So embedded
system plays a major role or pivotal role in IoT.
126 P. Venkateshwari and S. Subramaniam
References
1. D. H. Mills, “Viewpoint: Inadequate reader reaction,” in Transactions of the South African
Institute of Electrical Engineers, vol. 69, no. 6, pp. 149–150, June 1978.
2. S. Huckle, R. Bhattacharya, M. White, and N. Beloff, “Internet of Things, blockchain and
shared economy applications,” Procedia Comput. Sci., vol. 98, pp. 461–466, 2016. [Online].
Available: https://www.sciencedirect.com/science/article/pii/S1877050916322190
3. Srivastava, A., Gupta, A., & Anand, R. (2021). Optimized smart system for transportation
using RFID technology. Mathematics in Engineering, Science and Aerospace (MESA), 12(4),
953–965.
4. R. Anand, A. Sinha, A. Bhardwaj and A. Sreeraj, “Flawed Security of Social Network
of Things”. In Handbook of Research on Network Forensics and Analysis Techniques
(pp. 65–86). IGI Global, 2018.
5. Gupta, A., Srivastava, A., & Anand, R. (2019). Cost-effective smart home automation using
internet of things. Journal of Communication Engineering & Systems. 9(2), 1–6.
6. Sindhwani, N., Maurya, V. P., Patel, A., Yadav, R. K., Krishna, S., & Anand, R. (2022).
Implementation of Intelligent Plantation System Using Virtual IoT. In Internet of Things and
Its Applications (pp. 305–322). Springer, Cham.
7. D. Vergnaud, “Comment on “Efficient and Secure Outsourcing Scheme for RSA Decryption in
the Internet of Things”,” in IEEE Internet of Things Journal, vol. 7, no. 11, pp. 11327–11329,
Nov. 2020, doi: https://doi.org/10.1109/JIOT.2020.3004346.
8. W. Zhou, Y. Jia, A. Peng, Y. Zhang and P. Liu, “The Effect of IoT New Features on
Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved,”
in IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1606–1616, April 2019, doi: https://doi.
org/10.1109/JIOT.2018.2847733.
9. M. A. A. da Cruz, J. J. P. C. Rodrigues, J. Al-Muhtadi, V. V. Korotaev and V. H. C. de
Albuquerque, “A Reference Model for Internet of Things Middleware,” in IEEE Internet
of Things Journal, vol. 5, no. 2, pp. 871–883, April 2018, doi: https://doi.org/10.1109/
JIOT.2018.2796561.
10. F. John Dian, R. Vahidnia and A. Rahmati, “Wearables and the Internet of Things
(IoT), Applications, Opportunities, and Challenges: A Survey,” in IEEE Access, vol. 8,
pp. 69200–69211, 2020, doi: https://doi.org/10.1109/ACCESS.2020.2986329.
11. W. Shi, J. Cao, Q. Zhang, Y. Li and L. Xu, “Edge Computing: Vision and Challenges,” in IEEE
Internet of Things Journal, vol. 3, no. 5, pp. 637–646, Oct. 2016, doi: https://doi.org/10.1109/
JIOT.2016.2579198.
12. K. L. Ang and J. K. P. Seng, “Application Specific Internet of Things (ASIoTs): Taxonomy,
Applications, Use Case and Future Directions,” in IEEE Access, vol. 7, pp. 56577–56590,
2019, doi: https://doi.org/10.1109/ACCESS.2019.2907793.
13. D. Sehrawat and N. S. Gill, “Smart Sensors: Analysis of Different Types of IoT Sensors,”
2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), 2019,
pp. 523–528, doi: https://doi.org/10.1109/ICOEI.2019.8862778.
14. S. N. Swamy and S. R. Kota, “An Empirical Study on System Level Aspects of Internet of
Things (IoT),” in IEEE Access, vol. 8, pp. 188082–188134, 2020, doi: https://doi.org/10.1109/
ACCESS.2020.3029847.
15. Goyal, Dr. K. & Garg, Amit & Rastogi, Ankur & Singhal, Saurabh. (2018). A Literature Survey
on Internet of Things (IoT). International Journal of Advanced Manufacturing Technology. 9.
3663–3668.
16. M. El-hajj, A. Fadlallah, M. Chamoun, and A. Serhrouchni, “A Survey of Internet of Things
(IoT) Authentication Schemes,” Sensors, vol. 19, no. 5, p. 1141, Mar. 2019.
17. H. Hejazi, H. Rajab, T. Cinkler and L. Lengyel, “Survey of platforms for massive IoT,” 2018
IEEE International Conference on Future IoT Technologies (Future IoT), 2018, pp. 1–8, doi:
https://doi.org/10.1109/FIOT.2018.8325598.
7 A Survey and Challenges: Embedded System on IoT 127
18. K. Routh and T. Pal, “A survey on technological, business and societal aspects of Internet of
Things by Q3, 2017,” 2018 3rd International Conference On Internet of Things: Smart Innovation
and Usages (IoT-SIU), 2018, pp. 1–4, doi: https://doi.org/10.1109/IoT-SIU.2018.8519898.
19. M. L. Liya and M. Aswathy, “LoRa technology for Internet of Things (IoT):A brief Survey,”
2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and
Cloud) (I-SMAC), 2020, pp. 8–13, doi: https://doi.org/10.1109/I-SMAC49090.2020.9243449.
20. W. Rafique, L. Qi, I. Yaqoob, M. Imran, R. U. Rasool and W. Dou, “Complementing IoT
Services Through Software Defined Networking and Edge Computing: A Comprehensive
Survey,” in IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1761–1804, third
quarter 2020, doi: https://doi.org/10.1109/COMST.2020.2997475.
21. V. Subbarao, K. Srinivas and R. S. Pavithr, “A SURVEY ON INTERNET OF THINGS BASED
SMART, DIGITAL GREEN AND INTELLIGENT CAMPUS,” 2019 4th International
Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), 2019, pp. 1–6, doi:
https://doi.org/10.1109/IoT-SIU.2019.8777476.
22. B. Dhanalaxmi and G. A. Naidu, “A survey on design and analysis of robust IoT architec-
ture,” 2017 International Conference on Innovative Mechanisms for Industry Applications
(ICIMIA), 2017, pp. 375–378, doi: https://doi.org/10.1109/ICIMIA.2017.7975639.
23. S. Sinche et al., “A Survey of IoT Management Protocols and Frameworks,” in IEEE
Communications Surveys & Tutorials, vol. 22, no. 2, pp. 1168–1190, Second quarter 2020,
doi: https://doi.org/10.1109/COMST.2019.2943087.
24. P. Datta and B. Sharma, “A survey on IoT architectures, protocols, security and smart city
based applications,” 2017 8th International Conference on Computing, Communication
and Networking Technologies (ICCCNT), 2017, pp. 1–5, doi: https://doi.org/10.1109/
ICCCNT.2017.8203943.
25. A. Clements, Principles of Computer Hardware, 4th ed. Oxford, U.K.: Oxford Univ.
Press, 2006.
26. C. Zhong, Z. Zhu and R. Huang, “Study on the IOT Architecture and Gateway Technology,”
2015 14th International Symposium on Distributed Computing and Applications for Business
Engineering and Science (DCABES), 2015, pp. 196–199, doi: https://doi.org/10.1109/
DCABES.2015.56.
27. Anthony Steed, Manuel Fradinho Oliveira, Chapter 6 – Sockets and middleware, Editor(s):
Anthony Steed, Manuel Fradinho Oliveira, Networked Graphics, Morgan Kaufmann, 2010,
Pages 195–216, ISBN 9780123744234, doi:https://doi.org/10.1016/B978-0-12-374423-
4.00006-9. (https://www.sciencedirect.com/science/article/pii/B9780123744234000069)
28. L. Kohli, M. Saurabh, I. Bhatia, U.S. Shekhawat, M. Vijh and N. Sindhwani, “Design and
Development of Modular and Multifunctional UAV with Amphibious Landing Module”.
In Data Driven Approach Towards Disruptive Technologies: Proceedings of MIDAS 2020
(pp. 405–421). Springer Singapore, 2021.
29. L. Kohli, M. Saurabh, I. Bhatia, N. Sindhwani and M. Vijh, “Design and Development of
Modular and Multifunctional UAV with Amphibious Landing, Processing and Surround Sense
Module”. Unmanned Aerial Vehicles for Internet of Things (IoT) Concepts, Techniques, and
Applications, 207–230, 2021.
30. Hou, Jin-bing, Li, Tong & Chang, Cheng. (2017). Research for Vulnerability Detection
of Embedded System Firmware. Procedia Computer Science. 107. 814–818. https://doi.
org/10.1016/j.procs.2017.03.181.
31. A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari and M. Ayyash, “Internet of Things:
A Survey on Enabling Technologies, Protocols, and Applications,” in IEEE Communications
Surveys & Tutorials, vol. 17, no. 4, pp. 2347–2376, Fourth quarter 2015, doi: https://doi.
org/10.1109/COMST.2015.2444095.
32. Khan, R.; Khan, S.U.; Zaheer, R.; Khan, S. Future Internet: The Internet of Things Architecture,
Possible Applications and Key Challenges. In Proceedings of the 2012 10th International
Conference on Frontiers of Information Technology, Islamabad, India, 17–19 December 2012.
128 P. Venkateshwari and S. Subramaniam
33. Weyrich, M.; Ebert, C. Reference Architectures for the Internet of Things. IEEE Softw. 2016,
33, 112–116. [CrossRef]
34. Wu, M.; Lu, T.J.; Ling, F.Y.; Sun, J.; Du, H.Y. Research on the architecture of Internet of
Things. In Proceedings of the 2010 3rd International Conference on Advanced Computer
Theory and Engineering (ICACTE), Chengdu, China, 20–22 August 2010.
35. Bauer, M.; Boussard, M.; Bui, N.; Loof, J.D.; Magerkurth, C.; Meissner, S.; Nettsträter, A.;
Stefa, J.; Thoma, M.; Walewski, J.W. IoT Reference Architecture. In Enabling Things to Talk;
Springer: Berlin/Heidelberg, Germany, 2013; pp. 163–211.
36. Bellavista P., Berrocal J., Corradi A., Sajal K., Foschini L., Zanni A., « A survey on fog
computing for the Internet of Things ». Journal: Pervasive and Mobile Computing, Volume
52, p. 71–99. (2018).
37. A.-E. Bouaouad, A. Cherradi, S. Assoul and N. Souissi, “The key layers of IoT architec-
ture,” 2020 5th International Conference on Cloud Computing and Artificial Intelligence:
Technologies and Applications (CloudTech), 2020, pp. 1–4, doi: https://doi.org/10.1109/
CloudTech49835.2020.9365919.
38. R. I. Davis, S. Altmeyer, L. S. Indrusiak, C. Maiza, V. Nelis, and J. Reineke, “An extensible
framework for multicore response time analysis,” Real Time Syst., vol. 54, no. 3, pp. 607–661,
Jul. 2018.
39. S. Juneja, A. Juneja and R. Anand, “Reliability Modeling for Embedded System Environment
compared to available Software Reliability Growth Models”. In 2019 International
Conference on Automation, Computational and Technology Management (ICACTM)
(pp. 379–382). IEEE.
40. Buttazzo, G.C. Rate Monotonic vs. EDF: Judgment Day. Real-Time Systems 29, 5–26 (2005).
41. Giorgio C. Buttazzo, Enrico Bini, and Darren Buttle. 2014. Rate-adaptive tasks: model,
analysis, and design issues. In Proceedings of the conference on Design, Automation & Test
in Europe DATE ’14. European Design and Automation Association, Leuven, BEL, Article
253, 1–6.
42. Junsung Kim, Karthik Lakshmanan, and Ragunathan (Raj) Rajkumar. 2012. Rhythmic
Tasks: A New Task Model with Continually Varying Periods for Cyber-Physical Systems.
In Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical
Systems (ICCPS ’12). IEEE Computer Society, USA, 55–64.
43. Y. Wang et al., “Research on Real-Time Embedded Software Scheduling Model Based
on EDF,” in IEEE Access, vol. 8, pp. 20058–20066, 2020, doi: https://doi.org/10.1109/
ACCESS.2020.2969229.
44. M. L. Dertouzos and A. K. Mok, “Multiprocessor online scheduling of hard-real-time tasks,”
in IEEE Transactions on Software Engineering, vol. 15, no. 12, pp. 1497–1506, Dec. 1989,
doi: https://doi.org/10.1109/32.58762.
45. Han S., Park M. (2006) Predictability of Least Laxity First Scheduling Algorithm on
Multiprocessor Real-Time Systems. In: Zhou X. et al. (eds) Emerging Directions in Embedded
and Ubiquitous Computing. EUC 2006. Lecture Notes in Computer Science, vol 4097.
Springer, Berlin, Heidelberg. doi:https://doi.org/10.1007/11807964_76
46. T. Chen, H. Wei, J. Leu and W. Shih, “EDZL scheduling for large-scale cyber service on
real-time cloud,” 2011 IEEE International Conference on Service-Oriented Computing and
Applications (SOCA), 2011, pp. 1–3, doi: https://doi.org/10.1109/SOCA.2011.6166234.
47. Uehara M. (2018) Mist Computing: Linking Cloudlet to Fogs. In: Lee R. (eds) Computational
Science/Intelligence and Applied Informatics. CSII 2017. Studies in Computational
Intelligence, vol 726. Springer, Cham. doi:https://doi.org/10.1007/978-3-319-63618-4_15
48. M. De Donno, K. Tange and N. Dragoni, “Foundations and Evolution of Modern Computing
Paradigms: Cloud, IoT, Edge, and Fog,” in IEEE Access, vol. 7, pp. 150936–150948, 2019,
doi: https://doi.org/10.1109/ACCESS.2019.2947652.
49. T. Paul and G. S. Kumar, “Safe Contiki OS: Type and Memory Safety for Contiki OS,”
2009 International Conference on Advances in Recent Technologies in Communication and
Computing, 2009, pp. 169–171, doi: https://doi.org/10.1109/ARTCom.2009.126.
7 A Survey and Challenges: Embedded System on IoT 129
50. J. Dixon. “Choosing the right low power processor for your embedded design.” https://
www.embedded.com/choosing-the-right-low-powerprocessor-for-your-embedded-design/
(accessed 7/2/2020).
51. Anzhen Xing, Donghui Wang, and Yulin Zhao. 2017. Analysis and Implementation of an
Embedded System Platform Based on FreeRTOS and Cortex-M3. In Proceedings of the 2017
2nd International Conference on Communication and Information Systems (ICCIS 2017).
Association for Computing Machinery, New York, NY, USA, 350–354.
52. E. Baccelli et al., “RIOT: An Open Source Operating System for Low-End Embedded Devices
in the IoT,” in IEEE Internet of Things Journal, vol. 5, no. 6, pp. 4428–4440, Dec. 2018, doi:
https://doi.org/10.1109/JIOT.2018.2815038.
53. P. Alagupandi, R. Ramesh and S. Gayathri, “Smart irrigation system for outdoor environ-
ment using Tiny OS,” 2014 International Conference on Computation of Power, Energy,
Information and Communication (ICCPEIC), 2014, pp. 104–108, doi: https://doi.org/10.1109/
ICCPEIC.2014.6915348.
54. M.K. Saini, R. Nagal, S. Tripathi, N. Sindhwani and A. Rudra, “PC Interfaced Wireless
Robotic Moving Arm”. In AICTE Sponsored National Seminar on Emerging Trends in
Software Engineering (Vol. 50), 2008.
55. L. Singh, M.K. Saini, S. Tripathi and N. Sindhwani, “An Intelligent Control System For Real-
Time Traffic Signal Using Genetic Algorithm”. In AICTE Sponsored National Seminar on
Emerging Trends in Software Engineering (Vol. 50), 2008.
56. Anand, R., Sindhwani, N., & Juneja, S. (2022). Cognitive Internet of Things, Its Applications,
and Its Challenges: A Survey. In Harnessing the Internet of Things (IoT) for a Hyper-Connected
Smart World (pp. 91–113). Apple Academic Press.
Chapter 8
Integration of Big Data and IoT
in the Modern Era
8.1 Introduction
A. Kumar
UCER, Greater Noida, India
D. N. Gupta (*) · R. Kumar
Jamia Millia Islamia, New Delhi, India
e-mail: [email protected]
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 131
N. Sindhwani et al. (eds.), IoT Based Smart Applications,
EAI/Springer Innovations in Communication and Computing,
https://doi.org/10.1007/978-3-031-04524-0_8
132 A. Kumar et al.
TOWER
MAN
AEROPLANE
MOBILE PHONE
HOME TRAIN
8.2 IoT Architecture
Now, IoT can be used in many different ways. IoT applications operate in different
ways based on their structures. IoT does not have a defined system of global adapt-
ability yet. Its usefulness and applications in various industries are determined by its
8 Integration of Big Data and IoT in the Modern Era 135
architecture. Four layers of IoT architecture are presented in this chapter. Among
the layers are the perception layer, the network layer, the data processing layer, and
the application layer. Sensing devices, such as detectors, transducers, and transduc-
ers, make up the sensing layer. Data is taken in by these detectors or actuators
(physical properties), computed, and then transmitted. Data acquisition systems
(DAS) and WWW gateways make up the network layer. Data acquisition and trans-
formation are the responsibility of DAS. A few examples include capturing and
integrating data, converting analog signals from sensors and sensors to digital sig-
nals, and so on [17–20].
Smart sensors are often connected to the Internet using advanced gateways,
which also provide fundamental gateway functions such as virus prevention and
filtering, judgments based on incoming data, and data case management. Among the
functional units of an IoT environment, the data processing layer is the most impor-
tant. Various evaluations and preprocessing are done before data is sent to the data
center. A software package called a business application retrieves information and
prepares the data for further processing. Thus, edge IT or edge analytics becomes
relevant. A cloud server is an information management system that continuously
collects and encrypts data to be made available to end-users through applications
like farming, aviation, and agriculture [21]. It is the application layer that handles
the functionality of these applications. IoT is depicted in Fig. 8.2 as architecture.
Process Information,
DATA PROCESSING LAYER Processing Unit, Data
Analysis
Data Transmission,
Networking Gateway,
NETWORK LAYER
Network Technology
An IoT environment involves “things” that communicate with the Web without
human intervention. There is always a connection between these “things” from a
refrigerator sending an alert about meals inside to a car sending signals about oil
levels to a specialist. As a result, IoT ecosystems, from their makers to users, con-
tinue to experience many security issues. Readers will be exposed to some impor-
tant topics in this article.
One of the major issues with these technology companies is that they are too sloppy
when it comes to dealing with security vulnerabilities related to devices. It appears
that the majority of these gadgets and IoT goods are not being changed enough, and
some are even getting no modifications at all. It means that a device that was previ-
ously considered to be secure when it was purchased becomes insecure over time,
leaving it vulnerable to attacks from cyberspace and other sources. Cyber-attacks
pose serious risks to corporations, so each device must be thoroughly tested before
being released to the public and updated periodically [22].
The makers of IoT devices should not default devices to administrator logins and/or
passcodes, as detailed in various declassified documents. In any case, these are only
suggestive measures at this point, and there are no legal sanctions in place to encour-
age producers to stop using this harmful strategy. Credential phishing and brute
force attacks in IoT systems are almost universal because weak passwords and login
data make them easy to target. Firms that use factory default settings for their
devices expose their enterprise and its properties, as well as their clients and their
sensitive information, to brute-force attacks [23, 24].
so that the cameras and data can be unlocked. Future attack possibilities will become
increasingly unpredictable as the number of gadgets continues to expand [25].
Identities, credentials, and secret keys are already being retrieved by social engi-
neering. The hijacking of IP cameras and even video cameras is part of a cryptocur-
rency mining strategy. Breach of blockchains, IoT botnet mining, and data security
modifications represent a significant flood damaging the cryptocurrency market and
upending cryptocurrencies’ already unpredictable value and architecture. For block-
chain platforms and IoT applications based on blockchain technology to avoid
future security concerns, they should be tested, monitored, and maintained regu-
larly [26].
IoT devices make up a wide range of devices used by large enterprises that con-
stantly capture, handle, keep, and process information, including smart TVs, ampli-
fying systems, lighting systems, linked printers, HVAC systems, and home
automation. The data and information relating to customers are frequently distrib-
uted to numerous companies and even sold to them, breaching customer privacy and
information security rights and leaving the public in fear. To achieve proper separa-
tion of IoT data payloads from personal information, it is necessary to establish
privacy guidelines to redact and anonymize confidential information before gather-
ing the data and trying to separate the data from payloads. Cached data that is no
longer necessary should be disposed of safely [27].
Micro-breach attempts will almost certainly increase in the next few years, accord-
ing to the computer science community. As opposed to employing the largest weap-
ons, attackers are most likely to use smaller stealth attacks that are tiny enough just
to be able to allow data to trickle out instead of collecting thousands upon thousands
of records all at once [28].
8.2.1.7 Intelligence and Robotics
Artificial intelligence (AI) and automation are already being used to sort through
large amounts of data, and in the future, they may assist IoT administrators and
network security personnel with enforcing data-specific policies and detecting
138 A. Kumar et al.
8.2.1.8 Attack of the Home
Among the most frightening concerns that IoT could present is the possibility of a
domestic dispute. Several IoT devices have now been widely adopted for use in
homes and offices, leading to the development of building automation. Despite the
proliferation of IoT gadgets, their security is a major concern because they may
reveal the IP address of their user, which can be linked directly to her home address.
It would be easy for hackers to sell this vital information to underground websites
which are safe havens for criminal gangs. Furthermore, if she uses IoT devices in
her security systems, she runs the risk of them being hacked and her home compro-
mised [30].
The idea of connected vehicles is beginning to become a reality with the help of IoT
devices. Despite its IoT capabilities, its connection makes it more vulnerable to car
thefts. The remote access feature of the smart automobile could be used by an
advanced hacker to take control of it. It is an extremely dangerous position as any-
one can use the vehicle, making the user vulnerable to deadly threats [31].
Many IoT devices use the network without encrypting communications. Currently,
IoT security issues are one of the most significant threats facing the industry. The
time is now for all businesses to ensure that the cloud and their devices are encrypted
to the highest degree. The easiest approach to avoiding this issue is to utilize trans-
port protection and protocols such as TLS. It is also possible to use separate net-
works for different devices [32].
8 Integration of Big Data and IoT in the Modern Era 139
8.3 Big Data
Big data is a group of massive data that cannot be processed with typical computing
methods. It is no longer a single approach or tool; rather, it has evolved into a com-
prehensive subject encompassing a variety of tools, techniques, and contexts. The
data generated by various devices and systems is referred to as big data. Several of
the fields that fall within the big data category are social media data, stock exchange
data, power grid data, and transport data. As a result, big data encompasses a large
volume, velocity, and diverse range of data. There will be three different categories
in it, viz., structured data (relational data), unstructured data (word, PDF, text, media
logs), and semistructured data (XML data) [33].
Structured data is any data that can be maintained, retrieved, and analyzed in a
predetermined format. Over time, computer science talent has become more suc-
cessful in inventing approaches to working with such material (when the format is
fully understood in advance) and extracting value from it. However, we are already
anticipating problems when the bulk of such data expands to enormous proportions;
ranges of approximately are in the tens of terabytes of data. An example of struc-
tured data is given in Table 8.1.
Unstructured data is any data that has an undetermined shape or organization.
Unstructured data, in addition to its enormous bulk, faces several handling obstacles
in extracting value from it. A mixed data source including a mix of text-based files,
photos, videos, and other types of unstructured information is a good example.
Firms nowadays have a lot of data at their disposal, but they do not know how to
make a profit from it because the data is in its original form or unprocessed format.
An example of unstructured data is shown in Fig. 8.3.
Both types of data can be found in moderately data. Moderate data appears to be
structured, but it is not defined by a table specification in a relational database man-
agement system. A data set contained in an XML file is a form of semistructured
data. An example of semistructured data can be seen as personal data stored in an
XML file. For example, <rec><name>UmeshKumar</name><sex>Male</sex>
<age>33</age></rec> OR <rec><name>Pratiksha Joshi</name><sex>Female
</sex><age>31</age></rec>.
In the era of IoT, big data developments include universal wireless connection,
authentic analytics, machine learning, and feature extraction elements such as
affordable detectors and embedded devices. IEEE 802.15.4, IEEE 802.11, IEEE
802.15.1, and IEEE 802.16 are the most widely utilized universal wireless technol-
ogy protocols for transmitting massive data in IoT. The large data generated by IoT
devices are available to use as soon as it enters the system, thanks to real-time pro-
cessing. A level of technological readiness that is either immediate or virtually
The processing of data is important before its use in the environment. It saves a lot
of energy from the devices at run time. The processing can be achieved in six steps,
viz., extraction, loading, preprocessing, processing, analysis, and transformation
and visualization. The technique or act of extracting data from data inputs for pro-
cessing or storage is known as data extraction. Data transformations, as well as the
probable incorporation of metadata, are thus pursued in the transitional organization
before transferring to any other level in the workflow. Data loading is the process of
loading changed data into a location where consumers can interact with it.
Preprocessing stage is a data mining technique that turns original information into a
more understandable format. Practical data is frequently contradictory, incomplete,
or lacking in several ways. Data from the real world may have several mistakes. As
a result, data preparation is a tried and true way for tackling these challenges [36].
Data processing is the collection and modification of data pieces to generate use-
ful information. It is possible to think of it as a subset of data processing. Data
analysis is a method of analyzing, manipulating, and modeling data to uncover
usable information and support decision-making. In the fields of science, market-
ing, and sociology, data analysis entails a variety of methodologies and approaches.
142 A. Kumar et al.
The process of changing data from one format or structure to another is referred to
as data transformation. Many data integration and data management jobs, such as
data manipulation, data storage, data transformation, and application integration,
follow this general trend. Any endeavor to help individuals consider the interpreta-
tion of data by putting it in correct apparent reference is referred to as data visualiza-
tions [37]. The steps involved in data processing are presented in Fig. 8.5.
1010data is a columnar database that primarily works with quasi data, such as
data from IoT devices. This tool offers complex analytic services, such as optimiza-
tion [38–40] and statistical methods, in addition to data visualization, reporting, and
integration. Increase the capability is also well supported by 1010data. To commu-
nicate with back-end systems, this tool likewise functions in a centralized manner
8 Integration of Big Data and IoT in the Modern Era 143
Data Loading
Pre-processing
Data processing
Data Analysis
and employs access controls. With its extensive analysis capabilities, 1010data can
meet customer demand. In terms of data extraction, modification, and loading, how-
ever, 1010data is deemed ineffective. Hadoop is an open-source data processing
platform that uses commodity technology to store and process huge amounts of
144 A. Kumar et al.
data. The Hadoop Distributed File System (HDFS) and the MapReduce program-
ming style are the two most significant pieces of the Hadoop architecture. The data
is stored in HDFS, and MapReduce is used to handle it in a distributed way.
Hadoop, despite its several benefits, lacks privacy at the network and storage
levels, has limited flexibility, is unsuitable for tiny data volumes, and has a large I/O
overhead. HP unveiled Hadoop Autonomy Vertica Enterprise (HAVEn) security, a
new big IoT data framework paradigm for a wide range of HP systems that can be
used with a wide range of applications. For the major Hadoop application develop-
ers, HP supplies reference hardware configurations. Vertica is an analytical database
management system for a tabular database with highly parallel computing that seeks
to speed up the analysis of large structured data sets. To supplement traditional
enterprise data centers, HP HAVEn is presently partnering with several companies.
HP has added a “Flex-Zone” to make it easier to explore enormous data sets before
deciding on a database scheme.
The term smart sensor refers to sensors that continuously collect information
from numerous active heterogeneous systems. Adding devices to IoT solutions
increases the possibility of data influx, which will require scalable solutions.
Businesses can generate useful results using these analytical systems, giving them
the edge over their competitors. Data should be bifurcated to get the most value
from it because it can be obtained based on its nature. Analyzing stream analytics
data combined with academic archive data reveals patterns extracted from sensor
stream data in an unordered form. An analysis that is conducted in real-time with
this method can be useful for applications in fleet monitoring and bank monitoring.
Because IoT data is received through many different channels and has many
types, it is difficult to receive and combine. Analytical systems must make sure that
the data they receive can be accessed and interpreted effectively. Machine learning
algorithms and text mining algorithms are frequently used to retrieve text data from
the sensors. In contrast, obtaining data from photographs and videos may take a
considerable amount of time. Systems containing IoT data frequently contain sensi-
tive information that must be protected from outside intrusions. As a result of their
limited capability, these technologies rely on third-party technology, which can
demonstrate security weaknesses.
Supermarkets could be a good example of how IoT and big data can be inte-
grated. A supermarket is a place where anyone can purchase anything they might
need, whether it be food items for kids, baby items, or items for young adults or
older adults. A camera is installed in every supermarket location, and it is connected
to a server room. All activities performed by various individuals in the server room
are recorded on the server. A future supermarket will provide off-the-shelf technol-
ogy, airy design, easy-to-reach products, and informational screens above the cus-
tomer’s head, making it easier and more enjoyable to shop. Imagine learning all the
details about the food you are purchasing, including the climate and physical condi-
tions under which it was grown, as well as the organic and chemical treatments it
underwent during the journey to reach the shelf right in front of you. For example,
the supermarket offered by Cooper Italia is designed to offer customers a diverse
range of products. Figure 8.7 presents a possible scenario of a supermarket.
146 A. Kumar et al.
8.6 Conclusion
IoT comprises different sensing devices that generate a large amount of data that
sometimes are too big to be handled. This huge amount of data needs to be taken
care of wisely. There should be a mechanism to intelligently disburse the data. In an
IoT environment, the data from heterogeneous sources possess serious threats [43].
In the presented chapter, the authors explain the architecture of IoT in greater detail
along with the common security threats to the IoT environment because of the gen-
eration of an exponential amount of data. The concept of big data is also elaborated
in greater detail along with the details of different types of data. The authors also
presented the processing methods of data generated from heterogeneous sources to
make them suitable to be used in an IoT environment. At last, the integration of big
data into an IoT environment is discussed with the help of many real-time examples.
The future scope of research in this field is everlasting since the generation of
data cannot be stopped and the need for its intelligent use will always be welcomed
by the constrained devices. The future of computation lies in sensing. Almost every
industry now moves toward the concept of IoT and wants their applications to adopt
the same. The integration aspects work well in this case. There are many existing
8 Integration of Big Data and IoT in the Modern Era 147
mechanisms to solve the problem of big data. The researchers can get some insights
from them to integrate the concept of big data into IoT. Scholars can also work with
different industries to make a case study on their data generation and uses.
References
1. Gupta, A., Srivastava, A., & Anand, R. (2019). Cost-effective smart home automation using
internet of things. Journal of Communication Engineering & Systems. 9(2), 1–6.
2. Sindhwani, N., Maurya, V. P., Patel, A., Yadav, R. K., Krishna, S., & Anand, R. (2022).
Implementation of Intelligent Plantation System Using Virtual IoT. In Internet of Things and
Its Applications (pp. 305–322). Springer, Cham.
3. M. Singh, M. A. Rajan, V. L. Shivraj, and P. Balamuralidhar, “Secure MQTT for Internet
of Things (IoT),” Proc. – 2015 5th Int. Conf. Commun. Syst. Netw. Technol. CSNT 2015,
pp. 746–751, 2015, 10.1109/CSNT.2015.16.
4. N. Mishra, L. P. Verma, P. K. Srivastava, and A. Gupta, “An Analysis of IoT Congestion Control
Policies,” Procedia Comput. Sci., vol. 132, pp. 444–450, 2018, https://doi.org/10.1016/j.
procs.2018.05.158.
5. M. Roham, E. Saldivar, S. Raghavan, M. Zurcher, J. Mack, and M. Mehregany, “A mobile
wearable wireless fetal heart monitoring system,” 2011 5th Int. Symp. Med. Inf. Commun.
Technol. ISMICT 2011, pp. 135–138, 2011, https://doi.org/10.1109/ISMICT.2011.5759813.
6. D. N. Gupta and R. Kumar, “Lightweight Cryptography : an IoT Perspective,” Int. J. Innov.
Technol. Explore. Eng., vol. 8, no. 8, pp. 700–706, 2019, [Online]. Available: https://www.
ijitee.org/download/volume-8-issue-8/.
7. A. Gupta, A. Srivastava, R. Anand and T. Tomažič, “Business Application Analytics and
the Internet of Things: The Connecting Link”. In New Age Analytics (pp. 249–273). Apple
Academic Press, 2020
8. T. Ivanov, N. Korfiatis, and R. V. Zicari, “On the inequality of the 3V’s of Big Data Architectural
Paradigms: A case for heterogeneity,” no. November, 2013, [Online]. Available: http://arxiv.
org/abs/1311.0805.
9. D. N. Gupta and R. Kumar, “Distributed Key Generation for Secure Communications Between
Different Actors in Service-Oriented Highly Dense VANET,” in Cloud and IoT-Based Vehicular
Ad Hoc Networks, John Wiley & Sons, Ltd, 2021, pp. 221–232.
10. S. Dubey, P. Singh, P. Yadav, and K. K. Singh, “Household Waste Management System Using
IoT and Machine Learning,” Procedia Comput. Sci., vol. 167, no. 2019, pp. 1950–1959, 2020,
https://doi.org/10.1016/j.procs.2020.03.222.
11. R. Stackowiak, “Azure IoT Solutions Overview,” in Azure Internet of Things Revealed:
Architecture and Fundamentals, Berkeley, CA: Apress, 2019, pp. 29–54.
12. S. Selvaraj and S. Sundaravaradhan, “Challenges and opportunities in IoT healthcare sys-
tems: a systematic review,” SN Appl. Sci., vol. 2, no. 1, pp. 1–8, 2020, https://doi.org/10.1007/
s42452-019-1925-y.
13. R. Lipovský and H. A. Ferreira, “Self hand-rehabilitation system based on wearable technol-
ogy,” ACM Int. Conf. Proceeding Ser., vol. 01-02-Octo, no. Figure 1, pp. 93–95, 2015, https://
doi.org/10.1145/2838944.2838967.
14. B. DaCosta and S. Seok, “Cybercrime in Online Gaming,” Encycl. Crim. Act. Deep Web,
pp. 881–892, 2020, https://doi.org/10.4018/978-1-5225-9715-5.ch059.
15. M. S. H. Ansari and M. Mehrotra, “Development of smart cities and its sustainability: A smart
city framework,” Int. J. Innov. Technol. Explore. Eng., vol. 8, no. 11, pp. 646–655, 2019,
https://doi.org/10.35940/ijitee.K1703.0881119.
16. M. S. H. Ansari and M. Mehrotra, “Securing M2M communication in Smart Cities,” in 2020
International Conference for Emerging Technology (INCET), 2020, p. 4.
148 A. Kumar et al.
17. M. and C. R. Kaur Harleenand Atif, “An Internet of Healthcare Things (IoHT)-Based
Healthcare Monitoring System,” in Advances in Intelligent Computing and Communication,
2020, pp. 475–482.
18. D. N. Gupta and R. Kumar, “Networking in IoT: Technologies used, security threats and pos-
sible countermeasures,” Int. J. Sensors, Wirel. Commun. Control, vol. 10, Jan. 2021, https://
doi.org/10.2174/2210327910666210106090826.
19. M.K. Saini, R. Nagal, S. Tripathi, N. Sindhwani and A. Rudra, “PC Interfaced Wireless
Robotic Moving Arm”. In AICTE Sponsored National Seminar on Emerging Trends in
Software Engineering (Vol. 50), 2008.
20. L. Singh, M.K. Saini, S. Tripathi, and N. Sindhwani, “An Intelligent Control System For Real-
Time Traffic Signal Using Genetic Algorithm”. In AICTE Sponsored National Seminar on
Emerging Trends in Software Engineering (Vol. 50), 2008.
21. F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the internet of
things,” Proc. first Ed. MCC Work. Mob. cloud Comput. – MCC’12, p. 13, 2012, https://doi.
org/10.1145/2342509.2342513.
22. M. Perilli, M. De Bonis, and C. Gallo, “Computer Forensics and Cyber Attacks,” pp. 132–150,
2020, https://doi.org/10.4018/978-1-7998-5728-0.ch008.
23. D. N. Gupta and R. Kumar, “Generating Random Binary Bit Sequences for Secure
Communications between Constraint Devices under the IOT Environment,” in INCET, 2020,
pp. 1–6.
24. D. N. Gupta, “Sponge based Lightweight Cryptographic Hash Functions for IoT Applications,”
pp. 1–5, 2021.
25. Department of Health and Social Care, “Lessons learned review of the WannaCry Ransomware
Cyber Attack,” Dep. Heal. Soc. Care, no. February, pp. 1–42, 2018, [Online]. Available: www.
nationalarchives.gov.uk/doc/open-government-licence/%0A https://www.england.nhs.uk/wp-
content/uploads/2018/02/lessons-learned-review-wannacry-ransomware-cyber-attack-cio-
review.pdf.
26. V. Kumar and G. S. Lalotra, “Blockchain-Enabled Secure Internet of Things,” pp. 45–55,
2020, https://doi.org/10.4018/978-1-7998-2414-5.ch003.
27. D. N. GUPTA, R. Kumar, and A. Kumar, “Efficient Encryption Techniques for Data
Transmission Through the Internet of Things Devices,” in IoT and Cloud Computing
Advancements in Vehicular Ad-Hoc Networks, 1st ed., V. Jain, O. Kaiwartya, N. Singh, and
R. S. Rao, Eds. Pennsylvania, United States: IGI Global, 2020, pp. 203–228.
28. B. Hudson, “Advanced Persistent Threats: Detection, Protection and Prevention,” 2014.
29. S. S. G., V. A., and N. V., “Introduction to the World of Artificial Intelligence,” pp. 359–379,
2019, https://doi.org/10.4018/978-1-5225-9902-9.ch019.
30. S. Al Salami, J. Baek, K. Salah, and E. Damiani, “Lightweight encryption for smart home,”
Proc. – 2016 11th Int. Conf. Availability, Reliab. Secur. ARES 2016, pp. 382–388, 2016,
https://doi.org/10.1109/ARES.2016.40.
31. A. Jolfaei, K. Kant, and H. Shafei, “Secure data streaming to untrusted road side units in intel-
ligent transportation system,” Proc. – 2019 18th IEEE Int. Conf. Trust. Secur. Priv. Comput.
Commun. IEEE Int. Conf. Big Data Sci. Eng. Trust. 2019, pp. 793–798, 2019, https://doi.
org/10.1109/TrustCom/BigDataSE.2019.00115.
32. A. Atmani, I. Kandrouch, N. Hmina, and H. Chaoui, “Big Data for Internet of Things: A
Survey on IoT Frameworks and Platforms,” in Advanced Intelligent Systems for Sustainable
Development (AI2SD’2019), 2020, pp. 59–67.
33. P. Chauhan and M. Sood, “Big Data: Present and Future,” Computer (Long. Beach. Calif)., vol.
54, no. 4, pp. 59–65, 2021, doi: https://doi.org/10.1109/MC.2021.3057442.
34. K. Blasiak, “Big Data; A Management Revolution,” Helsinki Metrop. Univ. Appl. Sci.
Bachelor Bus. Adm. Int. Bus. Logist. Thesis, p. 50, 2014.
35. S. D. Pandkar and S. D. Paatil, “Big Data and Knowledge Resource Centre,” pp. 90–106, 2020,
https://doi.org/10.4018/978-1-7998-3049-8.ch007.
8 Integration of Big Data and IoT in the Modern Era 149
36. S. Kaushik, “Big Data Issues and Challenges,” pp. 1–21, 2020, https://doi.
org/10.4018/978-1-7998-3049-8.ch001.
37. R. S. Bankar and S. R. Lihitkar, “Landscape of Big Data Research in India,” pp. 178–192,
2020, https://doi.org/10.4018/978-1-7998-3049-8.ch012.
38. R. Anand & P. Chawla, “A review on the optimization techniques for bio-inspired antenna
design,” In 2016 3rd International Conference on Computing for Sustainable Global
Development (INDIACom) (pp. 2228–2233). IEEE, 2016.
39. N. Sindhwani and M.S. Bhamrah, “An optimal scheduling and routing under adaptive
spectrum-matching framework for MIMO systems,” International Journal of Electronics,
104(7), 1238–1253, 2017.
40. N. Sindhwani, “Performance Analysis of Optimal Scheduling Based Firefly algorithm in
MIMO system,” Optimization, 2(12), 19–26, 2017.
41. Gupta, A., Anand, R., Pandey, D., Sindhwani, N., Wairya, S., Pandey, B. K., & Sharma,
M. (2021). Prediction of Breast Cancer Using Extremely Randomized Clustering Forests
(ERCF) Technique: Prediction of Breast Cancer. International Journal of Distributed Systems
and Technologies (IJDST), 12(4), 1–15.
42. M. K. Sahu, “Application Framework of Big Data,” pp. 48–57, 2020, https://doi.
org/10.4018/978-1-7998-3049-8.ch004.
43. Gupta, A., Asad, A., Meena, L., & Anand, R. (2023). IoT and RFID-Based Smart Card System
Integrated with Health Care, Electricity, QR and Banking Sectors. In Artificial Intelligence on
Medical Data (pp. 253-265). Springer, Singapore.
Chapter 9
Internet of Things (IoT) for Sensor-Based
Smart Farming: Challenges
and Opportunities
9.1 Introduction
The global population is increasing rapidly and it is estimated that we will be more
than 9 billion by 2050. So, to feed such a mass, we have to increase productivity by
75% which can only be possible with the introduction of technology in farming [1,
2]. Technology like the Internet of Things (IoT) can do a great deal of work and can
minimize the labor cost by nearly 80%. Internet of Things (IoT) is a modern-day
solution to different problems of the modern world.
The usages of the Internet of Things (IoT) can be imaginable in every sector that
one can think of; from the automation industry to smart agriculture, the Internet of
Things (IoT) can be applicable everywhere. It is a modernized technology con-
cerned with the use of various types of sensors and electronic devices connected via
the Internet [3–7].
Internet of Things (IoT) in farming concentrate is on automating all the possible
aspects of the farming techniques to make the operation more effective and effi-
cient. With the network of sensors, the Internet of Things (IoT) can make anything
possible and help cut down the waste caused by the conventional method of farm-
ing, making the process more productive. Not only that, but it also helps in the better
yield of the crops as the condition of the crops are monitored priorly, and by analyz-
ing the data collected through various sensors and sensing devices, farmers can give
the command to a device that will irrigate the land or spray insecticides/pesticides
on the specific part of the field [8, 9].
Thus, the Internet of Things (IoT) can be the turning point in modern farming
and with the use of this technology, farmers can enhance their standard of living.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 151
N. Sindhwani et al. (eds.), IoT Based Smart Applications,
EAI/Springer Innovations in Communication and Computing,
https://doi.org/10.1007/978-3-031-04524-0_9
152 J. Kaur et al.
9.2 Concept of IoT
The phrase “Internet of Things” (IoT) was coined by a British techie named Kevin
Ashton in 1999 to describe a scenario wherein sensors are connected with real-
world objects via the Internet. Nowadays, the term “Internet of Things" (IoT) is
commonly used to describe systems that have Internet connectivity as well as com-
putational capabilities that include a wide range of gadgets, objects, sensors, and
ordinary things [14–16]. Ashton used the phrase “Internet of Things” to illustrate
the feasibility of linking RFID tags used in commercial supply chains to the Internet
to count and monitor goods without the need for human intervention. The Internet
of Things is currently a frequently used term to describe situations in which Internet
connectivity and processing capability proliferate to a wide range of objects, gad-
gets, sensors, and everyday commodities. When it comes to monitoring and control-
ling things using computers and networks to keep track of and control equipment,
the phrase “Internet of Things” is relatively new.
As an example, during the late 1970s, commercial systems for remotely monitor-
ing electrical grid meters through telephone lines had already been developed.
Enterprise and industrial M2M (machine-to-machine) equipment monitoring and
operation solutions became common in the 1990s, thanks to improvements in wire-
less technology. Many of these early M2M solutions, on the other hand, instead of
IP-based networks and Internet standards, they depend on industry-specific or pro-
prietary standards [17–19].
In the public’s mind, the World Wide Web is practically identical to the Internet.
The majority of interactions between people and material are facilitated by web
9 Internet of Things (IoT) for Sensor-Based Smart Farming: Challenges… 153
Smart farming technologies has embraced the Internet of Things (IoT). In the sys-
tem’s design, there are three levels: the sensor, transport, and application layers.
Each of them has the following functions:
(i) Information collection layer: The fundamental purpose of this layer is to auto-
mate and transfer real-time physical figures of agricultural production into
digital information that can be handled in a virtual environment using various
methods. Sensor-based farming system collects the following types of data:
• Information from the agricultural sensor: pressure, temperature, moisture,
vital signs and dissolved gases, etc.
• Name, feature, price, and model of agricultural goods are some of the attri-
butes that may be gathered.
• Working conditions in agriculture (e.g., equipment and machinery operat-
ing parameters).
• Geographical data about agriculture (e.g., products’ origin).
There is a layer of information collection that is responsible for marking
various types of information, collecting physical information and marked
information from the actual world using sensing techniques, and converting
them to digital data to be processed. Two-dimensional code readers and
labels, cameras, terminals, RFID tags and readers, wired networks, GPS
sensors, and wireless networks are all part of the information collect-
ing layer.
(ii) Network layer: As the name suggests, the primary function of this layer is to
gather and summarize agricultural data collected for processing, the sensor
layer. It is also known as the transport layer which is the central nervous sys-
tem and brain of IoT for agriculture, transferring and processing information.
They comprise Internet and telecommunications networking, intelligent pro-
9 Internet of Things (IoT) for Sensor-Based Smart Farming: Challenges… 155
Some of the sensors and devices used in agriculture and smart farming such as soil
moisture sensors, soil water monitoring sensors, etc. are described as follows.
This very sensor is used to evaluate the moisture content of the soil as shown in
Fig. 9.1. When water is deficient in the soil, the output of the module is high, and
when it is abundant, the module’s output is low. Through the use of this sensor, it is
possible to automatically water a flower or any other type of plant that requires an
automated watering approach. This module offers three output modes: digital out-
put is the simplest, the analog output is more precise, and serial output provides
precise readings and measurements.
The soil water monitoring process is shown in Fig. 9.2. Soil water monitoring may
be done in a variety of methods, each with variable costs and accuracy. Although
producers frequently estimate soil moisture based on feel, look, or the duration
between watering sessions, by utilizing the soil moisture monitoring devices, mois-
ture of soil can be measured more effectively and reliably. The placement and instal-
lation of the monitoring system determine its effectiveness. The sensors should be
representative of the whole field, garden, or landscape. Do not place the sensor on a
hill or in a depression where there may be changes in temperature owing to shadow,
adjacent structures, or nearby structures. We advocate using many sensor locations
for big fields because there is a lot of variabilities. Sensors and samples should be
placed by soil type, plant distribution, and water conditions. Sensors need to be cor-
rectly placed and in excellent touch with the soil to be effective. As soon as the
sensor has been installed, pack the earth around it tightly to prevent undue compac-
tion. Care should be used while installing access tubes or sensors in a crop that is
growing so as not to harm the plants. To get accurate readings, but the sensor behind
a plastic sheet if the crops are being planted on Mulch made of plastic. Plant sensors
in the crop’s root zone (usually between 12 and 18 inches). In the case of row crops,
sensors must be placed 2 to 3 inches apart from the plant rows. They include porous
blocks, heat dissipation, dielectric sensors, tensiometers, and gravimetric. Aside
from the gravimetric technique, the systems will provide an indirect measure of soil
water (calibrate to a soil water term after measuring a property of the soil water). As
a result of the porous blocks, dielectric sensors, and tension sensors, automatic
recording and watering may be set.
9.5.1.2 Characteristics
9.5.1.3 Significance
• Agriculture
• Irrigation for landscaping
9.5.1.4 Functioning
This type of sensor detects the water quantity inside the soil. Multisensor soil mois-
ture probes are used to measure the soil moisture. A capacitance sensor, for exam-
ple, is a popular form of soil moisture sensor in a commercial application. A neutron
moisture gauge is another sensor that uses the neutron moderator characteristics of
water to measure neutron moisture.
To find out how much moisture is in the soil, two electrodes are inserted in the
soil and their capacitance is measured. Moisture content is directly related to the
dielectric constant in soil with a high fraction of free water, for instance, sandy soils.
For the measurement of the dielectric constant, the probe is usually stimulated by a
high-frequency signal. In addition to soil type and temperature, the water content
and readout from the probe do not have a linear connection. Calibration is therefore
necessary, although its long-term stability is in doubt.
