Internet of Things in Modern Computing - Theory and Applications by Abhinav Sharma
Internet of Things in Modern Computing - Theory and Applications by Abhinav Sharma
Computing
The text focuses on the theory, design, and implementation of the Internet of
Things (IoT), in a modern communication system. It will be useful to senior
undergraduate, graduate students, and researchers in diverse fields domains,
including electrical engineering, electronics and communications engineer-
ing, computer engineering, and information technology.
Features:
Edited by
Vinay Chowdary
Abhinav Sharma
Naveen Kumar
Vivek Kaundal
First edition published 2023
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742
and by CRC Press
4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN
CRC Press is an imprint of Taylor & Francis Group, LLC
© 2024 selection and editorial matter, Vinay Chowdary, Abhinav Sharma, Naveen Kumar and
Vivek Kaundal; individual chapters, the contributors
Reasonable efforts have been made to publish reliable data and information, but the author
and publisher cannot assume responsibility for the validity of all materials or the consequences
of their use. The authors and publishers have attempted to trace the copyright holders of all
material reproduced in this publication and apologize to copyright holders if permission to
publish in this form has not been obtained. If any copyright material has not been acknowl-
edged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, repro-
duced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now
known or hereafter invented, including photocopying, microfilming, and recording, or in any
information storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.
copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive,
Danvers, MA 01923, 978-750-8400. For works that are not available on CCC please contact
[email protected]
Trademark notice: Product or corporate names may be trademarks or registered trademarks
and are used only for identification and explanation without intent to infringe.
DOI: 10.1201/9781003407300
Typeset in Sabon
by SPi Technologies India Pvt Ltd (Straive)
Contents
Preface vii
Acknowledgments xi
Editors xiii
Contributors xv
v
vi Contents
Index 239
Preface
The Internet of Things (IoT) has emerged as the major contributor behind
the development of the technological infrastructure which connects physical
objects to the internet. It is evident that an examination of the role of the
IoT in the modern era is urgently needed. Therefore, the intention of this
publication is to have all the necessary information regarding the IoT in
modern computing contained within a single cover.
The organization of the book is as follows:
Chapter 1 lays the foundation stone in terms of the progress made in the
Internet of Things (IoT) field and advance the challenges in the architecture
design of IoT. The chapter also discusses both classical and emerging IoT
models.
Chapter 2 provides a bird’s-eye view of Industry 4.0 and the role of
Artificial Intelligence (AI) and the Internet of Things (IoT) in achieving this
new framework. It provides a quick overview of the history of the industrial
revolution by highlighting some significant historical events. Industry 4.0 is
a new model that strives to build an open and smart processing platform.
Chapter 3 discusses the role of edge computing and its ability to do
sophisticated calculations at the edge location rather than doing the calcula-
tions at the cloud location. In this chapter recent study, developments and
benefits in edge computing are also highlighted. There are a few illustrations
and photographs in this chapter.
Chapter 4 discusses the role of Industrial IoT (IIoT) within Industry 4.0.
IIoT, which is an integral part of IoT, is one of the most widely used terms
in the development of modern computing. This chapter offers some detailed
insights with regard to IIoT, along with an outline of its key technologies.
The chapter also focuses on the open challenges and application domain of
IoT in Industry 4.0.
Chapter 5 provides a general framework for the detection of Denial of
Service (DoS) attacks in the field of IoT. It analyses the research gaps in DoS
detection techniques and then offers a two-stage framework for DoS detec-
tion technique based on the Fuzzy Rule Manager and Neural Networks.
Chapter 6 examines the parameters that may either accelerate or hinder
the adaption of IoT by means of a skill development course. The indicated
vii
viii Preface
IoT, deep learning and 5G. This book serves not only academic and techni-
cal readers but also those based in industry, allowing them to gain some
insights into the latest developments in the technological framework and its
impact. Practical case studies from leading industries such as Bosch, Larsen
& Toubro, etc are also a part of this book. This book can also serve as a
valuable reference for academics, mechanical, mechatronics, computer sci-
ence, information technology and industrial engineers, and environmental
scientists as well as researchers in related subjects.
Dehradun, India
Editors:
Vinay Chowdary
Abhinav Sharma
Naveen Kumar
Vivek Kaundal
Acknowledgments
The editor acknowledges CRC Press - Taylor & Francis Group for this
opportunity and professional support. My special thanks to Gagandeep
Singh, Publisher Engineering, CRC Press, Gauravjeet Singh Reen, Senior
Editor - Engineering and Isha Ahuja, Editorial Assistant - Engineering for
the excellent support provided to us during the completion of this book.
Thanks to the chapter authors and reviewers for their availability for this
work.
xi
Editors
Prof. Dr. Vinay Chowdary received his B.Tech. M.Tech. degrees from MIST,
JNTUH, Hyderabad, India, in 2005 and 2012, respectively, and a Ph.D.
degree from UPES, Dehradun, India, in 2020. He is currently working as an
Associate Professor at the uGDX Institute of Technology, India. He has more
than 14 years of teaching and research experience and extensive experience
in curriculum design. His research interests include embedded systems, the
Internet of things, wireless sensor networks, and advanced microcontrollers.
Dr. Naveen Kumar received a B.Tech. from SVIET, Punjab, India in 2009
and an M.E. from NITTTR, Chandigarh, India in 2013. He is currently
working as a Research Engineer, FCS Railenium, France where the design
and development of antennas for railways is being carried out under the
European project ‘Shift2Rail’. He completed his Ph.D. in July 2021 from
Thapar Institute of Engineering and Technology (Deemed to be University),
Punjab, India. He has more than six years of experience in research, aca-
demics, and corporate domains. He is the inventor of a novel antenna for
which a French patent was filed in June 2020. He has published almost 50
papers in various reputable national/international journals and conferences.
He is an active member of IEEE, EuMA, and IAENG. His research interests
are antenna design, antennas for IoT, MIMO antennas, metamaterials, and
characteristic mode analysis.
xiii
xiv Editors
xv
xvi Contributors
CONTENTS
1.1 INTRODUCTION
DOI: 10.1201/9781003407300-1 1
2 Neeraj Gupta
1. Scale: The explosive growth of smart things has burdened the network
with enormous amounts of data. It is estimated that by 2025 total
data volume generated by IoT devices will reach 79.4 zettabytes. The
rollout of 5G is expected to further accelerate the growth of connected
cars, smart home devices, and industrial equipment. According to fore-
casts, there will be 30.5 billion IoT devices across the world by 2025.
Each of these devices will require the allocation of a unique address in
order to communicate. It is essential to strategies IPv6 addresses allot-
ment to meet the growing demand for connected devices.
2. Security: As per the report by [3], the following statistics underline the
importance of cybersecurity in the Internet of Things.
a. Cybercrime is estimated to generate about $10.5 trillion 2025.
b. 98% of IoT devices are ill-equipped to deal with cyber-attacks.
c. On average, 97% of encrypted files affected by so-called ransom-
ware attacks are recovered after companies pay the criminals.
The components in IoT need to be connected in order to share
the information. In this process the role of data security is of par-
amount importance. The basic building blocks of confidentiality,
integrity, and availability need to be ensured at various stages,
including nodes, gateways, fog, and cloud computing.
3. Privacy: With users’ increasing use of smart devices, the generated
data is more individual-specific. This may be wide-ranging in nature:
financial, health-related, location-based, and/or shopping patterns, to
list just a few. The service provider stores and processes this informa-
tion as one aspect of their offered services. The service provider must
clearly state their policies, stating the status of ownership and acces-
sibility of the information with other parties.
IoT architecture and design 3
literature: oneM2M architecture (as shown in Figure 1.1) and IoT World
Forum Reference Model.
1.1.2.1 oneM2M architecture
This has developed from a project [7] founded by eight prominent ICT
standard development organizations in 2012 to address an issue related to
the interoperability and scalability issues faced by IoT technologies. The
oneM2M standard is open access in nature. The architecture is a middle-
ware technology connecting applications and devices via RESTful APIs.
In this system the architecture stack consists primarily of three layers: the
Application Layer, the Service Layer, and the Network Layer:
A. First Layer: This layer describes ‘things’ in IoT, which can generate
data, perform conversion from analog to digital and vice versa, and
can be queried and controlled from a remote location. A low level of
processing can be quantified in the devices.
B. Second Layer: This layer is concerned with communication and con-
nectivity protocols among the devices. The existing network protocols
can be used to transfer data
1. Between devices on the same network.
2. Between devices across different networks
3. To the device/element present in the upper layer.
To enable communication through devices that are not IP-compliant,
the model suggests using gateways. The network security and network
analytics could also be implemented at this layer.
C. Third Layer: This layer focuses on data analysis and transformation
by processing the data. The process can either be used to control the
devices based on the type of event generation or be stored at a higher
layer for storage and further processing. Edge computing and fog
computing are the related terminologies that can be referred to for
this layer.
D. Fourth Layer: The fourth layer is concerned with data accumulation
and is accessible to applications on a non-real-time basis. The acces-
sibility is converted from event-based need to query-based processing.
E. The accumulated data are further filtered and stored in database
tables.
IoT architecture and design 7
F. Fifth Layer: The data abstraction layer handles the variety, variability,
and veracity of data. This layer’s responsibility is to ensure that con-
solidated data stored in the cloud is both reconciled and consistent.
The data generated from various sources can have different formats
and semantics.
G. Sixth Layer: Various software and algorithms are deployed to interpret
the consolidated data based on the need of the business application.
H. Seventh Layer: The IoT involves people and processes. The aim is to
collaborate with different processes and people to ease the decision-
making. Collaboration and processes are the right terms coined for
this layer.
A. Cloud-based IoT
Cloud computing has revolutionized how computing services, both
hardware and software, are being offered. Virtualization has played a
vital role in facilitating multi-tenant architecture. The storage facility
of cloud service providers accumulates the massive volume of data
generated from multiple sources. The cloud can act as a platform for
sharing typical applications among numerous ‘things’ located at vari-
ous locations. The enormous amount of processing power can be uti-
lized to process for analysis. The disadvantages of the clouds include
high latency, security, energy consumption, and billing.
B. Fog Computing-based IoT
The term fog computing was coined by Cisco Systems to reflect the
extension of the services provided by cloud computing to the edge of
the network. Fog computing provides immediate processing, storage,
8 Neeraj Gupta
and application services to the physical IoT devices. The aim of intro-
ducing the fog layer is to reduce latency and increase the quality of ser-
vice for the real-time applications to lower reaction time, for example,
in industrial applications, healthcare, and transportation. The signifi-
cant advantages offered are:
1. That it leads to reduced network congestion, thus improving the
latency period and lower bandwidth consumption.
2. That it addresses the security and privacy issues on a local level
rather than on a global level.
3. That it exhibits a high level of flexibility, scalability, and fault toler-
ance can be attained.
To supplement the requirements of IoT, fog computing environments
are required to address the challenges posed with regard to scalabil-
ity, interoperability, security, data quality, security, location-awareness,
mobility, and reliability. In order to do so, efforts have been made to
standardize the fog architecture. Open Edge Computing, Open Fog
Computing, and Mobile Edge Computing are among of the major
architectural models proposed by academia and industry.
C. SDN-based IoT
The network elements are responsible for forwarding and manag-
ing data packets in the networks. In traditional networking, each
networking component needs to be handled separately. This sepa-
ration leads to the cumbersome of managing an extensive network.
Software-Defined Networks (SDN) is an emerging architecture that
enables the separation of control logic from the networking elements.
The controller defines the rules and policies required to manage vari-
ous networking elements. The logically centralized control provides a
global view of the network and aids in framing rules to ensure vari-
ous complexities are managed well. SDN architecture has three main
components: Data Plane/Infrastructure Layer; Control Layer; and
Application Layer [9]. The layers interact with each other through an
Application Programming Interface (API) based on Representational
State Transfer (REST) architecture. In the context of IoT, SDN pro-
vides the capability to handle dynamically and control management
issues. The primary advantages of this approach are effective man-
agement, the seamless handling of mobile devices, the efficient distri-
bution of resources, and optimized energy management [10]. Some
challenges require attention from both academia and private industry
to fully realize the power of SDN [11].
1. Fault Tolerance: The resiliency of SDN networks is a major issue.
There is a need to design and implement the high fault-tolerant net-
work operating systems for controllers.
2. Scalability: The movement of voluminous data consumes resources
and constrains the network capabilities. Network Function Virtuali
zation can provide alternate solutions, but the issue of performance
analysis based on the size of networks needs to be addressed.
IoT architecture and design 9
1.1.4 Conclusion
The Internet of Things has vast potential to address the issues concerning day-
to-day human activities. Wireless sensor networks, fog computing, and data
analytics form the basic building blocks for IoT. This chapter discussed the
basic terminologies, challenges, and key IoT architectural models. Apart from
the two classical models that aim to standardize the IoT architecture, emerg-
ing paradigms, such as blockchains, VANETS, and Artificial Intelligence, are
being incorporated to enhance the capabilities of IoT. The applications based
on the IoT facilitate real-time monitoring, increase productivity, and reduce
the need for human effort. The COVID era underlines the necessity and use-
fulness of IoT applications. Future research activities need to focus on the
heterogeneity of devices, scalability, security, and energy-efficient systems.
REFERENCES
Application of Artificial
Intelligence (AI) and the Internet
of Things (IoT) in process
industries toward Industry 4.0
Rashi Verma, Raju Yerolla, Suhailam P
and Chandra Shekar Besta
National Institute of Technology, Calicut, India
CONTENTS
DOI: 10.1201/9781003407300-2 13
14 Rashi Verma et al.
AI Artificial Intelligence
CPS Cyber Physical System
ICTs Information & Communication Technology
CPPs Cyber Physical Production System
IoT Internet of Things
IoS Internet of Services
IoMs Internet of Manufacturing Services
IoP Internet of People
2.1 INTRODUCTION
The Industrial revolution has been deemed the most influential revolution
in history due to its pervasive impact on people’s everyday lives. The term
“industrial revolution” has been coined for a period of history that began in
eighteenth-century Great Britain and finished in the twenty-first century. As
a consequence of the acceleration of technical innovation processes, this has
resulted in a plethora of new tools and devices. Additionally, it includes sub-
tler technological advancements in areas such as labor, manufacturing, and
resource use. The industrialization, which commenced in the 18th century, was
a turning point in human history and has continued up to the current day. We
are now on the brink of a technological revolution that will impact our lives,
jobs, and relationships for the rest of our lives. The transition will be unpar-
alleled in terms of its scope, breadth, and complexity. We do not yet know
how it will play out. However, one thing is certain: a thorough and coordi-
nated response is required, which will include all stakeholders, from the public
and business sectors to education and civil society. Everyone is connected to
wider global developments. The industry has seen four revolutions to date [1].
Following each revolution, industry has upgraded with a new generation of
technology. The chronology of the industrial revolution is shown in Figure 2.1.
Application of AI and IoT in process industries toward Industry 4.0 15
2.2 INDUSTRY 4.0
Figure 2.2 Industry 4.0 will lead to higher profitability and productivity © CC
BY 3.0 [2].
2.2.4.2 Big data
To allow instantaneous decision-making, the gathering and detailed assess-
ment of large amounts of data is required. A collection of data from various
origins such as industrial machines and technology, as well as corporate and
client solutions, will become commonplace [7]. Big data, as per Forrester, is
made up of four factors: the amount of data, the variety of data, the rate
at which new data is collected and processed, and data value. To find out
more, collected information from previously acquired data is used find the
risks that happened during different manufacturing processes in the past in
20
Rashi Verma et al.
Figure 2.4 The Industry 4.0 paradigm.
Application of AI and IoT in process industries toward Industry 4.0 21
Figure 2.6 Internet of things, Internet of services, Internet of data © CC BY 3.0 [2].
2.2.4.4 Augmented reality
Industry 4.0 research is highlighting best practices for enhancing quality in
assembly processes via the use of augmented reality. Augmented reality solu-
tions might help with various tasks, such as gathering components in a ware-
house and conveying maintenance procedures to mobile devices. The industry
may use augmented reality to provide employees with accurate information,
helping them to make better choices and carry out tasks more quickly. During
the time analyzing the system in need of repair, operators may be able to
obtain restoration information on how to rebuild a specific item [7].
the full network of value generation; and (c) engineering from beginning to
conclusion from start to finish throughout the product life cycle.
Vertical and horizontal digital integration and computerization of indus-
trial operation need the automation of communication and collaboration,
most notably along established procedures [15].
2.2.4.6 Cybersecurity
Alongside the expanding accessibility and utilization of conventional com-
munications protocols associated with Industry 4.0, the demand to protect
crucial manufacturing technologies and production lines from cybersecurity
risks has increased substantially. Consequently, secure, reliable communica-
tions are vital, as are enhanced machine and user identification and access
control [7]. Closely integrating the physical, service, and digital worlds may
improve the quality of information required for the design, optimization,
and operation of manufacturing systems [8]. The phrase “computing, com-
munication, and control systems” (CPS) refers to “Computing, communica-
tion, and control mechanisms are all intertwined in natural and man-made
systems (physical space)” [10]. The primary features of CPS are decentral-
ization and process autonomy.
Supply networks, which are categorized as Collaborative Cyber Physical
Systems since they’re commonly utilized in production system in addition to
other cyber physical systems like municipal traffic control and control sys-
tems [16], are important parts of CPS development. The use of cloud tech-
nology to automatically link cyber physical systems in real time allows for
continuous data flow [17]. The digital shadow of manufacturing represents
a physical thing in a virtual or information realm. Massive cyber physical
systems problems are used to solve the basic demand of manufacturing
operations and system optimization in real settings [12]. By incorporating
relevant sensors into CPS, it should be possible to identify machine failure
and prepare CPS automatically for fault repair tasks. The cycle time required
to conduct the task at that station is also utilized to establish the appropriate
allocation of resources at each workstation [18]. Cloud computing is used
in the 5C architecture to link machines (machine-to-machine or human-to-
machine) [19]. For example, the smart vehicle is an example of integrated
Cyber Physical System (CPS) manufacturing that represents Industry 4.0
innovation [20]. This production employs an information-mining technique
to perform prognosis that attains a precision of 80% [21].
2.2.4.7 Simulation
Simulations will be increasingly widely utilized in production systems that
harness real-time data to create a virtual model of the actual environ-
ment, which may include machines, goods, and workers, therefore reduc-
ing machine setup times and improving quality [7]. Virtual commissioning
24 Rashi Verma et al.
2.2.4.8 Autonomous robot
On a daily basis, robots become increasingly self-sufficient, flexible, and
coordinated, and they will unavoidably connect with one another and oper-
ate safely among others while learning from experience [7]. An autonomous
robot is used to improve the accuracy of autonomous manufacturing pro-
cesses and to operate in locations where there are few people. Autonomous
robots are capable of performing jobs accurately and rationally in a certain
amount of time [22] while also prioritizing safety, adaptability, diversity, and
participation, Table 2.1 shows some of the examples.
2.2.4.9 Additive manufacturing
Additive manufacturing is primarily used in Industry 4.0 to create more
personalized items with complex and lightweight constructions. If addi-
tive manufacturing is decentralized, the cost of production will decrease,
resulting in a greater performance rate [7]. Production should be quicker
and less costly through the use of different manufacturing methods such as
fused deposition modeling (FDM), selective laser melting (SLM), and selec-
tive laser sintering (SLS) [8]. Numerous businesses confront the challenge
of expanding product customization and decreasing time to market as cus-
tomer demands evolve on a regular basis. Digitization, IT sector involve-
ment, and correct processes were able to resolve the aforementioned issues.
A more efficient organizational structure was required to accommodate
growing demand while also extending the life of the product.
For instance, identical model automobiles are offered with a variety of
engine, bodywork, and equipment choices, all designed to satisfy the demand
of more savvy clients who are selective [13]. Figure 2.7 depicts the various
technologies of Industry 4.0.
2.3 ARTIFICIAL INTELLIGENCE
1940s
• “A Logical Calculus of Concepts Intrinsic in Nervous Action,” by
Warren McCullough and Walter Pitts, was published in 1943. This
was the first mathematical formalism for building a learning algorithm
was described in this study.
• The Organization of Behavior: A Neuropsychological Theory, written
by Donald Hebb in 1949, proposed that experiences alter brain cir-
cuits and that connections between neurons become stronger as they
are utilized more frequently.
1950s
• In 1950, Alan Turing publishes “Computing Machinery and Intelligence,”
in which he proposes the Turing Test, a technique for determining
whether or not a computer is intelligent.
• In 1950, two Harvard freshmen, Marvin Minsky and Dean Edmonds,
build SNARC (Stochastic Neural Analog Reinforcement Calculator),
the first neural network computer.
• In 1950, Claude Shannon releases “Programming a Computer for
Chess Playing.”
• Isaac Asimov wrote “The Three Laws of Robotics” in 1950.
1960–2010
• In 1963, John McCarthy founds the Stanford Artificial Intelligence
Laboratory.
• In 1972, PROLOG, a logic programming language, is created.
• Japan’s Ministry of International Trade and Industry (MITI) launched
the Fifth Generation Computer Systems project in 1982.
• In response to Japan’s FGCS, the US government launched the Strategic
Computing Initiative in 1983, which funds advanced computing and
Artificial Intelligence research via DARPA. DART, an automated logis-
tical planning and scheduling program, was used by US troops during
the 1991 Gulf War.
• In 1997, Gary Kasparov, the world chess champion, is beaten by IBM’s
Deep Blue.
• In 2005, STANLEY, a self-driving car, wins the DARPA Grand Challenge.
28 Rashi Verma et al.
2010–2020
• Apple introduced Siri, an Artificial Intelligence-powered virtual assis-
tant, as part of their iOS operating system in 2011.
• In 2014, Google’s self-driving vehicle passes the state’s driving test for
the first time.
• Amazon launched Alexa, a virtual assistant, in 2014.
• In 2016, Hanson Robotics introduces Sophia, the world’s first “robot
citizen,” a humanoid robot capable of face recognition, linguistic com-
munication, and facial expression.
• Baidu will make its Linear Fold AI algorithm accessible to scientists
and physicians working on a SARS-CoV-2 vaccine during the early
phases of the pandemic in 2020. In only 27 seconds, the algorithm
can predict the virus’s RNA sequence, which is 120 times quicker than
previous approaches.
Due to the fact that industrial AI is still in its infancy, its structure, tech-
niques, and difficulties must be defined in order to provide a foundation for
its use in industry. To do this, we developed an Industrial AI ecosystem that
incorporates the field’s most critical components and acts as a road map for
increased knowledge and application. The methods and technologies on
which an Industrial AI system may be constructed are also discussed.
2.3.4 Industrial AI ecosystem
The proposed Industrial AI ecosystem, as depicted in Figure 2.9, is a pro-
gressive approach for thinking for determining industry demands, issues,
technologies, and strategies in order to build revolutionary AI systems. This
diagram may be used as a logical framework for developing and imple-
menting an Industrial AI strategy. This ecosystem highlights common unmet
business demands such as self-awareness, self-comparison, self-prediction,
self-optimization, and resilience.
When seen through the lens of the Cyber Physical Systems (CPS) proposed
in [2], these four technologies become more intelligible. The above mentioned
30 Rashi Verma et al.
Figure 2.8 I ndustrial AI’s impact: from resolving apparent issues to avoiding prob-
lems those aren’t evident.
2.4 EXAMPLES
2.4.1 Automotive
2.4.1.1 Description
Automobile manufacturers use a number of technologies and components
to enhance their vehicles’ utility and cost. Hydraulic systems are important
because they govern vehicle braking and the steering wheel, two signifi-
cant aspects of driving. These hydraulic systems need high-pressure pipes
or hoses to operate properly. Due to the wide range of vehicle designs, a
plethora of hydraulic hose variations are made every day to serve busy auto-
motive manufacturing lines.
Challenges
• A wide range of those options.
• Manual inspection is inefficient and expensive.
Solution
• Computer vision models have been taught to reliably recognise and
categorise different types of defects (cuts, gouges, drag marks, and so
on) at a rate of 99% or higher.
• When compared to a fully human method, an automated end-of-line
inspection using computer vision achieves almost 100% coverage and
improves categorization uniformity.
Application of AI and IoT in process industries toward Industry 4.0 33
Challenges
• One-on-one examination by a worker is prohibitively expensive.
• Escaping faults is considerably more expensive than non-escaping
defects due to increased expenses in packing, shipping, and inventory
management.
Solution
• The rapid training of computer vision models for the purpose of iden-
tifying damaged items.
• Side cameras with an edge device and stream processing provide for
real-time computing and 100% inspection at line speeds.
