ArticlePDF Available

Internet of Things Architecture: Current Challenges and Future Direction of Research

Authors:

Abstract and Figures

The Internet of Things (IoT) is a new paradigm that can enable collecting and exchanging data that have never been attainable before. It able to communicate and report user's information in a more secure way. The reports of Cisco analysts estimate that the IoT will have more than 50 billion of smart sensors and other smart devices or gadgets, all connecting and communicating real time data on the internet by 2020. This will provide deeper insights with data analytics using the IoT paradigm to establish new business, enhance productivity and efficiency, and develop innovative revenue streams. Furthermore, the IoT architecture may combine features and technologies suggested by various methodologies. Since, this architecture is designed where the digital and real worlds are integrating and interacting constantly, various technologies are merged together to form IoT, such as; sensing technologies, pervasive computing, ubiquitous computing, internet protocols, smart objects, embedded parts, etc. When a regular device utilizes intelligent agents, it becomes a smart object. In this way, it is not only used to gather the environment information or interact with the physical world, yet more than that, it must be interconnected with various network devices to exchange and communicate data over the internet. Therefore, the significant measure of available data which is produced by the immense number of interconnected devices will offer opportunities to generate information that will deliver significant benefits to the economy, environment, individuals, and society. In this paper, we present past, current, and future direction of IoT. This paper provides overview and clear examination of the IoT architecture paradigm with the description of its fundamental requirements along with the implementation challenges and future directions. Thus, it will open issues that will face the IoT by new world generation.
Content may be subject to copyright.
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 21 (2017) pp. 11055-11061
© Research India Publications. http://www.ripublication.com
11055
Internet of Things Architecture: Current Challenges and Future Direction
of Research
M. A. Burhanuddin1, Ali Abdul-Jabbar Mohammed2, Ronizam Ismail3 and Halizah Basiron4
1,2,4 Faculty of Information and Communications Technology, UTeM, Melaka, Malaysia.
3Kolej Universiti Islam Melaka, Kuala Sg Baru, Melaka, Malaysia.
Email: 1burhanuddin@utem.edu.my, 2p031610009@student.utem.edu.my, 3ronizam@kuim.edu.my, 4halizah@utem.edu.my
ORCID ID: 10000-0001-8976-7416, 20000-0002-7040-7098, 30000-0002-7570-4470
Abstract
The Internet of Things (IoT) is a new paradigm that can enable
collecting and exchanging data that have never been attainable
before. It able to communicate and report user’s information in
a more secure way. The reports of Cisco analysts estimate that
the IoT will have more than 50 billion of smart sensors and
other smart devices or gadgets, all connecting and
communicating real time data on the internet by 2020. This will
provide deeper insights with data analytics using the IoT
paradigm to establish new business, enhance productivity and
efficiency, and develop innovative revenue streams.
Furthermore, the IoT architecture may combine features and
technologies suggested by various methodologies. Since, this
architecture is designed where the digital and real worlds are
integrating and interacting constantly, various technologies are
merged together to form IoT, such as; sensing technologies,
pervasive computing, ubiquitous computing, internet protocols,
smart objects, embedded parts, etc. When a regular device
utilizes intelligent agents, it becomes a smart object. In this
way, it is not only used to gather the environment information
or interact with the physical world, yet more than that, it must
be interconnected with various network devices to exchange
and communicate data over the internet. Therefore, the
significant measure of available data which is produced by the
immense number of interconnected devices will offer
opportunities to generate information that will deliver
significant benefits to the economy, environment, individuals,
and society. In this paper, we present past, current, and future
direction of IoT. This paper provides overview and clear
examination of the IoT architecture paradigm with the
description of its fundamental requirements along with the
implementation challenges and future directions. Thus, it will
open issues that will face the IoT by new world generation.
Keywords: Internet of Things, Information System, Machine
to Machine communications, Wireless Networking, Embedded
Systems
INTRODUCTION
Today, Internet of Things (IoT) is a rising network of
interrelated computing devices and sensors that contain
embedded technology which is enable these objects to collect
and exchange data with the Internet. The IoT incorporates
various smart objects, which are allocated exceptional
characters of its own [1]. It is a wide-ranging network of
physical smart objects, i.e. devices, sensors, transports, and
constructions, associated with programs, electronics, hardware
and network connectivity that empowers these things to
accumulate and exchange data. The unique identity
administration is very significant for ensuring the system
efficiency of IoT network [2]. Since IoT is a task-oriented
network, there is a necessity to provide coupling relation
among its unique identity’s. The IoT allows the connected
smart objects to remain distinguished and remotely controlled
by the existing system, lead up to achieve upgraded accuracy,
better efficiency, and monetary favourable position. All objects
are unique and identifiable with the embedded software [3].
Due to the tremendous headways in the remote communication
systems field, the deployments of mobile devices and global
services expand quickly in the previous decade. Nowadays, the
major role played by IoT is never again restricted to connect
user devices and appliances over the Internet. Yet, it has been
growing turning into a chance to interlink the physical world
with the Cybernet world [4], prompting the rise of Cyber-
Physical Systems. The idea of Cyber-Physical Systems
introduces the coming era of embedded systems in Information
and communication technology where computation and
network interacting are joint with physical procedures.
Accordingly, these systems control and deal with their dynamic
forces to be proficient, solid, adaptable, and more secure [5],
[6]. The information that represent the physical procedures are
exchanged, prepared, and utilized as a part of the digital world,
as example, information gathered by varies sensors. Yet, this
information may likewise affect and impact the physical
procedures by input feedback loops, such as, utilizing actuators
[4]. The idiosyncrasies of Cyber-Physical Systems are
including an integrated design of the Information and
communication technology systems combined with the
physical mechanisms to increase the general adequacy.