9.5.2 Rain Sensor
Rain detection is made simple using the rain sensor module as shown in Fig. 9.3. It
may be used as a switch and for monitoring rainfall intensity as raindrops fall
through the rainy board. The module has a separate rain board and control board for
convenience, as well as a power indicator LED and a potentiometer for adjusting
sensitivity.
Rainfall droplets are detected using the analog output. When the LED is con-
nected to a 5V power supply and the induction board does not have a raindrop and
the DO output is high, the LED will illuminate. The switch indication turns on when
a little amount of water is dropped and the DO output is low. When the water drop-
lets are brushed away, the output level returns to its original condition.
9 Internet of Things (IoT) for Sensor-Based Smart Farming: Challenges… 159
9.6.1 SQL Server
9.6.2 About SQL
A relational database uses SQL to store, manipulate, and retrieve information. SQL
is the standard programming language for relational database systems. There are
several RDMS (relational database management systems) such as MS Access,
Oracle, Postgres, Sybase, MySQL, Informix, and SQL Server that employ SQL as
their basic database language. There are also a variety of dialects that they use,
including:
• T-SQL with MS SQL Server.
• PL/SQL with Oracle.
• JET SQL is the MS Access SQL version and so forth.
160 J. Kaur et al.
9.6.3 Significance of SQL
9.6.4 SQL Methodology
When you run a SQL command on any RDBMS, to execute your order, the system
chooses the optimal method, and the SQL engine determines how to decipher the
job. This procedure includes several different elements. They are as follows:
• Dispatcher of queries
• Engines for optimization
• Query engine (classic)
• Query engine for SQL
As for non-SQL queries, a query engine that supports SQL will take care of
them, but not logical files.
9.6.5 SQL Commands
Some typical SQL commands for working with relational databases are CREATE,
INSERT, DELETE, DROP, SELECT, and UPDATE. Based on their nature, these
instructions can be categorized into the following ways: Some DML (data manipu-
lation language) commands, DDL (data definition language) commands, and DCL
(data control language) commands are shown in Tables 9.1, 9.2, and 9.3, respectively.
9 Internet of Things (IoT) for Sensor-Based Smart Farming: Challenges… 161
Command Elucidation
SELECT Obtain specific records from one or several
tables
INSERT Creates a record
DELETE Deletes records
UPDATE Modifies records
Command Elucidation
GRANT Allows the user to have a special ability
REVOKE User credentials are revoked
Climate change, weather, soil conditions, waste reduction, and green housing are a
few of the difficulties that may be solved with smart agricultural techniques. Things
like sensors, self-driving automobiles, control systems, and robots comprise the
Internet of Things. Listed here are the many stages of agricultural forecasting from
farm to fork [18].
(a) Monitoring climate conditions, soil, and plants
A dramatic shift in the environment and natural catastrophes have a signifi-
cant impact on plant growth and agricultural productivity in the United States.
It is also possible for numerous sensors to collect and store information on a
wide range of environmental variables, which may then be transmitted to the
Internet of Things.
Using sensors, soil and nutrient data are gathered and stored in integrated
databases. Fertilizer levels will be established and administered based on the
soil profile. Agriculturists must install mobile apps on their phones and register
with the cloud using a mobile app, called MobileApp. Climate, soil conditions,
irrigation levels, and plant development and damage are all stored in the cloud.
162 J. Kaur et al.
1.15 acres of land on each farm. Only 5% of farmers work on property larger than
4 ha, according to the USDA. Initial beneficiaries include farmers who were able to
pool their fields into larger plots of land, increasing their farm size to at least
100–200 acres. Comparatively, just 5% of farmers own landholdings that are greater
than 4 acres.
Large agribusinesses are often the ones who make use of smart technology rather
than farmers. There are several of these techniques that are utilized by farm-loan
businesses as a means of risk management. Aside from that, conventional tactics are
not enough to tackle the problems. Easy-to-deploy and cost-effective solutions are
needed for tiny embedded devices’ security concerns.
9.9 Conclusion
Farmers are now able to distribute crops straight to customers, not just in a narrow
area like retailers, but also in a much larger area thanks to the Internet of Things. As
a result of this, the whole supply chain, which is currently dominated by huge cor-
porations, may become a more direct and shorter connection between producers and
customers. When it comes to agriculture, cloud computing enables businesses to
offer low-cost solutions to farmers.
Agribusinesses and farmers benefit from IoT technology since it integrates all
devices to a digital level in a wide range of directions [23]. In the future, smart farm-
ing and global food production will be aided by Internet technology, social net-
works, integrated databases, and on-demand information availability. To enhance
the quality and quantity of agricultural produce, smart farming uses sensor tech-
nologies [24] to help farmers become more intelligent and connected. As a result,
new IoT applications will be developed to address these challenges and assist
improve the quality, quantity, sustainability, and cost-effectiveness of agricultural
output. Using the Internet of Things, farmers can monitor soil conditions, moisture
levels, animal feed density, and pest control levels, among other things. Developing
and implementing new models will be a major emphasis in the near future [25].
References
1. R. K. Saini and C. Prakash, “Internet of Things (IoT) for Agriculture Growth using Wireless
Sensor Networks,” Glob. J. Comput. Sci. Technol., vol. 20, no. 2, 2020.
2. R. Gorli and Y. G., “Future of Smart Farming with Internet of Things,” J. Inf. Technol. Its
Appl., vol. 2, no. 1, pp. 27–38, 2018.
3. Srivastava, A., Gupta, A., & Anand, R. (2021). Optimized smart system for transportation
using RFID technology. Mathematics in Engineering, Science and Aerospace (MESA), 12(4),
953–965.
4. Gupta, A., Srivastava, A., & Anand, R. (2019). Cost-effective smart home automation using
internet of things. Journal of Communication Engineering & Systems. 9(2), 1–6.
164 J. Kaur et al.
5. Sindhwani, N., Maurya, V. P., Patel, A., Yadav, R. K., Krishna, S., & Anand, R. (2022).
Implementation of Intelligent Plantation System Using Virtual IoT. In Internet of Things and
Its Applications (pp. 305–322). Springer, Cham.
6. Bakshi, G., Shukla, R., Yadav, V., Dahiya, A., Anand, R., Sindhwani, N., & Singh, H. (2021).
An Optimized Approach for Feature Extraction in Multi-Relational Statistical Learning.
Journal of Scientific and Industrial Research (JSIR), 80(6), 537–542.
7. Gupta, B., Chaudhary, A., Sindhwani, N., & Rana, A. (2021, September). Smart Shoe for
Detection of Electrocution Using Internet of Things (IoT). In 2021 9th International
Conference on Reliability, Infocom Technologies and Optimization (Trends and Future
Directions)(ICRITO) (pp. 1–3). IEEE.
8. A. Thorat, S. Kumari, and N. D. Valakunde, “An IoT-based smart solution for leaf disease
detection,” 2017 Int. Conf. Big Data, IoT Data Sci. BID 2017, vol. 2018-January, pp. 193–
198, 2018.
9. S. R. Prathibha, A. Hongal, and M. P. Jyothi, “IOT Based Monitoring System in Smart
Agriculture,” Proc. – 2017 Int. Conf. Recent Adv. Electron. Commun. Technol. ICRAECT
2017, pp. 81–84, 2017.
10. P. Sonwane and P. Ghutke, “Real-Time Implementation of an Automated Irrigation System for
Effective Water Application to Improve Productivities of the Crop in India,” J. Inst. Eng. Ser.
A, vol. 101, no. 3, pp. 485–493, 2020.
11. J. Huuskonen and T. Oksanen, “Soil sampling with drones and augmented reality in precision
agriculture,” Comput. Electron. Agric., vol. 154, no. June, pp. 25–35, 2018.
12. U. Guin, A. Singh, M. Alam, J. Canedo, and A. Skjellum, “A secure low-cost edge device
authentication scheme for the internet of things,” Proc. IEEE Int. Conf. VLSI Des., vol. 2018-
Janua, pp. 85–90, 2018.
13. B. N. Silva, M. Khan, and K. Han, “Internet of Things: A Comprehensive Review of
Enabling Technologies, Architecture, and Challenges,” IETE Tech. Rev. (Institution Electron.
Telecommun. Eng. India), vol. 35, no. 2, pp. 205–220, 2018.
14. H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the internet of things: A review,” Proc. – 2012
Int. Conf. Comput. Sci. Electron. Eng. ICCSEE 2012, vol. 3, pp. 648–651, 2012.
15. R. Khan, S. U. Khan, R. Zaheer, and S. Khan, “Future internet: The internet of things archi-
tecture, possible applications and key challenges,” Proc. – 10th Int. Conf. Front. Inf. Technol.
FIT 2012, pp. 257–260, 2012.
16. T. Xu, J. B. Wendt, and M. Potkonjak, “Security of IoT systems: Design challenges and oppor-
tunities,” IEEE/ACM Int. Conf. Comput. Des. Dig. Tech. Pap. ICCAD, vol. 2015-Janua, no.
January, pp. 417–423, 2015.
17. R. T. Tiburski, L. A. Amaral, E. De Matos, and F. Hessel, “The importance of a standard
securit y archit ecture for SOA-based iot middleware,” IEEE Commun. Mag., vol. 53, no. 12,
pp. 20–26, 2015.
18. V. Kumar and R. K. Chawda, “a Research Paper on Smart Home,” Int. J. Eng. Appl. Sci.
Technol., vol. 5, no. 3, pp. 530–532, 2020.
19. Z. Shouran, A. Ashari, and T. Kuntoro, “Internet of Things (IoT) of Smart Home: Privacy and
Security,” Int. J. Comput. Appl., vol. 182, no. 39, pp. 3–8, 2019.
20. S. R. Oh and Y. G. Kim, “Security Requirements Analysis for the IoT,” 2017 Int. Conf. Platf.
Technol. Serv. PlatCon 2017 – Proc., 2017.
21. Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the Internet of Things: perspec-
tives and challenges,” Wirel. Networks, vol. 20, no. 8, pp. 2481–2501, 2014.
22. J. Doshi, T. Patel, and S. K. Bharti, “Smart Fanning using IoT, a solution for optimally moni-
toring fanning conditions,” Procedia Comput. Sci., vol. 160, pp. 746–751, 2019.
23. Shukla, R., Dubey, G., Malik, P., Sindhwani, N., Anand, R., Dahiya, A., & Yadav, V. (2021).
Detecting crop health using machine learning techniques in smart agriculture system. Journal
of Scientific and Industrial Research (JSIR), 80(08), 699–706.
24. Jain, N., Chaudhary, A., Sindhwani, N., & Rana, A. (2021, September). Applications of
Wearable devices in IoT. In 2021 9th International Conference on Reliability, Infocom
Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 1–4). IEEE.
25. Gupta, A., Asad, A., Meena, L., & Anand, R. (2023). IoT and RFID-Based Smart Card System
Integrated with Health Care, Electricity, QR and Banking Sectors. In Artificial Intelligence on
Medical Data (pp. 253-265). Springer, Singapore.
Chapter 10
Implementation of IoT in Various Domains
10.1 Introduction
The term Internet of Things (IoT) is coined by Kevin Ashton in 1999 [1, 2]. The
concept of IoT is presented as an idea to link radiofrequency identification (RFID)
tags to the Internet [3–8]. The h-IoT is also known as the health IoT, which is a
milestone of information systems development. It plays a major role in enlightening
people’s health levels and increasing the worth of life. It is a complex system that
involves various systems like microelectronics systems, health and medical, com-
puter field, and other engineering fields. According to the overall connection of the
health-care system, the period from 2017 to 2021 is the growth phase of IoT in the
medical sector. The h-IoT application and devices accelerate and shareholders also
accelerate their efforts [9]. There is no doubt that IoT is transforming the medical
sector and redefining apps, applications, and devices related to these people involved
also. Thus, it’s continuously provides gadgets to the medical sector for good take
care of the patient. The use of computer’s in the future is dominating human work
and enhancing the capabilities of computer skills and coding such as the electronics
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 165
N. Sindhwani et al. (eds.), IoT Based Smart Applications,
EAI/Springer Innovations in Communication and Computing,
https://doi.org/10.1007/978-3-031-04524-0_10
166 J. Kaur et al.
devices being remote and Internet of Things and machines work automatically. This
allows users to manage their electronic equipment on the Internet. Alexa is working
with the use of the internet and is also an example of artificial intelligence and the
Internet of Things. The Alexa bulb is also connected through Bluetooth and per-
forms on human voice or command. This will also increase the use of the Internet
and provide materials and services. The main challenge of IoT is to reduce the gap
between the physical world and the world of news, such as how to process data
obtained from electronic equipment and the interface between the user and the
appliance. There are six layers of IoT and these are a coding layer, a perception
layer, an application layer, a network layer, a business layer, and a middleware layer,
these layers are used in a smart house.
The common IOT layer is divided into three layers: network layer, application
layer, and perception layer [10]. The components are grouped in the three layers of
the genetic IoT system as shown in Fig. 10.1.
10.1.1 Fog Computing
and act as fog computing. Fog computing is used to improve efficiency and reduce
the amount of data transported to the cloud for processing, and it is also used for
security purposes.
Fog computing is comfortable in the case of IoT and industrial 4.0; in the case of
the health-care sector, they use fog computing because it is easy and it is also threat-
proof [12]. Fog computing is used for time saver and speed to process data. It is
better than others like cloud computing. Fog computing is equal performer with
edge computing like its go to the edge of the network’s edge.
10.1.2 Linked Vehicles
Self-driven cars are now available in the market, producing a significant amount of
data. The information has to be easily interpreted and processed based on the infor-
mation presented such as traffic and information about weather conditions [13]. All
this information is easily processed because of fog computing. Suppose suddenly
the weather changes and rain starts pouring, then the car automatically starts its
wipers, lights turn on, and goes on safety mode, so that the passenger will not lose
his/her patience and remain calm.
Figure 10.2 shows the architecture related to IoT in health care (referred to as
h-IoT) that will be discussed later in this chapter.
The rest of the chapter is organized as the implementation of IoT in various sec-
tors such as manufacturing, automobiles, etc. which is discussed in Sect. 10.2. The
five-layer architecture of IoT is discussed in Sect. 10.3. In Sect. 10.4, directly imple-
mentable IoT applications in the health-care industry are presented. The IoT imple-
mentation in health care is discussed in Sect. 10.5. In Sect. 10.6, some challenges of
the Internet of Things are discussed. In Sect. 10.7, the future scope of IoT advance-
ments in health care is given. The advantages of IoT in health care are discussed in
Sect. 10.8. Shortcomings of IoT in health care are defined in Sect. 10.9, and finally,
conclusions are drawn.
10.2 Architecture of IoT
A common three-layer IoT architecture consists of the network, the perception, and
the application layer. The first layer known as the perception layer is the lower most
layer in the IoT architecture where the actuators, sensors, and other connected
devices are present where they collect the information that is very necessary for the
network [14, 15]. The network layer connects the devices in the network to other
devices to handle the transmission of information. The third layer, the application
layer, provides specific services to the user by providing data analytics, data reports,
168 J. Kaur et al.
and control over the devices [16]. The three-layered architecture is then upgraded to
five layers with the addition of two more layers, namely, the business layer and the
processing layer. A five-layer IoT architecture comprises the perception layer, the
network layer, the processing layer, the application layer, and the business layer [16].
10.2.1 Application Layer
The application layer is the topmost layer of the five-layered IoT architecture. The
application layer provides the global management of the applications. A few exam-
ples of applications implemented through IoT can be listed as smart home, smart
farming, smart health, smart city, intelligent transportation [17], etc. The functions
of this layer range from designing applications for all types of businesses to per-
forming some smart calculations.
10 Implementation of IoT in Various Domains 169
10.2.2 Network Layer
10.2.3 Perception Layer
The perception layer which is also known as the third layer is the lowermost layer
and most prone to various kinds of attacks. This layer includes various physical
objects and sensor devices like an RFID, 2D barcode, infrared sensors, etc. This
layer’s basic functionality is to recognize what object it is and to help with the iden-
tification. The collected information is then passed to the network layer for its
secure transmission to the information processing system [20, 21].
10.2.4 Processing Layer
Then comes the middleware layer wherein the devices over the IoT implement dif-
ferent types of services. Each device connects and communicates with only those
other devices which implement the same service type. This layer is responsible for
service management and has a link to the database. It receives the information from
the network layer and stores it in the database. It performs information processing
and ubiquitous computation and takes automatic decisions based on the results [22].
10.2.5 Business Layer
The business layer is responsible for the management of the overall IoT system
including the applications and services. It builds business models, graphs, flow-
charts, etc. based on the data received from the application layer. The real success
of IoT technology also depends on good business models. Based on the analysis of
results, this layer will help to determine future actions and business strategies [23].
The five-level architecture of IoT is shown in Fig. 10.3.
170 J. Kaur et al.
Smart Home Fog computing used in smart homes and smart cities. Because fog
computing is good in safety and security, it is used in the smart house and smart
cities. In smart houses always use real-time data from the efficiency of the system.
In smart home IoT devices and all devices connected to the network, for example,
Alexa, Siri, Google, etc., are used as a smart home device, all the time live real-time
monitoring and autonomous vacuum cleaner, and Internet devices are also included
10 Implementation of IoT in Various Domains 171
in the smart home device [24]. IoT-based automatic watering system for plants is
used for plants through mobile phones; in this, we control the water level and mois-
ture of the soil. With the help of IoT, we monitor our house through cameras and
wireless all-time monitoring robots, and we also record our favorite shows and
movies in a set of boxes and also we connect the phone with TV or smart
LED. Nowadays, home security is the most and first thing in the home; smart door
locks and cameras and security robots are monitoring the home 24/7 [24]. We easily
monitor the house and all the things seating everywhere because of IoT.
Smart Cities Security crosses the limit day by day especially in smart cities, for
example, if anyone is missing or the police want to check the location of the thief so
they use IoT; with the help of IoT, they can easily track the location in just seconds
and with the help of the Internet of Things, we also are able to manage traffic, elec-
tricity, waste, and wastewater. Nowadays, traffic lights are also controlled by IoT
and the Internet, and infrastructure is also made according to all edges and in a good
manner. Currently, now we proudly say that we are going towards all automatic
nation like cooking automatic and road making automatic and house and building
also made automatic.
Self-Driven Cars We will see a lot about the self-driven car. Previous day’s news
coming in newspaper that Tesla tested a self-driven car and also heard that now
Uber also come with self-driven mode [25], it is a benefit for girls who are feared to
travel in night time in Uber, because they feared the Uber driver because in case the
Uber driver does not do any silly things with her, so parents also do not allow her to
travel in the night time, so it is a benefit for girls and it also benefits for those in
pandemic time, people do not use Uber or any cab because COVID-19 spread
through touching and in air, so in case anyone takes uber to go somewhere and he is
suffering from COVID-19 and after that another passenger came and sit in Uber he/
she also effected from COVID-19, so self-driven cars are beneficial for us, it is safe
because in this many sensors are present in car and cameras also present in it, so u
just put your location and go.
Farming Farming is a working sector that is most beneficial with IoT; in the future,
they promise that they will develop farming tools [26, 27]. Nowadays, farmers are
using IoT in farms; they use sensors to check the soil moisture and also plant drip
system there. If in the old times, farmers use scarecrow, nowadays they use drones
for surveillance, protecting yield of animals and fire and also implant automatic
compost given to plants or yield if required. Before, in one season farmers fired the
field because they want to clear the field; nowadays they do not do that because of
global warming; so with the help of IoT, they now use thin tube fire system, in
which they fire in limits and the task is also completed. With the help of automatic
robots, farming is easy and less time-consuming, because they now know how to
give water to yield and how to plant all setups, and from time to time robots check
172 J. Kaur et al.
the soil value and also for fertilizers and compost. When the yield is ready for cut-
ting, robots easily and safely cut the yield and place unused substances in an empty
side, and the yield is collected in a container and is ready to sell in the selling
station.
1. Security issue: In the twenty-first century, IoT devices are now popular, and it is
also a headache work to do, twenty-first century cybercriminals group people’s
families increasing day by day and those who want to hack or break home secu-
rity or bank security hire cybercriminals or cyberhackers [29].
IoT devices cannot easily be hacked but cyberhackers find the loophole and
break the security of IoT devices; governments apply strickness on cyberhackers but
they still work in the down of their nose.
In 2017, a case registered against the cyberhacker’s like parents said they apply
home security and for his child, they apply all the security and they also apply 24/7
monitoring robots so hacker breaks the monitoring robot’s security and talk to the
child every day when parents realize this they fill case against him and the security
company. It is not easy to break the security of IoT devices but still, they want to
work upon those areas [29].
2. Compatibility: Nowadays, home networks and Bluetooth devices are not easily
connected because of user increase or their bandwidth size is small and that is
why we face this issue. Maybe the IoT device is not up to date from the user side,
so it is also an error to connect the device. Or sometimes the user’s phone is also
not up to date and that also creates a problem to use or connect the device. It is
compulsory to update their device and update their phones or laptops or any
devices to use better.
3. Limited bandwidth: Connectivity is a bigger challenge for the Internet of Things
as you expect because there is an increased user from one device or one network
and that is why they cannot use the Internet in a better manner or they suffer from
buffering [30]. People face this buffering problem, and people cannot even
download or see a video on YouTube or any website because of this buffering.
One source is divided into many parts so that’s why internet speed is low, or we
can say his bandwidth is limited.
4. Expectation: With such strong competition in the market, companies all the time
promise that they will be giving better products but it is difficult for people to
compare two or more devices because each brand want to make or give a new
and better product in the market. Take for example Oppo smartphone; they use
or make a cheap product, and people know how they make cheap products, so
90% of people avoid Oppo. Now I compare it with Apple. Apple launches one
mobile phone per year, and they easily crack their expectation limit and people
also love to use Apple because it is a bigger brand than Oppo. And people drop
their expectation from Oppo and they were dissatisfied from IoT devices.
5. Business: The bottomline is a motivation for starting, investing, and operating
any business with a sound and solid business model for IoT [31]. This model
must satisfy all the requirements like e-commerce, vertical market, horizontal
market, and consumer market. These category also follow’s the victim of
regulatory.
174 J. Kaur et al.
10.5 Advantages of IoT
1. Saves time: As reducing human effort, it saves out time. IoT devices are working
properly and they reduce human effort and time. IoT devices compile code speed
and is very good and it works very fast as compared to others. One way to lever-
age the power of IoT to increase company efficiency is to use it to cut down on
repetitive or time-consuming tasks.
2. Security: Now we have a device interconnected to each other to improve security
and efficiency [32]. In IoT all devices are connected, for example, Alexa; in
Alexa all the devices like fans, bulbs, led, and phones are connected and they
improve their efficiency and stability.
3. Minimizes human effort: The devices of IoT communicate and talk to each other
and they work properly together, reducing human effort.
10.6 Disadvantages of IoT
1. Privacy/security: Hackers easily get excess to the personal information and also
accounts information, so it is a disadvantage for IoT devices; hackers easily
break home security. Nowadays, home security is on trend and hackers find the
loophole and easily get excess to personal information [33].
2. Connectivity: Bandwidth of the network is very low and also Bluetooth devices
connectivity problems arrive, and it is because they are not up to date or the
phone or laptop is not updated; that is why it is difficult to connect with IoT
devices in checking for updates [33].
3. Expensive to implement: Using Li-FI at home is very costly for normal people,
and fully automatic and AI devices are very expensive to implement at home, for
example, Jarvis.
10.7 H-IoT
H-iot refers to a device that collects health related data from an individual. The
explosive growth in H-IoT to augment the delivery of healthcare is driving changes
in clinical practice and patient-centered care, requiring new skills for providers [34].
IoT devices are tagged/connected with sensors for tracking medical equipment
like medicines, wheelchairs, cloths, oxygen pumps, and others connected equip-
ment. For example, in a URI movie, the nurse (played by actress Pallavi) attaches
the GPS sensor on the old lady so in case if she goes outside and forgets the home
then the nurse immediately tracks her and finds her and takes her home easily. We
implement this thing in our daily lives especially in elderly people for their safety
and for other reasons too. People these days prefer to take benefit of IoT and
10 Implementation of IoT in Various Domains 175
h-IoT. H-IoT provides us with very good service and comfort. Now it ties up with
machine learning and artificial intelligence and shows a world in another level. In
hospitals, it is used on ventilators and other machines like oxygen cylinder and
temperature measure and heartbeat sensor, and for those who cannot walk, they can
use an automatic wheelchair. With this, they can stand up and sit down, walk, and
take the wheelchair on the roads because the wheelchair is fully loaded with sensors
and cameras. Today, the technology completely changes how we see inside the
human body through small cameras inserted inside the capsule which is taken by
patients. So we get to see what is inside the human body including small and big
intestines and how food processing looks like and even the damage inside the stom-
ach if there is. With the help of h-IoT, operations are done easily such as heart opera-
tion, heart transplant, and brain surgery. We also get to see damages in the veins and
liver. Now we can also monitor glucose and even monitor depression and mental
health [35].
Importantly, h-Iot helps us when someone loses his hand or leg or any body part
wherein it can provide us with a bionic hand, bionic leg, bionic shoulder, etc. bionic
hand project I put reference on reference page go and check this out. Nerve cells are
connected to the brain, and when the brain gives signal to the hand, bionics take the
signals and convert signals to mechanical signals and bionics work [36].
Industrial 4.0 refers to a new phase of industrial revolution that focuses heavily on
interconnectivity, automation, h-IOT, machine learning, and real-time data monitor-
ing [37]. The revolution from industrial 1.0 to 4.0. is revolution in company they
upgrade their machines or equipment and improve and distribute their products.
Manufactures are enabling technologies such as the Internet of Things, machine
learning, artificial intelligence, cloud computing, fog computing, edge computing,
and analytics [38].
Now here the question arises: Are we in industrial 4.0 right now?
Today, we are in the midst of industrial 4.0 [39]. This is being driven by the
global spread of the Internet. New technologies are rising such as wireless phone
chargers, sensors and artificial intelligence, and machine learning. Industrial 4.0
will radically transform the way we live and work [39].
10.9 Conclusion
IoT is a system in which sensors collect the data and share it with a secure network.
The process data is check through the various processor, in a case in somehow any
impurity or any various occur then immediately alarm start and indicate the issue on
display. These devices come under industry or medicine 4.0. The new automated
176 J. Kaur et al.
devices come into the market like real-time monitoring and diagnosis powered by
IoT or h-IoT [40]. This process is reviewed by various new technologies powered
by h-IoT. Many architectures are using different computer applications powered by
h-IoT. These architectures are driven by machine learning, artificial intelligence,
edge computing, fog computing, cloud computing, and new technologies like block-
chain. Machine learning work in the multiple-use case of h-IOT and maintaining the
network and help them to achieve optimal network [41].
References
1. Yadav, E. P., Mittal, E. A., & Yadav, H. (2018). IoT: Challenges and Issues in Indian Perspective.
Proceedings – 2018 3rd International Conference On Internet of Things: Smart Innovation
and Usages, IoT-SIU 2018. https://doi.org/10.1109/IoT-SIU.2018.8519869
2. Saheb, T., & Izadi, L. (2019). Paradigm of IoT big data analytics in the healthcare industry:
A review of scientific literature and mapping of research trends. Telematics and Informatics,
41(February), 70–85. https://doi.org/10.1016/j.tele.2019.03.005
3. Srivastava, A., Gupta, A., & Anand, R. (2021). Optimized smart system for transportation
using RFID technology. Mathematics in Engineering, Science and Aerospace (MESA), 12(4),
953–965.
4. Sindhwani, N., Maurya, V. P., Patel, A., Yadav, R. K., Krishna, S., & Anand, R. (2022).
Implementation of Intelligent Plantation System Using Virtual IoT. In Internet of Things and
Its Applications (pp. 305–322). Springer, Cham.
5. Bakshi, G., Shukla, R., Yadav, V., Dahiya, A., Anand, R., Sindhwani, N., & Singh, H. (2021).
An Optimized Approach for Feature Extraction in Multi-Relational Statistical Learning.
Journal of Scientific and Industrial Research (JSIR), 80(6), 537–542.
6. Anand, R., Sindhwani, N., & Saini, A. (2021). Emerging Technologies for COVID-19.
Enabling Healthcare 4.0 for Pandemics: A Roadmap Using AI, Machine Learning, IoT and
Cognitive Technologies, 163–188.
7. Jain, N., Chaudhary, A., Sindhwani, N., & Rana, A. (2021, September). Applications of
Wearable devices in IoT. In 2021 9th International Conference on Reliability, Infocom
Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 1–4). IEEE.
8. Gupta, A., Srivastava, A., & Anand, R. (2019). Cost-effective smart home automation using
internet of things. Journal of Communication Engineering & Systems. 9(2), 1–6.
9. Qadri, Y. A., Nauman, A., Zikria, Y. Bin, Vasilakos, A. V., & Kim, S. W. (2020). The Future
of H-IOT Internet of Things: A Survey of Emerging Technologies. IEEE Communications
Surveys and Tutorials, 22(2), 1121–1167. https://doi.org/10.1109/COMST.2020.2973314
10. Mathew, P. S., Pillai, A. S., & Palade, V. (2018). Applications of iot in healthcare. Lecture
Notes on Data Engineering and Communications Technologies, 14, 263–288. https://doi.
org/10.1007/978-3-319-70688-7_11
11. Banerjee, U., Juvekar, C., Fuller, S. H., & Chandrakasan, A. P. (2017). EeDTLS: Energy-
efficient datagram transport layer security for the internet of things. 2017 IEEE Global
Communications Conference, GLOBECOM 2017 – Proceedings, 2018-January, 1–6. https://
doi.org/10.1109/GLOCOM.2017.8255053
12. Dhanvijay, M. M., & Patil, S. C. (2019). Internet of Things: A survey of enabling tech-
nologies in healthcare and its applications. Computer Networks, 153, 113–131. https://doi.
org/10.1016/j.comnet.2019.03.006
13. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015).
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications.
10 Implementation of IoT in Various Domains 177
35. A. H. Hussein, “Internet of Things (IOT): Research Challenges and Future Applications,” vol.
10, no. 6, pp. 77–82, 2019.
36. Disability Horizons,” A complete guide to bionic arms and hands” 21-01-2021 [Online]
Available: https://disabilityhorizons.com/2021/01/bionic-technology-amputees-disabilities/
[Accessed March 09 2021]
37. Emily Waltz “Bionic Hands Let Amputees feel and grip”, 22-02-2019[Online] – Available:
https://spectrum.ieee.org/the-human-os/biomedical/bionics/bionic-hands-let-amputees-feel-
and-grip [Accessed March 09, 2021]
38. Rhys Clement and group “Bionic prosthetic hands: A review of present technology and future
aspirations” December 2011 [Online] Available – https://www.researchgate.net/publica-
tion/51759015_Bionic_prosthetic_hands_A review_of_present_technology_and_future_aspi-
rations [Accessed March 10, 2021]
39. Qadri, Y. A., Nauman, A., Zikria, Y. Bin, Vasilakos, A. V., & Kim, S. W. (2020). The Future
of Healthcare Internet of Things: A Survey of Emerging Technologies. IEEE Communications
Surveys and Tutorials, 22(2), 1121–1167.
40. Gupta, B., Chaudhary, A., Sindhwani, N., & Rana, A. (2021, September). Smart Shoe for
Detection of Electrocution Using Internet of Things (IoT). In 2021 9th International
Conference on Reliability, Infocom Technologies and Optimization (Trends and Future
Directions)(ICRITO) (pp. 1–3). IEEE.
41. Gupta, A., Asad, A., Meena, L., & Anand, R. (2023). IoT and RFID-Based Smart Card System
Integrated with Health Care, Electricity, QR and Banking Sectors. In Artificial Intelligence on
Medical Data (pp. 253-265). Springer, Singapore.
Chapter 11
Application of IoT in Wearable Technology
11.1 Introduction
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 179
N. Sindhwani et al. (eds.), IoT Based Smart Applications,
EAI/Springer Innovations in Communication and Computing,
https://doi.org/10.1007/978-3-031-04524-0_11
180 S. Dhoot et al.
Smart Finger
Smart Shirt
With heart & respiration
sensors incide
Smart
Bracelet
Rectangular Snip
Smart Watch
SGPS/GPRS
Baby Control
Bluetooth
Key Tracker
Smart Belt
Wearable gadgets are not standalone gadgets and will need to be paired with
other gadgets like smartphones to accomplish most functions, which is a basic test
in taking on a reasonable approach to deal with a safe confirmation in wearable.
This intricacy of correspondence makes security weaknesses like man-in-the-center
assault. Envision a client who utilizes his smartwatch to control his keen home. The
requirement for a correspondence between the smartwatch and the application
which is put away inside the cell phone is inclined to data spillage prompting other
security assaults through the craft of control of information. The lack of a console is
also a problem, as even a touchscreen can occasionally fail to provide a confirma-
tion method.
The work presents the expectation to present a brief review of security and insur-
ance attacks occurring in the advancement of wearable devices to understand the
security and safety gap that exists in wearable device development and present an
assessment of security on various wearable development gear. A safety assessment
is performed by evaluating three benchmark wearable devices such as Google
Glass, Fitbit, and Smartwatch. The motivation driving IoT in wearables is the term
11 Application of IoT in Wearable Technology 181
11.2.1 Smartwatch
The smartwatch is a small smartphone-like gadget that is worn on the wrist. Many
smartwatches are paired with a mobile phone that notifies the customer of incoming
calls, emails, and app alerts. Some smartwatches can even make decisions about the
phone. Many smartwatches have a discreet display, but some popular models use a
high-contrast electronic paper display [6]. The customer can operate the smartwatch
via a touchscreen, actual stops, or a mixture of the two. Some smartwatches accom-
pany pedometers and wrist displays to help customers monitor their well-being.
Figure 11.2 shows a smartwatch [7].
One of the most punctual genuine smartwatches was the Microsoft SPOT (Smart
Personal Object Technology) presented in 2004. The SPOT got data like climate,
news, and stock updates through FM radio. It additionally got email and texts, yet
clients could not answer. With the ascent of the cell phone, smartwatches, for exam-
ple, the Sony Ericsson Live View (2010), the Pebble (2013), and the Apple Watch
(2015), arose that got information from a telephone. In 2014 Google created Android
Wear—a form of its versatile working framework, Android—explicitly for wear-
able gadgets like smartwatches [6].
11.2.2 Google Glasses
Google Glass or just called Glass can say as the essential wearable contraption that
dispatches the advancement of WT. Glass is an eyewear contraption that has a fun-
damental PC at the edge of two or three glasses [3]. It gives different innovative
arrangements that make people’s life more fun. In any case, numerous causes of
stress have been raised as sources for specific issues that could undermine the wear-
er’s security and insurance. Figure 11.3 shows a Google Glass [2].
There are relatively few assessment disclosures that point out some shortcom-
ings in terms of well-being and insurance points on Google Glass. For example,
Glass does not have a secured adequate PIN structure or approval set up right now
[8, 9]. Other than approval issues, Geran et al. [9] found that the security of cus-
tomer’ appears in peril additionally by the eye following the advancement main-
tained in Glass. All the more fundamentally, there are a couple of certifiable cases
concerning shortcomings related to Glass that were represented at the hour of
Google release. Post Mobile [10] found a genuine security imperfection in how
Glass disentangles QR (quick response) codes when it snaps a photo back in May
of the year before. Utilizing a malevolent QR code, they observed that Glass could
be connected up to a hazardous Wi-Fi organization, permitting somebody to
remotely get root admittance to a Glass gadget and accept accountability for it with-
out the wearer’s information. Luckily, Google was made aware of the shortcoming
and a cure was shipped off to resolve the issue without really wasting any time.
11.2.3 Fitbit
A wellness band that might be worn on the wrist is essential for Fitbit’s item range.
It estimates human mobility, for example, by counting the number of steps people
walk, the quality of rest, and other measures of individual well-being such as heart
rate and internal heat level. Be that as it may, one of the critical security shortcom-
ings found in Fitbit is nonattendance of affirmation. Some researchers [11–14]
introduced that Fitbit is the absence of confirmation potential and, on the tracker’s
side aggressor, can undoubtedly get the information from without the information
on clients. For example, Mahmudur et al. [12] fabricated an instrument, Fit Bite, to
trigger assaults on Fitbit gadgets, for example, information infusion assault, DoS,
and battery channel hacks to exhibit the verbalization. The results showed that the
container without Powerless Fitbit could allow malicious rebate programmers in
Fitbit client recordings and arrive or even check their information to acquire finan-
cial bonuses. Because BTLE (Bluetooth Low Energy) innovation is harmed, Fitbit
Flex is unable to expand. Since the security address [13] or MAC address [14] did
not change, this might be effortlessly followed smitten by the Fitbit Bluetooth com-
mercial. In outcomes, it might prompt protection break as outsiders will follow
exercises for express clients. Insurance agencies may likewise exploit to create a
“dark market” for obtaining clients’ well-being information. Nevertheless, Fitbit
gadgets might compromise clients’ security hazards. For instance, it permits vindic-
tive people to follow a client’s space or spots visited to make phishing assaults,
causing faux emails that give agreements with the connection, parenthetically that
connected to spyware or infection [13]. Figure 11.4 shows a Fitbit device [2].
The differences between a fitness band and a sensible watch are shown in
Table 11.1.
To arrange the employments of wearable IoT first, the best-in-class research works,
papers, to be published in this space were gathered. The associated works are
requested in bunches as demonstrated by their question and each survey document
is placed in one of the lots, as shown in Fig. 11.5 [3]. Certain groupings have a more
extensive scope of utilizations because of their significance. Other than the
184 S. Dhoot et al.
Table 11.1 Variations between a fitness band and a sensible watch [7]
Comparison
parameters Smartwatch Fitness band
Definition It combines the functions of a telephone, a This gadget measures
watch, and a fitness tracker in a single device fitness-related measurements
and other information
Objective Tracks fitness and sends alerts and updates Only able to record
fitness-related data
Display Display options include backlit LCD, OLED, OLED is the only type of
Technology AMOLED, and PMOLED. Display options display used
include OLED, AMOLED, and PMOLED
Size Greater in size and thickness Comparatively slightly less
bulky
Weight Heaviest Lightest
fundamental bunches, it is not the only wearable IoT gadget out there that is utilized
in different applications, for example, virtual games to improve the gaming experi-
ence, installment applications, and schooling. The scope of this evaluation includes
the inquiry but excludes other use cases. In the accompanying segments, every clas-
sification is introduced by posting the main distributed work.
11 Application of IoT in Wearable Technology 185
Health
Activity
Recognition
Wearable & Sports
Iot
Classificati
on
Tracking &
Localization
Safety
11.3.1 Health
Preceding the Internet of Things, patients’ participation with experts was confined
to visits, tele, and text correspondences. It was incomprehensible that subject matter
experts or clinical facilities could screen patients’ prosperity reliably and make
ideas fittingly.
Web of Things (IoT)-enabled contraptions have made far off checking in the
region of the clinical benefits possible, delivering the likelihood to keep patients
ensured and sound, and connecting with specialists to pass the sample review. It has
furthermore extended patient responsibility and satisfaction as participation with
experts have gotten more straightforward and more capable. Besides, far-off check-
ing of patient’s prosperity helps in diminishing the length of clinical facility stay
and prevents reaffirmations [12]. IoT furthermore essentially influences decreasing
clinical benefits costs on a very basic level and further creating treatment results.
Table 2 addresses the synopsis of medical services’ IoT sensors [3].
The IoT does not change anything in the clinical consideration industry in the
space of gadgets and interpersonal relations by shifting the lines of action of clinical
consideration. The IoT has applications in clinical consideration that benefit
patients, families, specialists, crisis centers, and protection organizations.
IoT for Patients Gadgets as wearables like well-being gatherings and other
remotely related contraptions, for instance, sleeves for a heartbeat and heartbeat
estimation, blood glucose meters, and so forth, can give customized care to patients.
These gears can be fine-tuned to memorize starch levels, hands-on control, action
186 S. Dhoot et al.
plans, sets of circulatory stress, and more. The IoT has changed individuals, espe-
cially established patients, by constantly engaging with disabilities. It fundamen-
tally affects people living alone and their families. In the event of a negative impact
or change in an individual’s standard activities [1], the prepared framework conveys
messages to interested family members and providers of prosperity.
IoT for Physicians By the utilization of wearables and different techniques for
home stuff introduced with IoT, specialists can screen patients’ prosperity all the
more effectively. They can follow patients’ adherence to treatment plans or any
prerequisite for ensured clinical thought. IoT engages clinical consideration special-
ists to be more cautious and interface with the patients proactively [3]. When doc-
tors utilize the information gathered from IoT gadgets, they might figure out what
the ideal treatment measure is for their patients and show up at the normal outcomes.
IoT for Hospitals Aside from noticing patients’ prosperity, there are various dis-
tricts where IoT contraptions are incredibly useful in clinical facilities. IoT gadgets
with sensor labels are utilized to follow the current scope of clinical hardware, like
wheelchairs, defibrillators [12], nebulizers, oxygen siphons, and other observing
gadgets. Sending of clinical staff at different regions can in like manner be inspected
proceeding. There is an increment in infections and is a critical concern because of
facilities. IoT-enabled neatness checking contraptions help in holding patients back
from getting corrupted. IoT contraptions in like manner help in asset the leaders like
pharmacy stock control and regular noticing, for instance, actually taking a look at
refrigerator temperature and suddenness and temperature control.
IoT for Health Companies There are different opportunities for prosperity under-
writers with IoT-related insightful contraptions. Protection organizations can utilize
data got through prosperity noticing contraptions for their underwriting and claims
exercises. This data will engage them to perceive blackmail declares and recognize
opportunities for ensuring. IoT contraptions get straightforwardness among well-
being net suppliers and customers the underwriting, assessing, claims dealing with
[3], and danger examination measures. In the light of IoT-got data-driven decisions
in every type of effort measure, customers will have acceptable detectable quality
into principal thought behind every decision made and collaboration results.
Security net suppliers may offer inspiration to their customers for using and shar-
ing prosperity data made by IoT contraptions. They can compensate customers for
using IoT contraptions to screen their ordinary activities and adherence to treatment
plans and reasonable prosperity measures [15]. This will help well-being net suppli-
ers with diminishing cases through and through. IoT contraptions can in like man-
ner engage protection organizations to endorse claims through the data got by these
devices. Table 11.2 represents the summary of health-care IoT sensors [3].
11 Application of IoT in Wearable Technology 187
11.3.2 Activity Sports
The arrangement depends on the use of portable devices that are worn during sport-
ing activities to register different estimates of the client/competitor’s activity to sub-
sume their show. In addition, the uses of this meeting think of the collection of
188 S. Dhoot et al.
11.3.3 Following and Localization
This grouping is employed usually for following humans and animals to settle on
their space on the Internet. Discovering things of a private or creature who is sport-
ing a wearable appliance is important in numerous applications. Considering the
course trip of a bird, finding the area of a senior individual during a thought work-
space, examining the advancement of individuals who are visiting a show or pet are
a few of examples of these applications. A thorough report on restriction utilizing
IoT innovation is distributed in Shit et al. [26]; however, the investigation does not
specialize in wearable IoT. By and large, the restriction methods talked concerning
in writing are separated into two elementary classifications. People that use are
separated coming up with and the ones that while not victimization detached pre-
paring will select the region. The readiness subordinate methods can be sorted out
into three gatherings: (1) procedure, (2) stochastic-arranged models, and (3)
machine learning plans. The procedure has been thought extensively using numer-
ous forms of signs as well as general sign model, such as sound sign, video sign, and
development [27, 28]. General sign model depends on indicator of signal strength
received value of the faraway sign, during which the district finger impression is
distinguished through web site outline and places away in a rare imprint knowledge
base, generally. This one-of-a-kind imprint information is employed later by a limi-
tation computation online to gauge the region. The procedure is used on visual
information got on camera or sound signs got by an intensifier. The contraptions
11 Application of IoT in Wearable Technology 189
will in like manner use mixture restriction methods that depend on shared position
assessment of every IoT device equally because of the general distance devices.
11.3.4 Safety
This classification has a place with the wearables that are utilized to give a protected
climate to the clients. For example, a weakness checking framework can tell the
caution the drivers who nod off at the worst possible time and advise the businesses
[19]. Then again as another model, wearable contraptions can accumulate the air
data in the mines to ensure the expert’s prosperity and decrease dangers for earth-
movers and costs for organizations [3]. Fall avoidance and identification particu-
larly in older individuals are a significant problem, and there are for wearable
gadgets that are utilized to identify or forestall falls.
At the point when we consider wearable innovation, the main things that strike a
chord are smartwatches and remote earbuds; however, the fate of wearable tech
holds a lot more extensive extent of uses, particularly in the work environment.
Figure 11.6 [29, 30] shows the rise of wearable devices over the years.
Also, as independent gadgets that can be connected to clothing, IoT-viable inno-
vation can be worked into coats, boots, and different things of attire. For the future
of IoT wearables, this may mean:
11.4.1 Laborer Well-Being
Physical work ventures, for example, development and assembling are set to profit
altogether from wearable IoT gadgets. Well-being guidelines in these ventures have
since a long time ago incorporated the wearing of hard caps, defensive goggles,
boots, gloves, and high-permeability clothing. Wearable innovation will improve
the assurance of laborers much further. On building destinations, the utilization of
robots can assist with delineating the region without hazard to specialist well-being,
featuring any hazardous regions [31]. Maybe than simply imparting this data to a
PC, it could likewise be imparted to wearables, for example, increased reality gog-
gles, like the Google Glass, that can outline the region and safe courses around the
site before the specialists’ eyes.
Wearable IoT gadgets can likewise be utilized to follow laborer areas and recog-
nize falls, which means mishaps can be more effortlessly forestalled and the reac-
tion can be faster if they do occur [32]. In the form of trackers and other small
190 S. Dhoot et al.
80
70
60
50
40
30
20
10
0
Fitness Smart Smart Smart Others
and Watches Glasses Clothing
Wellness
Devices 2016 2021
gadgets that can be used cut to a belt, it is now a reality; however, with the headway
of shrewd materials, it might before long be typical to have this innovation fabri-
cated straightforwardly into work boots or coats.
IoT gadgets incorporated into hardware can likewise give alerts to the actual
specialist. Gadgets can give perceptible or vibration-based alerts that caution labor-
ers of perils like moving gear or hazardous territory, just as notice them of actual
stressors like bowing, bending, and when they are experiencing weariness.
11.4.2 Planning and Training
complexities that could happen. All things considered, these practices will before
long be embraced by other profoundly talented callings too.
11.4.3 Medical Care
IoT wearables have additionally advanced into the clinical calling to comprehend a
patient’s physiology and give more customized treatment more readily [3]. Wearable
tattoos are produced using a slim elastic fix that contains a circuit of adaptable elec-
tronic segments and is adhered straightforwardly to the skin.
These “tattoos” can be utilized to screen a patient’s vitals and fabricate a total
well-being profile on them throughout some period, with practically zero uneasi-
ness to the wearer [33], and this data can be sent progressively to medical services
experts.
Not exclusively do wearable tattoos give more precise and extensive information
about a patient, yet they can likewise identify indications that the patient is suffering
from a well-being profile that makes them vulnerable to specific illnesses or medical
conditions. Approaching this information implies that some future medical condi-
tions can be forestalled against ahead of schedule, just as giving specialists a supe-
rior thought of which therapies will be appropriate, as well as the patient might
cause beforehand inconspicuous intricacies.
11.4.4 Analytics
Utilizing wearable IoT gadgets for investigation will have long-haul benefits out-
side of medical care as well. Having the option to follow specialist action, area, and
feelings of anxiety will assist organizations with smoothing out their practices and
create a better working environment effective in its format, just as seeing where
time is squandered [31, 32]. Competitors are now utilizing insightful IoT innovation
to quantify their exhibition and methods to see where enhancements can be made.
A few organizations might need to use wearable innovation to evaluate the well-
ness and prosperity in general of their workers. They can utilize it to make a steadier
working environment that focuses on laborer fulfilment by decreasing openness to
the circumstances that cause pressure.
A major portion of wearable IoT innovation is now in the form of external
devices that clients need to furnish themselves, like goggles, smartwatches, or
development sensors; however as the innovation advances, we will probably see an
ever-increasing number of customary things of the dress being overhauled with IoT
ability [19]. Even though wearable IoT is likely to be most beneficial to medical
research and clinical enterprises in the short term, this technology is likely to
become increasingly prevalent in all commercial sectors, as well as in the household.
