0% found this document useful (0 votes)
63 views

An Analysis of Internet of Things (Iot) : Novel Architectures, Modern Applications, Security Aspects and Future Scope With Latest Case Studies

This document provides an overview of the Internet of Things (IoT) including its definition, architecture, applications and security aspects. Some key points: - IoT connects physical objects to the internet and allows them to generate and exchange data. This brings visibility and opportunities for optimization across many industries. - IoT devices include sensors that can detect conditions like temperature and use connectivity through WiFi and networks to share information. This information is processed and used for various applications. - Challenges for IoT adoption include ensuring reliable connectivity, security of connected devices and frameworks for monetizing the data and applications generated. Widespread availability of internet access and falling costs of sensors are helping enable more IoT applications.

Uploaded by

Cak Riz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views

An Analysis of Internet of Things (Iot) : Novel Architectures, Modern Applications, Security Aspects and Future Scope With Latest Case Studies

This document provides an overview of the Internet of Things (IoT) including its definition, architecture, applications and security aspects. Some key points: - IoT connects physical objects to the internet and allows them to generate and exchange data. This brings visibility and opportunities for optimization across many industries. - IoT devices include sensors that can detect conditions like temperature and use connectivity through WiFi and networks to share information. This information is processed and used for various applications. - Challenges for IoT adoption include ensuring reliable connectivity, security of connected devices and frameworks for monetizing the data and applications generated. Widespread availability of internet access and falling costs of sensors are helping enable more IoT applications.

Uploaded by

Cak Riz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Published by : International Journal of Engineering Research & Technology (IJERT)

http://www.ijert.org ISSN: 2278-0181


Vol. 6 Issue 06, June - 2017

An Analysis of Internet of Things (IoT): Novel


Architectures, Modern Applications, Security
Aspects and Future Scope with Latest Case
Studies
IoT in Latest Trends

Mohd Muntjir Mohd Rahul


Department of Information Technology Department of Information Technology
College of Computers and Information Technology College of Computers and Information Technology
Taif University, Taif, Saudi Arabia Taif University, Taif, Saudi Arabia

Hesham A. Alhumyani
Department of Computer Engineering
College of Computers and Information Technology
Taif University, Taif, Saudi Arabia

Abstract—While we might be thinking, “one of these things is more recently. Some maintain the Internet of Things will
not like the others,” these are all examples of the Internet of entirely transform how computer networks are used for the
Things (IoT). The Internet of Things (IoT) connects the physical next 10 or 100 years, while others consider IoT is just hype
and the cyber worlds. On these days, one of the main objectives that won't much impact the daily lives of most people. The
of Internet is its own progression. The Internet of Things (IoT)
"Internet of things" (IoT) is becoming an increasingly growing
is a pattern where everyday objects can be furnished with
classifying, sensing, networking and processing potentials that topic of conversation both in the workplace and outside of it.
will allow them to correspond over the Internet to accomplish It's a concept that not only has the potential to impact how we
some purpose. The future of Internet of Things are, transform live but also how we work. The Internet of things creates an
the real world things into intelligent virtual things. The Internet opportunity to evaluate, assemble and analyze an ever-
of Things (IoT)in tends to unite everything in our world under increasing selection of behavioral information.
general infrastructures. Every object will have an exclusive It is expected that IoT devices will be incorporated into all
identifier and will be able to locate itself and connect to the forms of energy consuming devices such as switches, bulbs,
Internet. Moreover, Radio Frequency Identification (RFID) power outlets, televisions, etc and be proficient to
techniques will be the base of Internet of Things (IoT).
communicate with the utility supply company in order to
Eventually, IoT devices will be pervasive, context-aware and will
allow ambient ability and enable knowledge growth in efficiently balance power generation and energy consumption.
proficiently. This paper reports on the current state of research The Internet of Things (IoT) is a term coined by Kevin
and the meaning of IoT is defined with its progression structure. Ashton, who perceived a system of ubiquitous sensors
Moreover, present study attends to IoT conception through concerning the physical world to the Internet. Though things,
organized review of scholarly research papers, and professional Internet, and connectivity are the three core factors of Internet
discussions with competent. We also discussed about Internet of of Things (IoT), the importance is in closing the breach
Things (IoT) by probing the literature, recognizing current between the physical and digital world in self-reinforcing and
trends and relating challenges that threaten IoT transmission. self-improving techniques. [4]. Internet of Things definition is
Though, this paper will give good conception for the new
the vast network of devices connected to the Internet,
researchers, who want to do research in this field of Internet of
Things (IoT). including smart phones and tablets and almost anything with a
sensor on it – cars, machines in production plants, jet engines,
Keywords—Internet of Things, IoT, Machine to machine, oil drills, wearable devices, and more. These “things” collect
Ubiquitous, Ambient, Internet, RFID, Wi-Fi, Sensors, Actuators, and exchange data. IoT – and the machine-to-machine (M2M)
cloud computing, smart city technology behind it – are bringing a kind of “super visibility”
to nearly every industry. Imagine utilities and telcos that can
I. INTRODUCTION predict and prevent service outages, airlines that can remotely
The term Internet of Things (IoT) was invented by industry monitor and optimize plane performance, and healthcare
researchers but has surfaced into mainstream public view only organizations that can base treatment on real-time genome

IJERTV6IS060238 www.ijert.org 422


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

analysis. The business possibilities are endless. Internet of it’s going to be a major engine for creating new products and
Things symbolizes a general perception for the ability of new services. Of all the technology trends that are taking place
network devices to sense and collect data from the world, and right now, perhaps the biggest one is the Internet of Things;
then contribute that data across the Internet where it can be it’s the one that’s going to give us the most disruption as well
processed and developed for various interesting reasons. [1]. as the most opportunity over the next five years. In my next
The Internet-of-Things (IoT) is steadily becoming one of the post in this two-part series, we’ll explore just how big this is
most outstanding technologies that emphasize this world, going to be [107]. In order to realize the benefits of IoT, such
through facilitate the orchestration and coordination of a large as increasing customer intimacy, improving operational
number of physical and virtual Internet-Connected-Objects excellence and generating new revenue streams through
(ICO) towards human-centric services in a selection of sectors business model innovation; there are three critical components
counting logistics, industry, trade, smart cities and ambient for the ecosystem to thrive: reliable connectivity, reliable
supported living. Furthermore, we will be presenting a set of security and an agile monetization framework. Broadband
internet-of-things technologies and applications in the form Internet is become more widely available, the cost of
of a series of knowledge. connecting is decreasing, more devices are being created with
Wi-Fi capabilities and sensors built into them, technology
costs are going down, and smartphone penetration is
skyrocketing.

Fig. 1. IoT

The propagation of internet-connected-objects authorizes


interactions both between devices and things but also between
things and people, hence providing unparalleled application
prospects. Definitely, people can directly connect to things Fig. 2. IoT Map
such as mobile phones, electronic health records and many
more things, via wearable sensors such as motion sensors and Anyone who says that the Internet has basically improved
smart textiles. Similarly, things connect to each other e.g., as society may be right but at the same time, the ultimate
part wireless sensors networks, but also as part of a Wireless transformation essentially still lies ahead of us. Numerous
Sensor Network's communication with other devices such as innovative technologies are now joining in a way that means
gateways, mobile devices etc. Other example is car sensors, the Internet is on the edge of a generous development as
which are, connect to intelligent transport systems and with objects large and small get connected and simulate their own
sensors from other medium. These communications are in web uniqueness. Succeeding on from the Internet of
most cases empowering by various networking frameworks, computers when our servers and personal computers were
which offer ubiquitous high-quality connectivity, such as 4G linked to an inclusive network system, and the Internet of
and 5G infrastructures [2]. Cloud-based applications are the mobile systems, while it was the turn of telephones and other
key to using leveraged data. The Internet of Things doesn’t mobile components, the next stage of development is the
function without cloud-based applications to interpret and Internet of things (IoT), when more or less everything will be
transmit the data coming from all these sensors. The cloud is connected and accomplished in the virtual domain. [3] This
what enables the apps to go to work for you anytime, revolution will be the Internet’s largest expansion ever and
anywhere. Here’s what I mean when I say people never think will have sweeping conclusions on every industry, and all of
big enough. This isn’t just about money savings. It’s not about our everyday lives.
bridges, and it’s not about cities. This is a huge and
fundamental shift. When we start making things intelligent,

IJERTV6IS060238 www.ijert.org 423


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

intelligent fashion that ever before. Most of us think about


“being connected” in terms of electronic devices such as
servers, computers, tablets, telephones and smart phones. In
what’s called the Internet of Things, sensors and actuators
embedded in physical objects—from roadways to
pacemakers—are linked through wired and wireless
networks, often using the same Internet IP that connects the
Internet. These networks churn out huge volumes of data that
flow to computers for analysis. When objects can both sense
the environment and communicate, they become tools for
understanding complexity and responding to it swiftly.
What’s revolutionary in all this is that these physical
information systems are now beginning to be deployed, and
some of them even work largely without human intervention.
The “Internet of Things” refers to the coding and networking
of everyday objects and things to render them individually
machine-readable and traceable on the Internet [6]-[11].
Fig. 3. IoT Structure Much existing content in the Internet of Things has been
created through coded RFID tags and IP addresses linked into
II. THE IOT HISTORY
an EPC (Electronic Product Code) network [12].
A. IoT Definition
There is no unique definition available for Internet of Things
B. History
that is acceptable by the world community of users [11]. In
The Internet of Things (IoT) is the network of physical
fact, there are many different groups including academicians,
objects, devices, vehicles, buildings and other items which
researchers, practitioners, innovators, developers and
are embedded with electronics, software, sensors, and
corporate people that have defined the term, although its
network connectivity, which enables these objects to collect
initial use has been attributed to Kevin Ashton, an expert on
and exchange data [19]. The Internet of Things allows objects
digital innovation. What all of the definitions have in
to be sensed and controlled remotely across existing network
common is the idea that the first version of the Internet was
infrastructure, creating opportunities for more-direct
about data created by people, while the next version is about
integration between the physical world and computer-based
data created by things [63]. The best definition for the
systems, and resulting in improved efficiency, accuracy and
Internet of Things would be: “An open and comprehensive
economic benefit; when IoT is augmented with sensors and
network of intelligent objects that has the capacity to auto-
actuators, the technology becomes an instance of the more
organize, share information, data and resources, reacting and
general class of cyber-physical systems, which also
acting in face of situations and changes in the environment
encompasses technologies such as smart grids, smart homes,
“Internet of Things is maturing and continues to be the latest,
intelligent transportation and smart cities. Each thing is
most hyped concept in the IT world [5]. Over the last decade uniquely identifiable through its embedded computing system
the term Internet of Things (IoT) has attracted attention by but is able to interoperate within the existing Internet
projecting the vision of a global infrastructure of networked infrastructure. Experts estimate that the IoT will consist of
physical objects, enabling anytime, anyplace connectivity for almost 50 billion objects by 2020.
anything and not only for anyone [6]. Internet has become
more prevalent in our lives in a shorter time period than any
other technology in the history. It revolutionized the
communicate way of people. Currently, the Internet involves
the process of connecting machines, equipment, software, and
things in our surroundings [9]. This connection will be
through the use of the unique Internet protocol address that
permits things for communicating to each other without
human intervention. This new scenario is called IoT. The
term IOT is formalized by MIT Auto-ID center at [16].
“Things are active participants in business, information and
social processes where they are enabled to interact and
communicate among themselves and with the environment by
exchanging data and information sensed about the
environment [64].
The Internet of Things can also be considered as a global
network, which allows the communication between human- Fig. 4. IoT History
to-human, human-to-things and things-to-things, which is C. Genesis
anything in the world by providing unique identity to each
The Internet of Things is a technological revolution that
and every object [7]. IoT describes a world where just about
represents the future of computing and communications, and
anything can be connected and communicates in an

IJERTV6IS060238 www.ijert.org 424


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

its development depends on dynamic technical innovation in process, information system, etc.). This Internet of Things
a number of important fields, from wireless sensors to will be accordingly based on massive parallel IT systems.
nanotechnology. The first Internet appliance was a Coke The last characteristics are space considerations. In an
machine at Carnegie Melon University in the early 1980s. Internet of Things, the precise geographic location and
Programmers working several floors above the vending dimensions of a thing will be critical information [57].
machine wrote a server program that chased how long it had Therefore, facts about a thing, such as its location in time
been since a storage column in the machine had been and space, will be less critical to track because the person
unfilled. The programmers could connect to the machine over processing the information can decide whether or not that
the Internet, check the status of the machine and determine information is important to the action being taken, and if so,
whether or not there would be a cold drink waiting them, add the missing information (or decide to not take the action).
should they decide to make the trip down to the machine. (Note that some things in the Internet of Things will be
Though the buzzword “Internet of Things” evolution was set sensors, and sensor location is usually important. The Figure
out a way back in 1980’s with coffee vending machine, 2 shows a technology road map of the IoT [58].
Kevin Auston, the Executive Director of Auto-ID Labs in
MIT in 1999, coins the original term. The concept of IoT first
became very popular through the Auto-ID center in 2003 and
in related market analysts publications. Right from the
beginning the Internet of Things evolution started, there were
many things or objects connected to the internet for the
different applications through diverse technologies depending
on the type of object for the comfort ability of Human [5].

