ArticlePDF Available

Internet of Things: Architecture, Applications, and Security Concerns

Authors:

Abstract and Figures

Internet of Things (IoT) appears to be a signature phrase in the field of Information technology. The term immensely strikes our lives. It becomes more recognized in recent years. Today we are experiencing technology called IoT which is revolutionizing almost every branch of activity. Internet of things envisaged as a network of billions of objects amenable to communicate with one another. The Internet of Things strives to a malgamate all the devices under one roof. These devices can be monitored and controlled at any moment. They can communicate, exchange information and perform the desired operations. Taking note of this, the paper addresses the IoT concept using analysis of research papers, corporate persuasive reports, scholarly review articles, and online databases. Furthermore, the paper comes up with an overview of IoT including definition, Genesis, the chronology of IoT, Obligations for IoT, Aliases, architecture and different technologies regularly used in IoT in a systematic approach. The paper also discusses the application areas of its and security concerns.
Content may be subject to copyright.
RESEARCH ARTICLE
Copyright © 2020 American Scientific Publishers
All rights reserved
Printed in the United States of America
Journal of
Computational and Theoretical Nanoscience
Vol. 17, 2469–2475, 2020
Internet of Things: Architecture, Applications, and
Security Concerns
Rasmeet Kaur1,B.L.Raina
2, and Avinash Sharma3
1Research Scholar, Department of Computer Science and Application, Glocal University, Saharanpur, 247232, Uttar Pradesh, India
2Additional Pro-Chancellor, Glocal University, Saharanpur, 247232, Uttar Pradesh, India
3Computer Science and Engg., M.M. Deemed to be University Mullana, 133207, Haryana, India
Internet of Things (IoT) appears to be a signature phrase in the field of Information technology.
The termimmensely strikes our lives. It becomes more recognized in recent years. Today we are
experiencing technology called IoT which is revolutionizing almost every branch of activity. Internet
of things envisaged as a network of billions of objects amenable to communicate with one another.
The Internet of Things strives to a malgamate all the devices under one roof. These devices can
be monitored and controlled at any moment. They can communicate, exchange information and
performthe desired operations. Taking note of this, the paper addresses the IoT concept using
analysis of research papers, corporate persuasive reports, scholarly review articles, and online
databases. Furthermore, the paper comes up with an overview of IoT including definition, Genesis,
the chronology of IoT, Obligations for IoT, Aliases, architecture and different technologies regularly
used in IoT in a systematic approach. The paper also discusses the application areas of its and
security concerns.
Keywords: IoT, RFID, NFC, M2M, V2V, EPC, Bluetooth, Zigbee, Actuators, WSN.
1. INTRODUCTION TO IoT
In the present age, technology penetrates almost every
aspect of our life. Somehow, we all are depending on it.
The term Internet of Things (IoT) is a regime change in
the world of information technology [9]. IOT innovates a
world where everything connects and communicates effec-
tively. It enables the devices or objects to communicate
with other objects as well as people anytime and any-
where [11]. There are more connected objects than the
people around us. These objects or things include Comput-
ers, Laptops, Smart Phones, Tablets and other embedded
devices [6]. The devices contain sensors and actuators to
sense and pile up information. In simple words, IoT termed
an environment where the real world objects are con-
nected using some standard protocols to share the infor-
mation [1]. All these objects possess intelligent behavior,
smartly process the data and derive useful inferences. IoT
is acknowledged as a predominant domain for leading-
edge technology [5]. The different application areas of IoT
are Smart Home, Smart City, Healthcare, Industries, Envi-
ronmental, Commercial and many more.
Definition 1.1. IoT is a nutshell with sensors, actua-
tors and embedded physical objects connected to a wired
or wireless network.
Author to whom correspondence should be addressed.
Internet of things can be described as a digitally con-
nected universe having devices embedded with internet
connectivity, sensors, actuators and some other hardware
that allow communication through the web as shown in
Figure 1.
IoT is made up of four components mention below:
Sensors/Devices:
These devices accumulate facts from their surroundings
and negotiate them into worthwhile data.
Connectivity:
The data collected by sensors are passing to a cloud
infrastructure. To transport data a medium is required. Var-
ious mediums such as Bluetooth, WiFi, Cellular Network,
satellite network, etc. are used to connect the sensors with
the cloud.
Data Processing
The software performs data processing on the data when
it moves to the cloud.
User Interface
Later, the information made available to the end-user. A
user has an interface on which they can check in on their
IoT system.
2. GENESIS
The Internet of Things personifies the time ahead of com-
putation and communications as it is a revolution in the
J. Comput. Theor. Nanosci. 2020, Vol. 17, No. 6 1546-1955/2020/17/2469/007 doi:10.1166/jctn.2020.8917 2469
RESEARCH ARTICLE
Internet of Things: Architecture, Applications, and Security Concerns Kaur et al.