192 S. Dhoot et al.
1.Information
Resolution of
Wearable Sensors
Power
Privacy
Consumption
Regulation Wearability
Security Safety
11.5.2 Power Usage
To restrict human correspondence and for wearable contraptions to figure for broad-
ened periods while not superseding or charging the battery, extraordinary issues are
to be thought of whereas composition the wearables. For example, low-power usage
structures or energy-gathering methodology, for instance, smaller than expected
magneto-electric, thermoelectric, piezoelectric, or photoelectrical gathering ways
are some potential choices utilized in Wu et al. [33]. Among all energy harvest pro-
cedures, sunlight-based settled energy is taken into account as a powerful up-and-
comer because it offers the foremost spectacular thickness. The defect of
sunlight-based energy is its obstruction to day times and outside puts.
11.5.3 Wearability
The wearable IoT contraptions must be compelled to be rattling once worn by the
client. It is essential to the approach that they are expected to not angry the standard
exercises of the client. The trade-off between the multilayered arrangement of the
calculations and also the wearable weight is one of every of the essential challenges.
In Chen et al. [34], sagacious attire or wearable 2.0 for human-cloud compromise is
recognizable that attempts to manage the problem with hassle accomplished by
sporting numerous sensors uninterested piece of the body for clinical benefits
application.
11.5.4 Well-Being
11.5.5 Security
11.5.6 Guideline
There is at this point a cutoff in using wearable IoT contraptions in numerous ven-
tures because of the absence or presence of appropriate guidelines. For instance, in
sports fields, the utilization of wearable IoT gadgets is mechanically attainable, yet
it is not being utilized because of the group’s guidelines.
11.5.7 Privacy
The consistent trade of individual information, for example, imperative good for-
tune signs, measurements, and house between technology and additionally the
Internet center purpose, can establish a climate for security breaks. Conventionally,
wearable IoT contraptions are on the imparted mode that produces them success-
fully determinable by varied center points among the association. Unapproved cen-
ter points will take the singular information on the off likelihood that applicable
security methodologies are not applied. In such transmission modes, the intrinsic
hardware security development of the IoT contraptions probably would not guaran-
tee the protection of individual information against breaks. In [36], a transmission
ally IoT model is planned wherever the customers’ personal information is only
given to expected center points like clinical thought workplaces or contraptions sup-
ported by the customer.
Wearable IoT gadgets can have an incredible assortment of utilizations and open-
ings. Exploitation 3D printing, the best-in-class age of those wearables, is going to
be helped by localization of function of their arrangement, production, and scatter-
ing. For instance, by mishandling this development for the prosperity application,
the patient can alter their disease profiles and transfer their mechanical sets from
personal health care to printing for the home at insignificant cost. Batteries, the
power of the extraclear method, are now allowed in portable IoT gadgets. This
extends their self-regulation, carrying out the extraction and demand for parts and
the rental and authorization of useful work of material resources. The essential
11 Application of IoT in Wearable Technology 195
11.6 Conclusion
The wearable can give relentless new opportunities [37] in some certifiable applica-
tions. Wearables have many prospects once the Associate in Nursing incorporated
IoT framework opens. Thus, the real force of consolidating wearable and IoT has
not been perceived [38, 39]. Wearable technology offers higher functionalities by
giving constant information correspondence; nevertheless, it additionally represents
an additional noteworthy security and protection hazards. Loads of individuals are
disturbed regarding wearable security since the knowledge obtained may embody
sensitive information about themselves and their environment, equivalent to charac-
ter, health-related data, Mastercard number, and location [40].
Although this trend-setting innovation advantages people, there are still some
security escape clauses and protection offer that necessary further thought and
elbow grease of creators in designing wearable innovation models. A superior veri-
fication tool is going to be enforced as a result of this.
References
1. Nidhi Chawla al. AI, IoT and Wearable Technology for Smart Healthcare –A Review
International Journal of Recent Research Aspects ISSN: 2349-7688, Vol. 7, Issue 1, March
2020, pp. 9–13
2. Transparency Market Research. (05 Jun 2014). Wearable Technology Market Research Report
2018. (cited 21 Sep 2015).
3. A. Basit, K. Saxena and A. Rana, "A Wearable Device used for Smart Doorbell in Home
Automation System," 2020 IEEE International Women in Engineering (WIE) Conference
on Electrical and Computer Engineering (WIECON-ECE), 2020, pp. 90-93, doi: 10.1109/
WIECON-ECE52138.2020.9398001.
4. PricewaterhouseCoopers B.V. 2014. Consumer intelligence series - The wearable future. (cited
19 Sep, 2015).
5. Al-Muhtadi, J., D. Mickunas, and R. Campbell. Wearable security services. in Distributed
Computing Systems Workshop, 2001 International Conference on. 2001.
6. Gregersen, Erik. “Smartwatch”. Encyclopedia Britannica, 14 Jan. 2021, https:/www.britan-
nica.com/technology/smartwatch. Accessed 7 August 2021
7. Aroganam, G.; Manivannan, N.; Harrison, D. Review on Wearable Technology Sensors Used
in Consumer Sport Applications. Sensors 2019, 19, 1983.
8. Safavi, S. and Z. Shukur, Improving google glass security and privacy by changing the physi-
cal and software structure. Life Science Journal, 2014. 11(5): p. 109–117.
9. Geran S. (18 Apr, 2014). Is Google Glass a Security Risk? (cited 19 Oct, 2015).[Online]
Available: https://blog.bit9.com/2014/04/18/is-google-glass-a-security-risk/
196 S. Dhoot et al.
10. Daniel D. 2013. Privacy Implications of Google Glass. (cited 21 Oct, 2015).[Online] Available:
http://resources.infosecinstitute.com/privacy-implications-of-google-glass/
11. Michael S. (11 Jun, 2015). Internet of Things Security Evaluation of nine Fitness Trackers.
(cited 21 Oct, 2015).[Online] Available: https://www.av-test.org/fileadmin/pdf/avtest_2015-
06_fitness_tracker_english.pdf
12. Rahman, M., B. Carbunar, and M. Banik, Fit and vulnerable: Attacks and defenses for a health
monitoring device. arXiv preprint arXiv:1304.5672, 2013.
13. Cyr, B., et al., Security Analysis of Wearable Fitness Devices (Fitbit). Massachusetts Institute
of Technology, 2014.
14. Carly P. (24 May, 2015). iPhone users' privacy at risk due to leaky Bluetooth technol-
ogy. (cited 24 Oct, 2015).[Online] Available:http://www.v3.co.uk/v3-uk/news/2409939/
iphone-users-privacy-atrisk-due-to-leaky-bluetooth-technology
15. F. John Dian, R. Vahidnia and A. Rahmati, “Wearables and the Internet of Things
(IoT), Applications, Opportunities, and Challenges: A Survey,” in IEEE Access, vol. 8,
pp. 69200-69211, 2020, https://doi.org/10.1109/ACCESS.2020.2986329.
16. Z. Wang, H. Zhao, S. Qiu, and Q. Gao, “Stance-phase detection for ZUPT-aided foot-
mounted pedestrian navigation system,” IEEE/ASME Trans. Mechatronics, vol. 20, no. 6,
pp. 3170–3181, Dec. 2015.
17. Z. Wang, M. Guo, and C. Zhao, “Badminton stroke recognition based on body sensor net-
works,” IEEE Trans. Hum.-Mach. Syst., vol. 46, no. 5, pp. 769–775, Oct. 2016.
18. J. C. Maglott, J. Xu, and P. B. Shull, “Differences in arm motion timing characteristics for bas-
ketball free throw and jump shooting via a body worn sensorized sleeve,” in Proc. IEEE 14th
Int. Conf. Wearable Implant. Body Sensor Netw. (BSN), May 2017, pp. 31–34.
19. J. Pansiot, B. Lo, and G.-Z. Yang, “Swimming stroke kinematic analysis with BSN,” in Proc.
Int. Conf. Body Sensor Netw., Singapore, Jun. 2010, pp. 153–158.
20. J. Häkkilä, M. Alhonsuo, L. Virtanen, J. Rantakari, A. Colley, and T. Koivumäki, “MyData
approach for personal health—A service design case for young athletes,” in Proc. 49th Hawaii
Int. Conf. Syst. Sci. (HICSS), Koloa, HI, USA, Jan. 2016, pp. 3493–3502.
21. J. Haladjian, M. Reif, and B. Brügge, “VIHapp: A wearable system to support blind skiing,”
in Proc. ACM Int. Joint Conf. Pervas. Ubiquitous Comput. (UbiComp), 2017, pp. 1033–1037.
22. E. H. Chi, J. Song, and G. Corbin, “‘Killer App’ of wearable computing: Wireless force sens-
ing body protectors for martial arts,” in Proc. 17th Annu. ACM Symp. User Interface Softw.
Technol. (UIST), 2004, pp. 277–285.
23. M. Pan, S. Salvi, and E. Brady, “Designing auditory feedback from wearable weightlifting
devices,” in Proc. Extended Abstr. CHI Conf. Hum. Factors Comput. Syst. (CHI), 2018,
pp. 1–6.
24. H. Havlucu, I. Bostan, A. Coskun, and Ö. Özcan, “Understanding the lonesome tennis play-
ers: Insights for future wearables,” in Proc. CHI Conf. Extended Abstr. Hum. Factors Comput.
Syst. (CHI EA), 2017, pp. 1678–1685.
25. M. Lapinski, E. Berkson, T. Gill, M. Reinold, and J. A. Paradiso, “A distributed wearable,
wireless sensor system for evaluating professional baseball pitchers and batters,” in Proc. Int.
Symp. Wearable Comput., Sep. 2009, pp. 131–138.
26. R. C. Shit, S. Sharma, D. Puthal, and A. Y. Zomaya, “Location of things (LoT): A review and
taxonomy of sensors localization in IoT infrastructure,” IEEE Commun. Surveys Tuts., vol. 20,
no. 3, pp. 2028–2061, 3rd Quart., 2018.
27. Y. Kim, H. Shin, and H. Cha, “Smartphone-based Wi-Fi pedestrian tracking system tolerat-
ing the RSS variance problem,” in Proc. IEEE Int. Conf. Pervas. Comput. Commun., Lugano,
Switzerland, Mar. 2012, pp. 11–19.
28. A. Hallquist and A. Zakhor, “Single view pose estimation of mobile devices in urban environ-
ments,” in Proc. IEEE Workshop Appl. Comput. Vis. (WACV), Tampa, FL, USA, Jan. 2013,
pp. 347–354
11 Application of IoT in Wearable Technology 197
29. O. Bindroo, K. Saxena and S. K. Khatri, “A wearable NFC wristband for remote home automa-
tion system,” 2017 2nd International Conference on Telecommunication and Networks (TEL-
NET), 2017, pp. 1-6, doi: 10.1109/TEL-NET.2017.8343563.
30. Authentify. (2016). Out-of-Band Authentication. (Cited 28 Feb, 2016).
31. Kumar, Abhinav. “Importance and use of IOT in Healthcare.” doi.org. International Journal of
Computer Applications, 24 Oct. 2020. Web. 12 Aug. 2021.
32. IoT in Healthcare Industry | IoT Applications in Healthcare – Wipro. (2021). Retrieved 12
August 2021, from https://www.wipro.com/business-process/what-can-iot-do-for-healthcare-
33. T. Wu, F. Wu, J. M. Redouté, and M. R. Yuce, “An autonomous wireless body area net-
work implementation towards IoT connected healthcare applications,” IEEE Access, vol. 5,
p. 11413–11422, 2017.
34. M. chen, y. Ma, Y. Li, D. Wu, Y. Zhang, and C. Youn, “Wearable 2.0: Enabling human-
cloud integration in next generation healthcare systems,” IEEE communications magazine,
pp. 54–61, January 2017.
35. J. Dian and R. Vahidnia, “Radiation Safety Hazards of Cellular IoT Devices,” IEEE Technology
and Society Magazine (submitted), 2019.
36. R. K. Lomotey, K. Sofranko, and R. Orji “Enhancing Privacy in Wearable IoT through a
Provenance Architecture,” Multimodal Technologies and Interaction; Basel, 2018.
37. Jain, N., Chaudhary, A., Sindhwani, N., & Rana, A. (2021, September). Applications of
Wearable devices in IoT. In 2021 9th International Conference on Reliability, Infocom
Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 1–4). IEEE.
38. Gupta, A., Srivastava, A., & Anand, R. (2019). Cost-effective smart home automation using
internet of things. Journal of Communication Engineering & Systems. 9(2), 1–6.
39. Bakshi, G., Shukla, R., Yadav, V., Dahiya, A., Anand, R., Sindhwani, N., & Singh, H. (2021).
An Optimized Approach for Feature Extraction in Multi-Relational Statistical Learning.
Journal of Scientific and Industrial Research (JSIR), 80(6), 537–542.
40. Gupta, A., Asad, A., Meena, L., & Anand, R. (2023). IoT and RFID-Based Smart Card System
Integrated with Health Care, Electricity, QR and Banking Sectors. In Artificial Intelligence on
Medical Data (pp. 253–265). Springer, Singapore.
Chapter 12
Role of IoT in Smart Homes and Smart
Cities: Challenges, Benefits,
and Applications
12.1 Introduction
IoT directs a system of related and connected objects that are used to collect and
transmit data over a wireless network. IoT devices collect data through a variety of
advanced technologies and freely stream data between other devices [1]. IoT is
known as an important part of developing Smart Homes and Smart Cities. To a large
extent, Smart Cities fill the regions with nerves so that one can understand and con-
trol the environment. These days, a large number of people are moving toward IoT
technology and transforming their homes into Smart Homes. For example, when
you turn on the light in your room using a mobile app, it becomes an IoT device.
Analysts predict that there will be 41.6 billion connected IoT devices by 2025. IoT
is a simple concept where the IT world is connected to the real world of objects [2].
IoT-based Smart Homes allow us to control our household items via a cell phone.
Smart Homes enable us to adjust the brightness and temperature of a room or an
entire house; anyone can turn on and off the lights in our house and many other
things by simply using our cell phone. If a stranger or a thief enters or tries to enter
a house, the system immediately sends a notification to our smartphone. After
receiving the notice, you can take the necessary steps against it [3]. Mobile applica-
tions are used to control and operate home appliances. For example, if you forget to
lock any doors of your house, the system automatically locks the doors, or if you are
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 199
N. Sindhwani et al. (eds.), IoT Based Smart Applications,
EAI/Springer Innovations in Communication and Computing,
https://doi.org/10.1007/978-3-031-04524-0_12
200 A. Tripathi et al.
tired when you return from the office, you can turn on the air conditioner with just
your smartphone. For these reasons, a large number of people go to IoT-based Smart
Homes. Smart Homes make our home life more comfortable and secure [4]. IoT-
based Smart Cities use IoT gadgets like sensors, lights, and meters that gather and
examine information. Cities then, at that point, utilize this information to further
develop the foundation, resources, and many other things that help build Smart City.
IoT-based Smart Cities make the lives of citizens much easier as it offers advanced
technologies that help citizens in many ways [5]. Smart Homes are generally con-
sidered to be the foundation for the construction of Smart City. Smart City is also
known as The Evolution of Smart Homes. Smart Cities aim to use billions of IoT
devices in a common area. Smart Cities are helping the city work harder to make our
lives more comfortable and secure [6]. Smart Cities enable us to prevent crime,
environmental management, air quality management, smart waste management,
smart parking, etc. Smart Cities are considered natural because they reduce the
impact of greenhouse gases [7]. Smart Cities only work if there is government sup-
port that plays a major role in building Smart Cities. Without government assis-
tance, one cannot develop Smart Cities as everyone needs funding for that. According
to a recent report, Smart Cities have the potential to generate $ 20,000 in economic
benefits by 2026. With the help of large corporations or MNCs and cooperative
governments, one can see the development or transformation of Smart Cities over
time [8]. As there is a need to use IoT in our Smart Cities and Smart Homes, one
needs to be extra careful as they have weak security technologies. Malicious hack-
ers and unauthorized persons can easily get into our system and easily manage our
data. One can protect and maintain the privacy of our data by ensuring all required
security agreements, maintaining a strong password, and installing all updates on
your device as they are available to keep your system up to date [9]. IoT in Smart
Homes and Smart Cities make our lives much better and will continue to do so in
the future. Studies prove that in the years to come, IoT based on Smart Homes and
Smart Cities will take over and make our world technologically advanced. Smart
Cities and Smart Homes have become an important part of our lives. These days, the
whole world is turning to Smart Homes and Smart Cities based on IoT because they
make our lives easier, more comfortable, and more secure [10].
12.2 Literature Review
In this chapter, the author describes the concepts of Smart Cities based on IoT and
the challenges they face while using Smart Cities based on IoT. It also discusses
weaknesses or errors during IoT installation [11]. This tells us about the Smart
Home-based IoT security system where it discusses the performance and imple-
mentation of Smart Homes and discusses the future of IoT [12]. As such, Smart
Homes can be easily used so this paper tells us the security and privacy measures
one should take while using IoT-based Smart Homes. As the demand for IoT devices
grows these days, there is a need to make sure our data is safe and secure by taking
12 Role of IoT in Smart Homes and Smart Cities: Challenges, Benefits, and Applications 201
all precautions [13]. This will focus on urban IoT systems and will also inform us of
the adoption of advanced technologies, agreements, and the development of an
urban IoT system. The urban IoT system will bring a large number of benefits to the
management and expansion of traditional community services [14]. In this, the
author describes the IoT technology used in the construction of Smart City and the
various hardware and software components required for IoT technology in building
the Smart City. We will also discuss vulnerabilities while using IoT-based Smart
Cities and how we can overcome these weaknesses [15]. In this paper, one will
understand how to control our household items via our smartphone via Wi-Fi or
wireless network. It will tell us about the variety of computer and software tools
required for IoT deployment on Smart Homes. It will also show us how IoT technol-
ogy will become a very important part of our lives [16]. This paper explains the
concepts of Smart Cities and their use. It also describes the advanced network tech-
nologies used in the construction of Smart Cities and also tells us about the major
features of the Smart City operations. It also discusses the challenges and experi-
ences in the world regarding IoT in Smart Cities [17]. This tells us about the control
and operation of household items such as lamps, fans, air conditioners, and many
other items called Home Automation. It also states that Home Automation must
have a Smart Security system where the system can send an SMS or photo to our
smartphone if something is found [18]. This paper describes IoT and the various
uses of IoT in Smart Home Technology and tells us how to create and use this IoT-
based Smart City Technology. It also suggests several ways in which one can
improve Smart Home applications [19]. This will discuss the use of IoT and how
IoT will affect our lives and become an integral part of our lives. It also describes
the various IoT services based in Smart Cities that play a key role in the construc-
tion of Smart City. It also talks about the future of IoT-based Smart Cities [20]. This
paper discusses various types of IoT applications such as Smart Home Automation
System, Smart Cities, Smart Agriculture, Smart Industry, Smart Parking System,
etc. [21]. This paper discusses the different types of challenges facing IoT architec-
ture design in Smart Homes and Smart Cities and discusses the different types of
security attacks on IoT systems and security measures [22]. This paper will tell us
about the Smart Security and Home Automation-based IoT system that sends the
user via Internet notification to a smartphone when there is an unknown input or
when the door is opened. The user can receive messages on his phone when they are
out of the house [23]. The author describes the challenges of future research and
applications based on IoT, as well as the recent advances in IoT technology, and also
talks about Smart Cities, Smart Agriculture, intelligent environment, and intelligent
life [24]. This paper creates a Smart Home Automation System where anyone can
control and use our home appliances such as turning on/off lights, fans, or air con-
ditioners. It is, therefore, better to upgrade the Home Automation system for luxury
living and to design an advanced Home Automation System via Wi-Fi or wireless
network [25]. This paper discusses the Smart Parking System in Smart Cities based
on IoT technology and discusses the functionality of the Smart Parking System. The
IoT-based Smart Parking System allows the client to check the availability of a
parking space and book a parking space [26]. This paper discusses a Smart Home
202 A. Tripathi et al.
System that works with heat and gas leaks. It also helps us to take care of the plants
by watering them from time to time. It is also helpful to use many of the household
items everyone uses in our daily lives with a smartphone [27]. This paper tells us
about security attacks using Blockchain, various types of IoT services and data
security measures, and various IoT protocols used in IoT-based systems and also
discusses data security and network security [28].
12.3.1 Smart Homes
At this point, raw data gathered from sensors is liable to additional preparation. Part
of the arrangements in that split data gathered are CSV, tweets, arrangement charts,
and texting. Organizations are gathered and altered utilizing the semantic web to
change them over to a similar configuration. The accompanying level shows the
strategies used to change over information into a similar arrangement.
12 Role of IoT in Smart Homes and Smart Cities: Challenges, Benefits, and Applications 203
Information gathered from the information assortment level was summed up before
move, testing, and coordination at ceaseless levels utilizing semantic web advance-
ment. The principal reason for this standard is to change over mass information into
a comparable configuration, for instance, the Resource Description Framework
(RDF). RDF [29] is the most generally utilized approach to trade information on the
web and works with multidisciplinary information on the different spaces of Smart
City. RDF likewise assists with isolating metadata about resources on the web.
Different programming applications will want to utilize RDF information for basic
reasoning errands. Pre-assembled RDF data created at this level will be manhandled
using semantic data and coming about weakness rules with an evident level to set up
obvious data recuperation.
Semantic web technology permits the abuse of explicit space information depen-
dent on thoughts and associations between those thoughts. The methodology uti-
lized at this level is summed up underneath. The language of web ontology (OWL)
[30] is utilized to engender ontologies. Web Ontology Language (OWL) is an RDF
diagram created utilizing RDF and ontologies and permits singular grouping/order.
It likewise offers two distinct kinds of designs, which can be utilized to coordinate
associations between various classifications, to determine a data resource and an
object resource. At the point when isolation is done, the subtleties can be addition-
ally upgraded by nearby specialists and vulnerabilities. Dempster-Shafer will be
used here to enlighten advancement and learn new levels in a particular space of
talk. In this paper, the Dempster-Shafer strategy is used to join material information
[31] from various Smart Cities. This methodology will assist with learning new
information through dubious deduction and by helping with the execution of a sharp
framework.
SPARQL is the language of the RDF poll [32] used to inquire, get to, and deal
with the data/records determined in the RDF plan. At the point when all set informa-
tion is moved as the RDF increments essentially, SPARQL permits question and
recovery of data in a similar arrangement. All things considered, this level ascents
notwithstanding low-level data. New guidelines that function admirably during the
undeniable level substance data cycle from the juvenile tangible information and
would then be able to be taken out and used to fabricate information on the develop-
ment of Smart City structures.
204 A. Tripathi et al.
Information got from level 3 can be utilized for an assortment of web applications
for shrewd working conditions. The information gathered can be utilized from
numerous survey focuses like info/yield, informing, alarms, and cautions [33].
Communication Services
Customized Services
For instance, due to automobile and health areas, by joining tactile information, the
impact of driver health limits on driving conditions can be quantified. Joining well-
being hindrances, for example, hypertension and pulse in a vehicle, can help the
driver by estimating their continuous disease, which can assist with establishing a
more secure environment for drivers. Likewise, utilizing the vehicle’s area, vehicle
speed, and traffic volume at the intersection can assist with better screening the state
of the vehicle. Due to the healthy climate, information gathered through remote
nerve networks about a patient’s health and work can assist an individual with an
inability. Indeed, by joining the information on home and ecological spaces, the
effect of warmth on a home exercise like eating, washing, resting, and cooking can
be learned. This can help in tracking down a reasonable workplace, which can be a
significant device for considering more established individuals and individuals
experiencing dementia. Figure 12.1 shows Smart City architecture
Because of the normal and hierarchical climate, low-level information is gath-
ered in a common habitat, for example, temperature and water will assist with
acquiring profound changes over information. At the point when significant level
modified information (like floods, tremors, timberland flames, torrential slides, and
12 Role of IoT in Smart Homes and Smart Cities: Challenges, Benefits, and Applications 205
other normal catastrophes) is coordinated into the city board, it can assist with sav-
ing lives. Essentially, for the modern area, setting up solid administration acquired
by a mix of various information will assist with establishing a protected workplace
for assembly line laborers. With normal testing, recording, and abuse of encompass-
ing tactile data from an assortment of sources (e.g., gas weakness, mechanical con-
ditions, and representative well-being) in a modern climate, a superior, more
valuable and more secure working environment climate can be made [36].
12.3.2 Smart Cities
IoT-based Water Quality Monitoring System in Smart Cities system uses Arduino as
a microcontroller. The whole program is designed to embed - C and match the code
created using Arduino IDE. Data collection on PH, water level, temperature and air
leaks, and water quality monitoring system uses sensors. This data can be accessed
206 A. Tripathi et al.
Smart Gadgets The IoT-based smart home gadgets involve a few smart gadgets for
various utilizations of safety, lighting, and home diversion, among others. This load
of gadgets is coordinated over a common organization set up as an escape and con-
nected in a lattice organization. This implies it offers the clients the adaptability to
work one sensor followed by the activity of the other. For example, when the win-
dows/entryways’ sensors of your primary entryway trigger at 7 pm, you can time-
table to trigger the front room. For significant distances, these sensor center points
assume a fundamental part in permitting simple transmission of signs to the sensors
that are far away from the primary regulator however are near the sensor center [38].
Wireless Network The greater part of the IoT-based Smart Home Systems acces-
sible today works on three significant conventions, specifically Z-Wave, Wi-Fi, and
ZigBee. The Z-Wave and the ZigBee regulators are given organization IDs which
are additionally dispersed over different sensors in the organization. Because of the
accessibility of the most limited way, the sign from the regulator will go to the
objective sensors either through signal bounces or straightforwardly. In the case any
center sensor in the pathway is involved, the sign will look for another approach to
show up at its last unbiased.
client-mentioned activity. Whenever this is done, the center will refresh the move it
has made, and through this, clients can screen and control each part of their smart
homes [39].
12.4.1 Smart Cities
The main IoT issues arising from the acquisition of Smart Cities are the following:
• Denial of service: An exceptionally enormous number of Internet gadgets in
metropolitan regions give a genuine assault vector to noxious clients [40]. For
instance, in a major city, thousands or a huge number of gadgets all the while
speaking with the two clients and between them, security ideas are tremendous.
Smart Cities is an amazing system objective to make IoT bot organizations. The
IoT botnet has compromised gadgets and is utilized to perform different under-
takings without the information on their genuine clients [41]. This apparatus
manhandles the shortcomings that exist in other related articles, for instance, the
utilization of default passwords by clients. In this manner, IoT networks are
gradually being utilized as an assault stage by pernicious clients.
• Heterogeneity issues: For the most part, in IoT cases, information is gathered
from an enormous number of normally dispersed things. In any case, information
gathered in various ways utilizing various gatherings generally has various
designs. Thus, it is absurd to satisfactorily investigate, measure, and store such
information without a particular association. This absence of extra terms makes
joining information acquired from peculiar sources troublesome. Along these
lines, make (1) rules for information mix and (2) data exchanging gatherings that
will empower the creation of useful and reliable data between various IoT gad-
gets [42].
• Security issues
IoT security is undeniably challenging for the administration and supportability
of associations and organizations. The US Federal Trade Commission (FTC) has
delivered a report that the proper organization of IoT innovation will open up an
assortment of well-being and security issues for IoT clients and ought to be more
tolerant or settled. For a large portion of these fundamental IoT applications, the
utilization of mistaken or adulterated data can have genuine results. Normal security
settings like confirmation, privacy, and information honesty are crucial to IoT items,
associations, and applications. If IoT objects have adequate memory and planning
limits, existing security shows, and measurements might be suitable, yet as there are
restricted IoT resource restrictions, these current security frameworks are exorbitant
to IoT assets [43]. Security issues stay a significant obstruction to the selection and
208 A. Tripathi et al.
in general arranging of IoT. By the day’s end, customers won’t completely acknowl-
edge IoT in case there is no assurance that it will ensure their security. Surely, the
IoT can’t help itself by warding off assaults for an assortment of reasons: (1) recur-
rence, objects utilize a ton of their force undetected, making actual assaults on them
simpler; (2) most correspondence is remote, making man-in-the-middle Attacks,
maybe assaults the most popular of such a program. Therefore, business messages
might be dependent upon ensuing consistency, vindictive course, interruption of
messages, and other security gives that might influence the well-being of the whole
IoT; and (3) an assortment of variables, for instance, RFID marks have confined
resources to the extent energy and computation power, which hold them back from
executing advanced security game plans. Data security issues can be summed up in
data privacy, data confirmation, data uprightness, and data refreshes. Cryptographic
procedures are the best answers to help these security needs [44]. Cryptographic
insights are the reason for the security and protection insurance of Smart City appli-
cation administrations since they avoid the convergence of problematic gatherings
during life-supporting cycles, preparing and sharing. In the space underneath, there
is a need to sum up the cryptographic apparatuses as of now utilized in the Smart
City designs and join a particular novel and promising turn of events. One can like-
wise utilize IoT-based frameworks, biometrics intended to demonstrate generally
genuineness. Specifically, these advancements can be utilized to normally distin-
guish an individual with uncommon good and friendly characteristics. Bio-data is
taken out from fingerprints, face, words, manually written imprints, and soon.
Blockchain is the response to a basic trial of safety, security, and straightforward-
ness in this individual, hierarchical, and functional information. Various sorts of
brilliant city trades can be recorded on the blockchain. Through smart contracts,
complex lawful cycles can be made, and data exchange needs to happen accord-
ingly. With shrewd agreements and appropriated applications, blockchain offers a
significant degree of fulfillment to make brilliant exchanges during the smart city
working cycle. Blockchain can offer features like predictable confirmation, protec-
tion, security, consistent arrangement, and streamlining [45].
12.4.2 Smart Homes
The biggest challenges faced when accessing Smart Homes are the following:
• Relevancy of Extracted Data: Information-driven strategies utilizing information
mining methods or other AI procedures to collect decent data require experts to
understand raw data [46]. One of the most difficult issues to distinguish is the
duplication of data collected from sensors, which may be the next step in separat-
ing data. Therefore, studies are showing that ordering data extracted from low-
level data and another very modest system of high-quality data at that time will
completely provide details for high compliance [47]. Setting up sensory data will
compare to different parts of the inevitable communication services. The data
12 Role of IoT in Smart Homes and Smart Cities: Challenges, Benefits, and Applications 209
extracted to set the assumption becomes irrelevant if not used within a period,
much of it having a separate component. A large part of the setting is given a
dynamic category, for example, a real light spot for mobile or single gadgets [48].
• User Acceptance: Research shows that there is an absence of client acknowledg-
ment tests conducted on innovation technologies. A highly customizable user
interface should in any case have a degree of iterative improvement and therefore
do not affect the services provided to specific clients, emphasizing the impor-
tance of availability and availability that are appropriate for specific situations.
Further research focuses on greater efficiency in sensitivity, performance, and
service delivery rather than contradicting user acceptance of services itself [49].
Setting up the interface of a focused and natural device is problematic consider-
ing that they constantly manage a variety of complex system connectors that
prevent them from focusing on real work [50].
• Commercialization: Acquisitions from flexibility, for example, inaccessible
technology or commercial delays that prevent a Smart Home from becoming
famous. Most Smart Home appliances are quickly sold before being properly
tested by customers. Research shows that technology developers also take advan-
tage of the basic ideas of domestic customers, for example, who their clients are
and how they will use Smart Home technology while they are quick to make the
product marketable.
• Failure to Respond to Invalid Programs: Home adoption programs should have
a model that is intended to show home clients the function of the system to
enable them to respond to malicious programs. After that, repair plans should be
made necessary. In the study conducted by the five components proposed as an
integral part of planning, those are neighbors acquisition, central access control,
local communication, road development, and service renewal management [51].
• Cost: In any technological change, the cost without a doubt plays an important
role in purchasing or complying with that technology. The adoption of the tech-
nology focuses on showing that there have been concerns about expenses of
buying, executing, using, and support [52].
• Security and Privacy Measures: Currently, all security systems ensure the well-
being or prosperity of the occupants of the house. The default departments will
allow the client to permit the person in the restricted area of the house instead of
giving them the whole house as a part. Nowadays people wear smart bands; these
can be used to open doors and, as a result, add easy access to the client. Nowadays,
security is perhaps the most well-known concern in the general public because of
the rising crime rate and the attitudes of the people who follow it. Smart Homes’
security systems aim to stay away from unauthorized access. Smart Home will
be notified in the case anyone is in the house at some point. Currently, there can
be two cases where one person is available or no one is available. If they think
there is a person (authorized person), they can give anyone who wants authoriza-
tion access to the Smart Home app or simply accept that person. Currently, in
such a case, very little is required, but one can add a few highlights as the image
of any intruder will be removed (due to unauthorized person) assuming the
authorized person requesting authorization will be given directly to him using
210 A. Tripathi et al.
the same camera (i.e., using facial recognition). That access can be allowed any-
where by the client; this is used in the second case. Suppose no one is available
at home (tested using infrared sensors), one can consider whether the assumption
of individual authorization is valid or not; if so, it is permissible; otherwise the
image of each individual’s consent request will be sent to the authorized client to
allow the category whenever needed [53].
• Easy to lock and open doors: Safe homes are a vital part of any home. No matter
how many keys you use in your home, the risk of burglars and burglars entering
your home remains. However, having a Smart Home will reduce your chances of
safety by providing safety warnings in the event of an unforeseen occurrence.
Usually, if there should be an appearance of those people from your family, who
constantly lose their keys or neglect to lock part of the key gates in your home, it
may be a good idea to introduce a home security plan to build your home secu-
rity. Suppose, for example, that if someone came to your home and you had not
yet arrived, you could open the door to the talk with the help of smart cameras
and a security password and your roommate or relative could stand inside. You
can have navigation guides on your doors, gates, and garage that can be opened
with a single click of a smartphone.
• Save energy with Smart Energy conservation: Energy-saving may be a major
concern for each homeowner. With such well-equipped equipment, the amount
of energy consumption is increasing dramatically. Therefore, you will always
need to ensure that there is no amount of energy wastage and your home needs
to meet the energy efficiency requirement. With Smart Home products, you can
ensure that no lost cause is lost. Equipment and devices will all be able to be
managed and shut down after use when you have a Smart Home product. In the
case you are not in the room or you leave the room thinking that you will come
back and thus keep the lamp or fans turned on or back where you may carelessly
turn off the lights, you can benefit greatly from a Smart Home system that will
help you increase energy efficiency.
• Customize as per your convenience: It is very helpful with home automation
systems to customize smart appliances and devices in your home according to
your needs. At a time when you need to build up your heating system or you need
to reduce the temperature in an air conditioner or, on the other hand, you think
you need to turn on the water heater before you get home or you need to turn off
everything while simultaneously lying in bed, you can do it by clicking on your
smartphone. This outstanding character is not at all like our traditional homes.
12 Role of IoT in Smart Homes and Smart Cities: Challenges, Benefits, and Applications 211
• Smart Parking: The most important problem in cities is more than 30% of travel-
ers want to park. As many people move to cities more consistently, eventually,
the number of cars is expanding. Smart IoT parking makes life much easier;
parking spaces can be found and accessible online to book without delay.
However, it creates a decent channel of revenue for you.
• Smart City Infrastructure: We have underground pipes, a telephone line, a water
line, and electricity line, for example, how to track phone interruptions, water
leaks, and blackouts. IoT can quickly follow a problem to determine. It can be
scary ahead of time, in this case, to imagine how much time, effort, and human
resources can be saved.
• Public Transportation: Many carriers can track and transport online now via
GPS with IoT integration; they can no doubt follow their next move. As sensors
can transmit about the maintenance of protective infrastructure, it is possible in
natural environments and other systems. At present, railroads have not been able
to benefit from complex collision-avoidance programs, such as those used by
ships and aircraft, because the concept of railroads directs trains within inches of
each other.
• Weather Forecast: Perhaps, we do not have to rely on satellites in the future for
the weather. The weather can predict nerves. CO2, moisture, and the temperature
can be tracked by nerves. Because of the experience, we can deal with nature.
• Traffic and Street Lights: Traffic delays and other routes can be transmitted to
cell phones, external sensors, and street sensors; turn on street lights and turn off
when no vehicle is passing. Consider how much energy can be saved throughout
the city [54].
Retail and Education, etc. Therefore, Smart Cities will make our lives easier, more
comfortable, and safer [59–61]. Figure 12.3 shows the Smart City System which
consists of Smart Energy which is the usage of devices for energy effectiveness,
Smart Health which uses technology and the Internet for the treatment of the patients
and connecting with patients, Smart Home which uses various home appliances that
control and operate the home, Smart Government which relates to the government
which supports the idea of Smart City and helps the engineers with resources in
making it happen, Smart Mobility which indicates many different modes of trans-
portation which reduces traffic and improves the transfer speed, and Smart Retail
which refers to modern shopping technologies.
12.7 Conclusion
With the help of Internet of things, devices that can communicate with each other
via the Internet, access to information on the Internet, storage and retrieval of infor-
mation and communication with customers. The world has completely changed as
a result of the development of online applications. Cooperation in all situations
seems impossible without it. IoT can enhance its vision by enabling communication
between intelligent objects. IoT dependent on a Smart Home System can simply
work inside the eyes of the web. The quick improvement of IoT gadgets brings con-
cerns and advantages. Except if Wi-Fi is accessible, we can go to 3G or 4G admin-
istrations. This is one of the significant advantages of IoT. In this movement, the
utilization of a microcontroller camera can assist the customer with concluding
whether to welcome the following guest to get a caught picture of the visitor or the
aggressor. Assuming the client sees that he is more peculiar, the client can add a
similar picture to the police by explaining his status. IoT talks about the best way to
make the city smarter. To be sure, IoT can be used in a variety of contexts, for
example, building inspection and WSNs; environmental monitoring, for example,
gas filtering, the water level of ponds or soil moisture, waste management, smart
parking, and low CO2 vision; or independent driving. It is expected that by 2050
most cities will be powered by smart IoT devices which make cities smarter. All
used IoT equipment will assist connected technicians in managing and testing safety
concerns for the city’s residents. This ongoing infrastructure transformation will
help city experts to ensure reduced costs and improve the quality of life of rural
households [62]. It is clear that the IoT is the largest research subject and is impor-
tant for those involved in science to understand the research practice. This paper
provided an analysis of various IoT applications. This has led to a significant dem-
onstration of the use of IoT-based Smart Homes and Smart Cities and their opera-
tional goal, implementation, targeted challenges, and benefits.
References
1. Sindhwani, N., Maurya, V. P., Patel, A., Yadav, R. K., Krishna, S., & Anand, R. (2022).
Implementation of Intelligent Plantation System Using Virtual IoT. In Internet of Things and
Its Applications (pp. 305–322). Springer, Cham.
2. Srivastava, A., Gupta, A., & Anand, R. (2021). Optimized smart system for transportation
using RFID technology. Mathematics in Engineering, Science and Aerospace (MESA), 12(4),
953–965.
3. Karri V and Daniel Lim J S 2005 Method and Device to Communicate via SMS after a
Security Intrusion 1st International Conf. on Sensing Technology Palmerston North New
Zealand 21–23.
4. P. Rajiv, R. Raj, and M. Chandra, “Email-based remote access and surveillance system for
smart home infrastructure,” Perspectives in Science, vol. 8, pp. 459–461, 2016.
5. P. Bellavista, G. Cardone, A. Corradi, and L. Foschini, “Convergence of MANET and WSN in
IoT urban scenarios,” IEEE Sens. J., vol. 13, no. 10, pp. 3558– 3567, Oct. 2013.
6. R. Petrolo, V. Loscrì, and N. Mitton, “Towards a smart city based on cloud of things, a sur-
vey on the smart city vision and paradigms, “Transactions on Emerging Telecommunications
Technologies, vol. 28, no. 1, p. e2931, 2017.
7. Jin, J; Gubbi. J; Marusic, s.; Palaniswami, M. “ An Information Framework for creating a
Smart City through the Internet of Things.” IEEE Inter of Things Journal, 2014, Vol 1, Issue
2, pp. 112–121.
8. Javatpoint.com
9. Anand, R., Sinha, A., Bhardwaj, A., & Sreeraj, A. (2018). Flawed Security of Social Network of
Things. In Handbook of Research on Network Forensics and Analysis Techniques (pp. 65–86).
IGI Global.
10. P. Sadhukhan, “An IoT based framework for smart homes and smart city services,” in
Proceedings of the 2018 International Conference on Communication, Computing and Internet
of Things (IC3IoT), vol. 15–17, pp. 376–379, Chennai, India, February 2018.
11. Husam Rajab, Tibor Cinkler, “IoT based Smart Cities” https://doi.org/10.1109/
ISNCC.2018.8530997 June 2018
12 Role of IoT in Smart Homes and Smart Cities: Challenges, Benefits, and Applications 215
12. L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,” Computer Networks
vol. 54, no. 15, pp. 2787–2805, 2010.
13. Shouran, Zaied, Ashari, Ahmad & Priyambodo, Tri. (2019). Internet of Things (IoT) of Smart
Home: Privacy and Security. International Journal of Computer Applications. 182. 3–8. https://
doi.org/10.5120/ijca2019918450.
14. A. Zanella, N. Bui, A. Castellani, L. Vangelista and M. Zorzi, “Internet of Things for Smart
Cities,” in IEEE Internet of Things Journal, vol. 1, no. 1, pp. 22–32, Feb. 2014, https://doi.
org/10.1109/JIOT.2014.2306328.
15. Hammi, Badis & Khatoun, Rida & Zeadally, Sherali & Fayad, Achraf & Khoukhi, Lyes.
(2017). Internet of Things (IoT) Technologies for Smart Cities. IET Networks. 7. https://doi.
org/10.1049/iet-net.2017.0163.
16. Bhat, Omkar & Bhat, Sagar & Gokhale, Pradyumna. (2017). Implementation of IoT in Smart
Homes. 6. 149–154. 10.17148/IJARCCE.2017.61229.
17. Mukesh Kumawat | Mr. Durgesh Kumar | Dr. Garima Mathur “IOT Based Smart Cities” pub-
lished in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN:
2456-6470, Volume-3 | Issue-3, April 2019, pp.1433–1437.
18. Jain, N., Chaudhary, A., Sindhwani, N., & Rana, A. (2021, September). Applications of
Wearable devices in IoT. In 2021 9th International Conference on Reliability, Infocom
Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 1–4). IEEE.
19. Alaa, Musaab & Zaidan, A. & Bahaa, Bilal & Talal, Mohammed & Mat Kiah, Miss Laiha.
(2017). A Review of Smart Home Applications based on Internet of Things. Journal of
Network and Computer Applications. 97. https://doi.org/10.1016/j.jnca.2017.08.017.
20. Bin Sulaiman, Rejwan & Kareem, Amer. (2018). Impact of IoT to Make Cities Smart. SSRN
Electronic Journal. https://doi.org/10.2139/ssrn.3260817.
21. Alzubi, Jafar A., Manikandan, R., Alzubi, Omar. A., Gayathri N. and Patan, Rizwan (2019).
A Survey of Specific IoT Applications. International Journal on Emerging Technologies,
10(1): 47–53.
22. R. AL MOGBIL, M. AL ASQAH and S. EL KHEDIRI, “IoT: Security Challenges and Issues
of Smart Homes/Cities,” 2020 International Conference on Computing and Information
Technology (ICCIT-1441), 2020, pp. 1–6, https://doi.org/10.1109/ICCIT-144147971.2020.
9213827.
23. Sudha Kousalya, G. Reddi Priya, R. Vasanthi, B. Venkatesh, 2018, IOT Based Smart
Security and Smart Home Automation, INTERNATIONAL JOURNAL OF ENGINEERING
RESEARCH & TECHNOLOGY (IJERT) Volume 07, Issue 04 (April 2018)
24. Abdel Rahman H. Hussein, “Internet of Things (IoT): Research Challenges and Future
Applications” International Journal of Advanced Computer Science and Applications
(IJACSA), 10(6), 2019. https://doi.org/10.14569/IJACSA.2019.0100611
25. Mohd. Sameer, Mohd Anshid, R. Dubey, Rohith M V, Venkatesha B K “IOT Based Smart
Home Automation”, International Journal of Emerging Technologies and Innovative Research
(www.jetir.org), ISSN:2349-5162, Vol.8, Issue 7, page no.57–60, July-2021,
26. Neeraj Kaushik, “Smart Parking System Based on Internet of Things”, International Journal
of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349–5162, Vol.6,
Issue 5, page no.635–641, May-2019
27. Anjum Sheikh, “IoT Based Security System for Smart Homes”, International Journal of
Computer Sciences and Engineering, Vol.07, Special Issue.11, pp.35–38, 2019.
28. Neeraj Kumari, “Review on Internet of Things (IoT) Security”, International Journal of
Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved),
ISSN:2349-5162, Vol.5, Issue 12, page no. pp316– 319, December-2018,
29. Resource Description Framework (RDF) Model and Syntax Specification. Available at: http://
www.w3.org/TR/PR-rdf-syntax/
30. OWL - Semantic Web Standards. 2014. Available at: http://www.w3.org/2001/sw/wiki/OWL
31. Javadi E, Moshiri B, Yazdi HS. Activity Recognition In Smart Home Using Weighted Dempster-
Shafer Theory. Int J Smart Home. 2013;7(6):23–34. https://doi.org/10.14257/ijsh.2013.7.6.03
216 A. Tripathi et al.
32. SPARQL Query Language for RDF. 2014. Available at: http://www.w3.org/TR/
rdf-sparql-query/.
33. Eckman B, Feblowitz MD, Mayer A, Riabov A V. An ontological representation for Tsunami
early warning system. In: Advances in Engineering, Science and Management (ICAESM),
2012 International Conference on.Vol 54.; 2010:1–20. Available at: http://ieeexplore.ieee.org/
xpl/articleDetails.jsp?arnumber=6215579. Accessed April 3, 2014.
34. Singh, H., Rehman, T. B., Gangadhar, C., Anand, R., Sindhwani, N., & Babu, M. (2021).
Accuracy detection of coronary artery disease using machine learning algorithms. Applied
Nanoscience, 1–7.
35. Gupta, A., Anand, R., Pandey, D., Sindhwani, N., Wairya, S., Pandey, B. K., & Sharma,
M. (2021). Prediction of Breast Cancer Using Extremely Randomized Clustering Forests
(ERCF) Technique: Prediction of Breast Cancer. International Journal of Distributed Systems
and Technologies (IJDST), 12(4), 1–15.
36. Wang J, Cho J, Lee S, Ma T. Real-time services for future cloud computing enabled vehicle
networks. 2011 Int Conf Wirel Commun Signal Process. 2011:1–5. https://doi.org/10.1109/
WCSP.2011.6096957
37. A. Guna Selvi | S. Vibhithra | A. John Clement Sunder “IoT Based Water Quality Monitoring
System for Smart Cities” published in International Journal of Trend in Scientific Research
and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3, April 2021, pp.986–991,
38. Vinod Choudhary, Aniket Parab, Satyajit Bhapkar, Neetesh Jha, Ms. Medha Kulkarni,
“Design and Implementation of Wi-Fi-based Smart Home System” in International Journal Of
Engineering And Computer Science, Volume – 5 Issue -02 February.
39. S. Syed Imran, J. Vignesh, Vikash Kumar Singh, Dr. T. ArunPrasath, “SMART HOME
AUTOMATION BASED ON IoT using Arduino mega” in International Conference on Current
Research in Engineering Science and Technology (ICCREST-2016), E-ISSN:2348 – 8379
40. Juliette Dromard, Rida Khatoun, and Lyes Khoukhi. A watchdog extension scheme consider-
ing packet loss for a reputation system in a wireless mesh network. In Telecommunications
(ICT), 2013 20th International Conference on, pages 1–5. IEEE, 2013.
41. https://techcrunch.com/2016/10/10/hackers-release source-code-for-a-powerful-ddos-app
called mirai/, October 2016.
42. Juneja, S., Juneja, A., & Anand, R. (2019, April). Reliability Modeling for Embedded
System Environment compared to available Software Reliability Growth Models. In 2019
International Conference on Automation, Computational and Technology Management
(ICACTM) (pp. 379–382). IEEE.
43. Qi Jing, Athanasios V Vasilakos, Jiafu Wan, Jingwei Lu, and Dechao Qiu. Security of the
internet of things: Perspectives and challenges. Wireless Networks, 20(8):2481–2501, 2014.
44. Jiafu Wan, Jingwei Lu, and Dechao Qiu. Security of the internet of things: Perspectives and
challenges. Wireless Networks, 20(8):2481–2501, 2014.