2.4.3 Medical equipment
2.4.3.1 Description
Pharmaceutical products are complicated and are frequently mass-produced
on automated lines capable of outputting 100 million or more units per year.
To increase profitability, several pharmaceutical businesses are adopting digi-
tal transformation. The use of cameras and streaming analytics tools to help
with fault identification on high-throughput lines is one aspect of this trend.
Challenges
• Manual inspection is time-consuming and ineffective in detecting
some sorts of problems.
• High rejection product cost.
• Limited line availability and throughput.
Solution
• Computer vision enables the detection of problems that are not readily
apparent to the naked eye.
• 99% accuracy in identifying and classifying defects.
2.5 CONCLUSION
ACKNOWLEDGEMENTS
REFERENCES
21. S. Simons, P. Abé, and S. Neser, “Learning in the AutFab – The Fully Automated
Industrie 4.0 Learning Factory of the University of Applied Sciences Darmstadt,”
Procedia Manuf., vol. 9, pp. 81–88, Jan. 2017, doi: 10.1016/j.promfg.2017.04.023.
22. S. Vaidya, P. Ambad, and S. Bhosle, “Industry 4.0 – A Glimpse,” Procedia
Manuf., vol. 20, pp. 233–238, Jan. 2018, doi: 10.1016/j.promfg.2018.02.034.
23. T.-T. Shi, P. Li, S.-J. Chen, Y.-F. Chen, X.-W. Guo, and D.-G. Xiao, “Reduced
Production of Diacetyl by Overexpressing BDH2 Gene and ILV5 Gene in Yeast
of the Lager Brewers with One ILV2 Allelic Gene Deleted,” J. Ind. Microbiol.
Biotechnol., vol. 44, no. 3, pp. 397–405, 2017, doi: 10.1007/s10295-017-1903-6.
24. L. D. Xu, W. He, and S. Li, “Internet of Things in Industries: A Survey,” IEEE
Trans. Ind. Inform., vol. 10, no. 4, pp. 2233–2243, Nov. 2014, doi: 10.1109/TII.
2014.2300753.
25. J. Lee, E. Lapira, B. Bagheri, and H. Kao, “Recent Advances and Trends in
Predictive Manufacturing Systems in Big Data Environment,” Manuf. Lett.,
vol. 1, no. 1, pp. 38–41, Oct. 2013, doi: 10.1016/j.mfglet.2013.09.005.
26. J. Lee, H. D. Ardakani, S. Yang, and B. Bagheri, “Industrial Big Data Analytics
and Cyber-physical Systems for Future Maintenance & Service Innovation,”
Procedia CIRP, vol. 38, pp. 3–7, Jan. 2015, doi: 10.1016/j.procir.2015.08.026.
27. D. Wu, M. J. Greer, D. W. Rosen, and D. Schaefer, “Cloud Manufacturing:
Strategic Vision and State-of-the-Art,” J. Manuf. Syst., vol. 32, no. 4, pp. 564–
579, Oct. 2013, doi: 10.1016/j.jmsy.2013.04.008.
28. L. Zhang et al., “Cloud Manufacturing: A New Manufacturing Paradigm,”
Enterp. Inf. Syst., vol. 8, no. 2, pp. 167–187, Mar. 2014, doi: 10.1080/17517575.
2012.683812.
29. J. Lee, H. Davari, J. Singh, and V. Pandhare, “Industrial Artificial Intelligence for
Industry 4.0-Based Manufacturing Systems,” Manuf. Lett., vol. 18, pp. 20–23,
Oct. 2018, doi: 10.1016/j.mfglet.2018.09.002.
Chapter 3
CONTENTS
3.1 INTRODUCTION
3.2 LITERATURE REVIEW
In the wake of the rise of the Internet of Things (IoT) and the popularity of
cloud-based services, a new computing paradigm, known as edge comput-
ing, has emerged. As even the Internet of Things (IoT) and cloud services
grow more widespread, edge computing is becoming increasingly popular.
Some of the challenges that edge computing may address include security
and privacy, reaction speed and battery life to mention a few [1] Numerous
examples of edge computing in operation are provided throughout the
chapter, spanning beyond cloud dumping to smart urban and collaborative
edge computation. Edge computing difficulties and potential are explored in
this chapter, which experts believe will catch the attention of the community
and stimulate more study in this area.
Mobile edge computing (MEC) has the potential to offload Internet of
Vehicles (IoV) applications while also allocating resources. The majority of
current offloading methods are useless because they consider the applica-
tion as a whole when determining whether or not it should be offloaded. A
more sophisticated solution is presented in the paper [2], which is an
A review on edge computing 39
It is the only part of edge computing that takes into account the physical
location of the device. In traditional corporate computing, data is usually
made at the client port, such as a person’s computer, before it is sent out to
other people. In this case, the data is distributed throughout a wide area
network (WAN), namely the internet. It is then kept and analysed by a com-
mercial application on the company’s network. Following this, the output
is sent back to the person who hired us [7]. This technique of client-server
data processing has been in use for most traditional business applications
for a considerable period.
However, conventional data centre infrastructures are unable to cope
with the rapid rise in the count of web devices and the resulting increase in
data density.
IT architects have increasingly switched their emphasis away from the
actual data centre and toward the virtual edge of their infrastructures as a
function of the transfer of computing systems from the data centre to the
area where the data is created. In most cases, data centres should be posi-
tioned as close to their customers as feasible; however, where this is not
possible, clients should be located as close as possible to the servers. As a
result, it was decided that computing resources should be located in the
neighborhood of where they are needed, rather than depending on previous
A review on edge computing 41
When servers and storage are placed near to the source of data creation,
edge computing reduces latency and congestion, enabling a much smaller
and cheaper LAN to support many more devices. Edge computing is becom-
ing more popular. When data is kept and safeguarded locally, edge servers
may perform critical edge analytics or, at the very least, pre-process and
limit the data, allowing decision-makers to make decisions in real time prior
to uploading findings or merely required data to the cloud or centralized
data centre. Figure 3.1 explains the working of cloud computing and edge
computing and shows the region where the computation occurs actually.
“Cloud computing” and “fog computing,” two terms that are often used
in conjunction with one another when referring to edge computing, are
occasionally used synonymously. However, although there are some simi-
larities between the two notions, they are not the same concept and cannot
be used frequently in the very same paragraph. Comparing and contrasting
the two notions to see how they vary from one another is an interesting
exercise:
similar way to PCs, they are not general-purpose desktops. Because they are
intelligent, specialized computers behave in a certain way when they encounter
certain other devices. Edge computing, on the other hand, has a downside in
some industries where rapid responses are required for success.
46 Parul Dubey et al.
due to the sheer volume of data making such migrations economically dif-
ficult, technically tricky, or otherwise infringing specifications, such as data
sovereignty—is to store it in a decentralized location. There are several
examples of how this phrase has been used in the real world, including:
3.7 EDGE MAINTENANCE
Edge implementation would be incomplete if it did not also take into con-
sideration edge maintenance:
3.10 CONCLUSION
REFERENCES
1. W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge Computing: Vision and
Challenges,” IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637–646,
October 2016.
A review on edge computing 51
CONTENTS
4.1 INTRODUCTION
DOI: 10.1201/9781003407300-4 53
54 Asmita Singh Bisen and Himanshu Payal
its goals, connect the physical world with the digital world, and “connect
people and devices anytime, anywhere, with anything and everyone” [1, 2].
The digitization and automation of industrial production combines ancestral
manufacturing and industrial practices with large-scale machine-to-machine
communications, IoT, Cyber-Physical Systems (CPS) and many other innova-
tive technologies [3].
4.2 STREAMLINED WORK
4.3 INTERNET OF THINGS
The Internet of Things (IoT) is one of the most widely used terms in the
development of modern computing. Although often referred to as technol-
ogy, it is more accurately described as a platform for integrating objects
(through recognition) so that the information collected about them can be
used to analyze, interpret, define and execute this and other related informa-
tion [10, 11].
The term Industry 4.0 comes from an undertaking in the German govern-
ment’s cutting-edge strategy. Such an undertaking upholds robotization.
This depends on innovative ideas for the Internet of Things (IoT), which
empowers the production line representing things to come [12, 13].
Internet of Things in modern computing 55
Since then, companies have presented solutions to this concept, with the
help of governments, especially Europe (especially Germany), but also coun-
tries like the United States, Japan and China, indicating that this was an
industrial and strategic era.
In this, field gear, machines, other items comprise a digital actual frame-
work that independently trades data, starts activities and drives each other
freely. Changing production lines into a brilliant climate that overcomes any
issues between this present reality and the computerized world [14]. The
solid tendency of the electrical and various leveled universes of plant mecha-
nization will move toward savvy industrial facility networks that empower
dynamic re-designing cycles and the capacity to respond deftly to interrup-
tions and disappointments.
The vital parts of this is that it can be characterized by three ideal mod-
els: a brilliant item, a savvy machine and high-level administrator. The
directing thought behind the Smart Product is to make the section a func-
tioning piece of the framework. Items get a memory where organization
information and prerequisites are put away straightforwardly as isolated
building plans. The smart machine worldview portrays the cycle by which
machines become Cyber-Physical Manufacturing Systems (CPMS).
Expanded Operator, the third worldview referenced above, centers around
the mechanical help of laborers in a perplexing climate of profoundly mea-
sured creation frameworks.
4.5 INDUSTRY 4.0
1. reconciliation,
2. virtualization,
3. decentralization,
4. in the nick of time stacking,
5. administration accessibility [26].
4.6.1 Blockchain technology
Considering the related handling plant circumstance, Internet of Things con-
traptions help steady data collection and incitation. As the most fundamental
Internet of Things in modern computing 57
part of IIoT, these contraptions track the creation line assets across the globe
[28]. The devices in a totally related IIoT framework are sent across all the
assembling plant workplaces, going from stockrooms to creation workplaces
and dispersion focuses. Regardless, the configuration, sending, checking, and
upkeep of these contraptions is a troublesome errand and require extraordi-
narily qualified specific staff.
4.6.2 Cloud computing
The dramatic development of information in IIoT requires a system that
requires a first-order system to manage, manage, display, and store informa-
tion. A distributed distribution system provides statistics, membership, and
control over all online jobs and production systems. All content and acces-
sories attached to it are attached to the remains. Cloud sites are arranged as
private, public (only security for cloud-based clients) or ivory (using both
types of auxiliaries) [29]. Since the underpinning of waiter ranches and the
enlistment of specific staff require high spending thusly confidential cloud
organization models are not a reasonable decision for as of late members
as well as nearly nothing and medium-level undertakings. However, large
and well-established overall undertakings favor the sending of private fogs
to ensure the wellbeing, security, and assurance and adjust to current covert
work for high ground.
Clearly with regards to the use of these can upgrade and change the ongoing
enterprises and yield a great deal of advantages because of its cutting-edge
innovations, applications and administrations. It is likewise fundamental to
highlight that IoT does not focus solely on changing businesses and expand-
ing their efficiency. In addition, it enhances the central motivation behind
ventures and relieving the shortcomings brought about by inheritance
frameworks. Thus, it ought to be viable with existing gadgets, frameworks
and foundations and have the option to implant knowledge into them [35].
Accordingly, undertakings that are going through advanced change will be
worked with to take on and execute IoT and take advantage of its vari-
ous advantages and arrangements without having to straightforwardly put
resources into absolutely spic and span hardware as cost would far offset
the prompt advantages. In any case, for this to be completely carried out
and for IoT to be embraced and completely used by businesses and under-
takings, a great deal of difficulties and open issues ought to be investigated.
Internet of Things in modern computing 59
A few producers and endeavors wonder whether or not to proceed like this
because of specific worries and obstructions. These incorporate vulnerabili-
ties about monetary advantages, the absence of systems of planning across
various authoritative units, missing ability, abilities and capacities, wavering
to go through extremist change and concerns with respect to the outsider
suppliers’ security [43, 44].
To summarize, in the light of the previously mentioned examinations, the
most huge and normal difficulties and open exploration issues which busi-
nesses and undertakings ought to know about are:
4.9 APPLICATION DOMAINS
Albeit the new advances in universal registering and the possibilities pre-
sented by the IoT render the improvement of countless applications practi-
cal, advances are already visible in a couple of areas [46]. IoT applications
target further developing quality for the end-client local area and supporting
framework and universally useful tasks [47].
The intricacy and the size of the issue to be addressed, as well as the par-
ticularities, prerequisites and attributes of the particular areas in which they
will be carried out, ought to be thought about as there is no “one-size-fits-
all” arrangement. Also, they ought to be planned circumspectly in order to
fulfill different goals and prerequisites while at the same time expanding the
nature of involvement and nature of administration levels [48–50]:
4.9.1 Healthcare
The clinical area is quite possibly the earliest business to have adopted the
IoT and in which it can be seen to have had the most significant impact.
Advances in this area can open new doors, administrations and applica-
tions to work on the medical care and clean area. In addition, IoT stages
and administrations improve current living arrangements and work with the
acknowledgment of ubiquitous medical services vision that is “medical ser-
vices to anybody, whenever, and anyplace by eliminating area, time and dif-
ferent restrictions while expanding both the inclusion and nature of medical
care” [52]. This reality will improve and computerize the method involved
with gathering information, thereby producing a phenomenal amount of
information that can be used to pursue additional logical and clinical inves-
tigations. With the end goal of forestalling the beginning of medical issues
all the more proficiently, IoT advancements work on persistent therapy and
prosperity.
4.9.2 Smart cities
Rapid metropolitan development is now overwhelming the current foun-
dation and utilities and featuring the requirement for more manageable
metropolitan preparation and public administrations. The applications and
administrations are being taken advantage of for these new necessities to be
fulfilled and the cultural changes proportionate with this rapid development
to be answered. In addition, autonomous city and home organizations will
be keen and fit for detecting, observing and adjusting to ecological pliancy
as well as responding to human exercises. All the more explicitly, shrewd
innovations and gadgets are interconnected and, subsequently, they can
improve and upgrade the quality and way of life for city tenants as well as
guarantee that their fundamental administrations are given [53]. Moreover,
by making shrewd urban communities that mix the generally settled city
administrations and utilities that occupants cooperate with consistently,
advancing the use of city foundation, assets and offices and upgrading city
inhabitants’ life quality.
4.9.3 Smart environments
By using completely interconnected mechanical gadgets and implanted
frameworks, IoT targets invade our regular climate and its items and make
better approaches to associate with these brilliant conditions [54].
Through the involvement of IoT in a blend with mechanized programming
specialists for ongoing following and observing, savvy conditions become a
mechanical environment of different interconnected gadgets. These brilliant
gadgets can safely convey and cooperate as well as recover, cycle, store and
trade information on a continuous basis. By incorporating these heterogeneous
62 Asmita Singh Bisen and Himanshu Payal
4.9.4 Industry
A particular classification of IoT centers around its cases in current ventures
and savvy production. Being an intricate arrangement of a wide assortment
of systems is thought of. Besides, it includes a critical part to modern space
and is firmly connected with the fourth modern transformation (Industry
4.0). It joins a few creative key innovations in order to deliver a framework
that capacities more successfully than the amount of its parts.
4.10 CHALLENGES
The variegated and labyrinthine nature of its structure has faced numerous
challenges, in areas such as safety and security, adaptability, heterogeneity
and the quality of real tools.
To cope with these difficulties, efficient information the executives models
are required. These information the board models ought to be fit for effi-
ciently taking care of the tremendous measure of crude information gener-
ated by gadgets [55, 56]. These models should in like manner give the data
to the board administrations with fast data taking care of, trustworthy and
secure data accumulating, recuperation and speedy data flow.
4.11 CONCLUSION
Additionally, with regards to Industry 4.0, IoT, and all the more explicitly
IIoT, can be used in blend with other creative advances, for example, huge
information, distributed computing, CPSs and so on to improve and change
the ongoing assembling frameworks into smart ones. It considers machines
to become autonomous substances that can gather and break down infor-
mation and offer guidance upon it without requiring any human interces-
sion as it presents self-viability, self-advancement, and self-perception. It
tries to adapt effectively to the worldwide serious nature of the present busi-
ness sectors and enterprises in accordance with the clients’ steadily changing
necessities and prerequisites.
In spite of the fact that IoT offers an abundance of answers for ventures as
well as a large number of contemporary and high-level applications and
administrations, it is currently at an early phase of improvement, reception
and execution. Accordingly, for the different momentum moves and open
issues to be experienced and settled, further exploration ought to be done. All
things considered, the total execution and brief reception of IoT alongside
fitting usage of its original advances, applications and administrations cannot
further develop life quality; however, it can likewise yield huge individual,
proficient and financial open doors and advantages sooner rather than later.
REFERENCES
1. Perera, C., Liu, C. H., & Jayawardena, S. (2015). The emerging internet of
things marketplace from an industrial perspective: A survey. IEEE Transactions
on Emerging Topics in Computing, 3(4), pp. 585–598.
2. Vermesan, O., Friess, P., Guillemin, P., Gusmeroli, S., Sundmaeker, H., Bassi, A.,
… & Doody, P.(2011). Internet of things strategic research roadmap. Internet
of Things-Global Technological and Societal Trends, 1(2011), pp. 9–52.
3. Li, J., Huang, Z., & Wang, X. (2011, May). Notice of Retraction Countermeasure
research about developing Internet of Things economy: A case of Hangzhou
city. In 2011 International Conference on E-Business and E-Government
(ICEE), pp. 1–5. IEEE.
4. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey.
Computer Networks, 54(15), pp. 2787–2805.
5. Sundmaeker, H., Guillemin, P., Friess, P., & Woelfflé, S. (2010). Vision and
challenges for realising the internet of things. Cluster of European Research
Projects on the Internet of Things, European Commision, 3(3), pp. 34–36.
6. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of
things (IoT): A vision, architectural elements, and future directions. Future
Generation Computer Systems, 29(7), pp. 1645–1660.
7. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M.
(2015). Internet of things: A survey on enabling technologies, protocols, and
applications. IEEE Communications Surveys & Tutorials, 17(4), pp. 2347–2376.
8. Lampropoulos, G., Siakas, K., & Anastasiadis, T. (2019). Internet of things in the
context of industry 4.0: An overview. International Journal of Entrepreneurial
Knowledge, 7(1), pp. 4–19. doi: 10.2478/ijek-2019-000.
64 Asmita Singh Bisen and Himanshu Payal
9. Ngu, A. H., Gutierrez, M., Metsis, V., Nepal, S., & Sheng, Q. Z. (2016). IoT
middleware: A survey on issues and enabling technologies. IEEE Internet of
Things Journal, 4(1), pp. 1–20.
10. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey.
Computer Networks, 54(15), pp. 2787–2805.
11. Vermesan, O., Friess, P., Guillemin, P., Gusmeroli, S., Sundmaeker, H., Bassi, A.,
… & Doody, P.(2011). Internet of things strategic research roadmap. Internet
of Things-Global Technological and Societal Trends, 1(2011), pp. 9–52.
12. Lee, J., Bagheri, B., & Kao, H. A. (2015). A cyber-physical systems architec-
ture for industry 4.0-based manufacturing systems. Manufacturing Letters, 3,
pp. 18–23.
13. Haddara, M., & Elragal, A. (2015). The Readiness of ERP systems for the fac-
tory of the future. Procedia Computer Science, 64, pp. 721–728.
14. Weyer, S., Schmitt, M., Ohmer, M., & Gorecky, D. (2015). Towards Industry
4.0-Standardization as the crucial challenge for highly modular, multi-vendor
production systems. IFAC-Papers on Line, 48(3), pp. 579–584.
15. Lu, Y. (2017). Industry 4.0: A survey on technologies, applications and open
research issues. Journal of Industrial Information Integration, 6, pp. 1–10.
16. Lampropoulos, G., Siakas, K., & Anastasiadis, T. (2018). Internet of things
(IoT) in industry: Contemporary application domains, innovative technologies
and intelligent manufacturing. International Journal of Advances in Scientific
Research and Engineering, 4(10), pp. 109–118.
17. Gilchrist, A. (2016). Industry 4.0: The industrial internet of things. New York,
NY: Apress. ISBN: 1484220463.
18. Bi, Z., Da Xu, L., & Wang, C. (2014). Internet of things for enterprise systems
of modern manufacturing. IEEE Transactions on Industrial Informatics, 10(2),
pp. 1537–1546.
19. Şen, K. Ö., Durakbasa, M. N., Baysal, M. V., Şen, G., & Baş, G. (2018). Smart
factories: A review of situation, and recommendations to accelerate the evo-
lution process. In The International Symposium for Production Research,
pp. 464–479. Springer, Cham.
20. Schmidt, R., Möhring, M., Härting, R. C., Reichstein, C., Neumaier, P., &
Jozinović, P. (2015, June). Industry 4.0-potentials for creating smart prod-
ucts: empirical research results. In International Conference on Business
Information Systems, pp. 16–27. Springer, Cham.
21. Zhou, K., Liu, T., & Zhou, L. (2015). Industry 4.0: Towards future industrial
opportunities and challenges. In 2015 12th International Conference on Fuzzy
Systems and Knowledge Discovery (FSKD), pp. 2147–2152. IEEE.
22. Lampropoulos, G., Siakas, K., & Anastasiadis, T. (2018). Internet of things
(IoT) in industry: Contemporary application domains, innovative technologies
and intelligent manufacturing. International Journal of Advances in Scientific
Research and Engineering, 4(10), pp. 109–118.
23. Wee, D., Kelly, R., Cattel, J., & Breunig, M. (2015). Industry 4.0-how to navi-
gate digitization of the manufacturing sector. McKinsey & Company, 58.
24. Schmidt, R., Möhring, M., Härting, R. C., Reichstein, C., Neumaier, P., &
Jozinović, P. (2015, June). Industry 4.0-potentials for creating smart prod-
ucts: empirical research results. In International Conference on Business
Information Systems, pp. 16–27. Springer, Cham.
Internet of Things in modern computing 65
25. Geissbauer, R., Vedso, J., & Schrauf, S. (2016). Industry 4.0: Building the digital
enterprise. Retrieved from: https://www.pwc.com/gx/en/industries/industries-
4.0/landing-page/industry-4.0-building-your-digital-enterprise-april-2016.pdf
26. Hermann, M., Pentek, T., & Otto, B. (2016, January). Design principles for
industrie 4.0 scenarios. In 2016 49th Hawaii international conference on sys-
tem sciences (HICSS), pp. 3928–3937. IEEE.
27. MacDougall, W. (2014). Industrie 4.0: Smart manufacturing for the future.
Germany Trade & Invest.
28. D. Miller, Blockchain and the internet of things in the industrial sector, IT
Professional (2018) 15–18 (2018).
29. Khan, W. Z., Rehman, M. H., Zangoti, H. M., Afzal, M. K., Armi, N., Salah,
K. (2020). Industrial Internet of things: recent advances, enabling technologies
and open challenges. Computers & Electrical Engineering 81, p. 106522.
30. Zhong, R. Y., Xu, X., Klotz, E., & Newman, S. T. (2017). Intelligent manufac-
turing in the context of industry 4.0: A review. Engineering, 3(5), pp. 616–630.
31. Davis, J., Edgar, T., Porter, J., Bernaden, J., & Sarli, M. (2012). Smart manu-
facturing, manufacturing intelligence and demand-dynamic performance.
Computers & Chemical Engineering, 47, pp. 145–156.
32. Francis, D., & Bessant, J. (2005). Targeting innovation and implications for
capability development. Technovation, 25(3), pp. 171–183.
33. Parwez, M. S., Rawat, D. B., & Garuba, M. (2017). Big data analytics for user-
activity analysis and user-anomaly detection in mobile wireless network. IEEE
Transactions on Industrial Informatics, 13(4), pp. 2058–2065.
34. Kumar, S. (2002). Intelligent Manufacturing Systems. B.I.T. Mesra, Ranchi,
India. Retrieved from https://pdfs.semanticscholar.org/fc60/02a47a1a9b312
bda871b47569edeeb8545f9.pdf
35. Küsters, D., Praß, N., & Gloy, Y. S. (2017). Textile learning factory 4.0–prepar-
ing Germany’s textile industry for the digital future. Procedia Manufacturing,
9, pp. 214–221.
36. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey.
Computer Networks, 54(15), pp. 2787–2805.
37. Khan, R., Khan, S. U., Zaheer, R., & Khan, S. (2012, December). Future inter-
net: the internet of things architecture, possible applications and key challenges.
In 2012 10th international conference on frontiers of information technology,
pp. 257–260. IEEE.
38. Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of
things: Vision, applications and research challenges. Ad Hoc Networks, 10(7),
pp. 1497–1516.
39. Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, invest-
ments, and challenges for enterprises. Business Horizons, 58(4), pp. 431–440.
40. Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June). Security and pri-
vacy challenges in industrial internet of things. In 2015 52nd ACM/EDAC/
IEEE Design Automation Conference (DAC), pp. 1–6. IEEE.
41. Wang, S., Wan, J., Li, D., & Zhang, C. (2016). Implementing smart factory
of industrie 4.0: an outlook. International Journal of Distributed Sensor
Networks, 12(1), 3159805.
42. Vaidya, S., Ambad, P., & Bhosle, S. (2018). Industry 4.0 – a glimpse. Procedia
Manufacturing, 20, pp. 233–238.
66 Asmita Singh Bisen and Himanshu Payal
43. Lu, Y. (2017). Industry 4.0: A survey on technologies, applications and open
research issues. Journal of Industrial Information Integration, 6, pp. 1–10.
44. Bauer, H., Baur, C., Mohr, D., Tschiesner, A., Weskamp, T., Alicke, K., & Wee,
D. (2016). Industry 4.0 after the initial hype–Where manufacturers are finding
value and how they can best capture it. McKinsey Digital.
45. Küsters, D., Praß, N., & Gloy, Y. S. (2017). Textile learning factory 4.0 – prepar-
ing Germany’s Textile industry for the digital future. Procedia Manufacturing,
9, pp. 214–221.
46. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey.
Computer Networks, 54(15), pp. 2787–2805.
47. Akpakwu, G. A., Silva, B. J., Hancke, G. P., & Abu-Mahfouz, A. M. (2017).
A survey on 5G networks for the internet of things: Communication technolo-
gies and challenges. IEEE Access, 6, pp. 3619–3647.
48. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of
things (IoT): A vision, architectural elements, and future directions. Future
Generation Computer Systems, 29(7), pp. 1645–1660.
49. Hajrizi, E. (2016). Smart solution for smart factory. IFAC-PapersOnLine,
49(29), pp. 1–5.
50. Sundmaeker, H., Guillemin, P., Friess, P., & Woelfflé, S. (2010). Vision and
challenges for realising the internet of things. Cluster of European Research
Projects on the Internet of Things, European Commision, 3(3), pp. 34–36.
51. Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of
things: Vision, applications and research challenges. Ad Hoc Networks, 10(7),
pp. 1497–1516.
52. Lee, C. P., & Shim, J. P. (2009). Ubiquitous healthcare: Radio frequency iden-
tification (RFID) in hospitals. In Handbook of research on distributed medical
informatics and e-health, pp. 273–281. IGI Global.
53. Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet
of things for smart cities. IEEE Internet of Things Journal, 1(1), pp. 22–32.
54. Weiser, M., Gold, R., & Brown, J. S. (1999). The origins of ubiquitous com-
puting research at PARC in the late 1980s. IBM Systems Journal, 38(4),
pp. 693–696.
55. Javed, F., Afzal, M. K., Sharif, M., & Kim, B.-S. (2018). Internet of things (iot)
operating systems support, networking technologies, applications, and chal-
lenges: A comparative review, IEEE Communications Surveys & Tutorials,
20(3), pp. 2062–2100.
56. Zikria, Y. B., Kim, S. W., Hahm, O., Afzal, M. K., & Aalsalem, M. Y. (2019).
Internet of things (iot) operating systems management: Opportunities, chal-
lenges, and solution, Sensors, pp. 1–10.
Chapter 5
S. Sinha
CHRIST(Deemed to be University), Bangaluru, India
CONTENTS
5.1 INTRODUCTION
The maiden years of the Internet of Things (IoT) mainly included commu-
nications between machines, also known as machine-to-machine (M2M)
associations [1]. However, over time this concept has developed to incor-
porate the involvement of humans, so much so that our dependence on its
services [2] continues to grow with time. Today our earth is packed with
gazillions of computing devices and sensors that perpetually sense, pick up,
gather, aggregate, and scrutinize the personal information of most of its
population. This information encompasses our address and whereabouts,
contacts list, browsing habits patterns, and sensitive and detailed attributes
about our health [3]. Hearing, collecting, and spreading such intimate per-
sonal data on computer devices is primarily promoted in the aspiration of
DOI: 10.1201/9781003407300-5 67
68 Aditi Paul and S. Sinha
comfort; the idea is that more ingenious devices can better comply with
our needs and desires and even circumstances (e.g., a thermostat senses
its environment and alters the temperatures taking a cue from our loca-
tion, what time of the day or what day of the week or what time of year
it is, etc.). These also tackle crises such as fire or burglary. Unfortunately,
this level of installation increases security costs. Also, it imposes specific
challenges [4] concerning privacy: personal, confidential information, if
available to ill-intended agents, can havoc damage our property, dignity,
and our safety.
The relevance of computing devices having such disastrous inadequacies
is no longer limited to research papers and academic studies. Still, it is, in
fact, a sad reality with a plethora of news snippets about multiple devices
succumbing to daily security breaches. And the fact that these attacks are
not so difficult to coordinate does not help the case. There have been many
demonstrations of such invasions. The attacker can inject [5] malicious code
directly into a wearable device through an editing interface and then capture
sensitive user data. Attacks on critical medical equipment, for instance,
Implantable Cardiac Defibrillators (ICD) and wireless monitors, can be life-
threatening for the patient. The industrial and urban framework has also
seen an increase in recent attacks. As many of today’s premium automobiles
use electronic and embedded devices, the attacker may gain control the vehi-
cle [6] by influencing the Electronic Control Unit (ECU). This would be a
significant driver safety hazard.
The Distributed Denial of Service Attack (or DDoS attack) [7] poses sig-
nificant risks to the performance of IoT applications and is amongst the
leading virtual threats on the internet. They occur because of the simplicity
of their execution, which is further aided by the fact that certain companies
offer such attacks as a service [8]. These attacks are much feared because
they can overpower their target and defeat the accessibility of their victim
within a matter of seconds. Recent reports suggest [9] a growing trend in the
scope of DDoS attacks. This has led to incurring financial losses and also
impacted millions of users worldwide. GitHub’s server attack in 2018 is one
of the most devastating DDoS attacks ever recorded. This attack was facili-
tated by targeting a vulnerable region of the application layer protocol. It
was designed to supply 129 million applications per second and reach a
total capacity of 1.35 Tbps [10], closely following the most notable attack
in 2016 [11], which involved 1.2 Tbps.
This chapter considers various challenges, methods, and practices for IoT
security. Based on these, two taxonomies are designed for security attacks
targeted at IoT systems. The first taxonomy introduces attacks on four-
tiered infrastructures of IoT (Perception Layer, Network Layer, Middleware
Layer, Application Layer). Based on this taxonomy, a systematic analysis of
security and privacy threats throughout the different layers of IoT is done.
The chapter also examines the types of DDoS attacks, how they work, their
impact on the IoT ecosystem, and other available protection mechanisms.
Denial of Service Attacks in the Internet of Things 69
5.2 IoT ARCHITECTURE
The Internet of Things (IoT) does not have a fixed architecture. However, the
abstraction of layers can be viewed as consisting of either three or four layers.
The three-layer architecture [12] comprises an application layer, a network
layer, and a perception layer. Since IoT regards both objects and devices as
a thing, these are complex. The heterogeneous devices on the internet have
their constraints, and complexities grow when these devices are linked to
providing services to the objects. To address this issue, a middle layer [13]
is introduced to create an abstraction between technology and applications/
services. The middleware layer connects the network layer to the application
layer through cloud storage. This means the features of the network layer
are stored in the cloud and accessed by the application layer. This reduces the
complexity and frees up the Application layer’s load. This layer also provides
APIs [14] to the Application layer. Thus, the middleware layer supports data-
processing capability by simplifying computation. Each layer (Figure 5.1) is
discussed briefly, along with the technology used in each layer:
Application layer: The application layer is the service layer that con-
nects to the objects and provides services. These services include smart
homes, innovative health, automated vehicles, etc. This layer works
serving as botnets target vulnerable devices [20]. For example, the Mirai
botnet [21], which affected a significant part of the internet in 2016, affected
several countries and employed a large number of geographically distrib-
uted IoT devices to orchestrate their attack plan. Such a dispersed contin-
gent of IoT devices becomes challenging to spot and counteract, thereby
adding to the seriousness of the attack. A recent report [22] marked that in
the months from July to September of 2019, the highest rate of devices
hosted by botnets to launch DDoS attacks were from the United States and
the Netherlands. This is a problematic situation that demands the attention
of the scientific community to explore new strategies to improve security in
the IoT infrastructure and reduce the vulnerability of devices to dangerous
attacks like DDoS attacks.
Table 5.1 represents the mapping of various IoT security threats implied by
denial of service (DoS) with the layers they affect, the level of severity, and
their respective solutions.
Let us understand the IoT taxonomy based on its deployment infrastructure:
• Low level of security issues: The first level of security deals with secu-
rity issues in the physical layer, data link layers of communication, and
hardware level.
• Medium level of security issues: Intermediate security issues are par-
ticularly focused on communication, routing, and session management
network at IoT transport layers.
• High level of security issues: High-level security issues are mostly the
user or system applications running on IoT.
73
and network layer and low-level
74 Aditi Paul and S. Sinha
device in the physical layer. This results in genuine devices missing network
access.
Insecure initialization and configuration: The configuration and initializa-
tion of IoT devices [30] at the physical layer without obstructing network
services or privacy policies guarantees secure and efficient working of the
entire system. Connections at the physical layer also need protection against
unauthorized recipients trying to gain access.
Insecure physical interface: Many biological factors pose a severe threat
to the efficiency of IoT devices. Imagine the damage that can happen if a
harmful individual gains physical access to a task-critical device. Inefficient
physical security [31], unauthorized access to software through physical
avenues, and testing/debugging tools may compromise the network nodes.
CoAP security [39] with the internet: CoAP, short for Constrained
Application Protocol, works at the application layer in the high-level layer
and is a web transfer protocol well suited for nodes that run on simple
microcontrollers with a limited amount of RAM and ROM and commu-
nicate over low-power wireless area networks. It employs DTLS ties with
many other ways to protect both ends of the network. Defined in RFC-
7252, they follow a scheme that needs encryption to enhance security.
Denial of Service Attacks in the Internet of Things 75
Insecure interfaces: The port recruited to access IoT assets via the web,
mobile, or cloud is always susceptible to attacks that threaten data privacy [40].
Insecure software/firmware: IoT devices, when performing updates, go
for insecure network protocols, thus exposing themselves to attacks [41]
where the attacker can span across the network and remodel it to his desire.
He can even infect the other nodes connected via this device’s hub.
Middleware security: The middleware [42] layer in IoT serves the purpose
of establishing correspondence between various bodies in the IoT paradigm,
which, in order to reap the benefit of its service, must be adequately secured.
As we have seen, IoT devices have many such avenues that can be plagued
by various security issues. Some examples of these avenues are insecure web
interfaces, insecure network services, transport lacking encryption, insecure
cloud interface, insecure mobile interface, and insecure software/firmware
to name a few. Since IoT has become such an indivisible part of our society,
threats to its security must be dealt with conscientiously. Here are a few
mitigation strategies at different levels of IoT.
Security solutions for the lower level: In wireless sensor networks, the
interruptions that lead to message conflicts or channel overload are linked
to jamming attacks, as referred to by [23, 24] in the previous section. One
of the methods used (as mentioned in these references) to discern whether a
jamming attack has occurred is by calculating the effective rate in which a
packet is delivered. This design functions by executing statistical tests on the
strength of the signal and node address. An alternative to counter jamming
attacks involves cryptographic functions and error correction codes. The
process progresses by encoding packet codes by breaking it into blocks and
leaving pieces of the coded package. Similarly, strategies involving channel
filtering and site deceleration have also been proposed to combat jamming
attacks. Young et al. [42] proposed a tactic to detect jamming attacks. First
the signal strength is measured, then it is utilized to draw out signals that are
noise-like. Later these numbers are collated with standard threshold values
assigned for attack detection. Channel browsing allows legitimate commu-
nication devices to switch channels; this, in turn, causes these devices to alter
their address in between the process.
As previously referred to in [27, 28, 29] malicious Sybil nodes imperson-
ate a distinct device by using a forged MAC address which leads to resource
exhaustion and denial to grant access to genuine customers. One of the
fundamental approaches here is to track Sybil attacks by determining the
power of the signal. Detector nodes are positioned in the communication
channel to pinpoint the sender’s address. Sybil attacks are characterized by
a similar sender location, but different sender IDs. Signal strength ratings on
76 Aditi Paul and S. Sinha
MAC addresses can also be used to detect fraudulent attacks. Another alter-
native can be the use of Received Signal Strength Indicator (RSSI) for the
detection of a Sybil attack. Trust-based models are also very effective
approaches to detect Sybil attack in MANET.
In general devices with poor physical security owe their failing to insecure
connections to software, firmware and flawed testing/debugging tools.
Hardware ports like USB ports or an SD card slot can be easily compro-
mised by granting access to malicious agents. Open Web Application Security
Project (OWASP) provides recommendations for an improvement in the
physical safety of IoT devices. Testing and debugging tools should be dis-
posed and methods such as Trusted Platform Modules (TPMs) should be
brought in to improve physical safety.
Security solutions for the intermediate level: By adding time stamps and
nonce options to fragmented packet threats from replay packages can be
alleviated. Correlated package sections are connected to the 6LoWPAN
adaptation layer. The timestamp option works for unidirectional packets
whereas the nonce option works for the bidirectional packets. The 64-bit
time stamp on the piece ensures the removal of recurring obsolete headers
and diversions from the network. The fact that the header is made only in
response to a new application is ensured by the nonce option. Also, to make
sure that the order of packets is not disrupted when transferring IPv6 packet
fragments domestically via 6LoWPAN.
Riaz et al. [43] propose a security structure with modules to facilitate
locating safe neighbour, authenticity confirmation, the generation of a key
and the encryption of data. To locate a safe neighbour Elliptic Curve
Cryptography (ECC) can be considered. Weekly et al. [44] propose dealing
with so-called sinkhole attacks on low-power Lossy networks with a pro-
cess that combines failover and verification techniques. In rank verification
regarding Destination Information Object (DIO) message, one way hash
function as well as hash chain function are used.
On network layer Sybil attacks use fake identities to present themselves as
many different individual devices, which are termed Sybil nodes [45].
Participation and the distribution of IoT peers to peers (p2p) systems is
threatened by this. Additionally, reliable streaming on the network is risked
because the defence against Byzantine errors is influenced. For communal
interactions, trust building is encouraged to limit a new Sybil ID from
emerging. Social graphs are used as a preventive measure to enable the iden-
tification of Sybil nodes by either randomly walking through the graph or
using certain detection algorithms in the community [46].
Security solutions for the higher level: Brachmann et al. [47] propose a
method combining Transport Layer Security(TLS) and Datagram Transport
Layer Security (DTLS) to defend CoAP-based low-power, Lossy network
(LLN) in touch with the internet. Instances where this method finds most
uses are in cases where 6LBR is linked to LLN through the internet to
remotely gain access to devices. CoAP and HTTP clients avail the services of
Denial of Service Attacks in the Internet of Things 77
LLN data nodes. To protect connection security at every end of the system,
TLS and DTLS mapping is suggested. When the design for mapping compu-
tation is effectuated on devices with arrested assets, the system sustains hefty
expenses. Granja et al. [48] offer a way to protect the application messages
sent via the internet, and aided by various CoAP security options. Some new
alternatives to enhance CoAP-related security are SecurityOn, SecurityToken,
and SecurityEncap. SecurityOn defends CoAP messages at the application
level. SecurityToken helps in authentication and verified access to CoAP
services. SecurityEncap [49] employs SecurityOn and principally performs
tasks that enable data channeling necessary for authentication to block relay
attacks.
The OWASP project presents specific remedies to secure IoT devices.
Weak passwords, vulnerable software tools, and not using HTTPS along
with the firewalls should be avoided in order to ensure security at a higher
level. Additionally, the installed software should continuously be updated
only via encrypted channels. Only signed and validated update files must be
downloaded from dependable servers.
When securing distributed applications in IoT, encryption and authentica-
tion, as established in VIRTUS middleware proposed by Conzon et al. [50],
should be considered. While embracing TLS and SASL for data cohesion,
authentication, and the encryption of XML stream, middleware employs an
event-drive communication approach. Validating the source ensures the
secure transmission of data. When web services are enabled with VIRTUS
middleware, it provides dependable and manageable IoT interfaces.
Otsopack [51] is another remedy to help heterogeneous implementations in
a secure manner. A semantic structure acts as a middleware using a semantic
format based on Triple Space Computing (TSC).
systems. The intention of these attacks is to crash the web server. Often,
these attacks are treated as operational errors, as low-volume traffic
requires brutality to copy the behavior of legitimate users. Therefore,
this attack is ignored even after obtaining multiple visual indications.
Slowloris [57, 58] is the most common attack on the applica-
tion layer. In this case, partial requests are sent to the web server at
specified times to keep several connections open for a more extended
period. As a result, the target web server reaches its maximum simul-
taneous connection pool capacity. This makes the server unavailable
to new requests (legitimate) immediately after the start of attacks. To
ensure it works, Slowloris uses the minimum bandwidth, which makes
it remain undetected for a long.
Resource Exhaustion Attack: These attacks take advantage of commonly
used protocols in the network layer to wear out hardware resources
like memory, CPU, and storage. Therefore, such attacks are affected
not just by the amount of traffic but also by the combination of par-
ticular messages.
The typical case of such attacks involves victimizing TCP com-
munication protocol features. TCP SYN Flood, a classic instance of
this attack, initiates a three-way TCP handshake. Then by flooding
SYN request messages to the target from a fake source address, the
attacker indulges the victim in setting up a new link for the hostile
user. After setting up the connection, the target waits for an acknowl-
edgment (ACK) from the client to complete the setup link, which is
never achieved as the attacker does not send ACK. Eventually, it causes
the backlog to exhaust, thereby rendering the option of opening a new
connection impossible.
Volumetric Attack: Volumetric Attack [59, 60] sends considerable data
traffic to a network to exhaust its bandwidth. Since the bulk of data
(100Gpbs) is required, this attack depends more on the volume of
data than application layer attacks and resource exhaustion attacks.
Volumetric attacks are launched from multiple sources’ IP addresses
creating data amplification. This is why this type of attack is hard
to mitigate manually. The high volume of data requests results in the
expansion of response by servers, thus tiring out the target’s band-
width. Domain Name Server (DNS) Amplification and spoofed
Network Time Protocol (NTP) are among these types of attack.
OpenFlow [61, 62]. This strategy factors in the header fields of packages
arriving at OpenFlow devices to block the flow of devices labeled as malig-
nant. Among the major criteria that are effective during filtering are:
Despite being the most efficient option, it risks creating a bottleneck in the
communication interface of the controller owing to its dependence on the
controller for statistics gathering and packet inspection, aggregating to
enhanced delay:
5.10 RESEARCH GAP
Figure 5.5 T
CP SYN Flood attack scenario, Total no. of TCP_SYN packet sent to
the destination Node-4 before the attack.
Figure 5.6 T
CP SYN Flood attack scenario, Total no. of TCP_SYN packet sent to
the destination Node-4 after an attack.
Step 1: Create a data set for specific time instances (t1, t2, t3 … tn)
Step 2: For each feature, calculate the average value of all time instances
(row average).
Denial of Service Attacks in the Internet of Things 85
The fuzzy rule manager’s justification is to analyze each feature’s upper and
lower bound during a time interval. As long as each component lies between
the upper and lower bound, the IDT remains at 0 value, and the fuzzy rule
manager goes on checking the next feature. As soon as any part shows a
value above or below the upper or lower bound, the process stops at that
point and updates IDT as 1. This reduces the processing time of the tech-
nique in the case of an attack data set. The value of n is an integer that helps
to increase the detection accuracy.
Once the IDT is reconstructed, the input testing data set to the NN is sent
in real time, and the output is either expected or any of the two attacks. The
importance of IDT is the minimization of a false positive rate due to unde-
tected variation in the data set. This is solved using a fuzzy rule manager,
which can enhance the detection accuracy once implemented.
86 Aditi Paul and S. Sinha
5.12 CONCLUSION
5.13 FUTURE WORK
REFERENCES
[4] K. Chen, S. Zhang, Z. Li, Y. Zhang, Q. Deng, S. Ray, and Y. Jin, “Internet-of-
Things Security, and Vulnerabilities: Taxonomy, Challenges”, Hardware and
Systems Security, 2, pp. 97–110, 2018.
[5] C.-K. Wu, Internet of Things Security, in Advances in Computer Science and
Technology, Springer, Singapore, pp. 1–12, 2021.
[6] S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K.
Koscher, A. Czeskis, F. Roesner, and T. Kohno, “Comprehensive Experimental
Analyses of Automotive Attack Surfaces,” in Proceedings of the 20th USENIX
Security Symposium, San Francisco, 2011.
[7] B. B. Gupta and A. Dahiya, “Fundamentals of DDoS Attack: Evolution and
Challenges,” in Distributed Denial of Service (DDoS) Attacks, CRC Press, pp.
1–18, 2021. eBook. ISBN 9781003107354.
[8] https://securelist.com/the-cost-of-launching-a-ddos-attack/77784/
[9] A. Marzano, D. Alexander, O. Fonseca, E. Fazzion, C. Hoepers, K. Steding-
Jessen, M. H. P. C. Chaves, Í. Cunha, D. Guedes, and W. Meira, “The Evolution
of Bashlite and MiraiIoT Botnets”, in 2018 IEEE Symposium on Computers
and Communications (ISCC), Natal, 2018.
[10] https://www.cloudflare.com/learning/ddos/famous-ddos-attacks/.
[11] https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-
botnet.
[12] M. R. Abdmeziem, D. Tandjaoui, and I. Romdhani, Architecting the Internet of
Things: State of the Art, in Studies in Systems, Decision, and Control, Springer,
Cham, pp. 56–62, 2015.
[13] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet
of Things: A Survey on Enabling Technologies, Protocols, and Applications”,
IEEE Communications Surveys Tutorials, 17, pp. 2347–2376, 2015.
[14] P. K. Donta, S. N. Srirama, T. Amgoth, and C. S. R. Annavarapu, “Survey on
Recent Advances in IoT Application Layer Protocols and Machine Learning
Scope for Research Directions”, Digital Communications, and Networks, 8, 5,
pp. 2352–8648, 2021.
[15] A. H. Ngu, M. Gutierrez, V. Metsis, S. Nepal, and Q. Z. Sheng, IoT Middleware:
“A Survey on Issues and Enabling Technologies”, IEEE Internet of Things
Journal, 4, pp. 1–20, 2017.
[16] P. Sethi, and S. R. Sarangi, “Internet of Things: Architectures, Protocols, and
Applications”, Journal of Electrical and Computer Engineering, 54, pp. 1–15,
2017.
[17] J. Zhou, Z. Cao, X. Dong, and A. V. Vasilakos, “Security and Privacy for
Cloud-Based IoT: Challenges”, IEEE Communications Magazine, 55, pp. 26–
33, 2017.
[18] S. Mishra, and A. Paul, “A Critical Analysis of Attack Detection Schemes in IoT
and Open Challenges”, 2020 IEEE International Conference on Computing,
Power and Communication Technologies (GUCON), Greater Noida, India,
pp. 57–62, 2020, doi:10.1109/GUCON48875.2020.9231077.
[19] J. Dizdarevic, F. Carpio, A. Lukan, and X. Masip-Bruin, “A Survey of
Communication Protocols for Internet of Things and Related Challenges of
Fog and Cloud Computing Integration”, ACM Computing Surveys, 51, 6,
pp. 1–29, 2019.
[20] C. Wheelus, and X. Zhu, “IoT Network Security: Threats, Risks, and a Data-
Driven Defense Framework”, IoT, vol 1, pp. 259–282, 2020.
88 Aditi Paul and S. Sinha
[21] G. Kambourakis, C. Kolias, and A. Stavrou, “The mirai botnet and the iot zom-
bie armies”, Military Communications Conference (MILCOM), pp. 267–272.
IEEE, 2017.
[22] https://securelist.com/ddos-attacks-in-q3-2021/104796/
[23] W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The feasibility of launching and
detecting jamming attacks in wireless networks”, in Proceedings of the 6th
ACM, New York, 2005.
[24] G. Noubir, and G. Lin, “Low-power DoS Attacks in Data Wireless LANs
and Countermeasures”, ACM SIGMOBILE Mobile Computing and
Communications Review, Vol. 7, No. 3, pp. 29–30, 2003.
