The Internet of Things

A special issue of Future Internet (ISSN 1999-5903).

Deadline for manuscript submissions: closed (31 October 2010) | Viewed by 11327

Special Issue Editors


E-Mail Website
Guest Editor
Centre for Advanced Spatial Analysis, Faculty of the Built Environment, University College London, 90 Tottenham Court Road, London W1T 4TJ, UK
Interests: internet of things; smart cities; citizen participation; agent based modelling
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Information Systems Group, Salford Business School, Salford, Greater Manchester, UK

E-Mail Website
Guest Editor
Duncan of Jordanstone College of Art & Design, University of Dundee, Dundee, UK

E-Mail Website
Guest Editor
School of Engineering & Design, Brunel University, Uxbridge, UK

E-Mail Website
Guest Editor
Interactive Media Design College of Art, University of Dundee, Dundee, UK

E-Mail Website
Guest Editor
Chair of Design Informatics, School of Design, Edinburgh College of Art - University of Edinburgh, Edinburgh EH39 DF, Scotland, UK
Interests: digital social architectures; locative media; time and space studies

Special Issue Information

Dear Colleagues,

“Spimes are manufactured objects whose informational support is so overwhelmingly extensive and rich that they are regarded as material instantiations of an immaterial system. Spimes begin and end as data. They’re virtual objects first and actual objects second.”
Bruce Sterling, Shaping Things, (2005).

The special issue of Future Internet is focused on topics encompassing the emerging technical and cultural phenomenon known as ‘The Internet of Things’. The term is attributed to the Auto-ID research group at MIT in 1999, and was explored in depth by the International Telecommunication Union who published a report bearing the same name at the United Nations net summit in 2005. The term, ‘Internet of things’, refers to the technical and cultural shift that is anticipated as society moves towards a ubiquitous form of computing in which every device is ‘on’, and every device is connected in some way to the Internet. The specific reference to ‘things’ refers to the concept that every new object manufactured will also be able to part of this extended Internet, because they will have been tagged and indexed by the manufacturer during production. It is also envisaged that consumers will have the ability to ‘read’ the tags through the use of mobile ‘readers’ and use the information connected to the object, to inform their purchase, use and disposal of an object.

The Call for Papers includes:

  • Internet of Things communication systems and network infrastructures.
  • The Geography of Things: Location and tracking of objects.
  • Applications of the Internet of Things.
  • RFID and Tagging Technologies.
  • Security, Privacy and Issues relating to linking ‘things’ to location and users.
  • Issues relating to the connection of everyday objects to the Internet.
  • Emerging Standards for an Internet of Things.
  • The creative and artistic potentials provided by the internet of things.
  • The impact of the internet of things on current art practices in areas such as (but not limited to) authorship, archiving, design, exhibitions, gallery spaces, locative media and the original artwork.

Andrew Hudson-Smith
Maria Edith Burke
Simone O’Callaghan
Angelina Karpovich
Morna Simpson
Chris Speed
Guest Editors

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

675 KiB  
Article
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices
by Helena Rifà-Pous and Jordi Herrera-Joancomartí
Future Internet 2011, 3(1), 31-48; https://doi.org/10.3390/fi3010031 - 14 Feb 2011
Cited by 86 | Viewed by 10789
Abstract
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of network devices jeopardize the actual implementation of such mechanisms. In this [...] Read more.
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of network devices jeopardize the actual implementation of such mechanisms. In this paper, we perform a wide analysis on the expenses of launching symmetric and asymmetric cryptographic algorithms, hash chain functions, elliptic curves cryptography and pairing based cryptography on personal agendas, and compare them with the costs of basic operating system functions. Results show that although cryptographic power costs are high and such operations shall be restricted in time, they are not the main limiting factor of the autonomy of a device. Full article
(This article belongs to the Special Issue The Internet of Things)
Show Figures

Back to TopTop