D. Features of IoT
The basic idea of the IoT was introduced in a technical report
of the ITU in 2005. It has physical things and virtual things,
which exist in the real world and cyberspace. To be more
accurate, the physical things are connected to the virtual
things using the Internet [8]. The ITU described the concept
of IoT, and classify entities into four major categories of
tagging things, feeling things, thinking things, and shrinking Fig. 5. Technology Roadmap of Internet of Things
things. In addition, Wikipedia also defines the characteristics
of the IoT, and classifies it into six categories of intelligent E. Time Series
architecture [9], complex systems, size considerations, time Accessed from the URL dated on 24/3/2013:
considerations, and space considerations. First of all, http://postscapes.com/internet-of-things-history [5].
intelligence has two different perspectives, which are ambient  1999: the term Kevin Ashton, Executive Director of
intelligence and autonomous control, and embedded the Auto-ID Center in Massachute Institute of
intelligence. Ambient intelligence and autonomous control Technology (MIT), coins Internet of Things
are not part of the original concept of the IoT. However, there  1999: Neil Gershenfeld first time spoken about IoT
is a shift in research to integrate the concepts of the IoT and principles in his book titled “When Things Start to
autonomous control [10] presents an AI-oriented perspective Think”
of the IoT, which can be more clearly defined as leveraging
 1999: MIT Auto-ID Lab, originally founded by
the capacity to collect and analyze the digital traces left by
Kevin Ashton, David Brock and Sanjay Sarma in
people when interacting with widely-deployed smart things to
this year. They helped to develop the Electronic
discover knowledge about human life, environmental
Product Code
interactions, and social connections/behaviors. Second, the
 2000: LG announced its first Internet of refrigerator
architecture will likely be event-driven [73]. Therefore,
plans
model-driven and functional approaches will coexist with
 2002: The Ambient Orb created by David Rose and
new ones able to treat exceptions and the unusual evolution
others in a spin-off from the MIT Media Lab is
of processes. In IoT, the meaning of an event will not
released into wild with NY Times Magazine naming
necessarily be based on a deterministic or syntactic model. It
would, however, be based on the context of the event itself. it as one of the Ideas of Year
The third characteristic is a complex system. In semi-open or  (2003-2004): RFID is deployed on a massive scale
closed loops. it will therefore be considered and studied as a by the US Department of Defense in their program
complex system due to the huge number of different links and and Wal-Mart in the commercial world
interactions between autonomous actors, and its capacity to  2005: The UN’s International Telecommunications
integrate new actors. The fourth is time considerations. In this Union (ITU) published its first report on the Internet
Internet of Things, made of billions of parallel and of Things topic
simultaneous events, time will no more be used as a common  2008: Recognition by the EU and the First European
and linear dimension but will depend on each entity (object, IoT conference is held

IJERTV6IS060238 www.ijert.org 425


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

 2008: A group of companies launched the IPSO 3) Presentation—easy to understand visualization and
Alliance to promote the use of IP in networks of interpretation tools that can be designed for the different
“Smart Objects” and to enable the Internet of Things applications [62].
 2008: The FCC voted 5-0 to approve opening the
use of the ‘white space’ spectrum H. Fault tolerance for IoT
 (2008-2009): The IoT was born according to Cisco’s Based on the fact that IoT will face billions more devices, IoT
Business Solutions Group will be more vulnerable to be attacked than the Internet, and
 2008: US National Intelligence Council listed the there might be some attacker that want to control some
IoT as one of the 6 “Disruptive Civil Technologies” devices directly or indirectly [20]. One way to know the level
with potential impacts on US interests out to 2025 of reliability of a service is having a defined threshold for
 2010: Chinese Premier Wen Jiabao calls the IoT a service fault tolerance. However, it should be considered that
key industry for China and has plans to make major any solution for this aspect should be lightweight enough that
investments in Internet of Things [59] it can be implemented on IoT. As a conclusion, we should
 2011: IPv6 public launch-The new protocol allows first design all elements with secure mechanisms by
for 340, 282, 366, 920, 938, 463, 463, 374, 607, improving the quality of the implementing software. Also,
431,768,211, 456 (2128) addresses [60] every element of the IoT should be able to know the real-time
status of the network, to provide the feedback to other
elements. Therefore, having a monitoring system would be
F. Aliases helpful in this matter. Finally, any time that the network faces
Different people calling Internet of Things with different degradation in the performance or has a failure in the
names but the objective of IoT are same in the broad sense. performance; every element should have the ability to protect
The aliases of Internet of Things include Web of Things, them. So, various privacy protocols should also be defined
Internet of Objects, Embedded Intelligence, Connected for this situation to instruct the elements the way they should
Devices and Technology Omnipotent, Omniscient and work in unusual situations to fix the situation and be able to
Omnipresent. In addition to these, it has also calling as recover quickly. Hence, the viability of recovery services is
counting [5] obvious [37].
 Cyber Physical Systems “Integrations of computation
and physical processes”, in which bringing the real and
virtual worlds together
 Pervasive Computing is a computer environment in
which virtually every object has processing power with
wireless or wired connections to a global network
 Ubiquitous Computing or Calm technology, where
technology becomes virtually invisible in our lives
 Machine-to-Machine Interaction means no human
intervention whilst devices are communicating end-to-
end
 Human-Computer Interaction involves the study,
planning, and design of interaction between people and
computers
 Ambient Intelligence is a developing technology that
will increasingly make our everyday environment
sensitive and responsive.
Fig. 6. Fault tolerant in IoT
G. Requirements
For successful implementation of Internet of Things (IoT),
Also, by providing automatic services for example in M2M
the prerequisites are (a) Dynamic resource demand (b) Real
(Machine to Machine) communication, the need for providing
time needs (c) Exponential growth of demand (d) Availability
safety and security will be more crucial. Some examples are
of applications (e) Data protection and user privacy (f)
different unpredictable characters and patterns. This matter
Efficient power consumptions of applications (g) Execution
of the applications near to end users (h) Access to an open will be worse even in the distributed environment, which is
the main domain for IoT. This challenge stays valid even for
and inter operable cloud system [5]. According to another bounded and closed environments. There are some hot
author, there are three components, which required for researches considering algorithms, which are able to derive
seamless Internet of Things (IoT) computing [61] value from unstructured data to increase performance. There
1) Hardware—composed of sensors, actuators, IP cameras, are different factors determining main criteria of an identifier,
CCTV and embedded communication Hardware such as: governance, security and privacy. Also, lots of
2) Middleware—on demand storage and computing tools for existing identification schemes have been created long time
data analytics with cloud and Big Data Analytics ago for local usage and for specific objectives. Therefore, the
need to have a global reference for identification is vital.

IJERTV6IS060238 www.ijert.org 426


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

Logical Layered Architecture of the Telecommunication


I. Gartner’s Hype cycle Management Network, we establish new five-layer
Garter’s Information Technology Hype Cycle [22] is a way to architecture of the Internet of Things. We believe this
represent emergence, adoption, maturity and impact on architecture is more helpful to understand the essence of the
applications of specific technologies (2) In the adjacent Internet of Things, and we hope it is helpful to develop the
graph, X- axis denotes expectations and Y- axis denotes time Internet of Things [93]. The proliferation of these devices in
factors (3) Internet of Things has been identified as one of the a communicating–actuating network creates the Internet of
emerging technologies in Internet of Things as noted in Things (IoT), wherein sensors and actuators blend seamlessly
Gartner’s IT Hype Cycle (4) It has been forecasted that IoT with the environment around us, and the information is
will takes around 5-10 years for market adoption as of the shared across platforms in order to develop a common
2012. See the picture for data [5]. operating picture (COP). The first architectural component of
IoT is the perception layer. It collects data using sensors,
which are the most important drivers of the Internet of
Things.
Implementation of IoT is based on an architecture consisting
of several layers: from the field data acquisition layer at the
bottom to the application layer at the top [11]. The layered
architecture is to be designed in a way that can meet the
requirements of various industries, enterprises, societies,
institutes, governments etc. Fig. 3 presents a generic layered
architecture for IoT [14]. The layered architecture has two
distinct divisions with an Internet layer in between to serve
the purpose of a common media for communication. The two
lower layers contribute to data capturing while the two layers
at the top are responsible for data utilization in applications
[65].

A. The 5-Layer Architecture


The Internet of Things (IoT) is defined as a paradigm in
which objects equipped with sensors, actuators, and
processors communicate with each other to serve a
meaningful purpose.
The 3-layer architecture became not sufficient due to the
expected IoT development. Therefore, 5-layer architecture is
proposed. The first layer is called business. The purpose of
this layer is to define the IOT applications charge and
management. Also, it is responsible about the user’s privacy
Fig. 7. Gartner’s hype cycle for emerging technologies and all research related to IOT applications [15]. The second
layer is called application. The target of this layer is
III. ARCHITECTURE OF INTERNET OF THINGS(IOT) determining the types of applications, which will be used in
the IoT [66].
Under the name “Internet of Things” (IoT) or “Industry 4.0”
companies are developing a new network of
intercommunicating objects of our everyday life. The Internet
is continuously changing and evolving. The main
communication form of present Internet is human-human.
The Internet of Things (IoT) can be considered as the future
evaluation of the Internet that realizes machine-to-machine
learning. Reference architectures are of great help for
standardization, as they define guidelines that can be used
when planning the implementation of an IoT system. The
Internet of Things is a technological revolution that
represents the future of computing and communications. It is
not the simple extension of the Internet or the
Telecommunications Network. It has the features of both the
Internet and the Telecommunications Network, and also has
its own distinguishing feature. Through analyzing the current
accepted three-layer structure of the Internet of things, we
suggest that the three-layer structure can't express the whole
features and connotation of the Internet of Things. After
reanalyzing the technical framework of the Internet and the Fig. 8. Architecture of IoT with IoT Elements

IJERTV6IS060238 www.ijert.org 427


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

B. European FP7 Research Project


Internet of Things is a platform where every day devices
become smarter. (1) This is to be used as a blueprint for IoT
concrete architecture design; (2) Model: Architectural
Reference Model (ARM); (3) Developed By: Project partners
of the European FP7 Research Project IoT-A; (4) Derived
From: Business considerations, application-based
requirements and current technologies [5].

Fig. 9. Architecture of IoT (A: three layers) (B: five layers)

The third layer is called processing. Its responsibility is to


handle the information gathered by perception layer. The
handling process contains two main topics; storing and
analyzing [9]. The target of this layer is extremely hard due to
the huge gathered information about system things. So, it
uses some techniques such as database software, cloud
computing, ubiquitous computing, and intelligent processing
in information processing and storing. The fourth layer is
called transport. It seems like the network layer in the 3-layer
architecture [8]. It transmits and receives the information
from the perception layer to the processing layer and via
versa. It contains many technologies such as infrared, Wi-Fi,
and Bluetooth. Also, the target of this layer is to address each
thing in the system using IPV6. The fifth layer is called Fig. 11. FP7 Research
perception. The target of this layer is to define the physical
meaning of each thing in the IoT system such as locations C. ITU Architecture
and temperatures [74]. It also gathers the information about According to the recommendations of the International
each object in the system and transforms this data to signals. Telecommunication Union (ITU), the network, Architecture
In addition, it contains the technologies that are used in the of Internet of Things consists of
IoT such as the RFID and the GPRS [9]. Following Figure (a) The Sensing Layer
presents the 5-Layer architecture. (b) The Access Layer
(c) The Network Layer
(d) The Middleware Layer
(e) The Application Layers
These are like the Open Systems Interconnection (OSI)
reference model in network and data communication [56].

D. IoT Forum Architecture


The IoT Forum says that the Internet of Things Architecture
is basically categorized into 3 types including Applications,
Processors and Transpiration.

Fig. 10. Architecture of IoT

IJERTV6IS060238 www.ijert.org 428


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

Fig. 14. Kun Han, Shurong Liu, Dacheng Zhang and Ying Han’s (2012)’s
Architecture [56]

G. Cloud and Fog Based Architectures


Let us now discuss two kinds of systems architectures: cloud
and fog computing (see the reference architectures in [94]).
Note that this classification is different from the classification
in given Section, which was done on the basis of protocols
Fig. 12. International Telecommunication Union Architecture [100]. In particular, we have been slightly vague about the
nature of data generated by IoT devices, and the nature of data
E. Qian Xiao Cong, Zhang Jidong Architecture
processing. In some system architectures the data processing
According to Qian Xiao Cong and Zhang Jidong (2012), the
is done in a large centralized fashion by cloud computers.
traditional IoT is formed by three layers. The bottoms
Such a cloud centric architecture keeps the cloud at the center,
perception layer, whose function is cognizing and collecting
applications above it, and the network of smart things below it
information of objects. The middle is transportation layer,
[95]. Cloud computing is given primacy because it provides
which consists of OFC, mobile phone networks, and fixed
great flexibility and scalability. It offers services such as the
telephone networks, broadcasting networks, and closed IP
core infrastructure, platform, software, and storage.
data networks for each carrier. And finally the top is
Developers can provide their storage tools, software tools,
application layer, where abundant applications run. Typical
data mining, and machine learning tools, and visualization
applications include in this layer are smart traffic, precise
tools through the cloud. Lately, there is a move towards
agriculture, intelligent logistics, smart industry, environment
another system architecture, namely, fog computing
protection, mining monitor, remote nursing, safety defense,
[[96],[97],[98]] where the sensors and network gateways do a
smart government etc [56].
part of the data processing and analytics. A fog architecture
[99] presents a layered approach as shown in Figure below,
which inserts monitoring, preprocessing, storage, and security
layers between the physical and transport layers. The
monitoring layer monitors power, resources, responses, and
services. The preprocessing layer performs filtering,
processing, and analytics of sensor data. The temporary
storage layer provides storage functionalities such as data
replication, distribution, and storage. Finally, the security
layer performs encryption/decryption and ensures data
integrity and privacy. Monitoring and preprocessing are done
on the edge of the network before sending data to the cloud.

