Internet of Things A to Z -  - E-Book

Internet of Things A to Z E-Book

0,0
131,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

A fully updated guide to cutting-edge Internet of Things (IoT) technology

The Internet of Things (IoT) has revolutionized the way we interact with technology in a highly connected world, bringing a host of new objects and points of entry into global communications networks. Internet of Things A to Z: Technologies and Applications, Second Edition, is a thorough and accessible resource to IoT for undergraduate and postgraduate students, as well as practitioners and implementers.

With a contributor team led by an editor who has decades of experience in information and communication technology (ICT), it covers all foundational subjects for understanding IoT. Now fully updated to reflect the latest developments in the field, it is an indispensable volume for students, researchers, and IT learners looking to keep pace with this rapidly growing technology.

Organized into five thematic parts, this edition offers foundational theory, emerging technologies, domain-specific applications, security and trust models, and hands-on tutorials that bridge theory and practice. Each chapter offers a research-informed overview with extensive references, making the book equally valuable as a course text and a scholarly reference.

Readers of the second edition will also find:

  • Three additional chapters covering applications of artificial intelligence, machine learning, and deep learning, including information on the Internet of Military Things
  • Detailed chapters on IoT architecture and ecosystems, security issues such as trust management and IoT authentication methods, big data analytics, and more
  • Expanded treatment of essential technologies not covered in the first edition, including edge computing and edge intelligence, with coverage of applications such as tinyML, Digital Twins, AR/VR, and the metaverse
  • Practical tutorials on building IoT prototypes and developing streaming data pipelines using widely adopted tools and platforms
  • New information on design and prototyping, including updated hardware boards and instructions

Internet of Things A to Z: Technologies and Applications, Second Edition, is ideal for students interested in the Internet of Things, ICT researchers, industry professionals, and lifetime IT learners seeking a comprehensive and up-to-date reference that connects theory with real-world implementation.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 1684

Veröffentlichungsjahr: 2025

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents

Cover

Table of Contents

Series Page

Title Page

Copyright Page

Dedication Page

List of Contributors

About the Editor

About the Contributors

Preface

Audience

Organization of the Book

Acknowledgments

Reviewers

About the Companion Website

Part I: Core Concepts and Enablers

1 Introduction to the Internet of Things

1.1 Historical Roots

1.2 Related Streams: Machine‐to‐Machine Communications, Industrial Internet of Things, Industry 4.0, and Cyber‐Physical Systems