Fig. 1. Definition of IoT.
industrial sector. In early 1980s a coke machine was con-
nected to the internet for the first time. This machine was
installed at Carnegie Melon University and operated by a
group of programmers. The programmers later check the
status of the machine and decide whether or not there
would be a cold drink a waiting them. The original term
was coined by Kevin Ashton at MIT in 1999 [14]. In 2003
the concept of IoT first became well-liked. Throughout the
initial phase, many things or objects were connected to
the internet, these things or objects are connected to serve
different Applications through manifold technologies.
3. CHRONOLOGY OF IoT
The concept of IoT started in the late 1960s with the inven-
tion of the Internet. It was found from the studies that a
coca-cola machine situated at Carnegie Melon University
was the first connected device [2]. Kevin Ashton, named
as the inventor of IoT pioneer the concept in 1999 [1] at
MIT.
1982: The coke machine was invented by the students of
Carnegie Melon University, which was connected to the
ARPANET.
1990: John Romkey connected a toaster to the Computer
using TCP/IP protocol.
1994: A wearable camera connected to the Internet was
created by Steve Mann.
1999: Kevin Ashton comes up with the term Internet of
Things.
2000: LG introduces the first-ever Internet-connected
refrigerator.
2004: IoT first appears as a Book Title.
2008: The first International Conference on IoT took
place in Zurich, Switzerland.
2011: Gartner adds the concept of IoT to the Hype Cycle.
Sensors/Devices Connectivity Data-processing User-Interface
IoT Component
Fig. 2. Components of IoT.
2014: The number of connected devices goes beyond the
number of people.
2016: First malware detected for IoT
2018: The government starts to think about the security
concerns in IoT.
2020: The count of connected devices will be estimated
at around 50 billion and the market value of IoT will be
expected to reach $8.9 trillion.
4. ALIASES
Internet of Things is a wide-range concept and different
names are given to it by different people. The Aliases
of IoT are Web of Things, Connected devices, Inter-
net of objects, Technology Omnipotent, Omniscient and
omnipresent. Besides this, it also termed as:
(1) Cyber-Physical Systems that Integrates computation
and physical processes.
(2) Pervasive Computing, that is, an environment where
every object virtually has processing power.
(3) Ubiquitous Computing or Calm technology, where
technology turns nearly hidden in our lives.
(4) Machine-to-Machine that made communication possi-
ble between machines without human intervention.
(5) Human-Computer Interaction that incorporates the
stages of study and planning of communication between
computer and human.
(6) Ambient Intelligence, it will rapidly make our day to
day surroundings responsive.
5. ARCHITECTURE OF IoT
It is so vast concept, hence no uniform architecture was
proposed for it. Several IoT architecture was given by
researchers, professionals, and Scholars.
The Architecture was introduced at the beginning,
which consists of the perception, network and applica-
tion layers [11]. This architecture is named as Three-layer
architecture.
5.1. Three-Layer Architecture
Perception Layer: The Perception layer is also named as
a physical layer. This layer has sensors for sensing and
gathering information. During this phase the sensors col-
lect information from distinct objects, later the actuators
work according to that information and perform precise
operations.
Network Layer: This layer works as an intermediate layer
for the perception layer and application layer and estab-
lishes an interface link between these two. The net-
work Layer supervises connection to other devices and
servers.
Application Layer: The Application layer is the implemen-
tation of IoT. The application layer looks after the working
of sensors and actuators. One can also consider it as soft-
ware that works on the sensors.
2470 J. Comput. Theor. Nanosci. 17, 2469–2475, 2020
RESEARCH ARTICLE
Kaur et al. Internet of Things: Architecture, Applications, and Security Concerns
Network layer
Perception Layer
Application Layer
Fig. 3. The three-layer architecture.
For existing technology the three-layer architecture of
IoT is not well suited, consequently, a new architecture
was designed. This new architecture composed of the per-
ception, transport, processing, application, and business
layers [6]. It is named as Five-Layer architecture.
5.2. Five-Layer Architecture
Perception Layer: This layer serves the same functions as
in the Three-layer architecture. The information gathered
from sensors is implemented at this layer.
Transport Layer: The data received from the perception
layer is passed to the processing layer with the help of the
Transport layer.There are some techniques such as LAN,
wireless technology, 3G, 4G, LTE, RFID that are used by
the transport layer.
Processing Layer: This layer is also named as the mid-
dleware layer. The complete information will be processed
Business Layer
Application Layer
Perception Layer
Processing Layer
Transport Layer
Fig. 4. The five-layer architecture.
at the Processing layer. This layer employs many tech-
niques like database, cloud computing, big data processing
modules, etc. By making use of such techniques abundant
information will be stored. After successfully storing the
information it will analyze the way to retrieve data for a
desirable outcome.
Application Layer: It is responsible for the working of IoT.
It defines the applications that use IoT technology.
Business Layer: Functioning of the complete IoT system
is governed by the Business layer.
