Project - Internet of Things - ثاني ثانوي
Part 1
1. IoT Fundamentals
2. The IoT in Our Lives
3. Building IoT applications with Arduino
4. Building an IoT cloud application
Part 2
5. IoT Advanced Applications
6. ++IoT Programming With C
7. IoT messaging
8. IoT Wireless Sensor Network Simulation
Project Smart healthcare is one of the most important sectors that loT technologies improve. A variety of devices and systems are interconnected and exchange large amounts of data. Medical and biological data are considered the most private personal data and must be protected by companies and governments. 1 In traditional healthcare, medical and biological data would be used by the patient, their doctors, hospitals, and medical centers. In smart healthcare, this data can be accessed from many more points. Write down the types of devices, services, and systems that transport, process, or store personal biological data through smart healthcare systems. 2 Technology companies that build loT systems are not the only ones responsible for protecting biological data. Governments are accountable for providing legislation and regulation to protect citizens from personal data misuse or breach. Search the Internet for examples of the legislation supplied by the Kingdom of Saudi Arabia for smart healthcare systems. Search the Internet for similar legislation provided by another country of your choosing. 3 After you have written down your notes, use them to create a PowerPoint presentation that shows the potential issues of security and privacy in smart healthcare and the difference in legislation between the KSA and another country of your choosing. وزارة التعليم 2173-1445 204
Wrap up Now you have learned to: > Describe how body sensor networks are utilized in smart healthcare applications. > Define the types of UAV sensors that are used in smart agriculture IoT applications. > Identify the main domains of the one M2M architecture. > Distinguish the different layers of the loT World Forum architecture. > Identify the differences between NFC and RFID technologies > Identify the networking protocols that are used in Wireless Personal Area Networks (WPANS). > Classify the main principles of loT security. > Identify security techniques that are established in lot privacy. KEY TERMS 6LOWPAN Bluetooth Body Sensor Network Cyber Physical System Data Masking Edge Computing Electrocardiogram Electroencephalogram Internet of Health Things IoT World Forum Architecture IPv6 LoRaWAN Machine To Machine NFC oneMZM Architecture Personal Area Network Pseudonymization RFID Thread UAV Wireless Personal Area Network Zigbee 205