Fig. 13. Qian Xiao cong, Zhang Jidong Architecture

F. Kun Han, Shurong Liu, Dacheng Zhang and Ying


Han’s (2012)’s Architecture
In “Initially Researches for the Development of SSME under
the Background of IoT”, the model is

IJERTV6IS060238 www.ijert.org 429


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

Fig. 16. RFID


Fig. 15. Fog architecture of a smart IoT gateway

IV. TECHNOLOGIES OF IOT

A. RFID and near-field communication


In the 2000s, RFID was the dominant technology. Later, NFC
became dominant (NFC). NFC has become common in smart
phones during the early 2010s, with uses such as reading
NFC tags or for access to public transportation. RFID is the
process by which items are uniquely identified using radio
waves, and NFC is a specialized subset within the family of
RFID technology. Specifically, NFC is a branch of High-
Frequency (HF) RFID, and both operate at the 13.56 MHz
frequency.
Radio-frequency identification (RFID) is the wireless use of
electromagnetic fields to transfer data, for the purposes of
automatically identifying and tracking tags attached to
objects [9]. The tags contain electronically stored
information. Some tags are powered by electromagnetic
induction from magnetic fields produced near the reader.
Some types collect energy from the interrogating radio waves Fig. 17. NFC in RFID
and act as a passive transponder. Other types have a local
power source such as a battery and may operate at hundreds
of meters from the reader. Unlike a barcode, the tag does not
necessarily need to be within line of sight of the reader and
may be embedded in the tracked object. RFID is one method
for Automatic Identification and Data Capture (AIDC). RFID
tags are used in many industries, for example, an RFID tag
attached to an can be tracked through warehouses; and
implanting RFID microchips in livestock and pets allows
positive identification of animals. Since RFID tags can be
attached to cash, clothing, and possessions, or implanted in
animals and people, the possibility of reading personally
linked information without consent has raised serious privacy
concerns [11].

IJERTV6IS060238 www.ijert.org 430


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

C. Internet Protocol (IPv6)


The original idea of the Auto-ID Center is based on RFID-
tags and unique identification through the Electronic Product
Code however this has evolved into objects having an IP
address or URI [9]. An alternative view, from the world of
the Semantic Web focuses instead on making all things (not
just those electronic, smart, or RFID-enabled) addressable by
the existing naming protocols, such as URI. The objects
themselves do not converse, but other agents, such as
powerful centralized servers acting for their human owners,
may now refer them to [11]. The next generation of Internet
applications using Internet Protocol Version 6 (IPv6) would
be able to communicate with devices attached to virtually all
human-made objects because of the extremely large address
space of the IPv6 protocol [18]. This system would therefore
be able to scale to the large numbers of objects envisaged. A
combination of these ideas can be found in the current
GS1/EPC global EPC Information Services (EPCIS)
specifications. This system is being used to identify objects in
Fig. 18. NFC (Near Field Communication) industries ranging from aerospace to fast moving consumer
products and transportation logistics [9].
These concerns resulted in standard specifications
development addressing privacy and security issues. ISO/IEC D. Electronic Product Code (EPC)
18000 and ISO/IEC 29167 use on-chip cryptography methods An Electronic Product Code (EPC) is one common set of data
for un-traceability, tag and reader authentication, and over- stored in a tag. EPC’s are coded on RFID tags because of
the-air privacy. ISO/IEC 20248 specifies a digital signature which objects can be tracked and identified uniquely. The tag
data structure for RFID and barcodes providing data, source contains a 96-bit string of data. The first eight bits are a
and read method authenticity. This work is done within header, which identifies the version of the protocol [21]. The
ISO/IEC JTC 1/SC 31 Automatic identification and data next 28 bits identify the organization that manages the data
capture techniques [16]. for this tag; the EPC Global consortium 22 assigns the
organization number. The next24 bits are an object class,
B. Sensors identifying the kind of product; the last 36 bits are a unique
Many IoT devices have sensors that can register changes in serial number for a particular tag. These last two fields are set
temperature, light, pressure, sound and motion. They are your by the organization that distributed the tag (WIKIPEDIA,
eyes and ears to what's going on the world. Before we talk 2013). Rather like a URL, the entire electronic product code
about what they do, let's describe them. These sensors are number can be used as a key into a global database to
part of a device category called a micro electromechanical exclusively identify a particular product [23].
system (MEMS) and are manufactured in much the same way
microprocessors are manufactured, through a lithography E. Optical tags and quick response codes
process [9]. These sensors can be paired with an application- This is used for low cost tagging. Phone camera decodes QR
specific integrated circuit or an ASIC. This is a circuit with a code using image-processing techniques [12]. In reality QR
limited degree of programming capability and is hardwired to advertisement campaigns gives less turnout, as users need to
do something specific. It can also be paired with have another application to read QR codes 0[11].
microprocessor and will likely be attached to a wireless radio
for communications. F. Barcode
For example, you are away on vacation and the house is Barcode is just a different way of encoding numbers and
empty. A moisture sensor detects water on the basement letters by using combination of bars and spaces of varying
floor. That sensor finding is processed by an app, which has width. Behind Bars serves its original intent to be descriptive
received another report from a temperature sensor that detects but is not critical. In The Bar Code Book, Palmer (1995)
the flow of water in the main water pipe. When water acknowledges that there are alternative methods of data entry
automobile during production can be used to track its techniques. Quick Response (QR) Codes the trademark for a
progress through the assembly line; RFID-tagged type of matrix barcode first designed for the automotive
pharmaceuticals flows, it takes away heat and lowers the industry in Japan [56]. Barcodes are optical machine-
temperature. That both sensors are detecting anomalies is readable labels attached to items that record information
cause for concern. A high rate of flowing water may signal a related to the item. Recently, the QR Code system has
burst pipe, triggering an automated valve shutoff; a slight become popular outside the automotive industry due to its
water flow might be a running toilet, and the water on the fast readability and greater storage capacity compared to
basement floor by routine leakage from a heavy rain [13]. In standard. There are 3 types of barcodes of Alpha Numeric,
either case, you get a machine-generated message describing Numeric and 2 Dimensional. Barcodes are designed to be
the findings.

IJERTV6IS060238 www.ijert.org 431


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

machine-readable. Usually laser scanners read them, they can K. Actuators


also be read using a cameras [24]. An actuator is something that converts energy into motion,
which means actuators drive motions into mechanical
G. Wireless Fidelity (Wi-Fi) systems. It takes hydraulic fluid, electric current or some
Wireless Fidelity (Wi-Fi) is a networking technology that other source of power. Actuators can create a linear motion,
allows computers and other devices to communicate over a rotary motion or oscillatory motion. Cover short distances,
wireless signal [5]. Vic Hayes has been named as father of typically up to 30 feet and generally communicate at less than
Wireless Fidelity. The precursor to Wi-Fi was invented in 1 Mbps [5]. Actuators typically are used in manufacturing or
1991 by NCR Corporation in Nieuwege in the Netherland. industrial applications. There are three types of actuators are
The first wireless products were brought on the market under (1) Electrical: ac and dc motors, stepper motors, solenoids (2)
the name Wave LAN with speeds of 1 Mbps to 2 Mbps. Hydraulic: use hydraulic fluid to actuate motion (3)
Today, there are nearly pervasive Wi-Fi that delivers the high Pneumatic: use compressed air to actuate motion. All these
speed Wireless Local Area Network (WLAN) connectivity to three types of actuators are very much in use today. Among
millions of offices, homes, and public locations such as these, electric actuators are the most commonly used type.
hotels, cafes, and airports. The integration of Wi-Fi into Hydraulic and pneumatic systems allow for increased force
notebooks, handhelds and Consumer Electronics (CE) and torque from smaller motor [36].
devices has accelerated the adoption of Wi-Fi to the point
where it is nearly a default in these devices [25]. Technology L. Wireless Sensor Networks (WSN)
contains any type of WLAN product support any of the A WSN is a wireless network consisting of spatially
IEEE802.11 together with dual-band, 802.11a, 802.11b, distributed autonomous devices using sensors to
802.11g and 802.11n. Nowadays entire cities are becoming cooperatively monitor physical or environmental conditions,
Wi-Fi corridors through wireless APs. such as temperature, sound, vibration, pressure, motion or
pollutants, at different locations (Wikipedia). Formed by
H. ZigBee hundreds or thousands of motes that communicate with each
ZigBee is one of the protocols developed for enhancing the other and pass data along from one to another [5]. A wireless
features of wireless sensor networks [5]. ZigBee technology sensor network is an important element in IoT paradigm.
is created by the ZigBee Alliance, which is founded in the Sensor nodes may not have global ID because of the large
year 2001. Characteristics of ZigBee are low cost, low data amount of overhead and large number of sensors. WSN based
rate, relatively short transmission range, scalability, on IoT has received remarkable attention in many areas, such
reliability, and flexible protocol design. It is a low power as military, homeland security, healthcare, precision
wireless network protocol based on the IEEE 802.15.4 agriculture monitoring, manufacturing, habitat monitoring,
standard [26]. ZigBee has range of around 100meters and a forest fire and flood detection and so on [26]. Sensors
bandwidth of 250 kbps and the topologies that it works are mounted to a patient’s body are monitoring the responses to
star, cluster tree and mesh. It is widely used in home the medication, so that doctors can measure the effects of the
automation, digital agriculture, industrial controls, medical medicines [27].
monitoring &power systems.
M. Artificial Intelligence (AI)
I. Bluetooth low energy Artificial Intelligence refers to electronic environments that
This is one of the latest technologies. All newly releasing are sensitive and responsive to the presence of people. In an
smart phones have BLE hardware in them. Tags based on ambient intelligence world, devices work in concert to
BLE can signal their presence at a power budget that enables support people in carrying out their everyday life activities in
them to operate for up to one year on a lithium coin cell easy, natural way using Information and Intelligence that is
battery [11]. hidden in the network connected devices. It is characterized
by the following systems of characteristics (1) Embedded:
J. Near Filed Communication (NFC) Many Net- worked devices are integrated in to the
Near Field Communication (NFC) is a set of short-range environment (2) Context Aware: These devices can recognize
wireless technology at 13.56 MHz, typically requiring a you and your situational context (3) Personalized: They can
distance of 4 cm. NFC technology makes life easier and more be tailored to your needs (4) Adaptive: They can change in
convenient for consumers around the world by making it response to you (5) Anticipatory: They can anticipate your
simpler to make transactions, exchange digital content, and desires without conscious mediation [5].
connect electronic devices with a touch. Allows intuitive
initialization of wireless networks and NFC is V. APPLICATIONS OF IOT
complementary to Bluetooth and 802.11 with their long The potentialities offered by the IoT make it possible to
distance capabilities at a distance circa up to 10 cm. It also develop numerous applications based on it, of which only a
works in dirty environment, does not require line of sight, few applications are currently deployed [11]. Internet of
easy and simple connection method [56]. Philips and Sony Things examples extend from smart connected homes to
companies first develop it. Data exchange rate now days wearables to healthcare. In fact, IoT is slowly becoming part
approximately 424 kbps. Power consumption during data of every aspect of our lives. In future, there will be intelligent
reading in NFC is under 15ma [34]. applications for smarter homes and offices, smarter
transportation systems, smarter hospitals, smarter enterprises

IJERTV6IS060238 www.ijert.org 432


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

and factories [15]. Not only are Internet of Things B. Smart environments domain
applications enhancing our comfort, but they also give us 1) Smart water sup ply
more control to simplify routine work life and personal tasks. Smart cities must monitor water supply to ensure that there is
In the following subsections, some of the important example adequate access for resident and business need. Wireless
applications of IoT are briefly discussed. Sensor Networks provide the technology for cities to monitor
their water piping systems more accurately and discover their
greatest water loss risks [11]. Cities that are addressing water
leakage problem with sensor technology are producing high
savings from their investment. Tokyo, for example, has
calculated they save $170 million each year by detecting
water leakage problems early (LIBELIUM, 2013). The
system can report pipe flow measurement data regularly, as
well as send automatic alerts if water use is outside of an
estimated normal range. This allows a smart city to determine
the location of leaking pipes and prioritizes repairs based on
the amount of water loss that could be prevented [41].

2) Smart homes and offices


Various electronic gadgets around us such as microwave
ovens, refrigerators, heaters, air conditioners, fan and lights
surround us. Actuators and sensors can be installed in these
devices in order to utilize the energy sufficiently and also to
add more comfort in life. These sensors can measure the
outside temperature and even can determine the occupants
inside the rooms and thereby control the amount of heating,
cooling and flow of light etc. Doing all these can help us to
minimize the cost and increase energy saving [11].
Fig. 19. Applications of IoT
3) Improved gyms
A. Healthcare Involving new technologies like a separate exercise profile,
The IoT is proposed to improve the quality of human life by which can be installed on machines, can enhance the
automating some of the basic tasks that humans must gymnasium experience and each person can be identified
perform. In that sense, monitoring and decision-making can from his identification id alone and thereby, concerned
be moved from the human side to the machine side [11]. One profile will get activated [84].
of the main applications of IoT in healthcare is in assisted
living scenarios. Sensors can be placed on health monitoring 4) Food sustainability
equipment used by patients. The information collected by Food that we eat has to go through various stages before they
these sensors is made available on the Internet to doctors, arrive in the refrigerators. They are bound in a strict food
family members and other interested parties in order to cycle: production, harvesting, transportation and distribution.
improve treatment and responsiveness Additionally, IoT With the use of appropriate sensors, we can prevent the food
devices can be used to monitor a patient’s current medicines from climatic damages by keeping a good eye on
and evaluate the risk of new medications in terms of allergic temperature, humidity, light, heat etc. [11]. Sensors can
reactions and adverse interactions [16]. measure these variations precisely and notify the concerned
person. Monitoring helps in prevention of possible plant.[85]

C. Transportation and logistics domain


1) Smart parking
The new Smart Parking sensor’s to be buried in parking
spaces to detect the arrival and departure of vehicles. The
Smart parking provides extensive parking management
solutions which helps motorists save time and fuel
(LIBELIUM, 2013). A significant contribution to congestion
arises from motorists searching for accessible parking spaces
[11]. Providing accurate information about parking spaces
helps traffic flow better, and this will also allow the
deployment of application to book parking spaces directly
from the vehicle [17]. This will help to reduce CO2 emissions
and to minimize traffic jams.
Fig. 20. IoT in Healthcare

IJERTV6IS060238 www.ijert.org 433


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

attractions. Hovering your mobile phone over the tag within


its reading range so that the additional information about the
marker can be displayed on the screen can do this.