6. TECHNOLOGIES USED IN IoT
Internet of Things uses different technologies; some of
them are mentioned below [1]:
6.1. Radio frequency Identification (RFID)
6.2. Near Field Communication (NFC)
6.3. Machine to Machine Communication (MtoM)
6.4. Vehicle to Vehicle Communication (VtoV)
6.5. Electronic Product Code (EPC)
6.6. Wireless Fidelity (Wi-Fi)
6.7. Bluetooth
6.8. ZigBee
6.9. Actuators
6.10. WSN (Wireless Sensor Network).
6.1. Radio Frequency Identification (RFID)
RFID technology first appeared in 1945. RFID has 3 com-
ponents [12]:
RFID Tag
RFID Reader
An Antenna.
The tag holds a microchip allied with an antenna. The
RFID system captures digital data encoded in RFID tags,
through a reader. The information related to an object is
sent as a serial number with the help of radio waves [10].
The data on the tags can be transferred by using electro-
magnetic fields so that they can recognize and route the
objects automatically, correlated to a precise tag. RFID is
an unmanned technology that assists machines to achieve
recognition of different objects and record metadata.
The RFID device was first used during the 2nd world
war to distinguish Friend or Foe in 1948 [8]. RFID
technology provides a cost-effective way of solving the
identification issues of objects. It is more authenticate,
productive, secure, economical and error-free. The RFID
technology is based on reader and tags. Initially, there were
three configurations defined in RFID.
Active RFID
Passive RFID
Active Reader Active Tag.
Active RFID: Active RFID systems contain a power
source (battery) and a transmitter. The signals are broad-
cast by a battery and later received by the reader. These
signals are received from a device that runs on the battery
and an active tag is used to operate the battery. These types
J. Comput. Theor. Nanosci. 17, 2469–2475, 2020 2471
RESEARCH ARTICLE
Internet of Things: Architecture, Applications, and Security Concerns Kaur et al.
of tags can have a large memory. Due to the presence of
transmitter, the signal is very strong hence they provide a
reliable reading over long distances. Active RFID tags are
used to track land and ocean containers, vehicles, etc.
Passive RFID: Another one is Passive RFID which does
not have any internal power source [4]. Here, to send the
data energy is required and this energy is supplied by the
reader. Their memory is limited.
Active Reader Active Tag: As the name suggests, both
the reader and tags are active in this configuration. When-
ever the sender has woken up by the reader, it will start
sending information.
6.2. Near Field Communication (NFC)
Near Field Communication technology provides a wireless
connection between two portable devices in close acces-
sibility it is much slightly similar to RFID technology.
Near Field Communication offers short-range communica-
tion and operates at 13.56 MHz. Philips and Sony compa-
nies were the first to introduce NFC. It exchanges the data
approximately 424 kbps. An NFC device can act as both
a reader as well as a tag. NFC provides easy connections,
rapid transactions and simple exchange of data. It mainly
used in applications such as contact less payment systems.
The two possible modes in the NFC are mentioned here.
Active Mode
Passive Mode.
Active Mode: In an Active mode, both devices are active.
The devices exchange signals to communicate with each
other.
Passive Mode: In contrast to Active mode, not both
devices are active. One device sends the signal and the
other is receiving it. The passive mode of technology is
secure and used for mobile payments.
6.3. Machine to Machine Communication (M2M)
In Machine-to-Machine (M2M) communication one or
more entities are incorporated for communication [1].
There is no need for a human interruption in the process
of M2M interaction. It also termed as MTC (Machine-type
Communication). This communication is between comput-
ers, Sensors, Actuators, embedded processors, and mobile
devices. There is rapid growth in the use of M2M com-
munication. The Researcher predicted that there will be
around 1.5 billion wirelessly connected devices by 2014,
omitting mobilephones. In the present situation, around
2 billion devices are connected. These devices collect
information from the sensors, examine the collected infor-
mation and distribute the information to other devices to
carry out a task. The Machine collects the data through
sensors and operates with the help of some application
software and embedded processors.
6.4. Vehicle to Vehicle Communication (V2V)
V2 V technology offers communication between vehicles.
V2Vprovides long-distance communication. The foremost
goal to design this technology is providing traffic control,
safety, and accident avoidance. This goal is achieved by
allowing the vehicle in transit to send position and speed
data to one another. Each vehicle sends reports about traf-
fic, road conditions, route direction, speed, and position.
This information is added to the network and servers as a
safety warning to other vehicles.
At the time of communication, if any other object inter-
venes with the communicating devices, the connection
is lost. This is a key challenge in V2V communication.
To remain connected, the devices should maintain a proper
line of sight. During the establishment of communication,
the vehicles in motion will also create a problem. There
must be a change in topology if any change occurs in the
network. Data will not properly send or receive if the net-
work is not available. This will cause a great problem.
6.5. Electronic Product Code (EPC)
Electronic Product Code (EPC) is a 96-bit code. This code
is electronically recorded on an RFID tag. EPC is a unique
serial number. EPC is tagged to a product in the form
of a chip. A radio antenna is attached to the chip which
transmits the EPC. The concerned information contained
by EPC is the type of EPC, a unique serial number of
products, specifications of products, details about the man-
ufacturer, etc. EPC was created by the EPC Global Orga-
nization and developed by the Auto-ID Center at MIT in
1999 [3].