45. Cui, Lei & Xie, Gang & Qu, Youyang & Gao, Longxiang & Yang, Yunyun. (2018). Security
and Privacy in Smart Cities: Challenges and Opportunities. IEEE Access. PP. 1–1. https://doi.
org/10.1109/ACCESS.2018.2853985.
46. Bouchard, K. and Giroux, S. 2015. Smart homes and the challenges of data. In Proceedings
of the 8th ACM International Conference on Pervasive Technologies Related to Assistive
Environments. 66.
47. Mennicken, S., Vermeulen, J. and Huang, E.M. 2014. From today’s augmented houses to
tomorrow’s smart homes: new directions for home automation research. In Proceedings of
the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing.
105–115. ACM.
48. Wilson, C., Hargreaves, T., and Hauxwell-Baldwin, R. 2015.Smart homes and their users: a
systematic analysis and key challenges. Personal and Ubiquitous Computing. 19, 2, 463–476.
49. Yang, H., Lee, H., and Zo, H., 2017. User acceptance of smart home services: An extension
of the theory of planned behavior. Industrial Management & Data Systems, 117(1), 68–89.
12 Role of IoT in Smart Homes and Smart Cities: Challenges, Benefits, and Applications 217
50. Shirehjini, A.A.N. and Semsar, A. 2017. Human interaction with IoT-based smart environ-
ments. Multimedia Tools and Applications. 76. 11.13343–13365.
51. Athreya, A. P. and Tague, P. 2013.Network Self Organization in the internet of things. IEEE
International Workshop of Internet-of-Things Networking and Control (IoT-NC), 25–33.
52. Park, E., Kim, S., Kim, Y., and Kwon, S.J. 2018. Smart home services as the next mainstream
of the ICT industry: determinants of the adoption of smart home services. Universal Access in
the Information Society.17, 1, 175–190.
53. Gupta, B., Chaudhary, A., Sindhwani, N., & Rana, A. (2021, September). Smart Shoe
for Detection of Electrocution Using Internet of Things (IoT). In 2021 9th International
Conference on Reliability, Infocom Technologies and Optimization (Trends and Future
Directions)(ICRITO) (pp. 1–3). IEEE.
54. Bin Sulaiman, Rejwan and Kareem, Amer, Impact of IoT to Make Cities Smart (October 4,
2018). Available at SSRN: https://ssrn.com/abstract=3260817 or https://doi.org/10.2139/
ssrn.3260817
55. Shukla, R., Dubey, G., Malik, P., Sindhwani, N., Anand, R., Dahiya, A., & Yadav, V.(2021).
Detecting crop health using machine learning techniques in smart agriculture system. Journal
of Scientific & Industrial Research, 80, 699–706.
56. Ande, P. & Rojatkar, D., 2017. A SURVEY: APPLICATION OF IOT. International Research
Journal of Engineering and Technology (IRJET), 4(10), p.4.
57. Singh, L., Saini, M. K., Tripathi, S., & Sindhwani, N. (2008). An Intelligent Control System
For Real-Time Traffic Signal Using Genetic Algorithm. In AICTE Sponsored National Seminar
on Emerging Trends in Software Engineering (Vol. 50).
58. Saini, M. K., Nagal, R., Tripathi, S., Sindhwani, N., & Rudra, A. (2008). PC Interfaced
Wireless Robotic Moving Arm. In AICTE Sponsored National Seminar on Emerging Trends in
Software Engineering (Vol. 50).
59. B. Hammi, R. Khatoun, S. Zeadally, A. Fayad and L. Khoukhi, “IoT technologies for smart
cities,” in IET Networks, vol. 7, no. 1, pp. 1–13, 1 2018.
60. Kohli, L., Saurabh, M., Bhatia, I., Shekhawat, U. S., Vijh, M., & Sindhwani, N. (2021). Design
and Development of Modular and Multifunctional UAV with Amphibious Landing Module.
In Data-Driven Approach Towards Disruptive Technologies: Proceedings of MIDAS 2020
(pp. 405–421). Springer Singapore.
61. Kohli, L., Saurabh, M., Bhatia, I., Sindhwani, N., & Vijh, M. (2021). Design and Development
of Modular and Multifunctional UAV with Amphibious Landing, Processing and Surround
Sense Module. Unmanned Aerial Vehicles for Internet of Things (IoT) Concepts, Techniques,
and Applications, 207–230.
62. Gupta, A., Asad, A., Meena, L., & Anand, R. (2023). IoT and RFID-Based Smart Card System
Integrated with Health Care, Electricity, QR and Banking Sectors. In Artificial Intelligence on
Medical Data (pp. 253-265). Springer, Singapore.
Chapter 13
Investigating Role of IoT
in the Development of Smart Application
for Security Enhancement
13.1 Introduction
13.1.1 IoT
The IoT is no more a technical hype. It’s a technology that has been silently chang-
ing our future for some time now. It is for this reason that we choose to make our
devices smart and take care of the things that will help us be more productive [1–3].
We’ve designed gadgets for collecting and sharing data and making accurate and
educated judgments using machine learning as well as neural networks by connect-
ing them and then with the Internet (complex mechanisms). The results it showed
are spectacular. Figure 13.1 shows the IoT architecture.
IoT solutions give users the ability to automate, analyze, and integrate their sys-
tems more deeply [2]. They increase the scope and precision of these areas. Sensors,
networks, and robots are all part of the IoT, which uses both established and new
technologies. Software advancements, reducing expenses on hardware, and a mod-
ern approach toward the technology are all exploited by IoT. There is a huge shift in
J. K. Pandey
Department of Electronics and Communication Engineering, Shri Ramswaroop Memorial
University, Barabanki, Uttar Pradesh, India
R. Jain
Department of Electrical and Computer Engineering, Wollega University, Nekemte, Ethiopia
R. Dilip
Department of Electrical and Electronics Engineering, Global Academy of Technology,
Bengaluru, India
e-mail: [email protected]
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 219
N. Sindhwani et al. (eds.), IoT Based Smart Applications,
EAI/Springer Innovations in Communication and Computing,
https://doi.org/10.1007/978-3-031-04524-0_13
220 J. K. Pandey et al.
Communicate
Trigger
action
Integrates
Device
Integrates /Sensors
Cloud
Provide info
Trigger
action
the field of delivery of products, goods, and services as a result of its new and
advanced elements.
The “smart home” is an excellent illustration of IoT in action. It’s possible to
operate the “things” in a connected focal point (i.e., settings related to temperature,
unlocking doors, etc.) through a mobile application or a website using Internet-
enabled devices such as thermostats, doorbells, smoke detectors, and security
alarms. IoT can be traced in a wide range of devices, industries, and settings, not
just inside the home. From classroom smart boards to medical devices which have
the potential of detecting symptoms of disease like Parkinson’s, the IoT is rapidly
making real and virtual worlds smarter [4].
Artificial intelligence, connectivity, sensors, and active participation are among the
most important aspects of IoT. Here’s a quick rundown of some key features:
M. Kumbhkar
Department of Computer Science, Christian Eminent College, Indore, Madhya Pradesh, India
e-mail: [email protected]
S. Jaiswal
Department of Computer Science & Information Technology, Guru Ghasidas
Vishwavidyalaya, Bilaspur, Chhattisgarh, India
B. K. Pandey
Department of Information Technology, College of Technology, Govind Ballabh Pant
University of Agriculture and Technology Pantnagar, U S Nagar, Uttarakhand, India
A. Gupta (*)
Department of Computer Science and Engineering, Vaish College of Engineering,
Rohtak, Haryana, India
D. Pandey
Department of Technical Education, IET, Dr. A.P.J. Abdul Kalam Technical University,
Lucknow, Uttar Pradesh, India
13 Investigating Role of IoT in the Development of Smart Application for Security… 221
With the power of data collecting, AI-based networks and algorithms, the Internet
of Things (IoT) makes nearly everything “smart” (as shown in Fig. 13.2), enhancing
every aspect of our lives [1–3]. Simply adding sensors to your refrigerator and cabi-
nets can help you know when your favorite milk and cereal are running short and
automatically place an order with your favorite grocery store.
For IoT networks, this means that big providers are no longer the only ones who
can connect to the IoT networks they provide. Smaller, more cost-effective net-
works can nonetheless serve a meaningful purpose. Between IoT, system devices
are these small networks.
Small Devices
As expected, devices have shrunk in size, cost, and power over the years. To achieve
its preciseness, scalability, and versatility, IoT relies on purpose-built tiny devices [4].
IoT’s benefits extend to every aspect of daily life and business. The Internet of
Things (IoT) has many advantages, including the following:
Enhanced customer engagement: At present problem-solving suffers from faults
and substantial weaknesses in precision; also, as previously mentioned, customer
commitment remains submissive. When it comes to engaging with audiences, IoT
transforms this process.
Data sensing
Internet of things
Device
connection
13.1.1.3 Disadvantages of the IoT
Although the IoT offers many advantages, it also has certain drawbacks, such as the
following:
IoT generates an ecosystem of connected gadgets that communicate via net-
works. This presents a security risk. It’s difficult to exert any sort of control over the
system, even with all the safeguards in place. As a result, users are vulnerable to a
wide range of cyber-attacks.
IoT provides a wealth of personal information without the user’s knowledge or
consent. Several users remain apprehensive about the IoT system’s ability to seam-
lessly interact with other systems. Concerned about having many systems that are
either incompatible or locked, they try to avoid installing new ones.
As with any other business technology, the Internet of Things must adhere
to rules.
Key duties and operations, such as system activation, action definitions, transmis-
sion, and findings, are handled by these devices to support specified goals and
actions. Sensors are a part of the Internet of Things. Sensors may be the most
significant piece of IoT hardware. Power management modules, radio modules, and
sensors are all included in these devices. The sensing module is in charge of a wide
variety of active and passive measurement instruments that feed data into it.
Accelerometers, temperature sensors, and magnetometers are only a few of the
devices utilized in IoT. Other devices include gyroscopes and image sensors, as well
as acoustical and light sensors.
13.1.2.1 Wearable Gadgets
13.1.2.2 Common Devices
The command center and remotes of the IoT remain desktop, tablet, and smart-
phone. In terms of system control, the desktop is the most user-friendly option. As
a remote control, the tablet provides access to the system’s most important function-
alities in a manner that resembles the desktop. The phone has a few important set-
tings that can be changed, as well as remote control capabilities. Other important
connected devices include routers and switches, as well as other conventional net-
work devices.
13.1.2.3 IoT and Software
Platforms, embedded systems, partner systems, and middleware all play a role in
IoT software’s major networking and action areas [2, 3]. Each of these individual
and master applications collects data, integrates devices, performs real-time analyt-
ics, and extends applications as well as processes among the IoT network. Integrating
with vital business systems (such as order management, robots, and more) is a key
component of their work.
An IoT decision framework is shown in Fig. 13.4.
224 J. K. Pandey et al.
Technology - - - - -
Security - - - - -
Standard - - - - -
and
regulation
13.1.3 Compilation of Information
The IoT system’s body is created by the software that supports integration, which
ties all system devices together. The IoT network is defined by these applications
since without them, the system is not an IoT system. To facilitate transmission for
handling are numerous gadgets, protocols, and restrictions of every device.
Input from a variety of apparatus is sent into these programmers, which transform it
into actionable information or clear patterns for human study. For automation-
related tasks or industry data, they use various settings and designs to analyze infor-
mation [5, 6] (indicated by Fig. 13.5).
13 Investigating Role of IoT in the Development of Smart Application for Security… 225
Infrastructure
Security
IoT Data
management
analytics
Analytic and
predictions
13.1.3.3 Adaptation and Enhancement
13.1.4.1 RFID and NFC
RFID [3] and NFC are easy, low-energy options for identification and access tokens,
connection bootstrapping, and payments and use radio transmitter/receivers to iden-
tify and track objects. It’s possible to communicate between a mobile phone and a
computer using NFC, which is an established set of rules and regulations for this
purpose.
226 J. K. Pandey et al.
Wi-fi
Sigfox
IoT RFID
LTE
BLE
13.1.4.2 BLE Device
The low-power, long-use requirements of the IoT function are supported by this
technology, which exploits a standard technology that is naturally aided across sys-
tems. BLE is shown in Fig. 13.7.
Communication links (e.g., wireless) must continue in hearing mode even when
sensors and other elements are turned off. Additionally, less use means a longer
lifespan for a device because of reduced energy consumption.
Using radio technologies like ZigBee, Z-Wave, and Thread, you may set up low-rate
private area networks. Even though these technologies consume a small amount of
electricity, they deliver a significant amount of data throughput. Without the usual
expenditures, this boosts the power of small local device networks.
13 Investigating Role of IoT in the Development of Smart Application for Security… 227
13.1.4.5 LTE-A
By enhancing both coverage and latency and improving throughput, LTE-A, also
known as LTE Advanced, represents an important step forward for LTE technology.
Expansion of the IoT’s range, particularly in the automobile and unmanned aerial
vehicle communication, provides it immense power.
13.1.4.6 Wi-Fi-Direct
There are several uses for IoT in every industry and market sector (shown in
Fig. 13.8). Those who wish to save money on their utility bills to major corporations
who want to simplify their operations are all included in the user base. When applied
to government and safety, the Internet of Things (IoT) has the potential to improve
law enforcement, defense, city planning, and economics. In addition to addressing
many of the present shortcomings, new technology also broadens the field of pos-
sible undertakings.
228 J. K. Pandey et al.
Smart
Home
Smart
Application
Connectd
Smart City
Car
industrial
Smart Grids
internet
Improving manufacturing, marketing, service delivery, and safety are all possible
outcomes of IoT implementation. A robust way of monitoring numerous processes
is provided by the Internet of Things, and actual openness enables more chances for
improvement. A high level of control provided by the Internet of Things (IoT)
enables speedy as well as effective action on opportunities, such as clear client
requirements, nonconforming products, and malfunctioning equipment.
13.1.5.2 Safety and Government
The Internet of Things (IoT) can improve law enforcement, defense, city planning,
and economic management when used to government and safety. The technology
fills in the current gaps, corrects many of the current defects, and also widens the
scope of endeavors.
13.1.5.3 Official and Domestic
Throughout our daily lives, the Internet of Things (IoT) provides a personalized
experience, from our homes and workplaces to the businesses we commonly do
business with. We are more satisfied, more productive, and safer as a result. As a
13 Investigating Role of IoT in the Development of Smart Application for Security… 229
result, the Internet of Things (IoT) can assist us in enhancing our work environ-
ments. As a case in point, Joan has a career in advertising. She walks into her office,
and the system identifies her.
13.1.5.4 Medicine and Health
Unlike current technologies, analytics, and big data, IoT acts comparably and more
deeply. This data can be used to develop metrics and patterns over time, although it
is generally lacking in depth and accuracy. With the help of IoT, this can be
improved.
13.1.5.6 Enhanced Marketing
An associated liability can arise from IoT’s security weaknesses and its ability to
perform specific activities. Device malfunction, attack, and data theft are the three
key concerns. They can cause a wide range of problems.
13.1.6.1 Fault in the Equipment
IoT devices put the entire network at risk, as well as anything that is directly
impacted. A hacked stove or fire sprinkler system could be the result of tremendous
integration and productivity, but it’s also the perfect opportunity for mayhem. The
most effective defenses target the weakest links and offer a range of customizable
features, including monitoring and access privileges. Anti-attack tactics can be sim-
ple and effective. To protect yourself and your company, you should look for gad-
gets that have built-in security.
Many people are drawn in by the allure of data that comes with the Internet of
Things. The importance of personal data to persons for crimes, stalking, and a
twisted sense of gratification are just a few of the reasons these people are inter-
ested. This hazard can be managed with the same tactics used to combat attacks.
13.2 Literature Review
Prior research in the subject of IoT is the topic of this section. IoT was coined by
Kevin Ashton. Many investigations into this topic have been conducted since then.
A wide range of industries, including consumer, industrial, infrastructural, and even
outer space, is already making use of IoT. This study focuses on the smart use of
IoT. The following authors will be briefly discussed in the upcoming section:
The Internet of Things (IoT) smart home study by Mustafa Asaad Omran et al.
[7] presented an overview of growing interest in IoT smart homes. IoT enables a
home automation system to remotely monitor and operate various electronic gad-
gets (HAS). The rationale for using smart houses and smart home engineering is
then discussed, as are the most commonly used wired and wireless communication
methods for smart homes.
When it comes to IoT, B R Vatsala et al. [8] stated that it will play an important
role in the near future. The Internet of Things (IoT) concept is that things, rather
than humans, may communicate with one other over the Internet. With enhanced
amenities like smart cities, homes, and hospitals, IoT can help people lead more
comfortable lives. People’s quality of life can greatly benefit from an examination
of Internet of Things (IoT) applications.
Abhishek Khanna and Kaur [9] reviewed a wide range of contributions from
researchers in diverse fields of application. In each application domain, these papers
were tested on a variety of criteria. Existing issues in these fields are also discussed.
For new researchers in this field, the study has also highlighted future IoT research
prospects to better prepare them for evaluating present IoT standings and develop-
ing unique ideas.
13 Investigating Role of IoT in the Development of Smart Application for Security… 231
In the premises of varied smart cities, Peng Su et al. [10] developed an SCI sys-
tem stationed on information islands. The SCI system’s smart monitoring of the
environment, smart transportation, and prevention of epidemics in a smart way
included a variety of application levels. The smart city information system was fur-
ther optimized for efficiency utilizing a multi-objective optimization method using
IoT and cloud computing technologies.
In S. Baskar et al. [11] developed trust model, different timely qualities are used
to identify the service’s reputation. The reputation was calculated based on the total
amount of trust a person can place in a person over time and in different contexts.
The service provider’s attributes and the unknown features were recurrently exam-
ined using deep machine learning to fuse the data. Confidence in service and appli-
cation responses was reduced by using a data fusion method to estimate trust levels.
False positives, ambiguity, data loss, computation time, and service dependability
were used to evaluate the suggested method’s performance.
Internet of Things (IoT) authentication mechanisms was thoroughly surveyed by
Yang and his colleagues [12]. These protocols were grouped into four categories:
(a) M2M, (b) Internet of Vehicles (IoV), (c) Internet of Energy (IoE), and (d) Internet
of Sensors (IoS). Presentations on IoT authentication protocols’ threats, counter-
measures, and formal security verification methodologies were given at the confer-
ence. For the IoT, an authentication protocol taxonomy and a comparison of those
protocols created for IoT networks were offered.
Interconnections between numerous objects and intelligent devices are provided
by the Internet of Things (IoT), according to Fadhil [13]. In IoT, data collection,
processing, and transmission are the three main pillars. Home, healthcare, telecom-
munications, environmental management, industry, construction, and energy use
IoT. The use of embedded devices in IoT technology is distinct from the use of
computers, laptops, and mobile devices. Security is becoming increasingly impor-
tant for IoT systems because of the exchange of personal data generated by sensors
and the ability to combine real and virtual worlds. Lightweight encryption methods
are also needed for the Internet of Things. That is why their research needed to focus
on IoT-specific security concerns and issues and then develop authentication meth-
ods that would help implement safe IoT services.
Yu Liu and colleagues [14] used lightweight block ciphers that were specifically
built for IoT, such as radiofrequency identification and sensor networking. Bansod
et al. proposed NUX, a 31-round iterative ultra-lightweight cipher. Using differen-
tial and linear analysis, they tested NUX’s resilience to these methods and searched
for 31-round differential properties and linear approximations. It was claimed dur-
ing the specification of design that the 25-round NUX was capable of withstanding
both asymmetrical and linear attacks. Their 29-round differential attack on NUX,
which was four rounds greater than the limit set by authors, was a success thanks to
the 22-round differential feature they discovered in their work. A 19-round linear
approximation of their paper which was a key recovery attack on NUX was also
revealed. Full NUX with a data complexity of 8 was also used to develop a distin-
guishing attack, which utilized the property of differential propagation over NUX to
build its distinguisher.
232 J. K. Pandey et al.
Reinforcement learning principles for smart city applications using IoT were
presented by R. Dhaya et al. [15]. Smart city applications and their interaction with
IoT are discussed in the first section. The smart city advances were discussed in the
next part, which included information on deep learning and reinforcement learning.
Experts in open fields (typically, neighborhoods or regions) faced a major challenge
in the efficient management of information that could aid new services in most
cases. In addition, it has defined an intellectual approach for inquiry obligations that
was trained using machine learning (ML). Mathematical functions were used to
bring a well-structured framework to remodel the decision-making process in any
game or task with greater complications.
The problem of energy harvesting about the Internet of Things with amalgam-
ated users was studied by Desheng Wang et al. [16], with three types of single-
antenna users: ID users who get information only, EH users who solely get energy,
and ID/EH users who get information and energy from a multi-antenna base station
at the same time via power splitting. With this goal in mind, they worked together to
create the transmitter power allocation and receiver power splitting technique to
maximize the minimal SINR for the two groups of ID and ID/EH users, both of
whom had to meet strict energy harvesting limits. To address the non-convex issues,
they used SDR, ZF, and MRT methods.
It was suggested by Ahmed Abdelgawad and Yelamarthi [17] that an SHM plat-
form with embedded IoT could determine the magnitude and location of damage in
structures. Among the components of the suggested platform are a Raspberry Pi
computer, a Wi-Fi module, analog-to-digital converters, a buffer, and a piezoelectric
sensor. Pairs of piezoelectric sensors were inserted into the framework, to measure
vibrations. Data gathered from piezoelectric sensors was utilized to calculate the
extent and location of the damage. By using a Raspberry Pi computer, the mathe-
matical model could determine if any structural damage had occurred and where it
might be located. Remote access to the data was made possible by storing it and
making it accessible from any mobile device. Using a lab testbed, the system was
proven to be reliable.
For Pallavi Sethi and Sarangi [18], the term IoT describes a paradigm in which
physical objects outfitted with sensors, actuators, and computers may exchange data
with one another. This new growing field was thoroughly surveyed for the most up-
to-date methods, protocols, and applications. An IoT taxonomy was developed in
this study, identifying some of the most essential technologies and highlighting spe-
cific applications that have the potential to significantly improve the lives of people,
particularly those who are differently abled and the elderly.
It was reported by Olutosin Taiwo and Ezugwu [19] that a cloud-based intelli-
gent home automation system had been designed and developed. Mobile applica-
tions regulate monitors and take account of the defense of residential surroundings.
Two modules work together to regulate and monitor the home’s electronic equip-
ment and environmental conditions, while one module monitored the defense sys-
tem of residence by detecting movements and taking photographs. Motion-activated
13 Investigating Role of IoT in the Development of Smart Application for Security… 233
cameras were utilized to collect photographs of items that had been spotted. Using
machine learning, they were able to distinguish between photos of normal house
inhabitants and those of an intruder. These findings were presented in this study
using the support vector machine technique, which was used to categorize aspects
of the images captured and assess whether or not the images were taken by an
intruder. Graphical representation of household activities was provided by the
mobile application’s design.
IoT-based technologies for geriatric healthcare applications were thoroughly
reviewed by Deblu Sahu et al. [20], who presented current and comprehensive
knowledge. Geriatric healthcare using IoT technology was also mentioned as a cur-
rent trend, concern, challenge, and future research field. Using the information in
this study, future solutions and cost-effective healthcare services can be developed
for the underserved. IoT’s influence on many healthcare areas, including AAL, tele-
medicine, automated technology, and wearable sensors in the senior census, was
also addressed by their paper. Additionally, the study reviewed the status of IoT-
enabled healthcare systems which address a variety of healthcare challenges, such
as serious disease management, neuro- and psychiatric ailments, cognitive disease,
and diagnosis.
By using the Internet of Things (IoT), Biljana Risteska Stojkoska et al. devel-
oped a hierarchical method for home healthcare systems [21]. A three-tier data man-
agement model, consisting of dew computing, fog computing, and cloud computing,
was established for optimal data flow in IoT employing residential care systems.
They employed a distributed fuzzy logic approach to testing their model in the con-
text of a quick fire detection system. Fire detection IoT systems with dew and fog
computing were shown to be very accurate, with minimal data delay, according to
the results.
A strategy named SCIB was proposed by Zhanyu Liu [22] to improve perfor-
mance and to expand the smart city industry even using big data analytics. They
started with big data and then moved on to digitalization of the data. It was then
uploaded to the cloud and stored there. The data processing, decision-making, and
data transfer processes were now completed by the application user’s requirements.
Simulated results were used to determine how well the proposed technique per-
formed in terms of delay, lifetime (duration), failure rate (frequency), congestion
rate (frequency), and throughput (throughput rate). At the same time as increasing
throughput and life expectancy, the SCIB technique minimizes the delay, failure
rate, and congestion.
A proposed agent-based architecture for knowledge discovery by Sajid Hussain
et al. [23] was utilized to extract knowledge from the fluctuation in the received
signal strength indicator (RSSI). An in-house experiment was undertaken to demon-
strate how RSSI may be used to uncover new information in an indoor environment.
Using Moteiv’s Tmote Sky sensors, a WSN was set up in a person’s bedroom to
monitor their sleeping habits and other physical activities. A WSN was also used to
track a person’s movement throughout a room and determine whether chairs were
234 J. K. Pandey et al.
occupied. Knowledge discovery and data mining will increasingly rely on fuzzy
logic and other machine learning approaches in the future. Context-aware services
and applications for end-users could also exist.
To figure out who is behind many virtual accounts, Kaikai Deng and his col-
leagues [24] believe there must be a method to do it. In their investigation, a random
forest confirmation algorithm concentrating on stable marriage matching was rec-
ommended since the many-to-many technique of user identification had a poor
accuracy rate. The random forest model was constructed using a user similarity
vector training set; subsequently, the candidate matching pairs were joined with the
secondary confirmation of the random forest model to form the final set of matches.
Insaf Ullah et al. [25] suggested that a person or party might delegate their sign-
ing power to a proxy agent. Existing methods of proxy sign-encryption security rely
on RSA, bilinear pairing, and elliptic curve cryptography (ECC). A reduced key
size was utilized in the hyperelliptic curve cryptosystem simultaneously paying due
importance to preserve the same level of security. To test for IND-CCA and enforce-
ability under adaptive chosen message assaults, the random oracle model was used
to evaluate the proposed scheme’s resilience (UU-ACMA). Security analysis and
comparisons with current schemes were carried out to demonstrate the relevance of
the proposed scheme. According to the findings, the suggested system provides
excellent safety while decreasing computational and communication costs.
It was postulated by David Perez Abreu et al. [26] that a new architecture for the
Internet of Things infrastructure may improve its resilience. Furthermore, technolo-
gies for implementing the architecture’s components were proposed. Within the
scope of the SusCity project, they presented their idea. They discovered that a single
IoT island may be linked to many gateways on various cloudlets, as well as to each
other. If there is a failure in the connection between a cloudlet and the cloud, this
gives an additional level of resilience.
Henry Tseng invented Multipath Load Balancing (MLB) Routing to replace
AODV routing for Zigbee [27]. He presented two major MLB concepts: layer
design and LOAD BALANCE. Nodes are arranged in layers based on the distance
from an IoT gateway to each node. There are multitudes of ways that IoT data may
be supplied to a node. This data is used by LOAD BALANCE to anticipate the load
of the next-hop layer nodes in the following cycle. MLB enables nodes to pick the
neighbors with the least traffic as their next-hops to minimize bottlenecks and dis-
tribute the load. Zigbee’s AODV and multipath variation of AODV were shown to
have lower load balancing, higher packet loss rates, and lower routing connectivity
ratios than MLB in the grid and random uniform topologies. Compared to other
suppliers, MLB’s routing solution for IoT applications was more compelling.
A SHSec-based architecture was presented by Pradip Kumar Sharma et al. [28]
to secure and manage the smart home network more efficiently and precisely while
also lowering deployment costs and performance overheads. Middleware SHSec
was used to assure the interoperability of various resource-constrained smart home
gadgets. An important part of SHSec’s mission was to generate and deploy security
13 Investigating Role of IoT in the Development of Smart Application for Security… 235
measures, such as threat prevention and mitigation. They tested the proposed model
in a real-time scenario in the hardware and software environments. A real-time
SHSec detection system has been demonstrated to be able to identify such assaults.
The SHSec was also found to be efficient and accurate, with minimum overhead
costs, according to their evaluation.
Three kinds of CSMs were used with an alignment extraction method to estimate
the ontology alignment in Yikun Huang et al. [29]. With their compact PSO, they
improved CSM aggregating weights and an alignment filtering threshold to assure
high-quality outcomes. According to the experimental results, the cPSO method
outperformed other state-of-the-art sensor ontology matching techniques in terms
of the quality of the alignments it produced.
High-quality and sophisticated fire alarm systems that employ a variety of sensor
values (such a flame detector, humidity, heat, and smoke detectors) to identify true
incidents of burning are necessary to assure safety [30]. Their study led to the devel-
opment of an adaptive neuro-fuzzy inference system (ANFIS) that can detect fires
and deliver warnings. Sensor nodes acquire essential data, in which fuzzy logic
transforms into a linguistic variable educated in ANFIS to determine the likelihood
of a fire occurring. In addition, a message was sent directly to the user’s smartphone
as part of their concept. Their technique makes use of small, low-cost sensors and
guarantees the reproducibility of the result. The experiments were carried out using
a MATLAB-based simulation, and the output was satisfactory.
Electronic Long Cane was described by Alejandro R. Garca Ramirez et al. [31]
to create communication architecture for visually impaired individuals in their envi-
rons based on IoT, as well as modifying the gadget for the human-smart cities’
context. As a result, visually impaired people can access information, enhancing the
capabilities of the electronic cane that was previously developed. To ensure the
long-term viability of the project, green IoT considerations were taken into account
by reducing power consumption and using cane parts that could be recycled. Solar
batteries, for example, might be used to extend the battery life of the electronic cane
and increase its environmental sustainability.
According to Vikram Puri and colleagues [32], blockchain technology could be
used to remove security and privacy concerns. It was a self-enforcing agreement
implanted in computer code governed by a blockchain that they created regulations
around. Hardware security, device safety, access and authentication policies, and
application security for the IoT network were all included in their proposal. It is
possible that blockchain-based solutions could provide the most effective ways to
address the security and privacy concerns related to the IoT network. In addition,
they assessed the IoT with blockchain network’s throughput and latency and com-
pared the IoT device’s power consumption during data requests with other proposed
systems.
Using contemporary web technologies, Edgardo Avilés-López and García-
Macías [33] proposed a framework and user-interaction model for the Internet of
236 J. K. Pandey et al.
Things apps. To illustrate their contributions, they used a case study to highlight the
user-interaction model and how it relates to the framework.
With the support of notable IoT innovators, Dimitrios Georgakopoulos and
Jayaraman [34] have offered the most effective answers to these technical issues and
have referred to them as the IoT platform. Several smart agricultural, smart grids,
and smart manufacturing applications have already been implemented using the
proposed IoT framework. Future studies and a vision for IoT infrastructure were
also highlighted.
According to Anuradha Singh [35] and her team, an intelligent waste alert sys-
tem collection was developed by delivering an immediate dust bin clean and gar-
bage fill level information to a municipality website. An Arduino Uno (Arduino) is
attached to a sensor composed of ultrasonic waves that monitor dust bin levels as
well as send a notification to the municipality’s web application when the bin is full.
An IoT-enabled integrated module was used to assist the entire process. The munici-
pal officials could keep tabs on the state of rubbish collection in real time thanks to
their system.
To decrease the number of time individuals spend waiting and boost their pro-
ductivity, Bhavani Ratakonda et al. [36] devised an innovative solution that also
reduced traffic in the exit area. In today’s environment, both the Internet of Things
and distributed computing are major innovations that cannot be ignored. Connected
devices and things may interact with each other through the Internet of Things
(IoT). We simply pay for what we use, since everything can be hosted on the cloud.
As soon as the automobile is put into the park, the obstacle sensor sends data to the
cloud about the presence of any obstacles. Entry and exit also use IoT technology to
alleviate payment processing bottlenecks and enable consumers to enter/leave the
shop space more quickly and efficiently.
13.3 Statement of Problem
It has been observed in previous research that if smart applications for security
enhancement are performed, then the process takes a lot of time [37, 38]. Moreover,
the security applications are unable to resolve hacker attacks. In previous researches,
there is no investigating role for security. On another hand, if researches focus on
IoT system, then it ignores the performance and enhancement of security for the
smart application. Researches that have integrated both approaches lack in render-
ing efficient performance. Considering all these aspects, there has been a need to
introduce a hybrid approach that could retain the performance of the system along
with security. Thus, the investigation of IoT mechanisms has been proposed for
enhancing the security of smart applications.
Table 13.1 shows the differences between previous research and proposed work.
13 Investigating Role of IoT in the Development of Smart Application for Security… 237
13.4 Proposed Work
IoT-based camera surveillance has been made automated and fast in the proposed
work. In the case of a traditional camera surveillance system, a person is required to
observe any suspicious activity. Moreover when the high definition recording of
11 days gets completed, then the removal of the recording of the previous 11 days
takes place. Thus existing camera surveillance is suffering from the issues such as
manual observation, lack of storage, and delay in notification. The proposed work is
going to eliminate the need for human intervention as well as other issues. Moreover,
the signal of suspicious activities is sent at remote locations. The proposed work has
also made use of an edge detection mechanism that has reduced the time consump-
tion of frame comparison. Moreover, the storage cost gets degraded as the frame
that would be captured is compressed and only the edge of the frame is considered,
as this system is going to notify of suspicious activity.
The details of the proposed work are highlighted in Table 13.2.
In Table 13.2, the area of surveillance, simulation tool, and technology has been
defined. Moreover, the objective of the research has been specified with the expected
threat. A surveillance camera has been used as a sensor.
In the proposed work (shown in Fig. 13.9), the captured image is compressed, and
an edge detection mechanism is applied to it. If there is any suspicious activity, then
an alarm is triggered to notify the administration. But if a fire pattern is detected,
then the fire brigade is also informed. The fire pattern would be detected using a
deep learning approach.
238 J. K. Pandey et al.
13.5 Results and Discussion
In Table 13.3 the time taken during frame comparison has been considered at an
interval of ten frames for the previous model where edge detection is not used and
the proposed model that is using edge detection before comparing frames. Its graph
is also displayed in Fig. 13.10.
In Table 13.4, the space consumption by different image frames in the case of the
previous model where edge detection is not used has been compared to the proposed
model that is using edge detection before comparing frames. Its graph is also dis-
played in Fig. 13.11.
13.6 Conclusion
It has been concluded that the proposed work has taken less time and space as com-
pared to the previous model. Moreover proposed work is providing a versatile solu-
tion of fire detection along with suspicious activity detection. The Internet of Things
(IoT) is the result of human curiosity and a desire to live a more comfortable and
connected lifestyle, which reduces effort and eliminates the risk of human mistakes.
13 Investigating Role of IoT in the Development of Smart Application for Security… 239
Start
No Yes
If suspicious
Trigger alarm
activity detected
No Yes
Call fire
If fire detected
brigade
IoT solutions enable customers to automate, analyze, and integrate their systems to
a greater extent. They broaden the breadth and accuracy of these fields. The Internet
of Things includes sensors, networks, and robotics, and it employs both old and new
technology [39, 40]. IoT makes use of software developments, lower hardware
costs, and a contemporary approach to technology. As a consequence of its innova-
tive and sophisticated aspects, there has been a significant change in the sphere of
product, commodities, and service delivery. Every company and the market area
may benefit from the Internet of Things (IoT). The user base includes everyone from
individuals looking to save money on their power bills to large organizations look-
ing to streamline their operations [41]. Since then, a slew of studies have been
undertaken on the subject. IoT is already being used in a variety of areas, including
consumer, industrial, infrastructure, and even outer space.
240 J. K. Pandey et al.
16
14
12 Time consumpt ion in
10 case of previous
8 model
6 Time consumpt ion in
4 case of proposed
2 model
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Fig. 13.10 Comparison of time consumption in the case of previous and proposed work
13.7 Future Scope
In the future, the breadth of this approach will be critical for IoT security. This tech-
nology has the potential to improve the security of smart applications for the
IoT system. Using an IoT system, this model’s safety might be improved even fur-
ther. Furthermore, a biometric system based on IoT might make use of such a
paradigm.
13 Investigating Role of IoT in the Development of Smart Application for Security… 241
900
800
700
600 Space consumpt ion
in case of previous
500
model (kb)
400
Space consumpt ion
300 in case of proposed
200 model (kb)
100
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Fig. 13.11 Comparison of space consumption in the case of previous and proposed work
References
1. Sindhwani, N., Maurya, V. P., Patel, A., Yadav, R. K., Krishna, S., & Anand, R. (2022).
Implementation of Intelligent Plantation System Using Virtual IoT. In Internet of Things and
Its Applications (pp. 305–322). Springer, Cham.
2. Bakshi, G., Shukla, R., Yadav, V., Dahiya, A., Anand, R., Sindhwani, N., & Singh, H. (2021).
An Optimized Approach for Feature Extraction in Multi-Relational Statistical Learning.
Journal of Scientific and Industrial Research (JSIR), 80(6), 537–542.
3. Srivastava, A., Gupta, A., & Anand, R. (2021). Optimized smart system for transportation
using RFID technology. Mathematics in Engineering, Science and Aerospace (MESA), 12(4),
953–965.
242 J. K. Pandey et al.
4. Gupta, A., Srivastava, A., & Anand, R. (2019). Cost-effective smart home automation using
internet of things. Journal of Communication Engineering & Systems. 9(2), 1–6.
5. Sengupta, R., Sengupta, D., Kamra, A. K., & Pandey, D. (2020). ARTIFICIAL INTELLIGENCE
AND QUANTUM COMPUTING FOR A SMARTER WIRELESS NETWORK. ARTIFICIAL
INTELLIGENCE, 7(19), 2020.
6. Pandey, B. K., Pandey, D., Wariya, S., Aggarwal, G., & Rastogi, R. (2021). Deep Learning
and Particle Swarm Optimisation-Based Techniques for Visually Impaired Humans’ Text
Recognition and Identification. Augmented Human Research, 6(1), 1–14.
7. Omran, M. A., Saad, W. K., Hamza, B. J., & Fahe, A. (2021). A survey of various intelli-
gent home applications using IoT and intelligent controllers. Indonesian Journal of Electrical
Engineering and Computer Science, 23(1), 490–499. https://doi.org/10.11591/ijeecs.v23.
i1.pp490-499
8. B R, V., & Dr. C, V. (2019). Analysis of Smart Applications using the Internet of Things.
Ijarcce, 8(3), 109–113. https://doi.org/10.17148/ijarcce.2019.8321
9. Khanna, A., & Kaur, S. (2020). Internet of Things (IoT), Applications and Challenges: A
Comprehensive Review. In Wireless Personal Communications (Vol. 114, Issue 2). Springer
US. https://doi.org/10.1007/s11277-020-07446-4
10. Su, P., Chen, Y., & Lu, M. (2021). Smart city information processing under the internet of
things and cloud computing. Journal of Supercomputing, 0123456789. https://doi.org/10.1007/
s11227-021-03972-5
11. Baskar, S., Selvaraj, R., Kuthadi, V. M., & Shakeel, P. M. (2021). Attribute-based data fusion
for designing a rational trust model for improving the service reliability of internet of things
assisted applications in smart cities. Soft Computing, 25(18), 12275–12289. https://doi.
org/10.1007/s00500-021-05910-2
12. Yang, T., Zhang, G. H., Liu, L., & Zhang, Y. Q. (2020). A survey on authentication proto-
cols for the internet of things. Journal of Cryptologic Research, 7(1), 87–101. https://doi.
org/10.13868/j.cnki.jcr.000352
13. Fadhil, S. A. (2021). Internet of Things security threats and key technologies. Journal of
Discrete Mathematical Sciences and Cryptography, 2021. https://doi.org/10.1080/0972052
9.2021.1957189
14. Liu, Y., Liu, X., & Zhao, Y. (2019). Security cryptanalysis of NUX for the internet of things.
Security and Communication Networks, 2019. https://doi.org/10.1155/2019/2062697
15. Dhaya, R., Kanthavel, R., Algarni, F., Jayarajan, P., & Mahor, A. (2020). Reinforcement
learning concepts ministering smart city applications using IoT. EAI/Springer Innovations in
Communication and Computing, April, 19–41. https://doi.org/10.1007/978-3-030-34328-6_2
16. Wang, D., Liu, H., Ma, X., Wang, J., Peng, Y., & Wu, Y. (2017). Energy harvesting for the inter-
net of things with heterogeneous users. Wireless Communications and Mobile Computing,
2017. https://doi.org/10.1155/2017/1858532
17. Abdelgawad, A., & Yelamarthi, K. (2017). Internet of things (IoT) platform for structure
health monitoring. Wireless Communications and Mobile Computing, 2017. https://doi.
org/10.1155/2017/6560797
18. Sethi, P., & Sarangi, S. R. (2017). Internet of Things: Architectures, Protocols, and Applications.
Journal of Electrical and Computer Engineering, 2017. https://doi.org/10.1155/2017/9324035
19. Taiwo, O., & Ezugwu, A. E. (2021). Internet of Things-Based Intelligent Smart Home Control
System. Security and Communication Networks, 2021. https://doi.org/10.1155/2021/9928254
20. Sahu, D., Pradhan, B., Khasnobish, A., Verma, S., Kim, D., & Pal, K. (2021). The Internet
of Things in Geriatric Healthcare. Journal of Healthcare Engineering, 2021. https://doi.
org/10.1155/2021/6611366
21. Stojkoska, B. R., Trivodaliev, K., & Davcev, D. (2017). Internet of things framework for
home care systems. Wireless Communications and Mobile Computing, 2017. https://doi.
org/10.1155/2017/8323646
22. Liu, Z. (2018). Research on the Internet of Things and the development of smart city
industry based on big data. Cluster Computing, 21(1), 789–795. https://doi.org/10.1007/
s10586-017-0910-8
13 Investigating Role of IoT in the Development of Smart Application for Security… 243
23. S. Hussain, S. Z. Erdogan, and K. Food, “Knowledge Discovery for Smart Applications using
Wireless Sensor Networks Knowledge Discovery for Smart Applications using Wireless
Sensor Networks,” no. October, 2014.
24. Deng, K., Xing, L., Zhang, M., Wu, H., & Xie, P. (2019). A Multiuser Identification Algorithm
Based on Internet of Things. Wireless Communications and Mobile Computing, 2019. https://
doi.org/10.1155/2019/6974809
25. Ullah, I., Alkhalifah, A., Khan, M. A., & Mostafa, S. M. (2021). Cost-Effective Proxy
Signcryption Scheme for Internet of Things. Mobile Information Systems, 2021, 1–10. https://
doi.org/10.1155/2021/2427434
26. Abreu, D. P., Velasquez, K., Curado, M., & Monteiro, E. (2017). A resilient Internet of Things
architecture for smart cities. Annales Des Telecommunications/Annals of Telecommunications,
72(1–2), 19–30. https://doi.org/10.1007/s12243-016-0530-y
27. Tseng, C. H. (2016). Multipath Load-Balancing Routing for Internet of Things. Journal of
Sensors, 2016. https://doi.org/10.1155/2016/4250746
28. Sharma, P. K., Park, J. H., Jeong, Y. S., & Park, J. H. (2019). SHSec: SDN based Secure Smart
Home Network Architecture for Internet of Things. Mobile Networks and Applications, 24(3),
913–924. https://doi.org/10.1007/s11036-018-1147-3
29. Huang, Y., Xue, X., & Jiang, C. (2020). Semantic Integration of Sensor Knowledge on
Artificial Internet of Things. Wireless Communications and Mobile Computing, 2020. https://
doi.org/10.1155/2020/8815001
30. Sarwar, B., Bajwa, I. S., Jamil, N., Ramzan, S., & Sarwar, N. (2019). An intelligent fire warning
application using IoT and an adaptive neuro-fuzzy inference system. Sensors (Switzerland),
19(14). https://doi.org/10.3390/s19143150
31. Ramirez, A. R. G., González-Carrasco, I., Jasper, G. H., Lopez, A. L., Lopez-Cuadrado, J. L.,
& García-Crespo, A. (2017). Towards Human Smart Cities: Internet of Things for sensory
impaired individuals. Computing, 99(1), 107–126. https://doi.org/10.1007/s00607-016-0529-2
32. Puri, V., Priyadarshini, I., Kumar, R., & Van Le, C. (2021). Smart contract based policies
for the Internet of Things. Cluster Computing, 24(3), 1675–1694. https://doi.org/10.1007/
s10586-020-03216-w
33. Avilés-López, E., & García-Macías, J. A. (2012). Mashing up the Internet of Things: A frame-
work for smart environments. Eurasip Journal on Wireless Communications and Networking,
2012, 1–11. https://doi.org/10.1186/1687-1499-2012-79
34. Georgakopoulos, D., & Jayaraman, P. P. (2016). Internet of things: from internet-scale sensing
to smart services. Computing, 98(10), 1041–1058. https://doi.org/10.1007/s00607-016-0510-0
35. Anuradha, S., & Tiwari, P. (2021). Smart Dustbin Using IOT Notification. Madan Mohan
Malaviya University of Technology.
36. Ratakonda, B., Avvari, P., Rajarao, B., Sreevani, V., & GanapathiRaju, N. V. (2021). Smart
Parking for Smart Cities using IoT. E3S Web of Conferences, 309, 01128. https://doi.
org/10.1051/e3sconf/202130901128
37. M.K. Saini, R. Nagal, S. Tripathi, N. Sindhwani and A. Rudra, “PC Interfaced Wireless
Robotic Moving Arm”. In AICTE Sponsored National Seminar on Emerging Trends in
Software Engineering (Vol. 50), 2008.
38. L. Singh, M.K. Saini, S. Tripathi and N. Sindhwani, “An Intelligent Control System For Real-
Time Traffic Signal Using Genetic Algorithm”. In AICTE Sponsored National Seminar on
Emerging Trends in Software Engineering (Vol. 50), 2008.
39. Pramanik, S., Samanta, D., Dutta, S., Ghosh, R., Ghonge, M., & Pandey, D. (2020, December).
Steganography using Improved LSB Approach and Asymmetric Cryptography. In 2020 IEEE
International Conference on Advent Trends in Multidisciplinary Research and Innovation
(ICATMRI) (pp. 1–5). IEEE.
40. Shukla, R., Dubey, G., Malik, P., Sindhwani, N., Anand, R., Dahiya, A., & Yadav, V. (2021).
Detecting crop health using machine learning techniques in smart agriculture system. Journal
of Scientific and Industrial Research (JSIR), 80(08), 699–706.
41. Gupta, A., Asad, A., Meena, L., & Anand, R. (2023). IoT and RFID-Based Smart Card System
Integrated with Health Care, Electricity, QR and Banking Sectors. In Artificial Intelligence on
Medical Data (pp. 253-265). Springer, Singapore.
Chapter 14
Role of Augmented Reality and Internet
of Things in Education Sector
14.1 Introduction
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 245
N. Sindhwani et al. (eds.), IoT Based Smart Applications,
EAI/Springer Innovations in Communication and Computing,
https://doi.org/10.1007/978-3-031-04524-0_14
246 M. Nijhawan et al.
physical devices built into certain computer devices for collection, communication,
and understanding. Interact with them. AR, when integrated with the IoT and vice
versa, helps develop platform solutions for current and future challenges arising
from the gap between device data and human perception [8].
Even after the coronavirus, the educational sector had already become more
technologically savvy. For this reason, the industry is currently focused on evaluat-
ing and adopting new technologies such as AR and IoT integration. This brings new
awareness and visibility into the existing environment and allows us to enter the
world of smart and digital education [13]. Many industries are implementing these
technologies in education and training, different age groups, and different devices to
improve and motivate users’ learning concepts in different subjects and languages
[6, 7, 14–16]. This research will help users understand the role of IoT and AR in the
education sector and the perceptions and challenges they face when using these
technologies. The objectives of the study are given below:
• Understanding the role of IoT in the education system
• To study the role of AR in IoT in enhancing the education sector
• To study the existence of AR in the education sector and the different challenges
faced by users
14.2 Literature Survey
Studying is a very important part of a student’s life. The theoretical and long text
appeals boring especially to kindergarten children. This paper is evaluating how
much work is done in different subjects for these preschoolers in the past 10 years
in the educational sector. Many studies found that when the students get exposure to
learning different subjects like story reading and English vocabulary in an aug-
mented reality environment, then this will influence the reading habits and retelling
and recalling skills [17] as compared to learning the same concepts using the tradi-
tional approach. Another important thing that came out from the literature review is
the importance and usage of AR, which has shown better results in almost all the
cases in the past few years in the education sector. It has been identified by many
researchers that still a lot of research is required in designing the content for pre-
schoolers to get maximum advantage of augmented reality.