4) Logistics
Implementing the Internet of Things in Retail chain
monitoring has many advantages: RFID and NFC can be used
to monitor almost every link of supply chain, ranging from
commodity details, raw material purchasing, production,
transportation, and storage, sale of product and after sales
services. With the help of IoT, we will track the inventory in
the warehouse so that stock can be refilled at the appropriate
time for continuous sale and this will reduce the waiting time
of customer which result in customer satisfaction, which
further results in increased sales [28].
VI. ADVANTAGES OF IOT
There are many advantages of incorporating IoT into our
lives, which can help individuals, businesses, and society on a
daily basis. For individuals this new concept can come in
Fig. 21. Transportation and Logistics
many forms including health, safety, financially, and every
2) 3D assisted driving day planning [29].
Vehicles like cars, buses and trains along with the roads and Following are the advantages of IoT (Internet of Things):
rails equipped with sensors may provide valuable information  IoT network benefits not one but all i.e. individuals,
to the driver to provide better navigation and safety. With the society, stake holders of businesses etc. due to the
use of assisted driving, we will be able to find the right track fact that IoT network saves time and money. IoT
with prior information about traffic jams and incidents. In an systems deliver faster and accurately with minimum
Enterprise context, information about the vehicle transporting utilization of energy. This improves quality of life.
goods together with information about the type and status of  It is used for patient monitoring i.e. various types of
the goods can integrate to provide valuable information about wireless sensors are installed on the patient body,
the delivery time, delivery delays and faults [86]. which communicate with the IoT network, and
provides all the required information of the patient
under treatment.
 IoT concept is used in home security devices, which
are monitored and controlled either locally or
remotely using easy to use applications available on
mobile phones or smartphones. Typical IoT devices
are security alarm; Camera, sensors, door lock etc.
are used in home automation environment.
 IoT is used in asset and individual tracking,
inventory control, energy conservation, shipping etc.
 It is similar to M2M but it has applications beyond
M2M. M2M is used only for machine-to-machine
communication. In IoT, things communicate
themselves to its owner indicating its location and
conditions.
 The integration of IoT into the health care system
could prove to be incredibly beneficial for both an
individual and a society.
 A chip could be implemented into each individual,
allowing for hospitals to monitor the vital signs of
the patient. By tracking their vital signs, it could
help indicate whether or not serious assessment is
necessary.
Fig. 22. Transportation [13]  With all of the information that is available on the
Internet, it can also scare people into believing they
3) Augmented maps need more care than what is really needed.
Tourist augmented maps with tags allow NFC-equipped Hospitals already struggle to assess and take care of
phones to browse the information about the places and the patients that they have. By monitoring
quickly connect it to the web services providing information individual’s health, it will allow them to judge who
about hotels, restaurants, monuments, theater and the local

IJERTV6IS060238 www.ijert.org 434


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

needs primary attention. Internet the Smart Grid expands, conserving more
 The Internet of Things can also assist people with energy (Frenzel, 2012).
their personal safety. ADT, which is a home  Devices can make decisions and adapt without
security system, allows individuals to monitor their human guidance to reduce their energy usage. The
security systems at home through their phones, with IoT has many advantages to businesses, individuals,
the ability to control it. Also, another technology consumers, the environment, and society, but as with
that has already been released is GM OnStar. This any technology, there are always repercussions and
is a system that is embedded in GM cars that can controversies that arise.
detect if a crash has occurred and it automatically
calls 9-1-1. It can also track the movement of the The Major Advantages of IoT
car.
 IoT can also function as a tool that can save people Communication: IoT encourages the communication between
money within their households. If their home devices, also famously known as Machine-to-Machine
appliances are able to communicate, they can (M2M) communication. Because of this, the physical devices
operate in an energy efficient way. are able to stay connected and hence the total transparency is
 Finally, IoT can assist people with their everyday available with lesser inefficiencies and greater quality [31].
plans. A very interesting example that was given in
a video was the communication between many
Automation and Control: Due to physical objects getting
devices that automatically adjusted to let an
connected and controlled digitally and centrally with wireless
individual sleep in. Although this may sound
infrastructure, there is a large amount of automation and
unimportant, the misusage of time costs us “$135
control in the workings. Without human intervention, the
billion a year” (Koreshoff, 2012). By allowing
machines are able to communicate with each other leading to
physical devices to communicate, it is taking the
faster and timely output.
data that is individually collected, sharing it, and
then translating the information into ways to make
our current systems more efficient [30]. Information: It is obvious that having more information helps
 Businesses can also reap many benefits from the making better decisions. Whether it is mundane decisions as
Internet of Things. IoT can be useful in many needing to know what to buy at the grocery store or if your
different categories including asset tracking and company has enough widgets and supplies, knowledge is
inventory control, shipping and location, security, power and more knowledge is better.
individual tracking, and energy conservation. As
mentioned before, IoT allows for the communication Monitor: The second most obvious advantage of IoT is
between devices, commonly referred to as Machine- monitoring. Knowing the exact quantity of supplies or the air
to-Machine (M2M) communication. With this being quality in your home can further provide more information
possible, physical devices are able to communicate that could not have previously been collected easily. For
to people letting them know their condition and instance, knowing that you are low on milk or printer ink
where it is located. could save you another trip to the store in the near future.
 Devices such as trucks or ships allow for the Furthermore, monitoring the expiration of products can and
maximum capacity to be filled by communication will improve safety.
amongst devices and then relaying that information
to a person to capitalize on the data supplied. Time: As hinted in the previous examples, the amount of time
 All of these combined maximize revenue by cutting saved because of IoT could be quite large. And in today’s
cost of inefficiencies within the business. A specific modern life, we all could use more time.
example from “A Successful ‘Internet of Things’
Hinges on M2M” article, is the operation of Nestles Money: The biggest advantage of IoT is saving money. If the
Nespresso Coffee Machine, which has “the ability to price of the tagging and monitoring equipment is less than the
monitor factors such as temperature setting, amount of money saved, then the Internet of Things will be
vibration, and pressure helps ensure quality output, very widely adopted. IoT fundamentally proves to be very
potentially leading to greater customer satisfaction helpful to people in their daily routines by making the
and continued repeat business” (Frenzel, 2012). appliances communicate to each other in an effective manner
Although the idea seems quite simple, it can be very thereby saving and conserving energy and cost. Allowing the
advantageous for a company to utilize the IoT to data to be communicated and shared between devices and
ensure quality service is given to their customers. then translating it into our required way, it makes our systems
 Another advantage of IoT is the ability to track efficient. Automation of daily tasks leads to better monitoring
individual consumers and targeting these consumers of devices. The IoT allows you to automate and control the
based on the information supplied by the devices. In tasks that are done on a daily basis, avoiding human
a way, it provides a more “personalized” system that intervention. Machine-to-machine communication helps to
could potentially increase business sales and maintain transparency in the processes. It also leads to
increases their demographic. Additionally, with the uniformity in the tasks. It can also maintain the quality of
increased amount of devices connected to the

IJERTV6IS060238 www.ijert.org 435


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

service. We can also take necessary action in case of of the Internet and technology in general. However,
emergencies. relying on technology on a day-to-day basis, making
decisions by the information that it gives up could
Efficient and Saves Time: The machine-to-machine lead to devastation. No system is robust and fault-
interaction provides better efficiency, hence; accurate results free. We see glitches that occur constantly in
can be obtained fast. This results in saving valuable time. technology, specifically involving the Internet.
Instead of repeating the same tasks every day, it enables Depending on the amount that an individual relies
people to do other creative jobs. on the information supplied could be detrimental if
the system collapses. The more we entrust and the
more dependent we are on the Internet could lead to
Saves Money: Adopting this technology and keeping the
a potentially catastrophic event if it crashes.
devices under surveillance can achieve optimum utilization of
energy and resources. We can be alerted in case of possible  Finally the connecting of more and more devices to
bottlenecks, breakdowns, and damages to the system. Hence, the Internet will result in the loss of jobs. The
we can save money by using this technology. automation of IoT will have a devastating impact on
the employment prospects of less-educated workers
(Schumpeter, 2010). For example, people who
Better Quality of Life: All the applications of this technology evaluate inventory will lose their jobs because
culminate in increased comfort, convenience, and better devices can not only communicate between each
management, thereby improving the quality of life [31]. other, but also transmit that information to the
owner. We already are witnessing jobs being lost to
VII. DISADVANTAGES OF IOT automate machines, such as the checkout line in
supermarkets and even ATM’s. These
 Three of the main concerns that accompany the disadvantages can be largely devastating to society
Internet of Things are the breach of privacy, over- as a whole, as well as individuals and consumers
reliance on technology, and the loss of jobs. [31].
 When anything is put on the Internet it will always
be there. Of course there are security measures that Compatibility: Currently, there is no international standard of
are taken to protect information, but there is always compatibility for the tagging and monitoring equipment. I
the possibility of hackers breaking into the system believe this disadvantage is the most easy to overcome. The
and stealing the data. For example, Anonymous is a manufacturing companies of this equipment just need to
group of individuals that hacked into federal sites agree to a standard, such as Bluetooth, USB, etc. This is
and released confidential information to the public. nothing new or innovative needed [11].
Meanwhile the government is supposed to have the
highest level of security, yet their system was easily
Complexity: As with all complex systems, there are more
breached. Therefore, if all of our information is
opportunities of failure. With the Internet of Things, failures
stored on the Internet, people could hack into it,
could sky rocket. For instance, let’s say that both you and
finding out everything about individuals lives [32].
your spouse each get a message saying that your milk has
 Also, companies could misuse the information that
expired, and both of you stop at a store on your way home,
they are given access to. This is a common mishap
and you both purchase milk. As a result, you and your spouse
that occurs within companies all the time. Just
have purchased twice the amount that you both need. Or
recently Google got caught using information that
maybe a bug in the software ends up automatically ordering a
was supposed to be private. Information, such as the
new ink cartridge for your printer each and every hour for a
data collected and stored by IoT, can be immensely
few days, or at least after each power failure, when you only
beneficial to companies.
need a single replacement.
 The privacy issues also leads to the question of who
will control the Internet of Things? If there is only
one company, that could potentially lead to a Privacy/Security: With all of this IoT data being transmitted,
monopoly hurting consumers and other companies. the risk of losing privacy increases. For instance, how well
If there are multiple companies that are given access encrypted will the data be kept and transmitted with? Do you
to the information acquired, doesn’t that breach want your neighbors or employers to know what medications
consumers privacy? Also, where is the information that you are taking or your financial situation?
going to be stored? Phone service suppliers such as
Verizon and AT&T are no longer offering unlimited Safety: Imagine if a notorious hacker changes your
data usage for mobile phones because it is too prescription, or if a store automatically ships you an
costly, yet by 2020 it is expected that 50 billion equivalent product that you are allergic to, or a flavor that
devices will be connected, collecting and storing you do not like, or a product that is already expired. As a
data (Evans, 2011). result, safety is ultimately in the hands of the consumer to
 Another argument against IoT is the over-reliance verify any and all automation. As all the household
on technology. As time has progressed, our current appliances, industrial machinery, public sector services like
generation has grown up with the readily availability water supply and transport, and many other devices all are

IJERTV6IS060238 www.ijert.org 436


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

connected to the Internet, a lot of information is available on Smart Cities: The IoT can be used to monitor the vibrations
it. This information is prone to attack by hackers. It would be of buildings, bridges, and monuments in case the building
very disastrous if unauthorized intruder’s access private and material is threatened or overloaded. Noise pollution can be
confidential information. controlled around hospitals and schools. It can be used to
manage traffic especially during traffic jams, peak hours,
Compatibility: As devices from different manufacturers will accidents, and rains. It can be used to manage street
be interconnected, the issue of compatibility in tagging and lights―automatically switch them off in the presence of
monitoring crops up. Although this disadvantage may drop sunlight and switch them on at the onset of darkness. Another
off if all the manufacturers agree to a common standard, even good application is alerting the officials to empty the trash
after that, technical issues will persist. Today, we have bins when filled with waste.
Bluetooth-enabled devices and compatibility problems exist
even in this technology! Compatibility issues may result in Home Automation: The IoT can be used to remotely control
people buying appliances from a certain manufacturer, and program the appliances in your home. It can be useful in
leading to its monopoly in the market. detecting and avoiding thefts.