1.3 Who Works on the Internet of Things?

1.4 Internet of Things—Core Concepts

1.5 Internet of Things Framework

1.6 Derived Qualities of Modern ICT

1.7 Potential for Product, Process, and Business Model Innovations

1.8 Implications and Challenges

1.9 Conclusion

References

2 An Overview of Enabling Technologies for the Internet of Things

2.1 Introduction

2.2 Overview of IoT Architecture

2.3 Enabling Technologies

2.4 IoT Platforms and Operating Systems

2.5 Conclusion

References

3 RFID in the Internet of Things

3.1 Introduction

3.2 A Brief History of RFID

3.3 A Glimpse into RFID Technology

3.4 RFID Applications in the Internet of Things

3.5 Connecting RFID Transceivers to the Internet

3.6 Emerging Technology Trends

3.7 Challenges and Outlook

3.8 Conclusion

References

4 Sensors, Actuators, Wireless Sensor Networks, and the Internet of Things

4.1 Introduction

4.2 A Glimpse into Sensors and Actuators

4.3 Wireless Sensor Networks

4.4 Wireless Sensor Networks in the Internet of Things

4.5 Deployment Case Studies

4.6 Open Problems and Future Directions

4.7 Conclusion

References

5 Cloud and Fog Computing in the Internet of Things

5.1 Introduction

5.2 IoT System Requirements

5.3 Cloud Computing in IoT

5.4 Fog Computing in IoT

5.5 Conclusion

References

6 On Standardizing the Internet of Things and Its Applications

6.1 Introduction

6.2 Current Status

6.3 The Standardization Environment

6.4 Standardization in Selected Application Areas

6.5 Discussion and Some Speculation

6.6 Conclusion

Acknowledgments

References

Part II: AI and the Internet of Things

7 Artificial Intelligence and the Internet of Things: Algorithms, Applications, and Challenges

7.1 Introduction

7.2 AI Algorithms

7.3 AI‐Based IoT Applications

7.4 Current Challenges and Potential Solutions

7.5 More Considerations on Real‐World Applications and Moral Ramifications of AI/ML in IoT

7.6 Conclusion

References

8 Deep Learning and the Internet of Things: Applications, Challenges, and Opportunities

8.1 Introduction

8.2 Overview of Deep Learning

8.3 Edge Intelligence

8.4 tinyML

8.5 Digital Twins

8.6 Metaverse

8.7 Challenges and Opportunities

8.8 Conclusion

References

Part III: Use Cases and Application Domains

9 The Industrial Internet of Things

9.1 Introduction

9.2 Market Overview

9.3 Interoperability and Technologies

9.4 Alliances

9.5 Conclusions

Acknowledgments

References

10 The Emerging “Energy Internet of Things”

10.1 Introduction

10.2 Power Management Trends and EIoT Support

10.3 Real‐Life Power Management Optimization Approaches

10.4 Challenges and Future Directions

10.5 Conclusion

References

11 Implementing the Internet of Things for Renewable Energy

11.1 Introduction

11.2 Managing the Impact of Sustainable Energy

11.3 EIoT Deployment

11.4 Industry Standards for EIoT

11.5 Security Considerations in EIoT and Clean Energy Environments

11.6 Conclusion

References

12 Internet of Things Applications for Smart Cities

12.1 Introduction

12.2 IoT Applications for Smart Cities

12.3 Specific Smart City Applications

12.4 Optimal Enablement of Video and Multimedia Capabilities in IoT

12.5 Key Underlying Technologies for Smart Cities IoT Applications

12.6 Challenges and Future Research

12.7 Conclusion

References

13 Internet of Things Applications for Agriculture

13.1 Introduction

13.2 Internet‐of‐Things‐Based PA

13.3 IoT Application in Agriculture Irrigation

13.4 IoT Application in Agriculture Fertilization

13.5 IoT Application in Crop Disease and Pest Management

13.6 IoT Application in Precision Livestock Farming

13.7 Conclusion

References

14 Smart Landslide Monitoring and Warning Systems with IoT Technologies

14.1 Introduction

14.2 IoT‐Based Landslide Early Warning Systems (IoT‐LEWSs)

14.3 Case Studies

14.4 Challenges and Future Research

14.5 Conclusion

References

15 The Internet of Things and People in Health Care

15.1 Introduction

15.2 The Smart Health Care Ecosystem

15.3 Dimensions of Internet of Things Applications in Health Care

15.4 Examples of IoT‐Related Health Care Applications and Their Dimensions

15.5 Challenges

15.6 Conclusion

Acknowledgments

References

16 Smart Ambulance and Emergency Medicine: Mobile IoT in the 6G Era

16.1 Introduction

16.2 IoT in Emergency Medicine

16.3 Integration and Compatibility

16.4 Case Study: Chronic Obstructive Pulmonary Disease

16.5 Smart Ambulance Challenges

16.6 Moving into the 6G Era

16.7 Conclusions

References

17 Smart Connected Homes

17.1 Introduction

17.2 The Smart Connected Home Domain

17.3 Smart Connected Home Systems

17.4 The Smart Connected Home Technologies

17.5 Smart Connected Home Architectures

17.6 Smart Connected Home Challenges and Research Directions

17.7 Conclusions

Acknowledgments

References

18 The Internet of Flying Things

18.1 Introduction

18.2 Flying Things

18.3 The Internet of Flying Things

18.4 Challenges

18.5 Case Studies

18.6 Conclusions

Acknowledgments

References

19 Internet of Military Things and Weaponized AI: Technology in the Age of Conflict

19.1 Introduction

19.2 Military Systems: Basic Elements

19.3 Military Applications: Selected Topics

19.4 AI Governance: Legal and Ethical Ramifications

19.5 Conclusion

References

Part IV: Security and Privacy

20 Security Mechanisms and Technologies for Constrained IoT Devices

20.1 Introduction

20.2 Security in IoT Protocols and Technologies

20.3 Security Issues and Solutions

20.4 Conclusion

References

21 Blockchain‐Based Security Solutions for IoT Systems

21.1 Introduction

21.2 Regulatory Requirements

21.3 Blockchain Technology

21.4 Blockchains and IoT Systems

21.5 Examples of Blockchain‐Based Security Solutions for IoT Systems

21.6 Challenges and Future Research

21.7 Conclusions

References

22 Authentication Methods for the Internet of Things: Pre‐ and Post‐Quantum Computing

22.1 Introduction

22.2 Pre‐Quantum Authentication Methods for IoT

22.3 Quantum Computing and its Impact on IoT Security

22.4 Post‐Quantum Authentication Methods for IoT

22.5 Post‐Quantum Authentication and IoT Applications

22.6 Hybrid Authentication Approach for Enhanced Security

22.7 Future Directions and Challenges

22.8 Conclusion

References

23 On the Role of Dynamic Trust Management in the Evolving Internet of Things

23.1 Introduction

23.2 Trust Concepts

23.3 Dynamic Trust Management in IT/OT Convergence

23.4 Dynamic Trust Management

23.5 Dynamic Trust Management for IoT

23.6 Dynamic Trust in Internet of Sociable Autonomous Things

23.7 Conclusion

References

Part V: Practical Implementations and Tutorials

24 A Tutorial Introduction to IoT Design and Prototyping with Examples

24.1 Introduction

24.2 Main Features of IoT Hardware Development Platforms

24.3 Design and Prototyping of IoT Applications

24.4 Projects on IoT Applications

24.5 Conclusion

Acknowledgments

References

25 A Tutorial on IoT Streaming Data Pipelines: The What, Why, and How

25.1 Introduction

25.2 Overview of Streaming Data Pipelines

25.3 Foundational Technologies for IoT Streaming Data Pipelines

25.4 Demonstration: How to Build an IoT Streaming Data Pipeline

25.5 Conclusion

References

Glossary

Index

End User License Agreement

List of Tables

Chapter 1

Table 1.1 Overview of communication technologies for IoT (adapted f...

Chapter 2

Table 2.1 Comparison of communication technologies.

Table 2.2 Comparison of IoT data exchange protocols.

Table 2.3 Comparison of Big Data streaming processing technologies....

Table 2.4 Comparison of IoT operating systems.

Table 2.5 Comparison of IoT platforms.

Chapter 4

Table 4.1 Examples of conventional sensors classified according to...

Table 4.2 Examples of conventional actuators classified according ...

Table 4.3 Examples of WSN motes.

Table 4.4 Examples of microcontrollers in WSN motes.

Table 4.5 Features of operating systems for WSN motes.

Table 4.6 Radio transceivers for WSN motes.

Table 4.7 Categories of IoT middleware solutions.

Chapter 5

Table 5.1 Overview of some gateway devices suitable for local comp...

Chapter 6

Table 6.1 Major SSOs developing dedicated IoT‐specific standards....

Table 6.2 (E)merging application areas as identified in the litera...

Table 6.3 Disciplines involved in different application areas (exc...

Chapter 7

Table 7.1 Main advantages and disadvantages of ML algorithms.

Table 7.2 Main advantages and disadvantages of deep learning (DL) ...

Chapter 10

Table 10.1 Total U.S. electricity consumption and intensities, 20...

Table 10.2 Typical process used in energy optimization studies.

Chapter 11

Table 11.1 Distributed renewable generation sources.

Table 11.2 Energy storage technologies.

Table 11.3 Energy IoT device datasets.

Table 11.4 Smart controls and customer usage.

Chapter 12

Table 12.1 Key urban challenges and IoT‐supported solutions.

Table 12.2 List of smart cities initiatives and cities with inter...

Table 12.3 A taxonomy of the requisite synthesis to achieve broad...

Table 12.4 Reference interfaces in the evolved packet core (EPC) ...

Chapter 14

Table 14.1 Comparison of wireless communication technologies used...

Chapter 16

Table 16.1 Molar heat output of enzyme catalyzed reactions in bio...

Chapter 17

Table 17.1 Categorization of the different sensor types and their...

Chapter 18

Table 18.1 A comparison of available features of UASs, IoT, and t...

Chapter 20

Table 20.1 Overview of protocols and mechanisms.

Chapter 22

Table 22.1 Assurance Level of different authentication methods.

Table 22.2 Pre‐quantum authentication methods.

Table 22.3 Impact of quantum computing on IoT security—challenges...

Table 22.4 Drawbacks of PQC Algorithms.

Table 22.5 Comparison of Dilithium, Falcon, and Sphincs+.

Chapter 23

Table 23.1 Device layer TMS use (see Sharma et al. (2020) for an ...

Chapter 24

Table 24.1 Summary of processing and storage capacity of Arduino ...

Table 24.2 Summary of power consumption, size, and cost of Arduin...

Table 24.3 Summary of connectivity and flexibility/customizabilit...

Table 24.4 Summary of processing speed and memory/storage capacit...

Table 24.5 Summary of power consumption, size, and cost of Raspbe...

Table 24.6 Summary of connectivity and flexibility/customizabilit...

Chapter 25

Table 25.1 Hardware specifications.

List of Illustrations

Chapter 1

Figure 1.1 Reality‐virtuality continuum for extended reality.

Figure 1.2 Internet of Things framework.

Figure 1.3 High‐level view of an IoT architecture.

Figure 1.4 IoT application domains and related applications.

Chapter 2

Figure 2.1 The IoT five‐layer architectural model.

Figure 2.2 RPL topology.

Chapter 3

Figure 3.1 RFID tag‐reader communication. (a) Active tag with read...

Figure 3.2 Data acquisition for the IoT through RFID.

Figure 3.3 Network topologies for linking RFID sensors to the Inte...