Work on augmented reality has been done on different age groups in different
subjects:
Researchers have researched many subjects and topics like vocabulary, learning
vowels, art, story reading, puzzles, flashcards, match cards, and educational toys for
kindergarten students. Many studies found that when the child gets exposure to
14 Role of Augmented Reality and Internet of Things in Education Sector 247
learning different subjects like story reading and English vocabulary in an aug-
mented reality environment, then this will influence the reading habits and retelling
and recalling skills of children as compared to learning the same concepts using the
traditional approach. Another important thing that came out from the literature
review is the importance and usage of AR, which has shown better results in almost
all the cases in the past few years in the education sector. Superimposing of objects
on the devices has shown great interest especially in kindergarten children.
Lots of studies have shown the remarkable results of AR in subjects like mathemat-
ics and science as compared to other fields like humanities, art, or social studies.
The use of mobile AR (MAR) is showing a tremendous impact on students’ learn-
ing, recalling, and thinking abilities. AR is also shown a boom in game-based learn-
ing, especially in younger children.
AR in higher education is also used in the fields like science and technology or
engineering as compared to other streams like business, law, humanities, or art. Due
to increasing advancements of smart objects, sensors, big data, etc., the enchant-
ment in IoT is also getting increased in the teaching, learning, management, and
training sector [12]. Users’ growing interest is seen in STEM (science, technology,
engineering, and mathematics) education in many countries by combining IoT-
based framework with their lab-based practical and problem-solving projects. This
is showing the great scope for IoT in constructing smart education.
Augmented reality or IOT uses hardware and software both of which are integrated
and finally used by the users. The devices used in AR are computer systems, track-
ing devices, display devices, etc. Monitor-based displays and video-based displays
are the two important and main displays used in AR [18]. Lots of studies show that
mainly three types of AR categories are used in AR in the education sector [19].
(a) Marker-based AR
(b) Markerless AR
(c) Location-based AR
248 M. Nijhawan et al.
14.2.5 Head-Mounted Displays
These devices are worn by the user on his/her head to get the experience of AR. Here
will show small images or videos in front of the user. Handheld devices are the types
of devices that users can hold in their hands like mobile devices or tablets to get the
experience of AR in the 3D or video view.
A lot of spatial devices like projectors, hand gloves, or pinch gloves are used in
the education system where there is no need to hold anything or wear it on the head.
These devices are quite becoming popular these days. Many schools and institutes
have started teaching practical things to children using this mode of technology.
With the modernization of these upcoming technologies, it has been found that chil-
dren get more interest in learning the subject as compared to an older model of
teaching. Similarly, IoT uses advanced RFID sensors and other hardware devices
with the help of the Internet to build smart glasses, smart campuses, and smart edu-
cation systems. Lots of scope and challenges have been seen in implementing IoT
in the education system [12].
14.3 Research Methodology
( b) The research was done on secondary data using the above parameters.
(c) Research objectives were identified based on the literature review.
(d) This study is also based on primary data which was collected from different
graduates from Delhi NCR. The relevant questionnaire was prepared to find the
awareness, how often these technologies are used, comparison from the tradi-
tional approach, impact, and perception to continue to learn with these tech-
nologies in the education sector.
The augmented reality era isn’t a brand-new issue. It has been utilized in fields such
as military; medicine; engineering design; robotic; telerobotic; manufacturing,
protection, and restore applications; patron design; mental treatments, etc.
Technologies and net are popular, as realistic scenarios humans nonetheless opt for
analyzing books in preference to going through monitors and textbooks are
nonetheless broadly used. Another exciting utility of this era is in augmented truth
textbooks [17].
–– People who have no computer background can have still rich interactions with
augmented reality [20].
–– Augmented reality helps kindergarten students in improving their memory
skills [18].
–– Augmented reality helps in learning languages like Chinese [21].
–– It enhances interaction and attention and facilitates learning, creativity, and spa-
tial ability.
–– It helps to inspect 3D objects from different angles which improves understand-
ing concepts.
–– It increases motivation and concentration level.
–– It assists in establishing a link with real-life experiences.
–– It facilitates emotional attachment, more involvement, and participation in dra-
matic play [19].
–– It improves technical creativity, sound, and engineering [18].
–– It also helps to improve retelling, recalling, and comprehensive skills in stories.
250 M. Nijhawan et al.
–– Augmented reality improves learning vowel usage, the number concepts, and
vocabulary learning in different languages [21].
–– Augmented reality is used to improve pronunciation skills [22].
–– Augmented reality is used for story reading, puzzles, and flash and match
cards [21].
–– It is used for dramatic play activities using a robot system [16].
–– It is a mobile-based application for kindergarten children which acts as an edu-
cational toy.
It has been noticed that the use of AR can impact visual aid and hampers social abil-
ity skills especially in school children [2]. Children will be busy with tablets/mobiles
all the time and will be interacting less socially [3]. Another limitation being found
is that younger teachers are more willing and feel confident to use this type of tech-
nology instead of experienced teachers. It has been seen that the budget for daily
teaching is also limited for each school to give learning to the individual child.
Students might be confused with overloaded information or fantasy environment
[6]. Sometimes inflexibility of content also is challenging [6]. Sometimes screen
size is also another concern for their children, or usability principles of AR need to
be explored [23]. Sometimes handheld AR devices have shown challenges for
smaller kids because whenever they hold these devices in their hands and get com-
pletely involved in the system, there are the chances they leave the devices from
their hands.
The Internet of Things has a direct and indirect effect on the education sector. IoT
improves the quality of education and simplifies the overall work. The learning and
teaching processes are vastly affected by it. There is a real need for the IoT to be
implemented in the assessment area of education because it is well suited for real
implementation. The major aspect will be upgraded after core areas such as teach-
ing, learning, and assessment are considered [24].
14 Role of Augmented Reality and Internet of Things in Education Sector 251
IoT solutions can be integrated into school environments in a variety of ways. Here
are some applications (as shown in Fig. 14.1) where it can be used [18]:
1 . Teaching foreign languages
2. Project-based learning
3. Education in physical fitness
4. Monitoring attendance automatically
5. Special education for disable students
1. Teaching foreign languages: Foreign immersion environments combine listen-
ing, iterating and communicating into the real-time experience. Research shows
foreign language learning is improved by using IoT.
When used in foreign language simulations, the use of connected hardware
facilitates the learning process while freeing up instructors to facilitate the pro-
cess themselves. Learning with IoT enhances the education process. When it
comes to learning a foreign language, there are even more advantages.
Aiding in the development of focus: Students with ADHD are often distracted
throughout the class. A device like Muse, a headband that measures brain activ-
ity, can assist these children in improving their focus.
A few challenges faced by using IoT in the education sector are as follows:
• Privacy and security are the main concern while using IoT in the education sec-
tor [12].
• Curriculum designing and integration with IoT are again the biggest challenges
faced by users [13].
• Legal and political issues are again a few challenges lying ahead [12].
The following analysis in augmented reality shows the role and awareness in the
education sector.
The pie chart in Fig. 14.2 shows that those in the 18–22 and 22–30 age groups,
who are recent graduates or have graduated, are familiar with the term AR. Most
students are familiar with the concept of augmented reality. The upcoming young
generation is curious and engaged in learning with new technologies.
The chart in Fig. 14.3 shows that most of the users are familiar with the term
augmented reality, but only 50% of the uses are using this technology. The problem
here is that people only know this term; they don’t know how to use it in their
daily life.
Figure 14.4 shows the usage of AR in recent years.
This is an upcoming technology that has not yet been developed, so people will
not use it often. We can see from Fig. 14.5 that the people who frequently use this
technology are only 13% of 100%. Only around 13% of people know the actual use
of AR. If compared, this is low worldwide. And the main concern is that 16.5% of
people simply don’t know about technology. As a result, the usability of AR is
reduced. AR needs to be more expansive than it needs to be in the future.
This is a great start for all of us because more than 51% of the responses are in
the favor of AR-based learning (as shown in Fig. 14.6). More than 51% of the
responses said that AR-based learning is better which shows that there is a change
in the mentality of the people, and they are more interested in AR learning. More
than 20% of the total responses thought that AR is extremely a better learning and
14 Role of Augmented Reality and Internet of Things in Education Sector 255
Fig. 14.6 Opinion of users in using AR as compared to the traditional approaches of learning
there is no way better than this. Around 22.9% of the total responses feel that both
are equal and should be given equal importance to traditional and AR approach.
The best part is that almost no one wants to discontinue this technology, and they
thought it is the future. Over 65% of respondents want to continue this technology
as depicted in Fig. 14.7. Out of total responses, 32.1% would like to experience
more about this technology and rest less than 1% does not want to continue using
this technology.
Figure 14.8 shows that 48.6% of the responses are in the preferences of AR in the
educational sector and they feel that AR will have a great impact on Education. A
total of 46.8% are satisfied with the AR in education, and they feel that AR will have
a good impact on the development of students in education. Of the people 4.6% are
still thinking about AR, and they have yet to decide which way to go. A total of
95.4% showed a positive response which shows AR has a bright future.
120.00%
100.00%
80.00%
60.00%
40.00%
20.00%
0.00%
wish to use in daily life wish to continue in future
120.00%
100.00%
97.06%
80.00%
60.00%
61.76%
40.00%
20.00%
0.00%
wish to use in daily life wish to continue in future
Fig. 14.10 Perception of the user to continue this in future and use in daily life
14.10 Conclusion
This review article has summarized the importance of augmented reality (AR) as
well as IoT in the education system. Using both of these technologies, learning and
teaching methods may be improved to a large extent. These two techniques may be
collaborated with each other resulting in making educational system much
better. This study has shown how AR applications yield useful information to the
teachers and students [32]. The students are able to learn much easier without
having a stress.
258 M. Nijhawan et al.
14.11 Future Scope
It has been identified by many researchers that still a lot of research is required in
designing the content for preschoolers to get maximum advantage of augmented
reality. If this will start from an early age group, then this will improve the overall
development of the child [4]. Lots of awareness, content creation, and better cur-
riculum designing are required in AR [19].
References
1. Akçayir, G. (2016). “Advantages and challenges associated with augmented reality for educa-
tion: A systematic review of the literature.” Educational Research Review (2016), https://doi.
org/10.1016/j.edurev.2016.11.002.
2. Bhadra, A., Brown J., Ke, H., Liu, C., Shin, E., Wang, X., & Kobsa, A. (2016). “ABC3D –
Using An Augmented Reality Mobile Game to Enhance Literacy in Early Childhood.”
3. Chan, K. (2019, June). “Using Augmented Reality Flashcards to Learn Vocabulary in Early
Childhood Education.” Journal of Educational Computing Research 0(0) 1–20.
4. Chen, Y. & Zhou, D. (2017, June). “Application of Augmented Reality for Early Childhood
English Teaching.” 978-1-5090-3031-6/17 $31.00 2017 IEEE https://doi.org/10.1109/
ISET.2017.34
5. Cieza, E. & Lujan, D. (2018). “Educational Mobile Application of Augmented Reality
Based on Markers to Improve the Learning of Vowel Usage and Numbers for Children of a
Kindergarten in Trujillo.” Procedia Computer Science 130 (2018) 352–358.
6. Danaei, D., Jamali, H., Mansourian, Y & Rastegarpour, H. (2020). “Comparing reading com-
prehension between children reading augmented reality and print storybooks.” Retrieved from
URL http://www.elsevier.com/locate/compedu
7. Desierto, A., Sushmita, A., Arroyo, J & Jhone, P. “GoonAR: A Bilingual Children Storybook
through Augmented Reality Technology Using Unity with Vuforia Framework.” Retrieved
from URL http://www.warse.org/IJATCSE/static/pdf/file/ijatcse180932020.pdf
8. SAS Education Analytics. (N.d.). “IoT Analytics for education.” Retrieved from URL https://
www.sas.com/en_us/industry/education/technology/iot.html
9. Sindhwani, N., Maurya, V. P., Patel, A., Yadav, R. K., Krishna, S., & Anand, R. (2022).
Implementation of Intelligent Plantation System Using Virtual IoT. In Internet of Things and
Its Applications (pp. 305–322). Springer, Cham.
10. Bakshi, G., Shukla, R., Yadav, V., Dahiya, A., Anand, R., Sindhwani, N., & Singh, H. (2021).
An Optimized Approach for Feature Extraction in Multi-Relational Statistical Learning.
Journal of Scientific and Industrial Research (JSIR), 80(6), 537–542.
11. Gupta, A., Srivastava, A., Anand, R., & Tomažič, T. (2020). Business Application Analytics
and the Internet of Things: The Connecting Link. In New Age Analytics (pp. 249–273). Apple
Academic Press.
12. Anand, R., Sinha, A., Bhardwaj, A., & Sreeraj, A. (2018). Flawed Security of Social Network of
Things. In Handbook of Research on Network Forensics and Analysis Techniques (pp. 65–86).
IGI Global.
13. Cohen, M. (N.d.). “An Introduction to IoT Applications in Education.” Retrieved from URL
https://www.iotforall.com/introduction-iot-applications-in-education
14. Han, J., Jo, M., Hyun, M & So, H. (2015). “Examining young children’s perception toward
augmented reality-infused dramatic play.” Education Tech Research Dev (2015) 63:455–474
15. Kassim, H. & Kassim A. (2019, June). “The Internet of Things in Language Teaching and
Learning.”
14 Role of Augmented Reality and Internet of Things in Education Sector 259
16. Pan, z., López, M., Li, C & Liu, M. (2021, February 11). “Introducing augmented reality in
early childhood literacy learning.” Research in Learning Technology Vol. 29, 2021
17. Lee, K. (2012). “Augmented Reality in education and training.” Volume 56, Number 2
18. Kesim, Mehmet, and Yasin Ozarslan. “Augmented reality in education: current technologies
and the potential for education.” Procedia-social and behavioral sciences 47 (2012): 297–302.
19. Bacca Acosta, Jorge Luis, et al. “Augmented reality trends in education: a systematic review
of research and applications.” Journal of Educational Technology and Society, 2014, vol. 17,
núm. 4, p. 133–149 (2014).
20. Kesima, M. & Ozarslanb, Y. (2012). “Augmented reality in education: current technologies
and the potential for education.” Procedia – Social and Behavioral Sciences 47 (2012) 297–302
21. Huanga, Y., Lia, H. & Fonga, R. (2015, Aug 04). “Using Augmented Reality in early art edu-
cation: a case study in Hong Kong kindergarten.” Retrieved from URL https://doi.org/10.108
0/03004430.2015.1067888
22. Jamiat, N. & Othman, N. (N.A.). “Effects of Augmented Reality Mobile Apps on Early
Childhood Education Students’ Achievement.”
23. Digiteum. (n.d.). “How IoT is used in education: IoT Applications in education.”
24. Gul, S. & Asif, M. (2017). “A survey on the role of the internet of things in Education.”
25. L. Kohli, M. Saurabh, I. Bhatia, U.S. Shekhawat, M. Vijh and N. Sindhwani, “Design and
Development of Modular and Multifunctional UAV with Amphibious Landing Module”.
In Data-Driven Approach Towards Disruptive Technologies: Proceedings of MIDAS 2020
(pp. 405–421). Springer Singapore, 2021
26. L. Kohli, M. Saurabh, I. Bhatia, N. Sindhwani and M. Vijh, “Design and Development of
Modular and Multifunctional UAV with Amphibious Landing, Processing and Surround Sense
Module”. Unmanned Aerial Vehicles for Internet of Things (IoT) Concepts, Techniques, and
Applications, 207–230, 2021.
27. Srivastava, A., Gupta, A., & Anand, R. (2021). Optimized smart system for transportation
using RFID technology. Mathematics in Engineering, Science and Aerospace (MESA), 12(4),
953–965.
28. Gupta, A., Srivastava, A., & Anand, R. (2019). Cost-effective smart home automation using
internet of things. Journal of Communication Engineering & Systems. 9(2), 1–6.
29. Saini, M. K., Nagal, R., Tripathi, S., Sindhwani, N., & Rudra, A. (2008). PC Interfaced
Wireless Robotic Moving Arm. In AICTE Sponsored National Seminar on Emerging Trends in
Software Engineering (Vol. 50).
30. Singh, L., Saini, M. K., Tripathi, S., & Sindhwani, N. (2008). An Intelligent Control System
For Real-Time Traffic Signal Using Genetic Algorithm. In AICTE Sponsored National Seminar
on Emerging Trends in Software Engineering (Vol. 50).
31. Sengupta, R., Sengupta, D., Kamra, A. K., & Pandey, D. (2020). ARTIFICIAL INTELLIGENCE
AND QUANTUM COMPUTING FOR A SMARTER WIRELESS NETWORK. ARTIFICIAL
INTELLIGENCE, 7(19), 2020.
32. Anand, R., Sindhwani, N., & Juneja, S. (2022). Cognitive Internet of Things, Its Applications,
and Its Challenges: A Survey. In Harnessing the Internet of Things (IoT) for a Hyper-Connected
Smart World (pp. 91-113). Apple Academic Press.
Chapter 15
Raspbian Magic Mirror: A Smart Mirror
System to Assist on IoT Platform
D. S. Sahana and C. Gopala Krishnan
15.1 Introduction
Every person on the planet requires a comfortable way of living. Modern man has
invented several technologies to suit his needs. People in today’s world need con-
stant connectivity and access to information quickly. People must be informed about
global happenings, whether through television or the Internet [1]. The Internet of
Things (IoT) is a communication-capable web-based network of computing devices
embedded in everyday things. As a result of its exponential expansion, the Internet
of Things is increasingly being used in people’s houses and apartments, transform-
ing a home into a smart home [2–5]. Thanks to technology improvements, most of
the stuff we use in our daily lives is now automated.
Temperature, power, closing and opening of doors/windows, turning on and off
lights and fans, and the water tank are all things that a home automation system
should focus on. Automation should be possible from anywhere using a cell phone.
Multimedia and artificial intelligence essential services may personalize to manage
tasks comfortably utilizing the Internet of Things (IoT) [6]. The Internet of things
(IoT) is a concept that brings together wireless sensors and the Internet. Multitasking
is the key to good time management about technology. According to everyone in the
commercial or academic sectors, every minute counts daily. The trend of putting
touch screens and Internet connectivity into commonplace appliances like stoves
and refrigerators [7] exemplifies this.
Many individuals are transitioning to a smart home, and the family room and
kitchen have received much attention. The current generation is encouraged by
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 261
N. Sindhwani et al. (eds.), IoT Based Smart Applications,
EAI/Springer Innovations in Communication and Computing,
https://doi.org/10.1007/978-3-031-04524-0_15
262 D. S. Sahana and C. Gopala Krishnan
constant access to information and processing it quickly. The smart mirror will dis-
play the data with a voice command or hand gestures. The smart mirror is the out-
come of a brainstorming session to figure out how to address all of these concerns
while still producing something valuable and appealing. The smart mirror must
combine the benefits of current technology with the ease with which it can be
included in the daily lives of most people [8, 9]. The smart mirror should be as
simple as possible to operate. The smart mirror would be utilized to incorporate
technology and demand for information into everyone’s everyday routine.
Weather, news updates, and local date and time are all available on the smart
mirror, allowing the user to interact with it and acquire the necessary data they need
in their daily activities. Security features will be added to smart mirrors in the future,
allowing them to manage energy bill payments, phone bill payments, insurance
policy details, and daily appointments. A Raspberry Pi and data from the Internet
can be used to create a smart mirror [10]. The Raspbian Jessie pixel operating sys-
tem runs on the Raspberry Pi. Web browser, JavaScript, or Python can be used to
generate the user interface. On the envisaged smart mirror, the date and time, cur-
rent weather conditions, remainders, and an energy meter will be displayed. It can
display widgets, detect a user’s presence, and navigate the user interface using the
user’s movements.
Parents and guardians must teach and raise their children in today’s technologi-
cally advanced world, and effective parenting is becoming increasingly important.
Furthermore, children require parental supervision. However, this might be chal-
lenging in today’s frenetic world, where both parents frequently work or single
parents are the norm. However, a breakthrough device known as the Raspbian
Magic Mirror, constructed using Raspberry Pi technology and will be the subject of
our IoT research, may fix this problem. Smart mirrors manufactured by IT compa-
nies serve a range of tasks and serve as a looking glass [11].
The majority of people utilize a mirror regularly in their daily lives. Aside from
these mirrors, the smart mirror, which performs a range of purposes, multiplies vari-
ous businesses. Various application services can be deployed by linking the Internet
of Things (IoT) to the smart mirror [12]. Smart mirror is already in use in various
public locations and facilities and private homes, and its capabilities are likely to
grow. Smart mirrors can link and manage items and provide information channels
by acting as a gateway. It is so feasible to give services to users while also fulfilling
the important job of the IoT platform. Smart mirror extends to the current trend of
putting contact displays and online networks into everyday devices, such as stoves
and refrigerators [13]. A two-way mirror is mounted on top of a monitor to create
the smart mirror. A two-way mirror is a piece of glass with a reflective side and a
clear side. This allows us to see our reflection while also enabling light to pass
through from the other side. The monitor is stripped of its original shell and encased
in a wooden frame [14]. A monitor has already hidden away behind a gorgeous
frame in the mirror. The nicest thing is that there’s an opening on the back of the
frame with HDMI and micro USB connectors. You will need both for the
Raspberry Pi.
15 Raspbian Magic Mirror: A Smart Mirror System to Assist on IoT Platform 263
To avoid becoming a burden, the mirror will provide information with little to no
effort on the user’s side. The mirror will do the user’s thinking for them. It will
switch on for the first time when the user tells it with a sentence such as “hi mirror”
or any other expression. Then it will search the Internet for information for the user,
such as weather updates, temperature, etc. Users would be able to converse with
each other through speech. The mirror displays basic information on most people’s
smartphones or tablets, such as Twitter and schedules [15]. People can read, reflect,
and plan their day while getting dressed in the morning or at night. The mirror must
be entertaining as well. It will play the music that they can control with their voice.
It is also utilized by many disabled individuals and is easily accessible to everyone.
It can be used in the vehicle industry and in health care to remind patients of their
medicines, among other things. Smart mirror will also be used for several different
purposes. Successful projects and products, such as our smart mirror, provide a
diverse set of capabilities and applications. Part of the problem can be compared to
the fact that the smart home is still a growing sector with high production costs that
keep devices out of reach of the typical consumer [16].
The proposed architecture is adequate for any smart home’s key functionality.
On the other hand, according to the user’s preferences, this will remind the user of
a given task at a specific time. A smart mirror transforms an ordinary object into a
formidable assistant. It’s a very useful piece of work that makes extensive use of IoT
development. It makes use of a one-way mirror that reflects information from a
display beneath its surface. Voice control, face recognition, and custom services are
among the tool’s features. A speaker and microphone are used to provide voice
control. Over a standard two-way mirror, the mirror conducts a smart activity by
presenting various types of information. The system receives real-time updates
because it is connected to the Internet.
15.2 Related Works
As demonstrated by Cvetkoska et al. [17], smart mirrors have a lot of potential for
increasing user information access and engagement. It also works for a theft detec-
tion system and a tool for clients to get crucial data quickly. The innovation of the
new smart mirror provides a beautiful interface for glancing information and may
also be utilized to identify intruders in a home. The Internet of Things (IoT) cir-
cuitry was utilized to innovate a smart mirror that collects and displays data and
detects a thief when no one is home. The authors’ work focuses on reducing the time
and crafting information more accessible. Security is fundamental in today’s cul-
ture. With this in mind, the authors included a thief detecting system inside the
smart mirror.
Ganesh H and Sharmila S [18] demonstrated smart mirrors with microcontrollers
and computers that provide information on locations on the mirror. For retrieving
data from the web, smart mirrors use microcontroller cards linked to the Internet.
The suggested mirror is connected to the Internet of Things and allows home
264 D. S. Sahana and C. Gopala Krishnan
15.3 Proposed Work
The goal of this initiative was to make homes smarter so that people could save
time. By making information and other people in the digital realm more accessible,
the Internet changed our way of life. At the moment, the focus of innovation is on
15 Raspbian Magic Mirror: A Smart Mirror System to Assist on IoT Platform 265
delivering more data with less effort. The device’s name is Mirror that has been
researched and designed. It’s a wall-mounted mirror that shows the current weather,
date, temperature, humidity, news, and other relevant data [23]. The suggested
Magic Mirror is a natural interface that provides a platform for more tailored access
to information and data services. The goal of this project is to help with the design
and implementation of a Magic Mirror-like interface, as well as the automated home
environment where users can interact with the mirror interface.
The article’s primary idea is to create a cutting-edge communication device. The
mirror’s design aims to create a user-friendly interface for accessing various infor-
mation services in the house (time, date, temperature, and atmospheric pressure, for
instance). The picture is sent off on the mirror as soon as we press the switch. The
mirror is a tool for social conversation. This mirror displays the current location’s
date, time, calendar, weather, and other information. The Raspberry Pi 3 home auto-
mation system uses a voice-activated assistant system to interact with the user [24].
When linked to the Internet, a smart mirror is a Raspberry Pi (low-powered mini-
computer) based display that picks up and displays the relevant information in the
user’s presence [25].
15.3.1 Methodology
15.3.2 Architecture Overview
The true identity of the mirror is determined by the two-way mirror. It’s a magical
mirror since it has a reflective surface on one side and is transparent for good inten-
sity light on the other. The mirror remains at the front, allowing the user to see
266 D. S. Sahana and C. Gopala Krishnan
DHTII Sensor
Camera
Raspberry PI CLOUD
(MAIL)
Switch
Relay Bulb
IR Sensor
Power Supply
himself/herself in the mirror while allowing light from the display to pass through
and make the UI viewable. Smart mirror looks like a regular mirror but contains a
screen within. Figure 15.1 depicts the components and layouts of the suggested
smart mirror. Expressed data is managed in the gathered information base. On a flat
screen, the data is shown. The smart mirror contains a few pieces of data. When
users look in the mirror, it offers a simple web page with software placed in it. The
client is then shown data such as the date, time, and newsfeed, among other things.
Second, reflect is activated in response to an instruction to operate sensors and elec-
tronic devices like fans and lights.
Proposed work focused on the weather, and if a human detects it, the bulb will
immediately turn on. In this situation, the light functions as an indicator. The DHT11
sensor monitors room temperature, and the fan will switch on if the temperature
rises above the set thresholds. The photograph will be sent to a specific email
address if we press the button. The user’s weather, date, time, temperature, and air
pressure are among the services provided to the mirror via Google. The following
sections go through the physical device characteristics and how they work.
Table 15.1 summarizes essential hardware components and their specifications in
the smart mirror.
15 Raspbian Magic Mirror: A Smart Mirror System to Assist on IoT Platform 267
Camera: USB wires for webcams protrude from the back. A USB cable connects
the webcam to the computer, sending the digital data captured by the image sensor
back to the computer, available on the Internet. Some cameras don’t require a com-
puter to function; instead, they use Wi-Fi to send photographs to your router, which
can then send them to other objects that are turned on your local network or to any-
one, anywhere around the globe, over the Internet.
Relay: The bare-minimum concept for a relay to work is depicted in Fig. 15.2.
Because the relay has a controlled 5v trigger voltage, we used a +5V DC supply to
one end of the coil and a switch to ground the other end. A button could be a single
transistor, a microcontroller, or a processor with switching capabilities. The flyback
diode, attached to the relay’s coil, is also visible. The diode has to protect the switch
from the relay coil’s high supply voltages. One end of the load can be linked to the
standard pin, while the other can be attached to the NO or NC pin. The load is dis-
connected before the trigger if it is connected to NO, and it is connected before the
trigger if it is linked to NC.
IR sensor: An infrared sensor emits and detects infrared radiation to sense its
surroundings. An IR sensor is employed as an object detection sensor in this method.
Some of the IR transmitter’s radiation reaches the item, while the rest bounces back
to the IR receiver, as shown in Fig. 15.3. The intensity of the IR receiver’s reception
determines the sensor’s output. Table 15.2 summarizes the function of infrared
sensors.
Power supply: A separate power supply is required depending on the Raspberry
Pi model. All models require a 5.1V supply, although the current required varies by
kind. All devices up to the Raspberry Pi 3 require a micro USB power cord.
Fan: The DHT11 sensor provides the input for this automatic fan system. The
DHT11 is a temperature and humidity sensor in one. The data from the sensor will
be received by the microcontroller, which will convert it to fan output. Because the
sensor’s input is the amount of temperature in the room, we must adapt the software
Sl no Hardware Purpose
1 IR sensor Obstacle detector
2 IR transmitter Control electronic devices
3 IR receiver Detect bursts of infrared light
to the suitable temperature and output fan speed constraints. The fan will switch off
or not revolve if the temperature reported by the sensor is less than 25 °C. The fan
will softly spin if the temperature sensor detects a temperature between 26 and
29 °C. If the temperature sensor detects temperatures between 30 and 34 °C, the fan
will turn at a medium speed. The fan will rapidly spin if the temperature rises above
35 °C. The automatic fan detection technique is depicted in greater detail in
Fig. 15.4.
Working of light: An IR sensor provides the input for this self-contained lamp
system. An infrared sensor is a light-emitting electrical gadget that detects objects
in the environment. An infrared detector can detect motion and measure the tem-
perature of an object. Infrared heat radiation is emitted by almost everything. The
sensor will send information to the controller, process it, and display it on the light.
The black color absorbs all incident radiation, whereas the white color reflects all
incident radiation. For the second time, the same approach can place the sensor
couple. The photodiode and the infrared LED are placed nearby. This approach can
be used to align the sensor couple for the second time. The photodiode and infrared
LED are placed side by side.
The produced infrared radiation must reflect the photodiode after hitting any
object because there is no direct line of contact between the transmitter and the
receiver when the IR transmitter releases infrared radiation. The surface of the
object can be classed as reflecting or non-reflective. The bulk of the energy that
strikes the thing is remembered and reaches the photodiode if the object’s surface is
reflective, like white or another brilliant hue. As seen in Fig. 15.5, current flows
15 Raspbian Magic Mirror: A Smart Mirror System to Assist on IoT Platform 269
through the photodiode depending on the brightness of the reflected light. When an
object has a non-reflective covering, such as black or a dark color, it absorbs practi-
cally all of the light it receives. Because there is no reflected radiation, there is no
radiation incident on the photodiode. Hence, the photodiode’s resistance remains
greater, inhibiting current flow. It is also true if there is no object.
Raspberry Pi: The Raspberry Pi is written in Python and connected to a display
with a built-in speaker to give an onscreen interface as well as voice help. Raspberry
270 D. S. Sahana and C. Gopala Krishnan
Pi is a small computer the size of a credit card that can do everything from web
browsing to scripting to gaming. Raspberry Pi is a low-cost, powerful, and developer-
friendly computer that is disrupting traditional, high-energy IT installations for
small and medium businesses. Raspberry Pi can act as an “Internet Gateway” for
IoT devices because of its built-in quad-core processor. Pi acts as a web server for
uploading and transmitting sensor data on IoT systems, and it is powered by a cloud
network. To use Pi computer as a web server, you’ll need custom code, an operating
system, a Python library, and a cloud network. Raspberry Pi-based IoT projects
have an easy design, implementation, and modification process, making them ideal
for IoT applications. Raspberry Pi allows businesses to quickly deploy and control
IoT applications like smart home gadgets, weather stations, agricultural projects,
and more.
15.3.3 Software Specifications
15.3.3.1 Configuration of NOOBS
Virtual Network Computing (VNC) is a graphical work area sharing solution that
shows precisely the work area of a computer (running VNC Server) from another
computer or a mobile device (running VNC Viewer). VNC Viewer sends console,
mouse, and contact events to VNC Server, as seen in Fig. 15.7, and VNC Server
responds to screen changes.
Installation of Python 3 and code execution will be carried in Python shell.
15.4 Results and Discussion
15.4.1 Home Automation
Figure 15.8 depicts the output of the circuit for home automation, which was acti-
vated by sensors. The light is monitored by an IR sensor, while a DHT11 sensor
monitors the fan. If an item, such as a human, is identified by the IR sensor, the light
will turn on, and the DHT11 sensor will work to determine whether the fan should
be turned on or off, which is relying on the room’s temperature.
15 Raspbian Magic Mirror: A Smart Mirror System to Assist on IoT Platform 271
15.4.2 Summary of Output
Following the execution of the Python code, examine the output on the terminal,
which will show the current date, day, month, year, time, current temperature, and
air pressure, as shown in Figs. 15.9 and 15.10.
15.4.3 PI Camera
A switch controls the PI camera; pressing the button will take the image and com-
municate it to your email, as shown in Fig. 15.11.
Table 15.3 displays numerous aspects supportable by the Raspbian magic mirror in
the targeted model.
15 Raspbian Magic Mirror: A Smart Mirror System to Assist on IoT Platform 273
Fig. 15.9 Output displaying date, time, atmospheric pressure, and temperature
15.5 Conclusion
With the proposed mirror, IoT-enabled home automation [28] is achievable. A sur-
veillance system monitors it. It is controlled by a Raspberry Pi and displays weather,
time, date, temperature, and humidity. Users can acquire both mirror and
274 D. S. Sahana and C. Gopala Krishnan
15.6 Future Scope
this mirror will be used in a classroom, simple technology such as a barcode scanner
or a fingerprint sensor can assist with tasks such as college attendance and program
registration. One example is scanning ID cards to register for a program [31].
References
1. “Smart Mirror Using Raspberry Pi”, International Journal of Emerging Technologies and
Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 4, page no.228–234, April
2020, Available: http://www.jetir.org/papers/JETIR2004525.pdf.
2. Srivastava, A., Gupta, A., & Anand, R. (2021). Optimized smart system for transportation
using RFID technology. Mathematics in Engineering, Science and Aerospace (MESA), 12(4),
953–965.
3. Sindhwani, N., Maurya, V. P., Patel, A., Yadav, R. K., Krishna, S., & Anand, R. (2022).
Implementation of Intelligent Plantation System Using Virtual IoT. In Internet of Things and
Its Applications (pp. 305–322). Springer, Cham.
4. Shukla, R., Dubey, G., Malik, P., Sindhwani, N., Anand, R., Dahiya, A., & Yadav, V. (2021).
Detecting crop health using machine learning techniques in smart agriculture system. Journal
of Scientific and Industrial Research (JSIR), 80(08), 699–706.
5. Bakshi, G., Shukla, R., Yadav, V., Dahiya, A., Anand, R., Sindhwani, N., & Singh, H. (2021).
An Optimized Approach for Feature Extraction in Multi-Relational Statistical Learning.
Journal of Scientific and Industrial Research (JSIR), 80(6), 537–542.
6. Shreyansh Khale, Aditi Sathe, Rugveda Salunke, Shweta Nathan, Amit Maurya, “Smart
Mirror,” International Journal of Recent Technology and Engineering (I.J.R.T.E.)ISSN:
2277-3878,Volume-8, Issue-2S11, September 2019.
7. Prof. P Y Kumbhar, Allauddin Mulla, Prasad Kanagi, and Ritesh Shah. Smart Mirror Using
Raspberry PI. VOLUME-5, ISSUE-4, APR-2018.
8. R. Akshaya, N. N. Raj and S. Gowri, “Smart Mirror- Digital Magazine for University
Implemented Using Raspberry Pi,” 2018 International Conference on Emerging Trends and
Innovations In Engineering And Technological Research (ICETIETR), 2018, pp. 1–4, https://
doi.org/10.1109/ICETIETR.2018.8529005.
9. Gómez-Carmona, Oihane & Casado Mansilla, Diego. (2017). SmiWork: An Interactive Smart
Mirror Platform for Workplace Health Promotion.
10. D. Gold, D. Sollinger and Indratmo, “SmartReflect: A modular smart mirror application plat-
form,” 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication
Conference (IEMCON), Vancouver, BC, 2016, pp. 1–7
11. S. Athira, F. Francis, R. Raphel, N. S. Sachin, S. Porinchu and S. Francis, “Smart mirror: A
novel framework for interactive display,” 2016 International Conference on Circuit, Power and
Computing Technologies (ICCPCT), Nagercoil, 2016, pp. 1–6.
12. Rodriguez-Martinez, M. & Pagan, E. & Rivera-Vega, Pedro & Rodriguez-Martinez,
O.G. & Martinez-Montes, M. & Arzuaga, J.R. & Rodriguez, Manuel. (2004). Smart
Mirrors: peer-to-peer Web services for publishing electronic documents. 121–128. 10.1109/
RIDE.2004.1281711.
13. S. S. I. Samuel, “A review of connectivity challenges in IoT-smart home,” 2016 3rd
M.E.C. International Conference on Big Data and Smart City (I.C.B.D.S.C.), Muscat, 2016,
pp. 1–4.
14. S. Tanwar, P. Patel, K. Patel, S. Tyagi, N. Kumar and M. S. Obaidat, “An advanced Internet
of Thing based Security Alert System for Smart Home,” 2017 International Conference on
Computer, Information and Telecommunication Systems (CITS), 2017, pp. 25–29, https://doi.
org/10.1109/CITS.2017.8035326.
276 D. S. Sahana and C. Gopala Krishnan
15. R. K. Kodali, V. Jain, S. Bose and L. Boppana, “IoT based smart security home automation
system,” 2016 International Conference on Computing, Communication and Automation
(I.C.C.C.A.), Noida, 2016, pp. 1286–1289.
16. Yuan-Chih Yu, S. c. D. You and Dwen-Ren Tsai, “Magic mirror table with social-emotion
awareness for the smart home,” 2012 IEEE International Conference on Consumer Electronics
(ICCE), Las Vegas, NV, 2012, pp. 185–186.
17. B. Cvetkoska, N. Marina, D. C. Bogatinoska and Z. Mitreski, “Smart mirror E-health assistant
Posture analyze algorithm proposed model for upright posture,” IEEE EUROCON 2017 -17th
International Conference on Smart Technologies, Ohrid, 2017, pp. 507–512.
18. Ganesh, H., and S. Sharmila. “IoT Based Home Automation using Smart Mirror.” Int. J. Innov.
Sci. Res. Technol 4 (2019): 607–612.
19. R.M.B.N. Siripala, M. Nirosha, P.A.D.A. Jayaweera, N.D.A.S. Dananjaya, Ms. S.G.S. Fernando
(2017); Raspbian Magic Mirror-A Smart Mirror to Monitor Children by Using Raspberry
Pi Technology; Int J Sci Res Publ 7(12) (ISSN: 2250-3153). http://www.ijsrp.org/research-
paper-1217.php?rp=P727041
20. Young Bag Moon, Se Won Oh, Hyun Joong Kang, Ho Sung Lee, Sun Jin Kim, Hyo Chan
Bang, “Smart Mirror Health Management Services based on IoT Platform”, Recent Advances
on Computer Engineering.
21. M. M. Yusri et al., “Smart mirror for smart life,” 2017 6th ICT International Student
Project Conference (ICT-ISPC), Skudai, 2017, pp. 1–5. https://doi.org/10.1109/
ICT-ISPC.2017.8075339
22. Lakshmi N M, Chandana M S, Ishwarya P, Nagarur Meena, Rajendra R Patil, 2018, IoT
based Smart Mirror using Raspberry Pi, INTERNATIONAL JOURNAL OF ENGINEERING
RESEARCH & TECHNOLOGY (IJERT) NCESC – 2018 (Volume 6 – Issue 13)
23. Y. Sun, L. Geng and K. Dan, “Design of Smart Mirror Based on Raspberry Pi,” 2018
International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS),
Xiamen, 2018, pp. 77–80. https://doi.org/10.1109/ICITBS.2018.00028
24. Vaidya, Maitreyee, et al. “SMART MIRROR USING RASPBERRY PI.” International
Research Journal of Engineering and Technology (I.R.J.E.T.), vol. 06, no. 03, Mar. 2019,
pp. 6789–6790.
25. K. Jin, X. Deng, Z. Huang and S. Chen, “Design of the Smart Mirror Based on Raspberry
PI,” 2018 2nd IEEE Advanced Information Management, Communicates, Electronic and
Automation Control Conference (I.M.C.E.C.), 2018, pp. 1919–1923, https://doi.org/10.1109/
IMCEC.2018.8469570.
26. Lakshmi N M, Chandana M S, Ishwarya P, Nagarur Meena, Rajendra R Patil, 2018, IoT-
based Smart Mirror using Raspberry Pi, INTERNATIONAL JOURNAL OF ENGINEERING
RESEARCH & TECHNOLOGY (I.J.E.R.T.) N.C.E.S.C. – 2018 (Volume 6 – Issue 13).
27. Jha, Pratibha, et al. “Smart Mirror A Journey to the New World.” International Journal
of Computer Sciences and Engineering, vol. 7, no. 1, 2019, pp. 539–545., https://doi.
org/10.26438/ijcse/v7i1.539545.
28. Gupta, A., Srivastava, A., & Anand, R. (2019). Cost-effective smart home automation using
internet of things. Journal of Communication Engineering & Systems. 9(2), 1–6.
29. M.K. Saini, R. Nagal, S. Tripathi, N. Sindhwani and A. Rudra, “PC Interfaced Wireless
Robotic Moving Arm”. In AICTE Sponsored National Seminar on Emerging Trends in
Software Engineering (Vol. 50), 2008.
30. L. Singh, M.K. Saini, S. Tripathi and N. Sindhwani, “An Intelligent Control System For Real-
Time Traffic Signal Using Genetic Algorithm”. In AICTE Sponsored National Seminar on
Emerging Trends in Software Engineering (Vol. 50), 2008.
31. Gupta, A., Asad, A., Meena, L., & Anand, R. (2023). IoT and RFID-Based Smart Card System
Integrated with Health Care, Electricity, QR and Banking Sectors. In Artificial Intelligence on
Medical Data (pp. 253–265). Springer, Singapore.
Chapter 16
Use of Machine Learning and IoT
in Agriculture
Anuj Mehla and Sukhvinder Singh Deora
16.1 Introduction
Food is one of the basic requirements of humans to survive. In the so-called techno-
logically driven world, countries are still facing the issue of death due to hunger,
malnutrition, and scarcity of food for their population. “The world is currently expe-
riencing a pivotal moment. It is very different from what it had committed six years
ago to eliminate hunger, scarcity of food, and undernutrition by 2030” (The State of
Food Security and Nutrition in the World) [1]. The world recognizes that the chal-
lenges are significant and hopes to accelerate past accomplishments by adopting
innovative techniques on a large scale that would enable us to achieve our targets.
The report estimated (720 to 811) million hungry people worldwide in 2020, up by
161 million from 2019. The earth’s population is expected to increase to 9.8 billion
people by 2050 [2]. The number of hungry people in the world is also increasing
with time. Agricultural practices need to be modified for productivity at all levels to
meet the global demand for food, feed, fiber, and fuel in 2050 [3].
Currently, the world faces numerous challenges such as a limited supply of
resources, lack of skilled workers, and changing climates in agriculture [3]. Over
most of the twentieth century, farmers have seen various improvements, including a
scientific approach to produce, machines for tasks, improved genetics of seeds, and
increased input of fertilizers and pesticides for increased crop production. Several
issues also affect agriculture directly, such as farmers not knowing about their soil,
sudden unpredicted rainstorms, crop disease, and irrigation issues. Food consump-
tion is on the rise on one side, and agricultural practices continue to improve on the
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 277
N. Sindhwani et al. (eds.), IoT Based Smart Applications,
EAI/Springer Innovations in Communication and Computing,
https://doi.org/10.1007/978-3-031-04524-0_16
278 A. Mehla and S. S. Deora
other [4]. In addition, the rise in income of farmers shall double what it is now, mak-
ing food more expensive, especially in developing countries.
Agriculture is vital for food production and industry. Crops like cotton, rub-
ber, and sugar cane play a crucial role in the economic future of several coun-
tries. Additionally, the bioenergy market for food crops has experienced recent
growth. Food security is at risk as to the use of food crops for biofuel, bioen-
ergy, and other commercial purposes to cater to the rising demand for energy
resources [5].
With the advent of newer technologies, PA (precision agriculture) has expanded
worldwide. It adopted innovative, data-driven, and disruptive techniques in PA. It
used global navigation satellite services (GNSS) extensively for locating and
quantifying soil quality during the first decade of PA. Tractor automation and
improved crop nutrient management technologies had been the focus of concern
during the second decade. As PA enters its third decade of growth, all fields of
agriculture get explored for making intelligent decisions via modern sensors and
other measuring devices to evolve new paradigms of evidence-based, precise
farming. Indeed, future farming practices shall rely heavily on “farming the land”
and “farming the data” to ensure output, efficiency, and sustainability. Researchers
in agriculture explored the use of the latest technologies like multispectral sen-
sors, remote sensing, robotics, droning, and cloud computing to monitor plant
phenotyping and soil conditions (IoT). The addition to achieving a higher produc-
tion level in agriculture, sensor technology leads to improved crop quality, soil
quality, a safer food supply, sustainable farming, and increased profits. Farmers
can analyze crops at the micro-level with these tools. The use of sensors has
achieved appropriate agricultural objectives and developed multiple capabilities
that would guide the future of agricultural practices [6].
Humans would like to track and count everything if computers may know and
gather everything without our help, thereby significantly reducing waste, loss, and
costs associated with the time and space requirements of computers. The field of
the Internet of Things (IoT) arose in 1999, and now there are IoT devices every-
where constantly transmitting data and conversing with each other [7–9]. These
devices can sense, track, and process the collected data to generate a large amount
of well- structured, loosely structured, or unevenly structured information.
However, predicting the future and finding recent information require applying
analytical techniques to such data to analyze current scenarios and predict the
future. It takes much effort to analyze such extensive data gathered from IoT
devices. An efficient learning mechanism is needed to turn this data into action-
able insights that are worthwhile. Analyzing complex IoT data using AI-based
technologies is the most critical concern for handling crop-related parameters.
Deep learning can only solve many complex real-life issues [4]. Recent advances
in deep learning (DL) [10] can be applied to various IoT applications to produce
quick results. While we have grown accustomed to IoT devices, the utilization of
deep learning adds a new dimension to such connected devices when used in the
domain of agriculture.
16 Use of Machine Learning and IoT in Agriculture 279
The remote sensing method collects a vast quantity of data based on images and
depicts the agricultural environment in its entirety. A significant area of research in
agricultural applications is remote sensing image analysis. It uses intelligent data
analytics for detecting anomalies, identifying/classifying images, and identifying
anomalous patterns in images. The primary purpose of this chapter is to investigate
and address the applicability of various such techniques, namely, IoT, sensors,
machine learning, and AI, to increase agriculture produce. It helps make precise
decisions based on experimental agriculture parameters study and weather forecasts
to automate all farming operations. One can develop intelligent agriculture plat-
forms that monitor agricultural activity, including crop and plant monitoring, irriga-
tion monitoring, water control, and others, by using sensors that measure soil
moisture, water levels, and temperature [11]. Farmers can also continuously moni-
tor agricultural fields from anywhere as compared to traditional farming. It improves
all phases of farming: planting, tilling, and harvesting using IoT-based intelligent
farming techniques to optimize [12] efforts and resource usage and achieve high
productivity.
Disease and Pest Monitoring Drones enabled with remote sensing provide the
flexibility and image clarity needed to monitor pests and diseases in crops that only
low-altitude systems can offer [13].
Crop Monitoring Agriculture crop monitoring becomes easy and efficient due to
Internet of Things technology that enhances the management of crops and, there-
fore, the yield, leading to more profits for farmers [14].
Tracking Farm Products Produce from farms, including crops and livestock, is
known as farm products. A crop can be any cultivable plant, mushroom, or organism
cultivated to be eaten, clothed, or utilized in any other way. Using IoT sensors can
easily track or monitor these farm products.
280 A. Mehla and S. S. Deora
16.1.2 Working of IoT
The Internet of Things comprises devices and sensors that send data to the cloud
environment through some connectivity. When the data reaches the cloud server, the
software processes it and performs specific actions. It automatically sends an alert
or changes the requisite sensors/devices without requiring human intervention.
A user interface provides the collected data and updates on what the system is
doing to the end user. Users can perform adjustments or fine-tuning actions to the
sensors/devices through the cloud.
Crop Disease
monitoring monitoring
Animal
Heart rate
Agricultural Precision Monitoring
monitoring Agriculture
Remote
Sensing
[6]. The real-time data level of water and nutrients of soil can be collected for better
crop yield.