6.6. Wireless Fidelity (Wi-Fi)
Wi-Fi is a wireless networking technology that autho-
rizes the devices to commune using radio waves. Vic
Hayes named the father of Wireless Fidelity. In 1991 the
for erunner to Wi-Fi was contrived by NCR Corpora-
tion with AT and T Corporation. The first wireless prod-
uct was introduced, titled WaveLAN operated at 1 Mbps
to 2 Mbps. Wi-Fi was also known as WLAN (Wireless
Local Area Network). Everyone can connect to the inter-
net through Wi-Fi. It provides a connection up to a radius
of 20–25 meters. It makes communications possible, even
in the areas which are deprived of communication such as
rural areas.
6.7. Bluetooth
Bluetooth is a wireless, cost-effective, short-range radio
technology that allows devices to exchange data within a
range of 10–100 meters. It was developed in 1994. Blue-
tooth is used to create a Personal Area Networks (PAN).
Two Bluetooth devices are connected through the process
of pairing. More than one Bluetooth device sharing the
same channel is called Piconet. It is also known as PAN.
This Piconet can have 2–8 connected devices at a time to
2472 J. Comput. Theor. Nanosci. 17, 2469–2475, 2020
RESEARCH ARTICLE
Kaur et al. Internet of Things: Architecture, Applications, and Security Concerns
share the data. One can share textual data, images, and
videos with the help of Bluetooth.
6.8. ZigBee
This wireless technology was developed by the ZigBee
Alliance. This technology offers a less data rate, lowcost,
and short-range transmission. Some other features of this
technology include its flexible protocol design scalabil-
ity and reliability. It is based on the IEEE 802.15.4 stan-
dard. The frequency range at which ZigBee operates is
868 MHz, 902–928 MHz, and 2.4 GHz. The range of
ZigBee is around 100 meters and it supports a data rate
of 250 kbps. Applications of Zigbee involve Industrial
Automation, Smart Metering, Home Automation, Smart
grid automation.
6.9. Actuators
The actuator is a device that transforms energy into
motion. It uses an electrical input and turns it into phys-
ical action. The categorization of Actuators based on the
energy sources they use to generate motion. Different
kinds of actuators are (1) Pneumatic actuator that uses
compressed air to produce motion. (2) Hydraulic actuator,
produce motion using liquid. (3) Electric actuator, origi-
nate motion using battery. (4) Thermal actuator makes use
of heat source and originates motion. The actuators are
crucial building elements of the IoT ecosystem.
6.10. WSN (Wireless Sensor Network)
The wireless sensor network can be defined as a group
of homogenous or heterogeneous sensors to oversee and
put down the physical conditions like temperature, pres-
sure, vibration, sound, etc. (Wikipedia). Sensor nodes are
low cost, minute, low power consuming devices incor-
porating the capabilities of wireless communication and
local processing. Variation of wireless sensor networks
can be deployed depending on the environment such as
Underground WSNs, Underwater WSNs, Mobile WSNs,
Multimedia WSNs, and Terrestrial WSNs. WSNs work in
short-range communication.
7. APPLICATIONS OF IoT
Internet of Things equipped the devices with connectivity
and cognizance. IoT applications lead the way to exten-
sive value into our lives. IoT is being deployed in various
domains, namely.
7.1. Connected Healthcare System
Internet of Things has substantial significance in health
care. The technology-driven connected healthcare sys-
tem could give a facelift to proficiency and quality of
treatments. IoT in healthcare authorizes intercommunica-
tion, machine-to-machine communication and information
exchange to make health care service delivery adequate.
The IoT devices can monitor a patient’s medical record.
The information about a person’s body temperature, heart-
beat rate, blood pressure, etc. can be tracked using sensors.
All the data collected by, these sensors will be notified to
the patient and their doctor in case of any emergency [18].
The connected setup declines the cost by utilizing bet-
ter quality resources, cutting down unnecessary visits, and
improving the allocation and planning.
7.2. Smart Home Automation
This application of IoT gives away to devices and appli-
ances that can be grouped to benefit the users with absolute
control of our home. The idea of the interconnected world
with just a fingertip touch or a simple voice command to
Alexa, Google Assistant, Siri, and Cortana has come up
recently. Home automation facilitates you to detect motion
in your home, you can turn your lights on and off with just
one touch and unlock your door from anywhere across the
globe.
7.3. Smart Cities
Smart city is another robust application offered by IoT.
The technology accelerates to make cities more stream-
lined. The objective of a smart city is to upgrade the lives
of people by filtering traffic congestion, detect a shortage
of energy supplies, survival free parking space, analyze air
quality, etc.
7.4. Smart Farming
Farming now a day has become more technology-
driven. IoT is a hidden agenda for growth in agricultural
production at a lower cost. It opens the door for pro-
fessionals to lead the way for a smart farming way
out. Farmers can make use of smart agriculture gad-
gets and gained control over the process of lifting
livestock and growing crops. Smart farming enables
farmers and growers to knock down waste and amplify
productivity (https://www.iotforall.com/iot-applications-
in-agriculture/). A Smart system is built to oversight the
crop and to collect meaningful data by using sensors.