Complexity: The IoT is a diverse and complex network. Any Industrial Automation: By using this technology, we can
failure or bugs in the software or hardware will have serious automate manufacturing processes remotely. It can also prove
consequences. Even power failure can cause a lot of useful in optimizing the production processes. We can
inconvenience. manage the inventory and the supply chain. We can also
diagnose if the machines require repair and maintenance. We
Lesser Employment of Menial Staff: The unskilled workers can monitor the emission of toxic gases to avoid damage to
and helpers may end up losing their jobs in the effect of workers' health and the environment.
automation of daily activities. This can lead to unemployment
issues in the society. This is a problem with the advent of any Health Monitoring: We can use this technology to identify
technology and can be overcome with education. With daily health problems. The patterns of heart rate, pulse, digestive
activities getting automated, naturally, there will be fewer system, and blood pressure can be monitored and diagnosed
requirements of human resources, primarily, workers and less for anomalies. The information can be sent to the doctor for
educated staff. This may create Unemployment issue in the analysis. The hospital can also be contacted in times of
society. emergencies. This system will be very useful to senior
citizens and disabled people who live independently.
Technology Takes Control of Life: Our lives will be
increasingly controlled by technology, and will be dependent Smart Environment: A very important application of IoT is
on it. The younger generation is already addicted to detecting pollution and natural calamities. We can monitor
technology for every little thing. We have to decide how the emissions from factories and vehicles to minimize air
much of our daily lives are we willing to mechanize and be pollution. We can track the release of harmful chemicals and
controlled by technology. waste in rivers and the sea, thereby arresting water pollution.
We can also keep tabs on the quality of water being supplied
Scenarios: Imagine a scenario when: Your fridge can identify for drinking. We can send warnings of earthquakes and
that you have run out of milk; it contacts the supermarket and tsunamis by detecting tremors. We can keep the water level
orders the quantity you usually need, and also informs you by of rivers and dams under surveillance to be alert in case of
sending a message on your phone! Your alarm rings at 6:30 floods. The detection of forest fire is also possible with this
am; you wake up and switch it off. As soon as you switch off technology [87].
your alarm, it conveys to the geyser to heat water at a VIII. CHALLENGES OF IOT
temperature you prefer and also the coffee maker starts Providing security for this giant technology is really
brewing coffee! You are on your way while returning home challenging, mainly because there is not any boundary or
from work and you use an app on your mobile to switch on limitation on the way that it can go. In this section we provide
the lights, the AC in your home, and tune the TV to your the possible challenges that the IoT will face. Connectivity
favorite channel so that your house is ready to welcome you Variety of wired and wireless connectivity standards is
before you even open your door! What would really make a required to enable different application needs [11].
refrigerator “smart” would be if it could read tags and alert Power is critical: Many IOT applications need to run for
owners when their food is about to reach their expiry date, for year’s over2batteries and reduce the overall energy
example. Or perhaps it could refer to an online calendar and consumption.
make orders on a regular basis for certain items to be IOT is complex: IOT application development needs to be
delivered. This technology has a lot of applications in various easy for all developers, not just to experts.
fields. Following are some possible areas where we can Government interest: If Government allows then only set up
leverage the power of the Internet of Things (IoT) to solve of I.O.T in a particular country is possible. Government allow
day-to-day problems. However, it can be put to many more only when they get profit from this new technology. Also
uses. depend very much upon the economy and revenue of the
country.

IJERTV6IS060238 www.ijert.org 437


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

Compatibility: As devices from different manufacturers will may kill the patient by ordering wrong medicine. Moreover,
be interconnected; the issue of compatibility in tagging and sometimes IoT devices are considered as intellectual property
monitoring crops up. Although this disadvantage may drop that they might be highly valuable; so, they need to be
off if all the manufacturers agree to a common standard, even protected, and also, for the right of owner. However, it is an
after that, technical issues will persist [33]. Today, we have unavoidable that when a property is accessible through the
Bluetooth-enabled devices and compatibility problems exist physical environment, it can easily been misused by an
even in this technology! Compatibility issues may result in attacker [56].
people buying appliances from a certain manufacturer,
leading to its monopoly in the market. C. Identification in the IoT environment
For IoT to achieve its vision, a number of challenges need to Object and service identification is recognized as one of the
be overcome. Recently, many researchers have proposed IoT main challenges on the way to developing global Internet of
technology [8]. However, there are still a lot of challenges. In Things (IoT). Many identification services accessible these
this section, we introduce the challenges of IoT and discuss days with various means of generating and verifying
them in detail. [75] To do this, we classify the challenges of identification for the enhanced personal information
IoT into three major categories of security, data capacity, and protection. However, it has not been clearly defined yet
application. The first challenge to IoT is security. A number regarding what identification methods are purposely
of things in IoT send data to each other using the Internet. acceptable or how to use them in IoT environment.
That is a security weakness. In particular, many studies about In all layers of IoT, it is essential to provide identification. It
the IoT have proposed the REST protocol. REST has a is one of the biggest challenges based on the fact that IoT will
weakness of security because it does not maintain sessions face a tremendous number of applications and structures with
when data is sent. [76] Therefore, it should resolve the different unpredictable characters and patterns. This matter
weakness of security to provide IoT services. The second is will be worse even in the distributed environment, which is
data capacity. In IoT, many things send data to a web server the main domain for IoT. This challenge stays valid even for
or another thing. The backbone network for the IoT must bounded and closed environments. There are some hot
support a huge amount of data. To do this, existing web researches considering algorithms, which are able to derive
servers must be expanded. In addition, the backbone network value from unstructured data to increase performance. There
for the IoT must be accommodated. Therefore, the Content are different factors determining main criteria of an identifier,
Centric Network (CCN) technology and big data technology such as: governance, security and privacy. Also, lots of
should be used for the IoT. The last is the application of IoT. existing identification schemes have been created long time
Recently a number of applications developed for smartphones ago for local usage and for specific objectives. Therefore, the
and tablets. However, they are not related to the Internet of need to have a global reference for identification is vital [82].
Things. Therefore, we need a variety of applications to
realize the IoT. To do this, we should invigorate an D. Authenticating devices
ecosystem for the IoT and support a number of application Lots of devices that use the sensors and actuators should
developers [77]. follow specific policy and proxy rules for authentication to
authorize the sensors to public their information. Meanwhile,
A. Context awareness for privacy low cost solutions in this field have not been provided as
For the security methods that are based on the context much as needed [34]. Currently, if we want to provide the
awareness, it is needed that any essential part in the context security for the sensors we have to use high-cost solutions,
would be addressed effectively [20]. For example if the which is a conflict with the main goal of IoT to provide
sensor because of the bad quality cannot recognize an image, lightweight protocols [35].
the security enforcements cannot be applied to that image.
Some access features should be provided to supply the E. Data Combination
required information from context. Also, sometimes, We will have lots of different data produced by IoT.
automatic security management may work incorrectly in Combining these data to provide more comprehensible only
some context, mainly because it could not recognize the providing a large group of new general security can do
context. Providing context awareness is an essential challenge information policies, which leads us to a more complex user
in IoT [78]. profile. However, these mechanisms even may put the
security of users more in danger by sharing their information
B. Digital device in a physical ambient that may cause even harder challenges in this matter [80].
In recent years, in order to measure different information,
coupling between physical environment and processor has F. Scalability in IoT
been growing significantly. For instance, a car that can be As the technology grows the number of users and devices
driven by a computer in a center or a medicine for a patient with different type of communication and technologies grow
will be used as the sensors employed on her body providing widely. IoT needs to provide interaction for unbounded
body situation [21]. However, if there would not be any number of entities with significant differences in the
guaranteed security, all these systems can be manipulated and interaction patterns. Therefore, IoT has to provide capabilities
attacked by different hacker, and cause harmful results [79]. based access control mechanisms, to ensure the security for
For example in the above two cases, an attacker may bring up this tremendous number of elements [36].
a lethal accident by driving the car in a wrong direction, or

IJERTV6IS060238 www.ijert.org 438


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

G. Secure Setup and Configuration K. Human IoT Trust relationship


Solving the challenge of scalability of IoT has to implement There should be a specific level of trust that human can have
in such a way of having a secure Setup and structure too. The on different part of IoT. Trust on the machines along with
basic design of the system can be implemented based on that human beings still can have the privacy has been
privacy. For example, a service can be designed in such a considered widely by researchers. Trust can be defined as the
way that each user can manage a specific group of people level of confidence that is possible to have on specific service
being able of having access to the information, and the list of or entity. However, trust is not defined only for human
people can be managed dynamically [37]. Therefore, it is beings, it can even be defined for systems or machines, for
essential to provide security architecture with the appropriate example for webpages, which shows the level of trust in the
mechanisms. In another point of view, having symmetric or digital society. In another point of view, trust can be defined
asymmetric cryptographic credentials regarding the situations as how much we can be sure that system is doing its job in
provides a more secure infrastructure. The process to build the required way and providing true information. Moreover,
this structure is challenging, especially for the large number in the M2M communications in an IoT domain, each device
of devices that IoT will be faced with [81]. should have the knowledge about that how much it can trust
on the machine to transfer important and sensitive
H. CI and IoT information. This statement is true even for a machine that is
The impact of development of IoT on the CI (Critical sending crucial information to a person; in such a way that
Infrastructure), such as: energy, telecom and utilities, need important information should not be in access of any wrong
tobe cleared because IoT technology is going to be implied person. As a result, trust can be defined in three ways; first,
on the devices in CI, a clear example is the M2M (Machine to how much a user can trust ona machine; second, how much a
Machine) standardization activity. The new risks and new device can trust on another device; third, how much a device
privacy issues that IoT may bring to CI are an avoidable can trust a user [21].
challenge that should be considered. Moreover, providing
security for IoT gets more important in this matter, because L Data management
IoT in CI has to do with crucial CI's aspects, such as: Other perspective can be defined as how to manage the data.
providing safety to prevent industrial accidents, or supplying Cryptographic mechanisms and protocols usually are the best
required services to have a constant electrical power for choices to protect data, but sometimes we may not be able to
hospitals [21]. implement these techniques on small elements. Therefore, we
I. Conflicting market interest should have policies regarding how to manage any type of
IoT will make a very competitive market by providing data with various policy mechanisms. However, if this idea
correlated data from different sources. Therefore, it will help wants to be implemented, we should change many more
to satisfy costumers ‘needs more efficiently. As a result, current mechanisms [37].
providing different techniques to protect the personal data of
people will be the main issue at combing and correlating M. Lifespan of every IoT's entities
information. This goal should be satisfied by deployment low The fact that any product in IoT should have a specific short
weight privacy solutions, which is considered as a challenge lifespan, and would not survive for long years is undeniable.
[21]. As an example, UDP (User Datagram Protocol) services
provide a degree of amplification; which means that they
J. Considering IoT in an evolving Internet respond with more data than they started to communicate
The effect of Internet evolution is undeniable on IoT. The with over UDP. [71] This amplification is the result of the
way that the Internet is used and the infrastructure of fact the source address can be spoofed because UDP is
implementing Internet's elements are the two main aspects of connectionless. Hence this amplification will result in a
effecting IoT. powerful denial of service. Thus, any device, which
However, data security and privacy have determining roles in implements such, a service will face to the instability of the
evolving Internet. Preparing security and privacy protection Internet. Also the same scenarios with GSM (Global System
for the Internet through standardization will create challenges for Mobile Communications), WEP (Wired Equivalent
in this field [83]. Hence, as the paper asserts, this evolution Privacy) and a number of other wireless protocols have
will raise different questions such as: If such an Internet shown that this assumption is incorrect [38].
environment becomes the "trusted" Internet would it be In the above section, we got familiar with the current
socially acceptable for IoT to remain outside? Can such an challenges that are on the long way of flourishing IoT. It is
evolution indeed benefit IoT security and privacy? What are said that IoT will come into stage at 2020 and researchers are
the implications for IoT governance? In another point of view trying to find solutions for the weakness points of IoT. In the
any vendor should investigate any effect that can have on the next section, we will talk about the solutions that have been
Internet by designing its services if the product would be proposed and implemented to provide a safer environment for
successful. Hence, it should be studied carefully to ensure this new promising technology.
that the new design would not harm the Internet in all
IX. SECURITIES AND PRIVACY ISSUES OF IOT
different aspects such as bandwidth usage or latency in the
communication environments [38].
Despite the immense potential of IoT in the various spheres,
the whole communication infrastructure of the IoTis flawed
from the security standpoint and is susceptible to loss of

IJERTV6IS060238 www.ijert.org 439


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

privacy for the end users. Some of the most prominent sends a useless message, which is then replayed by the
security issues plaguing the entire developing IoT system attacker to create a high traffic [70].
arise out of the security issues present in the technologies iii. Homing: In case of homing attack, a search is made in the
used in IoT for information relay from one device to another. traffic for cluster heads and key managers which have the
As such some of the prominent security issues stemming out capability to shut down the entire network.
from the communication technology are the following [39]: iv. Selective forwarding: As the name suggests, in selective
forwarding, a compromised node only sends a selected few
A. Security issues
nodes instead of all the nodes. This selection of the nodes is
In the wireless sensor networks (WSNs):
done on the basis of the requirement of the attacker to
The hierarchical relationship of the various security issues
achieve his malicious objective and thus such nodes doe’s not
plaguing the wireless sensor network is shown in Figure
forward packets of data.
1.The oppressive operations that can be performed in a
v. Sybil: In a Sybil attack, the attacker replicates a single
wireless sensor network can be categorized under three
node and presents it with multiple identities to the other
categories [40]
nodes.
i. Attacks on secrecy and authentication
vi. Wormhole: This DoS attack causes relocation of bits of
ii. Silent attacks on service integrity
data from its original position in the network. This relocation
iii. Attacks on network availability: The denial of service
of data packet is carried out through tunneling of bits of data
(DoS) ([41, 42] attack falls under this category. This
over a link of low latency.
prevention of accessibility of information to legitimate users
vii. Acknowledgement flooding: Acknowledgements are
by unknown third party intruders can take place on different
required at times in sensor networks when routing algorithms
layers of a network [43,44,45]
are used. In this DoS attack, a malicious nodes poofs the
B. DoS attack on the physical layer: Acknowledgements providing false information to the
The physical layer of a wireless sensor network carries out destined neighboring nodes
the function of selection and generation of carrier frequency,
modulation and demodulation, encryption and decryption,
transmission and reception of data [46]. This layer of the
wireless sensor network is attacked mainly through
i. Jamming: In this type of DoS attack occupies the
communication channel between the nodes thus preventing
them from communicating with each other.
ii. Node tampering: Physical tampering of the node to extract
sensitive information is known as node tampering.
C. DoS attack on the link layer:
The link layer of WSN multiplexes the various data streams,
provides detection of data frame, MAC and error control.
Moreover the link layer ensures point-point or point
multipoint reliability [47].
The DoS attacks taking place in this layer are:
i. Collision: This type of DoS attack can be initiated when
two nodes simultaneously transmit packets of data on the
same frequency channel. The collision of data packets results
in small changes in the packet results in identification of the
packet as a mismatch at the receiving end. This leads to
discard of the affected data packet for re-transmission [48] Fig. 23. Hierarchical diagram of security issues in Wireless Sensor Network
ii. Unfairness: As described in, unfairness is is pleated
collision based attack. It can also be referred to as exhaustion
based attacks.
iii. Battery Exhaustion: This type of DoS attack causes
unusually high traffic in a channel making its accessibility
very limited to the nodes. Such a disruption in the channel is
caused by a large number of requests (Request To Send) and
transmissions over the channel [72].
D. DoS attack on the network layer:
The main function of the network layer of WSN is routing.
The specific DoS attacks taking place in this layer are:
i. Spoofing, replaying and misdirection of traffic.
ii. Hello flood attack: This attack causes high traffic in
channels by congesting the channel with an unusually high
number of useless messages. Here a single malicious node Fig. 24. Types of DOS Attack in Wireless Sensor Network