[25] Sinha, S., and A. Paul “Neuro-Fuzzy Based Intrusion Detection System for
Wireless Sensor Network”. Wireless Pers Communication, vol 114, pp. 835–851,
https://doi.org/10.1007/s11277-020-07395-y
[26] A. Paul, and S. Sinha, “Performance Analysis of Received Signal Power-Based
Sybil Detection in MANET Using Spline Curve”, International Journal of
Mobile Network Design and Innovation, 7, pp. 222–232, 2018, doi:https://
doi.org/10.1504/IJMNDI.2017.089304.
[27] S. Sinha, A. Paul, and S. Pal, “The Sybil Attack in Mobile Adhoc Network:
Analysis and Detection”, in Proceedings of International Conference on
Recent Trends in Communication and Computer Networks-ComNet 2013,
pp. 95–103, 2013.
[28] M. Demirbas, and Y. Song, “An RSSI-Based Scheme for Sybil Attack Detection
in Wireless Sensor Networks”, International Symposium on a World of
Wireless, Mobile and Multimedia Network, IEEE, Washington, 2006.
[29] A. Paul, S. Sinha, and S. Pal, “An Efficient Method to Detect Sybil Attack Using
Trust Based Model”, in Proceedings of Fourth International Joint Conference on
Advances in Engineering and Technology AET-ACS-2013, pp. 228–237, 2013.
[30] P. Tommaso, L. Brilli, and L. Mucchi, “The Role of Physical Layer Security in
IoT: A Novel Perspective”, Information, 7, 49, 2016.
[31] https://owasp.org/index.php/Top_IoT_Vulnerabilities.
[32] H. Kim, “Protection Against Packet Fragmentation Attacks at 6LoWPAN
Adaptation Layer”, in 2008 International Conference on Convergence and
Hybrid Information Technology, IEEE Xplore, 2008.
[33] R. Hummer, J. Hiller, H. Wirtz, M. Henze, H. Shafagh, and K. Wehrle,
“6LoWPAN Fragmentation Attacks”, in Sixth ACM Conference on Security
and Privacy in Wireless and Mobile Networks, New York, 2013.
[34] K. Weekly, and K. Pister, “Evaluating Sinkhole Defence Techniques in RPL net-
works”, in 20th IEEE International Conference on Network, Washington, pp.
1–6, 2012.
[35] F. Ahmed, and Y.-B. Ko, “Mmitigation of Black Hole Attacks in Routing
Protocol for Low Power and Lossy Network”, Security and Communication
Networks, 9, 5143–5154, 2016.
[36] A. A. Pirzada, and C. McDonald, “Circumventing sinkholes and wormholes”,
in International Workshop on Wireless Ad-Hoc Networks, 2005.
[37] W. Wang, J. Kong, B. Bhargava, and M. Gerla, “Visualisation of Wormholes in
Underwater Sensor Networks: A Distributed Approach”, International Journal
of Security and Networks (IJSN), 3, pp. 10–23, 2008.
[38] N. Park, and N. Kang, “Mutual Authentication Scheme in Secure Internet of
Things Technology for Comfortable Lifestyle”, Sensors, 16, p. 20, 2016.
Denial of Service Attacks in the Internet of Things 89
P. S. Birla
FOE, IGNTU, Amarkantak, India
R. K. Shastri
DHSS, MNNIT, Allahabad, India
CONTENTS
DOI: 10.1201/9781003407300-6 91
92 Ananta Narayana et al.
6.1 INTRODUCTION
Despite the fact that the idea of using computers, sensors, and networks to
monitor and manage items has been around for some time, the recent con-
vergence of important technological advancements and commercial trends
is ushering in a new era for the “Internet of Things.” IoT promises to intro-
duce a revolutionary, globally networked “smart” future, where connections
between people and their environment and between products and their envi-
ronment will become increasingly intricate. People’s perceptions of what
it means to be “online” may change significantly if the Internet of Things
becomes a common array of connected devices.
A variety of obstacles, including those relating to security, privacy, interop-
erability and standards, legal, regulatory, and rights issues, as well as the
inclusion of emerging economies, could stand in the way of this goal, despite
the fact that the potential repercussions are considerable. There are many
different stakeholders involved in the Internet of Things, and there are many
complicated and changing technological, social, and policy factors. The
Internet of Things is now present in our everyday lives; therefore, it’s impor-
tant to manage its problems, reap its benefits, and lower its hazards.
IoT is an important aspect in the development of the so-called “Internet
Society” because it represents a developing component of how individuals
and organizations are likely to engage with and integrate network connec-
tivity into their personal, social, and professional lives. If we see the develop-
ment of a divisive discussion that contrasts the potential advantages of IoT
with its potential problems, solutions to maximizing the benefits and avoid-
ing the risks of IoT are unlikely to be identified. Instead, to choose the most
efficient course of action, educated involvement, debate, and collaboration
among a variety of stakeholders are required.
In this study we make a critical assessment and incorporation of eight
models of technology from the course related to social psychology to the
same degree as social cognitive theory, theory of reasoned action, innovation
diffusion theory, theory of planned behavior, technology acceptance models,
the model of perceived credibility utilization, a hybrid model combining
constructs from technology acceptance model, the theory of planned behav-
ior and the motivational model have resulted in the advanced technology
model, Unified theory of acceptance and use of technology by (Venkatesh et
al., 2003) plus these multiplicities of illustrious models (Yi et al., 2006)
along with theories are used to explicate this relationship involving trainees’
attitude, perception and behavior intention (Yousafzai, 2012) regarding the
usage of technology (Venkatesh et al., 2012).
The Unified Theory of Acceptance and Use of Technology model is both a
predictive tool of adoption and behavior and a valid research instrument
(Al-Qeisi, 2009). The UTAUT model turns out to be amongst the most
Extending acceptance, usage of IoT by skill development course 95
In general, this chapter will prove to be useful for the government to per-
suade for adopting and accepting the Internet of Things and for research
institutes to provide more robust internet of things skill development
courses that adhere better to the market demands for professionals in India.
The next section gives atheoretical background which helps in developing
a hypothetical research model that influence the adoption of the Internet of
Things as the implementation of effective and efficient skill is required for
the adoption of innovative technologies (Finis Welch, 1970).
The Internet of Things (IoT) was first introduced by Kevin Ashton in 1999.
At the time he defined the IoT as a network of radio-frequency identifica-
tion (RFID)-enabled technology that is uniquely identifiable and intercon-
nected (Pretz, 2013). The Internet of Things (IoT) was generally described as
a “dynamic global network infrastructure with self-configuring capabilities
based on standards and interoperable communication protocols; physical
and virtual ‘things’ in an IoT have identities and attributes and are capa-
ble of using intelligent interfaces and being integrated as an information
96 Ananta Narayana et al.
Performance Expectancy
Effort Expectancy
Social Influence
RelativeAdvantage
Facilitating Conditions
Figure 6.1 Hypothetical research model (adapted from Venkatesh et al., 2003).
6.3 PERFORMANCE EXPECTANCY
understanding the usage of the Internet of Things. With regard to the per-
spective of the current research study, especially predictable to facilitate the
trainees by providing an Internet of Things skill development course to be
valuable, so that they can possibly use and accept the Internet of Things.
Therefore, the researcher suggests the below hypothesis:
H1.
Performance Expectancy significantly affects trainees’ Behavior
Intention on the usage of the Internet of Things
6.4 EFFORT EXPECTANCY
6.5 SOCIAL INFLUENCE
model and was added further in the technology acceptance model 2 due
to its significance in elucidating the external influence of other people on
the behavior of self (Venkatesh & Zhang, 2010). Social influence persuades
technology acceptance (Venkatesh & Zhang, 2010). Social influences refers
to the degree to which the use of the Internet of Things boosts a trainee’s
social status (Moore & Benbasat, 1991). As per Galan et al. (2013), trainees
believe that adopting the Internet of Things will improve their performance
for a particular social group (Im & Kang, 2011). Most of the experimental
research in information and communication technology (Yousafzai, 2012)
found social influence to be a significant precursor of behavior intention
(Venkatesh et al., 2003) with regard to the Internet of Things (Kesharwani
& Bisht, 2012). Mentioned researches indicate a positive significant rela-
tionship which is empirically allying linking social influence and behavior
intention of trainees’ in adopting the Internet of Things.
H3. Social Influence indicates significant influence on trainees’ behavior
intention in using the Internet of Things
6.6 COMPUTER SELF-EFFICACY
6.7 RELATIVE ADVANTAGE
6.8 FACILITATING CONDITIONS
(Venkatesh & Zhang, 2010). Actual behavior is the clear, obvious reaction
in a particular situation regarding a particular target (Ajzen, 1991). There is
a substantial indication of the significant effect of behavior intention (Im &
Kang, 2011) on actual usage in studies related to technology adoption
(Ma et al., 2010). In recent times, it has extended to the perspective of the
Internet of Things (Yu, 2012). As a consequence, the researcher postulates
the below hypothesis:
H7. Trainees’ behavior intention indicates a positive significant influence
on their actual usage of the Internet of Things.
6.10 RESEARCH METHODOLOGY
As per previous research studies on the UTAUT Model and the Internet of
Things, a quantitative research approach is immersed by the researchers to
test the proposed hypothetical model. A structured questionnaire consisting
of 38 questions is employed for data collection through convenient sampling
from the trainees of the Internet of Things skill development course orga-
nized by CSIR-Central Electronics Engineering Research Institute. Trainees
were requested to fill out the presented questionnaire on the basis of his/
her judgment and attitude about the acceptance and use of the Internet of
Things. Each trainee took 15 minutes to fill out the complete questionnaire.
The researcher distributed a total of 700 questionnaires to the trainees;of
these some 522 were returned to the researcher,meaning a response rate
of some 70%. After the researcher review 14 questionnaires were found
to be invalid, meaning that 508 responses were selected for final analysis.
Table 6.1 shows the beneficiaries’ demographic summary; with regard to
gender, 63% of respondents are male and 37% are female, their age ranges
from 18 to 60 years. With regard to education, 8% of them had secondary
education, 34% did a diploma and 58% of them are bachelor’s and above,
of which 52% of total respondents have experience in using the Internet of
Things, 36% have experience of using the Internet of Things to some extent,
and 12% have no experience of usage of the Internet of Things.
6.11 MEASUREMENT
The scales were adopted from existing literature associated with the uni-
fied theory of acceptance and use of technology model pertaining to the
current investigation (Foon& Fah, 2011) and prior empirical studies were
taken related to computer self-efficacy and relative advantage (Im & Kang,
2011) to protect the validity and reliability of presented items. Purposely,
performance expectancy, and effort expectancy were measured by means
Extending acceptance, usage of IoT by skill development course 101
6.12.1 Descriptive analysis
Table 6.2 presents descriptive statistics which affect all constructs in the
hypothetical research model and each mean was > 4.49, indicating that the
majority of the respondents respond positively to the structures measured
in the study. Furthermore, Cronbach’s α score pointed toward the strong
internal reliability of all constructs.
6.12.2 Measurement model
The present study is based on a multiple steps approach which examines the
relationship between factors of a structural model from the study (Anderson
& Gerbing, 1988). The researcher analyzed the measurement model to check
whether the instrument is reliable and valid for testing research hypotheses
in the proposed hypothetical model (Arbuckle, 2009). Hence, to contem-
plate the measurement model fit, researchers have to initially analyze the
confirmatory factor on the basis of AMOS 20.0 and subsequently calcu-
late the validity appertaining to the measurement model (Schumacker &
Lomax, 2010). To offer an approximate calculationof the model’s factors,
the present examination accepts the maximum-likelihood method where all
of the investigation was carried out on variance and covariance matrices.
Conversely, before the analysis it is assumed that it is crucial to test for mul-
ticollinearity, and multicollinearity depends on a higher correlation between
the variables. Tabachnick and Fidell (2007) illustrated that correlation values
in the approximate range of 0.8 or 0.9 are supposed to be highly problem-
atic, whereas a correlation value of 0.7 or higher is supposed to be a cause of
study. As per Pallant (2010), correlation value tolerance and variance infla-
tion aspect determined the presence of multicollinearity. There would be no
chance of multicollinearity on the assumption that the tolerance value is
in excess of 0.10 and the value of the variance inflation factor is below 3.0.
Table 6.3 Outline of absolute measurement and structural model fit index
Measurement Structural
Fit index Recommended valuea model model
6.12.3 Structural model
Owing to the measurement model’s criteria, researchers evaluate the good-
ness-of-fit for measuring the proposed hypothetical research model, and,
according to Table 6.3, the results of both the structural and the measure-
ment models were found to be the same, which again showed good fit data.
Hence, we continue to study the hypothesized relations of the factors of
the proposed hypothetical model. As we see in Table 6.5, all hypotheses
except H2 were supported consequently due to the path coefficient. Notably,
performance expectancy, effort expectancy, social influence, and computer
self-efficacy all indicated a significant positive effect toward behavior inten-
tion about the usage of the Internet of Things and performance expectancy
shows the maximum influence on the correlation with behavior intention.
The presented results supported Hypothesis-1, Hypothesis-3, Hypothesis-4
and Hypothesis-5 unpredictably; the path coefficient from effort expectancy
to behavior intention was not significant. As a result, this study failed to
find support for Hypothesis-2. Performance expectancy, social influence,
computer self-efficacy, and relative advantage to account for 63% of the
variance of behavior intention than other added factors. Contrary to the
effect of the statistical analysis of the presented proposed model explained
in the context of facilitating condition and behavior intention indicated sig-
nificantly influence the actual usage of the system and jointly accounted for
66% of the variance in actual usage, with behavior intention contributing
the most compared to facilitating conditions, consequently, Hypothesis-6
Table 6.4 Construct reliability, convergent and discriminant validity
105
106 Ananta Narayana et al.
A new paradigm called the Internet of Things (IoT) has transformed tradi-
tional living into a high-tech lifestyle. The changes brought about by IoT
include smart cities, smart homes, pollution control, energy conservation,
smart transportation, and smart industries. Many important research proj-
ects and investigations have been carried out in an effort to advance technol-
ogy through IoT. Globally, academics and developers are interested in recent
IoT breakthroughs. Researchers and IoT developers are collaborating to
expand the technology to the fullest possible extent and to produce improve-
ments in the system as a whole. The present research study is determined
by extending the unified theory of acceptance and usage of technology by
integrating constructs such as computer self-efficacy and relative advantage
which study the indicators affecting trainees’ behavior intention in terms
of usingthe Internet of Things. The findings of the study support the effi-
ciency and aptitude of Venkatesh’s technology model,both theoretically and
empirically, to be a functional theoretical model for giving insight into train-
ees’ acceptance of the Internet of Things. Path coefficients of the proposed
hypothetical model indicated statistical significance between effort expec-
tancy and behavior intention. In particular, the above outcomes indicated
that the trainees’ intention in terms of the acceptance and usage of the sys-
tem of the Internet of Things could be significantly affected by performance
Extending acceptance, usage of IoT by skill development course 107
REFERENCES
Abhishek Joshi
Sungkyunkwan University, Seoul, South Korea
CONTENTS
7.1 INTRODUCTION
there are two main concerns in the medical sector: increased health main-
tenance expenditures and a shortage of medical experts. According to the
World Health Organizations (WHO), in 2013 the worldwide demand and
actual number of health staff were 60.4 million and 43 million, respec-
tively [1]. By 2030, it is estimated that these numbers will rise to a demand
for 81.8 million with an actual number of staff of 67.3 million. The short-
age of medical amenities and medical experts is still a serious problem.
Worldwide, by 2050 there will be a considerable increase in the population
of adults above 60 years of age [2] due to the continuing decrease in the
birth rate, a trend which will persist in the coming years. With the increase
of age, an individual is more likely to get infected with different viruses
and diseases which require long-term care for them to return to health.
Ultimately, the increased human resources, medicines, medical devices, and
expenditure will be required by the population. The constant evolution of
new viruses and diseases makes it challenging to stay ahead of the curve, but
with the help of different approaches to the treatment of information, it is
possible to conquer these challenges.
Across the globe countries devote a considerable proportion of their gross
national product (GNP) is spent on public healthcare. A WHO report exhib-
ited that the related figures in India, Australia, Russia, Canada, the U.S.A.,
and China were 4.7%, 9.4%, 7.1%, 10.5%, and 5.6% respectively [3] and
it is likely that these figures will increase in the coming years. In order to
optimize efficiency, the world’s healthcare systems requires an intelligent
solution which gives accurate results in real time. These intelligent solutions
can be achieved with the help of AI, IoT, and blockchain. Integrating all
these technologies with medical data will undoubtedly help in resolving
healthcare problems. Taken together, these systems can help medical special-
ists to identify the disease by collecting information from the patient using
different sensors, comparing the symptoms of the disease with previous
patients using blockchain and detect the disease through the use of AI tech-
niques. Such techniques are supportive to medical experts in detecting the
disease at the early stages of development, reaching the outcome of complex
disease in an easy and faster way. In addition, these techniques support the
patients at reduced charge, take lesser time and make an accurate analysis
about the probable disease. As a large amount of healthcare data is available
today and new advanced data analytics techniques made it possible to
develop accurate medical diagnostic tools, primarily to help a lot of people
in remote locations which lack medical professionals. AI is merged with the
IoT to monitor the health conditions of the patient using different sensors
and giving the output in real time. It aims to optimize the time and financial
status of a person without compromising the health of a person. Additionally,
it provides support to medical staff and reduces government spending in the
health sector.
Bearing in mind the importance of this important evolution in healthcare
systems, this work presents a detailed study of different technologies
Intelligent approaches for disease detection and prevention 115
employed in the healthcare sector. The chapter includes various works per-
formed by the researchers in the medical field using machine learning, IoT,
and blockchain technology. The chapter further aims to look at different
researches performed for detecting, preventing, and treating diseases such as
diabetes mellitus (DM), cardiovascular disease, chronic kidney disease
(CKD), and coronavirus using machine learning, the IoT, and blockchain
technology. The structure of the chapter is as follows: section 7.2 discusses
AI, the IoT, and blockchain technology; and section 7.3 presents the research
work done in the healthcare sector to prevent, detect and treat different
diseases using these technologies. Finally, section 7.4 concludes the chapter
and discuss the future possibility of these technologies in healthcare.
7.2.1 Artificial intelligence
AI is a subsection of computer science that tries to develop intelligent
machine and technologies. It makes efforts to program machines and imple-
ment human intelligence in them to impersonate their actions. The prob-
lem-solving and learning approach is being evolved in machines to make
them more comprehensive. John McCarthy coined the term “artificial intel-
ligence” in 1956 during his workshop. The goal of this was “to proceed on
the basis of the conjecture that every aspect of learning or any other feature
of intelligence can in principle be so precisely described that a machine can
be made to simulate it”. Machine learning (ML) is a subsection of AI devel-
oped by Arthur Samuel in 1959 to develop various algorithms for extraction
of the information from the input data and the exploration of generalised
characteristics in the data points. These characteristics are general math-
ematical models established with certain rules and principles. The models
and decision process is generated from the input data and human guidance.
Once developed, ML automates the process using mathematical models and
programming that eliminate the human expert in the process.
Among the existing technologies, AI is the most promising and powerful
technology in the medical field [4–6]. AI can be described as a simulation of
human intelligence in a machine. AI is implemented when the system starts
making decisions like a human being. It is a large field that includes different
techniques such as computer vision, machine learning, and deep learning,
which are widely used in the medical field for performing segmentation,
classification, detection, prevention and treatment [7]. It aims to develop an
automatic system that learns from the input data and solves complex prob-
lems. AI uses the mathematical tool, i.e., ML, to iteratively learn from the
input data and tries to find the pattern from these data. On getting the
pattern, it generates a ML model which is utilized by the user to perform
116 Saumya Yadav et al.
different tasks. AI is hungry for data. The bigger data used for training the
model, the more accurate the result it will provide. In order to make use of
AI in the healthcare sector, medical data is collected from clinical activities,
such as diagnosis, screening, scanning, treatment etc. Various modalities,
such as magnetic resonance imaging (MRI), positron emission tomography
(PET), ultrasound, microscopy, X-Ray, and computed tomography (CT), are
widely used to obtain a fast and accurate medical diagnosis. In addition,
they help healthcare experts to make a decision for surgeries and navigating
tools while performing surgeries [8].
7.2.2 Machine learning
Researchers are working in the field of AI with systems with abilities such as
perception, reasoning and learning. This field is evolved further and applied
in different domains and industries for a range of applications, e.g. com-
puter science, self-driving cars, drug development, mathematics, finance,
production, automobile, and many more. ML algorithms can learn from the
data of a similar group of subjects, a connection between subject features
and from the outcome. Computational systems are trained through differ-
ent algorithms and statistical models for the analysis of the sample data, so
as to develop an efficient learning process. Domain knowledge is required
for the selection of proper features in the ML algorithm for improving the
predictions. Its features include the variable or descriptive attributes that are
recorded and quantified from raw data to train the ML model. In a broad
manner, ML is developing an algorithm or computer program which pro-
gressively improve its performance on its own. ML is principally divided into
four types: Supervised Learning, Unsupervised Learning, Semi-supervised
Learning, and Reinforcement Learning (Figure 7.1).
X xi , xi 1, , xN 1 (7.1)
and the value of i ranges from 0 to N-1 for all used samples. The term xi
represents the feature vector for the ith sample in the input data. The output
class or label is represented by Y corresponding to each input data given in
Equation 7.2,
Y yi , yi 1, , yN 1 (7.2)
The whole training set is represented by T, which is the set of input data xi
and output class or label yi. T is represented as in Equation 7.3,
f :X →Y (7.4)
Steps for solving a problem using a supervised learning are given as in Figure 7.2.
7.2.3 Internet of Things
IoT can be characterized as an interconnection of physical objects or
“things”, consisting of sensors, processing network and software to connect
and exchange the data with other devices and systems over the Internet.
Sensors and other connected devices collect the data from the given environ-
ment and information are extracted from the raw data. Then the informa-
tion is transferred to cloud servers and other devices via the Internet. Its
applications are able to function with the different domains and enable high
analyses and management of complex interactions in the devices [38]. IoT
devices, such as wearable sensors, monitors, and smart pills, help to collect
the data and ML models can use this data for disease prediction. Different
sensors are embedded into the medical system via automated signal process-
ing, automation, and computer technologies. These sensors collect informa-
tion that allows a clinician to recognize the situation of the patient in real
time and to help them by providing treatment. Different medical signals can
be found in the form of blood pressure, body temperature, heartbeat rate,
electromyograms (EMGs), electrocardiograms (ECGs), electroglottographs
(EGGs), electroencephalograms (EEGs), and electrooculograms (EOGs). An
IoT-based healthcare monitoring system can use these signals to help the
clinician to monitor the patient proactively. A smart gateway assembles data
from different smart devices. It can perform processing, compress data, use
noise filtering on the medical devices, and analyse the data to detect and
predict the risky pattern in a patient’s heath. The Internet of Medical Things
(IoMT) is a further tweaking of the system. It is a combination of medical
applications and systems that connect healthcare data using network tech-
nologies. IoMT plays a vital role in developing a smart standalone health-
care system. IoT with the help of AI supports the medical experts to take the
medical data of the patient remotely, leading to effective diagnosis. It trans-
fers the data from one device to another to enhance the performance of the
system in an automatic manner without any human intervention [39–48].
7.2.4 Blockchain technology
Blockchain technology was introduced in 2008 with the introduction of
the Bitcoin cryptocurrency technology. It is a public ledger, tracking assets,
distributed, recording transaction, and assure immutability in between a
p2p network of computers. Blockchain technology is widely used in vari-
ous fields, including healthcare, finance, industries, and business. It is an
innovative data structure that contains the list of records called a block [46].
Every data block consists of time-stamped batches of the latest transaction,
Intelligent approaches for disease detection and prevention 123
Figure 7.5 AI, IoT and blockchain technology merging with healthcare.