Therefore, these lines being interestingly with the traditional
systems for the reason of including electronics, processing,
communication and technology in one operating system. The
IoT is reached out with a huge number of sensors and actuators.
Some late examinations into the studies assess that the IoT will
comprise about 50 billion objects by 2020 [7].
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 21 (2017) pp. 11055-11061
© Research India Publications. http://www.ripublication.com
11056
Figure 1: IoT Communication infrastructure [8]
THEORETICAL BACKGROUND
IoT is a complete system of interconnected smart devices
involved in electrical, mechanical, and digital machines
accompanied with the animals or people environments. These
smart devices are equipped by unique identifiers and it can
communicate through the network without needing of human
interactions. The (Figure 1) demonstrates the foundation of IoT
infrastructure and its connection associations.
As Luigi Atzori, et. al [9] talked about IoT as a system of
interrelated computing devices, computerized mechanical
machines, items, or individuals that are given typical identifiers
and have the capacity to exchange data through the network
without expecting human collaboration. In their study, IoT is
proclaimed to be a fundamental system of connected smart
devices or objects equipped with data gathering Technologies.
Thus, those devices or objects can connect and communicate
with each other autonomously. The machine-to-machine data
that is created has an extensive variety of uses, but it is usually
observed as a method to decide accountability of governing of
real significance in the IoT [9]. As business proceedings and
information interactions are brought out through that system, it
is vital for the included groups to know how the individual
activities will be examined. Besides, if commercial transactions
fall flat for the reason of shortcomings in the system,
organizations need to know whom to consider responsible. The
likelihood of holding governing bodies responsible for their
failures for the most part enhances their administrations
because of the risk of approvals. The IoT, which needs to adapt
to the particularities in the different portions of society, needs
to catch up on a multi-stake holder approach way to deal with
responsibility. Governance would get more grounded if norms
were orchestrated in a way that makes governing bodies
responsible, at any rate at the hierarchical organizational level
of IoT. Daniele Miorandi, et, al. [10] investigated large and
growing body of IoT, which envision digital and physical
linked and appropriate information and communication
technologies which businesses can rely on it. The information
ought to be more fitting information and the more promptly
accessible and recipients of accountability. Extraordinary
thought has to be by [9], [10], which are concentrated on
standards to be presented that considers representing bodies
responsible and this help the improvement of security in IoT.
Furthermore, Boundless organization of spatially distributed
devices with embedded identification, detecting or incitation
abilities are proposed.
In [10], [11], the researchers emphasized that virtual things like
world-wide-web, internet or cloud will be presented more
physical and replace hardware technologies in a near future.
They proposed that which digital and physical can be connected
means fitting information and communication technologies
will improve virtualization for all areas in IoT. Daniele
Miorandi, et, al. [10] introduced a study of Technologies,
applications, and research challenges for IoT, while Verdouw
et al. [11] appears on how IoT idea can be utilized to upgrade
virtualisation of supply chains in the floricultural division.
Giuseppe Colistra, et al. [12] detailed IoT model in
communication between devices by placing knowledge into
smart objects to be interconnected with one another over the
internet to exchange their data and information. Thus, the full
transparency is obtainable with not so much inefficiencies but
rather additional quality. They design intelligence insight by
actualize key interoperability abilities into smart objects in a
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 21 (2017) pp. 11055-11061
© Research India Publications. http://www.ripublication.com
11057
case study. This is by get resource allocation for the placement
of distributed applications in the IoT and open issues and
identified problems and difficulties in research to be confronted
with the IoT recognition in the real application. Giuseppe
Colistra, et al. [12] revealed on emerging all kinds of smart
object that implement systems of cooperative intelligent nodes
or objects. By using IoT, they proved promising paradigm that
provide a pervasive information access through cooperation
among nodes. Sahraoui Somia, et al. [13] enhanced the model
provided in [12] by showing different methods for both studies.
They proposed a compromise protocol for the participation
among network objects in accomplishing the target application.
Besides, they suggest an IPv6 over Low-power Wireless
Personal Area Networks compression for the header of Host
Identity Protocol packets, as well as, an adjusted sharing
structure of security computational load in HIPBaseEXchange.
The distinctive case studies examination for [12], [13] are
utilized resource allocation for the deployment of distributed
applications in the IoT. Correspondingly, the design and
functionalities of appropriate middleware that tends to a
conceivable reaction for this matter, material and technological
heterogeneity. Furthermore, the asymmetric behaviour of the
communications between the sensor nodes and the
conventional Internet hosts are making security a challenging
issue [14], [15].
In [13], [16], the researchers discussed the challenging problem
of security about the technological heterogeneity of IoT
technologies along with the asymmetric behaviour in
communications among the conventional Internet hosts and the
sensor nodes. They proposed a similar objective which is
incorporated in the management structure for IoT devices.
Perhaps, adequately energy proficient with a little settlement
delay of security, underpins effective assessment of security
strategies to empower the assurance and protection of client
data. Ricardo Neisse, et. al [16] examined security and data
quality risk of using IoT technologies. The researcher proposed
a different model Based Security Toolkit Model, which is
coordinated in a management framework for IoT devices.
Furthermore, in the distributed IoT architecture, a light weight
and cross-domain prototype is proposed. This prototype is
giving least data caching functionality likewise in-memory data
handling. Sabrina Sicari, et. al [17] presented algorithms that
can be used for the evaluation of data quality and security. The
algorithms incorporate determination and effective assessment
of security strategies to empower the assurance and safety of
IoT data. The research studies in [17], [18] have common goals
as the huge amount of heterogeneous interconnected devices
and the omnipresence of IoT devices increase the demand of
jointly security and privacy requirements. They examine the
light weight and cross-domain prototype that proposed for the
distributed architecture of IoT, giving least data caching
functionality as well as minimum in-memory data handling.