IJERTV6IS060238 www.ijert.org 440


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

X. SOMECASE STUDIES OF IOT from the Web to the SPOTs. This paper has contributed to a
step toward the realization of the IoT by integrating things in
A. Smart Gateway for Smart Meter the real world such as wireless sensor networks, embedded
Guinard [9] provided a Smart Gateway for Smart Meters. In devices and household appliances with any other Internet
this paper, the author designed and implemented the content. In addition, this paper describes two ways to
prototype of smart gateways for a smart meter. With the integrate devices to the Internet using REST, which directs
prototype, the author is started by illustrating the application integration based on advances in embedded computing, and a
of the IoT architecture for monitoring and controlling the Smart Gateway-based approach for resource-limited devices
energy consumption of households [49]. Figure 2 shows the [55].
architecture of smart gateways for a smart meter. The smart
gateway for a smart meter is divided into three layers. The B. Pachube
first layer is devices and sensors, so-called ploggs. Each Pachube [50] is a well-known web site related to the IoT.
plogg communicates over Bluetooth or Zigbee. The second Pachube, which pronounced patch-bay, connects people to
layer is a gateway. It is constructed of a miniature web server. devices, applications, and the IoT. It uses a web-based
Therefore, the data of ploggs is sent to the web via this service, and manages the world’s real-time data. Pachube
gateway. Finally, the third layer is the mobile interface. gives people the power to share, collaborate, and make use of
Throughout this layer, a smart meter provides variety information generated in the world around them. Figure 4
household services to users. The smart gateway supports shows the architecture of Pachube. In Figure 4, things are
service as follows: [69] sent to the Pachube server to its own data using REST. And
1. Local aggregates of device-level services the Pachube server collects data and stores it in the database
2.Various formats from things. Finally, the data provides a mash-up service with
3.Supports GET & POST method a Pachube Google Gadget. To do this, Pachube provides a
native Application Programming Interface (API). Therefore,
all devices use this API via an HTTP method to send data. In
addition, Pachube provides a variety of web data formats
such as JSON, XML, and CSV. Through this, users apply
their service and can use web and mobile applications.

Fig. 25. Architecture of the smart gateway for smart meter

The smart gateway is a C++ embedded component with the


role to automatically find all the Ploggs in the environment
and make them available as web resources. In addition, a
small footprint web server is used to enable access to each
Fig. 26. Architecture of Pachube
Plogg’s functionality over the web. To implement this, the
authors provide RESTful Ploggs and Sun SPOTs. Therefore,
C. Mobile Internet of Things (M-IoT)
it uses the HTTP methods GET,
The growing usage of connected devices, machines and
PUT, UPDATA, and DELET. In addition, to support the
vehicles is making organizations more effective and
HTTP method, the authors implement Sun SPOTs, which run
enriching the lives of individuals. To support the
a small footprint Java Virtual Machine. Sun SPOTs are
development of this Internet of Things (the IoT), the mobile
composed of two main parts: a software stack embedded on
industry is developing and standardizing a new class of
each node, and a proxy server to forward the HTTP requests

IJERTV6IS060238 www.ijert.org 441


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

technologies that will help network operators to tailor the


cost, coverage and power consumption of connectivity for
specific IoT applications. Aimed at business leaders, this
paper discusses low power, wide area (LPWA) technologies
that will enable connected devices to have a battery life
measured in years, rather than days or months [101].

Fig. 28. Network Architecture of M-IoT

Fig. 29. (a) RFID tags-to-M-IoT communication Protocol

Fig. 27. Mobile Internet of Things

Zhiyoung Shi [51] proposed the design and implementation


of a mobile Internet of Things (M-IoT) based on a TDS
CDMA network. The TD-SCMA is a well-known 3G service
in China. The 3G TD-SCDMA networks are used as the basic
network of transmitting information for the IoT. At the same
time, the TD-SCDMA mobile terminal is integrated with an
RFID reader. TD-SCDMA networks can provide high-
bandwidth and high-speed information transmission channels
for the IoT. In order to realize the information exchange
between the TD-SCDMA network and the Internet of Things,
the communication protocols of the Internet of Things are
designed and implemented. The Figure 5 shows the network
architecture. In addition, the author provides a
communication protocol for the M-IoT. To do this, the author
proposed two communication protocols, RFID tags-to-M-IoT
and M-IoT-to-RFID tags. Figure 6 (a) shows a RFID tags-to- Fig. 29. (b) M-IoT-to-RFID tags communication protocol
M-IoT communication protocol, and (b) shows M-IoT-to-
RFID tags communication protocol. The communication D. Energy management system based On Energy
protocols are modeled and simulated by OPNET. The results collection
show that M-IoT can realize mobile information interactivity The IoT is a new communication and network paradigm, and
for both fixed and mobile objects. M-IoT based on a various studies of the IoT have been conducted. Fortino
TDSCDMA network can not only expand the application of proposed a multilayered agent-based architecture for the
IoT, but also benefit from the promotion of TD-SCDMA development of proactive, cooperating, and context-aware
network applications. smart objects through a JADE-based middleware [102]. The
multilayered agent-based architecture considered a wide

IJERTV6IS060238 www.ijert.org 442


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

range of smart objects from reactive to proactive, from small external communication interface, it is mainly divided into a
to very large, and from stand-alone to social. Gubbi present a cable communication interface and a wireless communication
new vision for Internet of Things based on cloud [103]. interface. The cable communication interface mainly includes
Atzori analyzed the major opportunities arising from the RS485, RS232, USB and Ethernet cables. The wireless
integration of social networking concepts into the Internet of communication interface mainly includes the GSM, GPRS,
Things [104]. Cirani proposed a scalable and self-configuring Zigbee, WiFi, and Bluetooth modules. This paper adopts a
architecture for large-scale IoT [105]. This architecture can modular design for the universal terminal structure of the IoT.
provide autonomous services and resource discovery In addition, the author initially achieves a system, which can
mechanisms with no human intervention to smart objects provide energy permanently to the IoT using solar energy and
[106]. Qingbin Meng [52] proposed a design of an energy lithium batteries. The system makes use of solar panels to
self-sufficient Internet of Things. In addition, this study enable nodes to add energy.
initially achieves a system, which can provide energy
permanently to the Internet of Things using solar energy and E. Design Food Quality Supervision Platform Based on
lithium batteries. the IoT
To do this, this paper proposed network model of the IoT, Bing Jia [53] proposed a method for constructing a quality
which is made up of a sensor network, transmission network, supervision platform for the whole process of food
and application network [67]. First of all, the sensor network production with the use of the IoT. In addition, the authors
is like the skin and features of the IoT, and it can identify presented the crucial technology of constructing the platform
things and collect data. The sensor networks are constructed and relevant implementation, including the associated
of RFID tags, RFID readers, cameras, GPS sensors, and matching algorithms between the RFID tags and on
terminal and sensor networks. Second, the transmission dimensional code, building methods of food quality modeled
network is the nerve and the brain of the IoT and it can by the theory of ontology-based context modeling, and the
transmit and process data. The transmission network is combination and presentation methods of service functions
constructed of an integrated network of communication and for the different users. In order to use this system, the
the Internet, a network management center, information architecture of IoT was described as four layers, which
center, and intelligent processing centers. Finally, the included the object sense layer, data transmission layer,
application network combines the division of labor of the IoT information integration layer, and application layer. Figure 8
with industry needs to achieve a wide range of intelligence. shows the architecture design of PFQC-IoT. In the object
The Figure 7 shows the structure of the IoT [68]. sense layer, it used a two-dimensional barcode, RFID tags,
and sensors to collect data. In the intelligent diagnosis layer,
it integrated knowledge through a lot of business models. In
the application service layer, it provided different functions
according to different user roles.

Fig. 30. Structure of IoT

In order to implement this, the author classifies three


categories of central processing modules, external perception
Fig. 31. Architecture design of PFQC-IoT
interfaces, and external communication interfaces. In the
central processing module, they implement a terminal using a XI. SPECIFICATION OF WEB SERVICES IN IOT
low-power embedded control system. The core processor of
A. SOAP
the embedded control system is S3C6410 ARM11, which is a
low-cost, low power, and high performance microprocessor SOAP was originally part of the specification that included
solution based on 16/32-bit RISC core. In an external the Web Services Description Language (WSDL) and
perception interface, it mainly includes RFID readers, Universal Description, Discovery, and Integration (UDDI). It
infrared sensors, environmental sensors, multi-channel analog is used now without WSDL and UDDI. Instead of the
sensor interfaces, and a multi-channel sensor interface. In an discovery process described in the History of the Web
Services Specification section below, SOAP messages are

IJERTV6IS060238 www.ijert.org 443


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

hard-coded or generated without the use of a repository. provide his/her preferences and requirements through an
SOAP commonly uses HTTP, but other protocols such as interface to benefit from services offered by the cluster of
Simple Mail Transfer Protocol (SMTP) may by used. SOAP devices. Hence, there is a need of energy efficient device
can be used to exchange complete documents or to call a discovery and a user guide to provide the users requirements
remote procedure [88]. and to discover and access the services. The research work
will focus on, to design an energy efficient device discovery
B. REST
Algorithm [91].
REST (Representational state transfer) is an architectural
style consisting of a coordinated set of architectural
2) Service Discovery
constraints applied to components, connectors, and data
In the IoPTS scenario, there may be a large number of
elements, within a distributed hypermedia system. REST
services will be available at specific location, however the
appeals to developers because it has a simpler style that
user should only get relevant services as per his/her
makes it easier to use than SOAP. It is also less verbose so
requirements. Service discovery is the process by which a
that less volume is sent when communicating. REST ignores
user can identify services of his interest. It involves three
the details of component implementation and protocol syntax
roles: service provider, service requester and matchmaker.
in order to focus on the roles of components, the constraints
The service provider uses a published protocol to advertise
upon their interaction with other components, and their
the services that it can provide, the user /service requester
interpretation of significant data elements. [89].
uses a query protocol to request the service of his interest,
C. UDDI
and the matchmaker finds the service among all available
UDDI is defined as “a set of services supporting the
services, which closely match with the user’s preference [92].
description and discovery of businesses, organizations, and
other Web services providers, the web services they make TABLE. 1. DIFFERENCES BETWEEN THE IoT AND TRADITIONAL
available, and the technical interfaces which may be used to INTERNET
access those services” by OASIS (The Organization for the Topic Traditional Internet Internet of Things
Advancement of Structured Information Standards) . UDDI is Who creates Human Machine
content?
an industry initiative that enables businesses to publish their
How is the By request By pushing information
services and allows potential users to discover these services content and triggering actions
[90]. consumed?
D. WSDL How is the Using explicit defined links Through explicitly
The Web Services Description Language (WSDL) forms the content defined operators
combined?
basis for the original Web Services specification. The What is the Answer Questions Action and timely
following figure illustrates the use of WSDL. At the left is a value? information
service provider. At the right is a service consumer. What is done Both Content creation Mainly content creation
so far? (HTML) and content
consumption (search
E. Technical Aspects of Web services in IoT engines)
1) Cluster Discovery
Mobility plays an essential role in future networks, hence end
users should be be able to benefit from the services offered XII. THE FUTURE OF IOT
by the premises/infrastructure where they are moving around.
Cluster discovery is the first step to make end users aware of The recent hype about our IoT future has forced companies to
the services offered by a cluster of IoT devices. Energy consider the basic building blocks for the Internet of
consumption is a major parameter for cluster discovery, as Things—i.e., hardware, software and support—to enable
the discovery mechanism should be frequently executed. developers to deploy applications that can connect anything
Bluetooth, Bluetooth low energy and Wi-Fi technologies are within IoT’s scope. In this paper, we introduced the IoT and
typically used for device discovery in a mobile ad-hoc summarized case studies about the IoT. Through numerous
environment. In all these types are analyzed and the Internet technology advances, the world is moving towards
Bluetooth technology is chosen for device discovery. The any time, any place, anyone connected paradigm. In the
eDiscovery algorithm based on Bluetooth technology is present context, "Things" are simply those computerized and
proposed in the research to discover the device. The networked devices that become part of the IoT. Some of
simulation results show the efficiency of the eDiscovery those Things will be directly accessible over the Internet,
algorithm over existing ones. Beacon stuffing methods for whereas others would be supposedly hidden in local networks
device discovery based on Wi-Fi technology. The score- behind firewalls and address-translating routers. New
based scanning approach is proposed in this work to make applications and businesses are created continuously, and
energy efficient device discovery. Internet content is always evolving. In this climate many
Most of the device discovery mechanisms discussed in the researchers have proposed IoT technology. However, there
literature are working on the MAC layer, however, for are still a lot of challenges. In order to resolve these
middleware services, these approaches are not suitable to problems, we should overcome the challenges of the IoT.
apply. To overcome this limitation three algorithms i.e. Therefore, future work requires resolution of these
connectivity based dynamic algorithm, a policy based challenges. Grouping the web services required by user as
scalable algorithm and a window-based broadcasting well as their discovery is an important issue in IoT scenario.
algorithm. After discovering the device, the user must In the future, home automation, smart cities, intelligent

