• List of Articles IoT

      • Open Access Article

        1 - Safe Use of the Internet of Things for Privacy Enhancing
        Hojatallah Hamidi
        New technologies and their uses have always had complex economic, social, cultural, and legal implications, with accompanying concerns about negative consequences. So it will probably be with the IoT and their use of data and attendant location privacy concerns. It must More
        New technologies and their uses have always had complex economic, social, cultural, and legal implications, with accompanying concerns about negative consequences. So it will probably be with the IoT and their use of data and attendant location privacy concerns. It must be recognized that management and control of information privacy may not be sufficient according to traditional user and public preferences. Society may need to balance the benefits of increased capabilities and efficiencies of the IoT against a possibly inevitably increased visibility into everyday business processes and personal activities. Much as people have come to accept increased sharing of personal information on the Web in exchange for better shopping experiences and other advantages, they may be willing to accept increased prevalence and reduced privacy of information. Because information is a large component of IoT information, and concerns about its privacy are critical to widespread adoption and confidence, privacy issues must be effectively addressed. The purpose of this paper is which looks at five phases of information flow, involving sensing, identification, storage, processing, and sharing of this information in technical, social, and legal contexts, in the IoT and three areas of privacy controls that may be considered to manage those flows, will be helpful to practitioners and researchers when evaluating the issues involved as the technology advances. Manuscript profile
      • Open Access Article

        2 - Energy Efficient Routing-Based Clustering Protocol Using Computational Intelligence Algorithms in Sensor-Based IoT
        Mohammad sedighimanesh Hessam  Zandhessami Mahmood  Alborzi Mohammadsadegh  Khayyatian
        Background: The main limitation of wireless IoT sensor-based networks is their energy resource, which cannot be charged or replaced because, in most applications, these sensors are usually applied in places where they are not accessible or rechargeable. Objective: The p More
        Background: The main limitation of wireless IoT sensor-based networks is their energy resource, which cannot be charged or replaced because, in most applications, these sensors are usually applied in places where they are not accessible or rechargeable. Objective: The present article's main objective is to assist in improving energy consumption in the sensor-based IoT network and thus increase the network’s lifetime. Cluster heads are used to send data to the base station. Methods: In the present paper, the type-1 fuzzy algorithm is employed to select cluster heads, and the type-2 fuzzy algorithm is used for routing between cluster heads to the base station. After selecting the cluster head using the type-1 fuzzy algorithm, the normal nodes become the members of the cluster heads and send their data to the cluster head, and then the cluster heads transfer the collected data to the main station through the path which has been determined by the type-2 fuzzy algorithm. Results: The proposed algorithm was implemented using MATLAB simulator and compared with LEACH, DEC, and DEEC protocols. The simulation results suggest that the proposed protocol among the mentioned algorithms increases the network’s lifetime in homogeneous and heterogeneous environments. Conclusion: Due to the energy limitation in sensor-based IoT networks and the impossibility of recharging the sensors in most applications, the use of computational intelligence techniques in the design and implementation of these algorithms considerably contributes to the reduction of energy consumption and ultimately the increase in network’s lifetime. Manuscript profile
      • Open Access Article

        3 - Investigation of Various Fields of the Iranian Industry Applicability to Advance the Fourth Industrial Revolution Based on the Internet of Things
        Sadegh Abdolabadi Mohammad Mehdi Movahedi
        The purpose of this study is to investigate industry 4.0 advancement in various application areas of Iranian industry using Internet of Things -based achievements and technologies. In this research, 112 articles were studied by searching for specialized keywords related More
        The purpose of this study is to investigate industry 4.0 advancement in various application areas of Iranian industry using Internet of Things -based achievements and technologies. In this research, 112 articles were studied by searching for specialized keywords related to the topic and using valid research sources. In the following, 88 abstracts of articles related to Internet of Things applications were reviewed. In the review we finally made up the 32 title of our article on the subject literature. According to the subject literature, various applications of iot were extracted and categorized in a table; Then, by forming a target group of experts and designing a paired comparative questionnaire for the AHP method and using Expert Choice software, the results showed that according to infrastructure criteria, financial support, senior management support, training training, firmware availability., Communication Security, Expertise and Desire for Innovation, Intelligent Manufacturing Including Automotive Industry, Intelligent Industrial Control and Manufacturing, Supply Chain Management and Support, Smart Networks, Intelligent Logistics, Intelligent Manufacturing Services and Processes, etc. Industry 4.0 with Internet of Things technology. There is also a low level of environmental and recycling usability that requires senior managers to support Internet of Things technology transfer strategies, the use of Internet of Things specialists, and the financial support of upstream managers to leverage the Internet of Things -compliant infrastructure. This area will pave the way for industry 4.0. Manuscript profile
      • Open Access Article