7.3.1 Diabetes mellitus
Diabetes mellitus (DM) is a complex metabolic disorder that can lead to the
damage of multiple body organs. It is also one of the world’s primary meta-
bolic diseases [56]. There is an emergent need to develop models/tools for
the risk assessment of disease, along with detecting susceptibility and prog-
nosis. The disease is linked to abnormal blood glucose levels in the human
body. Type 1 diabetes is the result of inadequate insulin production and
Type 2 diabetes is an output of oxidative stress, which results from defective
redox reactions and increased reactive metabolites (RMs) [57]. Looking at
the high prevalence of DM in the population, it would seem that most of the
individuals are undiagnosed. Hence, there is an emergent need to develop a
tool to assess the risk assessment of disease, susceptibility and prognosis. In
addition, there is a requirement to prevent diabetes by periodically taking
measurement and keep track of health data. Various risk assessment and
information security models are developed using AI, IoT and blockchain to
detect, prevent and cure DM in the patients as shown in Table 7.1.
death rate due to heart disease will increase up to 23.6 million [64]. The
increased death rate and numerous reasons for heart disease make predic-
tion complicated using a conventional method. Researchers are therefore
focused on developing new methods for diagnosing heart disease detection,
prediction and treatment with the latest technologies. AI predicts heart dis-
ease using the attachment of different IoT sensors. It evaluates patient data
and predicts the chances of heart disease [65]. Input data required for the
heart disease prediction using AI involves time series, images, tabular data,
and text data. The input data to be fed into the AI model are the risk fac-
tor features for predicting the disease. Data include the weight, heart rate,
blood pressure, and physical activities of the respective patients. Some heart
disease prediction using AI, and IoT are given in Table 7.2.
quarantined for the appropriate time period. The physician can measure
body temperature, oxygen rate, and blood pressure using different IoT sen-
sors. In addition, it helps to monitor the patients’ health. Successfully imple-
menting these technologies can improve the productivity of healthcare staff,
reduce the number of mistakes, cut down on the costs of scans, and reduce
the workload. Several such methods are included in Table 7.4.
7.4 CONCLUSION
People around the globe are affected by different types of deadly diseases.
Among the most common diseases are DM, cardiovascular disease, CKD,
and, most recently, coronavirus disease, all of which are having an adverse
effect on the health and economy of the world. Disease detection is the ini-
tial step taken by the medical experts on finding any symptoms. With the
increasing population, the demand for medical experts is increasing, and so
ultimately is brings the workload and pressure. Merging AI, IoT, and block-
chain with the medical field reduces the experts’ workload and give precise
output in real time. AI and ML techniques are used extensively in clinical
decision-making. With the help of AI, researchers generated different models
for detecting, segmenting, and predicting diseases. Different sensors of IoT
are used to collect data from the patients and also to remotely monitor the
health of the patients. Blockchain technology is used to secure the patients’
information, to permit the researcher to access the limited data, in order to
consulting multiple doctors. The proposed work represents different meth-
ods employed in the health sector using AI, IoT, and blockchain technologies.
It also outlines the methods used for performing different types of work.
In future, the researchers can merge more relevant techniques in health-
care, which will improve disease detection, prevention, and treatment. It will
improve performance, ensure that medical services are financially feasible,
safeguard future health, and reduce the workload of medical experts.
128 Saumya Yadav et al.
REFERENCES
[18] A. Fong, et al., “Identifying influential individuals on intensive care units: using
cluster analysis to explore culture.” Journal of Nursing Management, vol. 25(5),
pp. 384–391, 2017.
[19] K. Bhatia, R. Syal, “Predictive analysis using hybrid clustering in diabetes diag-
nosis.” Recent Developments in Control, Automation & Power Engineering
(RDCAPE). IEEE, 2017.
[20] S. R. Jonnalagadda, “A semi-supervised learning approach to enhance health
care community–based question answering: A case study in alcoholism.” JMIR
Medical Informatics, vol. 4(3), pp. e5490, 2016.
[21] A. Albalate, W. Minker, Semi-supervised and unsupervised machine learning:
novel strategies. John Wiley & Sons, 2013.
[22] H. Wu, et al., “Automated comprehensive adolescent idiopathic scoliosis
assessment using MVC-Net.” Medical Image Analysis, vol. 48 pp. 1–11, 2018.
[23] Y. Wang, et al., “Semi-supervised classification learning by discrimination-aware
manifold regularization.” Neurocomputing, vol. 147, pp. 299–306, 2015.
[24] L. Nie, et al., “Bridging the vocabulary gap between health seekers and health-
care knowledge.” IEEE Transactions on Knowledge and Data Engineering,
vol. 27(2), pp. 396–409, 2014.
[25] L. Jin, et al., “Integrating human mobility and social media for adolescent psy-
chological stress detection.” International conference on database systems for
advanced applications. Springer, Cham, 2016.
[26] R. A. R. Ashfaq, et al., “Fuzziness based semi-supervised learning approach for
intrusion detection system.” Information Sciences, vol. 378, pp. 484–497, 2017.
[27] C. Kaplanis, M. Shanahan, C. Clopath, “Continual reinforcement learning
with complex synapses.” International Conference on Machine Learning.
PMLR, 2018.
[28] M. F. Zohora, et al., “Forecasting the risk of type ii diabetes using reinforcement
learning.” 2020 Joint 9th International Conference on Informatics, Electronics
& Vision (ICIEV) and 2020 4th International Conference on Imaging, Vision
& Pattern Recognition (icIVPR). IEEE, 2020.
[29] D. Zhang, B. Chen, S. Li, “Sequential conditional reinforcement learning for
simultaneous vertebral body detection and segmentation with modeling the
spine anatomy.” Medical Image Analysis, vol. 67, pp. 101861, 2021.
[30] L. J. Muhammad, E. A. Algehyne, S. S. Usman, “Supervised machine learning
models for prediction of COVID-19 infection using epidemiology dataset.” SN
Computer Science, vol. 2, p. 11, 2021.
[31] J. Wang, et al., “Deep reinforcement active learning for medical image clas-
sification.” International Conference on Medical Image Computing and
Computer-Assisted Intervention. Springer, Cham, 2020.
[32] Z. Liu, et al., “Deep reinforcement learning with its application for lung cancer
detection in medical Internet of Things.” Future Generation Computer Systems,
vol. 97, pp. 1–9, 2019.
[33] Y. Cao, et al., “Improving tuberculosis diagnostics using deep learning and
mobile health technologies among resource-poor and marginalized communi-
ties.” 2016 IEEE first international conference on connected health: applica-
tions, systems and engineering technologies (CHASE). IEEE, 2016.
[34] S. Mishra, A. Dash, L. Jena, “Use of deep learning for disease detection and
diagnosis.” Bio-inspired neurocomputing. Springer, Singapore. pp. 181–201,
2021.
130 Saumya Yadav et al.
[35] J. Venugopalan, et al., “Multimodal deep learning models for early detection of
Alzheimer’s disease stage.” Scientific Reports. vol. 11(1), pp. 1–13, 2021.
[36] J. Wang, et al., “Detecting cardiovascular disease from mammograms with
deep learning.” IEEE Transactions on Medical Imaging, vol. 36(5), pp. 1172–
1181, 2017.
[37] R. C. Joshi, et al., “Object detection, classification and tracking methods for
video surveillance: a review.” 2018 4th International Conference on Computing
Communication and Automation (ICCCA). IEEE, 2018.
[38] B. D. Martino, et al., “Internet of things reference architectures, security and
interoperability: a survey.” Internet of Things, vol. 1, pp. 99–112, 2018.
[39] H. Sattar, et al., “An IoT-based intelligent wound monitoring system.” IEEE
Access, vol. 7, pp. 144500–144515, 2019.
[40] S. Muthukumar, et al., “Smart Humidity Monitoring System for Infectious
Disease Control.” 2019 International Conference on Computer Communication
and Informatics (ICCCI). IEEE, 2019.
[41] F. Miao, et al., “Multi-sensor fusion approach for cuff-less blood pressure mea-
surement.” IEEE Journal of Biomedical and Health Informatics, vol. 24(1),
pp. 79–91, 2019.
[42] F. Yang, et al., “Multi-method fusion of cross-subject emotion recognition based
on high-dimensional EEG features.” Frontiers in Computational Neuroscience,
vol. 13, pp. 53, 2019.
[43] Q. Gu, et al., “Health and safety situation awareness model and emergency
management based on multi-sensor signal fusion.” IEEE Access, vol. 7, pp.
958–968, 2018.
[44] M. Muzammal, et al., “A multi-sensor data fusion enabled ensemble approach
for medical data from body sensor networks.” Information Fusion, vol. 53, pp.
155–164, 2020.
[45] K. Lin, et al., “Multi-sensor fusion for body sensor network in medical human–
robot interaction scenario.” Information Fusion, vol. 57, pp. 15–26., 2020.
[46] A. Shahnaz, U. Qamar, A. Khalid, “Using blockchain for electronic health
records.” IEEE Access, vol. 7, pp. 147782–147795, 2019.
[47] J. Chen, et al., “A novel medical image fusion method based on Rolling
Guidance Filtering.” Internet of Things, vol. 14, pp. 100172, 2020.
[48] D. Fabiano, S. Canavan. “Emotion recognition using fused physiological
signals.” 2019 8th International Conference on Affective Computing and
Intelligent Interaction (ACII). IEEE, 2019.
[49] S. Tanwar, K. Parekh, R. Evans. “Blockchain-based electronic healthcare record
system for healthcare 4.0 applications.” Journal of Information Security and
Applications, vol. 50, pp. 102407, 2020.
[50] K. Shuaib, et al., “Blockchains for secure digitized medicine.” Journal of
Personalized Medicine, vol. 9(3), pp. 35, 2019.
[51] T. Zhou, X. Li, H. Zhao, “Med-PPPHIS: blockchain-based personal healthcare
information system for national physique monitoring and scientific exercise
guiding.” Journal of Medical Systems, vol. 43(9), pp. 1–23, 2019.
[52] H. Kaur, et al., “A proposed solution and future direction for blockchain-
based heterogeneous medicare data in cloud environment.” Journal of Medical
Systems, vol. 42(8), pp. 1–11, 2018.
[53] E. A. Breeden, C. Davidson, T. K. Mackey. “Leveraging blockchain technol-
ogy to enhance supply chain management in healthcare: an exploration of
Intelligent approaches for disease detection and prevention 131
Interoperability in IoT-driven
smart buildings
Employing Rule-based decision support
systems
Mohan Krishna S.
Alliance University, Bangalore, India
Thinagaran Perumal
University of Putra, Selangor, Malaysia
Sumukh Surya
Bosch Global Software Technologies, Bangalore, India
Chandrashekar
L & T Technological Services, Bangalore, India
CONTENTS
Sustainable energy development and climate change are closely linked, and
it is increasingly felt across the world that energy consumption must be opti-
mized, and that energy efficiency must be increased. This is applicable to all
sectors, but there is greater thrust on the demand side. Commercial buildings
are potentially large energy guzzlers. The power of technology and the inter-
net was harnessed to ensure the building sector optimizes energy use. The
rapid spread of the internet and automation across the world, combined
with increasingly affordable and high-performance sensors, has led to the
concept of intelligent buildings [1–3]. The quest for making commercial
buildings and homes intelligent has opened a whole new world of possi-
bilities and challenges with respect to the technology, economy, and envi-
ronment. The different components of a smart or intelligent building are
succinctly represented in Figure 8.1. From the technological point of view,
the presence of a multitude of heterogeneous subsystems in a building, along
with associated sensor and communication technologies, have also thrown
up issues related to coordination and interoperability. From the economic
point of view, this requires heavy capital investment, however, the return
on investment (ROI) is encouraging with payback periods of less than five
years. The environmental degradation is contained as the carbon footprint
of the buildings is reduced drastically (with some of them even achieving net
zero emissions).
Therefore, it can be safely interpreted that the concept of intelligent build-
ings is here to stay and, if implemented and executed properly, it will have a
cascading effect on the energy patterns of the population and ensure the
achievement of the United Nations Sustainable Development Goals (Goal 7)
related to energy security and sustainable energy development. This chapter
throws light on the technological aspects of intelligent buildings with an
emphasis on coordination.
Interoperability in IoT-driven smart buildings 135
A designer for intelligent buildings must be able to integrate all these sub-
systems in a seamless way such that they can easily talk to (coordinate with)
each other [4–6].
This is where the issue of interoperability of all these subsystems emerges.
The proliferation of internet and automation, low cost of sensors and
embedded system technologies and the availability of highly versatile com-
munication infrastructure have revolutionized subsystems inside buildings
and made them intelligent. This resulted in increased data intensity of the
buildings as huge amounts of data from these subsystems need to be pro-
cessed, monitored, and analyzed. Figure 8.2 summarizes the different data
The basic components of a DSS for BEMS are illustrated in Figure 8.3.
The data can be in the form of raw data, manuals and documents, knowl-
edge inputs from employees and other stakeholders and business models.
Interoperability in IoT-driven smart buildings 137
For a building, the data can pertain to different subsystems of the building,
the sensor and communication data, building inventory data, data sheets,
energy bills, energy consumption data from the star labels of equipment’s
and buildings and the like. Table 8.2 details the different types of data types
employed for heterogeneous subsystems. Before analyzing the impact of a
DSS on different building subsystems and the different rule bases which are
employed, there are certain ambiguities associated with a DSS used in BEMS
which need to be clarified. Table 8.3 summarizes the characteristics of a DSS
and addresses certain anomalies pertaining to the use of them.
On <FA_alarm_triggered>
If <status_zone001_enable>
Do <trigger_PA001>
present which need to be investigated and rectified for more scalability. The
following points need to be addressed:
also are raised which would enable researchers in the domain to pander to
and find solutions for the same.
REFERENCES
[1] Khajenasiri, I., Estebsari, A., Verhelst, M., Gielen, G. A review on internet of
things solutions for intelligent energy control in buildings for smart city appli-
cations. Energy Procedia. 2017, 1(111): 770–779.
[2] Perumal, T. Making buildings smarter and energy-efficient—using the inter-
net of things platform. IEEE Consumer Electronics Magazine. 2021, 10(3):
34–41.
[3] Almusaylim, Z.A., Zaman, N. A review on smart home present state and chal-
lenges: linked to context-awareness internet of things (IoT). Wireless Networks.
2019, 25(6): 3193–3204.
[4] Mohamed, R., Perumal, T., Sulaiman, M.N., Mustapha, N. Multi resident
complex activity recognition in smart home: a literature review. International
Journal of Smart Home. 2017, 11(6): 21–32.
[5] Power, D.J., Power Enterprises. (n.d.). Ask Dan! about DSS, from http://dss
resources.com/faq/index.php?action=artikel&id=13
[6] Le, D.N., Le Tuan, L., Tuan, M.N. Smart-building management system: an
Internet-of-Things (IoT) application business model in Vietnam. Technological
Forecasting and Social Change. 2019, 1(141): 22–35.
[7] Lillo, P., Mainetti, L., Mighali, V., Patrono, L., Rametta, P. An ECA-based
semantic architecture for IoT building automation systems. Journal of
Communications Software and Systems. 2016, 12(1): 24–33.
[8] Park, J.H., Salim, M.M., Jo, J.H., Sicato, J.C., Rathore, S., Park, J.H. CIoT-Net:
a scalable cognitive IoT based smart city network architecture. Human-centric
Computing and Information Sciences. 2019, 9(1): 1–20.
[9] 9 Ways to Create an Intelligent Office. (n.d.). Retrieved January 28, 2021, from
https://www.opensourcedworkplace.com/news/9-ways-to-create-an-intelligent-
office
[10] Interoperability: 5 Ways It Pays. (2002, August 1). Retrieved January 28, 2021, from
https://www.facilitiesnet.com/buildingautomation/article/Interoperability-5-
Ways-It-Pays--1710
Chapter 9
Vinay Chowdary
uGDX Institute of Technology, Hyderabad, India
CONTENTS
9.1 INTRODUCTION
In today’s world, there are around one billion automobiles, owning a car is
more of a need than a luxury, which highlights the importance of parking
places. It is critical to have an adequate number of parking places in cities,
malls, offices, schools, hospitals, and other locations in order to accommo-
date tourists and inhabitants while also avoiding traffic congestion. There is
a high density of vehicles, specially in metropolitan areas and in hill stations,
that have typically irritated drivers while they waste their time and effort
looking for a parking spot and who typically end up parking their vehicles
on the street. Further, the rapid growth in the number of vehicles on the road
is exacerbating the problem of parking space scarcity. According to industry
estimates, around 30% of traffic is caused by tha motorists’ failure to find a
parking spot. As a result, an effective and smart parking system will save a
lot of time, energy, and fuel.
In recent years, the parking management problem has been studied from
a variety of different perspectives. With the incorporation of advanced tech-
nologies such as the Internet of Things (IoT) [1], artificial intelligence and
machine learning [2], smart parking systems have been implemented in
developed nations such as the United States, Japan, and so on. IoT [3] is
defined as a collection of smart objects (sensors) which can interact with
each other through a communication network. In [4] the authors developed
a low-cost IoT-based parking system for smart cities. In [5, 6] the authors
developed a cloud-based smart parking solution for large parking lots. In [7]
the authors utilized the IoT and a genetic algorithm to develop navigation
and reservation-based parking system. In [8] authors placed TTGO-ESP32-
LoRa boards with ultrasonic sensors to identify free parking slots and then
shared this information through the WiFi module present at the end user. In
[9] the authors proposed the introduction of a graph-based smart parking
system using IoT with its analysis being conducted through a VDM-SL
toolbox.
In this contribution the authors have developed an IoT-based smart park-
ing system using low-cost Light Dependent Resistor (LDR) sensors. Today
most smart parking systems are based on ultra-sonic sensors or IR sensors
[10], but they are costlier and therefore LDR sensors have been used in this
work as it is cost-effective and can be deployed easily. The LDR sensor
works by the shadow detection method where, with the presence of light or
luminous source such as parking lights, luminous intensity is being calcu-
lated and with the absence of luminous intensity shadow is being created.
Therefore, in this work the LDR sensor has been deployed beneath a vehicle
to identify its presence and to indicate the unavailability of a parking slot.
XAMPP is used as our local server in the proposed work to test clients or
websites before transferring them to a remote web server. The chapter is
organized as follows; section 9.2 presents the hardware used and the meth-
odology of this research work; section 9.3 discusses the results; and section
9.4 summarizes the chapter.
In this section all of the hardware used to build the IoT-based smart parking
system, architecture, step-wise procedure and algorithm is discussed briefly:
Figure 9.7 Architecture of proposed system for IOT-based smart parking system.
148 Samyak Jain et al.
The flow chart of the admin system and the user system is shown in Figures
9.8 and 9.9.
The proposed parking system is simple and cost-effective and will prove
helpful in developing countries like India. It is simple to deploy and oper-
ate, with lower maintenance and operational costs. Therefore, with little
IoT-based parking system using Web-App 149
Table 9.1 Specifications of supportive components and use in the proposed system
Component Specification Role
An XAMPP server shown in Figure 9.12 assists in the setup of the local
host and MySQL query in myAdminPHP, which we used to sort the sensor
values directly driven by NodeMCU, and the application then queries those
values and displays to the user which slot is free and which slot is booked.
A basic prototype with eight slots and LDR sensors installed at the bot-
tom of each slot, which are connected to the NodeMCU as shown in
Figure 9.13. The NodeMCU takes the value and sends it to the server data-
base using Wi-Fi, and the web page shows which slot is occupied and which
slot is free based on the sensor values.
At the entry gate, a PIR sensor and servo motor, and at the exit gate, an
ultrasonic sensor is installed as shown in Figure 9.14. PIR will detect the
IoT-based parking system using Web-App 151
motion of the car and send data to Arduino Uno, which will control the
servo motor to open and close the gate. As we progress, a limit has to be
based on the number of parking slots available. For example, if four parking
slots are available, the gate will only open four times. At the exit gate, as the
car leaves, the ultrasonic sensor will inform the Arduino that another slot is
available, and Arduino will send data to the servo motor.
IoT-based parking system using Web-App 153
9.4 CONCLUSION
REFERENCES
[1] Xia, F., Yang, L. T., Wang, L., & Vinel, A. (2012). Internet of things. International
Journal of Communication Systems, 25(9), 1101.
[2] Sharma, A., Jain, A., Gupta, P., & Chowdary, V. (2020). Machine learning
applications for precision agriculture: A comprehensive review. IEEE Access,
9, 4843–4873.
[3] Chowdary, V., Bera, T., & Jain, A. (2022). IoT solution reference architectures.
In Internet of things (pp. 39–52). CRC Press.
[4] Vakula, D., & Kolli, Y. K. (2017). Low cost smart parking system for smart
cities. In 2017 International Conference on Intelligent Sustainable Systems
(ICISS) (pp. 280–284). IEEE.
[5] Ramasamy, M., Solanki, S. G., Natarajan, E., & Keat, T. M. (2018). IoT based
smart parking system for large parking lot. In 2018 IEEE 4th International
Symposium in Robotics and Manufacturing Automation (ROMA) (pp. 1–4).
IEEE.
[6] Pham, T. N., Tsai, M. F., Nguyen, D. B., Dow, C. R., & Deng, D. J. (2015). A
cloud-based smart-parking system based on Internet-of-Things technologies.
IEEE Access, 3, 1581–1591.
[7] Aydin, I., Karakose, M., & Karakose, E. (2017). A navigation and reserva-
tion based smart parking platform using genetic optimization for smart cities.
In 2017 5th International Istanbul Smart Grid and Cities Congress and Fair
(ICSG) (pp. 120–124). IEEE.
[8] Kodali, R. K., Borra, K. Y., GN, S. S., & Domma, H. J. (2018). An IoT based
smart parking system using LoRa. In 2018 International Conference on
Cyber-enabled Distributed Computing and Knowledge Discovery (CyberC)
(pp. 151–1513). IEEE.
[9] Latif, S., Afzaal, H., & Zafar, N. A. (2018, December). Modelling of graph-
based smart parking system using internet of things. In 2018 International
Conference on Frontiers of Information Technology (FIT) (pp. 7–12). IEEE.
[10] Park, Wan-Joo, et al. Parking space detection using ultrasonic sensor in park-
ing assistance system. In 2008 IEEE Intelligent Vehicles Symposium IEEE,
2008.
Chapter 10
A next-gen IoT-based
semi-automatic mobile manipulator
Mukul Kumar Gupta
University of Petroleum and Energy Studies, Dehradun, India
Shival Dubey
Institute of Design, Robotics & Optimization, University of Leeds,
United Kingdom
CONTENTS
10.1 INTRODUCTION
The Internet of Things (IoT) has been one of the most familiar features of
recent years, scaling new heights and creating a benchmark in the world.
It has transformed the real world into an intelligent communication world.
In addition, existing challenges are highlighted in these areas.
The value of IoT is increasing, in both commercial and daily settings. In
many ways, it is currently making our lives easier and it will certainly con-
tinue to do so. It is addressing challenges which we didn’t even understand
were a challenge, along with the problems we have, before the solution has
magically emerged. The chances are that you already understand how useful
IoT is in your daily life through the use of smart thermostats, remote door
locks, wired home hubs and all of the different app-controlled appliances.
The application considered in this chapter is a semi-automatic mobile
manipulator. A mobile robotic manipulator system is a robotic articulated
arm mounted over a mobile base to improve mobility and achieve greater
degrees of freedom [1–3]. In such mechanical structures, the degrees of free-
dom of the robotic arm is enhanced with the degrees of freedom of the
mobile base. There is also an improvement in the workspace of the robotic
manipulator when it is mounted on a mobile base rather than a fixed base.
Any object in free space is represented with a degree of 6 DOF, that is, 3 to
represent the object in the cartesian plane and 3 degrees to denote the object
orientation. Therefore, to fully manipulate an object in a free space 6 joints
are needed to achieve complete movement [4, 5].
When a robotic manipulator has additional degrees of freedom, this is
known as kinematic redundancy. When the number of degrees of freedom or
robotic system joints exceeds the number of controllable variables, redun-
dancy arises. A kinematically redundant mobile manipulator has more
DOFs than is necessary to undertake its task. In this scenario, the inverse
kinematics issue yields an unlimited number of solutions. Secondary objec-
tives, such as avoiding mutual limits, singularities, and obstructions, can be
better met by selecting mobile manipulator configurations and a motion
trajectory from these redundant options.
mobile base has to follow a trajectory to avoid the obstacle in the case of
autonomous systems.
The robot can automatically acquire and send its information and the infor-
mation about the environment using IoT and sensor technology. With the
help of a feedback mechanism on the robot, it is also possible to process
this information. One of the key applications based on information from
the sensor network is the inspection and control of physical objects with
the most up-to-date status, which includes both static properties, viz., the
inheritance features of objects such as shape, size, and colour, and dynamic
properties, such as the real-time position, movement, gesture, and motion of
objects that will change over time, etc. These benefits are critical in allowing
large sensor nodes to capture multimodal sensory data in the future ubiqui-
tous IoT framework.