Various kinds of art technologies used in farming are
monitoring of climate conditions, Greenhouse automation,
Crop management, cattle management, etc.
7.5. Smart Grid
The concept of a Smart grid is to put forward to solve
the problem of the traditional electricity grid [19]. It is
a communication network that collects and analyzes data
and remotely looks after everything from lighting, traffic
signs, traffic congestion, parking spaces, road warnings,
etc. A smart grid solves the problems of unidirectional
flow of information, wastage of energy, reliability, and
security in the traditional power grid [20].
J. Comput. Theor. Nanosci. 17, 2469–2475, 2020 2473
RESEARCH ARTICLE
Internet of Things: Architecture, Applications, and Security Concerns Kaur et al.
7.6. Industrial Automation
IoT devices are coming up with astonishing changes
through automation covering all the sectors. Industries are
successively favoring and acquiring industrial automation,
this makes use of various control devices for managing
different processes and machines in an industry, as a result,
the need for human intervention reduces. Concerning the
current report, the industrial market size is expected to
reach 73.5 billion US dollars by 2023 which highlights the
growth of IoT in Industrial Automation.
7.7. Connected Cars
New services are presented by automotive manufactur-
ers in the wake of swift advancements in technology.
The environment of connected vehicles contributes to
autonomous driving and gives a new meaning to mobility.
Connected cars technology is a network of sensors, anten-
nas, embedded software, and communication technologies,
with capabilities of making error-free decisions, speed and
consistency. As claimed by the market research consult-
ing firm, the globally connected car market is expected
to reach $280.36 billion by 2026. Connected cars put for-
ward the connectivity with comfort, performance, safety,
and security.
7.8. Smart Retail
IoT improves the retail sector by adding advanced digi-
tal tools to this process. It gives accurate data to retail
companies regarding consumer behavior. Retailers are opt-
ing IoT techniques to upgrade store operations, reducing
theft, expanding pick up, authorizing accurate inventory
management.
8. SECURITY CONCERNS OF IoT
The security concerns are widely classified in Technolog-
ical concerns and Security concerns. The technological
concern is a result of the heterogeneous and ubiquitous
nature of IoT devices, whereas the processes that should
be imposed to attain a protected network lead to a security
dilemmas. Technological challenges are concerned with
wireless technologies, extend the capabilities, energy, and
distributed nature. Security issues prerequisite the aptness
to safeguard the security by authentication, confidential-
ity, end-to-end protection, integrity, etc. [23]. To attain
a secure communication below listed security regulations
must be taken into consideration.
8.1. Confidentiality
To attain confidentiality, data should only available to
legitimate users. A user in an IoT nutshell can be a device,
human, and internal objects. Consequently, it is hard to
ensure that sensors don’t publicize the gathered data to sur-
rounding objects. Another key challenge is to make users
acquainted with data management mechanisms to certify
data protection.
8.2. Integrity
Connected devices are exchanging data henceforth to
ensure integrity it is necessary to ensure that data is com-
ing through the appropriate source and not mutated in
the process of communication. In IoT communication,
integrity can be accomplished by preserving end-to-end
security. Firewalls and protocols are used to handle the
data traffic, but it does not assure security at the endpoints.
8.3. Availability
IoT envisioned connecting a huge number of smart
devices. Data should be available always to the users any-
time they need it, likewise, devices and services must also
be available when essential.
8.4. Authentication
In the connected environment every object must be pro-
ficient to recognize and authenticate other objects. Due
to the nature of IoT, this process can be grueling as
things like objects, people, processing units, assistance,
and access providers are befuddle. Therefore, a method
requires to authenticate these things during the process of
interaction.
8.5. Lightweight Solutions
An exclusive security feature Lightweight solution is intro-
duced to overcome the stumbling blocks of the devices
such as their power efficacy and computing efficiency. This
is a constraint that must be kept in mind during designing
protocols for data and devices.
8.6. Heterogeneity
Various objects or things having distinct capabilities, com-
plexities, Features, Versions and technical aspects are cou-
pled in IoT. Another problem examined is the change in
surroundings whenever a device communicates to distinct
devices. To attain security, an optimal cryptography system
and compatible security protocols are required.
9. CONCLUSION
Right at this time, the Internet of Things is a well-known
title. Communication among things/devices depends on the
Internet. Everyone is prone to technology in some manner.
It becomes a need of today’s life. Most of the time people,
as well as things, are connected. One of the major issues
is the security of these devices during the communication
process. Compatibility issue is also there in devices [1].
Plenty of research has already been done in the area of
the Internet of Things still there is more work to do. It
is required to make this domain a bit secure and reliable
using standard protocols and efficient technologies.
2474 J. Comput. Theor. Nanosci. 17, 2469–2475, 2020
RESEARCH ARTICLE
Kaur et al. Internet of Things: Architecture, Applications, and Security Concerns
References
1. Goyal, K.K., Garg, A., Rastogi, A. and Singhal, S., 2018.A
literature survey on the internet of things (IoT). International
Journal Advanced Networking and Applications, 9(6), pp.3663–
3668.