Figure 3.4 WSN sensors as data routers for RFID tags.

Chapter 4

Figure 4.1 IoT core components.

Figure 4.2 Generic layout of wireless sensor networks.

Figure 4.3 WSN protocol stack.

Figure 4.4 Generic WSN mote.

Figure 4.5 Relationship between middleware and IoT components.

Chapter 5

Figure 5.1 Cloud computing service models.

Figure 5.2 Common cloud‐based IoT architecture.

Figure 5.3 Scale and latency in cloud‐based IoT systems.

Figure 5.4 Revised fog‐enabled architecture combining fog and clou...

Chapter 6

Figure 6.1 The generic three‐tier IoT architecture.

Figure 6.2 The web of relevant SSOs.

Figure 6.3 Formal coordination between SSOs.

Figure 6.4 Entities and links between them in ITS (automotive) sta...

Figure 6.5 Entities and links between them in ITS (automotive) sta...

Figure 6.6 Timeline of the establishment of important standardizat...

Figure 6.7 Links between SSOs in the smart manufacturing area toda...

Figure 6.8 Timeline of the establishment of important standardizat...

Figure 6.9 Links between SSOs in the smart grid sector today (well...

Figure 6.10 Timeline of the establishment of important standardiz...

Figure 6.11 Smart city model according to and adapted from Naviga...

Figure 6.12 Entities and links between them in “smart city” stand...

Figure 6.13 Timeline of the establishment of important standardiz...

Figure 6.14 Timeline of the establishment of important standardiz...

Figure 6.15 Timeline of the establishment of important IoT standa...

Chapter 7

Figure 7.1 Significant phases of the Journey of AI.

Figure 7.2 Relationship between different categories of AI.

Figure 7.3 Main categories of ML and their subcategories with comm...

Figure 7.4 AI‐based IoT application domains.

Figure 7.5 Challenges in AI‐based IoT systems.

Figure 7.6 Ethical considerations in AI‐based IoT systems.

Chapter 8

Figure 8.1 Layers of the IoT architecture.

Figure 8.2 Illustration of an MLP feed‐forward neural network and ...

Figure 8.3 Illustration of the most popular types of generative mo...

Figure 8.4 The reinforcement learning training paradigm.

Figure 8.5 Computer and power resources available at various layer...

Figure 8.6 Abstract overview of a cloud‐edge continuum.

Figure 8.7 A standard architecture for tinyML. Data is sensed from...

Figure 8.8 The digital twin model.

Chapter 9

Figure 9.1 Connectivity on the OSI layer stack.

Figure 9.2 Communication on the OSI layer stack.

Figure 9.3 Data exchange on the OSI layer stack.

Figure 9.4 Information modeling based on Pras and Schoenwaelder (2...

Figure 9.5 Semantic Web layer cake on top of the OSI model based o...

Figure 9.6 Functional domains of the IIRA based on Industrial Inte...

Figure 9.7 Functional domains of the IIRA based on Adolphs et al. ...

Figure 9.8 Asset Administration Shell based on Adolphs et al. (201...

Chapter 10

Figure 10.1 A traditional power grid that interconnects EEs suppo...

Figure 10.2 Ecosystem of an evolved power grid. (a) Traditional. ...

Figure 10.3 Typical control architecture for a distributed smart ...

Figure 10.4 DERMS using IoT principles.

Figure 10.5 MCG using IoT principles.

Figure 10.6 Concept arrangement of a DRMS using IoT principles.

Figure 10.7 Demand response principles.

Figure 10.8 Lighting management strategies.

Figure 10.9 Logical view of connected lighting arrangement.

Figure 10.10 Evolved luminaire.

Figure 10.11 ZigBee stack.

Figure 10.12 Integrated control of energy and comfort at the per...

Figure 10.13 ASHRAE Standard 90.1‐2010 Modeling of energy opport...

Figure 10.14 Energy efficiency building upgrade process.

Chapter 11

Figure 11.1 Solar output for July 1, 2011, in Oahu, HI.

Figure 11.2 Household demand curve, solar output curve, and net l...

Figure 11.3 Storage simulation.

Figure 11.4 EIoT dynamic reduction simulation.

Figure 11.5 Load shift simulation.

Figure 11.6 EIoT central control diagram.

Figure 11.7 EIoT web diagram.

Figure 11.8 EIoT gateway diagram.

Chapter 12

Figure 12.1 A logical view of an IoT ecosystem, also as applicabl...

Figure 12.2 Graphical examples of smart city IoT applications.

Figure 12.3 Global distribution of smart cities initiatives.

Figure 12.4 Dispersed city‐based networks may be in different aut...

Figure 12.5 3GPP/ETSI protocol stack specification of PMIPv6 for ...

Figure 12.6 Example of PMIPv6 usage in 3GPP context.

Chapter 13

Figure 13.1 World population, 2015–2100.

Figure 13.2 World agricultural land, 1961–2013.

Figure 13.3 IoT‐backboned PA.

Figure 13.4 Agriculture IoT architecture.

Figure 13.5 IoT irrigation system diagram.

Chapter 14

Figure 14.1 Framework of an IoT‐based LEWS.

Figure 14.2 Power management in IoT nodes.

Figure 14.3 Cloud and edge computing architecture (in the IoT-Edg...

Figure 14.4 Integrated Remote Sensing and IoT‐Based Landslide Mon...

Chapter 15

Figure 15.1 Smart health care ecosystem.

Figure 15.2 A snowflake model representing the seven dimensions o...

Figure 15.3 EpiWatch represented in the snowflake model.

Figure 15.4 Smart Sock 2 represented in the snowflake model.

Figure 15.5 Propeller represented in the snowflake model.

Figure 15.6 Ginger.io represented in the snowflake model.

Figure 15.7 SmartSole represented in the snowflake model.

Figure 15.8 CoaguChek represented in the snowflake model.

Figure 15.9 The activity tracker for oncology treatment represent...

Figure 15.10 The continuous glucose monitoring meter represented...

Chapter 16

Figure 16.1 Smart ambulance architecture.

Figure 16.2 Integrated IoT sensing at the point‐of‐care (PoC).

Figure 16.3 Biosensor designed to withstand harsh operating envir...

Figure 16.4 Control system.

Figure 16.5 Service binding.

Figure 16.6 IoT‐based local area weather observation.

Figure 16.7 Binding meta‐objects.

Figure 16.8 Range extension through a multi‐hop cellular network....

Figure 16.9 Generalized smart ambulance in an IoT environment.

Figure 16.10 Disease modeling using spatio‐temporal surveillance...

Figure 16.11 High‐tier architecture of wireless PoC sensing syst...

Figure 16.12 Co‐channel interference analysis using self‐cogniza...

Figure 16.13 Minimizing interference under frequency reuse.

Chapter 17

Figure 17.1 A classification of the three types of smart homes.

Figure 17.2 The main smart connected home environment stakeholder...

Figure 17.3 A generic architecture of the smart connected home.

Figure 17.4 The three main types of communication models. (a) Dev...