IoT activities are centred on managing, monitoring, and optimizing sys-
tems and processes using linked devices with simple, onboard passive sen-
sors. Despite its impact, the IoT solution’s full potential could be realized by
delving deeper into the more complex and transformative features of perva-
sive connectivity to and communication among smart objects. Because of
their innate ability to detect, think (compute), act (manipulate), and move
about, robotic systems can assist in this shift (mobility).
10.3 PROPOSED MODEL
torque required for robot deployment. When one has fewer links then the
Euler Lagrange approach is better, but in the case of more number links the
newton Euler approach is the most suitable.
10.3.1 Denavit-Hartenberg parameters
The Denavit-Hartenberg (D-H) notation is used to describe the location
of each link of the manipulator in relation to its neighbouring link. Then,
for a given set of joint angles, the resultant pose (position and orienta-
tion) is calculated. Any robot can be described kinematically with values of
four quantities for each link/joint. Two of these quantities describe the link
geometry and the other two describe the link’s connection to its neighbour-
ing link.
i α a D θ
1 3pi/2 0 D1 Pi/2
2 3pi/2 0 D2 3pi/2
3 3pi/2 0 0 θ -3pi/2
10.4 ROBOT CONTROL
Nonlinear dynamics and coupling effects have to consider for a better and
more accurate controller design.
During the early days of robotics, because no computing is required for intri-
cate kinematic and dynamic effects, this solution may be readily conceived,
analysed, and implemented using the single-input single-output classical
PID technique. Traditional joint control is not only simple to use, but also
steady and reliable. This controller is the most popular to date because it is
the one most suited to real-world applications. Moreover, recent nonlinear
control techniques are far too complex for industrial robotic applications.
Task space control, on the other hand, is less well known than joint space
control, and its design technique is less clearly defined. In task space,
feedback gains are not apparent, and joint space behaviour is difficult to
anticipate.
The joint space is the control action whereas the task space is the opera-
tional space control.
Figure 10.8 shows the basic outline of the joint space control methods.
The main point of the diagram is that torque should be applied to the
manipulator and also that one can control position and velocity. The output
position should tend to match the desired position as the difference between
these two is known as an error. As time tends to infinity, error tends to zero.
Figure 10.9 shows a schematic diagram of the operational space control
methods. Because operational space controllers use a feedback loop to
directly decrease job mistakes, there are various advantages to this tech-
nique. Now, the motion between points can be a straight-line segment in the
task space.
Figure 10.11 Robot prototype (a) Indoor environment, (b) Outdoor environment.
of the end-effector and vice versa. The robotic arm when placed on the mov-
able mobile robot base, the end effector coordinates alter with respect to the
position of the robot base.
10.5 HARDWARE IMPLEMENTATION
This chapter describes the research that has been carried out to develop a
working prototype of a Semi-Automatic Mobile Manipulator using IoT
applications. This is developed using a tracked wheel mobile robot. This fea-
ture facilitates the robot to navigate conveniently on all platforms irrespec-
tive of the terrain as the mechanism is designed to climb rocks and navigate
A next-gen IoT-based semi-automatic mobile manipulator 167
REFERENCES
[1] Rubio, F., Valero, F., and Llopis-Albert, C., “A review of mobile robots:
Concepts, methods, theoretical framework, and applications”. International
Journal of Advanced Robotic Systems, 16(2), pp. 1–22, 2019.
[2] Ashith Shyam, R. B., Hao, Z., Montanaro, U., Dixit, S., Rathinam, A., Gao, Y.,
Neumann, G., and Fallah, S., “Autonomous robots for space: Trajectory learn-
ing and adaptation using imitation”. Frontiers in Robotics and AI, 8, pp. 1–10,
2021.
[3] Sivčev, S., Coleman, J., Omerdić, E., Dooly, G., and Toal, D., “Underwater
manipulators: A review”. Ocean Engineering, 163, pp. 431–450, 2018.
[4] Luo, D., and Yu, L., “From factory to site—Designing for industrial robots
used in on-site construction” In Automating cities (pp. 87–109). Springer,
Singapore, 2021.
[5] Van Wynsberghe, A., Healthcare robots: Ethics, design and implementation.
Routledge, 2016.
[6] Gupta, A., Singh, A., and Verma, V., Amit Kumar Mondal and Mukul Kumar
Gupta published in the advanced robotics titled, developments and clinical
evaluations of robotic exoskeleton technology for human upper-limb rehabili-
tation, Vol 34, Taylor and Francis, April 2020.
[7] Asian Defence, “Bomb Disposal Robot Daksh”. Theasiandefence.blogspot.
com. Retrieved 2010-08-31, 2009.
[8] Naskar, S., Das, S., Seth, A. K., and Nath, A., Application of radio frequency con-
trolled intelligent military robot in defense. In 2011 International Conference on
Communication Systems and Network Technologies (pp. 396–401). IEEE, 2011.
[9] Chowdary, V., Kaundal, V., Sharma, P., and Mondal, A. K., Implantable elec-
tronics: Integration of bio-interfaces, devices and sensors. In Medical big data
and internet of medical things (pp. 55–79). CRC Press, 2018.
168 Mukul Kumar Gupta and Shival Dubey
[10] Chowdary, V., Mondal, A. K., Sharma, A., and Capoor, S., “Pre-deployment
strategy for maximizing barrier coverage in wireless sensor network”.
International Journal of Sensors Wireless Communications and Control, 11(2),
pp. 181–188, 2021.
[11] Meera, C. S., Sairam, P. S., Vineeth, V., Adarsh, K., and Gupta, M. K., “Design
and analysis of new haptic joysticks for enhancing operational skills in excava-
tor control”. Journal of Mechanical Design by ASME, 142(12), pp. 460–467,
2022.
[12] Zhou, H., DC servo motor PID control in mobile robots with embedded DSP.
In International Conference on Intelligent Computation Technology and
Automation (ICICTA) (Vol. 1, pp. 332–336). IEEE, 2008.
[13] Epenetus, A. B., Meera, C. S., Mohan, S., and Gupta, M. K., “Development
and motion control of spatial serial robotic manipulator under varying distur-
bances”. World Journal of Engineering, 16(4), pp. 460–467, 2019.
[14] Gupta, M. K., Kumar, R., Verma, V., and Sharma, A. “Robust control based
stability analysis and trajectory of triple link robot manipulator”. Journal
Européen des Systèmes Automatisés, 54(4), pp. 641–647, 2021.
[15] Kanayama, Y., Kimura, Y., Miyazaki, F., and Noguchi, T., “A stable track-
ing control method for an autonomous mobile robot”. In Proceedings. IEEE
International Conference on Robotics and Automation (pp. 384–389), IEEE,
1990.
[16] Samson, C. and Ait-Abderrahim, K., “Feedback control of a nonholonomic
wheeled cart in cartesian space”. In Proceedings. 1991 IEEE International
Conference on Robotics and Automation (pp. 1136–1137). IEEE Computer
Society, 1991.
[17] Murray, R. M. and Sastry, S. S., Nonholonomic motion planning: Steering
using sinusoids. IEEE Transactions on Automatic Control, 38(5), pp. 700–716,
1993.
[18] Khatib, O., “Real-time obstacle avoidance for manipulators and mobile roots”.
In Autonomous robot vehicles (pp. 396–404). Springer, 1986.
[19] Abbaspour, R., “Design and implementation of multi-sensor based autono-
mous minesweeping robot”. In International congress on ultra-modern tele-
communications and control systems (pp. 443–449). IEEE, 2010.
Chapter 11
Dinesh Chaudhari
JDIET, Yavatmal, India
Avinash P. Jadhav
DRGIT&R Amravati, Yavatmal, India
CONTENTS
11.1 INTRODUCTION
Identifying and classifying crop pests is one of the vital challenges in the
field of agriculture [1]. Insects are the most important factor in causing dam-
age to crops and reducing crop productivity. Insect classification is known
as a complex task owing to its complex structure and also with the high
similarity in appearance among the distinct species [2]. It is very essential
for recognizing and classifying the insects present in the crops at an earlier
stage by providing highly effective pesticides and also introducing biologi-
cal control methods to prevent the spread of insects that cause crop dis-
eases [3, 4]. The traditional way of identifying insects is considered to be
11.2 LITERATURE SURVEY
11.2.1 Related works
In 2021, Kumar et al. [14] introduced an enhanced model for identifying
the pests that were affecting the rice at the time of crop productivity. Here,
the IoT-based mechanism was used for passing the rice pest images to the
cloud storage and has provided the pest information. When the pest was
identified, the information regarding the presence of the pest was sent to
the farmers or owners for taking respective actions. The analysis results
have shown that the proposed approach has minimized the rice wastage in
the productivity field through the continuous monitoring of the pests in the
rice field. In 2020, Chen et al. [15] have implemented a deep learning-based
model for obtaining the insect locations and analyzing the environmental
information from the weather stations in order to obtain the pests’ informa-
tion in the field with the help of an enhanced deep learning approach. The
experimental results have shown that the proposed method have secured
improved identification accuracy. Precise identification of the insects and
pest has decreased the amount of pesticide usage, which has also minimized
the pesticide damage to soil.
In 2021, Turkoglu et al. [16] presented two types of classification
approaches with the help of deep feature extraction that were obtained from
the pre-trained CNN. The proposed model was validated with the help of
diverse diseases and pest images. It was observed that the accuracy scores
were better with the majority of the ensemble model and provided improved
172 Atul B. Kathole et al.
performance when compared with the existing models. In 2019, Liu et al.
[17] have developed an end-to-end method for classifying and detecting the
huge multi-class pests with the help of deep learning. The three major parts
of the proposed framework were a novel module with an attention-based
approach, the developed neural network for ensuring the region proposals,
and a score map for classifying the pest and bounding box regression. The
experimental analysis was carried out to demonstrate the effectiveness of
multi-class pest detection through the proposed model.
In 2021, Li et al. [18] have involved a novel technique for enhancing the
accuracy of small pest detection. The suggested framework was trained with
the help of a transfer learning methodology using the tiny pest training set.
Here, the developed deep learning architecture has provided better perfor-
mance than other approaches. The analysis has shown that the proposed
method has ensured the robust performance in detecting the tiny pests at
varied light reflections and pest densities. In 2018, Yue et al. [19] proposed
an enhanced residual-based network for detecting the problem in the crop
field. The proposed method was correlated with the traditional approaches
and has demonstrated the high power capacity of the developed model for
image reconstruction. The analysis results have shown that the proposed
approach has revealed an enhanced recall rate for pest detection.
In 2021, Wang et al. [20] have developed an efficient deep learning model
in the pest monitoring system for automatically detecting and counting the
pest in the rice planthoppers. Here, the proposed approach was developed
to extract the high-quality regions in the pest images, even the tiny ones. The
analysis results have shown that the suggested approach has improved rec-
ognition recall compared with the state-of-the-art approaches. In 2019,
Thenmozhi et al. [21] implemented an elevated deep learning network for
classifying the insect species through the three available data sets. The sug-
gested approach was validated with the other deep learning architectures
under the insect classification. Further, this model has included transfer
learning for tuning the pre-trained models. The experimental results have
shown that the suggested model was effective in classifying the different
types of insects and also applicable in the agricultural sector for crop
protection.
11.2.2 Problem statement
Plant pests are the most important factor in causing the massive loss in
agricultural production, along with the social, ecological, and economical
implications. It is essential to recognize and classify the insects present in
the crops at the early stage. This is to avoid the insect spread into the crop,
resulting in crop diseases by choosing the efficient biological control and
pesticides approaches. Numerous features and challenges of agriculture pest
detection are reviewed in Table 11.1. Artificial intelligence [14] decreases
rice wastage at the time of production by monitoring the pests at the regular
Pest identification and classification using IoT enable technique 173
blur or noise through the process of DnCNN, Deblur GAN and other image
enhancement approaches. CNN [20] performs well with regard to small pest
detection. However, this model achieves poor levels of accuracy. CNN [21]
has improved potential with regard to pest detection, especially in outdoor
applications. But it requires more time for the processing of a large number
of data. Therefore, a new pest detection model using deep learning and IoT
is required to advance a solution for these abovementioned drawbacks.
Figure 11.1 P
roposed pest identification and classification architecture with IoT
and deep learning approach.
176 Atul B. Kathole et al.
is used for collecting the required crop images from the agricultural fields
through the sensors. These collected images are considered at the object
detection phase, where the YOLOv3 detector is used to detect the pest
regions in the given input images. The detected images from the YOLOv3
are given to the CNLSTM network, where the CNN framework is used to
extract the most essential features of the detected pest images. The pest fea-
tures are passed toward the developed LSTM network, which is used to
classify these features into different pest classes in the agricultural field. The
performance of the classification model is further enhanced by the proposed
AHBA on conducting the optimization in the hidden neurons of the LSTM
network, which intends to achieve the maximization of accuracy in the clas-
sification phase in the proposed optimal pest classification model.
11.4 CONCLUSION
REFERENCES
[12] Everton Castelão Tetila, Bruno Brandoli Machado, Gilberto Astolfi, Nícolas
Alessandro de Souza Belete, Willian Paraguassu Amorim, Antonia Railda Roel
and Hemerson Pistori, “Detection and classification of soybean pests using
deep learning with UAV images,” Computers and Electronics in Agriculture,
Vol. 179, No.105836, pp. 1–11, December 2020.
[13] D. J. A. Rustia, Chen-YiLu, Jun-Jee Chao, Ya-Fang Wu, Jui-Yung Chung,
Ju-Chun Hsu and Ta-Te Lin, “Online semi-supervised learning applied to an
automated insect pest monitoring system,” Biosystems Engineering, Vol. 208,
pp. 28–44, August 2021.
[14] S. K. Bhoi, K. K. Jena, S. K. Panda, H. V. Long, R. Kumar, P. Subbulakshmi
and H. B. Jebreen, “An internet of things assisted unmanned aerial vehicle
based artificial intelligence model for rice pest detection,” Microprocessors and
Microsystems, Vol. 80, No. 103607, pp. 1–11, February 2021.
[15] C. J. Chen, Y. Y. Huang, Y. S. Li, C.-Y. Chang and Y.-M. Huang, “An AIoT
based smart agricultural system for pests detection,” IEEE Access, Vol. 8,
pp. 180750–180761, 2020.
[16] M. Turkoglu, B. Yanikoğlu and D. Hanbay, “PlantDiseaseNet: convolutional
neural network ensemble for plant disease and pest detection,” Signal, Image
and Video Processing. Received: 27 August 2020 / Revised: 19 February
2021 / Accepted: 5 April 2021 © The Author(s), under exclusive licence to
Springer-Verlag London Ltd., part of Springer Nature 2021, 1–9, https://doi.
org/10.1007/s11760-021-01909-2
[17] L. Liu, R. Wang, C. Xie, P. Yang, F. Wang, S. Sudirman and W. Liu, “PestNet: An
end-to-end deep learning approach for large-scale multi-class pest detection
and classification,” IEEE Access, Vol. 7, pp. 45301–45312, 2019.
[18] W. Li, D. Wang, M. Li, Y. Gao, W. Jianwei and X. Yang, “Field detection of tiny
pests from sticky trap images using deep learning in agricultural greenhouse,”
Computers and Electronics in Agriculture, Vol. 183, No. 106048, pp. 1–11,
April 2021.
[19] Y. Yue, X. Cheng, D. Zhang, W. Yunzhi, Y. Zhao, Y. Chen, G. Fan and Y. Zhang,
“Deep recursive super resolution network with Laplacian Pyramid for better
agricultural pest surveillance and detection,” Computers and Electronics in
Agriculture, Vol. 150, pp. 26–32, July 2018.
[20] F. Wang, R. Wang, C. Xie, J. Zhang, R. Li and L. Liu, “Convolutional neu-
ral network based automatic pest monitoring system using hand-held mobile
image analysis towards non-site-specific wild environment,” Computers and
Electronics in Agriculture, Vol. 187, No. 106268, pp. 1–10, August 2021.
[21] K. Thenmozhi and U. Srinivasulu Reddy, “Crop pest classification based on
deep convolutional neural network and transfer learning,” Computers and
Electronics in Agriculture, Vol. 164, No. 104906, pp. 1–11, September 2019.
Chapter 12
K. S. Ashwini
Coventry University, United Kingdom
CONTENTS
12.1 INTRODUCTION
automating vehicle controls such as the brake, the accelerator, and the steer-
ing. The Advanced Driver Assistance System (ADAS) is a standard feature
in today’s vehicles, which performs advanced operations such as cruise con-
trol, automated braking, lane assist, parking assist, and so on [4]. Level-3
and Level-4 autonomy helps a vehicle to run autonomously on standard
highways, and restricted environments such as university complexes, golf
courses, and industrial parks. Finally, there is Level-5 autonomy where the
system takes over all vehicle controls and requires no human intervention
while driving. The Level-5 vehicles that are currently being designed do not
even have steering or pedals.
The primary objective of the On-board Diagnostics (OBD) system when it
was standardized by SAE in 1979 was to improve in-use emission compli-
ance through the monitoring of the computerized emission control system. In
1988, the California Air Resource Board prepared and implemented the suc-
cessor system, OBD-II. The purpose was to monitor the performance of sen-
sors and actuators affecting the engine emission norms and finally, from
1994 onward, it was applied to all vehicles [5]. Engine monitoring, misfire
warning, fuel system analysis, air conditioning system, etc. were the added
features to monitor the various sub-systems of a vehicle. Most of the moni-
toring aspects of the data collected through the OBD port were indicated
using Malfunction Indicator Lamps (MIL). India’s first official policy, General
Statutory Rule-84, was released in 2009, providing guidelines for Bharat
Standard IV (BSIV)-compliant vehicles [6]. From 2010, all the four-wheelers
in India are mandated by the government to have an OBD port; further,
vehicles manufactured from April 2020 onward must be equipped with the
OBD system as their standard feature in line with Bharat Standard VI [7].
As the vehicles became increasingly complex, this resulted in a huge rise
in the data generation and usage by sensors and actuators. This has increased
the scope for research and data inferences, resulting in the introduction of
new applications which make use of the collected data. Vehicle parameters,
such as acceleration, speed, engine rpm, throttle position and engine load,
have served as critical features in the studies for vehicle and, in particular,
the monitoring of engine health. The analysis of these parameters supplies
information regarding improper gear shifting and speeding. Driving at high
speed at lower gear increases the friction loss [8] and speeding increases the
load on the engine, which leads to increased fuel consumption [9]. The dis-
cussed parameters can also be used to analyze the driver’s behavior. With the
increase in the abundant amount of data and the inferences that are made
from it, every vehicle has become a computer. They can be considered as
mobile nodes when compared to a generic IOT network.
Connected vehicles (CVs) is the concept by which the vehicle can com-
municate bidirectionally with other systems outside of the vehicular sys-
tems, including other vehicles and road infrastructure. CVs have already
been adopted in the market to enable remote and advanced features for
users, along with helping in increasing the safety and quality of vehicle
transportation. Research has confirmed that the network of CVs helps to
Framework for leveraging diagnostic, vehicle data for cybersecurity 183
decrease the number of accidents and the avoidance of road congestion [10].
Vehicles will be equipped with the necessary hardware to achieve Vehicle to
X (V2X) communication, which typically allows a vehicle to communicate
with nodes in its environment, including other vehicles (V2V), the cloud/
network (V2N), the infrastructure (V2I), and pedestrians (V2P) [11]. A
study conducted in 2014 had forecasted that the number of sensors in a
vehicle would reach a total of 400 by 2020 [12]. Vehicle to Sensor (V2S),
V2I, V2N, and V2V systems are studied and wireless efficient solutions are
provided by previous studies [13]. Inter-vehicle co-operation channel esti-
mation (IVC-CE) is one of the methods which will enhance the performance
and support for channel estimation in the case of V2I applications with a
special focus on safety-related applications has been illustrated [14].
Geographically, the North American automotive market currently holds the
largest share of the global connected vehicles, followed by the European
market [15]. With the advancement of such intelligent vehicles, the focus
shifts to sensory networks within the vehicle which can enable efficient
communication.
Through network connectivity, such a vehicular network provides abun-
dant amounts of different types of data from the various sensors of all road
vehicles. The inclusion of advanced sensors in modern vehicles such as depth
cameras, Lidars, Radars, etc., has led to numerous applications using
advanced technologies such as image processing, object detection, feature
extractions, depth calculation, localization, path planning, etc. Artificial
intelligence (AI), machine learning (ML) and deep learning (DL) all play
major roles in future when these sensors become standardized in automotive
systems. The analysis of health conditions, the prediction of failures, behav-
ioral analysis, and the diagnostics of vehicular systems, etc., are the immedi-
ate applications possible through the implementation of AI, ML and DL.
Advancements in automotive features, with increased data flow in a vehi-
cle, also attract the attention of users with negative intentions posing threats
and exploiting the vulnerabilities of the network using cyberattacks. The
training and testing of ML algorithms for simulating and resolving attack
models to achieve secure networks is one of the important steps in the appli-
cation of AI/ML in CV networks [16]. These scenarios provided a necessity
to protect the automotive systems and the data contained in them, giving
rise to the need for cybersecurity. Cybersecurity has become highly promi-
nent due to the continuous increase of vehicle network interconnection and
intellectualization [17].
Cyber-risks of autonomous, connected vehicles have gained a prominent
attention over the past few years as there as various technical vulnerabilities
that have uncovered by security researchers. Cybercriminals can disrupt the
functionalities of vehicular systems such as steering, braking and the engine
by hijacking the Electronic Control Units (ECUs). V2X has opened the pos-
sibility of the vast spectrum of applications, but also has a number of risks
involved in terms of cyberattacks. Involving multiple devices being paired to
the vehicular network, such as a smartphone, network connectivity hardware,
184 Thrilochan Sharma et al.
Table 12.1 O
verview of major standards in design and development of automotive
systems
Standard First release Primary goal
Unifying safety standard for all automotive electrical/
ISO 26262 June 2009
electronic systems [17]
Guidance on the applicable design, verification and
ISO/PAS
Jan 2019 validation measures needed to achieve the safety of the
21448
intended functionality (SOTIF) [18]
Baseline for vehicle manufacturers and suppliers to ensure
ISO/SAE
May 2020 that cybersecurity risk management is done efficiently
21434
and effectively [19]
etc., provides certain gateways for the cybercriminals. Standards play a major
role in the reduction of such risks and maintain uniformity across platforms
in terms of automotive software. ISO and the SAE are primarily responsible
in the design and maintenance of automotive standards. Components such as
cybersecurity risks in road vehicles, functional safety throughout the develop-
ment cycle of vehicles, etc., are defined as per the standards mentioned in
Table 12.1.
These standards are the documents that are taken as reference while auto-
motive electronic systems are being designed, developed, and tested. These
standards help the automotive industry to achieve safety and security, result-
ing in reliable automotive systems.
The drawback of the automotive industry currently is that the market is
predominantly occupied by non-connected vehicles which are incapable of
achieving features of a connected vehicle and benefiting from the communi-
cation network of connected vehicles. The worldwide automotive market
was comprised of around 8% CVs in 2018, a figure which is projected to
rise to 23% by 2023. The Indian CV market is projected to be US$32.5
billion by 2026 from a value of $9.8 billion in 2021 [20]. Such a scenario
creates a number of challenges when a traffic environment is comprised of
both non-connected vehicles and connected vehicles. The application of
converting a non-connected vehicle into an IOT node with additional hard-
ware remains a challenge and has received little research attention. A frame-
work for conversion of a non-connected vehicles into an IOT node is needed
in order to achieve both efficiency and safety.
12.2 FRAMEWORK
The growing population density and traffic conditions demand higher vehic-
ular intelligence in the domain of information and communication technolo-
gies. The implementation of the V2X technology through connected vehicles
has the potential to make road transport both safer and more reliable by
Framework for leveraging diagnostic, vehicle data for cybersecurity 185
Connected vehicles which are equipped with required sensors might help
achieve the above-discussed applications to a high level. But non-connected
vehicles, which are the major occupants of the market, cannot benefit from
the CV network. Using the current framework, our previous research was
performed on four different non-connected vehicles with different drivers
and locations. The inferences that are made from the framework [21, 22]
have been classified into five main categories, as shown in Figure 12.3:
• Anomaly detection
• Driving behavior analysis
• Driving situation analysis
• Driver assistance features
• Environment logging
The feature of anomaly detection uses the data from IMU and the cam-
era sensors of the smartphone for the detection of potholes, as shown in
Figure 12.5(a), whereas the OBD interface data of the car are used for the
analysis of sensor data of the vehicle to extract the speed of the car, the
accelerator pedal position, etc. Accelerometer data perception of pothole
detection in the current approach can be observed in Figure 12.5(a). The
data undergoes filtering and thresholding methods to render negative peaks,
where the vehicle encounters the pothole. A trigger-based system is devel-
oped based on data-driven and image-driven results that are used for vali-
dation. After validation, the location of potholes has been extracted in the
form of longitude and latitude and plotted on a map for representation, as
marked in Figure 12.6. Real-time vehicular data obtained from the OBD
module, such as vehicle speed and accelerator pedal position, shown in
Figure 12.5(b) and (c), are utilized to understand ride quality.
