An Analysis of Internet of Things (Iot) : Novel Architectures, Modern Applications, Security Aspects and Future Scope With Latest Case Studies
An Analysis of Internet of Things (Iot) : Novel Architectures, Modern Applications, Security Aspects and Future Scope With Latest Case Studies
Hesham A. Alhumyani
Department of Computer Engineering
College of Computers and Information Technology
Taif University, Taif, Saudi Arabia
Abstract—While we might be thinking, “one of these things is more recently. Some maintain the Internet of Things will
not like the others,” these are all examples of the Internet of entirely transform how computer networks are used for the
Things (IoT). The Internet of Things (IoT) connects the physical next 10 or 100 years, while others consider IoT is just hype
and the cyber worlds. On these days, one of the main objectives that won't much impact the daily lives of most people. The
of Internet is its own progression. The Internet of Things (IoT)
"Internet of things" (IoT) is becoming an increasingly growing
is a pattern where everyday objects can be furnished with
classifying, sensing, networking and processing potentials that topic of conversation both in the workplace and outside of it.
will allow them to correspond over the Internet to accomplish It's a concept that not only has the potential to impact how we
some purpose. The future of Internet of Things are, transform live but also how we work. The Internet of things creates an
the real world things into intelligent virtual things. The Internet opportunity to evaluate, assemble and analyze an ever-
of Things (IoT)in tends to unite everything in our world under increasing selection of behavioral information.
general infrastructures. Every object will have an exclusive It is expected that IoT devices will be incorporated into all
identifier and will be able to locate itself and connect to the forms of energy consuming devices such as switches, bulbs,
Internet. Moreover, Radio Frequency Identification (RFID) power outlets, televisions, etc and be proficient to
techniques will be the base of Internet of Things (IoT).
communicate with the utility supply company in order to
Eventually, IoT devices will be pervasive, context-aware and will
allow ambient ability and enable knowledge growth in efficiently balance power generation and energy consumption.
proficiently. This paper reports on the current state of research The Internet of Things (IoT) is a term coined by Kevin
and the meaning of IoT is defined with its progression structure. Ashton, who perceived a system of ubiquitous sensors
Moreover, present study attends to IoT conception through concerning the physical world to the Internet. Though things,
organized review of scholarly research papers, and professional Internet, and connectivity are the three core factors of Internet
discussions with competent. We also discussed about Internet of of Things (IoT), the importance is in closing the breach
Things (IoT) by probing the literature, recognizing current between the physical and digital world in self-reinforcing and
trends and relating challenges that threaten IoT transmission. self-improving techniques. [4]. Internet of Things definition is
Though, this paper will give good conception for the new
the vast network of devices connected to the Internet,
researchers, who want to do research in this field of Internet of
Things (IoT). including smart phones and tablets and almost anything with a
sensor on it – cars, machines in production plants, jet engines,
Keywords—Internet of Things, IoT, Machine to machine, oil drills, wearable devices, and more. These “things” collect
Ubiquitous, Ambient, Internet, RFID, Wi-Fi, Sensors, Actuators, and exchange data. IoT – and the machine-to-machine (M2M)
cloud computing, smart city technology behind it – are bringing a kind of “super visibility”
to nearly every industry. Imagine utilities and telcos that can
I. INTRODUCTION predict and prevent service outages, airlines that can remotely
The term Internet of Things (IoT) was invented by industry monitor and optimize plane performance, and healthcare
researchers but has surfaced into mainstream public view only organizations that can base treatment on real-time genome
analysis. The business possibilities are endless. Internet of it’s going to be a major engine for creating new products and
Things symbolizes a general perception for the ability of new services. Of all the technology trends that are taking place
network devices to sense and collect data from the world, and right now, perhaps the biggest one is the Internet of Things;
then contribute that data across the Internet where it can be it’s the one that’s going to give us the most disruption as well
processed and developed for various interesting reasons. [1]. as the most opportunity over the next five years. In my next
The Internet-of-Things (IoT) is steadily becoming one of the post in this two-part series, we’ll explore just how big this is
most outstanding technologies that emphasize this world, going to be [107]. In order to realize the benefits of IoT, such
through facilitate the orchestration and coordination of a large as increasing customer intimacy, improving operational
number of physical and virtual Internet-Connected-Objects excellence and generating new revenue streams through
(ICO) towards human-centric services in a selection of sectors business model innovation; there are three critical components
counting logistics, industry, trade, smart cities and ambient for the ecosystem to thrive: reliable connectivity, reliable
supported living. Furthermore, we will be presenting a set of security and an agile monetization framework. Broadband
internet-of-things technologies and applications in the form Internet is become more widely available, the cost of
of a series of knowledge. connecting is decreasing, more devices are being created with
Wi-Fi capabilities and sensors built into them, technology
costs are going down, and smartphone penetration is
skyrocketing.
Fig. 1. IoT
its development depends on dynamic technical innovation in process, information system, etc.). This Internet of Things
a number of important fields, from wireless sensors to will be accordingly based on massive parallel IT systems.
nanotechnology. The first Internet appliance was a Coke The last characteristics are space considerations. In an
machine at Carnegie Melon University in the early 1980s. Internet of Things, the precise geographic location and
Programmers working several floors above the vending dimensions of a thing will be critical information [57].
machine wrote a server program that chased how long it had Therefore, facts about a thing, such as its location in time
been since a storage column in the machine had been and space, will be less critical to track because the person
unfilled. The programmers could connect to the machine over processing the information can decide whether or not that
the Internet, check the status of the machine and determine information is important to the action being taken, and if so,
whether or not there would be a cold drink waiting them, add the missing information (or decide to not take the action).
should they decide to make the trip down to the machine. (Note that some things in the Internet of Things will be
Though the buzzword “Internet of Things” evolution was set sensors, and sensor location is usually important. The Figure
out a way back in 1980’s with coffee vending machine, 2 shows a technology road map of the IoT [58].
Kevin Auston, the Executive Director of Auto-ID Labs in
MIT in 1999, coins the original term. The concept of IoT first
became very popular through the Auto-ID center in 2003 and
in related market analysts publications. Right from the
beginning the Internet of Things evolution started, there were
many things or objects connected to the internet for the
different applications through diverse technologies depending
on the type of object for the comfort ability of Human [5].
D. Features of IoT
The basic idea of the IoT was introduced in a technical report
of the ITU in 2005. It has physical things and virtual things,
which exist in the real world and cyberspace. To be more
accurate, the physical things are connected to the virtual
things using the Internet [8]. The ITU described the concept
of IoT, and classify entities into four major categories of
tagging things, feeling things, thinking things, and shrinking Fig. 5. Technology Roadmap of Internet of Things
things. In addition, Wikipedia also defines the characteristics
of the IoT, and classifies it into six categories of intelligent E. Time Series
architecture [9], complex systems, size considerations, time Accessed from the URL dated on 24/3/2013:
considerations, and space considerations. First of all, http://postscapes.com/internet-of-things-history [5].
intelligence has two different perspectives, which are ambient 1999: the term Kevin Ashton, Executive Director of
intelligence and autonomous control, and embedded the Auto-ID Center in Massachute Institute of
intelligence. Ambient intelligence and autonomous control Technology (MIT), coins Internet of Things
are not part of the original concept of the IoT. However, there 1999: Neil Gershenfeld first time spoken about IoT
is a shift in research to integrate the concepts of the IoT and principles in his book titled “When Things Start to
autonomous control [10] presents an AI-oriented perspective Think”
of the IoT, which can be more clearly defined as leveraging
1999: MIT Auto-ID Lab, originally founded by
the capacity to collect and analyze the digital traces left by
Kevin Ashton, David Brock and Sanjay Sarma in
people when interacting with widely-deployed smart things to
this year. They helped to develop the Electronic
discover knowledge about human life, environmental
Product Code
interactions, and social connections/behaviors. Second, the
2000: LG announced its first Internet of refrigerator
architecture will likely be event-driven [73]. Therefore,
plans
model-driven and functional approaches will coexist with
2002: The Ambient Orb created by David Rose and
new ones able to treat exceptions and the unusual evolution
others in a spin-off from the MIT Media Lab is
of processes. In IoT, the meaning of an event will not
released into wild with NY Times Magazine naming
necessarily be based on a deterministic or syntactic model. It
would, however, be based on the context of the event itself. it as one of the Ideas of Year
The third characteristic is a complex system. In semi-open or (2003-2004): RFID is deployed on a massive scale
closed loops. it will therefore be considered and studied as a by the US Department of Defense in their program
complex system due to the huge number of different links and and Wal-Mart in the commercial world
interactions between autonomous actors, and its capacity to 2005: The UN’s International Telecommunications
integrate new actors. The fourth is time considerations. In this Union (ITU) published its first report on the Internet
Internet of Things, made of billions of parallel and of Things topic
simultaneous events, time will no more be used as a common 2008: Recognition by the EU and the First European
and linear dimension but will depend on each entity (object, IoT conference is held
2008: A group of companies launched the IPSO 3) Presentation—easy to understand visualization and
Alliance to promote the use of IP in networks of interpretation tools that can be designed for the different
“Smart Objects” and to enable the Internet of Things applications [62].