2. Polgavande, A.S. and Kulkarni, A.D., 2017. Internet of things
(IoT): A literature review. International Journal of Research
in Advent Technology (IJRAT) Special Issue, E-ISSN: 2321-
9637.
3. Patel, A.K. and Patel, B.M., 2016. Internet of things (IoT): A litera-
ture review. IJSRD—International Journal for Scientific Research &
Development, 4(5), pp.1001–1003.
4. Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013.Inter-
net of things (IoT): A vision. Architectural Elements, and Future
Directions, 29(7), pp.1645–1660.
5. Lee, I. and Lee K., The internet of things (IoT): Applications, invest-
ments, and challenges for enterprises.
6. Khan, R., Khan S., Zaheer R. and Khan S., 2012. Future Internet:
The Internet of Things Architecture, Possible Applications and Key
Challenges. 10th International Conference on Frontiers of Informa-
tion Technology (FIT): Proceedings.
7. Gigli, M. and Koo S., 2011. Internet of things: Services and appli-
cations categorization. Advances in Internet of Things, 2011(1),
pp.27–31.
8. Madakam, S., Ramaswamy, R. and Tripathi, S., 2015. Internet of
things (IoT): A literature review. Journal of Computer and Commu-
nications, 3, pp.164–173, DOI: 10.4236/jcc.2015.35021.
9. Hukeri, P.A. and Ghewari, P.B., 2017. Review paper on IoT based
technology. International Research Journal of Engineering and
Technology (IRJET), 4(1), pp.1580–1582.
10. Jia,X.,Feng,Q.,Fan,T.andLeiQ.,2012.RFID Technol-
ogy and Its Applications in Internet of Things (IoT), IEEE.
pp.1282–1285.
11. Mahmoud, R., Yousuf, T., Aloul, F. and Zualkernan, I.,
2015. Internet of things (IoT) security: Current status, chal-
lenges, and prospective measures, DOI: 10.1109/ICITST.2015.741
2116.
12. Asghar, M.H., RFID and EPC as key technology on Internet of
Things (IoT), pp.121–123, ISSN: 0976-8491 (Online), ISSN: 2229-
4333 (Print).
13. Desai, K. and Mahalakshami, 2018. Internet of things (IoT): A
review of literature. International Research Journal of Management
and Commerce, 5(2), pp.121–123.
14. Asghari, P., Rahmani, A. and Javadi, H., 2018. Internet of things
applications: A systematic review, www.elsevier.com/locate/comnet.
15. Chase, J., 2013.The Evolution of the Inter net of Things, Texas
Instruments. Dallas, Texas, Texas Instruments Incorporate.
16. Soumyalatha and Hegde, G.S., 2016. Study of IoT: Understand-
ing IoT architecture, applications, issues and challenges. Interna-
tional Journal of Advanced Networking & Applications (IJANA), 7,
pp.477–482, ISSN: 0975-0282.
17. Sethi, P., Smruti, R. and Hindawi, S., 2017. Review Article: Inter-
net of Things: Architectures, protocols, and applications. Journal of
Electrical and Computer Engineering, p.25, Article ID 9324035.
18. Li,S.,Li,D.X.andShanshan,2014. The internet of things: A survey.
Zhao Inf. Syst. Front (2015), 17, pp.243–259.
19. Ghasempou, A., 2019. Internet of things in smart grid:
Architecture, Applications, Services, Key Technologies, and
Challenges. DOI: 10.3390/inventions4010022, www.mdpi.com/
journal/inventions.
20. Saleem, Y., Crespi, N. and Rehmani, H.M., Internet of things-aided
smart grid: Technologies, architectures, applications, prototypes, and
future research directions.
21. Banka, S., Madan, I. and Saranya S., 2018. Smart healthcare mon-
itoring using IoT. International Journal of Applied Engineering
Research, 13(15), pp.11984–11989, © Research India Publications.
http://www.ripublication.com.
22. Sedrati, A. and Mezrioui A., 2018. A survey of security challenges in
internet of things. Advances in Science, Technology and Engineering
Systems Journal, 3(1), pp.274–280.
23. Vignesh, and Samydurai, A., Security on internet of things (IoT)
with challenges and countermeasures. International Journal of Engi-
neering Development and Research (www.ijedr.org), 5(1), ISSN:
2321-9939, IJEDR1701065.
Received: 20 December 2019. Accepted: 10 January 2020.
J. Comput. Theor. Nanosci. 17, 2469–2475, 2020 2475
... Internet of Things. In 1991, Professor Kevin Ash-ton of MIT proposed the concept of Electronic Product Code (EPC) as the prototype of IoT, and since then IoT has entered our vision [21]. The IoT connects the Internet to any object through various information-sensing devices and uses an agreed network protocol for information exchange and communication. ...