The driving behavior feature has a number of sub-features that can be
further improved by considering precautionary suggestions based on vehicle
parameters on regular routes. Parameters such as catalytic converter, overall
fuel consumption and vehicle speed have been used for this purpose.
190 Thrilochan Sharma et al.
Figure 12.5 (a) Pothole validation through accelerometer data (b) Accelerator
pedal position and speed through potholes (c) Values of speed of
vehicle with respect to pothole presence on the road [21, 22].
Figure 12.7 ( a) Pothole detected through smartphone camera sensor (b) Result
of situational driving analysis [21, 22].
12.4 CONCLUSION
The chapter talks about the overview of automotive electronic systems and
the evolution of OBD to establish the scale of data generated by automo-
biles. The complexity of systems has increased multifold and the possibilities
of applications at scale using the huge amount of data provided by vehicles
has been established. Advanced features such as ADAS, diagnostics, appli-
cations using image processing, etc., are discussed in detail. The proposed
framework conclusively, with the help of the results presented, establishes
Framework for leveraging diagnostic, vehicle data for cybersecurity 193
REFERENCES
CONTENTS
13.1 INTRODUCTION
Figure 13.1 A
rchitectural representation of (a) IoT-based applications (b) 5G
communications.
patch antenna is an ideal choice for such uses. The printed antenna and its
array have been studied in a number of publications.
In literature [3], printed antennas were studied by Carver et al. in both
theoretical and practical terms. Furthermore, Werner et al. [4] study the
progress of using fractal geometry in antenna design. The authors of that
study developed antenna arrays using fractal geometries [4]. In another
study, Al-Sehemi et al. [5] have suggested and fully analyzed a broadband
waterproof antenna based on IoT applications and Ashyap et al. [6] devel-
oped a fabric material laminated C-shaped printed antenna for medical IoT
applications. Cowsigan et al. [7] have presented a SIW cavity-backed printed
antenna for IoT applications and an ESP8266 antenna module for IoT
applications is provided by Roges et al. [8]. As described by Sharma et al.[9],
future wireless applications may well benefit from a six-element MIMO
antenna. In the IoT context, Mushtaq et al. [10] proposed an array of
T-shaped slotted printed antennas. According to Wang et al. [11], a circu-
larly polarized printed meta-material antenna for 5G indoor applications
has been developed. An IoT application-oriented printed antenna that is
5G-enabled has been built and thoroughly tested by De et al. [12] And Singh
et al. [13] introduced a dual-band microstrip patch antenna for 5G applica-
tions based on a SIW antenna structure. In addition, many studies have sug-
gested using an antenna array to enhance parametric outcomes. Wang et al.
[14] introduced a planar array of U-slotted patch antennas. Clover-leaf-
shaped geometries inspired by nature have been published by Kola et al.
[15]. The author has also developed and analyzed a variety of microstrip
patch antenna arrays, such as Christmas- tree, hybrid fractal, and tulip
flower geometries [16–19]. Drawing on this background, this chapter
An array of Fibonacci series-based WB antennas for IoT/5G applications 197
In addition to the advantages mentioned above, the single antenna and the
array have aperture [24, 25] and radiation efficiencies [26–30] of over 63%
and 92%, respectively. At appropriate resonating frequencies, both anten-
nas give more than 30 dB/m correction factors [31] and so have modest
electromagnetic interference effects. As a result of their specifications, both
antennas are appropriate for use in IoT and 5G networks.
kS 1 kS , 1 s 6 (13.1)
and this obtains the scaled geometry B, whose side length becomes k2 which
is presented in Figure 13.2(b). Further, the geometry B is scaled by φ and
obtains the resultant geometry C after the completion of step-2, whose side
length is k3 as shown in Figure 13.2(c). Similarly, the geometries D, E, F and
G have been achieved following the completion of steps-3,4,5,6, and those
are represented in Figure 13.2(d)–(g), respectively. The side length of the
resultant geometries, achieved from steps-3,4,5,6 becomes k4, k5, k6, k7,
respectively. In step-7, all the resultant geometries obtained from the preced-
ing steps are Boolean and they have achieved the Fibonacci square-based
geometry H whose overall side length becomes k7. This is shown in Figure
13.2(h). Further, a structure I is formed by the combination of four arrow
shaped geometries where the arrows make an angle of θ1, θ2, θ3, θ4 with
respect to the generating arrow, as shown in Figure 13.2(i). The length and
width of the thinned arrow geometry are fixed as rL and rW, respectively, as
indicated in Figure 13.2(i). In order for the structure to resonate at the
desired frequency, the geometry I was cut out of each corner of H. After
step-8, we got the one-quadrant Fibonacci square-based slotted structure J,
which is shown in Figure 13.2(j). To produce a symmetric radiation pattern,
the four values of J are positioned in a four-quadrant of the xy-plane and
then overlaid them to form the 2D-symmetric structure K, as shown in
Figure 13.2(k). To make sure that all of the parts of the geometry K are con-
nected, a circle and four semicircles are Boolean with the K. This is how the
final proposed geometry M, shown in Figure 13.2(l), was made. The numeric
values of the used notations are enlisted in Table 13.1.
at the required frequency range. Figure 13.3(a) shows that the radius of
the connecting circle is set at r. The vertical view of the antenna is reflected
in Figure 13.3(b). It is evident from the vertical perspective of the antenna
that the suggested antenna is a single-layered construction. The proposed
structure is simulated in the SONNET EM simulator [22], and, further, the
results are cross-verified by CST microwave studio [23]. Table 13.1 lists all
of the dimensions’ numerical values.
PH 4 k7 mm (13.2)
An array of Fibonacci series-based WB antennas for IoT/5G applications 201
In order to increase the electrical length of J, four slotted based geometry (I)
has been etched from geometry H where the contour length of I is computed
as follows:
PI 4 2 rL rW mm (13.3)
quadrant geometry J
Therefore, the effective contour length of the one-
becomes:
PJ PH PI 4 k7 2 rL rW mm (13.4)
PK 4 PJ mm (13.5)
Also, the geometry K adds one circle and four semicircles, which make the
structure shorter from an electrical point of view. The following equation
shows how to figure out the effective length of the final geometry M’s contours:
PM PK 6 r mm (13.6)
After putting all the parameter values in equations (13.2)–(13.6) and the
computed effective contour length of the final proposed geometry becomes
685.15 mm.
Surface area:
The radiating surface area of the suggested superimposed structure H is
derived as follows:
AH = K7 2 mm2 (13.7)
After subtracting the structure I, the overall area of the one-quadrant struc-
ture J is reduced and it becomes
AJ K7 2 4 rL rW mm2 (13.8)
AK 4 AJ 2 mm2 (13.9)
Further, one circle and four numbers of semi-circles are added with the
geometry K, which improve the surface area of the structure. Therefore, the
overall surface area of the final geometry M is computed as follows:
AM AK 3 r 2 mm2 (13.10)
202 Kalyan Sundar Kola and Anirban Chatterjee
After putting all the parameter values in equations (13.7)–(13.10) and the
computed surface area or the radiating of the final proposed geometry
becomes 16.85 cm2.
13.3 PROPOSED ARRAY
This section explains the proposed power divider, the building of the array,
and the benefits of the Wilkinson power divider network.
ZL jZ0 tan l
Zin Z0 (13.11)
Z0 jZL tan l
An array of Fibonacci series-based WB antennas for IoT/5G applications
Figure 13.4 T
ime domain analysis of the single antenna: (a) side-by-side (b) face-to-face (c) input–output signal (d) impedance (e) S 21
magnitude (f) S 21 phase (g) group delay.
203
204 Kalyan Sundar Kola and Anirban Chatterjee
13.3.2 Development of array
A two-element array, shown in Figure 13.6, has been suggested to enhance
parametric results. It’s a linear array with a 0.5 (R) separation between
the elements. A shared partial ground plane is implemented to accomplish
the broad impedance bandwidth necessary for IoT and 5G applications.
As part of the array’s feed network, the Wilkinson power divider is used.
50Ω–70Ω–50Ω transmission lines make up the network, which sends out
an equal amount of power to all sink ports of the antennas. The 50Ω trans-
mission line’s length and width are set as λ/2 and 2.29 mm, respectively.
The 70Ω transmission line’s length and width are indeed an integer mul-
tiple of λ/4 and 1.31 mm, respectively. As seen in Figure 13.6, a quarter-
wavelength transmission line’s comprehensive description is reflected.
Data about the transmission lines’ dimension notations are presented in
Table 13.2.
using this method. Figure 13.7 shows the results of a performance com-
parison between arrays using standard and Wilkinson feeds [20]. Figures
13.7(a) and (b) show the return-loss characteristics of a standard feed and
its related arrays. Furthermore, the Wilkinson power divider network and its
related arrays’ return loss are shown in Figures 13.7(c) and (d). A Wilkinson
power divider network may be plainly shown to provide a superior return
loss and impedance bandwidth than an array that uses the standard feed.
Table 13.3 displays the parametric results side by side in a tabular manner.
Table 13.3 clearly shows that the Wilkinson power divider-based suggested
array has superior parameters with regard to gain, radiation efficiency, and
other metrics.
206 Kalyan Sundar Kola and Anirban Chatterjee
Figure 13.7 C
omparative performance of array geometries (a) conventional feed,
(b) resultant S 11 of (a), (c) Wilkinson power feed (d) resultant S 11 of (c).
The proposed printed antenna and its array, based on the Fibonacci series
and geared toward IoT/5G applications, have been modeled with the help of
the SONNET EM simulator [22] and cross-verified by the CST microwave
studio [23].
The partial ground plane-based single antenna has resonated in two dif-
ferent frequencies, i.e., 2.40 and 3.60 GHz. It offers a satisfactory return
loss of 32.56 and 19.12 dB, respectively, as depicted in Figure 13.8(a).
An array of Fibonacci series-based WB antennas for IoT/5G applications 207
Figure 13.8 S imulated results of single antenna: (a) S 11 , (b) gain (c) E- and H-field
patterns for 1st resonance (d) E- and H-field patterns for 2nd reso-
nance (e) 3D-radiation pattern of 1st resonance (f) (e) 3D-radiation
pattern of 2nd resonance.
D
ap (13.12)
Dmax
4 Area
Dmax (13.13)
2
where D, Area are indicated as the directivity and overall surface area of the
antenna, and λ is the free-space wavelength.
The overall surface area of the sole antenna is 83.8 × 83.8 mm2 and the
directivity is 5.63 and 7.15 dBi, respectively. As a result, the estimated aper-
ture effectiveness of the antenna becomes 97% for a frequency of 2.40 GHz
and 96% for a frequency of 3.60 GHz.
One of the most essential aspects of an antenna’s electromagnetic impact
is its electromagnetic compatibility (EMC). Using the surface equivalence
technique, the antenna’s correction factor (CF) [31] is determined, and the
CF is then calculated as follows:
EINC 9.73
CF 20 log (13.14)
Vr Ga
where, |EINC|→ incident field strength, |Vr|→ antenna terminal voltage, and
Ga→ antenna’s gain. The single antenna gives the correction factor of 33.57
An array of Fibonacci series-based WB antennas for IoT/5G applications 209
and 35.43 dB/m at two resonating frequencies, and these are widely accept-
able for the desired applications.
With the help of the Fibonacci series-based single antenna, a two-element
array has been proposed and developed to improve parametric outcomes.
Figure 13.9(a) shows that the suggested array has a return loss of 24.82 dB
and 16.70 dB, respectively, at 2.46 and 3.63 GHz. The array also has a large
impedance bandwidth of 1.82 GHz, covering the entire IoT and 5G range.
It can be seen in Figure 13.9(b) that the antenna offers 7.17 and 7.82 dBi
gains, respectively, which are broadly accepted for the intended applica-
tions. In Figure 13.9(c) and (d), the E-and H-fields of the array are described.
One noticeable feature of the array is that the x-pol. suppression is relatively
Figure 13.9 S imulated results of array: (a) S 11 , (b) gain (c) E- and H-field patterns
for 1st resonance (d) E- and H-field patterns for 2nd resonance (e)
3D-radiation pattern of 1st resonance (f) (e) 3D-radiation pattern
of 2nd resonance.
210 Kalyan Sundar Kola and Anirban Chatterjee
shallow, with a value below −29 dBi that is desired and commonly accepted.
Figure 13.9(e) and (f) show that the array provides a steady radiation pat-
tern at the correct frequencies. The antenna array’s simulated outcomes are
enlisted in Table 13.4. The radiation efficiency of the array is shown to be
97% and 93%, respectively. The array’s aperture is 150.7 × 98.3 mm2 and
its directivity is 8.26 and 9.14 dBi. For the two different frequencies of
operation, the array’s aperture efficiency was determined as 75.27% and
63.68%, respectively. The array’s computed CF values are 30.87 and 33.6
dB/m, which are desired. Both antennas can support IoT-based home appli-
cations and 5G communications with acceptable performance parameters.
13.5 CONCLUSION
An array of a couple of printed radiators has been designed and its paramet-
ric behavior has been thoroughly analyzed. The single monopole radiator of
the array is derived from the Fibonacci series based on seven square geome-
tries. A four-fold architecture has been studied in order to generate symmet-
ric radiation patterns at the necessary frequency. The resulting fourfolded
shape was used to etch four numbers of thinned slotted structures, which
provided the necessary resonant properties. The construction incorporates
a partial ground plane with a rectangular slot in order to produce a broad
impedance bandwidth. It has been analysed in the time domain to determine
its signal quality, isolation, group delay, and other characteristics. The single
antenna has a broad impedance bandwidth, strong gain, a shallow cross-pol.
level, and great radiation efficiency. The two-element linear array was cre-
ated to enhance parametric results. The Wilkinson power divider network is
also used to construct its feed and achieve low loss, a wide impedance band-
width, and intense isolation. The array’s parametric findings are likewise
promising. There is considerable potential for IoT-based home applications
and 5G communications using these antennas.
ACKNOWLEDGEMENT
REFERENCES
[1] C.A. Balanis, Antenna Theory: Analysis and Design, Wiley, 1997.
[2] R.L. Haupt, Antenna Arrays: A Computational Approach, Wiley-IEEE Press,
2010.
An array of Fibonacci series-based WB antennas for IoT/5G applications 211
[3] K.R. Carver, and J.W. Mink, “Microstrip Antenna Technology,” IEEE
Transactions on Antennas and Propagation, vol. AP-29(1), pp. 2–24, 1981.
[4] D.H. Werner and S. Ganguly, “An Overview of Fractal Antenna Engineering
Research,” IEEE Antennas and Propagation Magazine, vol. 45(1), pp. 38–57,
2003.
[5] G.A. Abdullah, A.A. Ahmed, T. D. Nikolay, T.A. Nikolay, and L. A. Gabriela,
“Design of a Flexible Waterproof Antenna for Internet of Things Applications,”
Journal of Electromagnetic Waves and Applications, vol. 35(7), pp. 874–887,
2021.
[6] Y.I.A. Adel et al., “C-shaped Antenna Based Artificial Magnetic Conductor
Structure for Wearable IoT Healthcare Devices,” Wireless Networks, vol. 27,
pp. 4967–4985, 2021.
[7] S.P. Cowsigan, D. Saraswady, “Substrate Integrated Waveguide Cavity Backed
Antenna for IoT Applications,” Journal of Ambient Intelligence and Humanized
Computing, pp. 1–6, 2021. doi: 10.1007/s12652-020-02742-0.
[8] R. Roges, and P.K. Malik, “Planar and Printed Antennas for Internet of Things-
enabled Environment: Opportunities and Challenges,” International Journal of
Communication Systems, vol. 34(15), pp. 1–32, 2021.
[9] D. Sharma, B.K. Kanaujia, and S. Kumar, “Compact Multi-standard Planar
MIMO Antenna for IoT/WLAN/Sub-6 GHz/X-band Applications,” Wireless
Networks, vol. 27, pp. 2671–2689, 2021.
[10] A. Mushtaq, A. Rajawat, and S.H. Gupta, “Design of Antenna Array Based
Beam Repositioning for IoT Applications,” Wireless Personal Communications,
vol. 122, pp. 3205–3225, 2022.
[11] Z. Wang, T. Liang, and Y. Dong, “Metamaterial-Based, Compact, Wide Beam-
Width Circularly Polarized Antenna for 5G Indoor Application,” Microwave
and Optical Technology Letters, vol. 63(8), pp. 2171–2178, 2021.
[12] A. De, B. Roy, and A.K. Bhattacharjee, “Miniaturized Dual Band Consumer
Transceiver Antenna for 5G- Enabled IoT- Based Home Applications,”
International Journal of Communication Systems, vol. 34(11), pp. 1–14, 2021.
[13] U. Singh, and R. Mishra, “A Dual- Band High- Gain Substrate Integrated
Waveguide Slot Antenna for 5G Application,” Progress In Electromagnetics
Research C, vol. 119, pp. 191–200, 2022.
[14] H. Wang, X.B. Huang, and D.G. Fang, “A Single Layer Wideband U-Slot
Microstrip Patch Antenna Array,” IEEE Antennas and Wireless Propagation
Letters, vol. 7, pp. 9–12, 2008.
[15] K.S. Kola and A. Chatterjee, “A Two-element Array with Clover-leaf Shaped
Antennas for X-band Applications,” 7th International Conference on Signal
Processing and Integrated Networks (SPIN), Noida, India, pp. 349–354, 2020.
[16] K.S. Kola and A. Chatterjee, “A Linear Array of Christmas- tree Shaped
Antennas for DBS Applications,” International Conference on Computer,
Electrical & Communication Engineering (ICCECE), Kolkata, India, pp. 1–6,
2020.
[17] K. S. Kola and A. Chatterjee, “A Printed Array of High-gain Fractal Antennas
for X-band Applications,” International Conference on Communication,
Computing and Industry 4.0 (C2I4), Bangalore, India, pp. 1–6, 2020.
[18] K. S. Kola and A. Chatterjee, “A 1 x 2 Array of High-gain Radiators for Direct
Broadcast Satellite (DBS) Services under Ku-band,” 8th International Conference
on Signal Processing and Integrated Networks (SPIN), pp. 297–302, 2021.
212 Kalyan Sundar Kola and Anirban Chatterjee
[19] K. S. Kola and A. Chatterjee, “An Array of Tulip-flower Shaped Printed Radiators
for Direct Broadcast Satellite (DBS) Applications,” Advanced Communication
Technologies and Signal Processing (ACTS), vol. 2021, pp. 1–6, 2021.
[20] E.J. Wilkinson, “An N- way Hybrid Power Divider,” IRE Transactions on
Microwave Theory Techniques, vol. 8(1), pp. 116–118, 1960.
[21] E.O. Kreyszig, Advanced Engineering Mathematics, New York, Wiley, 1983.
[22] High Frequency Electromagnetic Software SONNET (v14), North Syracuse,
NY 13212, April, 2013.
[23] CST STUDIO SUITE, (v2018), CST AG, Germany, 2018.
[24] Z. Ma, and A.E. Vandenbosch, “Low-Cost Wideband Microstrip Arrays With
High Aperture Efficiency,” IEEE Transactions on Antennas and Propagation,
vol. 60(6), pp. 3028–3034, 2012.
[25] A. Vosoogh, and P.S. Kildal, “Simple Formula for Aperture Efficiency
Reduction Due to Grating Lobes in Planar Phased Arrays,” IEEE Transactions
on Antennas and Propagation, vol. 64(6), pp. 2263–2269, 2016.
[26] E.H. Newman, P. Bohley, and C.H. Walter, “Two Methods for the Measurement
of Antenna Efficiency,” IEEE Transactions on Antennas and Propagation, vol.
AP-23(4), pp. 457–461, 1975.
[27] D.M. Pozar, and B. Kaufman, “Comparison of Three Methods for the
Measurement of Printed Antenna Efficiency,” IEEE Transactions on Antennas
and Propagation, vol. 36(1), pp. 136–139, 1988.
[28] G.S. Smith, “An Analysis of the Wheeler Method for Measuring the Radiating
Efficiency of Antennas,” IEEE Transactions on Antennas and Propagation, vol.
25(4), pp. 552–556, 1997.
[29] R. Chair, K.M. Luk, and K.F. Lee, “Radiation Efficiency Analysis on Small
Antenna by Wheeler Cap Method,” Microwave and Optical Technology
Letters, vol. 33(2), pp. 112–113, 2002.
[30] M.A. Moharram, and A.A. Kishk, “MIMO Antennas Efficiency Measurement
Using Wheeler Caps,” IEEE Transactions on Antennas and Propagation, vol.
64(3), pp. 1115–1120, 2016.
[31] C.R. Paul, Introduction to Electromagnetic Compatibility, 2nd edition, Wiley,
2006.
Chapter 14
CONTENTS
14.1 INTRODUCTION
Dental anatomy speaks about the structure of the tooth, its appearance and
how it is classified. If the subject concerns the structure and categories of the
tooth, then this is described as macroscopic anatomy. The portion above the
enamel junction is called the realm and is the crown of the tooth. This crown
appears clearly if an eruption occurs. There can be either one or many roots
in a single tooth.
In light of present-day eating habits, most of us are prone to dental dis-
eases [24]. This is to the result of poor healthcare, low standards of living,
unhygienic conditions and practices, and the use of drugs, tobacco and alco-
hol. In most situations, however, these diseases could be prevented if regu-
larly monitored. The monitoring of these diseases can also play a vital role
in controlling diabetes and also cerebrovascular and cardiovascular
diseases.
Deep learning is widely used for object classification mainly when large
data sets are involved. Algorithms such as CNN and RNN are used to pre-
dict diseases related to tooth using various forms of images [5].
Tooth loss normally occurs for baby teeth; once they are replaced by
human adult teeth the possibility of tooth loss due to some disease is much
reduced. Sometimes this will occur as a result of diseases such as dental
avulsion, cavities, and gum disease. Tooth plaque is a sticky layer of bacte-
rium that forms on teeth when we eat or drink. During this process, bacteria
transforms the food into acids, which we term tooth plaque. The acids
which are formed during this process destroy enamel.
Fluorosis is caused when teeth are overexposed to Halide (Halogen ion)
[6]. This condition normally takes place during the initial eight years of
childhood. It’s a serious condition which affects the teeth. The normal result
is that the teeth will lose color as a result. Periodontal Disease is to the result
of poor oral hygiene. This leads to infection in the gums and affects the bone
of the jaw. This can be stopped. In serious cases, it leads to tooth loss. This,
in turn, can lead to respiratory issues [23]. Professionals may even perform
surgeries in the most serious cases. If not treated, dental diseases can lead to
heart disease, stroke, diabetes, some cancers, Alzheimer’s, osteoporosis and
even some metastatic diseases.
“You Only Look Once” (YOLO) is used by [25] for object detection.
Deep learning algorithms which use object detection are as follows. One is
based on classification and the other on regression. The occurrence of objects
show up more often when the region of interest is identified which is proven
in the classification algorithm [27]. When CNN is applied on the region of
interest, the chances of object occurrence are high [25].
In this the detector must be run each time in the region of interest and this
slows down the computation. This is a major drawback of this algorithm.
Examples of such algorithms are R-CNN. The regression-based algorithms
are faster when compared to this. In this algorithm, there is no choice of
attention-grabbing ROI among the images [27]. Here, it considers the entire
image and identifies the bounding boxes, thereby predicting the classes to
which they belong. YOLO is one such regression- based algorithm. The
YOLO detector is extraordinarily quick, hence its use in many applications,
such as self-driving cars and others where period object detection is needed
[25]. This chapter applies YOLO to identify the various tooth-related disor-
ders. It is structured as follows. Section 14.2 presents the literature review of
our work. Section 14.3 explains the methodology used in predicting the vari-
ous tooth diseases using YOLO. In Section 14.4, the results are discussed.
Finally, in Section 14.5 we give our conclusion and outline future work.