They also carried out detail performance evaluation for the
widely utilized cryptographic algorithms on constrained
objects or things which is accustomed in IoT networks.
CRITICAL LITERATURE AND ANALYSIS
The IoT have developed from the integration of internet
systems, wireless technologies, microservices, micro-
electromechanical, and electrical fields. The modern
technologies certainly create viability of the IoT concept. The
(Figure 2) summarized the adoption of different connectivity
technologies in IoT domain. However, These technologies are
not amalgamate with the scalability and efficiency that they
would demand [9]. With the due concern of the IoT
applications by various industries, Luigi Atzori, et al. [9]
believe that orating these topics in upcoming years will be a
dominant driving factor for networking and communication
researches in both industrial and academic fields.
Figure 2: the adoption of different connectivity technologies in IoT
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 21 (2017) pp. 11055-11061
© Research India Publications. http://www.ripublication.com
11058
According to Weber [19], the utility of development in
technologies are to:
improve participation procedures;
offer information on significant concerns for the
community and civil society in good time.
form the opportunities as the elementary contrivance to
interchange of perceptions.
deliver adequate context and background information for
literature to assist the concerned market participants to
apprehend the subjects being the topics of accountability.
explain authorizations regarding non-compliance with
accountability necessities.
Moreover, it leads to alleviate the security in the IoT. The
exploration in this segment indicates that impending challenges
are rather alarmed with functional and organizational matters
than just technology problems (like most IoT trials as
sermonized in literature) [11]. Verdouw [11] presented work on
the design and implementation of novel elucidations for the
discoursed challenges in the supply chain. The paper has
measured how the IoT can ameliorate virtualization in
floriculture. Daniele Miorandi, et al. [10] presented a synopsis
of the vital topics allied to the development of IoT technologies
and services. Numerous research challenges have been
empathized such as security, which are anticipated to turn into
major research trends in the future [10]. Additionally, Borgia
[20] discussed the major challenges that must be encountered
to sustain the IoT vision, which encompasses varies areas to
study, such as: data management, data processing, discovery,
architecture, communication, handling security and privacy,
etc. Various recommended solutions have been proposed,
which are intended for resolving those challenges.
Nevertheless, these proposed solutions are not comprehensive
and do not deal with all the different characteristics.
Consequently, many undeveloped matters reckons for suitable
solutions [20].
The outcomes of the assessment had an obvious reveal that the
solution is adequately efficient in energy saving within dual
category-messages communication and security establishment
[13]. A few instruments and studies treat the security and
protection of privacy in the IoT [18]. Furthermore, Ricardo
Neisse, et. al [16] revealed that the trust is an efficient factor
for using IoT. In the previous literature, numerous factors have
been well observed and studied, for example; security, trust,
privacy protection, etc. These factors and aspects are serving
the IoT but insufficient enough to address and handle it in
public and private sectors. Therefore, many studies need to be
done in this field by researchers in the future. Moreover, IoT
needs more attention from non- academic disciplines such as,
software and architecture engineers. The patterns of
convergence have supported the conjunction between the
information technology and operational technology. This is
permitting the unstructured data, which is generated by
operational machines to be investigated for knowledge insights
that will drive continual enhancements.
IoT IMPLEMENTATION REQUIREMENTS
The IoT implementation requirements are considered as critical
requirements for the upcoming IoT architectures, which are
described in the following subsections:
Scalability:
With the huge number of objects that connected to the IoT
infrastructure, it is considered that every connected object has
its own virtual representation [21]. Therefore, scalability
requirement is desirable to extend the functionality of open
standards for future IoT applications. Moreover, while the
expansion of IoT is growing via the widespread adoption of
new applications, the future IoT architectures must be meet
scalability requirements.
Interoperability:
The requirement of empowering the communications amongst
various objects by different service providers is highly
important in the future IoT architectures [22]. Therefore, the
IoT architectures requires interoperability standards to create
parallel or open platforms that support the comprehensive
potentials of seamless connection practice among all types of
IoT applications and devices. Moreover, to enable the
communication practices amongst all things in the future IoT
architectures regardless of its origin.
Security:
Strengthening security is a significant aspect of IoT
applications, due to the challenging task of protecting the
sensitive information transmitted and processed in the hostile
environments around IoT [23]. Thus, it can be truly considered
as a future key requirement of IoT deployments to prevent these
large scales of IoT applications being controlled by
unauthorized parties. Moreover, the security mechanisms of
IoT design strategy should be a lightweight enough because of
resource constrained properties of IoT devices. Accordingly,
the lack of security policy the future IoT architectures can
threaten the users trust, so this will lead up to the failure of the
whole technology [24].
Resource Control and Management:
The accessibility and configuration of the participating smart
objects among IoT applications should be performed remotely.
This will help controlling the resources efficiently if the
administrators are not available at their certain places. Besides,
redundant resource constraints may affect the IoT systems,
which need to balance the load for appropriate resource
utilization [25].
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 21 (2017) pp. 11055-11061
© Research India Publications. http://www.ripublication.com
11059
Energy Efficiency:
The life time is the most functioning sustainability
apprehension in the smart objects that participating among IoT
applications [17]. Therefore, the energy awareness is very
important to reduce the resource constraints by eliminating
redundant energy consumption. Accordingly, the design
strategy of IoT architecture should be minimize energy
consumption by the development of lightweight properties of
the communication techniques and methods.
Quality of Service (QoS):
The ability of providing satisfactory service to users is a
significant requirement of IoT system architectures. QoS is a
non-functional facility factor, that can be obtained by
organizing the services provided and retrieval [15]. As
example, real time processing applications impose a high
precedence to perform typical performance. Correspondingly,
only the compulsory information should be retrieved in
response to the addressed request.