... 23 28.52 655.52 Literature [24] 270. 21 Literature [25] Literature [24] Literature [23] Literature [22] FIGURE 10: Comparison of convergence results. ...
Article
Full-text available
This paper presents a low-carbon vehicle routing optimization model to reduce energy consumption and carbon emissions in logistics and distribution. The model is solved using a hybrid algorithm of simulated annealing and ant colony optimization. It enhances the information pheromone concentration update process and directionality by introducing a carbon emission factor and a multifactor operator. Additionally, an adaptive elite individual reproduction strategy is employed to improve algorithm efficiency. In this case study focusing on cold chain logistics distribution, both the model and algorithm under consideration were evaluated. The findings affirm the effectiveness of the model in reducing carbon emissions and demonstrate the efficiency and robustness of the algorithm. Through this analysis, the paper sheds light on environmentally sustainable practices in logistics distribution.
... The architecture of an IoT system typically consists of three layers-perception (sensing) layer (PCL), network layer (NTL), and application layer (APL) (Gu et al., 2012;Sethi & Sarangi, 2017). The PCL uses sensing devices for multimedia data acquisition and collaboration, the NTL transmits and processes sensor data by connecting to other smart gadgets, network devices, and servers, and the APL is responsible for delivering results based on user prompts (Kaur et al., 2020;Kumar & Mallick, 2018;Kumar et al., 2019). As a result, real-time responses can be ascertained with increased speed, control, and certainty (Hossein Motlagh et al., 2020). ...
Chapter
The Internet of Things (IoT) is a new tech that demonstrates the prospects of computing and networking. The uses for IoT are frequently supported by wireless sensor networks (WSNs). These networks have often limitations related to battery of the nodes and energy-efficient routing techniques thereon. This paper explores routing protocols for such networks which are energy efficient. The comparison has been done between ad-hoc on-demand distance vector (AODV) routing protocol, firefly optimization and ant colony optimization (ACO). The output has been computed based on energy consumption, throughput and delay of the network; ACO has outperformed the other two in these aspects.KeywordsWireless sensor networkInternet of thingsAODVACOFirefly optimization
Chapter
Conventional healthcare is powerless to assimilate the needs of each person because of the prodigious elevation in the population. Regardless of having a magnificent infrastructure and radical technologies, medical services are not accessible or economical to everyone. The internet of things (IoT), smart sensors, and wearables have supplemented the wellbeing framework; enabled remote observation, and maintained the wellness of the patient in minute detail. Connected health, in general, alludes to any digital healthcare solution that can be conducted remotely. Expeditious growth in semiconductors, computing, and transmission technologies have contributed to the innovative production of sensors otherwise known as “smart” sensors, which have the potential of wireless communication with a distant site, information exchange, and computerized data processing. The emergence of microsensors amalgamated with intelligent sensor framework technology permits the forefront production of a sensor framework accompanied by remarkably inflated proficiencies, and very small size, weight, as well as low energy usage. The chapter begins with a summary of IoT and smart sensors. It elaborates on the role of IoT in healthcare, several sensors, and smart gadgets used in healthcare, fitness, and wellbeing care units.
Article
Full-text available
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Article
Full-text available
Internet of Things (IoT) is a connection of people and things at any time, in any place, with anyone and anything, using any network and any service. Thus, IoT is a huge dynamic global network infrastructure of Internet-enabled entities with web services. One of the most important applications of IoT is the Smart Grid (SG). SG is a data communications network which is integrated with the power grid to collect and analyze data that are acquired from transmission lines, distribution substations, and consumers. In this paper, we talk about IoT and SG and their relationship. Some IoT architectures in SG, requirements for using IoT in SG, IoT applications and services in SG, and challenges and future work are discussed.
Article
Full-text available
Internet of things (IoT) is an innovative technology subject to all kind of imaginary and science fictional solutions. Dreams and speculations are still possible about it. A technology combining real life objects and virtual life (Internet) is indeed a fertile pitch of fantasy and original ideas. However, IoT has in practice to face several challenges to ensure its function and operability in a near future. This paper defines first some technical challenges of IoT today, before focusing on security-related ones via a layered architecture of IoT that we suggest. Finally, a number of actions and required future work is presented to enhance IoT security (Privacy, Lightweight crypto, etc.).
Article
Full-text available
Traditional power grids are being transformed into Smart Grids (SGs) to address the issues in existing power system due to uni-directional information flow, energy wastage, growing energy demand, reliability and security. SGs offer bi-directional energy flow between service providers and consumers, involving power generation, transmission, distribution and utilization systems. SGs employ various devices for the monitoring, analysis and control of the grid, deployed at power plants, distribution centers and in consumers’ premises in a very large number. Hence, an SG requires connectivity, automation and the tracking of such devices. This is achieved with the help of Internet of Things (IoT). IoT helps SG systems to support various network functions throughout the generation, transmission, distribution and consumption of energy by incorporating IoT devices (such as sensors, actuators and smart meters), as well as by providing the connectivity, automation and tracking for such devices. In this paper, we provide a comprehensive survey on IoT-aided SG systems, which includes the existing architectures, applications and prototypes of IoT-aided SG systems. This survey also highlights the open issues, challenges and future research directions for IoTaided SG systems.
Conference Paper
Full-text available
The paper presents a survey and analysis on the current status and concerns of Internet of things (IoT) security. The IoT framework aspires to connect anyone with anything at anywhere. IoT typically has a three layers architecture consisting of Perception, Network, and Application layers. A number of security principles should be enforced at each layer to achieve a secure IoT realization. The future of IoT framework can only be ensured if the security issues associated with it are addressed and resolved. Many researchers have attempted to address the security concerns specific to IoT layers and devices by implementing corresponding countermeasures. This paper presents an overview of security principles, technological and security challenges, proposed countermeasures, and the future directions for securing the IoT.
Article
Full-text available
One of the buzzwords in the Information Technology is Internet of Things (IoT). The future is In-ternet of Things, which will transform the real world objects into intelligent virtual objects. The IoT aims to unify everything in our world under a common infrastructure, giving us not only control of things around us, but also keeping us informed of the state of the things. In Light of this, present study addresses IoT concepts through systematic review of scholarly research papers, corporate white papers, professional discussions with experts and online databases. Moreover this research article focuses on definitions, geneses, basic requirements, characteristics and aliases of Internet of Things. The main objective of this paper is to provide an overview of Internet of Things, architectures, and vital technologies and their usages in our daily life. However, this manuscript will give good comprehension for the new researchers, who want to do research in this field of Internet of Things (Technological GOD) and facilitate knowledge accumulation in efficiently .
Article
Full-text available
In recent year, the Internet of Things (IoT) has drawn significant research attention. IoT is considered as a part of the Internet of the future and will comprise billions of intelligent communicating ‘things’. The future of the Internet will consist of heterogeneously connected devices that will further extend the borders of the world with physical entities and virtual components. The Internet of Things (IoT) will empower the connected things with new capabilities. In this survey, the definitions, architecture, fundamental technologies, and applications of IoT are systematically reviewed. Firstly, various definitions of IoT are introduced; secondly, emerging techniques for the implementation of IoT are discussed; thirdly, some open issues related to the IoT applications are explored; finally, the major challenges which need addressing by the research community and corresponding potential solutions are investigated.
Article
Full-text available
Radio frequency identification system (RFID) is an automatic technology and aids machines or computers to identify objects, record metadata or control individual target through radio waves. Connecting RFID reader to the terminal of Internet, the readers can identify, track and monitor the objects attached with tags globally, automatically, and in real time, if needed. This is the so-called Internet of Things (IoT). RFID is often seen as a prerequisite for the IoT. This paper introduces the technologies of RFID and IoT, discusses the applications and challenges of RFID technology used in IoT.
Article
Internet of Things (IoT) is considered as an ecosystem that contains smart objects equipped with sensors, networking and processing technologies integrating and working together to provide an environment in which smart services are taken to the end users. The IoT is leading numerous benefits into the human life through the environment wherein smart services are provided to utilize every activity anywhere and anytime. All these facilities and services are conveyed through the diverse applications which are performed in the IoT environment. The most important utilities that are achieved by the IoT applications are monitoring and consequently immediate decision making for efficient management. In this paper, we intend to survey in divers IoT application domains to comprehend the different approaches in IoT applications which have been recently presented based on the Systematic Literature Review (SLR) method. The aim of this paper is to categorize analytically and statistically, and analyze the current research techniques on IoT applications approaches published from 2011 to 2018. A technical taxonomy is presented for the IoT applications approaches according to the content of current studies that are selected with SLR process in this study including health care, environmental monitoring, smart city, commercial, industrial and general aspects in IoT applications. IoT applications are compared with each other according to some technical features such as Quality of Service (QoS), proposed case study and evaluation environments. The achievements and disadvantages of each study is discussed as well as presenting some hints for addressing their weaknesses and highlighting the future research challenges and open issues in IoT applications.
Article
Ubiquitous sensing enabled by Wireless Sensor Network (WSN) technologies cuts across many areas of modern day living. This offers the ability to measure, infer and understand environmental indicators, from delicate ecologies and natural resources to urban environments. The proliferation of these devices in a communicating-actuating network creates the Internet of Things (IoT), wherein, sensors and actuators blend seamlessly with the environment around us, and the information is shared across platforms in order to develop a common operating picture (COP). Fuelled by the recent adaptation of a variety of enabling device technologies such as RFID tags and readers, near field communication (NFC) devices and embedded sensor and actuator nodes, the IoT has stepped out of its infancy and is the the next revolutionary technology in transforming the Internet into a fully integrated Future Internet. As we move from www (static pages web) to web2 (social networking web) to web3 (ubiquitous computing web), the need for data-on-demand using sophisticated intuitive queries increases significantly. This paper presents a cloud centric vision for worldwide implementation of Internet of Things. The key enabling technologies and application domains that are likely to drive IoT research in the near future are discussed. A cloud implementation using Aneka, which is based on interaction of private and public clouds is presented. We conclude our IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.