Figure 17.5 (a) Centralized and (b) distributed architectural mod...

Figure 17.6 Malicious threat agents targeting the smart connected...

Chapter 18

Figure 18.1 Examples of UAVs. (a) A drone. (b) A remotely piloted...

Figure 18.2 Relationships between different types of mobile ad ho...

Figure 18.3 The UAV can be placed either in fog or IoT layers whe...

Figure 18.4 Smart city applications taken to the next level with ...

Figure 18.5 Smart farm applications taken to the next level with ...

Figure 18.6 A wide flying ad hoc network.

Figure 18.7 Available cameras in the cloud can be accessed by end...

Figure 18.8 A comparison between OSI model and IoT.

Figure 18.9 Surveillance situations for the study of the applicat...

Figure 18.10 Applications of IoFT in smart cities.

Figure 18.11 Applications of IoFT in big events.

Chapter 19

Figure 19.1 Manned aircraft commanding unmanned “loyal wingmen.”...

Figure 19.2 Cooperating humans, humanoids, and robodogs (Soldiers...

Figure 19.3 Communicating with a station on the far side of the M...

Figure 19.4 AI‐generated voice chat, controlled by the enemy

Chapter 20

Figure 20.1 Example of resource‐constrained IoT networks with dif...

Figure 20.2 DTLS message exchange.

Figure 20.3 Denial‐of‐service attack against a server IoT device....

Figure 20.4 Denial‐of‐service attack targeting a DTLS server.

Figure 20.5 Poorly scalable storage of preshared keys on a DTLS s...

Figure 20.6 Example of LKH key material in the presence of eight ...

Chapter 21

Figure 21.1 Basic blockchain structure.

Figure 21.2 An overview of the proposed solution for secure acces...

Figure 21.3 An overview of the proposed blockchain‐based architec...

Figure 21.4 Handling a store transaction.

Figure 21.5 Handling an access transaction.

Chapter 22

Figure 22.1 Fields influenced by quantum computing.

Figure 22.2 A taxonomy of IoT pre‐quantum authentication schemes....

Figure 22.3 Post‐quantum cryptography algorithms.

Figure 22.4 Taxonomy of IoT post‐quantum authentication.

Figure 22.5 Multilayered security approach.

Figure 22.6 Future directions for post‐quantum IoT.

Figure 22.7 Emerging technologies and post‐quantum IoT.

Chapter 23

Figure 23.1 Soft and hard security.

Figure 23.2 Automation pyramid.

Figure 23.3 Zero‐trust dynamic trust management system.

Figure 23.4 Impact of IIoT on the automation pyramid.

Figure 23.5 SIoT trust management system architecture.

Figure 23.6 General IoSAT dynamic risk management system.

Chapter 24

Figure 24.1 The selected Arduino boards.(a) Arduino Mega 2560...

Figure 24.2 The selected Raspberry Pi models.(a) Raspberry Pi...

Figure 24.3 Choosing the board on the Tools menu.

Figure 24.4 Choosing the serial port.

Figure 24.5 Accessing

Manage Libraries

functionality.

Figure 24.6 Uploading the code to the device.

Figure 24.7 A breadboard diagram of the Arduino temperature logge...

Figure 24.8 Mosquitto broker running on a Linux computer (accesse...

Figure 24.9 Mosquitto subscriber running on a Linux computer (acc...

Figure 24.10 Raspberry Pi imager.

Figure 24.11 Raspberry Pi imager OS settings menu.

Figure 24.12 A breadboard diagram of the Raspberry Pi web‐contro...

Chapter 25

Figure 25.1 Batch processing vs. stream processing.

Figure 25.2 Streaming data pipeline key stages.

Figure 25.3 High‐level streaming pipeline architecture and core c...

Figure 25.4 High‐level view of a modern IoT streaming data pipeli...

Figure 25.5 Node‐RED’s GUI. 1. Node Palette (to choose from avail...

Figure 25.6 Interaction between MQTT clients and the broker follo...

Figure 25.7 Kafka architecture.

Figure 25.8 Read and write with sequential and random access.

Figure 25.9 Overview of Apache Flink Architecture.

Figure 25.10 High‐level architecture of the presented IoT stream...

Figure 25.11 RedBoard connected to the DHT11 sensor.

Figure 25.12 Sketch to read humidity and temperature.

Figure 25.13 Node‐RED flow.

Figure 25.14 JSON object created from sensor readings.

Figure 25.15 The HiveMQ Cloud cluster details.

Figure 25.16 The “mqtt out” node configured to connect to the Hi...

Figure 25.17 The subscribed MQTT topic shows sensor readings.

Figure 25.18 Kafka cluster details.

Figure 25.19 Connect HiveMQ to Confluent Kafka.

Figure 25.20 Kafka topic receiving messages from the HiveMQ Clou...

Figure 25.21 JSON message from MQTT published to a Kafka topic....

Figure 25.22 Alerts data stream as a table.

Figure 25.23 The Alerts table is also available as a Kafka topic...

Figure 25.24 Kafka connector to S3 Sink.

Figure 25.25 Data sent to S3.

Figure 25.26 S3 file showing persisted sensor readings.