2008: The FCC voted 5-0 to approve opening the
use of the ‘white space’ spectrum H. Fault tolerance for IoT
(2008-2009): The IoT was born according to Cisco’s Based on the fact that IoT will face billions more devices, IoT
Business Solutions Group will be more vulnerable to be attacked than the Internet, and
2008: US National Intelligence Council listed the there might be some attacker that want to control some
IoT as one of the 6 “Disruptive Civil Technologies” devices directly or indirectly [20]. One way to know the level
with potential impacts on US interests out to 2025 of reliability of a service is having a defined threshold for
2010: Chinese Premier Wen Jiabao calls the IoT a service fault tolerance. However, it should be considered that
key industry for China and has plans to make major any solution for this aspect should be lightweight enough that
investments in Internet of Things [59] it can be implemented on IoT. As a conclusion, we should
2011: IPv6 public launch-The new protocol allows first design all elements with secure mechanisms by
for 340, 282, 366, 920, 938, 463, 463, 374, 607, improving the quality of the implementing software. Also,
431,768,211, 456 (2128) addresses [60] every element of the IoT should be able to know the real-time
status of the network, to provide the feedback to other
elements. Therefore, having a monitoring system would be
F. Aliases helpful in this matter. Finally, any time that the network faces
Different people calling Internet of Things with different degradation in the performance or has a failure in the
names but the objective of IoT are same in the broad sense. performance; every element should have the ability to protect
The aliases of Internet of Things include Web of Things, them. So, various privacy protocols should also be defined
Internet of Objects, Embedded Intelligence, Connected for this situation to instruct the elements the way they should
Devices and Technology Omnipotent, Omniscient and work in unusual situations to fix the situation and be able to
Omnipresent. In addition to these, it has also calling as recover quickly. Hence, the viability of recovery services is
counting [5] obvious [37].
Cyber Physical Systems “Integrations of computation
and physical processes”, in which bringing the real and
virtual worlds together
Pervasive Computing is a computer environment in
which virtually every object has processing power with
wireless or wired connections to a global network
Ubiquitous Computing or Calm technology, where
technology becomes virtually invisible in our lives
Machine-to-Machine Interaction means no human
intervention whilst devices are communicating end-to-
end
Human-Computer Interaction involves the study,
planning, and design of interaction between people and
computers
Ambient Intelligence is a developing technology that
will increasingly make our everyday environment
sensitive and responsive.
Fig. 6. Fault tolerant in IoT
G. Requirements
For successful implementation of Internet of Things (IoT),
Also, by providing automatic services for example in M2M
the prerequisites are (a) Dynamic resource demand (b) Real
(Machine to Machine) communication, the need for providing
time needs (c) Exponential growth of demand (d) Availability
safety and security will be more crucial. Some examples are
of applications (e) Data protection and user privacy (f)
different unpredictable characters and patterns. This matter
Efficient power consumptions of applications (g) Execution
of the applications near to end users (h) Access to an open will be worse even in the distributed environment, which is
the main domain for IoT. This challenge stays valid even for
and inter operable cloud system [5]. According to another bounded and closed environments. There are some hot
author, there are three components, which required for researches considering algorithms, which are able to derive
seamless Internet of Things (IoT) computing [61] value from unstructured data to increase performance. There
1) Hardware—composed of sensors, actuators, IP cameras, are different factors determining main criteria of an identifier,
CCTV and embedded communication Hardware such as: governance, security and privacy. Also, lots of
2) Middleware—on demand storage and computing tools for existing identification schemes have been created long time
data analytics with cloud and Big Data Analytics ago for local usage and for specific objectives. Therefore, the
need to have a global reference for identification is vital.
Fig. 14. Kun Han, Shurong Liu, Dacheng Zhang and Ying Han’s (2012)’s
Architecture [56]
and factories [15]. Not only are Internet of Things B. Smart environments domain
applications enhancing our comfort, but they also give us 1) Smart water sup ply
more control to simplify routine work life and personal tasks. Smart cities must monitor water supply to ensure that there is
In the following subsections, some of the important example adequate access for resident and business need. Wireless
applications of IoT are briefly discussed. Sensor Networks provide the technology for cities to monitor
their water piping systems more accurately and discover their
greatest water loss risks [11]. Cities that are addressing water
leakage problem with sensor technology are producing high
savings from their investment. Tokyo, for example, has
calculated they save $170 million each year by detecting
water leakage problems early (LIBELIUM, 2013). The
system can report pipe flow measurement data regularly, as
well as send automatic alerts if water use is outside of an
estimated normal range. This allows a smart city to determine
the location of leaking pipes and prioritizes repairs based on
the amount of water loss that could be prevented [41].
4) Logistics
Implementing the Internet of Things in Retail chain
monitoring has many advantages: RFID and NFC can be used
to monitor almost every link of supply chain, ranging from
commodity details, raw material purchasing, production,
transportation, and storage, sale of product and after sales
services. With the help of IoT, we will track the inventory in
the warehouse so that stock can be refilled at the appropriate
time for continuous sale and this will reduce the waiting time
of customer which result in customer satisfaction, which
further results in increased sales [28].
VI. ADVANTAGES OF IOT
There are many advantages of incorporating IoT into our
lives, which can help individuals, businesses, and society on a
daily basis. For individuals this new concept can come in
Fig. 21. Transportation and Logistics
many forms including health, safety, financially, and every
2) 3D assisted driving day planning [29].
Vehicles like cars, buses and trains along with the roads and Following are the advantages of IoT (Internet of Things):
rails equipped with sensors may provide valuable information IoT network benefits not one but all i.e. individuals,
to the driver to provide better navigation and safety. With the society, stake holders of businesses etc. due to the
use of assisted driving, we will be able to find the right track fact that IoT network saves time and money. IoT
with prior information about traffic jams and incidents. In an systems deliver faster and accurately with minimum
Enterprise context, information about the vehicle transporting utilization of energy. This improves quality of life.
goods together with information about the type and status of It is used for patient monitoring i.e. various types of
the goods can integrate to provide valuable information about wireless sensors are installed on the patient body,
the delivery time, delivery delays and faults [86]. which communicate with the IoT network, and
provides all the required information of the patient
under treatment.
IoT concept is used in home security devices, which
are monitored and controlled either locally or
remotely using easy to use applications available on
mobile phones or smartphones. Typical IoT devices
are security alarm; Camera, sensors, door lock etc.
are used in home automation environment.
IoT is used in asset and individual tracking,
inventory control, energy conservation, shipping etc.
It is similar to M2M but it has applications beyond
M2M. M2M is used only for machine-to-machine
communication. In IoT, things communicate
themselves to its owner indicating its location and
conditions.
The integration of IoT into the health care system
could prove to be incredibly beneficial for both an
individual and a society.
A chip could be implemented into each individual,
allowing for hospitals to monitor the vital signs of
the patient. By tracking their vital signs, it could
help indicate whether or not serious assessment is
necessary.
Fig. 22. Transportation [13] With all of the information that is available on the
Internet, it can also scare people into believing they
3) Augmented maps need more care than what is really needed.
Tourist augmented maps with tags allow NFC-equipped Hospitals already struggle to assess and take care of
phones to browse the information about the places and the patients that they have. By monitoring
quickly connect it to the web services providing information individual’s health, it will allow them to judge who
about hotels, restaurants, monuments, theater and the local
needs primary attention. Internet the Smart Grid expands, conserving more
The Internet of Things can also assist people with energy (Frenzel, 2012).
their personal safety. ADT, which is a home Devices can make decisions and adapt without
security system, allows individuals to monitor their human guidance to reduce their energy usage. The
security systems at home through their phones, with IoT has many advantages to businesses, individuals,
the ability to control it. Also, another technology consumers, the environment, and society, but as with
that has already been released is GM OnStar. This any technology, there are always repercussions and
is a system that is embedded in GM cars that can controversies that arise.
detect if a crash has occurred and it automatically
calls 9-1-1. It can also track the movement of the The Major Advantages of IoT
car.