Remote Sensing The satellites capture images from their geostationary and non-
geostationary orbits. The images are processed to identify different segments based
on the captured color codes. Real-time data related to weather, farms, crop cultiva-
282 A. Mehla and S. S. Deora
tion, and water management is derived and shared with the farmers by the remote
sensing stations. Farmers then manage their day-to-day affairs and make decisions
accordingly using sensor-based information [19].
Monitor Weather and Climatic Conditions The climate heavily influences crop
production. A crop can only grow under particular climatic conditions. The produc-
tivity and efficiency of crops depend on these conditions. Farmers can now find out
the weather conditions in their fields in real time using IoT-based solutions. Farmers
use the information collected by the sensors in the fields to decide about the crops
that require these specific weather conditions. IoT ecosystems established shall use
sensors to gather data about humidity, temperature, and rainfall, crucial for crop
production. These sensors can quickly determine drastic/abrupt/sudden changes in
climatic conditions to reduce the negative impact on crop production. It can help
minimize the physical presence when deemed necessary and result in greater profits.
16.1.4 Sensors
Sensors play a vital role in capturing valuable data after a set time difference. The
cloud services store this extensive set of data produced by these sensor devices to
manage its storage. Agricultural scientists, farmers, and academicians then use this
collected data for research and analysis to improve agriculture-related activities.
Figure 16.2 showcases services and sensors used in agricultural innovations of the
time. Farmers can access real-time crop information with IoT sensors, which help
them make better harvesting decisions [20, 21]. By collecting IoT data, smart sen-
sors can enable real-time monitoring of “what is happening on the ground.” Farming
can be made more efficient by knowing when to harvest, the amount of water used
and whether irrigation is needed, soil health, and fertilizer requirements. A better
understanding of the forecasted parameters enables farmers to plan seed sowing and
manage cultivational activities, yield, and storage. The information presented here
is essential since well-managed fields produce a greater (approximately 60% more)
yield per acre than poorly managed ones. Agricultural sensors to enhance crop yield
are required to reach the maximal efficiency of agricultural produce.
Soil Moisture Sensor Connected sensors transmitting data through Sigfox IoT can
provide better insight into the soil water content. Nutrient leaching can be reduced
by efficiently managing irrigation systems, water, and energy. It is one of the essen-
16 Use of Machine Learning and IoT in Agriculture 283
Agricultural Innovation
Services Sensors
Humidity Sensors
Pesticides
Temperature Sensors
Fertilization
Weather
Leaf Sensors
Yield Condition
Level Sensor
Yield Quality
Proximity Sensors
Crop Quality
Touch Sensors
Infrared Sensors
Wireless Sensors
tial sensors that measure the water content level. The moisture sensor passes a digi-
tal or analog signal comprising a soil-mounting component based on a threshold
value set. There are mainly two types of soil moisture sensors: 1. a sensor for mea-
suring the volume of water and 2. soil tension detector sensors embedded in the soil.
Wireless Sensors Wireless sensors are essential tools that can assist with intelli-
gent agriculture currently available on the market and play a crucial role in collect-
ing crop information and other data. Almost every piece of agricultural machinery
and advanced tools, such as fertilizer sprayers, has wireless sensors built into them,
depending on the application needs. Some of the wireless sensors are acoustic sen-
sors, optical sensors, electrochemical sensors, electromagnetic sensors, optoelec-
tronic sensors, and many others.
PH Sensor With PH sensors, one can monitor a precise quantity of soil nutrients
required for irrigation. Plants or crops are provided with an adequate supply of
nutrients by monitoring the PH of the soil.
Ultraviolet Sensor (UV Sensor) The UV sensors monitor ultraviolet rays by con-
verting photocurrent into voltage. A circuit converts analog signals to digital signals
into its external circuit. These sensors detect light rays most effectively and are used
for decision-making.
16.2 Related Work
IoT network solutions include Bluetooth, RFID, Wi-Fi, Zigbee, Thread, NB-IoT,
Sigfox, COAP, and many others. As a result of remote sensing in agriculture, mul-
tiple vegetation indices (Vis) perform reflection spectroscopy of spectral bands to
provide insights into crop health. Many VIs are available, including normalized
difference vegetation index (NDVI), enhanced vegetation index (EVI), soil adjusted
vegetation index (SAVI), and many others that describe the difference between vis-
ible and near-infrared reflectance remotely sensed images of vegetation cover. It
estimates the density of greenery, the type of cultivation, and its health.
A review on many satellites like Landsat 1, Landsat7, Landsat 8, RapidEye, Geo-
Eye1, IKONOS, QuickBird, Worldview-3, and MODIS utilized for monitoring
agriculture is provided [24]. A system that combines real-time data, machine learn-
ing, and drones to monitor crop health is beneficial for agriculture [19]. Combining
multiple sensor technologies, heterogeneous data, and temporal fidelity can be used
with analytical methods optimal solutions. Such practices are an essential consider-
ation in building sensor-based systems for agriculture.
An idea to use IoT for monitoring cotton crops and acquiring the data in real time
for IoT-based enterprise systems for agriculture framework [25] has become popu-
lar. It created an IoT-based enterprise system with three modules that deploy wire-
less sensor networks (WSN) at cotton fields. WSN monitors cotton crop conditions
using the Waspmote agriculture sensor board. In addition, it also contains sensors
for leaf wetness and soil moisture to monitor various parameters that affect the
overall agriculture produce.
Any agricultural system relies on crop irrigation. The use of an irrigation system
in agriculture is beneficial in managing the water resources and minimizes water
loss. A wireless sensors and actuators network (WSANs) was designed for irriga-
tion control in-house [26].
Researchers have suggested a solution to use multiple technology integrations to
meet future agriculture expectations for intelligence and efficiency [5]. It integrates
wireless sensors, crewless aerial vehicles, cloud computing, and communications to
provide IoT-based platforms [27] and architectures adapted for agriculture.
In an Intelligent Agriculture study [28], new plan for developing a platform that
monitors factors affecting farming operations and applying extracted knowledge to
analyze farming practices for respective regions has been provided. They present a
data cleaning method that uses moving averages and variances, eliminating data
with more drastic variances. The inferences and knowledge extracted from the
refined data are more beneficial for agricultural decisions and activities.
Another solution [29] presents a model with ICT-based integrated agricultural
solution. The farmers can receive the latest information and take advantage of these
informed dynamics. A remote monitoring system (RMS) uses the Internet and wire-
less communication technologies to provide real-time data about agricultural pro-
duction. It uses alerts via a short messaging service (SMS) to provide agricultural
guidance on frequent weather patterns and their impact on crops.
An information system [30] for the agricultural Internet of Things based on a
distributed architecture is the need of the hour. Such a distributed information ser-
vice system captures, standardizes, manages, and queries a massive amount of
286 A. Mehla and S. S. Deora
agriculture production data using IoT. It uses services like Information Services,
Object Naming Services, and Discovery Services for tracking agricultural products
and monitoring their quality in this system.
Analyzing and comparing different machine learning techniques [31] is addressed
in the paper for most appropriate practical tasks. New technologies help meet the
dynamic needs of agriculture as an industry that needs more sustainable and effi-
cient solutions. Innovative farming system based on IoT [32] using architecture,
layers of the networks, topologies, and protocols are useful for an in-depth analysis
of agriculture variables. Cloud computing servers offer ample data storage, and ana-
lytics is carried out using big data technologies on data collected by the IoT devices.
Researchers have integrated microcontrollers, sensors, and a centralized water
quality monitoring system into an IoT and AI-based platform for the agricultural
sector [33]. It uses the Internet to transfer the bulk data collected by sensors to the
cloud server for processing and logging. Data is collected after each fixed time
interval and sent to a machine learning algorithm for calculating soil conditions.
An idea of a mobile-based agricultural control system [34] is presented with
details on its components and control systems. The improvements made in this sys-
tem included the throughput, energy, delay, and performance with a lesser number
of operating issues.
The map-based navigation and vision-based scheme for farm management [35]
use multiple edge nodes and one cloud server to disperse the computational load. A
new system was proposed that provides an easy and effective way to send live noti-
fications on real-time data related to temperature, soil moisture, humidity, UV
index, and infrared parameters directly from the farmlands to farmers [36]. It helps
farmers improve their crop yields and save resources like water and fertilizer. It uses
IoT circuitry for live data monitoring.
A complete farming and food supply solution based on IoT and blockchain [37]
is an innovative smart model for agriculture and the food supply chain for acquiring
crop information. Another approach [38] uses IoT-based green agriculture for man-
aging the operations in farming with security and integrity. Researchers developed
another system to monitor soil conditions, ensuring the quality of farmland [39] that
also reduces wastage of water. Additionally, it reduces water waste.
Table 16.1 provides details on some mobile applications in agriculture that help
increase crop yield and transform the agricultural industry.
There are numerous significant applications of IoT in agriculture. Using IoT in
agriculture, Table 16.2 discusses some previous works.
Modern technologies such as the Internet of Things (IoT) and machine learning
(ML) enhance food production, allowing farmers to spend less time on the land and
pay more attention to their crops. The modern agriculture industry can benefit from
16 Use of Machine Learning and IoT in Agriculture 287
leaf diseases, recognizes crops, and detects disease early. Some of the uses of
machine learning with IoT are shown in Fig. 16.3. In machine learning, humans
instruct machines to mimic the actions they naturally perform. On the other hand,
computer-supported learning is an approach in which computers automate and
improve their learning processes when interacting with humans. Using IoT with
artificial intelligence (AI) and machine learning can improve the efficiency and
intuitiveness of these processes for developers and users.
Figure 16.4 shows a generalized model for agricultural problems. Wireless sensors
combined with mobile agricultural applications and cloud platforms collect relevant
data about the farmer’s land’s environmental parameters, such as temperature, pre-
cipitation, humidity, wind speed, pest infestations, soil quality, and nutrient levels.
16 Use of Machine Learning and IoT in Agriculture 289
Farmers can use this information to make more informed decisions and improve the
quality and quantity of the produce. Monitoring crops at multiple locations via a
mobile app reduces the complexity of managing crops and allows farmers to esti-
mate the impact of their farming practices and improve actions during future har-
vests. Mobile applications can determine where fertilizer is required or amount of
irrigation required in the field.
The input from sensors is processed and analyzed in the subsystem to predict
system properties that need manual or automated control. Dynamic models help in
decision-making and finding their impact over time. Agricultural knowledge is stud-
ied to update agricultural practices to find the optimal procedures. The formulated
models are trained and tested for optimal results based on each parameter and
develop an efficient model.
290 A. Mehla and S. S. Deora
16.5 Conclusion
References
1. The state of food security and Nutrition in the world 2021 (SOFI) | Department of Economic
and Social Affairs, United Nations. [Online]. Available: https://sdgs.un.org/events/state-food-
security-and-nutrition-world-2021-sofi-33052. [Accessed: 05-Dec-2021].
2. The Earth’s population will increase to 9.8 billion people by 2050, United Nations. [Online].
Available: https://www.un.org/development/desa/en/news/population/world-population-
prospects-2019.html. [Accessed: 08-Aug-2021].
3. W. FAO, IFAD, UNICEF, WFP, “Food Security and Nutrition in the World,” IEEE J. Sel. Top.
Appl. Earth Obs. Remote Sens., p. 320, 2020.
4. M. Alam, K. A. Shakil, and S. Khan, “Internet of things (IoT): Concepts and applications,”
Internet Things Concepts Appl., no. May, pp. 1–515, 2020.
5. M. Ayaz, M. Ammad-Uddin, Z. Sharif, A. Mansour, and E. H. M. Aggoune, “Internet-of-
Things (IoT)-based smart agriculture: Toward making the fields talk,” IEEE Access, vol. 7,
pp. 129551–129583, 2019.
6. M. B. and A. M. R. Sivakumar, B. Prabhadevi, G. Velvizhi, S. Muthuraja, S. Kathiravan,
“Internet of Things and Machine Learning Applications for Smart Precision Agriculture,”
Intech, vol. i, no. tourism, p. 13, 2016.
7. Sindhwani, N., Maurya, V. P., Patel, A., Yadav, R. K., Krishna, S., & Anand, R. (2022).
Implementation of Intelligent Plantation System Using Virtual IoT. In Internet of Things and
Its Applications (pp. 305–322). Springer, Cham.
8. Gupta, A., Srivastava, A., & Anand, R. (2019). Cost-effective smart home automation using
internet of things. Journal of Communication Engineering & Systems. 9(2), 1–6.
9. Bakshi, G., Shukla, R., Yadav, V., Dahiya, A., Anand, R., Sindhwani, N., & Singh, H. (2021).
An Optimized Approach for Feature Extraction in Multi-Relational Statistical Learning.
Journal of Scientific and Industrial Research (JSIR), 80(6), 537–542.
16 Use of Machine Learning and IoT in Agriculture 291
10. Sindhwani, N., Anand, R., Meivel, S., Shukla, R., Yadav, M. P., & Yadav, V. (2021). Performance
Analysis of Deep Neural Networks Using Computer Vision. machine learning, 15, 17.
11. R. Shukla, G. Dubey, P. Malik, N. Sindhwani, R. Anand, A. Dahiya and V. Yadav, “Detecting
crop health using machine learning techniques in smart agriculture system,”. Journal of
Scientific & Industrial Research, vol 80, pp. 699–706, 2021.
12. N. Sindhwani, “Performance Analysis of Optimal Scheduling Based Firefly algorithm in
MIMO system,” Optimization, 2(12), 19–26, 2017.
13. D. Gao, Q. Sun, B. Hu, and S. Zhang, “A framework for agricultural pest and disease monitor-
ing based on internet-of-things and unmanned aerial vehicles,” Sensors (Switzerland), vol. 20,
no. 5, 2020.
14. D. K. Sreekantha and A. M. Kavya, “Agricultural crop monitoring using IOT - A study,” Proc.
2017 11th Int. Conf. Intell. Syst. Control. ISCO 2017, pp. 134–139, 2017.
15. M. M. Tiwari, D. Narang, P. Goel, A. Gadhwal, A. Gupta, and A. Chawla, “Weather Monitoring
System Using IoT and Cloud Computing,” Weather, vol. 29, no. 12s, pp. 2473–2479, 2020.
16. R. Kavin, K. Lakshmi, S. S. Rani, and K. Rameshkumar, “Weather Monitoring System
using Internet of Things,” 2020 6th Int. Conf. Adv. Comput. Commun. Syst. ICACCS 2020,
pp. 26–29, 2020.
17. R. M. Rewatkar, A. V Gulhane, A. S. Mungale, N. M. Dhengare, P. P. Thakare, and
M. D. Sabane, “IoT Based Smart Real-Time Agriculture Warehouse Monitoring and Control
System Using Raspberry Pi,” vol. 7, no. 1, pp. 856–859, 2019.
18. S. Ratnaparkhi et al., “Smart agriculture sensors in IOT: A review,” Mater. Today Proc., no.
xxxx, 2020.
19. U. Shafi et al., “A Multi-Modal Approach for Crop Health Mapping Using Low Altitude
Remote Sensing, Internet of Things (IoT) and Machine Learning,” IEEE Access, vol. 8,
pp. 112708–112724, 2020.
20. L. Kohli, M. Saurabh, I. Bhatia, U.S. Shekhawat, M. Vijh and N. Sindhwani, “Design and
Development of Modular and Multifunctional UAV with Amphibious Landing Module”.
In Data Driven Approach Towards Disruptive Technologies: Proceedings of MIDAS 2020
(pp. 405–421). Springer Singapore, 2021.
21. L. Kohli, M. Saurabh, I. Bhatia, N. Sindhwani and M. Vijh, “Design and Development of
Modular and Multifunctional UAV with Amphibious Landing, Processing and Surround Sense
Module”. Unmanned Aerial Vehicles for Internet of Things (IoT) Concepts, Techniques, and
Applications, 207–230, 2021.
22. A. F. Subahi and K. E. Bouazza, “An Intelligent IoT-Based System Design for Controlling and
Monitoring Greenhouse Temperature,” IEEE Access, vol. 8, pp. 125488–125500, 2020.
23. Ş. Dinç Zor and H. Cankurtaran, “Impedimetric humidity sensor based on a nanohybrid
composite of conducting poly(diphenylamine sulfonic acid),” J. Sensors, vol. 2016, no.
February 2016.
24. J. D. Rudd, G. T. Roberson, and J. J. Classen, “Application of satellite, unmanned aircraft
system, and ground-based sensor data for precision agriculture: A review,” 2017 ASABE Annu.
Int. Meet., pp. 1–8, 2017.
25. R. Shahzadi, J. Ferzund, M. Tausif, and M. Asif, “Internet of Things based Expert System for
Smart Agriculture,” Int. J. Adv. Comput. Sci. Appl., vol. 7, no. 9, 2016.
26. Aqeel-ur-Rehman, Z. A. Shaikh, H. Yousuf, F. Nawaz, M. Kirmani, and S. Kiran, “Crop irriga-
tion control using wireless sensor and actuator network (WSAN),” 2010 Int. Conf. Inf. Emerg.
Technol. ICIET 2010, 2010.
27. M. Stočes, J. Vaněk, J. Masner, and J. Pavlík, “Internet of things (IoT) in agriculture - Selected
aspects,” Agris On-line Pap. Econ. Informatics, vol. 8, no. 1, pp. 83–88, 2016.
28. F. H. Tseng, H. H. Cho, and H. Te Wu, “Applying big data for intelligent agriculture-based
crop selection analysis,” IEEE Access, vol. 7, pp. 116965–116974, 2019.
29. P. K. A. P. N. R. K. Patil, “A model for smart agriculture using IoT. 2016 International
Conference on Global Trends in Signal Processing, Information Computing and Communication
(ICGTSPICC) | 10.1109/icgtspicc.2016.7955360,” pp. 543–545, 2016.
292 A. Mehla and S. S. Deora
30. L. Minbo, Z. Zhu, and C. Guangyu, “Information Service System Of Agriculture IoT,”
Automatika, vol. 54, no. 4, pp. 415–426, 2013.
31. F. Balducci, D. Impedovo, and G. Pirlo, “Machine learning applications on agricultural datas-
ets for smart farm enhancement,” Machines, vol. 6, no. 3, 2018.
32. M. S. Farooq, S. Riaz, A. Abid, K. Abid, and M. A. Naeem, “A Survey on the Role
of IoT in Agriculture for the Implementation of Smart Farming,” IEEE Access, vol. 7,
pp. 156237–156271, 2019.
33. Aman Kumar Dewangan, “Application of IoT and Machine Learning in Agriculture,” Int.
J. Eng. Res., vol. V9, no. 07, pp. 110–114, 2020.
34. N. Ahmed, D. De, and I. Hussain, “Internet of Things (IoT) for Smart Precision Agriculture
and Farming in Rural Areas,” IEEE Internet Things J., vol. 5, no. 6, pp. 4890–4899, 2018.
35. W. Zhao, X. Wang, B. Qi, and T. Runge, “Ground-level Mapping and Navigating for Agriculture
based on IoT and Computer Vision,” IEEE Access, vol. 8, pp. 221975–221985, 2020.
36. J. Doshi, T. Patel, and S. K. Bharti, “Smart Fanning using IoT, a solution for optimally moni-
toring fanning conditions,” Procedia Comput. Sci., vol. 160, pp. 746–751, 2019.
37. S. Awan et al., “IoT with BlockChain: A Futuristic Approach in Agriculture and Food Supply
Chain,” Wirel. Commun. Mob. Comput., vol. 2021, 2021.
38. M. A. Ferrag, L. Shu, X. Yang, A. Derhab, and L. Maglaras, “Security and Privacy for Green
IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges,” IEEE Access, vol. 8,
pp. 32031–32053, 2020.
39. A. Pathak, M. A. Uddin, M. Jainal Abedin, K. Andersson, R. Mustafa, and M. S. Hossain, “IoT
based smart system to support agricultural parameters: A case study,” Procedia Comput. Sci.,
vol. 155, pp. 648–653, 2019.
40. Y. Wu and K. Chang, “An empirical study of designing simplicity for mobile application inter-
action,” Proc. 19th Am. Conf. Inf. Syst. (AMCIS ’13), vol. 1, pp. 331–338.
41. Y. Intaravanne and S. Sumriddetchkajorn, “BaiKhao (rice leaf) app: a mobile device-based
application in analyzing the color level of the rice leaf for nitrogen estimation,” Optoelectron.
Imaging Multimed. Technol. II, vol. 8558, p. 85580F, 2012.
42. S. Sumriddetchkajorn, “How optics and photonics are simply applied in agriculture?,” ICPS
2013 Int. Conf. Photonics Solut., vol. 8883, no. February, p. 888311, 2013.
43. M. Aitkenhead, D. Donnelly, M. Coull, and H. Black, “E-SMART: Environmental Sensing
for Monitoring and Advising in Real-Time,” IFIP Adv. Inf. Commun. Technol., vol. 413,
pp. 129–142, 2013.
44. R. Confalonieri et al., “Development of an app for estimating leaf area index using a smart-
phone. Trueness and precision determination and comparison with other indirect methods,”
Comput. Electron. Agric., vol. 96, pp. 67–74, 2013.
45. J. M. Molina-Martínez, M. Jiménez, A. Ruiz-Canales, and D. G. Fernández-Pacheco, “RaGPS:
A software application for determining extraterrestrial radiation in mobile devices with GPS,”
Comput. Electron. Agric., vol. 78, no. 1, pp. 116–121, 2011.
46. Biosensors in Agriculture: Recent Trends and Future Perspectives, Springer Sci. Bus. Media
LLC, 2021.
47. B. Liu and A. B. Koc, “SafeDriving: A mobile application for tractor rollover detection and
emergency reporting,” Comput. Electron. Agric., vol. 98, pp. 117–120, 2013.
48. B. G. Jagyasi, A. K. Pande, and R. Jain, “Event-based experiential computing in an agro-
advisory system for rural farmers,” Int. Conf. Wirel. Mob. Comput. Netw. Commun.,
pp. 439–444, 2011.
49. F. J. Mesas-Carrascosa, I. L. Castillejo-González, M. S. de la Orden, and A. García-Ferrer,
“Real-time mobile phone application to support land policy,” Comput. Electron. Agric., vol.
85, pp. 109–111, 2012.
50. F. Ceballos, B. Kramer, and M. Robles, The feasibility of picture-based insurance (PBI):
Smartphone pictures for affordable crop insurance, vol. 4, no. December. 2019.
51. “Crop monitoring,” eLEAF. [Online]. Available: https://eleaf.com/crop-monitoring/.
[Accessed: 05-Aug-2021].
16 Use of Machine Learning and IoT in Agriculture 293
52. “Local, national, & Global Daily Weather Forecast,” AccuWeather. [Online]. Available: https://
www.accuweather.com/. [Accessed: 05-Aug-2021].
53. F. A. Salah, Hassan H., Tawfik K., Ibrahim I., “CITEX: an expert system for citrus crop man-
agement.,” Proc. Second Natl. Expert Syst. Dev. Work. ESADW- 93, 1993.
54. M. Mahmoud, K. El-Araby, and A. Rafea, “LIMEX: An Integrated Expert System for Lime
Crop Management,” IFAC Proc. Vol., vol. 28, no. 4, pp. 337–342, 1995.
55. V. P. Kour and S. Arora, “Recent Developments of the Internet of Things in Agriculture: A
Survey,” IEEE Access, vol. 8, pp. 129924–129957, 2020.
56. A. Vij, S. Vijendra, A. Jain, S. Bajaj, A. Bassi, and A. Sharma, “IoT and Machine Learning
Approaches for Automation of Farm Irrigation System,” Procedia Comput. Sci., vol. 167, no.
2019, pp. 1250–1257, 2020.
57. SrinivasRao, “Agriculture crop production in India,” Kaggle, 13-Aug-2017. [Online].
Available: https://www.kaggle.com/srinivas1/agricuture-crops-production-in-india.
[Accessed: 05-Nov-2021].
58. S. M. Patel et al., “Smart Agriculture using IoT and Machine Learning,” pp. 4533–4536, 2021.
59. Anand, R., Sindhwani, N., & Juneja, S. (2022). Cognitive Internet of Things, Its Applications,
and Its Challenges: A Survey. In Harnessing the Internet of Things (IoT) for a Hyper-Connected
Smart World (pp. 91–113). Apple Academic Press.
Chapter 17
Intelligent Technology, Systems Support,
and Smart Cities
Rahul Gupta
17.1 Introduction
Changed Life Style in urban cities has accelerated the need and growth of smart
cities have surged in recent years; social life domains are restructuring by using
advanced technological infrastructure and digital communication. To offer a secured
human life with comfort in a sustainable environment has proposed the concept of
the smart city. Caragliu et al. [1] conceptualized a smart city as a synthesis of physi-
cal capital or hard infrastructure with quality knowledge, social infrastructure, and
fast communication. The way residents work, behave, and interact among them-
selves and consume public infrastructure has been redefined with the use of
enhanced ICT tools and technological innovations, amalgamating the intellect of
conceptual city with the physical world. The city is transforming into a “smart city,”
with a holistic transformation of amenities, services, and the way these services are
offered and consumed [2, 3]. The surge in urbanization emphasizes environmental
concerns, economic restructuring, and public sector concerns, required to be dealt
with advanced and smart tactics. The pace of changes in expectations of residents
poses further challenges in managing these smart cities. To supersite, these deterrent
organizations need focused technological advances and communication devices.
The role of fast mobile networks, high-speed Internet, IoT, and big data [4–8] plays
a vital role in supporting these services. Automation of various facilities is triggered
for the deployment of artificial intelligence and robotics in support of many ser-
vices. Bowerman et al. [9] suggested that management of the smart city is carried
by integrated technologies which include sensors, electronics networking, comput-
erized systems for data handling, and decision-making algorithms.
R. Gupta (*)
Amity Business School, Amity University Uttar Pradesh, Noida, India
e-mail: [email protected]
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 295
N. Sindhwani et al. (eds.), IoT Based Smart Applications,
EAI/Springer Innovations in Communication and Computing,
https://doi.org/10.1007/978-3-031-04524-0_17
296 R. Gupta
Batty et al. [10] proposed that residents in a smart city avail facility by using
smartphones, supported by IoT, RFID (radiofrequency identification), smart meters,
AI, ML, cloud computing, collective intelligence, software, and their smart applica-
tions. Arasteh et al. [11] said that IoT is the tangible object connected with compu-
tational devices and sensors, for data exchange among connected devices. Since
smart city solely depends on their embedded technologies, the role of IoT is deci-
sive. Komninos et al. [12] said IoT is a major research and innovation offering
numerous opportunities for smart services by interconnecting virtual and physical
environments, spread all over places like vehicles, homes, offices, and other com-
mercial places.
ICT supports enhanced service delivery like retailing, communication, and trans-
portation. Smart cities function on real-time usages and monitor data at intelligent
laboratories facilitating massive exchanges among numerous spheres. Security and
privacy remain a concern in the smooth functioning of smart cities. The authors in
[13] pointed that smart city components include smart mobility, smart living, smart
people, smart governance, etc.
Artificial intelligence an important technology for a smart city is getting popular-
ity with reduced cost of computing and availability of big data. Technology supports
learning from experience, performing complex tasks, and automating decision-
making. Many services like healthcare sector (disease diagnosis, assisting patients
in healthier life), transportation (automatic signal control as per traffic congestion,
driver assistance), surveillance and public safety (monitoring and face recognition),
production (process control and automation, robotics), retailing, etc. use artificial
intelligence to support smart cities for their development and operations.
17.1.1.2 Immutability
17.1.1.3 Transparency
The aid of public blockchain systems, for example, Bitcoin and Ethereum, gives the
user accessibility and interaction with an identical right in the blockchain system.
Also, each and every transaction performs validation and is saved in the blockchain
making it available for every user. Hence, the data in blockchain maintains transpar-
ency to those users who will be able to access and perform verification of performed
transactions.
17.1.1.4 Traceability
Automation
through ML
and
Mobility with Big data
autonomous Decision with
transportation governance
Infrastructure Government,
with sensors education and
health
Smart city
using AI
and
Robotics
Education
with Identity and
robotics creativity
17.2.1 Architecture Layers
Applications and services in smart cities are offered in layers to make them conve-
nient for adjustments and modifications. Each layer is separated logically and physi-
cally. Layering is the feature that attracts most researchers. Various concepts have
combined layers for the operation.
Kyriazopoulou [16] proposed three architectural layers for smart cities; for the
first time, he compared Kyoto, Helsinki, and Amsterdam, with an information layer
as the first layer consisting of data from sensors on a real-time basis, and combined
them with files from the Internet using GIS. A virtual environment is created in the
second layer with 2D maps and 3D spaces. Next, an interacting layer is created for
the intercommunication of agent systems. Anthopoulos et al. [17] studied Trikala in
Greece, with five layers. The first and last layer is for stakeholders (service design-
ers and users) and the next as platforms with infrastructure layer, networks, and
technologies for services offerings. The information layer is the next layer for
required data like geospatial data for operations. The service layer is the fourth layer
with applications required for interaction among an organization and its citizens.
Su et al. [18] suggested a model with three layers for a smart city, starting with
the manufacturer of public infrastructure; middle layer as WSN (wireless sensor
networks), network infrastructure, and cloud computing platform; and last layer as
the manufacturer of basic application systems like construction of the smart home
and wireless city.
Carretero [19] offered self-adaptive architecture known as ADAPCITY, for the
smart city. Heterogenous devices are adopted which to react as per the requirement
of the environment. An immediate recovery and updating are done for new opera-
tions. A four-layered architecture with a physical layer as the first layer comprises
of behavior and state of objects and devices. The grid layer is the second layer com-
municating with a physical layer for data process and storage; the management
300 R. Gupta
layer is the third layer used for data mining, statistical analysis, and prediction, and
next comes the control layer which provides services considering the desires of
users and optimization measures.
A generic architecture is offered by Vilajosana et al. [20] joining features from
existing platforms. The lowest layer as a capillary network layer entails actuators
and sensors required for data collection, warehousing, keeping real-time, historical,
and metadata. Incoming data is received at the service layer from capillary network
layers. Received data is then processed, secured, and combined. Open, big, and
streaming data is analyzed. The Application layer is the last layer, where analyzed
data is transformed into valuable information, which is provided with predefined
interfaces.
17.2.3 Architecture for Events
Creation, application, and reply to uncommon actions are managed with this archi-
tecture; those events relate to asynchronous and uncertain amendments. The result
invokes the production of the report, for example, sensors detect alteration and are
processed by the system. This type of architecture may be clubbed with service-
oriented architecture as suggested by Filipponi et al. [22]; in their work researchers
clubbed events and service architecture as SOFIA, for monitoring cities against
security threats and identifying abnormal emergencies.
17.2.4 IoT Architecture
Diverse devices are networked through the Internet with unique Internet protocol
addresses. Actuators and sensors are embedded in these devices which are remotely
connected to the Internet. New and useful applications communicate among sensors
and facilitate numerous applications. IoT architectures primarily support smart city
operations.
17 Intelligent Technology, Systems Support, and Smart Cities 301
Attwood et al. [23] proposed an infrastructure for a smart city to safeguard
against failure or provide uninterrupted services in the case failure is inevitable. For
all functions to operate properly, networking of sensor-actuator is mandatory. IoT
connects with actuator network to collect data required for managing smart city
operations; smart city critical infrastructure comprises of some basic amenities that
researchers have offered which are CRRI (critical response reasoning instance),
SANOSM (sensor-actuator network overlay state management), aggregation and
annotation services, etc.
Wang et al. [24] used WGS (wind geographic software) offered by NASA for
inventing smart cities. Open-source software allows interaction, visualization, and
simulation, in the smart city. Visual display and data collection through network
analysis, IoT, and web map services are the main components for this platform.
C. Samaras et al. [25] proposed SEN2SOC as a platform for smart cities in Spain,
intending to enhance interaction among social networks and sensors and using NLG
(natural language generation), to enhance the living standard.
17.3 Applications
17.3.1 Food Management
Zhang et al. [26] discussed an IoT-based application for trailing the originality of
the food supply in smart cities, as demand in cities has seen a tremendous surge for
food items due to urbanization. Managing the food supply chain for monitoring,
analyzing through smart sensors by collecting and processing data. The monitoring
is essential for finding any contamination and backtracking any contaminated food
offered in the market.
17.3.2 Energy Management
17.3.3 Transport Management
Losilla [29] said that intelligent transport management is an essential part of a smart
city and its operation would be incomplete in a case of unavailability. The manage-
ment of smart transport is done with the applications for traffic control, law enforce-
ment, safety, and finding parking smartly. Intelligent transport management should
be able to sense, distribute, take decisions, and execute their task independently.
Birk et al. [30] and Qin et al. [31] discussed that intelligent transport manage-
ment system deals with safety applications that screen the animal within safety
perimeter, traffic congestion, intending to prevent and guard against accidents.
Sensors perform their task proactively and signal the other devices in the case of any
possible menace like any obstacle, bad road, and wrong directions/unsafe deriving,
sense speed and communicate with other devices, and give warning signals to the
drivers to avert accidents. Sensing devices perform by using a single or double
approach. In the case a vehicle is detected by a static sensor, the other sensors get
activated for finding further road situations. The other approach provides road con-
ditions to other nodes without any vehicular presence, so data may be transferred to
any area to pass on to other passing vehicles at a later stage. This approach is appli-
cable for detecting non-ephemeral events.
Weingartne and Kargl [32] tried to join WSN and VANET (vehicular ad hoc
network) for the implementation. The WSN monitors streets, and VANET
17 Intelligent Technology, Systems Support, and Smart Cities 303
disseminates the road situation to other vehicles in the vicinity or to the other static
sensors for further warning.
Bohli et al. [33] discussed the techniques to check speed limits and help in traffic
law enforcement by collaborating with other sensors. The traffic controller received
pictures with registration details of speed violators for further action to be taken as
per the prevailing law. Drivers can also be warned via SMS before issuing challan
for a speed violation.
Bohli et al. [33] studied illegal parking with the help of sensor nodes and take
pictures of their registration plates. PGIS (Parking Guidance Information System)
enabled with WSN is suggested against expensive wired sensors.
Lee et al. [34] suggested WSN application detects vacant parking space with the
sensor on every floor. Chang et al. [35] studied post-accident investigation, which is
necessarily required to set responsibilities for the accident. Shuai et al. [36] studied
that sensor nodes monitor the road network and obtain the time value for every seg-
ment for deciding the optimum route. They also propose an application for schedul-
ing the flow of traffic at traffic light intersections. Congestion of vehicles is detected
with the help of sensors at each intersection, where sensors can be placed after the
traffic lights to determine vehicle queues.
Few sensors are required; hence cost is controlled, and acoustic detectors based
on neural network [37] and vibration sensors in vehicles [38] are used for high
accuracy.
Issues: Building technical and social intelligent systems is an issue while managing
smart cities.
Public Safety: Real-time analysis of information to check crime is a quick response
for the threats to the residents.
Healthcare: Improved connections and advanced analyses while interpreting huge
data are required for better healthcare facilities.
Transport: Integration of all means of transportation, mitigating congestion, and
finding new avenues while designing transport networks in smart cities.
Water: Efficient use of water at homes and commercially by guarding the ecosystem
for ensuring the wellness of senior citizens staying alone in smart homes.
17.5 Solutions
17.6 Scope
Research in the area of intelligent systems in the building is not fully explored.
Further improvements can be explored. The use of cloud computing as a platform
needs thorough exploration to improve life in smart cities. Services like municipal
repairs, traffic details scheduling of public works with safety and security of resi-
dents. Managing big data is an immense challenge for researchers.
IoT applications: For procuring valuable real-time information. Services of IoT
are essential and support extensively.
Data management: Huge data is generated in smart cities; thus handling this data
is a challenge. Huge storage is required for keeping this data.
17 Intelligent Technology, Systems Support, and Smart Cities 305
17.7 Conclusion
Services once availed in smart cities will be indispensable; residents find it difficult
if these services are performing up to the mark. Various services are already in use,
and many still need to be explored, with refinement in the existing structure. Services
in smart cities are provided with various challenges, and issues are discussed here in
this paper. The components which transform a city into a smart city include gover-
nance, infrastructure, mobility, and smart communication. The progress of smart
cities is susceptible to many challenges like political, technical, and socioeconomic.
The software and hardware requirements to tackle technical issues must possess
system interoperability and need to be managed at a competitive cost. Data genera-
tion is huge while availing services in smart cities; this data is vulnerable for breach;
hence privacy and security are of utmost importance while managing smart cities,
as the connectivity of devices is susceptible to malicious attacks by spyware. The
growth of smart cities is in its early stage; the requirement of information technol-
ogy tools, information security systems, and other advanced technologies will cer-
tainly boost the development of smart cities [44].
References
18.1 Introduction
Weed infestation has been estimated as a factor causing the decrease in crop yield,
which represents economic losses [1]. These effects occur when weeds emerge
within the planting line, competing with the plant for nutrients, water, and sunlight,
during its growth stage. Large doses of herbicide and weed resistance constitute a
serious problem in world agriculture, which causes the use of agrochemicals with-
out control to have negative effects, among which the unnecessary use of herbicide
(economic loss), the environmental damage (soil and groundwater contamination),
and traces of agrochemicals in food (affect health and food safety) [2, 3].
The conventional way to control weeds is by manual screening, whenever pos-
sible, or spraying herbicides evenly across the field to keep them under control. The
latter method is rather ineffective, as only 20% of the pesticides reach the crop and
less than 1% of the chemical actually contributes to weed control, wastewater dis-
posal, and pollution or overdosing of fruits exceeds the allowable limit and can have
an impact on human health [4].
Since the end of the twentieth century, the collective application of new tech-
nologies has improved agricultural management practices and has given rise to the
field of precision agriculture (PA) [5, 6]. These technologies are based on managing
resources more efficiently, taking into account environmental conditions and the
real needs of the plants. The PA links strategies for the acquisition and analysis of
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 309
N. Sindhwani et al. (eds.), IoT Based Smart Applications,
EAI/Springer Innovations in Communication and Computing,
https://doi.org/10.1007/978-3-031-04524-0_18
310 K. Sandeep Kumar et al.
information in the field and the application of inputs according to parameters estab-
lished through intelligent systems, where a main aspect is the specific management
by site for an optimized and efficient production of field crops. Specific weed man-
agement with precision agriculture concepts seeks to apply the herbicide in the right
place, quantity, and time, to improve productivity and reduce the waste of inputs,
without affecting the environment [7]. To achieve this purpose, weed control sys-
tems are implemented, where robotic systems play a fundamental role [8]. Such
frameworks must be able to detect weeds in the field and use an herbicide spray that
directly affects application.
Digital image treatment techniques have been utilized to recognize phenological
behavior and species of plants as one of the tools of the PA [9, 10]. Systems for
determining the spatial distribution of weeds have been implemented using multi-
spectral cameras on board aircraft [11] or at the field scale [12]. The detection of
weeds in the images using the characterization of the shape and location of the crop
rows allows determining the type and number of weeds per image [13]. Weed
growth occurs in a non-uniform way, but they occur naturally in clusters; that is,
they can grow in (or between) the rows of the crop. Weed detection can be fast and
accurate if it is separated from the soil; this method can solve the technical problems
for the precise application of pesticides using automated navigation land vehi-
cles [14].
The vegetation classification has been studied in various regions of the visible
and infrared spectrum, together with color indices, vegetation indices, and hyper-
spectral and multispectral imaging techniques [15, 16]. Most approaches to auto-
mated weed control use digital RGB (red, green, blue) cameras to detect plants [17,
18]. In the case of multispectral analysis through the acquisition of visible and infra-
red images, the use of bispectral cameras, composed of two camera heads, is
reported in the literature.
The monochrome Images helps us to obtain two congruent pixel images of any
scene in different spectral bands. There are other approaches that use hyperspectral
imaging sensors [19], 3D lidars (light detection and ranging or laser imaging detec-
tion and ranging), 3D surface characterization systems for discrimination of crop
weeds, and fusion concepts with multiple sensors [20].
In general, weed detection and classification are based on the main steps of digi-
tal imaging: acquisition, segmentation, feature extraction, and classification [20].
For this last procedure, images are collected, classified, and characterized as weeds
or plants by a consumer, and then these characteristics are used to form classifiers
based on statistics or machine learning. As a rule, the size of the training set should
be on the order of hundreds or thousands of labeled reference samples in order to
obtain a meaningful classifier [21]. Artificial intelligence-based cultivation tech-
niques have been used to detect and classify weeds among soil, crops, and weeds.
Examples of these techniques are artificial neural networks (ANN), decision trees,
classification based on wavelets, genetic algorithms, support vector machines
(SVM), and algorithms based on fuzzy logic [22–26].
The objective of proposed work is to develop a framework capable of classifying
different types of weeds, through artificial vision and digital image processing, to
18 Deep Learning Approach for IOT-Based Multiclass Weed Classification Using… 311
classify the multiclass weeds. The YOLOv5 architecture has been explored, and
nine classes of weeds forms are classified. This article focuses on multiclass weed
classification algorithm using image processing techniques.
18.2 Literature Review
18.3 Proposed Methodology
The images of the dataset were evaluated one by one, eliminating the blurred ones,
those that contained incomplete objects, and those captured in difficult-to-process
angles, to achieve a noble performance in the training process. Then they were
Selection according to
the state of the art the Select and tag images Pre-processing
method to use
No Accuracy> 80 Yes
&
F-Score> 0.7
ordered in three categories according to the height of its capture: high, medium, and
low with the aim of choosing 100 images that will vary in height, number of sam-
ples, and environment. The 100 selected images that correspond to approximately
600m2 were in TIFF format so a code was made in python to convert them to JPEG
without losing quality. The number of images was chosen taking into account the
labelling processes and CNN training which is time-consuming. Class labelling is
done manually with Label Img software open source code developed in Python by
[35, 40].
18.3.2 Pre-processing
Once the dataset was labelled, several types of multispectral image were generated;
the first one is called NDVI-32 and is created in grayscale by calculating the index
NDVI using 32 bits and performing a percentile-based contrast stretch. The second
type is the False green which was raised by [27] and uses the green, red, and infra-
red bands and irradiance values, and the third type is the NDVI-64 in which 64 bits
are used to calculate the NDVI by adding a gain of green; finally we have the filtered
reds where the bands used are red, red border, and infrared and a high pass filter is
applied to highlight the vegetation (see Fig. 18.3).
In 2016, the YOLO was introduced with its initial version [36], which consists of
two layers fully connected that make the prediction and 24 layers with convolutions
that work as feature extractors; currently works with YOLOv3 [37] version that
includes significant improvements and feature extraction layers were substituted by
the Darknet architecture-53. First YOLO divides the image of input into a grid of
size S×S. Each grid cell forecasts at most two bounding boxes together with the
probabilities of each class for each bounding box and also the degree of trust. Then,
a procedure is performed that unifies the bounding boxes found in such a way that
there is no double detection of the same object.
YOLOv5 results evaluated in the COCO [38] database are similar to those found
by YOLOv4 (see Fig. 18.4). Figure 18.4 shows the comparison of YOLOv5 with
efficient detector [39]. The advantage of using PyTorch is that the framework is
more intuitive and has broader support for deep learning. In the proposed model
even with the image of model input presenting resolution different from the trained
314 K. Sandeep Kumar et al.
images, the model was able to generalize invasive detection even to areas at the
edges of the image that have small deformations due to the lens, in addition to the
angle of view and distances different from the center of the image.
Base method and image type selection multispectral for the implementation of
YOLOv5, the Darknet framework is used [29] which is a framework for open-
source neural networks developed in C using CUDA. This includes recognized con-
volutional neural network architectures like ResNet, AlexNet, and YOLO.
18 Deep Learning Approach for IOT-Based Multiclass Weed Classification Using… 315
This first method has four clearly identified phases (see Fig. 18.5). The first phase
corresponds to pre-processing, where the images are arranged multispectral images
and the false green image is generated from them. In the second stage, the convolu-
tional neural network is fed with the green spurious image. In the third stage, the
image is processed by YOLO resulting in bounding boxes for each class detected.
Finally, in the fourth stage, an algorithm written in Python is used to estimate the
percentage of weeds in the image from the sections detected as weeds.
To select this first method, ten models were trained in total. Then it is showing
the results of the two best models taking into account two aspects: that the accuracy
was equal to or greater than 0.8 since, according to the state of the art, it is a score
of acceptable accuracy for models with the same objective and that the F-score was
0.7 since the total labelling for the training was 2221 samples for lettuce and 3481
for weeds, which indicates a clear class imbalance. It was also about minimizing the
number of images without losing performance in the model, in order to have more
images for model validation and testing. For these two models, the presented num-
ber of samples for the lettuce class was 810 (36%), and for the class weed was
1482 (42%).
The design is based on the development experience of Method 1. Based on the fact
that the trained methods had better performance for the lettuce class, it was decided
to change the third stage and train an improved model for this unique class.
In addition to adding one more stage (see Fig. 18.6), in this stage they take all the
lettuces detected by YOLO and are removed from the image; then it is done a seg-
mentation of the image using the normalized vegetation index (NDVI) to highlight
all that is vegetation. Once the crop is removed from the image, it is highlighted the
remaining vegetation and proceeds to generate a binarized image, where the vegeta-
tion is represented by the color white, which facilitates the estimation of the weed
by computing the percentage of white pixels in the total image. This process was
automated with a Python script that receives the coordinates of the bounding boxes
as inputs thrown by the trained YOLOv5 model and the image to be evaluated.
18.3.5 Dataset
There are 1176 images in dataset out of which 8 types of weed species and 6 types
of wood crops are recognized, so overall 7853 interpretations are made (see
Fig. 18.7).
Three types of digital cameras were utilized to capture the images of dataset:
Sony W800, Canon EOS 800D, and Intel RealSense D435. Images of cultivated
food crops and weeds were taken at different stages of growth under controlled and
field conditions. The folder “annotations” consists of annotated XML files related to
each raw image. These images are manually annotated for labelling each class
of weed.
18 Deep Learning Approach for IOT-Based Multiclass Weed Classification Using… 317
18.4 Simulation Results
In this paper two weed classification algorithms are implemented and simulated
based on YOLOv5 on PyTorch platform. The performance of the proposed algo-
rithm is validated using parameters such as precision, recall, and F1 score: precision
vs confidence graph (see Fig.18.8), precision vs recall graph (see Fig.18.9), and F1
score vs recall graph (see Fig.18.10).
The weed classification model performance is evaluated using confusion matrix
with nine classes and compared with predicated values (see Figs. 18.11) and the Plot
of training and validation precision, recall values are depicted (see Fig. 18.12).
The sample simulation results of predication using YOLOv5-NDVI mask is
shown below (see Fig. 18.13).
18.5 Conclusion
Taking into account the comparison with other methods that work on the same data-
sets, the use of CNNs is strongly recommended as their characteristic extractors
help to better train the models that see their detection improved regardless of its
growth stage, while methods that involve image processing such as thresholding,
reflectivity among others, or fixed characteristics such as sizes tend to weaken the
detection by forcing certain conditions of height and lighting. Regarding YOLOv5
as CNN and PyTorch (Python) tool as framework, ease of performing changes in
318 K. Sandeep Kumar et al.
architecture, as well as its speed not only in training but also in evaluating an image
with an already trained method and added to their ability to do it without a GPU,
makes them very good tool for jobs involving real-time detection and automated
weed control.
Finally, it is highlighted that the use of convolutional neural networks is the cen-
tral axis for new methods that help to improve the optimization of processes in
agriculture and to the specific case of weed evaluation and generate excellent results,
improving the accuracy of weed detection.
References
1. Fried, G., Chauvel, B., Reynaud, P. and Sache, I., Decreases in crop production by non-
native weeds, pests, and pathogens. In Impact of biological invasions on ecosystem services
(pp. 83–101). Springer, Cham (2017).
2. Gomes, H.D.O., Menezes, J.M.C., da Costa, J.G.M., Coutinho, H.D.M., Teixeira, R.N.P. and
do Nascimento, R.F., A socio-environmental perspective on pesticide use and food production.
Ecotoxicology and environmental safety, 197, p.110627 (2020).
3. Jaramillo-Colorado, B.E., Martínez-Cáceres, E.L. and Duarte-Restrepo, E., Volatile chemical
composition and bioactivities from Colombian Kyllinga pumila Michx (Cyperaceae) essential
oil. Acta Scientiarum. Biological Sciences, 38(3), pp.273–282 (2016).
4. Abbas, T., Zahir, Z.A., Naveed, M. and Kremer, R.J., Limitations of existing weed control
practices necessitate development of alternative techniques based on biological approaches.
Advances in Agronomy, 147, pp.239–280 (2018).