        4 - A study of the nature of private data in the performance mechanism of IoT technology tools
        hosein sadeghi Mahdi  Naser
        The invention of Internet of Things technology and its application has led to the development of industry and trade in countries. Tools that include Internet of Things technology are tools that enable simulation of human performance by tools by embedding multiple stimul More
        The invention of Internet of Things technology and its application has led to the development of industry and trade in countries. Tools that include Internet of Things technology are tools that enable simulation of human performance by tools by embedding multiple stimuli and sensors. But the mechanism of action of these tools has challenges in maintaining the security of private information. The first issue in this regard is the necessity of nature and separation of private data of the non-private type. In the Iranian legal system, the only legal document in this field is Article 58 of Electronic Commerce Law, and the ambiguous text of this article has challenged the identification of this type of data. In this article, for an unknown reason, by separating the types of private data, not only has nature of this data been disrupted, but only a specific category of this data has been subject to the terms of the article for processing and no other provisions have been established. Is. However, in European Union, there are relatively comprehensive regulations in field of identifying the nature of private data, four criteria of identification based on the nature of the data processed, the purposes of using the processed data, concept of nicknamed data and Encrypted data exchanged in decentralized platforms (including China blockchain technology) has been identified as the criterion for identifying this type of data. Application of these criteria by policymakers in Iran could be the solution to many of the challenges ahead.. Manuscript profile
      • Open Access Article

        5 - Detecting Human Activities Based on Motion Sensors in IOT Using Deep Learning
        Abbas Mirzaei fatemeh faraji
        Control of areas and locations and motion sensors in the Internet of Things requires continuous control to detect human activities in different situations, which is an important challenge, including manpower and human error. Permanent human control of IoT motion sensors More
        Control of areas and locations and motion sensors in the Internet of Things requires continuous control to detect human activities in different situations, which is an important challenge, including manpower and human error. Permanent human control of IoT motion sensors also seems impossible. The IoT is more than just a simple connection between devices and systems. IoT information sensors and systems help companies get a better view of system performance. This study presents a method based on deep learning and a 30-layer DNN neural network for detecting human activity on the Fordham University Activity Diagnostic Data Set. The data set contains more than 1 million lines in six classes to detect IoT activity. The proposed model had almost 90% and an error rate of 0.22 in the evaluation criteria, which indicates the good performance of deep learning in activity recognition. Manuscript profile
      • Open Access Article

        6 - Reliable and Energy Efficient Deployment Optimization of Internet of Things Applications in Cloud and Fog Infrastructure by Using Cuckoo Search Algorithm
        Yaser Ramzanpoor میرسعید حسینی شیروانی
        Deployment applications of internet of things (IoT) in fog infrastructure as cloud complementary leads effectively computing resource saving in cloud infrastructure. Recent research efforts are investigating on how to better exploit fog capabilities for execution and su More
        Deployment applications of internet of things (IoT) in fog infrastructure as cloud complementary leads effectively computing resource saving in cloud infrastructure. Recent research efforts are investigating on how to better exploit fog capabilities for execution and supporting IoT applications. Also, the distribution of an application’s components on the possible minimum number of fog nodes for the sake of reduction in power consumption leads degradation of the service reliability level. In this paper, a hybrid meta-heuristic algorithm based on cuckoo search algorithm is presented for static deployment the components of IoT applications on fog infrastructure in the aim of trade-off between efficient power usage, reduction in the effect of one point of failure and boosting the application reliability against failure. The results of simulations show that the proposed approach in this paper reduces the power consumption of fog network and meets the quality of service requirement of IoT application with the high reliability level. Manuscript profile
      • Open Access Article

        7 - Modeling and evaluation of RPL routing protocol by colored Petri nets
        Mohammad Pishdar Younes Seifi
        The Internet of Things (IoT) is a novel and widely used idea aimed at connecting objects through communication technologies. The problem of the prior technology adaptation has always been one of the most challenging issues in this area over the years. The Recognition of More
        The Internet of Things (IoT) is a novel and widely used idea aimed at connecting objects through communication technologies. The problem of the prior technology adaptation has always been one of the most challenging issues in this area over the years. The Recognition of Prior Learning (RPL) protocol has been proposed by scientists since 2012 as a solution for IoT routing. This protocol has been utilized by many researchers and hardware companies in the field of the mentioned technology. The present study evaluates RPL behavior from the perspective of the existence of stopping conditions, crossing multiple routes from a special route (loop conditions), and how it reacts to different inputs, while presenting a modular and readable model of this protocol. Manuscript profile