IoT can also function as a tool that can save people Communication: IoT encourages the communication between
money within their households. If their home devices, also famously known as Machine-to-Machine
appliances are able to communicate, they can (M2M) communication. Because of this, the physical devices
operate in an energy efficient way. are able to stay connected and hence the total transparency is
Finally, IoT can assist people with their everyday available with lesser inefficiencies and greater quality [31].
plans. A very interesting example that was given in
a video was the communication between many
Automation and Control: Due to physical objects getting
devices that automatically adjusted to let an
connected and controlled digitally and centrally with wireless
individual sleep in. Although this may sound
infrastructure, there is a large amount of automation and
unimportant, the misusage of time costs us “$135
control in the workings. Without human intervention, the
billion a year” (Koreshoff, 2012). By allowing
machines are able to communicate with each other leading to
physical devices to communicate, it is taking the
faster and timely output.
data that is individually collected, sharing it, and
then translating the information into ways to make
our current systems more efficient [30]. Information: It is obvious that having more information helps
Businesses can also reap many benefits from the making better decisions. Whether it is mundane decisions as
Internet of Things. IoT can be useful in many needing to know what to buy at the grocery store or if your
different categories including asset tracking and company has enough widgets and supplies, knowledge is
inventory control, shipping and location, security, power and more knowledge is better.
individual tracking, and energy conservation. As
mentioned before, IoT allows for the communication Monitor: The second most obvious advantage of IoT is
between devices, commonly referred to as Machine- monitoring. Knowing the exact quantity of supplies or the air
to-Machine (M2M) communication. With this being quality in your home can further provide more information
possible, physical devices are able to communicate that could not have previously been collected easily. For
to people letting them know their condition and instance, knowing that you are low on milk or printer ink
where it is located. could save you another trip to the store in the near future.
Devices such as trucks or ships allow for the Furthermore, monitoring the expiration of products can and
maximum capacity to be filled by communication will improve safety.
amongst devices and then relaying that information
to a person to capitalize on the data supplied. Time: As hinted in the previous examples, the amount of time
All of these combined maximize revenue by cutting saved because of IoT could be quite large. And in today’s
cost of inefficiencies within the business. A specific modern life, we all could use more time.
example from “A Successful ‘Internet of Things’
Hinges on M2M” article, is the operation of Nestles Money: The biggest advantage of IoT is saving money. If the
Nespresso Coffee Machine, which has “the ability to price of the tagging and monitoring equipment is less than the
monitor factors such as temperature setting, amount of money saved, then the Internet of Things will be
vibration, and pressure helps ensure quality output, very widely adopted. IoT fundamentally proves to be very
potentially leading to greater customer satisfaction helpful to people in their daily routines by making the
and continued repeat business” (Frenzel, 2012). appliances communicate to each other in an effective manner
Although the idea seems quite simple, it can be very thereby saving and conserving energy and cost. Allowing the
advantageous for a company to utilize the IoT to data to be communicated and shared between devices and
ensure quality service is given to their customers. then translating it into our required way, it makes our systems
Another advantage of IoT is the ability to track efficient. Automation of daily tasks leads to better monitoring
individual consumers and targeting these consumers of devices. The IoT allows you to automate and control the
based on the information supplied by the devices. In tasks that are done on a daily basis, avoiding human
a way, it provides a more “personalized” system that intervention. Machine-to-machine communication helps to
could potentially increase business sales and maintain transparency in the processes. It also leads to
increases their demographic. Additionally, with the uniformity in the tasks. It can also maintain the quality of
increased amount of devices connected to the
service. We can also take necessary action in case of of the Internet and technology in general. However,
emergencies. relying on technology on a day-to-day basis, making
decisions by the information that it gives up could
Efficient and Saves Time: The machine-to-machine lead to devastation. No system is robust and fault-
interaction provides better efficiency, hence; accurate results free. We see glitches that occur constantly in
can be obtained fast. This results in saving valuable time. technology, specifically involving the Internet.
Instead of repeating the same tasks every day, it enables Depending on the amount that an individual relies
people to do other creative jobs. on the information supplied could be detrimental if
the system collapses. The more we entrust and the
more dependent we are on the Internet could lead to
Saves Money: Adopting this technology and keeping the
a potentially catastrophic event if it crashes.
devices under surveillance can achieve optimum utilization of
energy and resources. We can be alerted in case of possible Finally the connecting of more and more devices to
bottlenecks, breakdowns, and damages to the system. Hence, the Internet will result in the loss of jobs. The
we can save money by using this technology. automation of IoT will have a devastating impact on
the employment prospects of less-educated workers
(Schumpeter, 2010). For example, people who
Better Quality of Life: All the applications of this technology evaluate inventory will lose their jobs because
culminate in increased comfort, convenience, and better devices can not only communicate between each
management, thereby improving the quality of life [31]. other, but also transmit that information to the
owner. We already are witnessing jobs being lost to
VII. DISADVANTAGES OF IOT automate machines, such as the checkout line in
supermarkets and even ATM’s. These
Three of the main concerns that accompany the disadvantages can be largely devastating to society
Internet of Things are the breach of privacy, over- as a whole, as well as individuals and consumers
reliance on technology, and the loss of jobs. [31].
When anything is put on the Internet it will always
be there. Of course there are security measures that Compatibility: Currently, there is no international standard of
are taken to protect information, but there is always compatibility for the tagging and monitoring equipment. I
the possibility of hackers breaking into the system believe this disadvantage is the most easy to overcome. The
and stealing the data. For example, Anonymous is a manufacturing companies of this equipment just need to
group of individuals that hacked into federal sites agree to a standard, such as Bluetooth, USB, etc. This is
and released confidential information to the public. nothing new or innovative needed [11].
Meanwhile the government is supposed to have the
highest level of security, yet their system was easily
Complexity: As with all complex systems, there are more
breached. Therefore, if all of our information is
opportunities of failure. With the Internet of Things, failures
stored on the Internet, people could hack into it,
could sky rocket. For instance, let’s say that both you and
finding out everything about individuals lives [32].
your spouse each get a message saying that your milk has
Also, companies could misuse the information that
expired, and both of you stop at a store on your way home,
they are given access to. This is a common mishap
and you both purchase milk. As a result, you and your spouse
that occurs within companies all the time. Just
have purchased twice the amount that you both need. Or
recently Google got caught using information that
maybe a bug in the software ends up automatically ordering a
was supposed to be private. Information, such as the
new ink cartridge for your printer each and every hour for a
data collected and stored by IoT, can be immensely
few days, or at least after each power failure, when you only
beneficial to companies.
need a single replacement.
The privacy issues also leads to the question of who
will control the Internet of Things? If there is only
one company, that could potentially lead to a Privacy/Security: With all of this IoT data being transmitted,
monopoly hurting consumers and other companies. the risk of losing privacy increases. For instance, how well
If there are multiple companies that are given access encrypted will the data be kept and transmitted with? Do you
to the information acquired, doesn’t that breach want your neighbors or employers to know what medications
consumers privacy? Also, where is the information that you are taking or your financial situation?
going to be stored? Phone service suppliers such as
Verizon and AT&T are no longer offering unlimited Safety: Imagine if a notorious hacker changes your
data usage for mobile phones because it is too prescription, or if a store automatically ships you an
costly, yet by 2020 it is expected that 50 billion equivalent product that you are allergic to, or a flavor that
devices will be connected, collecting and storing you do not like, or a product that is already expired. As a
data (Evans, 2011). result, safety is ultimately in the hands of the consumer to
Another argument against IoT is the over-reliance verify any and all automation. As all the household
on technology. As time has progressed, our current appliances, industrial machinery, public sector services like
generation has grown up with the readily availability water supply and transport, and many other devices all are
connected to the Internet, a lot of information is available on Smart Cities: The IoT can be used to monitor the vibrations
it. This information is prone to attack by hackers. It would be of buildings, bridges, and monuments in case the building
very disastrous if unauthorized intruder’s access private and material is threatened or overloaded. Noise pollution can be
confidential information. controlled around hospitals and schools. It can be used to
manage traffic especially during traffic jams, peak hours,
Compatibility: As devices from different manufacturers will accidents, and rains. It can be used to manage street
be interconnected, the issue of compatibility in tagging and lights―automatically switch them off in the presence of
monitoring crops up. Although this disadvantage may drop sunlight and switch them on at the onset of darkness. Another
off if all the manufacturers agree to a common standard, even good application is alerting the officials to empty the trash
after that, technical issues will persist. Today, we have bins when filled with waste.
Bluetooth-enabled devices and compatibility problems exist
even in this technology! Compatibility issues may result in Home Automation: The IoT can be used to remotely control
people buying appliances from a certain manufacturer, and program the appliances in your home. It can be useful in
leading to its monopoly in the market. detecting and avoiding thefts.
Complexity: The IoT is a diverse and complex network. Any Industrial Automation: By using this technology, we can
failure or bugs in the software or hardware will have serious automate manufacturing processes remotely. It can also prove
consequences. Even power failure can cause a lot of useful in optimizing the production processes. We can
inconvenience. manage the inventory and the supply chain. We can also
diagnose if the machines require repair and maintenance. We
Lesser Employment of Menial Staff: The unskilled workers can monitor the emission of toxic gases to avoid damage to
and helpers may end up losing their jobs in the effect of workers' health and the environment.
automation of daily activities. This can lead to unemployment
issues in the society. This is a problem with the advent of any Health Monitoring: We can use this technology to identify
technology and can be overcome with education. With daily health problems. The patterns of heart rate, pulse, digestive
activities getting automated, naturally, there will be fewer system, and blood pressure can be monitored and diagnosed
requirements of human resources, primarily, workers and less for anomalies. The information can be sent to the doctor for
educated staff. This may create Unemployment issue in the analysis. The hospital can also be contacted in times of
society. emergencies. This system will be very useful to senior
citizens and disabled people who live independently.
