Abstract

This chapter presents a combined approach to visualize the IoT and cyber-physical system in any wireless communication networks. The brief overview of IoT and its applications in wireless sensor network (WSN) are elaborated in current era. In today’s present situation and the challenges faced during COVID-19 pandemic how the things can be monitored through IoT is being focused in this chapter. Also, the threats challenges and monitoring of cyber-physical system for security is presented in analysis form. WSN provides a bridge between the physical and virtual world and finds use in numerous applications like environmental monitoring, civil structural health monitoring and industrial process monitoring. Lately, it has found much use in the latest technology called Internet of Things (IoT). It seems that IoT has a great potential in shaping our future where everything will be connected together all the time. The major challenges faced by WSN include energy-efficiency, heterogeneity, and systematic design. WSN comprise of autonomous sensors which are capable of wirelessly transmitting their sensed parameter-values (also called packets) to remotely 188located sink node. The sink node is a WSN node which has the capability to assemble the data from all the nodes and forward it to farther distances to the remote base station through wired connections. The data transmission from source node to sink node is done by taking multi-hops which means that data is not sent directly to the destination node but through jumping from one intermediate node to another until the sink is reached. The sensor nodes also act as wireless routers which transmit data to other sensor-routers. So, sensor devices are very useful in deployment, collection of data, act as a IoT sensor devices as an application in technology. IoT is a device which can be used as application while a cyber-physical system is a collection of various mechanical components which are controlled and managed by different devices and algorithms. An IFM (Information Flow Monitor) is an application to backtrack queries and find the culprit in an error that has occurred in the cyber system. However, while backtracking and flow monitoring is not always guaranteed in terms of secure and efficient transaction. In some cases, the sender may deny the authority of the data so the information flow monitors may fail to provide a trustful and authentic source of data. Thus, the chapter focuses on both the issues of IoT integration with cyber-physical security (CPS) system. The key challenges and some solutions are proposed for the researchers for future work.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call