Guide

Cover Page

Table of Contents

Series Page

Title Page

Copyright Page

Dedication Page

List of Contributors

About the Editor

About the Contributors

Preface

Acknowledgments

Reviewers

About the Companion Website

Begin Reading

Glossary

Index

Wiley End User License Agreement

Pages

ii

iii

iv

v

xxv

xxvi

xxvii

xxviii

xxix

xxx

xxxi

xxxiii

xxxiv

xxxv

xxxvi

xxxvii

xxxviii

xxxix

xl

xli

xlii

xliii

xliv

xlv

xlvi

xlvii

xlviii

xlix

l

li

lii

liii

liv

lv

lvi

lvii

lviii

lix

lx

lxi

lxiii

lxv

lxvii

1

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

159

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

345

346

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

369

370

371

372

373

374

375

376

377

378

379

380

381

382

383

384

385

386

387

388

389

391

392

393

394

395

396

397

398

399

400

401

402

403

404

405

406

407

408

409

410

411

412

413

414

415

416

417

418

419

420

421

422

423

424

425

426

427

428

429

430

431

432

433

434

435

436

437

439

440

441

442

443

444

445

446

447

448

449

450

451

452

453

454

455

456

457

458

459

460

461

462

463

464

465

466

467

468

469

470

471

472

473

474

475

476

477

478

479

480

481

482

483

484

485

486

487

488

489

490

491

492

493

494

495

497

498

499

500

501

502

503

504

505

506

507

508

509

510

511

512

513

514

515

516

517

518

519

520

521

522

523

524

525

526

527

528

529

530

531

532

533

534

535

536

537

539

540

541

542

543

544

545

546

547

548

549

550

551

552

553

554

555

556

557

558

559

560

561

562

563

564

565

566

567

568

569

570

571

572

573

574

575

576

577

578

579

580

581

582

583

584

585

586

587

588

589

591

592

593

594

595

596

597

598

599

600

601

602

603

604

605

606

607

608

609

610

611

612

613

614

615

616

617

618

619

620

621

622

623

625

626

627

628

629

630

631

632

633

634

635

636

637

638

639

640

641

642

643

644

645

646

647

648

649

650

651

652

653

654

655

656

657

658

659

660

661

662

663

664

665

666

667

668

669

670

671

672

673

674

675

677

678

679

680

681

682

683

684

685

686

687

688

689

690

691

692

693

694

695

696

697

698

699

700

701

IEEE Press445 Hoes LanePiscataway, NJ 08854

IEEE Press Editorial BoardSarah Spurgeon, Editor‐in‐Chief

Moeness Amin

Ekram Hossain

Desineni Subbaram Naidu

Jón Atli Benediktsson

Brian Johnson

Yi Qian

Adam Drobot

Hai Li

Tony Quek

James Duncan

James Lyke

Behzad Razavi

Hugo Enrique Hernandez Figueroa

Joydeep Mitra

Thomas Robertazzi

Albert Wang

Patrick Chik Yue

Internet of Things A to Z

Technologies and Applications

Second Edition

Edited by

Qusay F. Hassan

Copyright © 2026 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.Published simultaneously in Canada.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per‐copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750‐8400, fax (978) 750‐4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748‐6011, fax (201) 748‐6008, or online at http://www.wiley.com/go/permission.

The manufacturer’s authorized representative according to the EU General Product Safety Regulation is Wiley‐VCH GmbH, Boschstr. 12, 69469 Weinheim, Germany, e‐mail: [email protected].

Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.

Limit of Liability/Disclaimer of Warranty: While the publisher and the authors have used their best efforts in preparing this work, including a review of the content of the work, neither the publisher nor the authors make any representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762‐2974, outside the United States at (317) 572‐3993 or fax (317) 572‐4002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.

Library of Congress Cataloging‐in‐Publication Data applied for

Hardback ISBN: 9781394280469

Cover Design: WileyCover Image: © zf L/Getty Images

To Mishu and Kooky

Your love and quiet companionship shaped the first edition of this book.

This second carries your memory.

List of Contributors

Abdullah AbuhusseinDepartment of Information SystemsSt. Cloud State UniversitySt. CloudMNUSA

Farhad AhamedSchool of Social SciencesWestern Sydney UniversityPenrithAustralia

Ala Al‐AreqiSchool of Social SciencesWestern Sydney UniversityPenrithAustralia

Faisal S. AlsubaeiFaculty of Computing and Information TechnologyUniversity of JeddahJeddahSaudi Arabia

Theodoros AslanidisSchool of Computer ScienceUniversity College DublinDublin Ireland

Adarsha BhattaraiDepartment of Electrical and Computer EngineeringUniversity of NebraskaLincolnUSA

Kalinka Regina Lucas Jaquie Castelo BrancoDepartment of Computer ScienceInstitute of Mathematics and Computer Sciences (ICMC)University of São Paulo (USP)São CarlosSão PauloBrazil

Willie L. Brown Jr.Department of Engineering and Aviation SciencesUniversity of Maryland Eastern ShorePrincess AnneMDUSA

Joseph BugejaInternet of Things and People Research Center and Department of Computer Science and Media TechnologyMalmö UniversityMalmöSweden

John ByabazaireSchool of Computer ScienceUniversity College DublinDublin Ireland

Mirothali ChandACS LabIndian Institute of Technology MandiHimachal PradeshIndia

Dimitris ChatzopoulosSchool of Computer ScienceUniversity College DublinDublin, Ireland

Andreas ChouliarasSchool of Computer ScienceUniversity College DublinDublin, Ireland

Ibibia K. DabipiDepartment of Engineering and Aviation SciencesUniversity of Maryland Eastern ShorePrincess AnneMDUSA

Paul DavidssonInternet of Things and People Research Center and Department of Computer Science and Media TechnologyMalmö UniversityMalmöSweden

Varun DuttACS LabIndian Institute of Technology MandiHimachal PradeshIndia

Jeanette ErikssonDepartment of Computer Science and Media TechnologyInternet of Things and People (IoTaP) Research CenterMalmö UniversityMalmöSweden

Akaa Agbaeze EtengDepartment of Electrical/Electronic EngineeringUniversity of Port HarcourtRivers StateNigeria

Farnaz FaridSchool of Social SciencesWestern Sydney UniversityPenrithAustralia

Lucas FincoPrincipal ConsultantStrategainNew YorkNYUSA

Alvis FongDepartment of Computer ScienceWestern Michigan UniversityKalamazoo MIUSA

Bernard FongDepartment of Electrical EngineeringChang Gung UniversityTaiwan

João Vitor de Carvalho FontesDepartment of Mechanical Engineering São Carlos School of Engineering (EESC)University of São Paulo (USP)São CarlosSão PauloBrazil

Virginia N. L. FranqueiraInstitute of Cyber Security for Society (iCSS) & School of ComputingUniversity of KentCanterburyUnited Kingdom

Mário M. FreireDepartment of Computer ScienceInstituto de TelecomunicaçõesUniversidade da Beira InteriorCovilhãPortugal

Daniel HappQAware GmbHBerlinGermany

Qusay F. HassanIndependent ResearcherCairoEgypt

Muhammad Babar ImtiazSoftware Research InstituteTechnological University of the ShannonAthloneCo WestmeathIreland

Pedro R. M. InácioDepartment of Computer ScienceInstituto de TelecomunicaçõesUniversidade da Beira InteriorCovilhãPortugal

Andreas JacobssonInternet of Things and People Research Center and Department of Computer Science and Media TechnologyMalmö UniversityMalmöSweden

Kai JakobsComputer Science DepartmentRWTH Aachen UniversityAachenGermany

Jonny KarlssonDepartment of Business Management and AnalyticsArcada University of Applied SciencesHelsinkiFinland

Haesik KimVTT Technical Research Centre of FinlandOuluFinland

Vlasis KoutsosSchool of Computer ScienceUniversity College DublinDublin, Ireland

Praveen KumarACS LabIndian Institute of Technology MandiHimachal PradeshIndia

Brian LeeSoftware Research InstituteTechnological University of the ShannonAthloneCo WestmeathIreland

Chee Yen LeowWireless Communication CentreFaculty of Electrical EngineeringUniversiti Teknologi MalaysiaSkudaiMalaysia

Chi Kwong LiClinical ResearchAlpha Positive ClinicHong Kong

Yutong LiuDepartment of RadiologyUniversity of Nebraska Medical CenterLincolnUSA

Kieran McLaughlinSchool of ElectronicsElectrical Engineering and Computer ScienceQueens University BelfastBelfastUnited Kingdom

Manuel MerujeDepartment of Computer ScienceInstituto de TelecomunicaçõesUniversidade da Beira InteriorCovilhãPortugal

Daniel MinoliIoT DivisionDVI CommunicationsNew YorkNYUSA

Benedict OcchiogrossoIntellectual Property DivisionDVI CommunicationsNew YorkNYUSA

Ioannis PanagiotidisSchool of Computer ScienceUniversity College DublinDublin Ireland