Technology Takes Control of Life: Our lives will be
increasingly controlled by technology, and will be dependent Smart Environment: A very important application of IoT is
on it. The younger generation is already addicted to detecting pollution and natural calamities. We can monitor
technology for every little thing. We have to decide how the emissions from factories and vehicles to minimize air
much of our daily lives are we willing to mechanize and be pollution. We can track the release of harmful chemicals and
controlled by technology. waste in rivers and the sea, thereby arresting water pollution.
We can also keep tabs on the quality of water being supplied
Scenarios: Imagine a scenario when: Your fridge can identify for drinking. We can send warnings of earthquakes and
that you have run out of milk; it contacts the supermarket and tsunamis by detecting tremors. We can keep the water level
orders the quantity you usually need, and also informs you by of rivers and dams under surveillance to be alert in case of
sending a message on your phone! Your alarm rings at 6:30 floods. The detection of forest fire is also possible with this
am; you wake up and switch it off. As soon as you switch off technology [87].
your alarm, it conveys to the geyser to heat water at a VIII. CHALLENGES OF IOT
temperature you prefer and also the coffee maker starts Providing security for this giant technology is really
brewing coffee! You are on your way while returning home challenging, mainly because there is not any boundary or
from work and you use an app on your mobile to switch on limitation on the way that it can go. In this section we provide
the lights, the AC in your home, and tune the TV to your the possible challenges that the IoT will face. Connectivity
favorite channel so that your house is ready to welcome you Variety of wired and wireless connectivity standards is
before you even open your door! What would really make a required to enable different application needs [11].
refrigerator “smart” would be if it could read tags and alert Power is critical: Many IOT applications need to run for
owners when their food is about to reach their expiry date, for year’s over2batteries and reduce the overall energy
example. Or perhaps it could refer to an online calendar and consumption.
make orders on a regular basis for certain items to be IOT is complex: IOT application development needs to be
delivered. This technology has a lot of applications in various easy for all developers, not just to experts.
fields. Following are some possible areas where we can Government interest: If Government allows then only set up
leverage the power of the Internet of Things (IoT) to solve of I.O.T in a particular country is possible. Government allow
day-to-day problems. However, it can be put to many more only when they get profit from this new technology. Also
uses. depend very much upon the economy and revenue of the
country.
Compatibility: As devices from different manufacturers will may kill the patient by ordering wrong medicine. Moreover,
be interconnected; the issue of compatibility in tagging and sometimes IoT devices are considered as intellectual property
monitoring crops up. Although this disadvantage may drop that they might be highly valuable; so, they need to be
off if all the manufacturers agree to a common standard, even protected, and also, for the right of owner. However, it is an
after that, technical issues will persist [33]. Today, we have unavoidable that when a property is accessible through the
Bluetooth-enabled devices and compatibility problems exist physical environment, it can easily been misused by an
even in this technology! Compatibility issues may result in attacker [56].
people buying appliances from a certain manufacturer,
leading to its monopoly in the market. C. Identification in the IoT environment
For IoT to achieve its vision, a number of challenges need to Object and service identification is recognized as one of the
be overcome. Recently, many researchers have proposed IoT main challenges on the way to developing global Internet of
technology [8]. However, there are still a lot of challenges. In Things (IoT). Many identification services accessible these
this section, we introduce the challenges of IoT and discuss days with various means of generating and verifying
them in detail. [75] To do this, we classify the challenges of identification for the enhanced personal information
IoT into three major categories of security, data capacity, and protection. However, it has not been clearly defined yet
application. The first challenge to IoT is security. A number regarding what identification methods are purposely
of things in IoT send data to each other using the Internet. acceptable or how to use them in IoT environment.
That is a security weakness. In particular, many studies about In all layers of IoT, it is essential to provide identification. It
the IoT have proposed the REST protocol. REST has a is one of the biggest challenges based on the fact that IoT will
weakness of security because it does not maintain sessions face a tremendous number of applications and structures with
when data is sent. [76] Therefore, it should resolve the different unpredictable characters and patterns. This matter
weakness of security to provide IoT services. The second is will be worse even in the distributed environment, which is
data capacity. In IoT, many things send data to a web server the main domain for IoT. This challenge stays valid even for
or another thing. The backbone network for the IoT must bounded and closed environments. There are some hot
support a huge amount of data. To do this, existing web researches considering algorithms, which are able to derive
servers must be expanded. In addition, the backbone network value from unstructured data to increase performance. There
for the IoT must be accommodated. Therefore, the Content are different factors determining main criteria of an identifier,
Centric Network (CCN) technology and big data technology such as: governance, security and privacy. Also, lots of
should be used for the IoT. The last is the application of IoT. existing identification schemes have been created long time
Recently a number of applications developed for smartphones ago for local usage and for specific objectives. Therefore, the
and tablets. However, they are not related to the Internet of need to have a global reference for identification is vital [82].
Things. Therefore, we need a variety of applications to
realize the IoT. To do this, we should invigorate an D. Authenticating devices
ecosystem for the IoT and support a number of application Lots of devices that use the sensors and actuators should
developers [77]. follow specific policy and proxy rules for authentication to
authorize the sensors to public their information. Meanwhile,
A. Context awareness for privacy low cost solutions in this field have not been provided as
For the security methods that are based on the context much as needed [34]. Currently, if we want to provide the
awareness, it is needed that any essential part in the context security for the sensors we have to use high-cost solutions,
would be addressed effectively [20]. For example if the which is a conflict with the main goal of IoT to provide
sensor because of the bad quality cannot recognize an image, lightweight protocols [35].
the security enforcements cannot be applied to that image.
Some access features should be provided to supply the E. Data Combination
required information from context. Also, sometimes, We will have lots of different data produced by IoT.
automatic security management may work incorrectly in Combining these data to provide more comprehensible only
some context, mainly because it could not recognize the providing a large group of new general security can do
context. Providing context awareness is an essential challenge information policies, which leads us to a more complex user
in IoT [78]. profile. However, these mechanisms even may put the
security of users more in danger by sharing their information
B. Digital device in a physical ambient that may cause even harder challenges in this matter [80].
In recent years, in order to measure different information,
coupling between physical environment and processor has F. Scalability in IoT
been growing significantly. For instance, a car that can be As the technology grows the number of users and devices
driven by a computer in a center or a medicine for a patient with different type of communication and technologies grow
will be used as the sensors employed on her body providing widely. IoT needs to provide interaction for unbounded
body situation [21]. However, if there would not be any number of entities with significant differences in the
guaranteed security, all these systems can be manipulated and interaction patterns. Therefore, IoT has to provide capabilities
attacked by different hacker, and cause harmful results [79]. based access control mechanisms, to ensure the security for
For example in the above two cases, an attacker may bring up this tremendous number of elements [36].
a lethal accident by driving the car in a wrong direction, or
privacy for the end users. Some of the most prominent sends a useless message, which is then replayed by the
security issues plaguing the entire developing IoT system attacker to create a high traffic [70].
arise out of the security issues present in the technologies iii. Homing: In case of homing attack, a search is made in the
used in IoT for information relay from one device to another. traffic for cluster heads and key managers which have the
As such some of the prominent security issues stemming out capability to shut down the entire network.
from the communication technology are the following [39]: iv. Selective forwarding: As the name suggests, in selective
forwarding, a compromised node only sends a selected few
A. Security issues
nodes instead of all the nodes. This selection of the nodes is
In the wireless sensor networks (WSNs):
done on the basis of the requirement of the attacker to
The hierarchical relationship of the various security issues
achieve his malicious objective and thus such nodes doe’s not
plaguing the wireless sensor network is shown in Figure
forward packets of data.
1.The oppressive operations that can be performed in a
v. Sybil: In a Sybil attack, the attacker replicates a single
wireless sensor network can be categorized under three
node and presents it with multiple identities to the other
categories [40]
nodes.
i. Attacks on secrecy and authentication
vi. Wormhole: This DoS attack causes relocation of bits of
ii. Silent attacks on service integrity
data from its original position in the network. This relocation
iii. Attacks on network availability: The denial of service
of data packet is carried out through tunneling of bits of data
(DoS) ([41, 42] attack falls under this category. This
over a link of low latency.
prevention of accessibility of information to legitimate users
vii. Acknowledgement flooding: Acknowledgements are
by unknown third party intruders can take place on different
required at times in sensor networks when routing algorithms
layers of a network [43,44,45]
are used. In this DoS attack, a malicious nodes poofs the
B. DoS attack on the physical layer: Acknowledgements providing false information to the
The physical layer of a wireless sensor network carries out destined neighboring nodes
the function of selection and generation of carrier frequency,
modulation and demodulation, encryption and decryption,
transmission and reception of data [46]. This layer of the
wireless sensor network is attacked mainly through
i. Jamming: In this type of DoS attack occupies the
communication channel between the nodes thus preventing
them from communicating with each other.
ii. Node tampering: Physical tampering of the node to extract
sensitive information is known as node tampering.