DISCUSSION ON CHALLENGES AND FUTURE
DIRECTION IN IoT ARCHITECTURES
Several requirements have to be accomplished to achieve a
functional implementation of IoT architecture. The section
discusses some of the issues and challenges that remaining for
implementing the future IoT system architectures. The purpose
is to provide a clear examination for the current challenges and
give some research directions in the IoT domain. Therefore, we
will focus in this paper on the issues and challenges regarding
scalability, interoperability, and security requirements in the
IoT architecture, as the following:
Scalability:
With the huge number of interacting entities, the future IoT
systems are expected to deal with numerous challenges because
of the significant differences in the interaction patterns and
communication behaviours [26]. The challenge of providing
available service to the different types of IoT devices
concerning their demands is very critical for the reason of the
various and plentiful applications of IoT. Thus, it a requirement
to scale up the IoT architectures to handle huge number of
connected entities. The scalability development process of IoT
systems can be accelerated with the fast-growing number of
IoT devices [27]. Nevertheless, the existing scalability
management protocols do not deal well with the rapid
expansion of IoT devices due to their resource limitations and
constraints.
Interoperability:
The interoperability challenges in the future IoT applications
can be divided to three main challenge types as follow:
The technical interoperability challenges: this type of
challenges has a concern with the capabilities, standards, and
protocols of the IoT connected devices, which are aiming to
support seamless connection practice within the same
computing paradigm among all types of IoT applications.
Therefore, the successful technical interoperability can be
achieved through the implementation of agent based mediation
among all IoT related standards, and protocols.
The semantic challenges: is the apprehension of the ability of
different components in IoT architecture to be trustworthy for
processing and handling the exchanged data.
The pragmatic challenges: is the apprehension of the ability of
the IoT system to observe the intentions of different
participating parties. Therefore, the requirement of pragmatic
interoperability can be realized by the design a predefined
specifications strategy for the components and behaviour of the
IoT system.
Security:
The IoT architecture is complex in nature because of the vast
range and heterogeneity of IoT applications, which leads to
several security challenges [23]. This IoT architecture is
assumed to deal with billions of sensors and objects, which are
interacting with each other and with other entities, such as
human beings or virtual entities [28]. It is essential to secure
and protect all these interactions with preservation of the
highest system performance and limiting total incidents which
are affecting the entire IoT system. The implementation of
security standards can be delivered through the bottom-up
manner. The IoT architecture should follow the bottom-up
manner by delivering a secure system booting process, end user
authentication procedures, firewall regulations, and access
control rules. Furthermore, the IoT system must track and
follow the security updates and patches in non-disruptive
direction. Accordingly, it is essential to apply the appropriate
security mechanisms for all IoT system levels and stages with
the physical and non-physical system components.
CONCLUSION
The expansion of computational objects and things have been
equipped with communication and interactive capabilities of
embedded intelligence. This innovation motivates in the
direction of the rapid development of the IoT field. Toward the
emergent IoT paradigm, a global dynamic network will connect
everything and anything by forming virtual linkage of
integrated and addressable devices. Henceforward, the
consequence will boost users to expand novel solutions to be a
durable and powerful fundamental structure to the worldwide.
Consequently, the trends of IoT domain have been discussed in
this paper in the perspective of different research areas such as;
architecture, data management, data processing,
communication, security and privacy. Thus, this paper provides
overview and clear examination of the essential definition of
IoT architecture paradigm. Finally, we have discussed the main
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 21 (2017) pp. 11055-11061
© Research India Publications. http://www.ripublication.com
11060
IoT fundamentals along with the implementation challenges
and future directions of its requirements.
ACKNOWLEDGEMENT
The authors would like to thank UTeM Zamalah scheme,
Universiti Teknikal Malaysia Melaka (UTeM) for providing
financial support and facilities in this study. Also, gratefully we
would like to acknowledge and thank Kolej Universiti Islam
Melaka (KUIM) to support this research.
REFERENCES
[1] S. Li, L. Da Xu, and S. Zhao, “The internet of things: a
survey,” Inf. Syst. Front., vol. 17, no. 2, pp. 243259,
2015.
[2] A. Whitmore, A. Agarwal, and L. Da Xu, “The Internet
of Things???A survey of topics and trends,” Inf. Syst.
Front., vol. 17, no. 2, pp. 261274, 2015.
[3] R. Khan, S. U. Khan, R. Zaheer, and S. Khan, “Future
internet: The internet of things architecture, possible
applications and key challenges,” Proc. - 10th Int. Conf.
Front. Inf. Technol. FIT 2012, pp. 257260, 2012.
[4] M. Conti, S. K. Das, C. Bisdikian, M. Kumar, L. M. Ni,
A. Passarella, G. Roussos, G. Tröster, G. Tsudik, and F.
Zambonelli, “Looking ahead in pervasive computing:
Challenges and opportunities in the era of cyberphysical
convergence,” Pervasive Mob. Comput., vol. 8, no. 1,
pp. 221, 2012.
[5] L. Insup, O. Sokolsky, I. Lee, O. Sokolsky, C. Electronic
Design Automation, A. C. M. S. I. G. on D. Automation,
C. Ieee, L. Insup, O. Sokolsky, I. Lee, O. Sokolsky, C.
Electronic Design Automation, A. C. M. S. I. G. on D.
Automation, C. Ieee, L. Insup, and O. Sokolsky,
“Medical Cyber Physical Systems,” Des. Autom. Conf.
(DAC), 2010 47th ACM/IEEE, pp. 743748, 2010.
[6] S. Barro-Torres, T. M. Fernández-Caramés, H. J. Pérez-
Iglesias, and C. J. Escudero, “Real-time personal
protective equipment monitoring system,” Comput.