Deep learning IoT platform for dental disease detection 215
14.2 LITERATURE SURVEY
A literature survey or review is the section which shows the varied [1] analy-
sis and research made within the field of our interest. In [22] author classi-
fied dental diseases using Convolutional Neural Networks. Diseases such as
periapical infection, periodontitis and cavity were considered [21]. In order
to obtain improved accuracy, transfer learning with a VGG16 pre-trained
model is used. Training and testing was carried ot on 251 RVG x-ray images.
A general accuracy of 88.46% was achieved. The limitations of this work
are that: For training purposes, the system requires large labelled data sets;
only when transfer learning was applied was an increase in accuracy identi-
fied; only x-ray images were used for classification of diseases; the length of
the prediction time was not addressed; finally, the system seems to be more
appropriate for use in a laboratory setting rather than being a suitable prod-
uct for ordinary people [2].
The classification of skin was done using traditional methods wherein
features were extracted manually. Later, in [18] the authors have applied
CNN to extract features. The advantage of deep nets is that they need lesser
pre-processing when compared with traditional methods [7]. Traditional
methods have used various clustering techniques and Support Vector
Machine for feature extraction. By contrast, better architectures such as
deep nets have the ability to analyse images better.
Research has shown that only a comparatively small proportion of those
people with tooth problems such as decay and fluorosis and so on visit a
dentist. This is because of the lack of awareness among the population [31].
Hence awareness programs regarding oral health have to be conducted at
regular intervals for the early diagnosis of diseases and the prevention of
dental problems. Deep Convolution Neural Networks (CNN) were applied
to medical problems with an input data size of over 10,000 images, which
require [11] higher cognitive process. They were able to achieve an efficiency
of 84%. Exploiting network cascades is a general task in the multitasking
environment. The authors have shown that [4] these networks are fast and
accurate during segmentation. Another framework was introduced for
detecting objects deep [32] in the network. This framework is completely
different from bounding box or sliding windows. Here, the corner point and
the middle point are linked to the detection of objects. Hence, scale or ratio
variation will not have any effect on this system.
IoT could be used for faster and cheaper [14] innovations for customers
in healthcare. Diagnosis and location of intervertebral discs was done using
filets and stacked autoencoders [16]. The data set for validation contained
102 images. Features were extracted using unsupervised learning techniques
and the results, when compared, were reasonably good. Studies have shown
that people with diabetes [19] and those with high levels of glycaemia are at
a higher risk of being diagnosed with periodontitis. Other diseases, like car-
diovascular and macrovascular complications, could also arise in patients
216 Sindhu P. Menon et al
with periodontitis. The Retinex algorithm was used [20] to scan the image
in order to study the serology of an infection caused by pathogens. Various
regression techniques were used in [29] to extract features to diagnose AD/
MCI through neuroimaging. Dimensionality was a major problem in this
approach. To overcome this issue, regression methods were used for feature
selection, thereby reducing the dimensionality.
A survey was conducted by researchers in [30] where they have listed the
various opportunities and research issues present in healthcare. A frame-
work was used in [33] to demonstrate the optimization of general purpose
algorithms. The authors have compared the various NFL theorems, to show
how they underperform when the data set is small. AIDS patients generally
have a low count of CD4 lymphocyte. Such patients are more prone to IRIS
if they have had [10] an infection and have undergone treatment for the
same. Such patients can be given treatment before HAART is initiated.
14.3 SUGGESTED DESIGN
The objective of this work is to train the images using YOLO3, to identify
the tooth and the type of image (Figure 14.1) and then, later, to classify it
into a proper class. The end product will be an app stored on the smartphone
or tablet. YOLO is designed in such a way that at a time it will try to focus
on each and every object which is available inside the images. In the faster
R-CNN [10] family we try to send a feature which we will extract from the
CNN and we will append the feature map with our proposed region.
Suppose there is an input image (Figure 14.4). We will try to send the
input image with multiple objects in a pre-trained network (CNN). After
sending the data it will try to give you different feature maps from different
layers and send them into forward connection. Based on the previous fea-
ture map, we extract different objects in an input image.
The entire image will be split into grids (SxS) (Figure 14.2) where every
box will have its own centre point (centroid). With respect to every box we
are going to have two bounding boxes, which can have both vertical and
horizontal coordinates (X,Y).
With respect to the image in Figure 14.2, we have a single class where
every bounding box will have a width (W), a height (H) and confidence (C).
The model [34] then calculates the class score of class in each grid, leading
to the output of each grid being 5 × 1; which means 5 is the number of
classes and 1 is the grid. For each bounding box in each grid the process is
repeated, leading this way class confidence of all 98 (7(X-axis) × 7(X-axis)
× 2(1 + 1 1 on the X-axis and the Y-axis) grids in the image is generated.
Whenever the algorithm performs the first label of operation then it will
be able to get the bounding boxes in the first layer. We then have to set the
threshold for bounding boxes for the sum of the class as in Figure 14.3. If
the result is less than the set threshold, then it chooses the next layer, and all
the scores will be arranged in descending order [the Higher the confidence-
First it comes [9]. YOLO uses NMS(Non maximal suppression algorithm).
This eliminates all the unnecessary bounding boxes and keeps the boxes
which are required and then it sets scores to zero for the redundant box.
In every bounding box we have 1-Class decay. The algorithm tries to
extract confidence of decay of each and every bounding box (Figure 14.6)
and it then takes the confidence score from each and every bounding box1
218 Sindhu P. Menon et al
class i.e decay and arranges it in descending order. After arranging the boxes,
it compares the top 2 scores as in Figure 14.5.
The comparison can be made by the equation given below
After evaluating all the bounding box scores, the value which is most accu-
rate will be mapped and the output will be predicted. The classes included
for training are fluorosis, decay, oral thrush, chipped tooth and fillings. For
training of the model on Dental images [21], a pre-trained YOLO model,
Deep learning IoT platform for dental disease detection 219
Figure 14.6 System network architecture for smart dental health SaaS system.
220 Sindhu P. Menon et al
trained on the COCA and VOC data set, is used to improve the accuracy in
achieving multi-object detection.
Optimizer Initialization: For the case study, an Adam Optimizer is being
used. Adam is efficient when working with large problems which have many
features. The combination of ‘gradient descent with momentum’ algorithm
and the ‘RMSP’ algorithm results in this optimizer [1].
Warm-up steps are performed as it helps the network to slowly adapt to
the data. However, theoretically, the main reason for warm-up steps is to
allow adaptive optimizers (e.g. Adam, RMSProp, …) to compute correct
statistics of the gradients.
Three layers encompass the network architecture of the Smart Dental
Health SaaS system shown in Figure 14.7
The outermost layer is the service layer, which coordinates with the regis-
tered dentists, healthcare centers, health providers and product suppliers.
These centers provide attractive offers and attract customers through their
infrastructure and technology.
This architecture helps in building positive loops with patients. This can
be accomplished by managing the patients’ data, recognize groups of
patients who have shown considerable improvement in health conditions
and informing them of the same, thereby creating a positive environment.
The core layer is called Smart Dental Service Layer, where the analysis
results of dental symptoms are obtained by data processing [2, 28].
The middleware acts as an intermediate layer for the API. The API inter-
acts with the middleware. All user request and logic support are provided by
the cloud APIs.
The images are captured using a high-end camera or mobile. These devices
do the local computing and display results to the end user through 3G, 4G
or Wi-Fi networks. The service layer assists users in checking the health
condition of their tooth. The data captured by these devices is fed to the
service layer. YOLO algorithm is then applied on these images to identify the
area of infection, if any. If the service layer confirms any defect in the tooth,
then medical advice may have to be taken. The dental images are stored
using Mongo database. The flow of services is shown in Figure 14.10. The
application has three layers: the input layer, the service layer and the client
layer.
HTTP service is accomplished using allocation and scheduling resources
through load-balancing techniques. It also helps in implementing the con-
nections between the algorithms and the cloud. The logical flow diagram is
shown in Figure 14.7.
Steps in the flow diagram are:
ay, aw, and ah. (tx, ty) represents [28] the coordinates of the upper-
left corner of the current grid offset from the upper-left corner of the
image and it is the distance, with pw, ph representing the width and
height of the prior box (prior). During training, a sum of squared er-
ror loss is used. True value by said gradient is the true value minus the
predicted value. YOLO uses logistic regression to predict a score for
each bounding box. The algorithm only matches an optimal prior box
for each truth value.
2. Multi-label prediction
Each bounding box may contain multiple types of objects, that is,
multi-label prediction. So logistic (sigmoid) is used instead of Soft-
Max, because SoftMax indicates that each box has only one type of
object, and sigmoid can predict multi-label classification. In fact, a
[35] sigmoid classifier is applied to the results of each classification
calculation in logits to determine whether the sample belongs to a
certain category. During training, a binary cross-entropy loss function
is used for class prediction [13].
3. Combine the characteristics of different convolution layers to extract
more fine-grained information and make multi-scale predictions
YOLO uses three different scales to predict the boxes. The network
uses a similar feature pyramid concept to extract features from differ-
ent scales. Several new convolution layers will be added to the original
basic feature extractor. Finally, a 3-dimensional tensor will be used
to represent the bounding box, objectness, and class predictions. The
next step is to predict 3 boxes, so the tensor is N * N * [3* (4 + 1 +
80)]. This represents 80 class predictions,1 objectness prediction and
4 bounding boxes. Then we retrieve a feature set from the previous
network and merge it with the up sampled features. The objective is
to get an approximation of what would have been obtained if it was
done at a higher rate. The next step is to append some additional con-
volutional layers so that an alike tensor could be produced by process-
ing this feature map. Repeat this process to predict the size of the final
box. In the past, YOLO had difficulty in predicting small objects, but
now it has improved significantly through multi-scale prediction.
4. Network structure (DarkNet53 = Darknet19 + ResNet)
Combine the residual thought to extract deeper semantic information.
Continuous 3 × 3 and 1 × 1 convolutional layers are still used. Predic-
tion will be performed on three different scales by up sampling. For
example, the 8 * 8 feature map up sampling and the 16 * 16 feature
maps are added and calculated again, so that smaller objects can be
predicted. A convolutional layer with a step size of 2 is used instead
of the pooling layer because the pooling layer will lose information.
5. Predict more targets
YOLO still uses k-means clustering to determine template boxes and
predict 9 bounding boxes for each grid, which can improve recall.
Deep learning IoT platform for dental disease detection 223
6. Loss function
Following the reference from [24], performance can be improved if we
add pre-trained convolutional networks. Input resolution is increased
to 448*448 from 224*224. This is done because visual images which
are fed should be fine-grained so that object detection becomes ac-
curate. The network consists of four convolution layers, two of which
are fully connected with weights initialized at random. The next step
is to compress the values in between 0 and 1. This can be achieved by
normalizing the width and height of the bounding box image. Next
parameterize the bounding box x and y coordinates to be the offsets of
a particular grid cell location so they are also bounded between 0 and
1. Leaky rectified linear activation function is applied on the interme-
diate layers and a linear activation function is used for the final layer.
x, if x 0
x
0.1x, otherwise
The next step is to get an optimum model by finding out the sum of squared
error Figure 14.8. This results in zero confidence score and high loss [15].
In order to reduce the loss, we use two parameters, λcoord and λnoobj. These
parameters are used to determine the error based on the deviations. If the
deviations are large, they cause greater effect in small boxes rather than the
large ones. To overcome this, the square root of the bounding boxes height
and width are considered instead of using them directly.
n2 M
C C^ 2
1 C C
2
obj obj
1 ^
ij
i i
noobj ij i i
x 0 y 0 i 0 j 0
s2
1 p c p c
2
obj
ij i ^i
i 0 cClasses
During the training phase, for each grid cell, the algorithm predicts a
number of bounding boxes. Each object is overlooked by one predictor dur-
ing the training phase. This predictor later predicts the objects based on
IOU. The one which has the highest IOU w.r.t ground truth will be the pre-
diction. With this the predictors get specialized. The overall recall starts
improving as predictions are able to predict the aspect ratios, sizes or vari-
ous classes of objects better. The assumptions made during training are as
follows. The object which is in cell i is denoted as 1obj
ij . It also says that the
prediction is due to the jth bounding box present in cell i. Another fact
observed here is that the penalization of classification error happens by the
log function only if the grid cell contains that particular object. In the case
that the predictor has the greatest IOU of any grid cell, then the bounding
box coordinate gets penalized.
The basic network model is Google Net, but instead of using the inception
module, we have used 1 * 1 and 3 * 3 convolutional layers alternately.
Convolutional layer extracts features from the fully connected layer, a total
of 24 convolutional layers, 2 fully connected layers.
The network consists of 24-Convolutional + 2 fully connected layers [35].
Sub-network: This is a pre-trained classification network, the input image
size is 224 * 224. It contains first 20 convolutional layers + 1 global average
pooling + 1 fully connected. Sub-network: The second one is a target detec-
tion network, the input image size is 448 * 448. Loss function (square sum
loss function) including 4 parts: box center position x, y loss + box width
and height w, h loss + confidence loss + classification loss.
Deep learning IoT platform for dental disease detection 225
YOLO advantages
• High speed. Seen as a regression problem, no complicated pipeline is
needed. Have a global understanding of the image.
• Other than RCNN, the features of the whole image is considered to
predict the bounding box, instead of RCNN, only the features of the
candidate bounding box can be used to predict the box.
bx t x cx (14.1)
by t y cxy (14.2)
bw = pw etw. (14.3)
bh = pheth (14.4)
prior overlaps a ground truth object by more than any other bounding box
prior. The cluster centroids can be used to estimate the width and height of
the box.
The sigmoidal function is used to predict the centre coordinates of the
box relative to the location of the filter. The value of threshold is 0.5. Each
ground truth object is assigned one bounding box prior. Sometimes there
will be no loss incurred if the assignment between bounding box prior and
ground truth doesn’t happen.
Bounding boxes (Figure 14.10) are boxes that are imaginary boxes. They
are around the objects checked for collision. There are two types of coordi-
nate systems, a 2D coordinate system and a 3D coordinate system, that are
used to detect objects. In Figure 14.10, the square boxes represent the
bounding boxes which, in turn, show the affected disease part of the tooth.
The accuracy of the prediction is also shown along with the bounding boxes.
In Figure 14.13, the digits along with the bounding boxes 0.90, 0.88, 0.72,
0.89 etc. represents accuracy of 90%, 88%, 72% and 89%
The predicted model gives the results with predicting bounding boxes
with accuracy mentioned over it. Diseases like fluorosis, chipped tooth,
tooth decay, oral thrush and fillings are predicted by the proposed system. If
the value of the bounding box is 0.9 then this says that it is 90% accurate.
228 Sindhu P. Menon et al
14.5.1 Performance measure
The metrics used for calculation of performance measures are IoU and
Precision and Recall. The same is illustrated in Figure 14.17.
calculate the precision and recall values of the algorithm for different values
of threshold. We then use those values to plot a graph. In Figure 14.17, the
blue curve is the best for our proposed system.
In Figures 14.17–14.18, the curve of Precision and Recall is drawn. We
have obtained mAP (mean Average Precision) of the respective diseases. It is
evident that the mAP value is maximum for three diseases i.e. oral thrush,
chipped tooth, fillings is about 99.5% and fluorosis is of 99.1% and tooth
decay is of 99.3% respectively.
The higher the mAP value the greater the accuracy in respective disease
prediction. We can conclude that the average mAP value of all diseases is
about 99.4%.
An 80% confidence interval means that we are confident at 80% that the
real value is in the specified interval. Large samples output mean with more
precision when compared with smaller data. As a result, when a large sam-
ple is taken, the confidence could be smaller. As we increase the threshold of
confidence the precision will go up (Figure 14.19). The average confidence
of all the classes in the above graph is 86% at 1.0.
Using the F1 score curve shown in Figure 14.20, the balance between
precision and recall can be visualized and a design point can be deter-
mined using a curve graph. The F1 curve shows that optimal value for
precision and recall is obtained when confidence is 0.506. We would want
our model to have cases which have higher confidence value. The maxi-
mum value of F1 occurs at 0.81. Hence it is ideal to select confidence of
0.79 as it results in F1 value of 0.8 which is pretty close to the maximum
F1 value.
230 Sindhu P. Menon et al
(x, y) (x, y)-axis coordinates of the bounding box center, and the width and
height of the box, as shown in the histogram in Figure 14.21.
14.5.3.3 Metrics analysis
The graphs in Figures 14.22–14.24 show the performance of each metric of
the YOLO algorithm.
Recall: This parameter indicates the number of correct instances that
were [26] obtained.
Deep learning IoT platform for dental disease detection 233
Figure 14.21 Different graph plotting for bounding boxes.
234 Sindhu P. Menon et al
AP pr re dr
0
(14.5)
The x-axis represents the epochs count and the y-axis represents the
respective metric values evaluated during the training of the data set.
Deep learning IoT platform for dental disease detection 235
The recall, precision and mAP gradually increase with the increase in epochs
count. It further leads to an increase in the accuracy of the overall model.
14.6 CONCLUSION
REFERENCES
18. Pang Z, Chen Q, Tian J, Zheng L, Dubrova E, “Ecosystem analysis in the design
of open platform-based in-home healthcare terminals towards the internet-of-
things. In 2013 15th international conference on advanced communications
technology (ICACT), IEEE, pp. 529–534, Jan 27, 2013.
19. Preshaw PM, Alba AL, Herrera D, Jepsen S, Konstantinidis A, Makrilakis K,
Taylor R,“Periodontitis and diabetes: a two-way relationship,”Diabetologia, vol.
55, no.1, pp. 21–31, 2012. https://dx.doi.org/10.1007%2Fs00125-011-2342-y.
20. Provenzi E, De Carli L, Rizzi A, Marini D, “Mathematical definition and analy-
sis of the Retinex algorithm,” JOSA A., vol. 22, no. 12, pp. 2613–2621, 2005.
21. Prajapati SA, Nagaraj R and Mitra S, “Classification of dental diseases
using CNN and transfer learning,” In 2017 5th International Symposium on
Computational and Business Intelligence (ISCBI), IEEE, pp. 70–74, Aug, 2017.
22. Prajapati SA, Nagaraj R, Mitra S, “Classification of dental diseases using CNN
and transfer learning,” In 2017 5th International Symposium on Computational
and Business Intelligence (ISCBI), IEEE, pp. 70–74, Aug 11, 2017.
23. Pussinen PJ, Jousilahti P, Alfthan G, Palosuo T, Asikainen S, Salomaa V,
“Antibodies to periodontal pathogens are associated with coronary heart dis-
ease,” Arteriosclerosis, Thrombosis, and Vascular Biology, vol. 23, no.7, pp.
1250–1254, 2003. http://dx.doi.org/10.1161/01.ATV.0000072969.71452.87.
24. Ren S, He K, Girshick R, Zhang X, Sun J, “Object detection networks on
convolutional feature maps,” IEEE Transactions On Pattern Analysis and
Machine Intelligence, Aug 17, vol. 39, no. 7, pp. 1476–1481, 2016. http://
dx.doi.org/10.1109/TPAMI.2016.2601099.
25. robocademy.com
26. Sathya, B. and Neelaveni, R., “Transfer learning based automatic human iden-
tification using dental traits-an aid to forensic odontology,” Journal of Forensic
and Legal Medicine, 76, pp. 102066, 2020. http://dx.doi.org/10.1016/j.
jflm.2020.102066.
27. Smys, S., Tavares, J.M.R.S., Balas, V.E. and Iliyasu, A.M., “Computational
Vision and Bio-Inspired Computing,” 2019.
28. southern-sweepers.com.
29. Suk HI, Lee SW, Shen D, “Deep sparse multi-task learning for feature selection
in Alzheimer’s disease diagnosis,” Brain Structure and Function, vol. 221, no.
5, pp. 2569–2587, 2016. http://doi:10.1007/s00429-015-1059-y.
30. Sundaravadivel P, Kougianos E, Mohanty SP, Ganapathiraju MK, “Everything
you wanted to know about smart health care: Evaluating the different tech-
nologies and components of the internet of things for better health,” IEEE
Consumer Electronics Magazine, Dec 13, vol. 7, no. 1, pp. 18–28, 2017. https://
doi.org/10.1109/MCE.2017.2755378.
31. Varghese CM, Jesija JS, Prasad JH, Pricilla RA, “Prevalence of oral diseases
and risks to oral health in an urban community aged above 14 year,” Indian
Journal of Dental Research, 2019, vol. 30, no.6, pp.844, http://doi:10.4103/
ijdr.IJDR_42_18.
32. Wang X, Chen K, Huang Z, Yao C, Liu W, “Point linking network for object
detection,” arXiv preprint arXiv:1706.03646. Jun 12, 2017.
33. Wolpert DH, Macready WG, “No free lunch theorems for optimization,” IEEE
Transactions On Evolutionary Computation, vol. 1, no. 1, pp. 67–82, 1997.
http://doi.org.10.1109/4235.585893.
238 Sindhu P. Menon et al
34. Almalki, YE, Din, AI, Ramzan, M, Irfan, M, Aamir, KM, Almalki, A, Alotaibi,
S, Alaglan, G, Alshamrani, HA, Rahman, S, “Deep learning models for clas-
sification of dental diseases using orthopantomography X-ray OPG images”,
Sensors, vol. 22, no. 19, p. 7370, 2022.
35. Zhao, K. and Ren, X., “May. Small aircraft detection in remote sensing
images based on YOLOv3”, IOP Conference Series: Materials Science and
Engineering, vol. 53, no. 1, pp. 012056, IOP Publishing, 2013.
Index
239
240 Index
Deep learning (DL), 121, 154, 170, 172, Industrial AI, 13, 28, 29, 30, 34
174, 183, 214 Industry 4.0, 1, 16–19, 21–26, 28, 34,
Degree of freedom (DOF), 103, 156, 54–57, 59, 60, 62, 63
159–161, 164, 167 India, 93, 95, 108, 114, 148, 182, 185
Denial of Service (DoS), 68, 70, 72, Information Technology (IT), 16, 37,
74, 77 47, 48, 98, 170
Density-Based Spatial Clustering of Integrated circuit (IC), 144
Applications with Noise, 119 International Telecommunication Union
Diabetes Mellitus (DM), 115, 124 (ITU), 96
Diagnostics, 183, 186, 188, 192 Internet of Manufacturing Services
Diagnostic trouble codes (DTCs), 186 (IoMs), 21
Digital production, 19 Internet of Medical Things, 122
Distributed Denial of Service, 68, 77 Internet of People (IoP), 21
Internet of Vehicles, 9, 38
Edge Computing, 1, 6–8, 37–43, 45–50, Intersection Over Union (IOU), 228
158 Interworking Proxy Entities (IPE), 5
Edge Security, 46 IPv4, 3
Electrocardiograms (ECGs), 122 IPv6, 3, 74, 76
Electrooculograms (EOGs), 122 IRIS, 216
Electroencephalograms (EEGs), 122
Electroglottographs (EGGs), 122 Japan, 27, 55, 143
Electromagnetic compatibility (EMC),
208 Kappa, 118
Electromyograms (EMGs), 122 Kidney disease, 125
Electronic Control Unit (ECU), 68, 183 k-means clustering, 119, 222
Embedded systems, 40, 53, 93 k-Nearest Neighbour, 118
Ensemble learning, 173
ESP8266, 145, 146, 196 Latency, 7–9, 38, 41, 42, 44, 47
Event–Condition–Action (ECA), Legged Robots, 156
139–141 Light Dependent Resistor (LDR), 144
Local area network (LAN), 41, 42
Fibonacci, 197, 198, 199, 206, 209, 210 Loss function, 222–224
Fifth Generation, 27 Low Power and Lossy Networks (RPL),
Fog computing, 1, 6–8, 10, 37, 43, 70
44, 49 Long short-term memory (LSTM), 173
Fractal, 196 Long-Term Evolution (LTE), 195
Fused deposition modeling (FDM), 24
FUSION, 120, 126, 167 MAC, 3
F1 Score, 118, 229 Machine Learning (ML), 28, 47, 81,
113, 115, 116, 143, 170, 174,
GitHub, 68 183
Glomerular Filtration Rate, 125 Magnetic Resonance Imaging (MRI),
116
Healthcare, 8, 9, 47, 61, 113–116, 122, MANET, 76
124, 127, 174, 213, 215, 216, Manipulators, 156, 157, 160, 162
220 MATLAB, 164
HTTP, 70, 76, 77 Message Queue Telemetry Transport
Hybrid Robot, 157 (MQTT), 3, 70
Mobile edge computing (MEC), 8, 39
IEEE, 3, 74
Industrial Revolution, 14, 15, 16 Near-Field Communication (NFC), 96
Industrial wireless protocols, 25 Network Layer, 4, 68–70, 76, 78, 79, 81
Index 241