IJERTV6IS060238 www.ijert.org 444


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

transport and e-health in such domain IoT applications can be signs of maturity. However, a lot more needs to happen in the
developed. There are large numbers of devices that can sense areas of IoT applications and communication technologies.
the activity that are happening in the surrounding to provide These fields will definitely mature and impact human life in
services to the end users. Most of the IoT devices are capable inconceivable ways over the next decade.
of sensing environmental parameters but do not have the
intelligence to give proper response depending on the sensed ACKNOWLEDGEMENT
information. Hence, it is necessary that the IoT devices
should be grouped in clusters. Users must be made aware of We would like to gratefully and sincerely thank to The Dean
the presence of cluster to benefit from the services offered by and Vice Dean of our College and Chairman of our
it, and hence there is need of a cluster discovery mechanism Department for his guidance, understanding, patience, and
[54]. Our message is intended as a wake-up call for computer most importantly, his friendly nature during this research
professionals, but is also relevant to everyone involved as a paper. We would also like to thank my friends and
user. We know the potential of IoT markets is huge, but some colleagues, and the university who provided me an efficient
domains will mature more quickly than the rest. Here is support to work on this atmosphere and good infrastructure.
Internet of Things application areas that have the potential for We would also like to thank to all the previous researchers
exponential growth. who worked very hard and helped others to comprehend the
subject of Internet of Things (IoT).
XIII. CONCLUSIONS
REFERENCES
IoT has been gradually bringing a sea of technological
changes in our daily lives, which in turn helps to making our [1] Bradley Mitchell,” Introduction to the Internet of Things (IoT)”,
life simpler and more comfortable, though various https://www.lifewire.com/introduction-to-the-internet-of-things-817766
[2] John Soldatos,” Internet of Things Tutorial: Introduction”,
technologies and applications. There is innumerable http://www.kdnuggets.com/2016/12/internet-of-things-tutorial-chapter-
usefulness of IoT applications into all the domains including 1-introduction.html
medical, manufacturing, industrial, transportation, education, [3] D. Giusto, A. Iera, G. Morabito, L. Atzori (Eds.), The Internet of
governance, mining, habitat etc. Though IoT has abundant Things, Springer, 2010. ISBN: 978-1-4419-1673-0
[4] Internet of Things,” https://aws.amazon.com/iot/”
benefits, there are some flaws in the IoT governance and [5] Somayya Madakam, R. Ramaswamy, SiddharthTripathi,"Internet of
implementation level. The key observations in the literature Things (IoT): A Literature Review", Journal of Computer and
are that (1) there is no standard definition in worldwide Communications, May 2015, Volume 3, 164-173,
(2) Universal standardizations are required in architectural http://www.scirp.org/journal/jcc
[6] Kosmatos, E.A., Tselikas, N.D. and Boucouvalas, A.C. (2011)
level (3) Technologies are varying from vendor-vendor, so Integrating RFIDs and Smart Objects into a Unified Internet of Things
needs to be interoperable (4) for better global governance, we Architecture. Advances in Internet of Things: Scientific Research, 1, 5-
need to build standard protocols. Let us hope future better 12.
IoT [5]. The Internet has drastically changed the way we [7] Aggarwal, R. and Lal Das, M. (2012) RFID Security in the Context of
“Internet of Things”. First International Conference on Security of
lived, as in scenario all the interaction is done over the Internet of Things, Kerala, 17-19 August 2012, 51-56
Internet. The IoT has the potential to add a new dimension to [8] Min-Woo Ryu, Jaeho Kim, Sang-Shin Lee, and Min-Hwan Song,
this process by enabling communication between smart “Survey on Internet of Things: Toward Case Study", Smart Computing
objects. IoT should be considered as a part of future internet Review, vol. 2, no. 3, June 2012,pp 195-202
[9] Biddlecombe, E. (2009) UN Predicts “Internet of Things”. Retrieved
as everything is going to be connected in a network so that July 6.
objects can interact with each other, but still there are lots of [10] Butler, D. (2020) Computing: Everything, Everywhere. Nature, 440,
issues which are to be solved to make this a reality. Lot of 402-405.
research is required in this field, once implemented [11] Ruchi Parashar1, Abid Khan2, Neha3,"A SURVEY: THE INTERNET
OF THINGS",International Journal of Technical Research and
successfully; the quality of life is improved because of the Applications e-ISSN: 2320-8163, www.ijtra.com Volume 4, Issue 3
reduction of the effort made by humans on unimportant (May-June, 2016), PP. 251-257
things. In this paper, we also presented the technologies and [12] Yinghui H., Guanyu L., 2010. Descriptive Models for Internet of
applications that can be used to make Internet of Things a Things. IEEE International Conference on Intelligent Control and
Information Processing, Dalian, China, Pages: 483- 486.
reality. After that, we state some good examples where [13] Bo Y., Guangwen H., 2008. Application of RFID and Internet of
Internet of Things is of great use, and at last we discuss some Things in Monitoring and Anticounterfeiting for Products. International
open issues, which are still to be solved before the wide Seminar on Business and Information, Wuhan, Hubei, China, Pages:
acceptance of this technology. Thus, from all the above, the 392- 395.
[14] [ongzhu Z., Xueping W., Jiangwei C., Xianghai L., Pengfei C., 2010
contribution of our research could be useful in the literature .Automotive recycling information management based on the internet
especially in the field of IoT area, because provide a fulfill of things and RFID technology. IEEE International Conference on
scheme concerning the application of IoT. The forces behind Advanced Management Science (ICAMS), Changchun, China, page(s):
the development of Internet οf Things, technology push 620 – 622
[15] Muriel D., Juan F., 2010. Expanding the learning environment:
forces and technology pull forces, see in the IoT a vast new combining physicality and virtuality The Internet of Things for
market for the deployment of current and future information eLearning. IEEE International Conference on Advanced Learning
and communication technologies (ICT) that will help both the Technologies (ICALT), Sousse, Tunisia, Pages: 730- 731.
communication of devices. In this paper we also discussed a [16] Mealling M, 2003 Auto-ID Object Name Service (ONS) v1.0, Auto-ID
Center Working Draft
survey of the current technologies used in the IoT domain as [17] https://en.wikipedia.org/wiki/Internet_of_Things
of 2016. Currently, this field is in a very nascent stage. The [18] Miao W., Ting L., Fei L., ling S., Hui D., 2010.Research on the
technologies in the core infrastructure layers are showing architecture of Internet of things. IEEE International Conference on

IJERTV6IS060238 www.ijert.org 445


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

Advanced Computer Theory and Engineering (ICACTE), Sichuan [45] J. Sen, “A Survey on Wireless Sensor network Security”, International
province, China, Pages: 484-487. Journal of Communications Network and Information Security, vol. 1,
[19] Guangwen H., 2008. Application of RFID and Internet of Things in no. 2, (2009) August, pp. 59-82
Monitoring and Anticounterfeiting for Products. International Seminar [46] http://sensors-and-networks.blogspot.in/2011/08 physical-layer-for-
on Business and Information, Wuhan, Hubei, China, Pages: 392- 395 wireless-sensor.html
[20] Maede Zolanvari,Prof. Raj Jain,"IoT [47] Ahmad Abed AlhameedAlkhatib, and Gurvinder Singh Baicher.
Security:ASurvey",http://www.cse.wustl.edu/~jain/cse570- "Wireless sensor network architecture." International conference on
15/ftp/iot_sec/index.html,pp 1-15 computer networks and communication systems (CNCS 2012)
[21] TuhinBorgohain,UdayKumar,SugataSanyal,"Survey of Security and IPCSIT.Vol. 35. 2012, pp. 11-15
Privacy Issues of Internet of Things",Int. J. Advanced Networking and [48] transmission [48] [Sunil Ghildiyal, Amit Kumar Mishra, Ashish Gupta,
Applications Volume: 6 Issue: 4 Pages: 2372-2378 (2015) ISSN: 0975- Neha Garg, "Analysis of Denial of Service (DoS) Attacks in Wireless
0290,pp 2372-2378 Sensor Networks" IJRET: International Journal of Research in
[22] Jason Pontin: “ETC: Bill Joy's Technology Review, 29 Septemb Engineering and Technology;eISSN: 2319-1163 | pISSN: 2321-7308
November 2013 [49] Woo Ryu, Jaeho Kim, Sang-Shin Lee, and Min-Hwan Song, “Survey
[23] Z.G. Prodanoff, Optimal frame si slotted ALOHA based RFID on Internet of Things: Toward Case Study", Smart Computing Review,
Communications (2009), 1016/j.comcom.2009.11.007 vol. 2, no. 3, June 2012,pp 195-202]
[24] Grieco A., Occhipinti, E. and Colombini, D. (1989) Work Postures and [50] Web site, https://cosm.com/?Pachube_redirect=true
Musculo-Skeletal Disorder in VDT Operators. Bollettino de Oculistica, [51] Zhiyong Shi, Kui Liao, Shiping Yin, Qingbo Ou, “Design and
Suppl. 7, 99-111 Implementation of the Mobile Internet of Things based on TD-SCDMA
[25] Pahlavan, K., Krishnamurthy, P., Hatami, A., Ylianttila, M., Makela, network,” Information Theory and Information Security (ICITIS), 2010
J.P., Pichna, R. and Vallstron, J. (2007) Handoff in Hybrid Mobile Data [52] Qingbin Meng, Jie Jin, “The Terminal Design of the Energy Self-
Networks. Mobile and Wireless Communication Summit, 7, 43-47 Sufficiency Internet of Things,” Control, Automation and Systems
[26] Chen, X.-Y. and Jin, Z.-G. (2012) Research on Key Technology and Engineering (CASE), 2011 International Conference on, 2011
Applications for the Internet of Things. Physics Procedia, 33,561-566 [53] Qingbin, Yongjian Yang, “The design of food quality supervision
[27] Chorost, M. (2008) The Networked Pill, MIT Technology Review, platform based on the Internet of Things,” Transportation, Mechanical,
March and Electrical Engineering (TMEE), 2011 International Conference on,
[28] International Journal of Computer Science Engineering (IJCSE)Big 2011
Data on Internet of Things: Applications, Architecture, [54] Jyoti L. Khachane1, Latika R. Desai2,"Survey Paper on Web Services
Technologies,Techniques and Future Directions in IOT",International Journal of Science and Research (IJSR)ISSN
[29] Advantages of IoT,"Advantages of IoT | Disadvantages of IoT | Internet (Online): 2319-7064,Index Copernicus Value (2013): 6.14 | Impact
of Things",http ://www.rfwirelessworld.com/Terminology/Advantages- Factor (2014): 5.611,pp 635-637]
and-Disadvantages-of-IoT-Internet-Of-Things.html [55] StylianiChatziefthymiou and Sotirios K. Goudos,"A survey of IoT:
[30] Advantages,"The Internet of Architecture, Applications and Future Vision",4th International
Things",https://sites.google.com/a/cortland.edu/the-internet-of- conference on Modern Circuits and System Technologies, pp 1-3
things/advantages [56] Madakam, R. Ramaswamy, SiddharthTripathi,"Internet of Things
[31] Bhaskara Reddy Sannapureddy,"Pros & Cons of Internet Of Things (IoT): A LiteratureReview",Journal of Computer and Communications,
(IOT)",https://www.linkedin.com/pulse/pros-cons-internet-things-iot- 2015, 3, 164-173 Published Online May 2015 in SciRes.
bhaskara-reddy-sannapureddy http://www.scirp.org/journal/jcchttp://dx.doi.org/10.4236/jcc.2015.350
[32] Disdvantages , " The Internet of 21,pp 164-173
Things",https://sites.google.com/a/cortland.edu/the-internet-of- [57] Lianos, M. and Douglas, M. (2000) Dangerization and the End of
things/advantages Deviance: The Institutional Environment. British Journal of
[33] Towards Internet of Things: Survey and Future Vision Omar Said Criminology, 40, 261-278
o.saeed@tu.edu.sa IT/ College of Computers and Information [58] Ferguson, T. (2002) Have Your Objects Call My Object. Harvard
Technology Taif University Taif, Saudi Arabia. Mehedi Masud Business Review, June, 1-7
mmasud@tu.edu.sa CS/ College of Computers and Information [59] Dodson, S. (2008) The Net Shapes up to Get Physical. Guardian
Technology Taif University Taif, Saudi Arabia [60] Graham, M. and Haarstad, H. (2011) Transparency and Development:
[34] Whitehouse, "Security of Things: An Implementers Guide to Cyber- Ethical Consumption through Web 2.0 and the Internet of Things.
Security for Internet of NCC Group Publications, Apr. 2014 Research Article, 7
[35] Raza Shahid, "Lightweight Security Solutions for the Internet of [61] Jayavardhana, G., Rajkumar, B., Marusic, S. and Palaniswami, M.
Things", Doctoral thesis, Mlard (2013) Internet of Things: A Vision, Architectural Elements, and
[36] Malisa Vucinic, Bernard Tourancheau, Franck Rousseau, Andrzej Future Directions. Future Generation
Duda, Laurent Damon, Robert [62] Shao, W. and Li, L. (2009) Analysis of the Development Route of IoT
[37] Rodrigo Roman, Pablo Najera, Javier Lopez, "Securing the Internet of in China. Perking: China Science and Technology Information, 24,
Things", Computer Societ 58, Sep. 2011 330-331
[38] Whitehouse, "Security of Things: An Implementers Guide to Cyber- [63] Luigi A., Antonio I., Giacomo M. 2010.The Internet of Things: A
Security for Internet of NCC Group Publications, Apr. 2014 survey. Science Direct journal of Computer Networks, Volume 54,
[39] TuhinBorgohain, UdayKumar,SugataSanyal,"Survey of Security and Pages: 2787–2805
Privacy Issues of Internet of Things",Int. J. Advanced Networking and [64] Zouganeli E., Einar Svinnset I., 2009. Connected Objects and the
ApplicationsVolume: 6 Issue: 4 Pages: 2372-2378 (2015) ISSN: 0975- Internet of Things – a Paradigm Shift. International Conference on
0290,pp 2372-2378 Photonics in Switching, Pisa, Italy, Pages: 1-4
[40] [AashimaSingla, RatikaSachdeva, “Review on Security Issues and [65] Tongzhu Z., Xueping W., Jiangwei C., Xianghai L., Pengfei C., 2010
Attacks in Wireless Sensor Networks” International Journal of .Automotive recycling information management based on the internet
Advanced Research in Computer Science and Software Engineering of things and RFID technology. IEEE International Conference on
<www.ijarcsse.com>. Volume 3, Issue 4, April 2013 ISSN: 2277 128X Advanced Management Science (ICAMS), Changchun, China, page(s):
[41] M. Sharifnejad, M. Shari, M. Ghiasabadi and S. Beheshti, “A Survey 620 – 622
on Wireless Sensor Networks Security”, SETIT, (2007) [66] Gustavo G, Mario O., Carlos K., 2008. Early infrastructure of an
[42] B. T. Wang and H. Schulzrinne, “An IP traceback mechanism for Internet of Things in Spaces
reflective DoS attacks”, Canadian Conference on Electrical and [67] Gubbi, Buyya, Marusic, Palaniswami,Internet of Things (IoT): A
Computer Engineering, vol. 2, (2004)May 2-5, pp. 901-904 vision, architectural elements, and future directions, Future Generation
[43] Sen, Jaydip. "Security and privacy challenges in cognitive wireless Computer Systems 29 (2013) 1645-1660
sensor networks." arXiv preprint arXiv: 1302.2253 (2013) [68] Zanella ,Bui, Castellani, Vangelista, Zorzi, Internet of Things for Smart
[44] M. Saxena,“Security in Wireless Sensor Networks-A Layer based Cities, IEEE Internet of Things journal, VOL. 1, NO. 1, February 2014
classification”, Technical Report, Center for Education and Research in [69] Palatella ,Accettura, Vilajosana, Watteyne, Grieco, Boggia, Dohler,
Information Assurance &Security-CERIAS, Purdue University. Standarized Protocol Stack for the Internet of (Important) Things, IEEE
pages.cs.wisc.edu/~msaxena/papers/2007-04-cerias.pdf, (2007)