Commun., vol. 36, no. 1, pp. 4250, 2012.
[7] S. Agrawal and D. Vieira, “A survey on Internet of
Things,” Abak{ó}s, Belo Horiz., vol. 1, no. 2, pp. 7895,
2013.
[8] I. Yaqoob, E. Ahmed, I. A. T. Hashem, A. I. A. Ahmed,
A. Gani, M. Imran, and M. Guizani, “Internet of Things
Architecture: Recent Advances, Taxonomy,
Requirements, and Open Challenges,” IEEE Wirel.
Commun., vol. 24, no. 3, pp. 1016, 2017.
[9] L. Atzori, A. Iera, and G. Morabito, “The Internet of
Thinags: A survey,” Comput. Networks, vol. 54, no. 15,
pp. 27872805, 2010.
[10] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac,
“Internet of things: Vision, applications and research
challenges,” Ad Hoc Networks, vol. 10, no. 7. pp. 1497
1516, 2012.
[11] C. N. Verdouw, A. J. M. Beulens, and J. G. A. J. van der
Vorst, “Virtualisation of floricultural supply chains: A
review from an internet of things perspective,” Comput.
Electron. Agric., vol. 99, pp. 160175, 2013.
[12] G. Colistra, V. Pilloni, and L. Atzori, “The problem of
task allocation in the Internet of Things and the
consensus-based approach,” Comput. Networks, vol. 73,
pp. 98111, 2014.
[13] S. Sahraoui and A. Bilami, “Efficient HIP-based
approach to ensure lightweight end-to-end security in the
internet of things,” Comput. Networks, vol. 91, pp. 26
45, 2015.
[14] M. Gerla, D. Maggiorini, C. E. Palazzi, and A. Bujari,
“A survey on interactive games over mobile networks,”
Wirel. Commun. Mob. Comput., vol. 13, no. 3, pp. 212
229, 2013.
[15] W. Wang, S. De, R. Toenjes, E. Reetz, and K. Moessner,
“A comprehensive ontology for knowledge
representation in the internet of things,” in Proc. of the
11th IEEE Int. Conference on Trust, Security and
Privacy in Computing and Communications, TrustCom-
2012 - 11th IEEE Int. Conference on Ubiquitous
Computing and Communications, IUCC-2012, 2012, pp.
17931798.
[16] R. Neisse, G. Steri, I. N. Fovino, and G. Baldini,
“SecKit: A Model-based Security Toolkit for the
Internet of Things,” Comput. Secur., vol. 54, pp. 6076,
2015.
[17] S. Sicari, A. Rizzardi, D. Miorandi, C. Cappiello, and A.
Coen-Porisini, “A secure and quality-aware prototypical
architecture for the Internet of Things,” Inf. Syst., vol.
58, pp. 4355, 2016.
[18] L. Malina, J. Hajny, R. Fujdiak, and J. Hosek, “On
perspective of security and privacy-preserving solutions
in the internet of things,” Comput. Networks, vol. 102,
pp. 8395, 2016.
[19] R. H. Weber, “Accountability in the Internet of Things,”
Comput. Law Secur. Rev., vol. 27, no. 2, pp. 133138,
2011.
[20] E. Borgia, “The internet of things vision: Key features,
applications and open issues,” Computer
Communications, vol. 54. pp. 131, 2014.
[21] D. Uckelmann, M. Harrison, and F. Michahelles, “An
Architectural Approach Towards the Future Internet of
Things,” in Architecting the Internet of Things, 2011, pp.
97129.
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 21 (2017) pp. 11055-11061
© Research India Publications. http://www.ripublication.com
11061
[22] A. Bröring, S. Schmid, C. K. Schindhelm, A. Khelil, S.
Käbisch, D. Kramer, D. Le Phuoc, J. Mitic, D. Anicic,
and E. Teniente, “Enabling IoT Ecosystems through
Platform Interoperability,” IEEE Softw., vol. 34, no. 1,
pp. 5461, 2017.
[23] J. Carlson, B. Creighton, D. Meyer, J. Montgomery, and
A. Reiter, “The Internet of Things : Security Research
Study,” 2015.
[24] G. Matuszak, G. Bell, and D. Le, “Security and the IoT
ecosystem,” Kpmg, 2015.
[25] A. Sehgal, V. Perelman, S. Kuryla, J. Schonwalder, and
O. In, “Management of resource constrained devices in
the internet of things,” Commun. Mag. IEEE, vol. 50, no.
12, pp. 144149, 2012.
[26] F. K. Shaikh, S. Zeadally, and E. Exposito, “Enabling
technologies for green internet of things,” IEEE Syst. J.,
vol. 11, no. 2, pp. 983994, 2017.
[27] Y. Shen, T. Zhang, Y. Wang, H. Wang, and X. Jiang,
“MicroThings: A Generic IoT Architecture for Flexible
Data Aggregation and Scalable Service Cooperation,”
IEEE Commun. Mag., vol. 55, no. 9, pp. 8693, 2017.
[28] R. Roman, J. Zhou, and J. Lopez, “On the features and
challenges of security and privacy in distributed internet
of things,” Comput. Networks, vol. 57, no. 10, pp. 2266
2279, 2013.
... S druge strane, lokalni serveri omogućavaju korisniku veću kontrolu nad sigurnošću i privatnošću podataka, pa mogu biti izvedeni tako da budu prilagođeni specifičnim potrebama, ali zahtevaju veća ulaganja u hardver i IT stručnjake. [6] Neke od najčešće korišćenih platformi za IoT u biološkim sistemima su: AWS IoT, Google Cloud IoT Core, Microsoft Azure IoT Hub i IBM Watson IoT. [7] D. Sloj aplikacije Konačno, nakon što je IoT platforma implementirana, poslednji korak je implementacija aplikacija za upravljanje sistemom. ...
