Abstract
This chapter introduces an overview on the commercial and industrial applications. The goal is to provide a comprehensive overview of IoT applications commercially and industrially. Commercial applications of IoT cover our daily life environments such as healthcare, retail, tourism and hospitality, and digital marketing. Industrial applications of IoT cover wearables, maintenance management, manufacturing, agriculture, water supply, smart cities, financial services, oil and gas mining, warehousing, transportation and telematics, and smart building. We show that the enhanced capabilities of IoT play an important role to increase commercial benefits, increase efficiency, save time, improve safety, and improve operational processes while reducing operational costs of IoT systems which make them more productive. There are also IoT data analytics, IoT security risks, threats, and privacy issues due to their importance for IoT applications. Finally, AI-powered IoT is discussed where tiny machine learning enables large AI algorithms run efficiently on low-resource devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Costa, B., Pires, P.F., Delicato, F.C., Li, W., Zomaya, A.Y.: Design and Analysis of IoT Applications: A Model-Driven Approach. In: 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), Auckland, New Zealand, vol. 2016, pp. 392–399. https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2016.81
Rusu, I.C.A.R.C.: Commercial and Industrial Internet of Things Applications with the Raspberry Pi. Apress (2020)
https://www.trialog.com/en/iot-systems-and-interoperability/ (Accessed on 03/14/2022).
Jayashankara, M., Udmale, S.S., Pandey, A.K., Singh, R.S.: IoT-based data analytics for the healthcare industry techniques and applications. Intell. Data-Centric Syst., 9–29 (2021)
Baker, S., Xiang, W., Atkinson, I.: Things for Smart Healthcare: Technologies, Challenges, and Opportunities. IEEE Access (2018)
Naresh, V.S., Pericherla, S.S., Murty, P.S.R., Reddi, S.: Internet of Things in healthcare: Architecture, applications, challenges, and solutions. Comput Syst Sci Eng. 6, 411–421 (2020)
Anand, G., Heuss, L.: Feasibility of breath monitoring in patients undergoing elective colonoscopy under propofol sedation: A single-center pilot study. World J Gastrointest. Endosc. 6 (2016). https://doi.org/10.4253/wjge.v6.i3.82
Hashim, N., Norddin, N., Idris, F., Yusoff, S.N.I.M., Zahari, M.: IoT blood pressure monitoring system. Indonesian J. Elect. Eng. Comp. Sci. 19(3), 1384–1390. ISSN: 2502–4752 (2020). https://doi.org/10.11591/ijeecs.v19.i3.pp1384-1390
Nelson, B.D., et al.: Wireless technologies for implantable devices. Sensors (Basel, Switzerland). 20(16), 4604 (2020). https://doi.org/10.3390/s20164604
Ratnaparkhi, S., Khan, S., Arya, C., Khapre, S., Singh, P., Diwakar, M., Shankar, A.: Smart agriculture sensors in IOT: A review. Mater. Today: Proceed.. (In Press)
Sushanth, G., Sujatha, S.: IOT based smart agriculture system. IEEE (2018)
Caro, F., Sadr, R.: The Internet of Things (IoT) in retail: Bridging supply and demand. Business Horizons. 62, 47–54 (2019)
Syed, A.S., Sierra-Sosa, D., Kumar, A., Elmaghraby, A.: IoT in smart cities: A survey of technologies, practices and challenges. Smart Cities. 4, 429–475 (2021). https://doi.org/10.3390/smartcities4020024
Raghuvanshi, A., Singh, U.K.: Internet of Things for smart cities- security issues and challenges. Mater. Today: Proceed. https://doi.org/10.1016/j.matpr.2020.10.849
Natividad, J.G., Palaoag, T.D.: IoT based model for monitoring and controlling water distribution. Int. Conf. Inform. Technol. Digit. Appl., IOP Conf. Series: Mater. Sci. Eng. 482, 012045. IOP Publishing (2019). https://doi.org/10.1088/1757-899X/482/1/012045
Daigavane, V.V., Gaikwad, M.A.: Water quality monitoring system based on IOT. Adv. Wireless Mobile Commun.., ISSN 0973–6972. 10(5), 1107–1116 (2017)
https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/ (Accessed on 07/01/20).
Ngo, Q.-D., Nguyen, H.-T., Le, V.-H., Nguyen, D.-H.: A survey of IoT malware and detection methods based on static features. 6(4), 280–286 (2020)
Ngo, Q.-D., Nguyen, H.-T., Le, V.-H., et al.: A survey of IoT malware and detection methods based on static features. ICT Exp. 6(4), 280–286 (2020)
Plu, T.N., Hoang, L.H., Touan, N.N., Tho, N.D., Binh, N.N.: CFDVex: A novel feature extraction method for detecting cross-architecture IoT malware. In: Proceedings of the Tenth International Symposium on Information and Communication Technology, pp. 248–254 (2019)
Alasmary, H., et al.: Graph-based comparison of IoT and android malware. In: Proceedings of International Conference on Computational Social Networks, pp. 259–272 (2018)
Azmoodeh, A., et al.: Robust malware detection for Internet of (Battlefield) things devices using deep eigenspace learning. IEEE Trans. Sustain. Comput., 88–95 (2018)
Rey, V., Sánchez, P.M.S., Celdrán, A.H., Bovet, G.: Federated learning for malware detection in IoT devices. Comp. Netw. 204(26), 108693 (2022)
https://www.trellix.com/en-us/security-awareness/ransomware/what-is-ransomware.html (Accessed on 05/09/2022).