5. Khanna, A. and Kaur, S., Evolution of Internet of Things (IoT) and its significant impact
in the field of Precision Agriculture. Computers and electronics in agriculture, 157,
pp.218–231 (2019).
6. Di Cicco, M., Potena, C., Grisetti, G. and Pretto, A, Automatic model based dataset generation
for fast and accurate crop and weeds detection. In 2017 IEEE/RSJ International Conference on
Intelligent Robots and Systems (IROS) (pp. 5188–5195). IEEE (2017).
7. Fernández-Quintanilla, C., Peña, J.M., Andújar, D., Dorado, J., Ribeiro, A. and López-
Granados, F., Is the current state of the art of weed monitoring suitable for site-specific weed
management in arable crops?. Weed research, 58(4), pp.259–272 (2018).
8. Wu, X., Aravecchia, S., Lottes, P., Stachniss, C. and Pradalier, C., Robotic weed control using
automated weed and crop classification. Journal of Field Robotics, 37(2), pp.322–340 (2020).
9. Brook, A., De Micco, V., Battipaglia, G., Erbaggio, A., Ludeno, G., Catapano, I. and Bonfante,
A., A smart multiple spatial and temporal resolution system to support precision agriculture
from satellite images: Proof of concept on Aglianico vineyard. Remote Sensing of Environment,
240, p.111679 (2020).
10. Sandino, J., Pegg, G., Gonzalez, F. and Smith, G., Aerial mapping of forests affected by
pathogens using UAVs, hyperspectral sensors, and artificial intelligence. Sensors, 18(4),
p.944 (2018).
11. Barrero, O. and Perdomo, S.A., RGB and multispectral UAV image fusion for Gramineae
weed detection in rice fields. Precision Agriculture, 19(5), pp.809–822 (2018).
12. Rehman, T.U., Mahmud, M.S., Chang, Y.K., Jin, J. and Shin, J., Current and future appli-
cations of statistical machine learning algorithms for agricultural machine vision systems.
Computers and electronics in agriculture, 156, pp.585–605 (2019).
13. De Castro, A.I., Torres-Sánchez, J., Peña, J.M., Jiménez-Brenes, F.M., Csillik, O. and López-
Granados, F., An automatic random forest-OBIA algorithm for early weed mapping between
and within crop rows using UAV imagery. Remote Sensing, 10(2), p.285 (2018).
322 K. Sandeep Kumar et al.
14. Tian, H., Wang, T., Liu, Y., Qiao, X. and Li, Y., Computer vision technology in agricultural
automation—A review. Information Processing in Agriculture, 7(1), pp.1–19 (2020).
15. Komárek, J., Klouček, T. and Prošek, J., The potential of unmanned aerial systems: a tool
towards precision classification of hard-to-distinguish vegetation types?. International journal
of applied earth observation and geoinformation, 71, pp.9–19 (2018).
16. Di Gennaro, S.F., Rizza, F., Badeck, F.W., Berton, A., Delbono, S., Gioli, B., Toscano, P.,
Zaldei, A. and Matese, A., UAV-based high-throughput phenotyping to discriminate barley
vigour with visible and near-infrared vegetation indices. International journal of remote sens-
ing, 39(15–16), pp.5330–5344 (2018).
17. Neupane, B., Horanont, T. and Hung, N.D., Deep learning based banana plant detection and
counting using high-resolution red-green-blue (RGB) images collected from unmanned aerial
vehicle (UAV). PloS one, 14(10), p.e0223906 (2019).
18. Zhang, L., Niu, Y., Zhang, H., Han, W., Li, G., Tang, J. and Peng, X., Maize canopy tempera-
ture extracted from UAV thermal and RGB imagery and its application in water stress monitor-
ing. Frontiers in plant science, 10, p.1270 (2019)
19. Farooq, A., Hu, J. and Jia, X., Analysis of spectral bands and spatial resolutions for weed
classification via deep convolutional neural network. IEEE Geoscience and Remote Sensing
Letters, 16(2), pp.183–187 (2018).
20. Wang, A., Zhang, W. and Wei, X., A review on weed detection using ground-based machine
vision and image processing techniques. Computers and electronics in agriculture, 158,
pp.226–240 (2019).
21. Wagstaff, K.L. and Liu, G.Z., Automated classification to improve the efficiency of weeding
library collections. The Journal of Academic Librarianship, 44(2), pp.238–247 (2018).
22. Potena, C., Nardi, D. and Pretto, A., July. Fast and accurate crop and weed identification with
summarized train sets for precision agriculture. In International Conference on Intelligent
Autonomous Systems (pp. 105–121). Springer, Cham (2016).
23. Milioto, A., Lottes, P. and Stachniss, C., Real-Time Blob-Wise Sugar Beets vs. Weeds
Classification for Monitoring Fields Using Convolutional Neural Networks. ISPRS Annals of
Photogrammetry, Remote Sensing & Spatial Information Sciences, 4 (2017).
24. Liakos, K.G., Busato, P., Moshou, D., Pearson, S. and Bochtis, D., Machine learning in agri-
culture: A review. Sensors, 18(8), p.2674 (2018).
25. Wong, W.K., Mariappan, M., Chekima, A., Nadarajan, M. and Khoo, B., Detection of
Amaranthus Palmeri sp. Seedlings in Vegetable Farms Using Genetic Algorithm Optimized
Support Vector Machine. In Applied Mechanics and Materials (Vol. 666, pp. 267–271). Trans
Tech Publications Ltd(2018).
26. Yang, C.C., Prasher, S.O., Landry, J.A., Perret, J. and Ramaswamy, H.S., Recognition of
weeds with image processing and their use with fuzzy logic for precision farming. Canadian
Agricultural Engineering, 42(4), pp.195–200 (2020).
27. Osorio, K., Puerto, A., Pedraza, C., Jamaica, D. and Rodríguez, L., A deep learning approach
for weed detection in lettuce crops using multispectral images. AgriEngineering, 2(3),
pp.471–488 (2020).
28. Binch, A. and Fox, C.W., Controlled comparison of machine vision algorithms for
Rumex and Urtica detection in grassland. Computers and Electronics in Agriculture, 140,
pp.123–138 (2017).
29. [Redmon, 2016] Redmon, J. Darknet: Open source neural networks in c. http://pjreddie.com/
darknet/ (2013–2016).
30. Lameski, P., Zdravevski, E. and Kulakov, A., September. Review of automated weed con-
trol approaches: An environmental impact perspective. In International Conference on
Telecommunications (pp. 132–147). Springer, Cham (2018).
31. Kamilaris, A. and Prenafeta-Boldú, F.X., Deep learning in agriculture: A survey. Computers
and electronics in agriculture, 147, pp.70–90 (2018).
18 Deep Learning Approach for IOT-Based Multiclass Weed Classification Using… 323
32. Amjad, S. and Soleimanian Gharehchopogh, F., A novel hybrid approach for email spam
detection based on scatter search algorithm and k-nearest neighbors. Journal of Advances in
Computer Engineering and Technology, 5(3), pp.181–194 (2019).
33. Barrero, O., Rojas, D., Gonzalez, C. and Perdomo, S., August. Weed detection in rice fields
using aerial images and neural networks. In 2016 XXI Symposium on Signal Processing,
Images and Artificial Vision (STSIVA) (pp. 1–4). IEEE (2016).
34. Shirzadifar, A., Bajwa, S., Mireei, S.A., Howatt, K. and Nowatzki, J., Weed species discrimi-
nation based on SIMCA analysis of plant canopy spectral data. Biosystems Engineering, 171,
pp.143–154 (2018).
35. [Tzutalin, 2015] Tzutalin (2015). Labeling. https://github.com/tzutalin/labelImg. Accessed:
26-11-2021.
36. Redmon, J., Divvala, S., Girshick, R. and Farhadi, A., You only look once: Unified, real-time
object detection. In Proceedings of the IEEE conference on computer vision and pattern rec-
ognition (pp. 779–788) (2016).
37. Farhadi, A. and Redmon, J., April. Yolov3: An incremental improvement. In Computer Vision
and Pattern Recognition (pp. 1804–2767). Berlin/Heidelberg, Germany: Springer.
38. Lin, M., Chen, Q. and Yan, S., 2018. Network in network. arXiv preprint
arXiv:1312.4400 (2018).
39. Tan, M., Pang, R. and Le, Q.V., Efficientdet: Scalable and efficient object detection. In
Proceedings of the IEEE/CVF conference on computer vision and pattern recognition
(pp. 10781–10790) (2020).
40. K. R. Swetha, N. M, A. M. P and M. Y. M, “Prediction of Pneumonia Using Big Data,
Deep Learning and Machine Learning Techniques,” 2021 6th International Conference on
Communication and Electronics Systems (ICCES), 2021, pp. 1697–1700, doi: 10.1109/
ICCES51350.2021.9489188.
Chapter 19
Intelligence and Cognitive Computing
at the Edge for IoT: Architecture,
Challenges, and Applications
For decades cloud computing has dominated every other strategy that offers pro-
cessing of data generated by the IoT devices. But, concerns over security, privacy,
network connectivity, and latency among several others have sparked a paradigm
shift in how the world perceives computing. Edge computing is a technology where
computational processes take place at the edge device or very close to the end user.
This makes it (when deployed with the right resources and in the right environment)
capable of compensating for the shortcomings of cloud computing while providing
the same services (to some extent).
Cognitive Computing at the Edge or Edge Intelligence involves trained intelli-
gent models deployed at the edge or nearer to the edge of the network (close to the
data source) enabling efficient resource allocation and local processing of data
which in turn produces real-time results without having to ship data through the
gigantic network that the Internet is, to the cloud. This essentially ensures data pri-
vacy and, if done right, reduced run-time. Edge Intelligence (edge machine learn-
ing) has a wide range of applications in domains such as business analytics, health
informatics, academia, etc.
S. M. Kusuma
Research scholar, School of ECE, Reva University; Department of ETE,
M. S Ramaiah Institute of Technology, Bengaluru, Karnataka, India
e-mail: [email protected]
K. N. Veena
School of ECE, Reva University, Bengaluru, Karnataka, India
K. S. Kavya · B. P. Vijaya Kumar (*)
Department of Information Science and Engineering, M. S Ramaiah Institute of Technology,
Bengaluru, Karnataka, India
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 325
N. Sindhwani et al. (eds.), IoT Based Smart Applications,
EAI/Springer Innovations in Communication and Computing,
https://doi.org/10.1007/978-3-031-04524-0_19
326 S. M. Kusuma et al.
19.2 Issues and Challenges
Edge Intelligence sounds appealing and futuristic, but it also comes with some of its
own shortcomings. As applications migrate from cloud to the edge, there are a num-
ber of questions that need answering. The most important one is will it be cost-
efficient? Are the smart devices and servers close to the edge capable of carrying out
certain functionalities?
Cloud Computing vs Edge Computing ML and AI applications produce and
require huge amounts of data (big data) which will be used both to train models and
answer questions from users. The hierarchical structure of the cloud computing
architecture helps streamline the three main steps of any ML application – prepro-
cess data, train models, and answer questions. The platform performing the func-
tionalities here is the cloud – which isn’t resource constrained.
On the other hand, the performing platform in Edge Intelligence – the intelligent
edge is resource constrained. The major challenge the technology faces is efficient
processing of big data with minimal amounts of available resources – computing
power, storage space, etc. Increasing the storage space, for example, would increase
the cost of production which wouldn’t benefit the developers or the users. The intel-
ligent edge can only hold resources enough to host small applications or perform
small-scale functionalities. Concurrency also takes a hit because of the restriction
on computing power. The intelligent edge must be able to decide on what data
should be sent to the cloud and what data can be processed locally, at the edge.
Edge Intelligence, while ensuring data privacy, is more prone to cyber-attacks
compared to cloud computing. Hacking the intelligent edge to illegally access con-
fidential data is much easier to do than hacking the cloud. In many cases, it simply
makes more sense to stick to cloud computing for obvious reasons. But, the advan-
tages Edge Intelligence has to offer cannot be overlooked either.
19.3 Problems and Functionalities
The main problem the intelligent edge solves is collecting data from local devices
and analyzing it using the (machine learning) model that has been trained either
locally or at the cloud server. The model is usually a machine learning model that
provides direct intelligent functionalities or indirect functionalities such as resource
allocation. The intelligent edge at the very least must be able to preprocess the raw
data produced and analyze it. If the data produced is high dimensional, it just
wouldn’t be feasible to analyze it at the edge. The data will have to be sent to the
cloud both for preprocessing and analysis. The intelligent edge must be designed in
such a way that it is aware of its own capabilities and be able to decide whether data
can be processed and analyzed locally.
19 Intelligence and Cognitive Computing at the Edge for IoT: Architecture… 327
The main objective of Edge Intelligence is to push cognitive computing toward the
edge by exploiting the strengths and capabilities of the smart devices deployed on
or nearer to the edge. By pushing computing to the edge, companies and organiza-
tions are mainly looking to achieve the following:
(a) Data privacy
Data in a cloud computing architecture has to be shipped all the way to the cloud
server for analysis, which is considered one of the major drawbacks of the architec-
ture simply because of accusations on companies and organizations trying to get
their hands on private data of the public. On the other hand, in an edge computing
architecture, the data being analyzed only travels from local devices (sensors,
phones, computers, etc.) to the device located at the edge of the network. This data
also helps personalize the models present at the edge to the needs of the user it
belongs to.
(b) Reduced latency
As cited in previous sections, latency can be a decisive factor in many ML/AI
applications. An edge intelligent framework is much quicker compared to a cloud
computing framework owing to the local processing and analysis of data.
(c) Improved security
While edge computing frameworks are more prone to cyber-attacks compared to
cloud computing frameworks, they offer other security advantages. An edge com-
puting framework isn’t centralized in that it distributes the processing, storage, and
328 S. M. Kusuma et al.
analysis of data across a wide range of devices, data centers, and servers at the edge;
this makes it less vulnerable to DDoS or DoS attacks compared to a cloud comput-
ing framework. Devices and servers do not have to depend on the centralized server
to carry out their functionalities. Because of the distributed framework, the entire
data isn’t present at a single location at any given point in time; this means that even
if an attacker gains illegal access to data through one of the devices, the amount of
data at threat is only the data produced locally.
(d) Personalized applications
Machine learning applications require data that the models are trained with
before they carry out their functionality – predictions, classifications, etc. In some
cases, an edge computing architecture can use data produced locally to train the
models. This essentially means that the machine learning algorithm is trained with
data related to the local environment. This personalizes the host application accord-
ing to the local user’s needs.
(e) Scalability
Edge computing allows companies to expand their computing capacity by modi-
fying the specifications of the local devices near to the edge. This can be cost-
effective in that the entire framework doesn’t have to be modified/scaled as is the
case with cloud computing frameworks. Expansion of processing and analysis of
data only happens at the edge.
(f) Versatility and reliability
Companies often study the locally produced data which helps them target spe-
cific markets (personalized applications). After analyzing the local data produced,
companies only have to modify the local data centers and servers to match the needs
of users. This makes the framework versatile in that it quickly adapts to changes in
use cases in an efficient way. The edge framework is more reliable compared to a
cloud framework because of distributed processing. Any device that goes down
doesn’t affect the entire network. The framework can be trusted to have the edge
device assign jobs to the devices that are active.
19.5 Related Works
The related works in this section highlight how the principles of Cognitive
Computing at the Edge explained in Sects. 19.3 and 19.4 are used to make critical
decisions at the edge of the network. Deciding between using cloud services and
models deployed at the edge is one of the most important aspects of the decision-
making process at the edge. Cognitive computing helps achieve it and enhances
Edge Intelligence.
The convergence of deep learning technologies and edge computing has led to
new opportunities in the field of Edge Intelligence, as explained in “Deep Learning
for Edge Computing Applications” [1]. Recent breakthroughs in deep
19 Intelligence and Cognitive Computing at the Edge for IoT: Architecture… 329
Deep Learning [1] It is a machine learning method that uses artificial neural net-
works to learn patterns from data and make decisions based on them. Artificial
neural networks are computing systems made up of several artificial neurons and
layers (similar to a human brain). Data gets passed from one layer to the other while
the neurons learn patterns from the data.
Deep Reinforcement Learning [2] It is a form of deep learning method where the
algorithm learns to make good decisions while dynamically adjusting actions all the
while trying to maximize the total reward it gets for each action.
334 S. M. Kusuma et al.
reduces the size of the model, which could be beneficial in edge computing
technologies.
• Compression: As machine learning models are computational and memory
intensive, which makes them difficult to deploy on embedded systems, compres-
sion algorithms can be used to reduce the storage without accuracy loss.
Performance Evaluation Metrics These are the metrics used to evaluate the per-
formance of an algorithm. Below are the metrics used in this paper:
• MSE and RMSE: the mean squared error and the root mean squared error are a
measure of how far off the predicted values are from the actual values.
• Quality of Service: It is a numerical representation that evaluates the service
provided by an application to users. The derivation of the QoS is up to the devel-
opers to define. Usually, the QoS derivation is defined keeping in mind the effects
of different environmental parameters on the functionality of an application.
19.8 Existing Implementations
(a) Edge Cognitive Computing (ECC) -Based Smart Healthcare System [4]
The ECC-based smart healthcare system is an application of Edge Intelligence
that monitors the physical health of users while using a cognitive computing-based
resource allocation system called “resource cognitive engine.” The resource cogni-
tive engine is mainly responsible for resource allocation at the edge (the authors
have not disclosed the specific algorithms or models used to achieve this). The
engine also offers high reliability, high flexibility, ultra-low latency, and extensibil-
ity of the system. It does so by making use of network softwarization technology
such as the network function virtualization (NFV), software-defined network
(SDN), and network slicing.
The application has three main layers:
• The user side: This is where the data collection happens. Each user is required to
wear smart clothing that monitors the health factors. This smart clothing sends
the collected physiological health data to the nearest edge computing node. Users
336 S. M. Kusuma et al.
also have mobile phones that receive the following from the edge computing
node: the analysis of the health data, a health risk grade, and the resources
required for the device – the phone.
• Edge computing node: The node receives the physiological health data from the
smart clothing, analyzes it, and calculates a health risk grade and assigns
resources to the user’s mobile phone based on the risk grade. If the risk grade is
high, more resources are allocated to the mobile phone.
• The cloud: This platform is operated and managed by the hospital. This platform
comes into play when the risk grade is too high. It communicates with both the
edge computing node and the end device to ensure that necessary help is sent
to users.
• Role of cognitive computing: The two main operations that happen in the ECC-
based healthcare system is the analyzing of data to produce the health risk grade
and the sending of alerts to monitoring hospitals. Cognitive computing decides
which stack of the architecture needs to be used in the respective situations.
The overall quality of service of the ECC-based smart healthcare system is cal-
culated using the formula below: where m is the number of users, s(i) is the health
risk grade of the ith user, σ (i) ∈ [1, n] is the edge node user i is currently connected
to, and connC(j) ∈ [1, n] shows the number of users connected to edge node j.
m
s (i )
Overall QoS = ∑
i =1 connC (σ ( i ) )
Figure 19.2a shows the results of simulations of the application with and without the
resource cognitive engine. It is clear that the QoS (quality of service) shows an
improvement when resources are allocated to end user devices via the resource
cognitive engine. Figure 19.2b shows the number of users at high risk at the given
time. The fact that the graph isn’t linear and increasing shows the smart healthcare
system’s ability to quickly report users who are at high risk to the hospital and
ensuring that the danger user count isn’t cumulative. The resource cognitive edge
makes sure that suitable data is processed at the edge node and other extensive
operations are sent to the cloud and therefore increase the QoS.
(b) Resource Allocation Using Multilayer Perceptrons or MLPs [6]
In the proposed edge computing application [6], MLPs are used to forecast the
CPU usage at a given time t. Cognitive computing analyzes the CPU usage forecast
and helps decide if the AWS dataset is suitable for processing at the edge. The MLP
model sits at the edge of the network and predicts the CPU core usage for a given
task at a given time. Forecasting the CPU usage at the edge helps ensure service
functionality and appropriate resource allocation to the local devices connected to
the edge. Figure 19.3 shows the architecture of an MLP network.
The network is made up of two layers: linear activation layer (combination of
initialization and hidden layers) and the output prediction layer.
19 Intelligence and Cognitive Computing at the Edge for IoT: Architecture… 337
Fig. 19.2 Simulation of the ECC-based smart healthcare system. (Courtesy: ref [4]])
338 S. M. Kusuma et al.
The AWS CloudWatch Dataset [7] is used to test the performance of MLPs in
predicting the CPU core usage. The dataset has two columns: the timestep and the
CPU core usage. The configuration of the MLP network is given below with number
of nodes and activation function defined accordingly.
Configuration of MLP Network
model.add(Dense(58, input_dim=6, activation=’relu’))
model.add(Dense(24, activation=’relu’))
model.add(Dense(8, activation=’relu’))
model.add(Dense(1, activation=’linear’)
The network has four layers in total – one initialization layer, two hidden layers,
and one output layer. The current and five previous data points are used to predict
the CPU core usage at the current timestep, which is why the input dimension at the
first layer (initialization layer) is 6. It is cited that this window method (size=6)
produced the best results [6]. The activation function sitting on the first three layers
is the “relu” activation function. The output of these layers is hence a vector. The
activation function at the output layer is a “linear” activation function, and the out-
put of this layer is a single continuous value which is the CPU core usage in percent-
age. The following are the hyper-parameters fed to the network:
• Train size: 66% of the AWS dataset
• Test size: 33% of the AWS dataset
• Normalization method: Min-Max scaling (0,1)
Figure 19.4 shows the visualization of the prediction results. The evaluation met-
ric used to measure the performance is MSE (mean square error) and RMSE (root
mean square error). Below are the results:
• Train score: 0.004 MSE (0.063 RMSE)
• Test score: 0.005 MSE (0.070 RMSE)
The results are calculated in terms of loss because of the fact that this is a fore-
casting problem. The train score is higher than the test score for obvious reasons. A
test score of 0.005 MSE is pretty good considering the size of the dataset, size of the
MLP network (four layers), and the fact that there’s been very little hyper-
parameter tuning.
(c) Resource Allocation Using Q-Learning, a Deep Reinforcement Learning
Technique [2]
The authors of [5] propose a “reward” and “punishment” based system where
each agent gets a score of +1 or -1 depending on the optimality of its tasks. A
Q-learning model sits at the edge of the network and learns the probability that a
particular agent will need more than optimal resources. This model is further used
to predict the resources required for an agent’s task based on the agent’s history.
19 Intelligence and Cognitive Computing at the Edge for IoT: Architecture… 339
real usage
2.6
training prediction
test prediction
2.4
2.2
CPU
2.0
1.8
1.6
0 500 1000 1500 2000 2500 3000 3500 4000
Records
Fig. 19.4 Actual vs predicted CPU core usage. (Courtesy: ref [6])
Table below shows the hyperparameters the Q-learning model is trained with hyper-
parameter tuning for Q-learning [2].
Parameter Value Parameter Value
ts 4.5 μsec γ 0.95
Tf 600 symbols ε 1 to 0.1
mUL 200 symbols W 3
L 2640 cycles/bit ρDL 0.7
f0 3 × 109 cycles ε*DL 10−4
ηDL 25 dB α 3
DUL,n(k) {0.5, 1, 1.5, 2} . 103 bit β 0.5
where f0 is the cycle frequency of each CPU core, Tf is the frame length and ts the
length of each frame, mUL is the blocklength of uplinks, DUL is the packet size of
uplinks, L is the required CPU cycles per bit, nDL is the average SNR of downlink,
ρDL is the channel correlation coefficient, εDL is the decoding error probability.
Figure 19.5 shows the simulation results for a mobile edge computing or MEC node
equipped with a three-core CPU and two users connected to the node.
340 S. M. Kusuma et al.
The Q-learning method is compared to two benchmarks: equal and random. The
equal allocation strategy allocates CPU cores equally to all incoming tasks, while
the random allocation strategy does it randomly. It is clear from Fig. 19.5 that the
random method is the least performing method because of the randomness in the
relationship between task requirements and resources allocated. The equal method
performs decently at first, but the task success rate gradually decreases as more and
more tasks arrive. The Q-learning method is the best performing method owing to
the allocation of resources based on historical task requirements of agents.
(d) Bonsai Algorithm at the Resource-Constraint Edge [5]
The authors of [5] stress on the importance of choosing the right machine learn-
ing model to deploy at the edge. Oftentimes, the edge will be resource constrained,
and hence the machine learning model that sits on it becomes significantly impor-
tant. The Bonsai classification model is a tree-based algorithm that doesn’t require
a lot of resources because of its ability to retain accuracy even after optimization
techniques such as tree pruning, memory compression, etc.
The USPS Handwritten Digits dataset [8] is used to test the Bonsai algorithm.
The dataset consists of 9298 rows. Each row has 257 columns: the first 256 columns
are the values formed by flattening the 16 × 16 pixel value matrix for a specific digit,
and the last row is the digit the 16 × 16 pixel value matrix represents, i.e., a number
Fig. 19.5 Simulation results of the Q-learning algorithm. (Courtesy: ref [2])
19 Intelligence and Cognitive Computing at the Edge for IoT: Architecture… 341
between 0 and 9. The following are the hyperparameters under which the Bonsai
algorithm is trained:
• Depth of Bonsai = 2
• Projection dimension = 10
• Number of epochs (iterations) = 80
• Train size = 78% of the USPS dataset
• Test size = 22% of the USPS dataset
Figure 19.6 shows the results of the Bonsai algorithm. This is essentially a clas-
sification problem where each prediction is classified into one of the ten classes (0
to 9). The final accuracy achieved is 92% which is a pretty decent result considering
the size of the dataset. Moreover, the model after 80 epochs takes up only 6.25 KB
of memory, which is significant from the resource-constraint edge’s point of view.
Less memory for the native machine learning model means more room for other
computational processes. The work which is discussed in this research is verified
and validated through various test processes [9, 10] and test techniques [11 12].
19.9 Conclusion
References
1. F. Wang, M. Zhang, X. Wang, X. Ma and J. Liu, “Deep Learning for Edge Computing
Applications: A State-of-the-Art Survey,” IEEE Access, vol. 8, pp. 58322–58336, 2020,
https://doi.org/10.1109/ACCESS.2020.2982411
2. T. Yang, Y. Hu, M. C. Gursoy, A. Schmeink and R. Mathar, “Deep Reinforcement Learning
based Resource Allocation in Low Latency Edge Computing Networks,” 2018 15th
International Symposium on Wireless Communication Systems (ISWCS), 2018, pp. 1–5,
https://doi.org/10.1109/ISWCS.2018.8491089. (2018)
19 Intelligence and Cognitive Computing at the Edge for IoT: Architecture… 343
3. J. J. V. Olmos et al., “Big Data Processing and Artificial Intelligence at the Network Edge,”
2020 22nd International Conference on Transparent Optical Networks (ICTON), 2020,
pp. 1–4, https://doi.org/10.1109/ICTON51198.2020.9203141. (2020)
4. Min Chen, Wei Li, Yixue Hao, Yongfeng Qian, Iztok Humar, Edge cognitive computing based
smart healthcare system, Future Generation Computer Systems, Volume 86, 2018, Pages
403–411, ISSN 0167-739X, https://doi.org/10.1016/j.future.2018.03.054. (2018)
5. S. Naveen and M. R. Kounte, “Machine Learning at Resource Constraint Edge Device
Using Bonsai Algorithm,” 2020 Third International Conference on Advances in Electronics,
Computers and Communications (ICAECC), 2020, pp. 1–6, https://doi.org/10.1109/
ICAECC50550.2020.9339514. (2020)
6. A. F. Glavan and C. Viorel Marian, “Cognitive edge computing through artificial intelligence,”
2020 13th International Conference on Communications (COMM), 2020, pp. 285–290, https://
doi.org/10.1109/COMM48946.2020.9142010. (2020).
7. AWSCloudwatchdataset: https://github.com/numenta/NAB/blob/master/data/realAWSCloud-
watch/ec2_cpu_utilization_53ea38.csv [Reference Date: 24/08/2021]
8. USPS handwritten digits dataset: https://www.kaggle.com/bistaumanga/usps-dataset
[Reference Date: 24/08/2021]
9. Naresh, E., B. P. Vijaya kumar., Niranjanamurthy, M., & Nigam, B. (2019). Challenges and
issues in test process management. Journal of Computational and Theoretical Nanoscience,
16(9), 3744–3747.
10. Naresh, E., Vijaya Kumar, B. P., & Naik, M. D. (2019). Survey on test generation using
machine learning technique. International Journal of Recent Technology and Engineering,
7(6), 562–566.
11. Rayudu, Dadi Mohankrishna, Naresh. E and Vijaya Kumar B. P, “The Impact of Test-Driven
Development on Software Defects and Cost: A Comparative Case Study”, International
Journal of Computer Engineering and Technology (IJCET) 5, no. 2 (2014).
12. H. M. Nayak, N. E, S. P. Shankar and A. B. J, “Cognitive Computing in Software evaluation,”
2020 International Conference on Decision Aid Sciences and Application (DASA), 2020,
pp. 509–514, https://doi.org/10.1109/DASA51403.2020.9317134.
13. Anand, R., Sindhwani, N., & Juneja, S. (2022). Cognitive Internet of Things, Its Applications,
and Its Challenges: A Survey. In Harnessing the Internet of Things (IoT) for a Hyper-Connected
Smart World (pp. 91-113). Apple Academic Press.
14. Gupta, A., Asad, A., Meena, L., & Anand, R. (2023). IoT and RFID-Based Smart Card System
Integrated with Health Care, Electricity, QR and Banking Sectors. In Artificial Intelligence on
Medical Data (pp. 253-265). Springer, Singapore.
Chapter 20
IOT Sensor-Based Smart Agriculture
Using Agro-robot
20.1 Introduction
The use of pesticides has grown significantly due to two factors: the first, to fight
pests such as fungi, insects, weeds, mites, bacteria, nematodes, and rodents, among
other forms of animal or plant life, undesirable or that may harm to agriculture and
diseases that affect the countryside and the second to make the “end product” more
attractive, since it had no pest and disease problems in its development.
However, these pesticides can trigger serious problems when they are applied
incorrectly and can cause the producer financial loss and lethal damage where its
manifestation is “long term” and also harm the environment [1, 2]. The pesticide is
more present in agriculture. However, this product is also used in homes and public
gardens, among others. Despite offering pest control and plant diseases, pesticide
overuse can trigger various problems environmental and health problems.
Environmental problems triggered by the use of incorrect dosage results in environ-
mental contamination around the applied site harming both fauna and flora [2].
Health problems are linked to the applicator of the pesticide and to other people
who reside or are close to the applied location; it can also affect the final consumers
of the culture that was exposed to the product. Like growth of the “Smart Farms”
concept, it became clear how technology can contribute for the development of
agriculture and the need, thinking of how to produce more with less effort, and one
D. D. Patil
Department of Computer Science and Engineering, Shri Sant Gadge Baba College of
Engineering and Technology, Bhusawal, Maharashtra, India
A. K. Singh · D. Bairagi
Digitech Solutions, Indore, India
A. Shrivastava (*)
Sushila Devi Bansal College of Engineering, Indore, Madhya Pradesh, India
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 345
N. Sindhwani et al. (eds.), IoT Based Smart Applications,
EAI/Springer Innovations in Communication and Computing,
https://doi.org/10.1007/978-3-031-04524-0_20
346 D. D. Patil et al.
of the solutions is the possible integration of current technology with the conven-
tional methods of agriculture [3]. The Smart Farms concept involves several chal-
lenges; some of them are as follows [3]:
• Sustainable decision-making: Productively linking effectiveness any decision-
making that was previously related to the user.
• Farmer education and knowledge: One of the most important reasons because it
is not related to the technology itself but to the quality and qualification of field
schooling which is often a big limiter when it comes to technological application.
• Limitations of digital infrastructure: As it is a rural area, one of the main obsta-
cles that exist is the lack of digital infrastructure such as the lack of coverage of
network or mobile phone; linking robotics with agriculture, areas such as auto-
mation and the Internet of Things (IoT) offer several services, including pesti-
cide spraying, which is still a service that is growing a lot in the market having a
bigger prominence in aerial robots [4]. Robotics is a multidisciplinary field on
the rise, involving all segments of engineering [5]. Due to the rapid growth in this
field, the use of robotics in agriculture, industry, entertainment, education and
other diverse areas is increasing [6].
In the context of agriculture, the use of robots and other new technologies gave
rise to the so-called smart agriculture; this means that over time it will be possible
to carry out highly integrated communication in agriculture and visualize and pre-
dict real-time weather conditions, improving crop management, automation, utiliza-
tion of monitoring system, traceability, and greater applicability of sensors in order
to obtain more accurate data [7]. Robotics in agriculture, in particular, was a sector
that made several advances. These advances are due to the advantages that the robot
presents when compared to human beings like higher speed, minimum maintenance
time (in this regard any type of unplanned stop of man as too much heat and physi-
cal wear and tear are considered a maintenance time), staying active for more hours,
and working properly and consistently [8].
So, in a way, the development of technology and the adoption of robotics in the
field are providing good efficiency in production management, stimulating in a way
the management of agronomic knowledge and long-term profit of rural properties
referring to a significant decrease in undesirable impacts on the environment [9].
The robotization of agriculture must consider all the factors that are involved in
production, so that this robot-human relationship enables the intensification of pro-
duction with the smallest possible impact [8]. The use of robots in agriculture is
seen in several parts that compose the whole as harvest [10], at planting [11], robots
that supply the plant inputs in the necessary quantity and perform irrigation [12] and
spraying robots [13]. To achieve high productivity with the least possible impact,
the field is following a tendency to replace heavy and large machines with more
subtle technologies that are based on information and which also provide the user
with viable autonomous operations and reliable [9]. The machines and methods cur-
rently used to assist the process of spraying are falling into disuse due to its very low
efficiency; it has greater soil compaction, and these impacts are driving a trend
toward development of mobile robots to carry out specific tasks but aiming at
20 IOT Sensor-Based Smart Agriculture Using Agro-robot 347
20.2 Literature Review
Robots for open or unprotected areas are primarily concerned with navigation, route
planning, and obstacle avoidance. Over the past decade, this area of research has
evolved from autonomous tractor control to coordinating multiple autonomous trac-
tors. For example, the current system can harvest 100 peat fields in one season using
three autonomous tractors. Each tractor can approach the field, collect peat, drive up
to a certain place, and unload it independently [16]. The selective fumigation devel-
oped by the authors [17] made it possible to identify 88% of weeds in cotton fields
and adequately spray them.
The authors propose an SUV for robotic automation of the garden, and the cre-
ation of a system that detects the stress of plants, diseases, and insects measures the
diameter of the tree and the number and size of fruits before harvesting [16].
Other irrigation and nutrient management projects through distributed harvesting
aim to conserve water, increase efficiency, and reduce the environmental impact of
agricultural production methods using data from sensor networks with plant physi-
ology models for automated irrigation and nutrient management of ornamental
plants used [18].
With regard to robots and autonomous vehicles designed specifically for work-
ing in greenhouses, the authors of [18] recall several studies: the authors of [19] and
[20] developed the Agrobot project, a mobile platform with stereoscopic vision and
a tweezers/hand arm manipulator. The author [21] describes an autonomous vehicle
(Aurora) for spraying crops. Authors [22] and [23] describe a mini-robot for spray-
ing, the navigation of which is controlled by an algorithm based on fuzzy logic. The
348 D. D. Patil et al.
authors [24] describe an independent platform for assessing plant health. The author
[25] has developed a robot for harvesting peppers in a greenhouse. The author has
developed another robot for picking cucumbers.
In Japan, studies were carried out on a robotic vehicle system with RTK-GPS
(real-time and kinematic global positioning) and GIS (geographic information sys-
tem) with the aim of fully automating the production line, marketing, and delivery
of products to end users [26].
Rice planting robot developed in NARO (Japan) was converted to fully auto-
matic mode, equipped with a DC servo motor to control the pressure regulator,
gearbox (CVT) with tool clutch, hydraulic control valve, hydraulic solenoid valve
and steering, left and right brakes, and clutch and lift control. It also uses RTK-GPS
and navigation sensors.
The robot control system, developed on the basis of an integrated agricultural
GIS [27], can process various types of data, for example, this system has the func-
tion of exchanging data with robotic vehicles about working conditions, for exam-
ple, work efficiency, fuel level, fertilizer, and chemicals in each reservoir. The robot
control system can also receive data on the collection of information from robotic
vehicles using intelligent vision sensors.
A technology designed for remote monitoring of environmental variables is the
data acquisition system in agricultural environment, which allows the reading of up
to 250 sensors, and is also suitable for automatic irrigation control. The system
allows remote monitoring of sensors in the agricultural area, enabling the reading of
numerous variables of interest for the automation of processes on a farm, including
irrigation controlled by soil moisture sensors (tensiometers) and by climatological
environmental sensors. These are made up of “intelligent” sensors with automatic
monitoring of environmental data and also on the ground, whose transmission is
carried out via radio-modem [28].
Sprayer robots in agriculture play a crucial role in the economic and social sec-
tors around the world. The system provides accurate spraying, collects real-time
information about the location and the presence of diseases and pests, and transmits
it to a sprinkler or sprinkler, which more or less regulates the need for pesticides. In
addition to reducing waste, this improves the working conditions of the farmer, as
he does not come into contact with highly toxic products that can cause health prob-
lems and, in the worst case, death [29].
Robotic systems have not been fully implemented in agriculture for various rea-
sons such as the fragility of machines, expensive mechanical technology, and opera-
tional efficiency, where machines have to work and improve within their capabilities
and adapt to different situations. In addition, outdoors, it is difficult to spread the
investment cost across multiple operations, since most robots are designed for a
single application and the requirements are usually available at a single station [28].
The challenge to come back to this point is to design these complex systems in
low-power mobile configurations while maintaining the required high computing
power. Good design depends on a balance of factors such as cost, size, performance,
performance, and complexity, as well as the functionality required.
20 IOT Sensor-Based Smart Agriculture Using Agro-robot 349
Currently, the cost of agricultural robotics is still very high, but as the demand for
technology increases, its total cost decreases, which reduces investment in technol-
ogy development or significantly reduces production costs.
Another issue to consider is the natural resilience of farmers in the industry to
changing farming practices while realizing that automation is part of the manage-
ment process and not an instant solution or problem.
20.3 Material and Method
This study was carried out through an exploratory, descriptive, and bibliographic
methodological process. These methods were suitable because the objective was to
describe and point out the state of the art of robotization in agriculture. Through
bibliographical research, it is possible to explain, describe, and analyze its evolu-
tion, the types that are available in the market, and others that are in development
and the technological and social context of its implantation in the field.
• Sensors and methodologies for monitoring that assess chemical, biological, and
physical features related to the quality of the environment, agro-industrial pro-
cesses, and agricultural business chains
• Precision agriculture, with emphasis on instrument development, immediate
reading sensors, remote sensing techniques, aerial images, crop forecast, man-
agement zone recognition technique
• Non-invasive techniques applied to agriculture and environmental monitoring,
such as spectroscopic and imaging techniques, associated with statistical and
computational methods of analysis
In this context, trends in agriculture should focus on the development of meth-
ods, processes, systems, sensors, and devices in terms of the integration and sustain-
ability of production systems.
Robotics is a discipline related to the use and programming of robots. Robotics
refers to the creation of robots and robotic devices. A robot, as ISO (International
Organization for Standardization) calls it, is a reprogrammable, automatically con-
trolled, multifunctional manipulation machine with varying degrees of freedom,
which can have a stationary or mobile basis for industrial automation applications
and applications.
Robots can be classified according to their construction application, into two
distinct types: industrial robots and non-industrial robots. The applications, limita-
tions, models, and forms make them be divided into two basic types.
• Fixed Robot: Also known as robotic arm. It consists of a fixed base and a set of
links and joints that allow movement in various directions. Because it is widely
used in industrial applications, it has become the most common type of robot.
• Mobile Robot: Commonly called a robotic vehicle, it can come in many different
shapes and models. They usually have a certain degree of intelligent assistance
350 D. D. Patil et al.
(architectural software for agricultural robots) – and routes are planned using
Google Earth. Robots can continue to selectively harvest crops, allowing farmers to
cut better, while crops that still need time to grow remain in the field.
Robots are still too small for memory-intensive tasks such as loading fertilizer
and lifting harvested grain, but they can be used where relatively little energy is
required. Weed control is a good example where weeds can be treated with small
amounts of chemical weeds, highly concentrated or mechanically controlled
[28, 32].
The limiting factor for field robots is energy consumption, which affects their
range. While robots can run on fossil fuels, it makes sense to use locally available
resources such as sunlight, renewable energy, or biofuels to reduce their environ-
mental impact. If robots are used for harvesting, they can even use part of the har-
vest for their own operations. This is comparable to the use of homologous biological
preparations, for example, haymaking in horses [28].
Agricultural robots range from large and versatile mechanical machines to small,
autonomous vehicles designed for specific applications. The design of a robot is
often determined by the environment in which it operates. The outdoor environment
often allows the use of large robots such as autonomous tractors. However, outdoor
robots require advanced navigation systems to explore unstructured environments.
But robots used in stores, warehouses, factories, etc. can take advantage of infra-
structure in their environment, for example, controlled lighting conditions can
improve the reliability of imaging systems, allowing more sophisticated robots to be
developed for growth.
A sensor is a term that describes an element that is sensitive to some type of
environmental energy and lacks the necessary functionality to implement it in con-
trol systems that typically require an interface that generates a readable signal to the
controller.
Sensors are devices that can convert physical events into electrical signals.
Hence, sensors are part of the interface between the physical world and the world of
electrical devices such as computers. Another part of this interface consists of actua-
tors that convert electrical signals into physical events. Figure 20.1 represents the
role of a sensor.
Sensors can have two types of outputs, analogue or digital. For the analog type,
they assume any voltage value between two extreme values, and when they assume
only two values, these logical levels can be high or low. In mobile robotics, sensors
are used to measure parts of the robot, among them the internal temperature and the
rotation speed of the engines. Another class of sensors more sophisticated is used to
acquire data from the environment where it is inserted. Because of environment
dynamics this detection activity can become very critical.
Sensors are used for quantitative measurements, not qualitative assessments. The
characteristics of the quantity to be measured will determine the sensor, considering
the quantity to be measured and the sensor environment.
Wireless sensor technology and mobile robotics in agriculture have become one
of the most popular technologies for monitoring agricultural systems.
20.4 Proposed Model
20.4.1 Block Diagram
The complete system uses the Arduino Uno (based on ATMEGA 328). The practical
block diagram of the arrangement is presented in Fig. 20.2. Temperature sensors,
moisture sensor, LCD display, buzzer, and relay are handled by Arduino Uno. All
the modules are interfaced and programmed in a way to wok the entire module in
synchronization. The panel can be linked to the personal computer, and the pro-
gramming of the microcontroller can be done for sensor to work and can sense
breathe. The reading will be demonstrated on the LCD board which is interfaced
with the Arduino Uno board (Fig. 20.3).
20.4.2 Arduino Board
Figure 20.4 shows the main part of the system which is Arduino board, a microcon-
troller section based on ATmega328 [30]. Because of the use of ATmega328, this
board has different features from previous board that it does not use the FTDI USB
to serial driver. This is a very cheap device and has available source, and it has a
very much comfortable to use hardware and software. This can be powered by USB
connection and DC batteries.
Figure 20.5 shows the diagram of the very basic module of liquid crystal display
used in different device and circuits with numerous applications. The LCD can
replace seven-segment display LEDs and other multi-segment LEDs. It has low
cost, is convenient to program, and has no constraint to display special and custom
characters. It uses 5 × 7 pixel matrix to display each character. The command regis-
ters stores the command instructions given to the LCD. The files are the ASCII
value of the character to be displayed on the LCD.
20.4.4 Moisture Sensor
In Fig. 20.6, a moisture sensor is used to measure the water (moisture) content in the
soil. This sensor reminds users to water the plants and also monitors soil moisture.
It is widely used in agriculture, irrigation, and terrestrial botanical gardens. The
working voltage of soil moisture is 5V, the required current is less than 20 mA, and
the interface consists of an analog sensor and operates from 10 °C to 20 °C. The soil
moisture sensor uses a capacitance to measure the dielectric constant of the sur-
rounding soil. In soil, the dielectric constant depends on the moisture content. The
sensor generates a voltage proportional to the dielectric constant and therefore to the
354 D. D. Patil et al.
water table. The sensor calculates the average moisture content over the entire
length of the sensor. Soil moisture sensors are used to measure the evaporation and
moisture loss of plants over time. Monitor soil moisture levels to control greenhouse
irrigation and improve bottle biological experiments. The hardware and software
required for a soil moisture sensor are the Arduino IDE Moisture Sensor software
20 IOT Sensor-Based Smart Agriculture Using Agro-robot 355
and the Arduino Uno board. Soil moisture VCC% v Arduino UNO connects to GND
Soil moisture sensor, and Arduino UNO and end sensor A0 port connect to Arduino
0 analog board.
20.4.5 Relay
The relay is a mains voltage switch (Fig. 20.7). This means that it can be turned on
or off to enable or disable the flow of current. Controlling a relay with an Arduino
is as easy as controlling an output such as a motor. There are many types of modules
such as single-channel, dual-channel, four-channel, and eight-channel. A type of
relay that can handle the high power required to directly drive an electric motor or
356 D. D. Patil et al.
other load is called a contractor. Calibrated performance relays and sometimes more
than one working coil are used to protect the circuit from overload or interference.
The relay has three connection options depending on the mains voltage. There are
common contacts (COM), normally contacts (NO), and normally closed contacts
(NC). There is no contact between the common contact and the normally open (NO)
contact. We activate the relay to connect the COM pin and power is supplied to the
load. There is a contact between the COM contact and the NC contact. A connection
between the COM and NC pins is always required, even when the relay is de-
energized. When we activate the relay, the circuit is open and there is no current to
the load. All shipping pins. The communication between the relay module and the
Arduino is very simple. The GND relay is shorted to ground. The IN1 relay port is
connected to a digital pin on the Arduino. Check the first channel of the relay
(Fig. 20.8).
20.5 Simulation Results
The collected data regarding the variable stem height of plants irrigated by the robot
are presented through descriptive analysis, in Table 20.1, in which the average found
was 22.99 mm, standard deviation was 0.895, and the coefficient of variation was
3.89%. The data collected can be considered normal because the values of symme-
try and kurtosis are in the range of 3 to −3; thus the analysis of variance proves to
be efficient.
20 IOT Sensor-Based Smart Agriculture Using Agro-robot 357
Stem height samples of manually irrigated plants are shown by descriptive analy-
sis, in Table 20.2; the mean value of the samples is 22.67 mm, with a deviation
standard of 1.02 and coefficient of variation of 4.54%.
Table 20.3 shows the analysis of variance of the stem height of sample plants
irrigated by the robot and manually. The P value, level of observed significance, is
the lowest significance value where the null hypothesis H0, hypothesis considered
to be true initially, would be rejected or that there is no difference between the irri-
gation performed by the robot and the manual for the variable stem height; for this
the P value found is compared with the adopted α significance, in this case a value
of 0.05 or 5%, and if the P value is less than or equal to α, it implies the rejection of
hypothesis H0, and if the value P is greater than α, the hypothesis H0 at level α
should be considered. From Table 20.3, it is possible to compare the P value of
0.100, with the value of α, and conclude the hypothesis, with no significant differ-
ence between treatments.
358 D. D. Patil et al.
Comparing the stem height frequency histograms, Figs. 20.9 and 20.10, it is pos-
sible to see that the measurements of the samples treated by the robot present a
predictability of data by the normal curve, and it is also visible that there is less
variation in the robot samples.
Among the advantages of using robots when applied to a work environment is
that they can replace manual work in dangerous tasks, thus reducing contact with
the activity; robots are often used on production lines as a fundamental element of
the assembly process of the most diverse products, for the ability to perform repeti-
tive activities and for the precision and speed of execution. As a good example,
automobile assemblers that employ robotic manipulators in the assembly of their
vehicles are available, as this removes operators from repetitive activities, such as
the assembly process.
various tasks, BT module, and ESP8266 Module for starting and linking communi-
cation between mobile devices (operator/controller) to connect with agriculture
farming robot and battery.
360 D. D. Patil et al.
References
1. Carvalho, F.P., 2017. Pesticides, environment, and food safety. Food and energy security, 6(2),
pp. 48–60.
2. Topping, C.J., Aldrich, A. and Berny, P., 2020. Overhaul environmental risk assessment for
pesticides. Science, 367(6476), pp. 360–363.