... Ili se prave kao veb aplikacije. [6] Sloj aplikacije takođe može uključivati i softverske alate za analizu podataka koji se prikupljaju iz bioloških sistema. [8] Ovi alati mogu biti jednostavni ili složeni, u zavisnosti od specifičnosti sistema za koje su namenjeni (Sl. ...
Article
Full-text available
The topic of this paper is the fundamentals of the Internet of Things architecture in biological systems, including architecture layers, sensors, wireless communication, and the cloud as a central data processing system. We describe a proposal for developing a plant hormone monitoring system based on the Internet of Things. The potential for continuous and remote monitoring of plant conditions opens up through the combination of appropriate technologies, protocols for wireless connection, and sensors for measuring hormone levels. Such a system should enable obtaining key information about the hormonal status of plants and timely response to plant needs.
... The IoT brought an evolution in the domain of collecting real-time data. The IoT collects data by connecting things and devices that can share the data with the central machine, which provides flexibility to the data collection process that was not possible before the IoT [23]. This flexibility of the IoT to collect and monitor real-scenario environments facilitates numerous organizations or industries to communicate and connect to the information infrastructure through different sensors, things, and objects. ...
Article
Full-text available
An Internet of Things (IoT) network is prone to many ways of threatening individuals. IoT sensors are lightweight, lack complicated security protocols, and face threats to privacy and confidentiality. Hackers can attack the IoT network and access personal information and confidential data for blackmailing, and negatively manipulate data. This study aims to propose an IoT threat protection system (IoTTPS) to protect the IoT network from threats using an ensemble model RKSVM, comprising a random forest (RF), K nearest neighbor (KNN), and support vector machine (SVM) model. The software-defined networks (SDN)-based IoT network datasets such as KDD cup 99, NSL-KDD, and CICIDS are used for threat detection based on machine learning. The experimental phase is conducted by using a decision tree (DT), logistic regression (LR), Naive Bayes (NB), RF, SVM, gradient boosting machine (GBM), KNN, and the proposed ensemble RKSVM model. Furthermore, performance is optimized by adding a grid search hyperparameter optimization technique with K-Fold cross-validation. As well as the NSL-KDD dataset, two other datasets, KDD and CIC-IDS 2017, are used to validate the performance. Classification accuracies of 99.7%, 99.3%, 99.7%, and 97.8% are obtained for DoS, Probe, U2R, and R2L attacks using the proposed ensemble RKSVM model using grid search and cross-fold validation. Experimental results demonstrate the superior performance of the proposed model for IoT threat detection.
... Some challenges behind proposing the term of middleware were discussed along with identifying their types. Burhanuddin et al. provided a theoretical background of the IoT paradigm, with an analysis review of many surveys on this field (Burhanuddin et al., 2017). Further, they discussed the requirements needed to implement IoT applications, followed by a discussion about future directions and challenges that face this domain. ...
... Some challenges behind proposing the term of middleware were discussed along with identifying their types. Burhanuddin et al. provided a theoretical background of the IoT paradigm, with an analysis review of many surveys on this field (Burhanuddin et al., 2017). Further, they discussed the requirements needed to implement IoT applications, followed by a discussion about future directions and challenges that face this domain. ...
Chapter
Technology is driving an industrial revolution. “Industry 4.0” (I4.0) signifies the determination to lead this transition. Moreover, there is growing interest in a developing subject that has the potential to bring about systematic changes and achievement of the Sustainable Development Goals (SDGs) of the United Nations, which represent an extensive strategy designed to promote sustainable solutions for dealing with the primary challenges confronting the global community. This study conducted a comprehensive review of existing literature to determine the potential contributions of two technological enablers, namely the internet of things (IoT) and cloud computing (CC), which refers to integrating Industry 4.0 technologies towards achieving SDGs. The review portfolio comprises 100 peer-reviewed articles examining the interconnected or independent relationship between IoT and CC concerning sustainability. This study conducts a bibliometric analysis to explore the impact of CC and the IoT on the SDGs.
Chapter
The ‘smart city' notion places a lot of emphasis on using information and communication technologies to boost connectedness and quality of life and effectiveness of various local authorities (ICT). Smart city services stimulate the practice of cloud- and IoT-based services that have included actual web applications that make use of sensors, smart phones, and RFIDs. Cloud platforms besides the IoT persist the two ICT models that are currently dealing the greatest influence on the Industrial IoT as well. Both concepts significantly influence the way it has developed and put into practice applications and smart city solutions. The first phase of this study highlights key features of IoT and Cloud along with smart city applications. Further in the second phase the research investigates the confluence of cloud platforms with IoT to build up the smart city besides various challenges associated in smart city implementation. Lastly, the research focuses on the smart cities' requirement for cloud-based IoT applications and provides the future direction in adaptability of smart city.
Conference Paper
Full-text available
In the world of construction, reinforced concrete beams use longitudinal reinforcement in order to withstand the tensile stress that occurs in the cross section of the concrete beam and the longitudinal reinforcement used is steel reinforcement (rebar reinforcemen). Tensile stresses reaching 420 MPa are the main reason for reinforcing steel used in reinforced concrete beams, however, due to technological developments, there are materials that have tensile stresses that exceed reinforcing steel, namely mild steel. mild steel is light cold rolled steel with high quality which is light and thin, but has a tensile stress that exceeds ordinary reinforcing steel, which is 550 MPa, so in this study we will use mild steel reinforcement for C channel and U channel as reinforcement. concrete block structure. The purpose of this study was to determine the difference between the flexural strength of concrete beams using mild steel and concrete beams using steel reinforcement and to calculate the stiffness value. This research was carried out through several stages, namely: procurement of materials and equipment, inspection of materials and equipment, planning of concrete mixes, concrete manufacture, concrete treatment (curing), concrete testing and analysis of research results. from samples with 2 comparisons that have been tested, the average flexural strength value in 3 samples of reinforced concrete beams with mild steel reinforcement is 391.96 kg/cm² U channel and the average flexural strength value from 3 samples of C channel is 385, 44 kg/cm² and for the average value of the shear strength test results from 4 U channel specimens is 66.28 kg/cm².
