Abstract
The connection of physical things to the Internet makes it possible to access remote sensor data and to control the physical world from a distance. The mash-up of captured data with data retrieved from other sources, e.g., with data that is contained in the Web, gives rise to new synergistic services that go beyond the services that can be provided by an isolated embedded system. The Internet of Things is based on this vision. A smart object, which is the building block of the Internet of Things, is just another name for an embedded system that is connected to the Internet. There is another technology that points in the same direction—the RFID technology. The RFID technology, an extension of the ubiquitous optical bar codes that are found on many everyday products, requires the attachment of a smart low-cost electronic ID-tag to a product such that the identity of a product can be decoded from a distance. By putting more intelligence into the ID tag, the tagged thing becomes a smart object. The novelty of the Internet of Things (IoT) is not in any new disruptive technology, but in the pervasive deployment of smart objects.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Baronti, P., et al. (2007). Wireless sensor networks: A survey on the State of the Art and the 802.15.4 and Zigbee Standards. Computer Communication, 30, 1655–1695. Elsevier.
Bhattacharayya, R. et al. (2010). Low-cost, ubiquitous RFID-tag-antenna-based sensing. Proceedings of the IEEE. 98 (10). 1593-1600.
Clerckx, B., Popovic, Z., & Murch, R. (2022). Future networks with wireless power transfer and energy harvesting. Proceedings of the IEEE, 110(1), 3–7.
Finkenzeller, K. (2003). RFID handbook. Wiley.
Gadh, R., et al. (2010). RFID: A unique radio innovation for the 21st century. Proceedings of the IEEE, 98(2), 1541–1680.
Huebscher, M. C., & McCann, J. A. (2008). A survey of autonomic computing–degrees, models and applications. ACM Computing Surveys, 40(3), 7.1–7.28.
Juels, A., & Weis, S. A. (2005). Authenticating pervasive devices with human protocols. In Proceedings of CRYPTO 2005 (pp. 293–308). Springer.
Kortuem, G., et al. (2010). Smart objects as the building block for the internet of things. IEEE Internet Computing, 2010, 44–50.
Kumar, K., & Lu, Y. H. (2020). Cloud computing for mobile users: Can offloading computation save energy? IEEE Computer, 2010, 51–56.
Langley, P., Laird, J. E., & Rogers, S. (2009). Cognitive architectures: Research issues and challenges. Cognitive System Research, 10(2), 141–160.
Landwehr, C. E., & Goldschlag, D. M. (1997). Security issues in networks with internet access. Proceedings of the IEEE, 85(12), 2034–2051.
Pappu, R., et al. (2002). Physical one-way functions. Science, 297, 2026–2030.
Vermesan, O., et al. (2009). Internet of things – Strategic research roadmap. European Commission-Information Society and Media DG.
Washington’s Axe. (2010). Wikipedia. http://en.wikipedia.org/wiki/George_Washington%27s_axe#George_Washington.27s_axe
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kopetz, H., Steiner, W. (2022). Internet of Things. In: Real-Time Systems. Springer, Cham. https://doi.org/10.1007/978-3-031-11992-7_13
Download citation
DOI: https://doi.org/10.1007/978-3-031-11992-7_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-11991-0
Online ISBN: 978-3-031-11992-7
eBook Packages: Computer ScienceComputer Science (R0)