3. Relf-Eckstein, J.E., Ballantyne, A.T. and Phillips, P.W., 2019. Farming Reimagined: A case
study of autonomous farm equipment and creating an innovation opportunity space for broad-
acre smart farming. NJAS-Wageningen Journal of Life Sciences, 90, p. 100307.
4. Iaksch, J., Fernandes, E. and Borsato, M., 2021. Digitalization and Big data in smart farming–a
review. Journal of Management Analytics, 8(2), pp. 333–349.
5. Bautista, A.J. and Wane, S.O., 2018, October. ATLAS robot: a teaching tool for autonomous
agricultural mobile robotics. In 2018 International Conference on Control, Automation and
Information Sciences (ICCAIS) (pp. 264–269). IEEE.
6. Niku, S.B., 2020. Introduction to robotics: analysis, control, applications. John Wiley & Sons.
7. Klerkx, L., Jakku, E. and Labarthe, P., 2019. A review of social science on digital agriculture,
smart farming and agriculture 4.0: New contributions and a future research agenda. NJAS-
Wageningen Journal of Life Sciences, 90, p. 100315.
8. Duckett, T., Pearson, S., Blackmore, S., Grieve, B., Chen, W.H., Cielniak, G., Cleaversmith,
J., Dai, J., Davis, S., Fox, C. and From, P., 2018. Agricultural robotics: the future of robotic
agriculture. arXiv preprint arXiv:1806.06762.
9. Marinoudi, V., Sørensen, C.G., Pearson, S. and Bochtis, D., 2019. Robotics and labour in agri-
culture. A context consideration. Biosystems Engineering, 184, pp. 111–121.
10. Yu, Y., Zhang, K., Liu, H., Yang, L. and Zhang, D., 2020. Real-time visual localization
of the picking points for a ridge-planting strawberry harvesting robot. IEEE Access, 8,
pp. 116556–116568.
11. R Shamshiri, R., Weltzien, C., Hameed, I.A., J Yule, I., E Grift, T., Balasundram, S.K.,
Pitonakova, L., Ahmad, D. and Chowdhary, G., 2018. Research and development in agricul-
tural robotics: A perspective of digital farming.
12. Roldán, J.J., del Cerro, J., Garzón-Ramos, D., Garcia-Aunon, P., Garzón, M., de León, J. and
Barrientos, A., 2018. Robots in agriculture: State of art and practical experiences. Service
robots, pp. 67–90.
13. Klauser, F. and Pauschinger, D., 2021. Entrepreneurs of the air: Sprayer drones as mediators of
volumetric agriculture. Journal of Rural Studies, 84, pp. 55–62.
14. Alatise, M.B. and Hancke, G.P., 2020. A review on challenges of autonomous mobile robot
and sensor fusion methods. IEEE Access, 8, pp. 39830–39846.
15. Sharma, R., Kamble, S.S., Gunasekaran, A., Kumar, V. and Kumar, A., 2020. A systematic
literature review on machine learning applications for sustainable agriculture supply chain
performance. Computers & Operations Research, 119, p. 104926.
16. Bergerman, M., Billingsley, J., Reid, J. and van Henten, E., 2016. Robotics in agriculture and
forestry. In Springer handbook of robotics (pp. 1463–1492). Springer, Cham.
17. Chen, D., Lu, Y., Li, Z. and Young, S., 2021. Performance Evaluation of Deep Transfer Learning
on Multiclass Identification of Common Weed Species in Cotton Production Systems. arXiv
preprint arXiv:2110.04960.
18. Tangarife, H.I. and Díaz, A.E., 2017, October. Robotic applications in the automation of agri-
cultural production under greenhouse: A review. In 2017 IEEE 3rd Colombian Conference on
Automatic Control (CCAC) (pp. 1–6). IEEE.
19. Gowri, K.R., 2019. Greenhouse Monitoring and Scheming based IoT Technology. EPRA
IJRD, 4(4), pp. 316–321.
20. Luna, D.F.O. and Ruiz, P.A.M., 2019. Automation and control of greenhouse implemented
technologies: a review. Visión electrónica, 2(2), pp. 381–394.
20 IOT Sensor-Based Smart Agriculture Using Agro-robot 361
21. Fernando, S., Nethmi, R., Silva, A., Perera, A., De Silva, R. and Abeygunawardhana, P.W.,
2020. November. AI Based Greenhouse Farming Support System with Robotic Monitoring. In
2020 IEEE REGION 10 CONFERENCE (TENCON) (pp. 1368–1373). IEEE.
22. Cantelli, L., Bonaccorso, F., Longo, D., Melita, C.D., Schillaci, G. and Muscato, G., 2019. A
small versatile electrical robot for autonomous spraying in agriculture. AgriEngineering, 1(3),
pp. 391–402.
23. Tsolakis, N., Bechtsis, D. and Bochtis, D., 2019. Agros: A robot operating system based emu-
lation tool for agricultural robotics. Agronomy, 9(7), p. 403.
24. Grimstad, L., Zakaria, R., Le, T.D. and From, P.J., 2018. October. A novel autonomous robot
for greenhouse applications. In 2018 IEEE/RSJ International Conference on Intelligent Robots
and Systems (IROS) (pp. 1–9). IEEE.
25. Lee, B., Kam, D., Min, B., Hwa, J. and Oh, S., 2019. A vision servo system for automated
harvest of sweet pepper in Korean greenhouse environment. Applied Sciences, 9(12), p. 2395.
26. Roshanianfard, A. and Noguchi, N., 2017. Development of a heavyweight crop robotic har-
vesting system (HCRH). In 2017 The 3rd International Conference on Control, Automation
and Robotics: IEEE.
27. Tang, J., 2021. GIS Fundamentals for Agriculture. Agro-geoinformatics: Theory and
Practice, p.25.
28. Say, S.M., Keskin, M., Sehri, M. and Sekerli, Y.E., 2018. Adoption of precision agriculture
technologies in developed and developing countries. Online J. Sci. Technol, 8(1), pp. 7–15.
29. R Shamshiri, R., Kalantari, F., Ting, K.C., Thorp, K.R., Hameed, I.A., Weltzien, C., Ahmad,
D. and Shad, Z.M., 2018. Advances in greenhouse automation and controlled environment
agriculture: A transition to plant factories and urban agriculture.
30. Negrete, J.C., Kriuskova, E.R., Canteñs, G.D.J.L., Avila, C.I.Z. and Hernandez, G.L., 2018.
Arduino board in the automation of agriculture in Mexico, a review. International Journal of
Horticulture, 8.
31. González-Teruel, J.D., Torres-Sánchez, R., Blaya-Ros, P.J., Toledo-Moreo, A.B., Jiménez-
Buendía, M. and Soto-Valles, F., 2019. Design and calibration of a low-cost SDI-12 soil mois-
ture sensor. Sensors, 19(3), p. 491.
32. Amulya M.P., Niranjanamurthy M., Yogish H.K., Ravikumar G.K. (2021) Tracking and Analysis
of Corona Disease Using Intelligent Data Analysis. In: Niranjanamurthy M., Bhattacharyya S.,
Kumar N. (eds) Intelligent Data Analysis for COVID-19 Pandemic. Algorithms for Intelligent
Systems. Springer, Singapore. doi:https://doi.org/10.1007/978-981-16-1574-0_16
Chapter 21
Role of the Internet of Things (IoT)
in Digital Financial Inclusion
Jitender Kumar and Anjali
21.1 Introduction
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 363
N. Sindhwani et al. (eds.), IoT Based Smart Applications,
EAI/Springer Innovations in Communication and Computing,
https://doi.org/10.1007/978-3-031-04524-0_21
364 J. Kumar and Anjali
The remainder of the chapter structures is as follows: Sect. 21.2 represents the
literature review. Section 21.3 describes the research methodology. Section 21.4
explains the results and findings. Section 21.5 defines the conclusions of the study.
21.2 Review of Literature
There are numerous national and international review literature in IoT, digital
finance, and financial inclusion. Information communication technology has been
recognized as a key factor in promoting economic success [12–16]. Previous litera-
ture study explained the effect of smartphones on economic growth from 1998 to
2007 in African countries. To determine the effect of smartphones on expansion, the
authors examined mobile penetration rates as well as the cost of mobile local calls.
The conventional growth model and generalized methods of moments (GMM) esti-
mator method were applied to evaluate the outcomes. The results suggested that
smartphone production is leading to economic development in Africa [17]. Digital
finance refers to the modern business model of the use of IoT to carry out a wide
variety of financial operations, for example, payment by third parties, online lend-
ing, and direct sales of money, crowdfunding, online insurance, and banking. The
Internet has the potential to reduce transaction costs and asymmetry of information,
improve the efficacy of risk-based pricing and risk management, and expand the
number of transactions that are possible [18]. The authors studied the moderating
effect of social systems in the connection between IoT payments and inclusion in
Africa. The study showed that perceived networks had a favorable moderating effect
on the link between the use of IoT payments and financial inclusion. The authors
suggested that the existence of strong and weak social networks among users of
digital money promotes financial inclusion in Africa [19]. The study found a causal
relationship between the Internet, digital payments, and financial inclusion in
Africa. Data were collected from 2000 to 2016. The facts showed that the IoT has a
favorable impact on financial inclusion, which means that increased financial inclu-
sion is linked with increasing levels of IoT [20]. An exploratory study on 200 indi-
viduals in India measures the relationship between telecommunications and
financial inclusion. The two dimensions, i.e., financial Inclusion and telecom, were
taken into account. Structural equation modelling was used with Smart PLS to test
and develop the model. The study demonstrated the positive effect of telecommuni-
cations on financial inclusion [21]. The study pointed out the effects of digital
finance on financial inclusion and its stability. The convenience of digital finance
for low- and variable-income individuals is often more valuable than the higher cost
they would also pay to obtain such services from conventionally regulated banks.
Fintech-based digital finance has a significant positive impact on developed and
emerging economies’ financial inclusion [22]. Similarly, the literature highlighted
the effects of digital product growth on financial inclusion in countries of the South
Asian Association of Regional Cooperation. Data were collected from 2004 to 2014
to create a financial inclusion index using primary component analysis. The study
21 Role of the Internet of Things (IoT) in Digital Financial Inclusion 365
found a positive connection between digital product growth and financial inclusion
[23]. The study emphasized the impact of ICT diffusion on financial inclusion. The
study was related to 9 years from 2007 to 2015 (across 16 states). Dynamic panel
data analysis has shown a positive significant effect of the ICT on the financial
inclusion index [24]. Additionally, the authors conducted a study on digital pay-
ments and their contribution to promoting financial inclusion and development. The
authors analyzed how mobile technology could contribute to the practice and theory
of economic development and financial inclusion. The study also proposed the
future scope of work for IoT and financial inclusion, the sustainability of digital
payments and conventional finance, and the regulatory frameworks for institutions
to provide digital payment services [25]. Contextually, the authors explained the
role of IoT for improvised digital financial inclusion. The study found that fintech
enhances digital financial inclusion. The authors concluded that financial inclusion
would help to promote digital services and IoT service providers. The study high-
lighted the positive, negative, and dual dimensions that exist between IoT and digi-
tal financial inclusion [26]. Internet of Things is a promising disruptive technology
with enormous growth, impact, and promise. The parametric analysis is used to
explain the IoT security issues and solutions [27]. Indeed, the authors described the
five technical and managerial challenges of IoT. The study used the net present
value and real options method for IoT investment and concluded that IoT is one of
the most important areas of future technology [28]. Additionally, various previous
literatures are available on the introduction of IoT [29–33] and digital financial
inclusion [34–38].
21.3 Research Methodology
21.4 Results and Findings
Let the analysis of the respondents as follows. The age of respondents is shown in
Table 21.2 and Fig. 21.1. The genderwise respondents are shown in Table 21.3 and
Fig. 21.2. The marital status of the respondents is shown in Table 21.4 and Fig. 21.3.
The education of the respondents is shown in Table 21.5 and Fig. 21.4. The occupa-
tion of the respondents is shown in Table 21.6 and Fig. 21.5. The monthly income
of the respondents is shown in Table 21.7 and Fig. 21.6.
21.4.2 Reliability Analysis
The major objective of this chapter is to examine the factors that influence the role
of IoT in digital financial inclusion. Cronbach’s alpha for 20 items is 0.795, as
shown in Table 21.8. Cronbach’s alpha is greater than 0.70, indicating that the scales
368 J. Kumar and Anjali
are internally consistent. As a result, the instrument used in this study has a high
level of reliability.
21.4.3 Factor Analysis
The new elements determining the role of IoT in digital financial inclusion were
constructed using principal component analysis. Both the KMO index of sampling
adequacy and Bartlett’s test of sphericity can be used to establish the factorability of
the matrix as a whole.
Table 21.9 represents the significance of Bartlett’s sphericity test (p<0.001,
p = 0.000). Furthermore, the KMO index is 0.642, which is higher than 0.6. As a
result, the principal component analysis should be used to examine factors that can
affect the role of IoT in digital financial inclusion.
Table 21.10 shows the total variance explained for factors affecting the role of
IoT in digital financial inclusion at seven phases. Eigenvalues were greater than one;
seven variables were identified, representing 77.00% of the variance.
The rotated factor matrix for the questionnaire is shown in Table 21.11. Factor 1
consisted of four elements with factor loadings ranging from 0.826 to 0.596 after
varimax rotation with Kaiser normalization. Factor 2 is composed of four elements,
each with a factor loading of 0.829 to 0.550. Factor 3 is composed of three elements,
each with a factor loading of 0.933 to 0.561. Factor 4 is composed of three elements,
each with a factor loading of 0.949 to 0.592. Factor 5 is composed of two elements,
each with a factor loading of 0.833 to 0.803. Factor 6 has two elements that range
from 0.902 to 0.887, whereas factor 7 has two elements that range from 0.885
to 0.827.
370 J. Kumar and Anjali
Table 21.12 Factors affecting the role of IoT in digital financial inclusion
Using factor analysis, seven new factors were effectively developed and desig-
nated as factors affecting the role of IoT in digital financial inclusion. The names of
the new factors are listed in Table 21.12, along with the percentage of variance
explained for each component. When the first factor was extracted, it showed the
largest percentage of variation explained. The variables are IoT awareness, financial
service awareness, usability, benefits, trust, security, and privacy, as well as
accessibility.
21.5 Conclusion
The Internet of Things (IoT) is a new technology paradigm that envisions a global
network of interconnected equipment and objects. It is also known as the Internet of
Everything or the Industrial Internet [42]. The Internet of Things (IoT) is largely
regarded as one of the most important areas of future technology, and financial
institutions are showing a lot of interest in it. According to the survey, 25.8% of
respondents are between the ages of 26 and 35, 60.5% are men, 44.8% are married,
45% are graduates, 38.3% are self-employed, and 55.8% have an annual salary of
more than Rs 60000. The sample size for this study is 120 respondents, and we
identified seven major factors that affect the function of IoT in digital financial
inclusion. IoT awareness, financial service awareness, usability, benefits, trust,
security, and privacy, as well as accessibility, are all on the list. As a result, we can
conclude that the Internet of Things(IoT) plays an essential role in digital financial
inclusion.
References
1. CGAP. (2015). What is Digital Financial Inclusion and Why Does it Matter? March
2015.Available at: http://www.cgap.org/blog/what-digital-financialinclusion-and-why-does-
it-matter.
2. World Bank. (2014). Digital finance: empowering the poor via new technologies.
372 J. Kumar and Anjali
3. Sindhwani, N., Maurya, V. P., Patel, A., Yadav, R. K., Krishna, S., & Anand, R. (2022).
Implementation of Intelligent Plantation System Using Virtual IoT. In Internet of Things and
Its Applications (pp. 305-322). Springer, Cham.
4. Bakshi, G., Shukla, R., Yadav, V., Dahiya, A., Anand, R., Sindhwani, N., & Singh, H. (2021).
An Optimized Approach for Feature Extraction in Multi-Relational Statistical Learning.
Journal of Scientific and Industrial Research (JSIR), 80(6), 537-542.
5. Gupta, A., Srivastava, A., Anand, R., & Tomažič, T. (2020). Business Application Analytics
and the Internet of Things: The Connecting Link. In New Age Analytics (pp. 249-273). Apple
Academic Press.
6. Anand, R., Sindhwani, N., & Saini, A. (2021). Emerging Technologies for COVID-19.
Enabling Healthcare 4.0 for Pandemics: A Roadmap Using AI, Machine Learning, IoT and
Cognitive Technologies, 163-188.
7. Shukla, R., Dubey, G., Malik, P., Sindhwani, N., Anand, R., Dahiya, A., & Yadav, V. (2021).
Detecting crop health using machine learning techniques in smart agriculture system. Journal
of Scientific and Industrial Research (JSIR), 80(08), 699-706.
8. Gupta, B., Chaudhary, A., Sindhwani, N., & Rana, A. (2021, September). Smart Shoe for
Detection of Electrocution Using Internet of Things (IoT). In 2021 9th International
Conference on Reliability, Infocom Technologies and Optimization (Trends and Future
Directions)(ICRITO) (pp. 1-3). IEEE.
9. Oberländer, A. M., Röglinger, M., Rosemann, M., & Kees, A. (2018). Conceptualizing
business-to-thing interactions–A socio-material perspective on the Internet of Things.
European Journal of Information Systems, 27(4), 486-502.
10. Rose, K., Eldridge, S., & Chapin, L. (2015). The internet of things: An overview. The internet
society (ISOC), 80, 1-50.
11. Javed, F., Afzal, M. K., Sharif, M., & Kim, B. S. (2018). Internet of Things (IoT) operating sys-
tems support, networking technologies, applications, and challenges: A comparative review.
IEEE Communications Surveys & Tutorials, 20(3), 2062-2100.
12. Sundmaeker, H., Guillemin, P., Friess, P., & Woelfflé, S. (2010). Vision and challenges for
realizing the Internet of Things. Cluster of European research projects on the internet of
things, European Commission, 3(3), 34-36.
13. Nasab, E. H., & Aghaei, M. (2009). The effect of ICT on economic growth: Further evidence.
International Bulletin of Business Administration, 5(2), 46-56.
14. Roller, L. H., & Waverman, L. (2001). Telecommunications infrastructure and economic
development: A simultaneous approach. American economic review, 91(4), 909-923.
15. Seo, H. J., Lee, Y. S., & Oh, J. H. (2009). Does ICT investment widen the growth gap?.
Telecommunications Policy, 33(8), 422-431.
16. Vu, K. M. (2011). ICT as a source of economic growth in the information age: Empirical evi-
dence from the 1996–2005 period. Telecommunications Policy, 35(4), 357-372.
17. Andrianaivo, M., & Kpodar, K. (2012). Mobile phones, financial inclusion, and growth.
Review of Economics and Institutions, 3(2), 30.
18. Shen, Y., Hueng, C. J., & Hu, W. (2021). Measurement and spillover effect of digital financial
inclusion: a cross-country analysis. Applied Economics Letters, 28(20), 1738-1743.
19. Okello Candiya Bongomin, G., Ntayi, J. M., Munene, J. C., & Malinga, C. A. (2018). Mobile
money and financial inclusion in sub-Saharan Africa: the moderating role of social networks.
Journal of African Business, 19(3), 361-384
20. Evans, O. (2018). Connecting the poor: the internet, mobile phones and financial inclusion in
Africa. Digital Policy, Regulation, and Governance.
21. Siddiqui TA, & Siddiqui KI (2017). Impact of Telecommunication on Financial Inclusion in
India: Using Structural Equation Modeling. Asian Journal of Management Applications and
Research, 7(2), 40-54
22. Ozili, P. K. (2018). Impact of digital finance on financial inclusion and stability. Borsa Istanbul
Review, 18(4), 329-340.
21 Role of the Internet of Things (IoT) in Digital Financial Inclusion 373
23. Lenka, S. K., & Barik, R. (2018). Has the expansion of mobile phone and internet use spurred
financial inclusion in the SAARC countries?. Financial Innovation, 4(1), 1-19.
24. Chatterjee, A. (2020). Financial inclusion, information and communication technology diffu-
sion, and economic growth: a panel data analysis. Information Technology for Development,
26(3), 607-635.
25. Ahmad, A. H., Green, C., & Jiang, F. (2020). Mobile money, financial inclusion, and develop-
ment: A review with reference to African experience. Journal of Economic Surveys, 34(4),
753-792.
26. Rauniyar, K., Rauniyar, K., & Sah, D. K. (2021). Role of FinTech and Innovations for
Improvising Digital Financial Inclusion. Int. J. Innov. Sci. Res. Technol, 6, 1419-1424.
27. Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open chal-
lenges. Future generation computer systems, 82, 395-411.
28. Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and chal-
lenges for enterprises. Business Horizons, 58(4), 431-440.
29. Gokhale, P., Bhat, O., & Bhat, S. (2018). Introduction to IoT. International Advanced Research
Journal in Science, Engineering and Technology, 5(1), 41-44.
30. Wang, P., Valerdi, R., Zhou, S., & Li, L. (2015). Introduction: Advances in IoT research and
applications. Information Systems Frontiers, 17(2), 239-241.
31. Jurcut, A. D., Ranaweera, P., & Xu, L. (2020). Introduction to IoT security. IoT security:
Advances in authentication, 27-64.
32. Chen, H., Jia, X., & Li, H. (2011, October). A brief introduction to IoT gateway. In IET
international conference on communication technology and application (ICCTA 2011)
(pp. 610–613). IET.
33. Jurcut, A. D., Ranaweera, P., & Xu, L. (2020). Introduction to IoT security. IoT security:
Advances in authentication, 27–64.
34. David-West, O. (2016). The path to digital financial inclusion in Nigeria: Experiences of
Firstmonie. Journal of Payments Strategy & Systems, 9(4), 256–273.
35. Mhlanga, D. (2020). Industry 4.0 in finance: the impact of artificial intelligence (ai) on digital
financial inclusion. International Journal of Financial Studies, 8(3), 45.
36. Koh, F., Phoon, K. F., & Ha, C. D. (2018). Digital financial inclusion in South East Asia.
In Handbook of Blockchain, Digital Finance, and Inclusion, Volume 2 (pp. 387–403).
Academic Press
37. Aziz, A., & Naima, U. (2021). Rethinking digital financial inclusion: Evidence from
Bangladesh. Technology in Society, 64, 101509.
38. Naumenkova, S., Mishchenko, S., & Dorofeiev, D. (2019). Digital financial inclusion:
Evidence from Ukraine. Investment Management & Financial Innovations, 16(3), 194.
39. Etikan, I., Musa, S. A., & Alkassim, R. S. (2016). Comparison of convenience sampling and
purposive sampling. American journal of theoretical and applied statistics, 5(1), 1–4.
40. Acharya, A. S., Prakash, A., Saxena, P., & Nigam, A. (2013). Sampling: Why and how of it.
Indian Journal of Medical Specialties, 4(2), 330–333.
41. Etikan, I., & Bala, K. (2017). Sampling and sampling methods. Biometrics & Biostatistics
International Journal, 5(6), 00149.
42. Anand, R., Sindhwani, N., & Juneja, S. (2022). Cognitive Internet of Things, Its Applications,
and Its Challenges: A Survey. In Harnessing the Internet of Things (IoT) for a Hyper-Connected
Smart World (pp. 91-113). Apple Academic Press.
Chapter 22
Diagnosis of COVID-19 Using Low-Energy
IoT-Enabled System
22.1 Overview
Y. D. Borole
Department of Electronics and Telecommunications Engineering, G H Raisoni Institute of
Engineering and Technology, Pune, Maharashtra, India
A. Shrivastava (*)
Department of ECE, Sushila Devi Bansal College, BGI, Indore, Madhya Pradesh, India
M. Niranjanamurthy
Department of Master of Computer Applications, M.S. Ramaiah Institute of Technology
(Affiliated to Visvesvaraya Technological University, Karnataka), Bangalore, India
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 375
N. Sindhwani et al. (eds.), IoT Based Smart Applications,
EAI/Springer Innovations in Communication and Computing,
https://doi.org/10.1007/978-3-031-04524-0_22
376 Y. D. Borole et al.
hand washing, are also gradually changing our methods of protecting ourselves
from spreading. Some people try to sever contact with exposed objects/surfaces that
everyone has moved to keep a strategic distance from strangers or the possibility of
contamination. This small survey aims to focus on this creative innovation as well
as its recognizable applications to the COVID-19 epidemic.
In the current severe pandemic situation, the number of infected patients is steadily
increasing everywhere, and there is a need to recruit well-functioning and well-
organized offices provided by the IoT method. In addition, IoT has already been
used to address unmet needs in a variety of areas related to IoT’s current challenges
to health and medicine. The number of cases resolved can be increased and improved
by following the rules and visiting health and medical offices.
The Internet of Things is a creative idea that seeks to isolate all those infected with
the disease. It is important to have a proper screening mechanism during isolation.
A web-based solution is used to accurately track all high-risk patients. This inven-
tion is used to calculate biometrics such as blood pressure, heart rate, and glucose
level [5, 6]. Figure 22.1 shows the main advantages of the Internet of Things for the
COVID-19 pandemic. If this innovation is successfully implemented, we can expect
22 Diagnosis of COVID-19 Using Low-Energy IoT-Enabled System 377
Effective Investigation of
Healthiness statistics managing Ensuing up the
observing in isolated the information
(discussion acknowledged testimony
locality with achieved
with monitoring
message)
As a result, to further educate the general public about the survival of the COVID-19
pandemic, the Government of India has launched a cell phone app called eArogya-
Setu, which aims to establish a link between key potential social insurance segments
and the public of India. In addition, the Chinese government is promoting the mobile
application eClose Contact (English translation) to its residents. This application
indicates the applicant’s proximity to the Crown Builder’s person, aiming to be able
to think more while outdoors. At the end of April 2020, the US government will
launch a similar mobile application for its citizens. After China, the highest number
of COVID-19 cases was reported in Taiwan, which is predictable. Taiwan, on the
other hand, quickly assembled and established precise principles for each potential
coronavirus case, setting up assets for identifying, concealing, and monitoring net-
work wellness. Taiwan provided and coordinated its National Medical Coverage
database with the Movement Department, as well as a list to promote big data gen-
eration for research and generated continuous alerts during the clinical visit in the
light of the kinematic device and clinical indications to assist in the identifiable
evidence of the case; continuous alerts were issued during the clinical visit in the
light of movement effects and clinical indications to assist in establishing a detect-
able condition. They also used the latest invention, which includes QR code
scanning, transport history statements, etc., to obtain potential evidence of
contamination [16].
Minimize
Higher risks of
Therapy faults
Internet of Things
Determination Reduced
Fruitful (Covid- 19) Spending
controlling
Improved
analysis
Fig. 22.2 Significant key benefits of utilizing IoT for battling the COVID-19 pandemic
A knowledge that is able to support reduce the necessity of emotive such things
is the Internet of Things. IoT provides benefit to avoid infections similar to
COVID-19 by removing the necessity to sense things to function them in several
situations, be it at household, a lodging house, and workplaces.
Flexible GPS tracking aside, there are a lot of extra innovative utility cases and
cases that show the bright side of the story. Smart video input phones, smart and
discreet cameras, cool locks, smart lighting, smart TVs, and smart force air systems
are just some of the smart home IoT devices available. In addition to improving the
comfort of mortgage holders and residents, each of these devices can prevent deliv-
ery personnel from having direct physical contact with the milkmaid, Internet deliv-
ery operator etc. All of these devices are provided by contactless voice assistants.
There are countless examples of how these innovative home appliances can help
prevent physical contact and thus prevent disease. Take, for example, the video
entrance telephone, which allows users to check in without having to contact visi-
tors directly at their homes or appear at the front door.
22 Diagnosis of COVID-19 Using Low-Energy IoT-Enabled System 381
22.7.2 Canny Household
There is a plenty of IoT gadgets, for example, keen video entryway telephones, bril-
liant locker, shrewd illuminations, savvy Television, and savvy climate control sys-
tems, among others, that can include a great deal of accommodation for shrewd
home-use cases. These gadgets can be controlled without contact by utilization of
voice partners, for example, Google Assistant, Alexa, and Siri, or through your cell
phone. For instance, video entryway telephones can assist clients with checking
guests at their home. With two-path sound of the video entryway telephone, clients
can associate with guests through portable applications and can thoroughly take out
undesired and less-significant guests. Especially, it tends to be exceptionally helpful
when you are managing food and web-based business conveyances. Moreover,
monitoring illuminations, blower, air conditioner, and other home machines is
effectively conceivable without contacting the switches or utilizing remotes. Clients
can likewise plan on and off occasions of these apparatuses, further diminishing the
physical get in touch with one needs to do to turn on and off the machine.
22.7.3 Savvy Office
Major use instances of IoT in an office domain are smart water and refreshment
distributors, keen access controls, and brilliant office of the executives that incorpo-
rates control of illumination and air conditioner utilizing IoT. Brilliant allocators
can be controlled through motions, versatile application, and voice orders, ruling
out any physical contact with normal assets, for example, water containers and
espresso machines. Keen access controls that are non-biometric and depend on mix
of radiofrequency identification tokens or arbitrarily tokens on portable applications
additionally empower representatives at the working environment to gain admit-
tance to explicit territories without having any need to contact any entrance control
framework, which are in any case utilized by various representatives every day.
Brilliant office of the executive decreases vitality utilization, yet in addition wipes
out the need to control lighting and high voltage and air conditioning (warming,
ventilation, and cooling) at work environments through switches. Utilizing a con-
centrated cloud open dashboard, office directors can set calendars, situations, and
rules for controlling and setting proper modes for assets, for example, lights and
heating ventilation and air conditioning.
382 Y. D. Borole et al.
As isolation is gradually being lifted far and wide and individuals are gradually
beginning to come out in the city, and numerous workplaces are opening with a bit
of their worker quality, there is a dread that the infectious cases out of nowhere deto-
nate if the individuals begin getting rid of the social removing standards. All things
considered, working environments continuing their work in the post isolation period
can be generally powerless against the episode. Utilizing savvy contactless IoT
arrangements in the workplace situations, for example, the smart water and drink
gadgets, brilliant registration frameworks, shrewd access controls, and keen office,
the executives can limit the individual presentation to physical contact in working
environments. For example, keen distributors that can be controlled through signals
or versatile application controls or voice orders can decrease the chance of physical
contact to a base. The equivalent can be said about keen espresso machines. Internet
of Things for lever Patients Precaution Controlling Web of Things isn’t simply con-
strained to shrewd homes or savvy working environments; however they as of now
assume a significant job in current clinical and medicinal services foundations
around the globe. During this pandemic, the clinical Internet of Things biological
system is viewed as the correct innovation to meet the enormous scope persistent
consideration needs. The versatility of Internet of Things frameworks is significant
now for observing an enormous number of high-hazard patients. Regardless of
whether in isolate or seclusion offices or in medicinal services offices or indepen-
dent COVID-19 emergency clinics, the Internet of Things-empowered checking
frameworks can truly ponder by delivering constant patient following information
to guarantee quicker dynamic which is critical for containing an infection episode
of such length and gravity. Such brilliant frameworks can really get rid of the need
of the human services suppliers to go entryway to entryway for doing tests and for
following the cases in thickly populated urban settlements. Internet of Things can
likewise assist numerous patients with checking their internal heat levels and trans-
fer the data on the cloud bolstered application for the specialists to complete inves-
tigation and take proper measures as appropriate. Such mechanized and keen
frameworks help human services suppliers accumulate colossal information in sub-
stantially less time and use the information to follow the contacts and contain the
infection as quickly as time permits. Above all, such robotization and smoothed out
procedure of following and assembling information can truly diminish the outstand-
ing task at hand of the clinical staff so they can work with less pressure and focus
better on persistent consideration and treatment.
A basic advance to check the spread of COVID-19 is the successful isolate of con-
taminated or seen to be tainted individuals. Yet, in a worldwide world, this is actu-
ally quite difficult. Thus, nations all through the world went to Internet of Things- and
22 Diagnosis of COVID-19 Using Low-Energy IoT-Enabled System 383
22.10 Pre-screening or Analysis
While emergency clinics and clinical focuses rushed to begin telemedicine admin-
istrations to analyze and respond to inquiries concerning COVID-19, the quantity of
calls was overpowering. As per healthcare, the normal hold-up time on their hotline
topped to 30 minutes, and numerous guests even dropped out inside this time. To
counter this issue, programming organizations teamed up with clinics and clinical
focuses to set up talkbots on their site and versatile applications. These talkbots pose
a progression of inquiries to screen guests as indicated by the seriousness of their
conditions. Along these lines, the specialists and clinical staff don’t need to address
similar inquiries again and again. They can rather utilize this opportunity to treat
patients.
22.10.1 Dusting and Sanitizing
Dusting, disinfecting, and sanitizing of clinical offices are crucial, and the irresist-
ible idea of COVID-19 further underlines this progression. Because of organiza-
tions’ disinfection services, self-driving robots are utilized for this undertaking.
They purify the surfaces by transmitting high-force bright light, which wrecks the
infection by destroying their deoxyribonucleic acid. They are wireless networking
based and can be controlled through applications.
With social-separating turning into the new typical, drones have discovered some
inventive employments:
1 . To screen and implement the stay-at-home requests
2. To sanitize the exceptionally tainted hotspot
384 Y. D. Borole et al.
22.10.3 Keen Hotel
COVID-19 has had the most impact on the hospitality industry. IoT can help the
company with zero contact registration, which is consistent and reduces the time
guests spend in the inn’s hall. IoT technology is also suitable for incorporating per-
sonalized interaction with visiting environments. They may interact with room
administrators and the front desk using voice partners installed in rooms. Flipping
through channels or film collections on your voice-controlled smart TV, manipulat-
ing window decorations in the room with voice commands, regulating room light-
ing, and setting appealing temperature/mode on ACs all contribute to the visitor’s
comprehension and provide a no-contact experience.
As a rule, the principal bunch of cases tainted by the coronavirus has some move-
ment history. This is the reason it is critical to follow the areas and developments of
individuals and test their well-being in time. Such following endeavors frequently
face mishaps; the same number of individuals disregarding sharpening about the
genuine effect of the infection simply decreases to coordinate and even attempt to
get away from the tests. While following these individuals can be troublesome by
utilizing a customary carefulness and reconnaissance framework, versatile follow-
ing applications can assume an extremely helpful job in this. Versatile applications
can undoubtedly follow the enlisted people by utilizing the GPS trackers permitting
specialists to tell about individual areas IoT is getting even more a need than extrav-
agance for homes, workplaces, and lodgings. In view of social removing and to stay
22 Diagnosis of COVID-19 Using Low-Energy IoT-Enabled System 385
away from numerous touch focuses, versatile applications and voice control are the
best approach forward. Then again, with the stay at home requests set up, Internet
of Things gives us the adaptability of video conferencing and furthermore for all
intents and purposes meeting our friends and family with a basic voice order.
A few governments and emergency clinic frameworks around the globe have uti-
lized artificial intelligence-fueled sensors to help triage in complex manners.
Innovation organization designs a no-contact infrared sensor framework to rapidly
single out people with a fever, even in swarms. Railroad station is furnished with
this framework to distinguish possibly infectious people, supplanting an awkward
manual screening process. So also, hospital sent an artificial intelligence framework
in a joint effort with care at its passageways to capture people with potential
COVID-19 manifestations from visiting patients. Through cameras situated at pas-
sageways, the innovation leads a facial warm sweep and gets on different side
effects, including sweat and staining, to avoid guests with fever. Past screening,
artificial intelligence is being utilized to screen COVID-19 side effects, give choice
help to computed tomography examines, and mechanize emergency clinic tasks.
The Hospital utilizes an Artificial Intelligence driven Computed Tomography check
translator that distinguishes Covid-19 when radiologists aren’t accessible. Some
hospital built up a brilliant field medical clinic staffed to a great extent by robots.
Essential signs were checked utilizing associated thermometers and wristband-like
gadgets. Canny robots conveyed medication and food to patients, lightening doctor
introduction to the infection and facilitating the remaining task at hand of social
insurance laborers encountering depletion. Furthermore, in South Korea, the legis-
lature discharged an application permitting clients to self-report manifestations,
alarming them on the off chance that they leave an “isolate zone” so as to check the
effect of “super-spreaders” who might somehow proceed to contaminate enormous
populaces. Also Internet of Things and simulated intelligence tools and innovations
help strategists, the clinical network, and the community’s efforts to combat each
stage of an emergency and its consequences everywhere: identifying, anticipating,
responding, recovering, and expediting research as shown in Fig. 22.3.
identify persons who are closely affiliated with known disease vectors and to send
instant messages to them requesting quick departure. Robots and semi-autonomous
mechanisms are sent to emergency clinics to answer to urgent needs such as food
and medication delivery, cleaning and sterilization, supporting doctors and mid-
wives, and moving equipment.
uncover these instances. The results are only compared to the prep information and,
at times, cast doubt on the analytical instances, and some chatbots have responded
differently to inquiries regarding adverse effects. Ensure that AI frameworks are
effectively disseminated and that the OECD artificial intelligence principles are fol-
lowed. This is particularly true for permanent population monitoring and control
ratios, where some AI frameworks raise issues about causal details and the danger
of misusing personal information in ways that violate numerous safeguards and
rights. Action is meant to study AI breakthroughs that may benefit from controlled
data, such as that provided by patients with certain diseases. The Data Science
Group and Artificial Intelligence (ML) are working to develop metrics for epide-
miological models, reconstruct data flow via Twitter to promote system executives,
and review the success of strategies to prevent its spread. As a result, various data
sets are instantly posted to the public population. However, as COVID-19 becomes
more widely used [15, 16], more data must be retrieved, created, and analyzed. The
epic coronavirus is having an economic effect. Because of the ease of transmission,
which occurs mostly by saliva capsules or discharges from the nose when an infected
individual inhales or inhales, populous nations must be especially cautious [17]. We
present a machine learning model that can apply non-NU to determine how
COVID-19 impacts the global population and to predict the number of COVID-19
cases and epidemic end dates in various nations. Stop for a correct evaluation of the
spread by legislators and citizens, as well as proactive optimization of the main
response (cloud data centers).
22.14.1 Cloud System
The ML models with IoT are worked to make a decent propelled expectation of the
quantity. New cases and epidemic end dates. To provide a quick poll of advance
calculations and information, we propose a system for transferring these models to
cloud data centers as shown in Fig. 22.4. In a cloud-based situation, administrative
emergency clinics and non-private welfare places send out. Stop their positive
patient tally. Populace thickness, normal and middle age, climate conditions, well-
being offices, and so on are additionally to be incorporated for improving the preci-
sion of the forecasts.
The main reason for concern when using the Internet of Things in the current
COVID-19 epidemic situation is the privacy and preservation of the data obtained,
which is unique and crucial from a long-term health perspective. The next thing to
check is the precautions to be taken when integrating the information organization
22 Diagnosis of COVID-19 Using Low-Energy IoT-Enabled System 389
Cloud initiative
Privatized
Access
Sufferer Clinics
gadgets Authority Offices
and tools
between the relevant tools and conferences. Figure 22.3 illustrates the synthesis of
concerns and challenges in using IoT for the COVID-19 pandemic. Furthermore,
future efforts should focus on database and executives. Additional research will also
look at how to submit financially reasonable selection applications. The COVID-19
pandemic has prompted researchers to explore some new areas for current and
future infections. In Fig. 22.5, the most prominent research fields are shown.
1. Consolidating different pointers: Important boundaries like populace thickness,
conveyance old enough, individual and community developments, level of social
insurance offices accessible, strain type and harmfulness of the infection, and so
forth should be remembered for the relapse model to additionally improve the
expectation exactness.
390 Y. D. Borole et al.
(Internet of Things
:Covid-19)
Protection,
safety and Trials in link
secrecy of incorporation
information
Mistreatment of
Replicated Procedure of
sufferer
misconduct information
information
circumstances accumulation
Fig. 22.5 The overall view on concerns and challenges in using IoT for the COVID-19 pandemic
6. Climate change: There have been significant improvements in air quality world-
wide due to the COVID-19 positive lockdowns. In any case, there is a general
speculation about retaliatory pollution after this closure. Large-scale research
that considers age allocations and the socioeconomics of different traits is
focused as part of future work.
7. Risk assessment: The risk of serious infection associated with COVID-19 in
people of different ages can be estimated using artificial intelligence. Using
these accounts, precautions can be taken to prevent the spread of infection to
sensitive public meetings.
8. Sensors and continuous visual imaging: Sensitive meetings in the general
public can take precautionary measures based on artificial intelligence to prevent
the spread of infection. Continuous sensors can be used, for example, during
rush hour or on a surveillance camera, to track COVID-19 indicators based on
visual imaging and the following applications, illuminating administrative pro-
fessionals for specific clinics and correctional activities. The following require-
ments cover all stages, from departmental outlets to open spots and emergency
clinics.
The examination information with experiments exist which are brief in Fig. 22.6.
Threat Weather
Calculation variation
Investigating
Non-contact treatment societal
and medication broadcasting
conveyance utilizing Investigation information ( AI
mechanical autonomy openings with with IoT)
developing
tendencies
Calculating with IoT and AI Mixing through
enzyme additional
configuration of period sequence
Cov-2 replica
Ongoing sensing
Combining
device and
supplementary
graphical nuclear
displays
medicine
22.15 Conclusion
References
1. Halim A, Javed M, Khan IH. Internet of Things (IoT) applications in orthopedics. J. Clin.
Orthop.Trauma 2019. https://doi.org/10.1016/j.jcot.2019.07.003. In the press
2. Bai L, Yang D, Wang X, Tong L, Zhu X, Bai C, et al. Consensus of Chinese experts Online
with the help of corona virus diagnosis and treatment 2019. Clinical Health 2020 March 17.
Under publication.
3. Wang Y, Hu M, Li Q, Zhang XP, Zhai G, Yao N. Classification may contribute to large-scale
testing of infected individuals COVID-19 in a definite and vague way. arXiv preprint arXiv:
2002.05534. February 12, 2020.
4. Halim A, Javed M, Vaishya R, Deshmukh SJ. Areas of academic research With the effect of
COVID-19. AJEM (Am J Emerg Med) 2020. https://doi.org/10.1016/j.ajem.2020.04.022. In
the press.
5. A novel by Muhammad M.N., Siam al-Din, al-Zubaidi S., AKQ, Ramli R., Yusuf Y. COVID-19
Detection and Diagnosis System Using a Smart Helmet Based on the Internet of Things. Int J
Psychosocial Rehabilitation 2020; 24 (7).
6. Vaishya R, Javed M, Khan IH, Haleem A. Applications of Artificial Intelligence (AI) COVID-19
pandemic. Diabetes and Metabolic Syndrome. Clinical Research & Reviews; 2020. https://doi.
org/10.1016/j.dsx.2020.04.012.
7. Javed M, Vaishya R, Bahl S, Suman R, Vaish A. Industry 4.0. Technologies Their applications
in the fight against the COVID-19 epidemic. Diabetes and metabolism Syndrome. Clinical
research and reviews; 2020. https://doi.org/10.1016/j.dsx.2020.04.032.
8. Ginger Z, Jones D. on the spread of corona virus (Kovid-19) and smart city Network: Global
standards for data sharing with Artificial Intelligence (AI) To benefit from urban health
monitoring and management. Health care 2020 March; 8 (No. 1): 46. Multidisciplinary Digital
Publishing Institute.
9. Dewey C, Hengel S, Jewels E, and Linger M. 19 pandemic. On Intern Med 2020 March 20,
in the press.
10. Anand, R., Sindhwani, N., & Juneja, S. (2022). Cognitive Internet of Things, Its Applications,
and Its Challenges: A Survey. In Harnessing the Internet of Things (IoT) for a Hyper-Connected
Smart World (pp. 91-113). Apple Academic Press.
11. Gupta M, Abdul Salam M, Mittal S. Initiating and enforcing social distance Measures to utilize
smart city and its infrastructure: COVID-19 utility context. ArXiv arXiv Prepress: 2004.09246.
April 13, 2020.
22 Diagnosis of COVID-19 Using Low-Energy IoT-Enabled System 393
12. TL In. Smart City technologies are tackling COVID-19. Global health; January 9, 2020.
13. Hannah TP, Evans GA, Booth CM. Cancer, COVID-19 and Precautions Principle: Prioritize
treatment during the global pandemic. Not Reef Clean Oncol 2020 April 2: 1e3.
14. Roy D, Tripathi S, Kar SK, Sharma N, Verma SK, Kaushal V. Study of Knowledge, Attitude,
concern and perception are essential for mental health care in the Indian population During the
COVID-19 pandemic. Asian Journal of Psychiatry 2020 April 8:102083.
15. Academic Ophthalmology during and after Wang TY, Bandello F. Kovid-19 Pandemic.
Ophthalmology 2020. https://doi.org/10.1016/j.ophtha. 2020.04.029. In the press.
16. Wang CJ, Ng CY, Brooke RH. Response to COVID-19 in Taiwan: Big Data Analytics, New
technology and proactive testing. J Am Med Asoc 2020; 323 (14):1341e2.
17. Zheng SQ, Yang L, Zhou PX, Li HB, Liu F, Zhao RS. Recommendations and Guidelines for
the provision of drug care services during COVID-19 Infection: China Perspective. Research
in social and administrative pharmacology. March 26, 2020.
18. Yang T, Gentle M, Shen CF, Cheng CM. Combined diagnosis during care And the Internet
of Medical Things (IoMT) to combat the COVID-19 epidemic. Diagnostics 2020. https://doi.
org/10.3390/diagnostics10040224. In the press.
19. Gupta R, Mishra A. Controversial issues and emerging concepts in the medical field View and
manage patients with COVID-19 infection Indication of the use of therapeutic drugs and other
drugs used in co-morbidities (High blood pressure, diabetes, etc.). Diabetes and Metabolic
Syndrome. Reverend Clean Reese 2020; 14 (3): 251e4.
20. Clinical examinations of patients with Gupta R, Ghosh A, Singh AK, Mishra A. COVID-19
Diabetes during the pandemic. Diabetes and Metabolic Syndrome. Clean Res Rev 2020; 14
(3): 211e2.
21. Ghosh A, Gupta R, Mishra A. Telemedicine for Diabetes Care in India COVID19 The
Pandemic and the National Lockdown Period: A Guide for Physicians. Diabetes and Metabolic
Syndrome: Clin Res Rev 2020; 14 (4): 273e6
Index
A UV sensors, 284
Accelerometers, 223 vision-based scheme, 286
ADAPCITY, 299 wireless sensors, 284
Adaptive neuro-fuzzy inference system working of IoT, 280
(ANFIS), 235 WSANs, 285
Agriculture domain, IoT, 58 Agro-robot
Agriculture, IoT Arduino Uno board, 352
applications, 280, 281 descriptive statistics, 357
forecasting/predicting, 282 fixed Robot, 349
innovative greenhouses, 281 leaf number frequency histogram, 359
livestock maintenance, 281 liquid crystal display, 353
precision farming, 280 literature review, 347–349
remote sensing, 281 mobile Robot, 349
weather and climatic conditions mobile robotics, 347
monitoring, 282 moisture sensor, 353
deep learning, 278 pesticides, 345
generalized model, agricultural problems, relay module, 355
288, 289 robotic manipulators, 347
green agriculture, 286 SAFAR, 350
humidity sensor, 284 sensor, 351
information system, 285 smart agriculture, 346
IoT-based agriculture research smart farms concept, 346
application, 288 stem height analysis, 358
light sensor, 284 technological and social context, 349
machine learning for precision agriculture, AI-based networks, 221
286, 289 Air quality estimation, 101
map-based navigation, 286 Air quality management, 200, 212
mobile applications for, 287 Alexa, 166
need of IoT, 279 Alexa bulb, 166
PH sensors, 284 AlexNet, 311, 314
RMS, 285 Allowable depletion, 156
satellites, 285 Amalgamated users, 232
soil moisture sensor, 282 “Amazon Key”, 45
temperature sensor, 284 Ambient-assisted living (AAL), 42
© The Editor(s) (if applicable) and The Author(s), under exclusive license to 395
Springer Nature Switzerland AG 2023
N. Sindhwani et al. (eds.), IoT Based Smart Applications, EAI/Springer
Innovations in Communication and Computing,
https://doi.org/10.1007/978-3-031-04524-0
396 Index
W X
Waste reduction, 162 X-rays of chest, 6, 8
Water irrigation, 162
Wearable devices, 42
Wearable gadgets, 223 Y
Wearable technology, 179 YOLOv5, 311, 313, 314, 316, 317
activity sports, 187–188
analytics, 191
challenges, 192–195 Z
goal of sensors, 192 ZigBee, 204, 206, 226, 234
guidelines, 194 Z-Wave, 206, 226