Neha PandeyHelloFresh SEChicago USA

Dongming PengDepartment of Electrical and Computer EngineeringUniversity of NebraskaLincolnUSA

Daniel Fernando PigattoDepartment of Computer ScienceGraduate Program in Electrical and Computer Engineering (CPGEI)Federal University of Technology Paraná (UTFPR)CuritibaParanáBrazil

Alex Sandro Roschildt PintoFederal University of Santa Catarina (UFSC)BlumenauSanta CatarinaBrazil

Göran PulkkisDepartment of Business Management and AnalyticsArcada University of Applied SciencesHelsinkiFinland

Sharul Kamal Abdul RahimWireless Communication CentreFaculty of Electrical EngineeringUniversiti Teknologi MalaysiaSkudaiMalaysia

Shahid RazaRISE SICS Security LabKistaStockholmSweden

Mariana RodriguesDepartment of Computer ScienceInstitute of Mathematics and Computer Sciences (ICMC)University of São Paulo (USP)São CarlosSão PauloBrazil

Nancy L. RussoDepartment of Computer Science and Media TechnologyInternet of Things and People (IoTaP) Research CenterMalmö UniversityMalmöSweden

Fariza SabrinaSchool of Engineering and TechnologyCQ UniversitySydneyAustralia

Vyasa SaiIntel Corp.Folsom CAUSA

Musa G. SamailaDepartment of Computer ScienceInstituto de TelecomunicaçõesUniversidade da Beira InteriorCovilhãPortugal

Centre for Geodesy and GeodynamicsNational Space Research and Development AgencyToroBauchiNigeria

Chathumi SamaraweeraDepartment of Electrical and Computer EngineeringUniversity of NebraskaLincolnUSA

Sahil SankhyanACS LabIndian Institute of Technology MandiHimachal PradeshIndia

Detlef SchoderCologne Institute for Information Systems (CIIS)Chair of Information Systems and Information ManagementUniversity of CologneCologne, Germany

João B. F. SequeirosDepartment of Computer ScienceInstituto de TelecomunicaçõesUniversidade da Beira InteriorCovilhãPortugal

Hamid SharifDepartment of Electrical and Computer EngineeringUniversity of NebraskaLincolnUSA

Sajjan ShivaComputer Science DepartmentUniversity of MemphisMemphisTNUSA

Jan SliwaSchool of Engineering and Computer ScienceBerne University of Applied SciencesBerneSwitzerland

James SmithComputer Science and Creative Technologies (FET)University of the West of England (UWE)BristolEnglandUnited Kingdom

Marco TilocaRISE SICS Security LabKistaStockholmSweden

Joana TiranaSchool of Computer ScienceUniversity College DublinDublin, Ireland

Kala Venkata UdaySchool of Civil and Environmental EngineeringIndian Institute of Technology MandiHimachal PradeshIndia

Magnus WesterlundDepartment of Business Management and AnalyticsArcada University of Applied SciencesHelsinkiFinland

Alexander WillnerFraunhofer FOKUSSoftware‐based Networks (NGNI)BerlinGermany

Technische Universität BerlinNext Generation Networks (AV)BerlinGermany

Yuhang YeSoftware Research InstituteTechnological University of the ShannonAthloneCo WestmeathIreland

Lei ZhangDepartment of Engineering and Aviation SciencesUniversity of Maryland Eastern ShorePrincess AnneMDUSA

About the Editor

Qusay F. Hassan, PhD, is an independent researcher and technology evangelist with over 20 years of industry experience in information communication technology (ICT). Throughout his career, he has held various roles in software development, IT services, and teaching. He is currently an independent technical consultant, advising on emerging ICT trends and enterprise systems. In his previous position as a systems analyst at the U.S. Agency for International Development (USAID), he implemented and managed large‐scale data and software systems and actively contributed to digital transformation initiatives, helping to adopt new technologies and deliver innovative solutions across sectors. He received his PhD in computer and information sciences from Mansoura University, Egypt, in 2015. His technical experience and research interests span the areas of software engineering, big data engineering, and distributed systems. He has authored several publications and reviewed many articles and books in these areas. He is also the editor of several academic and research books, including his latest: Advances in the Internet of Things: Challenges, Solutions, and Emerging Technologies (CRC Press, 2025). He is a senior member of IEEE.

About the Contributors

Abdullah Abuhussein received the B.Sc. degree in computer science, in 1999, the M.Sc. degree in information systems management from Ferris State University, in 2002, and the Ph.D. degree in computer science from The University of Memphis. In 2017, he joined the Department of Information Systems, Herberger Business School, St. Cloud State University, as an Assistant Professor. In his Ph.D. research, he focused on pragmatic cloud security assessment framework and stakeholder’s perspective in cybersecurity. He is teaching courses on security, software engineering, and cloud computing as a Lecturer with various educational institutions. His research interests include cloud computing, cloud security, security economics, the Internet of Things (IoT), software engineering, security and privacy, and security metrics. He holds a number of refereed publications in related venues, presented articles in various conferences, and served as a reviewer for some journals, including the IEEE Transactions on Cloud Computing.

Farhad Ahamed is an academic and researcher focusing in Cybersecurity, Applied Machine Learning, and Computational Intelligence. Farhad has navigated through academia, research, and the IT industry for over 18 years. He has contributed to research areas such as Biometrics, Smart Aging and Network Security. His research often integrates machine learning with other disciplines, such as cybersecurity, healthcare, environmental science, and industrial automation. He has worked on predictive diagnostics in healthcare, including the early detection of dementia using machine learning and IoT, as well as multimodal fall detection utilizing wearable and remote sensors, and multimodal heart rate‐based authentication using AI. His work also extends to AI‐based flood estimation by analyzing flood catchment data. He was a Google mentor of Cybersecurity and Machine Learning at Western Sydney University (Google exploreCSR) and supervised ML‐based projects focusing on biometrics, fake news and image identification. He is actively involved in mentoring Ph.D. students and early‐career researchers, fostering the next generation of machine‐learning experts.

Ala Al‐areqi is currently a Lecturer in Cybersecurity and Behavior at Western Sydney University, with over 15 years of teaching experience. He also served as an Associate Professor of Computer Science and the Dean of Faculty at the American University of Afghanistan until July 2024. He holds a Doctor of Philosophy and a Master of Computer Science in Information Security from University Technology Malaysia, and a Bachelor of Information Technology (Honours) in Security Technology from Multimedia University. Dr. Al‐areqi has made significant scholarly contributions, with over 19 research papers in international conferences and journals. His research interests include Biometrics, Penetration Testing, Cryptography, Machine Learning in Cybersecurity, and Data Science. In recognition of his scholarly achievements, he received the Second‐Best Scholarship Award in 2019 at the American University of Afghanistan. Currently, he is conducting research on Cyberwarfare and Penetration Testing. Beyond academia, Dr. Al‐areqi has served as a cybersecurity consultant for AIbiotex IT Solutions, where he developed secure methodologies to protect systems and networks from potential threats. He is also an experienced programmer with expertise in Python, Java, C++, C, R, PHP, JavaScript, Perl, HTML, and CSS, along with extensive knowledge of databases, networking, and web technologies.

