The internet of things (IoT) is everywhere. It's in our homes, cars, offices and most commonly around our wrists. It's changing the way factories are run, how health care is delivered and how cities operate. With an estimated 5.5 million new "things" connected each day, and an expected 6.4 billion in circulation by the end of 2018, the IoT will increasingly become part of our lives. But with the IoT's proliferation comes great responsibility. You cannot take the security of the rapidly expanding IoT ecosystem for granted. Even the smallest, most minimally connected device must have the appropriate safeguards built in throughout its lifecycle. It is time to focus on IoT security at the point of design to securely manage devices from inception through implementation. The potential of IoT devices and sensors is enormous, even in Nigeria, but if the security of each device and application is taken lightly, it is very likely that the exploitation of unguarded vulnerabilities will stop the progress, preventing us from ever fully realizing that potential. This paper takes a comprehensive survey of the security architecture, vulnerabilities and challenges facing the successful implementation of IoT in Nigeria and proposed far-reaching and holistic security solutions to protect IoT devices/se network and applications from being exploited by hackers, malwares and other undesirable elements so that the opportunities from IoT implementations will be realised in Nigeria in the nearest future.
Critical public assets such as oil and gas pipelines, public buildings, power plants, nuclear plants, public water utility etc needs to be monitored in real time so as to ensure their availability, dependability, safety and security. In this paper, we examined the basic components and architecture of real-time system, which includes real-time control, data acquisition system (DAS), critical systems, sensors and actuators, stimulus and response, Multi Agent System (MAS); design procedures and implementation of real-time systems using JAVA Standard Edition (SE) programming paradigm known as Java classes. We also examined the pros and cons of JAVA as a programming language compared to other languages such as Assembly Language and Ada. The paper went further to present the design and process architectures and timing requirements for two critical public assetsthe oil and gas pipeline and public building involving different types of sensors and actuator interfaces. The paper concluded by implementing JAVA classes for the burglary alarm intruder detection system capable of detecting and reporting any intrusion targeted at critical public buildings.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.