Article
Full-text available
Recently, there is a rapid growth in technological improvement in banking sector. The entire world is using the banking service for managing their financial and property assets. As of now, all the technological advancements are applied to banking sector to facilitate the customers with proper operational excellence. In this view, the bank has complete responsibility in serving the people with their modern application to save their time and wealth. So the customer value analysis is needed for the bank to enrich the marketing growth and turnover of the bank. But still, the prediction of customer churn remains a challenging issue for the banking sector for analyzing the profit growth. With this view, we focus on predicting the customer churn for the banking application. This paper uses the churn modeling data set extracted from UCI Machine Learning Repository. The anaconda Navigator IDE along with Spyder is used for implementing the Python code. Our contribution is folded is folded in three ways. First, the data set is applied to various classifiers like Logistic Regression, KNN, Kernel SVM, Naive Bayes, Decision Tree, Random Forest to analyze the confusion matrix. The Performance analysis is done by comparing the metrics like Precision, Recall, FScore and Accuracy. Second the data set is subjected to dimensionality reduction method using Principal component Analysis and then fitted to the above mentioned classifiers and their performance analysis is done. Third, the performance analysis is done for the dataset by comparing the metrics with and without applying the dimensionality reduction. A Performance analysis is done with various classification algorithms and comparative study is done with the performance metric such as accuracy, precision, recall, and f-score. The implementation is carried out with python code using Anaconda Navigator. Experimental results shows that before applying dimensionality reduction PCA, the Random Forest classifier is found to be effective with the accuracy of 86%, Precision of 0.85, Recall of 0.86 and FScore of 0.84. Experimental results shows that after applying dimensionality reduction, the 2 component PCA with the kernel SVM classifier is found to be effective with the accuracy of 81%, Precision of 0.81, Recall of 0.81 and FScore of 0.74. compared to other classifiers.
Article
Full-text available
Agrometeorology plays an important role in Precision Agriculture for resource management and effects both the quality and quantity of agriculture products. The existing solutions for monitoring weather parameters in agrometeorology are highly global and costly. These solutions are most of the time are inaccessible to the common man or farmers and require frequent physical visits to the field for obtaining information. But in agriculture monitoring highly localized weather condition is required because the weather conditions applicable farm land of one city may not be as such for a farmer of small rural. Weather conditions such as wind speed, wind direction, rainfall, solar radiation, atmospheric pressure, air particle level humidity and temperature measurement plays an important role in different fields like Agriculture, Science, Engineering and Technology. The proposed work provides an optimal solution for monitoring the weather conditions at extremely local level with low cost, compact Internet of Things (IoT) based system. In this paper the design of the system is presented with the use of NodeMCU for realizing the low-cost solution. This low-cost weather station is a product equipped with sensors to measure atmospheric conditions like temperature, humidity, wind speed, wind direction which has predominant effect in agriculture. With embedded IoT connectivity, the proposed weather station is capable to upload the information to IoT cloud ad can be used for further analysis.The user can access the information uploaded by the system anywhere from the world with the help on mobile app or web link on laptop/desktop. The “Low cost Compact IoT enabled Weather Station” does not have any display which make the proposed system more power efficient with overall current rating of about only 80mA to 90mA.
Article
Full-text available
The Internet of Things has been widely deployed in various areas of daily life through heterogeneous communications protocols. Each unstandardized protocol focuses on a specific IoT communication pattern. Inspired by the Internet architecture over which divergent devices can easily be accessed and a considerable number of applications can be run, we propose a generic architecture for IoT. This architecture supports two DIY areas: network DIY for data aggregation and application DIY for service cooperation. To connect these two DIYs, a centralized controller has been designed to provide standardized interfaces for data acquisition, organization, and storage, and to support elastic and supportive computing. With these properties, divergent devices can coexist in a uniform microworld, and rich services can be developed and provided on demand to interoperate with physical devices. This article discusses the background, design principles, and advantages of the proposed architecture, as well as open problems and our initial solution, which substantiates a novel IoT architecture and new research ground.
Article
Full-text available
Recent years have witnessed tremendous growth in the number of smart devices, wireless technologies, and sensors. In the foreseeable future, it is expected that trillions of devices will be connected to the Internet. Thus, to accommodate such a voluminous number of devices, scalable, flexible, interoperable, energy-efficient, and secure network architectures are required. This article aims to explore IoT architectures. In this context, first, we investigate, highlight, and report premier research advances made in IoT architecture recently. Then we categorize and classify IoT architectures and devise a taxonomy based on important parameters such as applications, enabling technologies, business objectives, architectural requirements, network topologies, and IoT platform architecture types. We identify and outline the key requirements for future IoT architecture. A few prominent case studies on IoT are discovered and presented. Finally, we enumerate and outline future research challenges.
Article
Full-text available
Today, the Internet of Things (IoT) comprises vertically oriented platforms for things. Developers who want to use them need to negotiate access individually and adapt to the platform-specific API and information models. Having to perform these actions for each platform often outweighs the possible gains from adapting applications to multiple platforms. This fragmentation of the IoT and the missing interoperability result in high entry barriers for developers and prevent the emergence of broadly accepted IoT ecosystems. The BIG IoT (Bridging the Interoperability Gap of the IoT) project aims to ignite an IoT ecosystem as part of the European Platforms Initiative. As part of the project, researchers have devised an IoT ecosystem architecture. It employs five interoperability patterns that enable cross-platform interoperability and can help establish successful IoT ecosystems.