Faisal S. Alsubaei (Member, IEEE) received the B.S. (Eds.) degree in computer science from King Abdulaziz University, Saudi Arabia, the M.Sc. degree in computer science, concentrating in security in computing from The Royal Melbourne Institute of Technology University, Australia, and the Ph.D. degree in computer science from the University of Memphis, USA. He is currently the Vice‐Dean of the Deanship of Scientific Research and an Assistant Professor with the Department of Cybersecurity, College of Computer Science and Engineering, University of Jeddah, Saudi Arabia. He was a Software Engineer with Shaker and Associates Pty Ltd., Australia. He is also a Microsoft Certified Technology Specialist, Microsoft Certified Professional, and Cisco Certified Entry Networking Technician. He is also an active member of Australian Computer Society and Linux Users of Victoria. His research interests include security and privacy in the Internet of Medical Things and cloud computing.

Theodoros Aslanidis is a Ph.D. Student in the School of Computer Science of University College Dublin. He received his Diploma in Electrical and Computer Engineering from the University of Thessaly. On his Ph.D., he works on the MLSysOps project, focusing on AI for autonomic system operation. His research interests include cloud computing, machine learning for systems, and deep reinforcement learning.

Adarsha Bhattarai received a B.S. degree in Electrical and Electronics Engineering in July 2021. He is currently a Ph.D. student in the Department of Electrical and Computer Engineering at the University of Nebraska–Lincoln. His primary research interests include digital signal processing, the Internet of Things, artificial intelligence, and security in wireless networks. He has co‐authored a number of academic research papers in the area of AI applications that have been published in professional journals such as IEEE journals and Springer Nature journals.

Kalinka Regina Lucas Jaquie Castelo Branco received her Master’s and Ph.D. degrees in Computer Science from University of São Paulo in 1999 and 2004, respectively. She is currently a Professor of the Institute of Mathematics and Computer Science (ICMC‐USP), working in the department of Computer Systems. She is an active researcher with extensive experience in computer networks, security, embedded systems, and distributed computing.

Willie L. Brown Jr. is Vice Provost for Faculty Affairs at the University of Maryland Eastern Shore, Maryland. He earned his Ph.D. in Business Administration with a specialization in Homeland Security Leadership and Policy (Aviation Safety and Security) from North‐central University and a Master’s degree in Software Engineering from Embry‐Riddle Aeronautical University. Brown also received dual degrees from Elizabeth City State University, North Carolina, with a Bachelor of Science in Aviation Science, and a Bachelor of Science in Computer Science. In addition, Brown is a Federal Aviation Administration (FAA) licensed private pilot. He earned a Management Development Graduate Continuing Education Certification from Harvard University and completed the Leadership Management Program from the Federal Emergency Management Agency. As a member of several aviation professional organizations, he has received numerous awards, most notably from the North Carolina Department of Transportation and the Office of Naval Research/National Aeronautics and Space Administration. Brown serves as the Vice President of Administration of the Eastern North Carolina Institute of Electrical and Electronics Engineers (IEEE) for Geoscience and Remote Sensing Society. Brown has authored/coauthored publications in both national and international peer‐reviewed journals with conference proceedings involving aviation and engineering education.

Joseph Bugeja is an award‐winning computer scientist, advisor, and academic specializing in cyber security, data privacy, and machine learning. He graduated from Malmö University (Sweden) with a Ph.D. in Computer Science in 2021, where he was subsequently awarded the Dissertation of the Year Award for his doctoral dissertation work. After obtaining his Ph.D., Joseph completed a 2‐year postdoctoral fellowship in Computer Science, where he was a member of the Internet of Things and People (IoTaP) research center at Malmö University. He also holds an MSc. degree in Information Security from Royal Holloway University of London, a BSc. (Hons) degree in Computer Science and Artificial Intelligence from the University of Malta, and several industry certifications. Since 2015, Joseph has served as the course director, course developer, and main lecturer for several university courses in Sweden and Malta, with a primary focus on information security. He is acknowledged as a subject matter expert on cyber security, data protection, and the IoT by the European Union Agency for Cybersecurity (ENISA). His research primarily centers on cyber security, privacy, and trust in IoT applications, along with corporate security. Notably, he recently authored an academic textbook on the subject of data protection and IT security. Joseph has more than 20 years of experience working professionally in the software industry, occupying development, leadership, consultancy, and managerial roles specializing in web technologies and information security.

John Byabazaire received his B.Sc. and M.Sc. degrees (by research) in Computer Science from Gulu University, Gulu, Uganda, in 2013 and South East Technological University, Waterford, Ireland, in 2018, respectively. He obtained a Ph.D. in Computer Science from the School of Computer Science, University College Dublin, Dublin, Ireland, in 2024, where he worked on IoT systems for data collection. In 2018, he was an assistant lecturer at Gulu University, Uganda. Currently, John works as a Postdoctoral Research Fellow under the School of Computer Science, University College Dublin, where he researches AI techniques for autonomic end‐to‐end system management across the full cloud‐edge continuum. His research interests include IoT systems for data collection, remote sensing, the Internet of Things (IoT), fog analytics, and applying AI‐based techniques to IoT systems.

Mirothali Chand is currently pursuing his Postdoctoral Research at the ACS Lab, IIT Mandi, where he contributes to a research project on landslide monitoring and early warning systems in the Himalayan region. His work focuses on applying advanced Machine Learning and Reinforcement Learning techniques for real‐time hazard prediction and risk assessment. He received his Ph.D. in Computer Science and Engineering from the National Institute of Technology Puducherry and holds an M.Tech in Computer Science and Engineering from Pondicherry University. His doctoral research was centered on addressing combinatorial optimization problems in Disassembly Sequence Planning using AI, with a particular emphasis on Reinforcement Learning and Meta‐Heuristics. His research interests include Reinforcement Learning, Machine Learning, and Optimization Techniques.

Dimitris Chatzopoulos, Assistant Professor, School of Computer Science at University College Dublin, received his Ph.D. in Computer Science and Engineering from the Hong Kong University of Science and Technology and his Diploma and MSc in Computer Engineering and Communications from the University of Thessaly, Greece. In 2014, he was a visiting researcher at École Polytechnique Fédérale de Lausanne and in 2016 at Tsinghua University and Cambridge University. In 2017, he was selected to participate in the 5th Heidelberg Laureate Forum. His research interests include privacy‐preserving and AI‐enabled decentralized applications for mobile and distributed systems.

Andreas Chouliaras has received his Diploma in Electrical and Computer Engineering from the University of Thessaly, Greece, and is currently pursuing his Ph.D. at the School of Computer Science of University College Dublin, Ireland. His research focuses on Human‐AI collaboration and, more specifically in Reinforcement Learning from Human Feedback. His research topic is on Explainable and Interactive Reinforcement Learning. He is investigating how explainable methods can improve understanding and communication efficiency between humans and RL systems and lead to improved performance.