Wani, A., Sathiya, R.: Ransomware protection in IoT using software defined networking. Int. J. Elect. Comp. Eng. 10(3), 3166–3174
Bertino, E.: Botnets and internet of things security. Computer. 50(2), 76–79 (2017)
Azmoodeh, A., Dehghantanha, A., Conti, M., Choo, K.K.R.: Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J. Ambient Intell. Human. Comput. 9(4), 1141–1152 (2018)
Butun, I., Osterberg, P., Song, H.: Security of the internet of things: Vulnerabilities, attacks and countermeasures. https://arxiv.org/pdf/1910.13312.pdf
Li, B., Ye, R., Gao, G., Liang, R., Liu, W., Ken Cai, E.: A detection mechanism on malicious nodes in IoT. Comp. Commun. 151(1), 51–59 (2020)
Jiang, J., Han, G., Zhu, C., Dong, Y., Zhang, N.: Secure localization in wireless sensor networks: A survey. J. Commun. 6(6), 460–470 (2011)
Deep, S., Zheng, X., Jolfaei, A., Yu, D., Ostovari, P., Bashir, A.K.: A survey of security and privacy issues in the Internet of Things from the layered context. https://arxiv.org/pdf/1903.00846.pdf (Accessed on 05-19-2022).
Prabhakar, S.: Network security in digitalization: Attacks and defence. Int. J. Res. Comput. Appl. Robot. 5, 46–52 (2017)
Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutor.
Bhosale, S.D., Sonavane, S.S.: Wormhole attack detection in internet of things. Int. J. Eng. Technol. 7(2.33), 749–751 (2018)
Fazeldehkordi, E., Amiri, I.S., Akanbi, O.A.: A study of blackhole attack solutions. Syngress. (2016)
Kibirige, G.W., Sanga, C.: A survey on detection of sinkhole attack in wireless sensor network. https://arxiv.org/ftp/arxiv/papers/1505/1505.01941.pdf#:~:text=Sinkhole%20attack %20is%20a%20type,drops%20or%20altered%20 routing%20information.
Teng, L., Zhang, Y.: Secure routing algorithm against sinkhole attack for mobile wireless sensor network, in computer modeling and simulation, in proceedings of 2010. ICCMS’10. Second IEEE Int. Conf. Comp. Model. Simul. 4, 79–82 (2010)
Gupta, S., Gupta, B.B.: Cross-site scripting (XSS) attacks and defense mechanisms: Classification and state-of-the-art. Int. J. Syst. Assur. Eng. Manage. 8, 512–530 (2017). https://doi.org/10.1007/s13198-015-0376-0
https://owasp.org/www-community/attacks/xss/ (Accesed on 06/18/2022).
Tawalbeh, L.’a., Muheidat, F., Tawalbeh, M., Quwaider, M.: IoT privacy and security: Challenges and solutions. Appl. Sci. 10, 4102 (2020). https://doi.org/10.3390/app10124102
Thierer, A.D.: The internet of things and wearable technology: Addressing privacy and security concerns without derailing innovation. Richmond J. Law Technol. XXI(2) (2015)
Nelson, J.W. (editor), Jayne, F., Mary, A. H. (Co-editors): Using Predictive Analytics to Improve Healthcare Outcomes, Wiley (2021)
Han, S., Mao, H., Dally, W.J., Deep compression: Compressing deep neural networks with pruning, trained quantization and Hufman coding, 4th international conference on learning representations, ICLR 2016, San Juan.
https://www.fujitsu.com/au/imagesgig5/IoT_solutions_UBIQUITOUSWARE_Digital_ Solutions.pdf (Accessed on 05/06/2022).
https://static.googleusercontent.com/media/www.google.com/en//corporate/datacenter/dc-best-practices-google.pdf (Accessed on 05/06/2022).
https://www.clariontech.com/blog/ai-and-iot-blended-what-it-is-and-why-it-matters (Accessed on 06/18/2022).
https://www.rolls-royce.com/country-sites/sea/discover/2021/tapping-ai-technologies-to-create-solutions-of-tomorrow.aspx (Accessed on 05/06/2022).
https://www.clariontech.com/blog/ai-and-iot-blended-what-it-is-and-why-it-matters (Accesed on 06/18/2022).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Nagaty, K.A. (2023). IoT Commercial and Industrial Applications and AI-Powered IoT. In: Iranmanesh, A. (eds) Frontiers of Quality Electronic Design (QED). Springer, Cham. https://doi.org/10.1007/978-3-031-16344-9_12
Download citation
DOI: https://doi.org/10.1007/978-3-031-16344-9_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-16343-2
Online ISBN: 978-3-031-16344-9
eBook Packages: Computer ScienceComputer Science (R0)