C. DoS attack on the link layer:
The link layer of WSN multiplexes the various data streams,
provides detection of data frame, MAC and error control.
Moreover the link layer ensures point-point or point
multipoint reliability [47].
The DoS attacks taking place in this layer are:
i. Collision: This type of DoS attack can be initiated when
two nodes simultaneously transmit packets of data on the
same frequency channel. The collision of data packets results
in small changes in the packet results in identification of the
packet as a mismatch at the receiving end. This leads to
discard of the affected data packet for re-transmission [48] Fig. 23. Hierarchical diagram of security issues in Wireless Sensor Network
ii. Unfairness: As described in, unfairness is is pleated
collision based attack. It can also be referred to as exhaustion
based attacks.
iii. Battery Exhaustion: This type of DoS attack causes
unusually high traffic in a channel making its accessibility
very limited to the nodes. Such a disruption in the channel is
caused by a large number of requests (Request To Send) and
transmissions over the channel [72].
D. DoS attack on the network layer:
The main function of the network layer of WSN is routing.
The specific DoS attacks taking place in this layer are:
i. Spoofing, replaying and misdirection of traffic.
ii. Hello flood attack: This attack causes high traffic in
channels by congesting the channel with an unusually high
number of useless messages. Here a single malicious node Fig. 24. Types of DOS Attack in Wireless Sensor Network
X. SOMECASE STUDIES OF IOT from the Web to the SPOTs. This paper has contributed to a
step toward the realization of the IoT by integrating things in
A. Smart Gateway for Smart Meter the real world such as wireless sensor networks, embedded
Guinard [9] provided a Smart Gateway for Smart Meters. In devices and household appliances with any other Internet
this paper, the author designed and implemented the content. In addition, this paper describes two ways to
prototype of smart gateways for a smart meter. With the integrate devices to the Internet using REST, which directs
prototype, the author is started by illustrating the application integration based on advances in embedded computing, and a
of the IoT architecture for monitoring and controlling the Smart Gateway-based approach for resource-limited devices
energy consumption of households [49]. Figure 2 shows the [55].
architecture of smart gateways for a smart meter. The smart
gateway for a smart meter is divided into three layers. The B. Pachube
first layer is devices and sensors, so-called ploggs. Each Pachube [50] is a well-known web site related to the IoT.
plogg communicates over Bluetooth or Zigbee. The second Pachube, which pronounced patch-bay, connects people to
layer is a gateway. It is constructed of a miniature web server. devices, applications, and the IoT. It uses a web-based
Therefore, the data of ploggs is sent to the web via this service, and manages the world’s real-time data. Pachube
gateway. Finally, the third layer is the mobile interface. gives people the power to share, collaborate, and make use of
Throughout this layer, a smart meter provides variety information generated in the world around them. Figure 4
household services to users. The smart gateway supports shows the architecture of Pachube. In Figure 4, things are
service as follows: [69] sent to the Pachube server to its own data using REST. And
1. Local aggregates of device-level services the Pachube server collects data and stores it in the database
2.Various formats from things. Finally, the data provides a mash-up service with
3.Supports GET & POST method a Pachube Google Gadget. To do this, Pachube provides a
native Application Programming Interface (API). Therefore,
all devices use this API via an HTTP method to send data. In
addition, Pachube provides a variety of web data formats
such as JSON, XML, and CSV. Through this, users apply
their service and can use web and mobile applications.
range of smart objects from reactive to proactive, from small external communication interface, it is mainly divided into a
to very large, and from stand-alone to social. Gubbi present a cable communication interface and a wireless communication
new vision for Internet of Things based on cloud [103]. interface. The cable communication interface mainly includes
Atzori analyzed the major opportunities arising from the RS485, RS232, USB and Ethernet cables. The wireless
integration of social networking concepts into the Internet of communication interface mainly includes the GSM, GPRS,
Things [104]. Cirani proposed a scalable and self-configuring Zigbee, WiFi, and Bluetooth modules. This paper adopts a
architecture for large-scale IoT [105]. This architecture can modular design for the universal terminal structure of the IoT.
provide autonomous services and resource discovery In addition, the author initially achieves a system, which can
mechanisms with no human intervention to smart objects provide energy permanently to the IoT using solar energy and
[106]. Qingbin Meng [52] proposed a design of an energy lithium batteries. The system makes use of solar panels to
self-sufficient Internet of Things. In addition, this study enable nodes to add energy.
initially achieves a system, which can provide energy
permanently to the Internet of Things using solar energy and E. Design Food Quality Supervision Platform Based on
lithium batteries. the IoT
To do this, this paper proposed network model of the IoT, Bing Jia [53] proposed a method for constructing a quality
which is made up of a sensor network, transmission network, supervision platform for the whole process of food
and application network [67]. First of all, the sensor network production with the use of the IoT. In addition, the authors
is like the skin and features of the IoT, and it can identify presented the crucial technology of constructing the platform
things and collect data. The sensor networks are constructed and relevant implementation, including the associated
of RFID tags, RFID readers, cameras, GPS sensors, and matching algorithms between the RFID tags and on
terminal and sensor networks. Second, the transmission dimensional code, building methods of food quality modeled
network is the nerve and the brain of the IoT and it can by the theory of ontology-based context modeling, and the
transmit and process data. The transmission network is combination and presentation methods of service functions
constructed of an integrated network of communication and for the different users. In order to use this system, the
the Internet, a network management center, information architecture of IoT was described as four layers, which
center, and intelligent processing centers. Finally, the included the object sense layer, data transmission layer,
application network combines the division of labor of the IoT information integration layer, and application layer. Figure 8
with industry needs to achieve a wide range of intelligence. shows the architecture design of PFQC-IoT. In the object
The Figure 7 shows the structure of the IoT [68]. sense layer, it used a two-dimensional barcode, RFID tags,
and sensors to collect data. In the intelligent diagnosis layer,
it integrated knowledge through a lot of business models. In
the application service layer, it provided different functions
according to different user roles.
hard-coded or generated without the use of a repository. provide his/her preferences and requirements through an
SOAP commonly uses HTTP, but other protocols such as interface to benefit from services offered by the cluster of
Simple Mail Transfer Protocol (SMTP) may by used. SOAP devices. Hence, there is a need of energy efficient device
can be used to exchange complete documents or to call a discovery and a user guide to provide the users requirements
remote procedure [88]. and to discover and access the services. The research work
will focus on, to design an energy efficient device discovery
B. REST
Algorithm [91].
REST (Representational state transfer) is an architectural
style consisting of a coordinated set of architectural
2) Service Discovery
constraints applied to components, connectors, and data
In the IoPTS scenario, there may be a large number of
elements, within a distributed hypermedia system. REST
services will be available at specific location, however the
appeals to developers because it has a simpler style that
user should only get relevant services as per his/her
makes it easier to use than SOAP. It is also less verbose so
requirements. Service discovery is the process by which a
that less volume is sent when communicating. REST ignores
user can identify services of his interest. It involves three
the details of component implementation and protocol syntax
roles: service provider, service requester and matchmaker.
in order to focus on the roles of components, the constraints
The service provider uses a published protocol to advertise
upon their interaction with other components, and their
the services that it can provide, the user /service requester
interpretation of significant data elements. [89].
uses a query protocol to request the service of his interest,
C. UDDI
and the matchmaker finds the service among all available
UDDI is defined as “a set of services supporting the
services, which closely match with the user’s preference [92].
description and discovery of businesses, organizations, and
other Web services providers, the web services they make TABLE. 1. DIFFERENCES BETWEEN THE IoT AND TRADITIONAL
available, and the technical interfaces which may be used to INTERNET
access those services” by OASIS (The Organization for the Topic Traditional Internet Internet of Things
Advancement of Structured Information Standards) . UDDI is Who creates Human Machine
content?
an industry initiative that enables businesses to publish their
How is the By request By pushing information
services and allows potential users to discover these services content and triggering actions
[90]. consumed?
D. WSDL How is the Using explicit defined links Through explicitly
The Web Services Description Language (WSDL) forms the content defined operators
combined?
basis for the original Web Services specification. The What is the Answer Questions Action and timely
following figure illustrates the use of WSDL. At the left is a value? information
service provider. At the right is a service consumer. What is done Both Content creation Mainly content creation
so far? (HTML) and content
consumption (search
E. Technical Aspects of Web services in IoT engines)
1) Cluster Discovery
Mobility plays an essential role in future networks, hence end
users should be be able to benefit from the services offered XII. THE FUTURE OF IOT
by the premises/infrastructure where they are moving around.
Cluster discovery is the first step to make end users aware of The recent hype about our IoT future has forced companies to
the services offered by a cluster of IoT devices. Energy consider the basic building blocks for the Internet of
consumption is a major parameter for cluster discovery, as Things—i.e., hardware, software and support—to enable
the discovery mechanism should be frequently executed. developers to deploy applications that can connect anything
Bluetooth, Bluetooth low energy and Wi-Fi technologies are within IoT’s scope. In this paper, we introduced the IoT and
typically used for device discovery in a mobile ad-hoc summarized case studies about the IoT. Through numerous
environment. In all these types are analyzed and the Internet technology advances, the world is moving towards
Bluetooth technology is chosen for device discovery. The any time, any place, anyone connected paradigm. In the
eDiscovery algorithm based on Bluetooth technology is present context, "Things" are simply those computerized and
proposed in the research to discover the device. The networked devices that become part of the IoT. Some of
simulation results show the efficiency of the eDiscovery those Things will be directly accessible over the Internet,
algorithm over existing ones. Beacon stuffing methods for whereas others would be supposedly hidden in local networks
device discovery based on Wi-Fi technology. The score- behind firewalls and address-translating routers. New
based scanning approach is proposed in this work to make applications and businesses are created continuously, and
energy efficient device discovery. Internet content is always evolving. In this climate many
Most of the device discovery mechanisms discussed in the researchers have proposed IoT technology. However, there
literature are working on the MAC layer, however, for are still a lot of challenges. In order to resolve these
middleware services, these approaches are not suitable to problems, we should overcome the challenges of the IoT.
apply. To overcome this limitation three algorithms i.e. Therefore, future work requires resolution of these
connectivity based dynamic algorithm, a policy based challenges. Grouping the web services required by user as
scalable algorithm and a window-based broadcasting well as their discovery is an important issue in IoT scenario.
algorithm. After discovering the device, the user must In the future, home automation, smart cities, intelligent
transport and e-health in such domain IoT applications can be signs of maturity. However, a lot more needs to happen in the
developed. There are large numbers of devices that can sense areas of IoT applications and communication technologies.
the activity that are happening in the surrounding to provide These fields will definitely mature and impact human life in
services to the end users. Most of the IoT devices are capable inconceivable ways over the next decade.
of sensing environmental parameters but do not have the
intelligence to give proper response depending on the sensed ACKNOWLEDGEMENT
information. Hence, it is necessary that the IoT devices
should be grouped in clusters. Users must be made aware of We would like to gratefully and sincerely thank to The Dean
the presence of cluster to benefit from the services offered by and Vice Dean of our College and Chairman of our
it, and hence there is need of a cluster discovery mechanism Department for his guidance, understanding, patience, and
[54]. Our message is intended as a wake-up call for computer most importantly, his friendly nature during this research
professionals, but is also relevant to everyone involved as a paper. We would also like to thank my friends and
user. We know the potential of IoT markets is huge, but some colleagues, and the university who provided me an efficient
domains will mature more quickly than the rest. Here is support to work on this atmosphere and good infrastructure.
Internet of Things application areas that have the potential for We would also like to thank to all the previous researchers
exponential growth. who worked very hard and helped others to comprehend the
subject of Internet of Things (IoT).
XIII. CONCLUSIONS
REFERENCES
IoT has been gradually bringing a sea of technological
changes in our daily lives, which in turn helps to making our [1] Bradley Mitchell,” Introduction to the Internet of Things (IoT)”,
life simpler and more comfortable, though various https://www.lifewire.com/introduction-to-the-internet-of-things-817766
[2] John Soldatos,” Internet of Things Tutorial: Introduction”,
technologies and applications. There is innumerable http://www.kdnuggets.com/2016/12/internet-of-things-tutorial-chapter-
usefulness of IoT applications into all the domains including 1-introduction.html
medical, manufacturing, industrial, transportation, education, [3] D. Giusto, A. Iera, G. Morabito, L. Atzori (Eds.), The Internet of
governance, mining, habitat etc. Though IoT has abundant Things, Springer, 2010. ISBN: 978-1-4419-1673-0
[4] Internet of Things,” https://aws.amazon.com/iot/”
benefits, there are some flaws in the IoT governance and [5] Somayya Madakam, R. Ramaswamy, SiddharthTripathi,"Internet of
implementation level. The key observations in the literature Things (IoT): A Literature Review", Journal of Computer and
are that (1) there is no standard definition in worldwide Communications, May 2015, Volume 3, 164-173,
(2) Universal standardizations are required in architectural http://www.scirp.org/journal/jcc
[6] Kosmatos, E.A., Tselikas, N.D. and Boucouvalas, A.C. (2011)
level (3) Technologies are varying from vendor-vendor, so Integrating RFIDs and Smart Objects into a Unified Internet of Things
needs to be interoperable (4) for better global governance, we Architecture. Advances in Internet of Things: Scientific Research, 1, 5-
need to build standard protocols. Let us hope future better 12.
IoT [5]. The Internet has drastically changed the way we [7] Aggarwal, R. and Lal Das, M. (2012) RFID Security in the Context of
“Internet of Things”. First International Conference on Security of
lived, as in scenario all the interaction is done over the Internet of Things, Kerala, 17-19 August 2012, 51-56
Internet. The IoT has the potential to add a new dimension to [8] Min-Woo Ryu, Jaeho Kim, Sang-Shin Lee, and Min-Hwan Song,
this process by enabling communication between smart “Survey on Internet of Things: Toward Case Study", Smart Computing
objects. IoT should be considered as a part of future internet Review, vol. 2, no. 3, June 2012,pp 195-202
[9] Biddlecombe, E. (2009) UN Predicts “Internet of Things”. Retrieved
as everything is going to be connected in a network so that July 6.
objects can interact with each other, but still there are lots of [10] Butler, D. (2020) Computing: Everything, Everywhere. Nature, 440,
issues which are to be solved to make this a reality. Lot of 402-405.
research is required in this field, once implemented [11] Ruchi Parashar1, Abid Khan2, Neha3,"A SURVEY: THE INTERNET
OF THINGS",International Journal of Technical Research and
successfully; the quality of life is improved because of the Applications e-ISSN: 2320-8163, www.ijtra.com Volume 4, Issue 3
reduction of the effort made by humans on unimportant (May-June, 2016), PP. 251-257
things. In this paper, we also presented the technologies and [12] Yinghui H., Guanyu L., 2010. Descriptive Models for Internet of
applications that can be used to make Internet of Things a Things. IEEE International Conference on Intelligent Control and
Information Processing, Dalian, China, Pages: 483- 486.
reality. After that, we state some good examples where [13] Bo Y., Guangwen H., 2008. Application of RFID and Internet of
Internet of Things is of great use, and at last we discuss some Things in Monitoring and Anticounterfeiting for Products. International
open issues, which are still to be solved before the wide Seminar on Business and Information, Wuhan, Hubei, China, Pages:
acceptance of this technology. Thus, from all the above, the 392- 395.
[14] [ongzhu Z., Xueping W., Jiangwei C., Xianghai L., Pengfei C., 2010
contribution of our research could be useful in the literature .Automotive recycling information management based on the internet
especially in the field of IoT area, because provide a fulfill of things and RFID technology. IEEE International Conference on
scheme concerning the application of IoT. The forces behind Advanced Management Science (ICAMS), Changchun, China, page(s):
the development of Internet οf Things, technology push 620 – 622
[15] Muriel D., Juan F., 2010. Expanding the learning environment:
forces and technology pull forces, see in the IoT a vast new combining physicality and virtuality The Internet of Things for
market for the deployment of current and future information eLearning. IEEE International Conference on Advanced Learning
and communication technologies (ICT) that will help both the Technologies (ICALT), Sousse, Tunisia, Pages: 730- 731.
communication of devices. In this paper we also discussed a [16] Mealling M, 2003 Auto-ID Object Name Service (ONS) v1.0, Auto-ID
Center Working Draft
survey of the current technologies used in the IoT domain as [17] https://en.wikipedia.org/wiki/Internet_of_Things
of 2016. Currently, this field is in a very nascent stage. The [18] Miao W., Ting L., Fei L., ling S., Hui D., 2010.Research on the
technologies in the core infrastructure layers are showing architecture of Internet of things. IEEE International Conference on
Advanced Computer Theory and Engineering (ICACTE), Sichuan [45] J. Sen, “A Survey on Wireless Sensor network Security”, International
province, China, Pages: 484-487. Journal of Communications Network and Information Security, vol. 1,
[19] Guangwen H., 2008. Application of RFID and Internet of Things in no. 2, (2009) August, pp. 59-82
Monitoring and Anticounterfeiting for Products. International Seminar [46] http://sensors-and-networks.blogspot.in/2011/08 physical-layer-for-
on Business and Information, Wuhan, Hubei, China, Pages: 392- 395 wireless-sensor.html
[20] Maede Zolanvari,Prof. Raj Jain,"IoT [47] Ahmad Abed AlhameedAlkhatib, and Gurvinder Singh Baicher.
Security:ASurvey",http://www.cse.wustl.edu/~jain/cse570- "Wireless sensor network architecture." International conference on
15/ftp/iot_sec/index.html,pp 1-15 computer networks and communication systems (CNCS 2012)
[21] TuhinBorgohain,UdayKumar,SugataSanyal,"Survey of Security and IPCSIT.Vol. 35. 2012, pp. 11-15
Privacy Issues of Internet of Things",Int. J. Advanced Networking and [48] transmission [48] [Sunil Ghildiyal, Amit Kumar Mishra, Ashish Gupta,
Applications Volume: 6 Issue: 4 Pages: 2372-2378 (2015) ISSN: 0975- Neha Garg, "Analysis of Denial of Service (DoS) Attacks in Wireless
0290,pp 2372-2378 Sensor Networks" IJRET: International Journal of Research in
[22] Jason Pontin: “ETC: Bill Joy's Technology Review, 29 Septemb Engineering and Technology;eISSN: 2319-1163 | pISSN: 2321-7308
November 2013 [49] Woo Ryu, Jaeho Kim, Sang-Shin Lee, and Min-Hwan Song, “Survey
[23] Z.G. Prodanoff, Optimal frame si slotted ALOHA based RFID on Internet of Things: Toward Case Study", Smart Computing Review,
Communications (2009), 1016/j.comcom.2009.11.007 vol. 2, no. 3, June 2012,pp 195-202]
[24] Grieco A., Occhipinti, E. and Colombini, D. (1989) Work Postures and [50] Web site, https://cosm.com/?Pachube_redirect=true
Musculo-Skeletal Disorder in VDT Operators. Bollettino de Oculistica, [51] Zhiyong Shi, Kui Liao, Shiping Yin, Qingbo Ou, “Design and
Suppl. 7, 99-111 Implementation of the Mobile Internet of Things based on TD-SCDMA
[25] Pahlavan, K., Krishnamurthy, P., Hatami, A., Ylianttila, M., Makela, network,” Information Theory and Information Security (ICITIS), 2010
J.P., Pichna, R. and Vallstron, J. (2007) Handoff in Hybrid Mobile Data [52] Qingbin Meng, Jie Jin, “The Terminal Design of the Energy Self-
Networks. Mobile and Wireless Communication Summit, 7, 43-47 Sufficiency Internet of Things,” Control, Automation and Systems
[26] Chen, X.-Y. and Jin, Z.-G. (2012) Research on Key Technology and Engineering (CASE), 2011 International Conference on, 2011
Applications for the Internet of Things. Physics Procedia, 33,561-566 [53] Qingbin, Yongjian Yang, “The design of food quality supervision
[27] Chorost, M. (2008) The Networked Pill, MIT Technology Review, platform based on the Internet of Things,” Transportation, Mechanical,
March and Electrical Engineering (TMEE), 2011 International Conference on,
[28] International Journal of Computer Science Engineering (IJCSE)Big 2011
Data on Internet of Things: Applications, Architecture, [54] Jyoti L. Khachane1, Latika R. Desai2,"Survey Paper on Web Services
Technologies,Techniques and Future Directions in IOT",International Journal of Science and Research (IJSR)ISSN
[29] Advantages of IoT,"Advantages of IoT | Disadvantages of IoT | Internet (Online): 2319-7064,Index Copernicus Value (2013): 6.14 | Impact
of Things",http ://www.rfwirelessworld.com/Terminology/Advantages- Factor (2014): 5.611,pp 635-637]
and-Disadvantages-of-IoT-Internet-Of-Things.html [55] StylianiChatziefthymiou and Sotirios K. Goudos,"A survey of IoT:
[30] Advantages,"The Internet of Architecture, Applications and Future Vision",4th International
Things",https://sites.google.com/a/cortland.edu/the-internet-of- conference on Modern Circuits and System Technologies, pp 1-3
things/advantages [56] Madakam, R. Ramaswamy, SiddharthTripathi,"Internet of Things
[31] Bhaskara Reddy Sannapureddy,"Pros & Cons of Internet Of Things (IoT): A LiteratureReview",Journal of Computer and Communications,
(IOT)",https://www.linkedin.com/pulse/pros-cons-internet-things-iot- 2015, 3, 164-173 Published Online May 2015 in SciRes.
bhaskara-reddy-sannapureddy http://www.scirp.org/journal/jcchttp://dx.doi.org/10.4236/jcc.2015.350
[32] Disdvantages , " The Internet of 21,pp 164-173
Things",https://sites.google.com/a/cortland.edu/the-internet-of- [57] Lianos, M. and Douglas, M. (2000) Dangerization and the End of
things/advantages Deviance: The Institutional Environment. British Journal of
[33] Towards Internet of Things: Survey and Future Vision Omar Said Criminology, 40, 261-278
o.saeed@tu.edu.sa IT/ College of Computers and Information [58] Ferguson, T. (2002) Have Your Objects Call My Object. Harvard
Technology Taif University Taif, Saudi Arabia. Mehedi Masud Business Review, June, 1-7
mmasud@tu.edu.sa CS/ College of Computers and Information [59] Dodson, S. (2008) The Net Shapes up to Get Physical. Guardian
Technology Taif University Taif, Saudi Arabia [60] Graham, M. and Haarstad, H. (2011) Transparency and Development:
[34] Whitehouse, "Security of Things: An Implementers Guide to Cyber- Ethical Consumption through Web 2.0 and the Internet of Things.
Security for Internet of NCC Group Publications, Apr. 2014 Research Article, 7
[35] Raza Shahid, "Lightweight Security Solutions for the Internet of [61] Jayavardhana, G., Rajkumar, B., Marusic, S. and Palaniswami, M.
Things", Doctoral thesis, Mlard (2013) Internet of Things: A Vision, Architectural Elements, and
[36] Malisa Vucinic, Bernard Tourancheau, Franck Rousseau, Andrzej Future Directions. Future Generation
Duda, Laurent Damon, Robert [62] Shao, W. and Li, L. (2009) Analysis of the Development Route of IoT
[37] Rodrigo Roman, Pablo Najera, Javier Lopez, "Securing the Internet of in China. Perking: China Science and Technology Information, 24,
Things", Computer Societ 58, Sep. 2011 330-331
[38] Whitehouse, "Security of Things: An Implementers Guide to Cyber- [63] Luigi A., Antonio I., Giacomo M. 2010.The Internet of Things: A
Security for Internet of NCC Group Publications, Apr. 2014 survey. Science Direct journal of Computer Networks, Volume 54,
[39] TuhinBorgohain, UdayKumar,SugataSanyal,"Survey of Security and Pages: 2787–2805
Privacy Issues of Internet of Things",Int. J. Advanced Networking and [64] Zouganeli E., Einar Svinnset I., 2009. Connected Objects and the
ApplicationsVolume: 6 Issue: 4 Pages: 2372-2378 (2015) ISSN: 0975- Internet of Things – a Paradigm Shift. International Conference on
0290,pp 2372-2378 Photonics in Switching, Pisa, Italy, Pages: 1-4
[40] [AashimaSingla, RatikaSachdeva, “Review on Security Issues and [65] Tongzhu Z., Xueping W., Jiangwei C., Xianghai L., Pengfei C., 2010
Attacks in Wireless Sensor Networks” International Journal of .Automotive recycling information management based on the internet
Advanced Research in Computer Science and Software Engineering of things and RFID technology. IEEE International Conference on
<www.ijarcsse.com>. Volume 3, Issue 4, April 2013 ISSN: 2277 128X Advanced Management Science (ICAMS), Changchun, China, page(s):
[41] M. Sharifnejad, M. Shari, M. Ghiasabadi and S. Beheshti, “A Survey 620 – 622
on Wireless Sensor Networks Security”, SETIT, (2007) [66] Gustavo G, Mario O., Carlos K., 2008. Early infrastructure of an
[42] B. T. Wang and H. Schulzrinne, “An IP traceback mechanism for Internet of Things in Spaces
reflective DoS attacks”, Canadian Conference on Electrical and [67] Gubbi, Buyya, Marusic, Palaniswami,Internet of Things (IoT): A
Computer Engineering, vol. 2, (2004)May 2-5, pp. 901-904 vision, architectural elements, and future directions, Future Generation
[43] Sen, Jaydip. "Security and privacy challenges in cognitive wireless Computer Systems 29 (2013) 1645-1660
sensor networks." arXiv preprint arXiv: 1302.2253 (2013) [68] Zanella ,Bui, Castellani, Vangelista, Zorzi, Internet of Things for Smart
[44] M. Saxena,“Security in Wireless Sensor Networks-A Layer based Cities, IEEE Internet of Things journal, VOL. 1, NO. 1, February 2014
classification”, Technical Report, Center for Education and Research in [69] Palatella ,Accettura, Vilajosana, Watteyne, Grieco, Boggia, Dohler,
Information Assurance &Security-CERIAS, Purdue University. Standarized Protocol Stack for the Internet of (Important) Things, IEEE
pages.cs.wisc.edu/~msaxena/papers/2007-04-cerias.pdf, (2007)
Communications Surveys & Tutorials, VOL. 15, NO. 3, THIRD [90] Chakraborty, Dipanjan, et al. "Toward distributedservice discovery in
QUARTER 2013 pervasive computingenvironments." Mobile Computing, IEEE
[70] Huang, Li, A Semantic Analysis for Internet of Things, 2010 Transactionson 5.2 (2006): 97-112
International Conference on Intelligent Computation Technology and [91] Rambold, Michael, et al. "Towards autonomic servicediscovery a
Automation survey and comparison." ServicesComputing, 2009. SCC'09. IEEE
[71] Singh, Tripathi, Jara, A survey of Internet-of-Things: Future Vision, InternationalConference on. IEEE, 2009
Architecture, Challenges and Services, 2014 IEEE World Forum on [92] Rong, Wenge, and Kecheng Liu. "A survey of context aware web
Internet of Things (WF-IoT) service discovery: from user'sperspective." Service Oriented System
[72] Shin, A socio-technical framework for Internet-of-Things design: A Engineering(SOSE), 2010 Fifth IEEE International Symposium
human-centred design for the Internet of Things, Telematics and on.IEEE, 2010.
Informatics 31 (2014) 519–531 [93] Miao Wu, Ting-Jie Lu, Fei-Yang Ling, Jing Sun and Hui-Ying Du,
[73] Louis COETZEE, Johan EKSTEEN, “The Internet of Things – Promise "Research on the architecture of Internet of Things," 2010 3rd
for the Future? An Introduction,” in Proc. of IST-Africa 2011 International Conference on Advanced Computer Theory and
Conference, 2011 Engineering(ICACTE), Chengdu, 2010, pp. V5-484-V5-487.doi:
[74] A. Gavras, A. Karila, S. Fdida, M. May, and M. Potts, “Future Internet 10.1109/ICACTE.2010.5579493
research and experimentation,” ACM SIGCOMM Computer [94] M. Weyrich and C. Ebert, “Reference architectures for the internet of
Communication Review, vol. 37, 2007 things,” IEEE Software, vol. 33, no. 1, pp. 112–116, 2016.
[75] IEEE SA 21451-7-2011, “IEEE Information technology--Smart [95] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of
transducer interface for sensors and actuators--Part 7: Transducers to Things (IoT): a vision, architectural elements, and future directions,”
radio frequency identification (RFID) systems communication Future Generation Computer Systems, vol. 29, no. 7, pp. 1645–1660,
protocols and transducer electronic data sheet (TEDS) formats,” Sensor 2013.
and RFID Integration Working Group (SRFID), 2011 [96] F. Bonomi, R. Milito, P. Natarajan, and J. Zhu, “Fog computing: a
[76] Uckelmann. Dieter, Isenberg. Marc-André, Teucke. Michael, Halfar. platform for internet of things and analytics,” in Big Data and Internet
Harry, Scholz-Reiter. Bernd, An integrative approach on Autonomous of Things: A Road Map for Smart Environments, pp. 169–186,
Control and the Internet of Things,” Unique Radio Innovation for the Springer, Berlin, Germany, 2014.
21st Century: Building Scalable and Global RFID Networks, pp. 163- [97] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its
181, April 2011. role in the internet of things,” in Proceedings of the 1st ACM MCC
[77] Qingbin Meng, Jie Jin, “The Terminal Design of the Energy Self- Workshop on Mobile Cloud Computing, pp. 13–16, 2012.
Sufficiency Internet of Things,” Control, Automation and Systems [98] I. Stojmenovic and S. Wen, “The fog computing paradigm: scenarios
Engineering (CASE), 2011 International Conference on, 2011 and security issues,” in Proceedings of the Federated Conference on
[78] Bin Guo, Daqing Zhang, Zhu Wang, “Living with Internet of Things, Computer Science and Information Systems (FedCSIS '14), pp. 1–8,
The Emergence of Embedded Intelligence,” ITHINGSCPSCOM '11 IEEE, Warsaw, Poland, September 2014.
Proceedings of the 2011 International Conference on Internet of Things [99] M. Aazam and E.-N. Huh, “Fog computing and smart gateway based
and 4th International Conference on Cyber, Sep 2011 communication for cloud of things,” in Proceedings of the 2nd IEEE
[79] Bhattasali, Tapalina, Rituparna Chaki, and SugataSanyal. "Sleep International Conference on Future Internet of Things and Cloud
Deprivation Attack Detection inWireless Sensor Network." arXiv (FiCloud '14), pp. 464–470, Barcelona, Spain, August 2014.
preprint arXiv:1203.0231(2012) [100] Pallavi Sethi ,Smruti R. Sarangi,” Internet of Things: Architectures,
[80] G. Bianchi, “A comparative study of the varioussecurity approaches Protocols, and Applications”,Journal of Electrical and Computer
used in wireless sensor networks,”International Journal of Advanced Engineering Volume 2017 (2017), Article ID 9324035, 25 pages,
Science andTechnology, vol. 17, (2010)April, pp. 31-44 https://doi.org/10.1155/2017/9324035
[81] Roy, Bibhash, Suman Banik, Parthi Dey, Sugata Sanyaland Nabendu [101] https://www.gsma.com/iot/mobile-internet-of-things-industry-paper/
Chaki, "Ant colony based routing formobile ad-hoc networks towards [102] Fortino G., Guerrieri A., Russo W.Agent-oriented smart objects
improved quality ofservices." Journal of Emerging Trends in developmentProceedings of the 16th International Conference on
Computingand Information Sciences 3.1 (2012): 10-14 Computer Supported Cooperative Work in Design (CSCWD ′12)May
[82] Vipul Goyal, Ajith Abraham, Sugata Sanyal and SangYong Han, “The 2012Wuhan, ChinaIEEE90791210.1109/cscwd.2012.62219292-s2.0-
N/R One Time Password System.”Information Assurance and Security 84864195643
Track (IAS'05),IEEE International Conference on [103] Gubbi J., Buyya R., Marusic S., Palaniswami M.Internet of Things
InformationTechnology: Coding and Computing (ITCC'05), (IoT): a vision, architectural elements, and future directionsFuture
USA,April, 2005. pp 733-738, IEEE Computer Society Generation Computer
[83] C. Karlof and D. Wagner, “Secure Routing in Sensor Networks: Systems20132971645166010.1016/j.future.2013.01.0102-s2.0-
Attacks and Countermeasures”,Elsevier’sAdHoc Networks Journal, 84876943063
Special Issue onSensor Network (SNPA), (2003)September, pp. 293- [104] Atzori L., Iera A., Morabito G.From ‘smart objects’ to ‘social objects’:
315 the next evolutionary step of the internet of thingsIEEE
[84] D. Guinard, T. Vlad, Towards the web of things: web mashups for Communications
embedded devices, in: Proceedings of the International World Magazine20145219710510.1109/mcom.2014.67100702-s2.0-
WideWeb Conference 2009 (WWW 2009), Madrid, Spain, April 2009. 84893373985
[85] A.M. Vilamovska, E. Hattziandreu, R. Schindler, C. Van Oranje, H. [105] Cirani S., Davoli L., Ferrari G., Leone R., Medagliani P., Picone M.,
DeVries, J. Krapelse, RFID Application in Healthcare – Scoping Veltri L.A scalable and self-configuring architecture for service
andIdentifying Areas for RFID Deployment in Healthcare Delivery, discovery in the internet of thingsIEEE Internet of Things
RANDEurope, February 2009. Journal20141550852110.1109/JIOT.2014.23582962-s2.0-
[86] J. Sung, T. Sanchez Lopez, D. Kim, The EPC sensor network for 84908447810
RFIDand WSN integration infrastructure, in: Proceedings of [106] Jongbae Kim, Jinsung Byun, Daebeom Jeong, Myeong-in Choi,
IEEEPerComW’07, White Plains, NY, USA, March 2007. Byeongkwan Kang, Sehyun Park,”An IoT-Based Home Energy
[87] G. Broll, E. Rukzio, M. Paolucci, M. Wagner, A. Schmidt, H. Management System over Dynamic Home Area
Hussmann,PERCI: pervasive service interaction with the internet of Networks”,International Journal of Distributed Sensor
things, IEEEInternet Computing 13 (6) (2009) 74–81 Networks,January 1, 2015
[88] Zhang, Lili, et al. "Research on IOT RESTful Web Service [107] Daniel Burrus, Burrus Research,”The Internet of Things Is Far Bigger
Asynchronous Composition Based on." Intelligent Human-Machine Than Anyone Realizes”, https://www.wired.com/insights/2014/11/the-
Systems andCybernetics (IHMSC), 2014 Sixth InternationalConference internet-of-things-bigger/
on. Vol. 1. IEEE, 2014
[89] Gao, Ruiling, et al. "Web-based motion detectionsystem for health
care."Computer and InformationScience (ICIS), 2015 IEEE/ACIS 14th
InternationalConference on. IEEE, 2015
Author’s Info