Ibibia K. Dabipi’s research interests include computer security and network management, parallel computing and algorithms development, performance evaluation of computer networks, optimization of transportation networks, and economic analysis of transportation facilities. Dabipi holds Ph.D. in Electrical Engineering (1987) and a Master of Science in Electrical Engineering (1981), Louisiana State University, Louisiana; Bachelor of Science in Electrical Engineering and Bachelor of Science in Physics/Mathematics (1979) from Texas A&I University, Texas. Dabipi was the chairman, Department of Engineering and Aviation Sciences, University of Maryland Eastern Shore. Prior to coming to University of Maryland Eastern Shore, he was the Interim Chairman, and Chairman, Electrical Engineering Department, Southern University, Louisiana. His experiences include working at Bell Communications Research and AT&T Bell Labs as a member of technical staff during the summers of 1984 through 1987. He has authored/co‐authored many technical articles for publications and presentations. He is currently a professor of Electrical Engineering in the Engineering and Aviation Sciences Department.

Paul Davidsson is Professor of Computer Science at Malmö University Sweden. He received his Ph.D. in Computer Science in 1996 from Lund University, Sweden. Davidsson is the Director of the Internet of Things and People Research Centre at Malmö University. His research interests include the application of agent technology, simulation, artificial intelligence, information systems, and data mining. Current application areas include transport and energy systems. The results of this work have been reported in more than 180 peer‐reviewed scientific articles published in international journals, conference proceedings, and books. Davidsson has been member of the program committee for more than one hundred scientific conferences and workshops.

Varun Dutt is a Professor in the School of Computing and Electrical Engineering at IIT Mandi. He earned his Ph.D. in Engineering and Public Policy from Carnegie Mellon University (CMU) in 2011, where he also completed several M.S. degrees. Prior to joining IIT Mandi, he was a post‐doctoral fellow at CMU’s Dynamic Decision‐Making Laboratory. His interdisciplinary research lies at the intersection of computer science, economics, and decision‐making, with a focus on applying computational and experimental models to solve problems in management, environmental policy, and socio‐economic domains. Dr. Dutt serves as an Associate Editor for the Frontiers in Cognitive Science journal and as a Review Editor for the Frontiers in Decision Neuroscience journal. He is also a senior member of IEEE.

Jeanette Eriksson holds a Ph.D. in Software Engineering from Blekinge Institute of Technology, Sweden. Her dissertation, “Supporting the cooperative design process of end‐user tailoring,” emphasizes the need for collaboration between different roles (stakeholders) such as end users, administrators, and software developers in order to achieve sustainable systems. Eriksson’s research has addressed tailorable business systems, sensor games for emotion regulation, games for well‐being, and wearables for managing health and chronic disease. She has worked with health care‐related research for several years and has collaborated with a range of different health care institutions, including hospitals, retirement homes, and senior day care centers. Eriksson is leader of the application area Smart Health in the Internet of Things and People Research Center (IoTaP RC, http://iotap.mah.se/). The IoTaP Research Center collaborates with over 30 industrial partners to conduct research that contributes to the development of Internet of Things (IoT) technologies and applications that are both useful and usable. In particular, the Research Center emphasizes the importance of including “people” as a part of IoT systems.

Akaa Agbaeze Eteng received the BEng degree in electrical/electronic engineering from the Federal University of Technology Owerri, Nigeria, in 2002, the MEng. degree in telecommunications and electronics from the University of Port Harcourt, Nigeria, in 2008, and the Ph.D. degree in electrical engineering from Universiti Teknologi Malaysia, in 2016. He is currently a lecturer with the Department of Electrical/Electronic Engineering, University of Port Harcourt. His research interests include radio frequency identification, wireless energy transfer, radio frequency energy harvesting, and wireless powered communications. He has many publications in these areas.

Farnaz Farid is a Senior Lecturer and Academic Program Advisor for the Cyber Security and Behavior program in the School of Social Sciences. Farnaz is also co‐leading the University's Global Challenge initiative, “Realizing Digital Futures.” Her research spans multidisciplinary fields, including cybersecurity, healthcare technology, and distributed networking, with a strong focus on mitigating online harms, misinformation, and fraud, particularly among vulnerable populations such as Culturally and Linguistically Diverse (CALD) communities, while fostering healthier and safer communities. She has an established track record with over 40 peer‐reviewed publications. Her projects aim to work towards a sustainable future by addressing cybersecurity challenges in critical infrastructure (e.g., healthcare, water), smart cities, smart agriculture, and marine pollution mitigation, leveraging AI and human‐centered digital technologies. She has led multiple projects on chronic diseases, including adolescent diabetes detection, skin cancer detection, reducing hospital readmissions, and assessing mental health conditions in the workplace using Artificial Intelligence Technologies. Farnaz has secured multiple external research grants and was a key researcher in obtaining the prestigious Google exploreCSR funding for two consecutive years. In 2023, she co‐led the successful delivery of the Google exploreCSR program with a diverse cohort of students under the theme: “The Development of AI and Machine Learning to Detect and Analyze Threats for SOC Operations at the Western Clinic for Cybersecurity Aid and Community Engagement (CACE).” Farnaz has over 15 years of experience spanning academia and industry. She joined Western Sydney University as a Lecturer in 2021, following her role as an Associate Lecturer in the School of Computer Science at the University of Sydney. Prior to transitioning to academia, she held several roles at IBM, beginning as an IT Specialist and Application Developer and later advancing to Project Manager. At IBM, she contributed to B2B application integrations, web marketing, and development projects for the company and its business partners, driving revenue growth through digital innovation.

Lucas Finco has years of experience working with utilities on managing the demand side of their business with data analytics, forecasting, and planning. He is a proven innovator, providing state‐of‐the‐art ideas and analyses that are enabling a new, smarter electric grid to emerge. He continues to innovate new concepts and valuation methods that are opening up possibilities for new energy paradigms. Mr. Finco has a B.S. in Applied Math, Physics, & Engineering, an M.A. in Physics, and an MBA in Finance & Entrepreneurship.

Alvis Fong (Senior Member, IEEE) is currently a professor with the Department of Computer Science, Western Michigan University. Prior to that he was a professor at the Auckland University of Technology, New Zealand, and an associate professor with Nanyang Technological University, Singapore. His research interests include information processing and management, multimedia, and communications.

Bernard Fong received his Bachelor’s degree in electronics from the University of Manchester Institute of Science and Technology and Doctor of Philosophy degree in health information systems from the University of New South Wales in 1993 and 2005, respectively. He is a professor with the Department of Electrical Engineering, Chang Gung University. He currently serves as the managing editor for the IEEE Smart Cities Newsletter and Academic Editor for PLOS ONE. He has over 150 scientific publications with some of his work published in top tier journals such as IEEE Communications Magazine, IEEE Wireless Communications, IEEE Transactions on Intelligent Transportation Systems, IEEE Transactions on Evolutionary Computation, Annals of the Rheumatic Diseases, and Nature.

João Vitor de Carvalho Fontes