Article
Full-text available
The increasing diffusion of services enabled by Internet of Things (IoT) technologies raises several risks associated to security and data quality. Together with the high number of heterogeneous interconnected devices, this creates scalability issues, thereby calling for a flexible middleware platform able to deal with both security threats and data quality issues in a dynamic IoT environment. In this paper a lightweight and cross-domain prototype of a distributed architecture for IoT is presented, providing minimum data caching functionality and in-memory data processing. A number of supporting algorithms for the assessment of data quality and security are presented and discussed. In the presented system, users can request services on the basis of a publish/subscribe mechanism, data from IoT devices being filtered according to users requirements in terms of security and quality. The prototype is validated in an experimental setting characterized by the usage of real-time open data feeds presenting different levels of reliability, quality and security.
Article
Full-text available
In recent year, the Internet of Things (IoT) has drawn significant research attention. IoT is considered as a part of the Internet of the future and will comprise billions of intelligent communicating ‘things’. The future of the Internet will consist of heterogeneously connected devices that will further extend the borders of the world with physical entities and virtual components. The Internet of Things (IoT) will empower the connected things with new capabilities. In this survey, the definitions, architecture, fundamental technologies, and applications of IoT are systematically reviewed. Firstly, various definitions of IoT are introduced; secondly, emerging techniques for the implementation of IoT are discussed; thirdly, some open issues related to the IoT applications are explored; finally, the major challenges which need addressing by the research community and corresponding potential solutions are investigated.
Article
Full-text available
This paper presents Internet of Things in a wider context. Main enabling factor of this concept is the integration of various technologies. In this paper, we describe the key technologies involved in the implementation of Internet of Things and the major application domain where the Internet of Things will play a vital role. Later we will discuss about the open issues which are to be addressed before the worldwide acceptance of these technologies. There are lots of open issues to address. Here we address the most relevant among them in detail.
Article
The Internet of Things (IoT) brings together a large variety of devices of different platforms, computational capacities and functionalities. The network heterogeneity and the ubiquity of IoT devices introduce increased demands on both security and privacy protection. Therefore, the cryptographic mechanisms must be strong enough to meet these increased requirements but, at the same time, they must be efficient enough for the implementation on constrained devices. In this paper, we present a detailed assessment of the performance of the most used cryptographic algorithms on constrained devices that often appear in IoT networks. We evaluate the performance of symmetric primitives, such as block ciphers, hash functions, random number generators, asymmetric primitives, such as digital signature schemes, and privacy-enhancing schemes on various microcontrollers, smart-cards and mobile devices. Furthermore, we provide the analysis of the usability of upcoming schemes, such as the homomorphic encryption schemes, group signatures and attribute-based schemes.
Article
The Internet of Things (IoT) is an emerging and promising paradigm that can be considered as an extension of the Internet to interconnect all kinds of smart objects around us to provide a pervasive (or ubiquitous) information access. Wireless Sensor Networks (WSNs), as a vital component of the IoT, allow the representation of the dynamic characteristics of the real world in the Internet's virtual world. Thus, sensor nodes are henceforth considered as Internet hosts and, may act as web servers or clients. The maturity of the Internet of Things is arguably linked to communications security and end-users privacy protection. However, the material and technological heterogeneity as well as the asymmetric nature of the communications between the sensor nodes and the classical Internet hosts are making security a challenging problem. In this context, many recent works focus on leveraging IP-based security protocols for IoT, after adapting them to WSN's constraints commonly by messages compression or by computational-load distribution techniques. In this paper we propose a 6LoWPAN (IPv6 over Low power Wireless Personal Area Networks) compression for the header of HIP (Host Identity Protocol) packets, as well as, an adapted distribution scheme of security computational load in HIP Base EXchange (HIP-BEX). To achieve extremely lightweight end-to-end (E2E) security, we combine both proposed compression and distribution models for HIP in WSN's side, in the IoT. The evaluation results show clearly that the proposed solution, named Compressed and Distributed HIP (CD-HIP), is sufficiently energy efficient with a slight security establishment delay, and a good level of compatibility with the standard HIP.
Article
Recent technological advances have led to an increase in the carbon footprint. Energy efficiency in the Internet of Things (IoT) has been attracting a lot of attention from researchers and designers over the last couple of years, paving the way for an emerging area called green IoT. There are various aspects (such as key enablers, communications, services, and applications) of IoT, where efficient utilization of energy is needed to enable a green IoT environment. We explore and discuss how the various enabling technologies (such as the Internet, smart objects, sensors, etc.) can be efficiently deployed to achieve a green IoT. Furthermore, we also review various IoT applications, projects and standardization efforts that are currently under way. Finally, we identify some of the emerging challenges that need to be addressed in the future to enable a green IoT.
Article
The Internet of Things (IoT) is a new paradigm that combines aspects and technologies coming from different approaches. Ubiquitous computing, pervasive computing, Internet Protocol, sensing technologies, communication technologies, and embedded devices are merged together in order to form a system where the real and digital worlds meet and are continuously in symbiotic interaction. The smart object is the building block of the IoT vision. By putting intelligence into everyday objects, they are turned into smart objects able not only to collect information from the environment and interact/control the physical world, but also to be interconnected, to each other, through Internet to exchange data and information. The expected huge number of interconnected devices and the significant amount of available data open new opportunities to create services that will bring tangible benefits to the society, environment, economy and individual citizens. In this paper we present the key features and the driver technologies of IoT. In addition to identifying the application scenarios and the correspondent potential applications, we focus on research challenges and open issues to be faced for the IoT realization in the real world.