IJERTV6IS060238 www.ijert.org 446


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

Communications Surveys & Tutorials, VOL. 15, NO. 3, THIRD [90] Chakraborty, Dipanjan, et al. "Toward distributedservice discovery in
QUARTER 2013 pervasive computingenvironments." Mobile Computing, IEEE
[70] Huang, Li, A Semantic Analysis for Internet of Things, 2010 Transactionson 5.2 (2006): 97-112
International Conference on Intelligent Computation Technology and [91] Rambold, Michael, et al. "Towards autonomic servicediscovery a
Automation survey and comparison." ServicesComputing, 2009. SCC'09. IEEE
[71] Singh, Tripathi, Jara, A survey of Internet-of-Things: Future Vision, InternationalConference on. IEEE, 2009
Architecture, Challenges and Services, 2014 IEEE World Forum on [92] Rong, Wenge, and Kecheng Liu. "A survey of context aware web
Internet of Things (WF-IoT) service discovery: from user'sperspective." Service Oriented System
[72] Shin, A socio-technical framework for Internet-of-Things design: A Engineering(SOSE), 2010 Fifth IEEE International Symposium
human-centred design for the Internet of Things, Telematics and on.IEEE, 2010.
Informatics 31 (2014) 519–531 [93] Miao Wu, Ting-Jie Lu, Fei-Yang Ling, Jing Sun and Hui-Ying Du,
[73] Louis COETZEE, Johan EKSTEEN, “The Internet of Things – Promise "Research on the architecture of Internet of Things," 2010 3rd
for the Future? An Introduction,” in Proc. of IST-Africa 2011 International Conference on Advanced Computer Theory and
Conference, 2011 Engineering(ICACTE), Chengdu, 2010, pp. V5-484-V5-487.doi:
[74] A. Gavras, A. Karila, S. Fdida, M. May, and M. Potts, “Future Internet 10.1109/ICACTE.2010.5579493
research and experimentation,” ACM SIGCOMM Computer [94] M. Weyrich and C. Ebert, “Reference architectures for the internet of
Communication Review, vol. 37, 2007 things,” IEEE Software, vol. 33, no. 1, pp. 112–116, 2016.
[75] IEEE SA 21451-7-2011, “IEEE Information technology--Smart [95] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of
transducer interface for sensors and actuators--Part 7: Transducers to Things (IoT): a vision, architectural elements, and future directions,”
radio frequency identification (RFID) systems communication Future Generation Computer Systems, vol. 29, no. 7, pp. 1645–1660,
protocols and transducer electronic data sheet (TEDS) formats,” Sensor 2013.
and RFID Integration Working Group (SRFID), 2011 [96] F. Bonomi, R. Milito, P. Natarajan, and J. Zhu, “Fog computing: a
[76] Uckelmann. Dieter, Isenberg. Marc-André, Teucke. Michael, Halfar. platform for internet of things and analytics,” in Big Data and Internet
Harry, Scholz-Reiter. Bernd, An integrative approach on Autonomous of Things: A Road Map for Smart Environments, pp. 169–186,
Control and the Internet of Things,” Unique Radio Innovation for the Springer, Berlin, Germany, 2014.
21st Century: Building Scalable and Global RFID Networks, pp. 163- [97] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its
181, April 2011. role in the internet of things,” in Proceedings of the 1st ACM MCC
[77] Qingbin Meng, Jie Jin, “The Terminal Design of the Energy Self- Workshop on Mobile Cloud Computing, pp. 13–16, 2012.
Sufficiency Internet of Things,” Control, Automation and Systems [98] I. Stojmenovic and S. Wen, “The fog computing paradigm: scenarios
Engineering (CASE), 2011 International Conference on, 2011 and security issues,” in Proceedings of the Federated Conference on
[78] Bin Guo, Daqing Zhang, Zhu Wang, “Living with Internet of Things, Computer Science and Information Systems (FedCSIS '14), pp. 1–8,
The Emergence of Embedded Intelligence,” ITHINGSCPSCOM '11 IEEE, Warsaw, Poland, September 2014.
Proceedings of the 2011 International Conference on Internet of Things [99] M. Aazam and E.-N. Huh, “Fog computing and smart gateway based
and 4th International Conference on Cyber, Sep 2011 communication for cloud of things,” in Proceedings of the 2nd IEEE
[79] Bhattasali, Tapalina, Rituparna Chaki, and SugataSanyal. "Sleep International Conference on Future Internet of Things and Cloud
Deprivation Attack Detection inWireless Sensor Network." arXiv (FiCloud '14), pp. 464–470, Barcelona, Spain, August 2014.
preprint arXiv:1203.0231(2012) [100] Pallavi Sethi ,Smruti R. Sarangi,” Internet of Things: Architectures,
[80] G. Bianchi, “A comparative study of the varioussecurity approaches Protocols, and Applications”,Journal of Electrical and Computer
used in wireless sensor networks,”International Journal of Advanced Engineering Volume 2017 (2017), Article ID 9324035, 25 pages,
Science andTechnology, vol. 17, (2010)April, pp. 31-44 https://doi.org/10.1155/2017/9324035
[81] Roy, Bibhash, Suman Banik, Parthi Dey, Sugata Sanyaland Nabendu [101] https://www.gsma.com/iot/mobile-internet-of-things-industry-paper/
Chaki, "Ant colony based routing formobile ad-hoc networks towards [102] Fortino G., Guerrieri A., Russo W.Agent-oriented smart objects
improved quality ofservices." Journal of Emerging Trends in developmentProceedings of the 16th International Conference on
Computingand Information Sciences 3.1 (2012): 10-14 Computer Supported Cooperative Work in Design (CSCWD ′12)May
[82] Vipul Goyal, Ajith Abraham, Sugata Sanyal and SangYong Han, “The 2012Wuhan, ChinaIEEE90791210.1109/cscwd.2012.62219292-s2.0-
N/R One Time Password System.”Information Assurance and Security 84864195643
Track (IAS'05),IEEE International Conference on [103] Gubbi J., Buyya R., Marusic S., Palaniswami M.Internet of Things
InformationTechnology: Coding and Computing (ITCC'05), (IoT): a vision, architectural elements, and future directionsFuture
USA,April, 2005. pp 733-738, IEEE Computer Society Generation Computer
[83] C. Karlof and D. Wagner, “Secure Routing in Sensor Networks: Systems20132971645166010.1016/j.future.2013.01.0102-s2.0-
Attacks and Countermeasures”,Elsevier’sAdHoc Networks Journal, 84876943063
Special Issue onSensor Network (SNPA), (2003)September, pp. 293- [104] Atzori L., Iera A., Morabito G.From ‘smart objects’ to ‘social objects’:
315 the next evolutionary step of the internet of thingsIEEE
[84] D. Guinard, T. Vlad, Towards the web of things: web mashups for Communications
embedded devices, in: Proceedings of the International World Magazine20145219710510.1109/mcom.2014.67100702-s2.0-
WideWeb Conference 2009 (WWW 2009), Madrid, Spain, April 2009. 84893373985
[85] A.M. Vilamovska, E. Hattziandreu, R. Schindler, C. Van Oranje, H. [105] Cirani S., Davoli L., Ferrari G., Leone R., Medagliani P., Picone M.,
DeVries, J. Krapelse, RFID Application in Healthcare – Scoping Veltri L.A scalable and self-configuring architecture for service
andIdentifying Areas for RFID Deployment in Healthcare Delivery, discovery in the internet of thingsIEEE Internet of Things
RANDEurope, February 2009. Journal20141550852110.1109/JIOT.2014.23582962-s2.0-
[86] J. Sung, T. Sanchez Lopez, D. Kim, The EPC sensor network for 84908447810
RFIDand WSN integration infrastructure, in: Proceedings of [106] Jongbae Kim, Jinsung Byun, Daebeom Jeong, Myeong-in Choi,
IEEEPerComW’07, White Plains, NY, USA, March 2007. Byeongkwan Kang, Sehyun Park,”An IoT-Based Home Energy
[87] G. Broll, E. Rukzio, M. Paolucci, M. Wagner, A. Schmidt, H. Management System over Dynamic Home Area
Hussmann,PERCI: pervasive service interaction with the internet of Networks”,International Journal of Distributed Sensor
things, IEEEInternet Computing 13 (6) (2009) 74–81 Networks,January 1, 2015
[88] Zhang, Lili, et al. "Research on IOT RESTful Web Service [107] Daniel Burrus, Burrus Research,”The Internet of Things Is Far Bigger
Asynchronous Composition Based on." Intelligent Human-Machine Than Anyone Realizes”, https://www.wired.com/insights/2014/11/the-
Systems andCybernetics (IHMSC), 2014 Sixth InternationalConference internet-of-things-bigger/
on. Vol. 1. IEEE, 2014
[89] Gao, Ruiling, et al. "Web-based motion detectionsystem for health
care."Computer and InformationScience (ICIS), 2015 IEEE/ACIS 14th
InternationalConference on. IEEE, 2015

IJERTV6IS060238 www.ijert.org 447


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 6 Issue 06, June - 2017

Author’s Info

Mohd Muntjir is working in Dr. Hesham Alhumyani is working


Department of Information in Department of Computer
Technology, College of Computers Engineering in College of Computers
and Information Technology Taif and Information Technology Taif
University at Taif Saudi Arabia. He University at Taif Saudi Arabia. He
received his M.C.A. degree from has obtained his Ph.D. Degree from
H.N.B. Garhwal University Uttarakhand India and University of Connecticut Storrs,
Ph.D. degree in Computer Science from OPJS USA. His research interests are Wireless Sensor
University, Rajasthan India. He is a member of Networks, Underwater Sensing, IoT (Internet of
professional societies like ACM, IEEE, VAS, IJETAE, Things), and Cloud Computing. Dr. Hesham
and CSTA. His interested are mainly in Database Alhumyani has published many research papers in
Management Systems, E-Learning, Data Mining and distinctive journals and conferences.
IoT (Internet of Things). The author has published
many research papers in distinctive journals,
conferences and books/book Chapters.

Mohd Rahul is working in


Department of Information
Technology, College of Computers
and Information Technology Taif
University at Taif Saudi Arabia. He
has obtained his Ph.D. Degree form
OPJS University Rajasthan India. Mohd Rahul
received M.C.A. degree from Punjab Technical
University Jalandhar, India and M.Tech (IT) degree
from KSO University Karnataka, India. His research
interests are Cloud Computing, Computer Networks,
routing protocols, and IoT (Internet of Things). Mohd
Rahul has published many research papers in
distinctive journals, conferences and books and book
Chapters.

IJERTV6IS060238 www.ijert.org 448


(This work is licensed under a Creative Commons Attribution 4.0 International License.)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy