Content uploaded by Avinash Sharma
Author content
All content in this area was uploaded by Avinash Sharma on Dec 23, 2020
Content may be subject to copyright.
RESEARCH ARTICLE
Copyright © 2020 American Scientific Publishers
All rights reserved
Printed in the United States of America
Journal of
Computational and Theoretical Nanoscience
Vol. 17, 2469–2475, 2020
Internet of Things: Architecture, Applications, and
Security Concerns
Rasmeet Kaur1,B.L.Raina
2, and Avinash Sharma3∗
1Research Scholar, Department of Computer Science and Application, Glocal University, Saharanpur, 247232, Uttar Pradesh, India
2Additional Pro-Chancellor, Glocal University, Saharanpur, 247232, Uttar Pradesh, India
3Computer Science and Engg., M.M. Deemed to be University Mullana, 133207, Haryana, India
Internet of Things (IoT) appears to be a signature phrase in the field of Information technology.
The termimmensely strikes our lives. It becomes more recognized in recent years. Today we are
experiencing technology called IoT which is revolutionizing almost every branch of activity. Internet
of things envisaged as a network of billions of objects amenable to communicate with one another.
The Internet of Things strives to a malgamate all the devices under one roof. These devices can
be monitored and controlled at any moment. They can communicate, exchange information and
performthe desired operations. Taking note of this, the paper addresses the IoT concept using
analysis of research papers, corporate persuasive reports, scholarly review articles, and online
databases. Furthermore, the paper comes up with an overview of IoT including definition, Genesis,
the chronology of IoT, Obligations for IoT, Aliases, architecture and different technologies regularly
used in IoT in a systematic approach. The paper also discusses the application areas of its and
security concerns.
Keywords: IoT, RFID, NFC, M2M, V2V, EPC, Bluetooth, Zigbee, Actuators, WSN.
1. INTRODUCTION TO IoT
In the present age, technology penetrates almost every
aspect of our life. Somehow, we all are depending on it.
The term Internet of Things (IoT) is a regime change in
the world of information technology [9]. IOT innovates a
world where everything connects and communicates effec-
tively. It enables the devices or objects to communicate
with other objects as well as people anytime and any-
where [11]. There are more connected objects than the
people around us. These objects or things include Comput-
ers, Laptops, Smart Phones, Tablets and other embedded
devices [6]. The devices contain sensors and actuators to
sense and pile up information. In simple words, IoT termed
an environment where the real world objects are con-
nected using some standard protocols to share the infor-
mation [1]. All these objects possess intelligent behavior,
smartly process the data and derive useful inferences. IoT
is acknowledged as a predominant domain for leading-
edge technology [5]. The different application areas of IoT
are Smart Home, Smart City, Healthcare, Industries, Envi-
ronmental, Commercial and many more.
Definition 1.1. IoT is a nutshell with sensors, actua-
tors and embedded physical objects connected to a wired
or wireless network.
∗Author to whom correspondence should be addressed.
Internet of things can be described as a digitally con-
nected universe having devices embedded with internet
connectivity, sensors, actuators and some other hardware
that allow communication through the web as shown in
Figure 1.
IoT is made up of four components mention below:
Sensors/Devices:
These devices accumulate facts from their surroundings
and negotiate them into worthwhile data.
Connectivity:
The data collected by sensors are passing to a cloud
infrastructure. To transport data a medium is required. Var-
ious mediums such as Bluetooth, WiFi, Cellular Network,
satellite network, etc. are used to connect the sensors with
the cloud.
Data Processing
The software performs data processing on the data when
it moves to the cloud.
User Interface
Later, the information made available to the end-user. A
user has an interface on which they can check in on their
IoT system.
2. GENESIS
The Internet of Things personifies the time ahead of com-
putation and communications as it is a revolution in the
J. Comput. Theor. Nanosci. 2020, Vol. 17, No. 6 1546-1955/2020/17/2469/007 doi:10.1166/jctn.2020.8917 2469
RESEARCH ARTICLE
Internet of Things: Architecture, Applications, and Security Concerns Kaur et al.
Fig. 1. Definition of IoT.
industrial sector. In early 1980s a coke machine was con-
nected to the internet for the first time. This machine was
installed at Carnegie Melon University and operated by a
group of programmers. The programmers later check the
status of the machine and decide whether or not there
would be a cold drink a waiting them. The original term
was coined by Kevin Ashton at MIT in 1999 [14]. In 2003
the concept of IoT first became well-liked. Throughout the
initial phase, many things or objects were connected to
the internet, these things or objects are connected to serve
different Applications through manifold technologies.
3. CHRONOLOGY OF IoT
The concept of IoT started in the late 1960s with the inven-
tion of the Internet. It was found from the studies that a
coca-cola machine situated at Carnegie Melon University
was the first connected device [2]. Kevin Ashton, named
as the inventor of IoT pioneer the concept in 1999 [1] at
MIT.
1982: The coke machine was invented by the students of
Carnegie Melon University, which was connected to the
ARPANET.
1990: John Romkey connected a toaster to the Computer
using TCP/IP protocol.
1994: A wearable camera connected to the Internet was
created by Steve Mann.
1999: Kevin Ashton comes up with the term Internet of
Things.
2000: LG introduces the first-ever Internet-connected
refrigerator.
2004: IoT first appears as a Book Title.
2008: The first International Conference on IoT took
place in Zurich, Switzerland.
2011: Gartner adds the concept of IoT to the Hype Cycle.
Sensors/Devices Connectivity Data-processing User-Interface
IoT Component
Fig. 2. Components of IoT.
2014: The number of connected devices goes beyond the
number of people.
2016: First malware detected for IoT
2018: The government starts to think about the security
concerns in IoT.
2020: The count of connected devices will be estimated
at around 50 billion and the market value of IoT will be
expected to reach $8.9 trillion.
4. ALIASES
Internet of Things is a wide-range concept and different
names are given to it by different people. The Aliases
of IoT are Web of Things, Connected devices, Inter-
net of objects, Technology Omnipotent, Omniscient and
omnipresent. Besides this, it also termed as:
(1) Cyber-Physical Systems that Integrates computation
and physical processes.
(2) Pervasive Computing, that is, an environment where
every object virtually has processing power.
(3) Ubiquitous Computing or Calm technology, where
technology turns nearly hidden in our lives.
(4) Machine-to-Machine that made communication possi-
ble between machines without human intervention.
(5) Human-Computer Interaction that incorporates the
stages of study and planning of communication between
computer and human.
(6) Ambient Intelligence, it will rapidly make our day to
day surroundings responsive.
5. ARCHITECTURE OF IoT
It is so vast concept, hence no uniform architecture was
proposed for it. Several IoT architecture was given by
researchers, professionals, and Scholars.
The Architecture was introduced at the beginning,
which consists of the perception, network and applica-
tion layers [11]. This architecture is named as Three-layer
architecture.
5.1. Three-Layer Architecture
Perception Layer: The Perception layer is also named as
a physical layer. This layer has sensors for sensing and
gathering information. During this phase the sensors col-
lect information from distinct objects, later the actuators
work according to that information and perform precise
operations.
Network Layer: This layer works as an intermediate layer
for the perception layer and application layer and estab-
lishes an interface link between these two. The net-
work Layer supervises connection to other devices and
servers.
Application Layer: The Application layer is the implemen-
tation of IoT. The application layer looks after the working
of sensors and actuators. One can also consider it as soft-
ware that works on the sensors.
2470 J. Comput. Theor. Nanosci. 17, 2469–2475, 2020
RESEARCH ARTICLE
Kaur et al. Internet of Things: Architecture, Applications, and Security Concerns
Network layer
Perception Layer
Application Layer
Fig. 3. The three-layer architecture.
For existing technology the three-layer architecture of
IoT is not well suited, consequently, a new architecture
was designed. This new architecture composed of the per-
ception, transport, processing, application, and business
layers [6]. It is named as Five-Layer architecture.
5.2. Five-Layer Architecture
Perception Layer: This layer serves the same functions as
in the Three-layer architecture. The information gathered
from sensors is implemented at this layer.
Transport Layer: The data received from the perception
layer is passed to the processing layer with the help of the
Transport layer.There are some techniques such as LAN,
wireless technology, 3G, 4G, LTE, RFID that are used by
the transport layer.
Processing Layer: This layer is also named as the mid-
dleware layer. The complete information will be processed
Business Layer
Application Layer
Perception Layer
Processing Layer
Transport Layer
Fig. 4. The five-layer architecture.
at the Processing layer. This layer employs many tech-
niques like database, cloud computing, big data processing
modules, etc. By making use of such techniques abundant
information will be stored. After successfully storing the
information it will analyze the way to retrieve data for a
desirable outcome.
Application Layer: It is responsible for the working of IoT.
It defines the applications that use IoT technology.
Business Layer: Functioning of the complete IoT system
is governed by the Business layer.
6. TECHNOLOGIES USED IN IoT
Internet of Things uses different technologies; some of
them are mentioned below [1]:
6.1. Radio frequency Identification (RFID)
6.2. Near Field Communication (NFC)
6.3. Machine to Machine Communication (MtoM)
6.4. Vehicle to Vehicle Communication (VtoV)
6.5. Electronic Product Code (EPC)
6.6. Wireless Fidelity (Wi-Fi)
6.7. Bluetooth
6.8. ZigBee
6.9. Actuators
6.10. WSN (Wireless Sensor Network).
6.1. Radio Frequency Identification (RFID)
RFID technology first appeared in 1945. RFID has 3 com-
ponents [12]:
RFID Tag
RFID Reader
An Antenna.
The tag holds a microchip allied with an antenna. The
RFID system captures digital data encoded in RFID tags,
through a reader. The information related to an object is
sent as a serial number with the help of radio waves [10].
The data on the tags can be transferred by using electro-
magnetic fields so that they can recognize and route the
objects automatically, correlated to a precise tag. RFID is
an unmanned technology that assists machines to achieve
recognition of different objects and record metadata.
The RFID device was first used during the 2nd world
war to distinguish Friend or Foe in 1948 [8]. RFID
technology provides a cost-effective way of solving the
identification issues of objects. It is more authenticate,
productive, secure, economical and error-free. The RFID
technology is based on reader and tags. Initially, there were
three configurations defined in RFID.
Active RFID
Passive RFID
Active Reader Active Tag.
Active RFID: Active RFID systems contain a power
source (battery) and a transmitter. The signals are broad-
cast by a battery and later received by the reader. These
signals are received from a device that runs on the battery
and an active tag is used to operate the battery. These types
J. Comput. Theor. Nanosci. 17, 2469–2475, 2020 2471
RESEARCH ARTICLE
Internet of Things: Architecture, Applications, and Security Concerns Kaur et al.
of tags can have a large memory. Due to the presence of
transmitter, the signal is very strong hence they provide a
reliable reading over long distances. Active RFID tags are
used to track land and ocean containers, vehicles, etc.
Passive RFID: Another one is Passive RFID which does
not have any internal power source [4]. Here, to send the
data energy is required and this energy is supplied by the
reader. Their memory is limited.
Active Reader Active Tag: As the name suggests, both
the reader and tags are active in this configuration. When-
ever the sender has woken up by the reader, it will start
sending information.
6.2. Near Field Communication (NFC)
Near Field Communication technology provides a wireless
connection between two portable devices in close acces-
sibility it is much slightly similar to RFID technology.
Near Field Communication offers short-range communica-
tion and operates at 13.56 MHz. Philips and Sony compa-
nies were the first to introduce NFC. It exchanges the data
approximately 424 kbps. An NFC device can act as both
a reader as well as a tag. NFC provides easy connections,
rapid transactions and simple exchange of data. It mainly
used in applications such as contact less payment systems.
The two possible modes in the NFC are mentioned here.
Active Mode
Passive Mode.
Active Mode: In an Active mode, both devices are active.
The devices exchange signals to communicate with each
other.
Passive Mode: In contrast to Active mode, not both
devices are active. One device sends the signal and the
other is receiving it. The passive mode of technology is
secure and used for mobile payments.
6.3. Machine to Machine Communication (M2M)
In Machine-to-Machine (M2M) communication one or
more entities are incorporated for communication [1].
There is no need for a human interruption in the process
of M2M interaction. It also termed as MTC (Machine-type
Communication). This communication is between comput-
ers, Sensors, Actuators, embedded processors, and mobile
devices. There is rapid growth in the use of M2M com-
munication. The Researcher predicted that there will be
around 1.5 billion wirelessly connected devices by 2014,
omitting mobilephones. In the present situation, around
2 billion devices are connected. These devices collect
information from the sensors, examine the collected infor-
mation and distribute the information to other devices to
carry out a task. The Machine collects the data through
sensors and operates with the help of some application
software and embedded processors.
6.4. Vehicle to Vehicle Communication (V2V)
V2 V technology offers communication between vehicles.
V2Vprovides long-distance communication. The foremost
goal to design this technology is providing traffic control,
safety, and accident avoidance. This goal is achieved by
allowing the vehicle in transit to send position and speed
data to one another. Each vehicle sends reports about traf-
fic, road conditions, route direction, speed, and position.
This information is added to the network and servers as a
safety warning to other vehicles.
At the time of communication, if any other object inter-
venes with the communicating devices, the connection
is lost. This is a key challenge in V2V communication.
To remain connected, the devices should maintain a proper
line of sight. During the establishment of communication,
the vehicles in motion will also create a problem. There
must be a change in topology if any change occurs in the
network. Data will not properly send or receive if the net-
work is not available. This will cause a great problem.
6.5. Electronic Product Code (EPC)
Electronic Product Code (EPC) is a 96-bit code. This code
is electronically recorded on an RFID tag. EPC is a unique
serial number. EPC is tagged to a product in the form
of a chip. A radio antenna is attached to the chip which
transmits the EPC. The concerned information contained
by EPC is the type of EPC, a unique serial number of
products, specifications of products, details about the man-
ufacturer, etc. EPC was created by the EPC Global Orga-
nization and developed by the Auto-ID Center at MIT in
1999 [3].
6.6. Wireless Fidelity (Wi-Fi)
Wi-Fi is a wireless networking technology that autho-
rizes the devices to commune using radio waves. Vic
Hayes named the father of Wireless Fidelity. In 1991 the
for erunner to Wi-Fi was contrived by NCR Corpora-
tion with AT and T Corporation. The first wireless prod-
uct was introduced, titled WaveLAN operated at 1 Mbps
to 2 Mbps. Wi-Fi was also known as WLAN (Wireless
Local Area Network). Everyone can connect to the inter-
net through Wi-Fi. It provides a connection up to a radius
of 20–25 meters. It makes communications possible, even
in the areas which are deprived of communication such as
rural areas.
6.7. Bluetooth
Bluetooth is a wireless, cost-effective, short-range radio
technology that allows devices to exchange data within a
range of 10–100 meters. It was developed in 1994. Blue-
tooth is used to create a Personal Area Networks (PAN).
Two Bluetooth devices are connected through the process
of pairing. More than one Bluetooth device sharing the
same channel is called Piconet. It is also known as PAN.
This Piconet can have 2–8 connected devices at a time to
2472 J. Comput. Theor. Nanosci. 17, 2469–2475, 2020
RESEARCH ARTICLE
Kaur et al. Internet of Things: Architecture, Applications, and Security Concerns
share the data. One can share textual data, images, and
videos with the help of Bluetooth.
6.8. ZigBee
This wireless technology was developed by the ZigBee
Alliance. This technology offers a less data rate, lowcost,
and short-range transmission. Some other features of this
technology include its flexible protocol design scalabil-
ity and reliability. It is based on the IEEE 802.15.4 stan-
dard. The frequency range at which ZigBee operates is
868 MHz, 902–928 MHz, and 2.4 GHz. The range of
ZigBee is around 100 meters and it supports a data rate
of 250 kbps. Applications of Zigbee involve Industrial
Automation, Smart Metering, Home Automation, Smart
grid automation.
6.9. Actuators
The actuator is a device that transforms energy into
motion. It uses an electrical input and turns it into phys-
ical action. The categorization of Actuators based on the
energy sources they use to generate motion. Different
kinds of actuators are (1) Pneumatic actuator that uses
compressed air to produce motion. (2) Hydraulic actuator,
produce motion using liquid. (3) Electric actuator, origi-
nate motion using battery. (4) Thermal actuator makes use
of heat source and originates motion. The actuators are
crucial building elements of the IoT ecosystem.
6.10. WSN (Wireless Sensor Network)
The wireless sensor network can be defined as a group
of homogenous or heterogeneous sensors to oversee and
put down the physical conditions like temperature, pres-
sure, vibration, sound, etc. (Wikipedia). Sensor nodes are
low cost, minute, low power consuming devices incor-
porating the capabilities of wireless communication and
local processing. Variation of wireless sensor networks
can be deployed depending on the environment such as
Underground WSNs, Underwater WSNs, Mobile WSNs,
Multimedia WSNs, and Terrestrial WSNs. WSNs work in
short-range communication.
7. APPLICATIONS OF IoT
Internet of Things equipped the devices with connectivity
and cognizance. IoT applications lead the way to exten-
sive value into our lives. IoT is being deployed in various
domains, namely.
7.1. Connected Healthcare System
Internet of Things has substantial significance in health
care. The technology-driven connected healthcare sys-
tem could give a facelift to proficiency and quality of
treatments. IoT in healthcare authorizes intercommunica-
tion, machine-to-machine communication and information
exchange to make health care service delivery adequate.
The IoT devices can monitor a patient’s medical record.
The information about a person’s body temperature, heart-
beat rate, blood pressure, etc. can be tracked using sensors.
All the data collected by, these sensors will be notified to
the patient and their doctor in case of any emergency [18].
The connected setup declines the cost by utilizing bet-
ter quality resources, cutting down unnecessary visits, and
improving the allocation and planning.
7.2. Smart Home Automation
This application of IoT gives away to devices and appli-
ances that can be grouped to benefit the users with absolute
control of our home. The idea of the interconnected world
with just a fingertip touch or a simple voice command to
Alexa, Google Assistant, Siri, and Cortana has come up
recently. Home automation facilitates you to detect motion
in your home, you can turn your lights on and off with just
one touch and unlock your door from anywhere across the
globe.
7.3. Smart Cities
Smart city is another robust application offered by IoT.
The technology accelerates to make cities more stream-
lined. The objective of a smart city is to upgrade the lives
of people by filtering traffic congestion, detect a shortage
of energy supplies, survival free parking space, analyze air
quality, etc.
7.4. Smart Farming
Farming now a day has become more technology-
driven. IoT is a hidden agenda for growth in agricultural
production at a lower cost. It opens the door for pro-
fessionals to lead the way for a smart farming way
out. Farmers can make use of smart agriculture gad-
gets and gained control over the process of lifting
livestock and growing crops. Smart farming enables
farmers and growers to knock down waste and amplify
productivity (https://www.iotforall.com/iot-applications-
in-agriculture/). A Smart system is built to oversight the
crop and to collect meaningful data by using sensors.
Various kinds of art technologies used in farming are
monitoring of climate conditions, Greenhouse automation,
Crop management, cattle management, etc.
7.5. Smart Grid
The concept of a Smart grid is to put forward to solve
the problem of the traditional electricity grid [19]. It is
a communication network that collects and analyzes data
and remotely looks after everything from lighting, traffic
signs, traffic congestion, parking spaces, road warnings,
etc. A smart grid solves the problems of unidirectional
flow of information, wastage of energy, reliability, and
security in the traditional power grid [20].
J. Comput. Theor. Nanosci. 17, 2469–2475, 2020 2473
RESEARCH ARTICLE
Internet of Things: Architecture, Applications, and Security Concerns Kaur et al.
7.6. Industrial Automation
IoT devices are coming up with astonishing changes
through automation covering all the sectors. Industries are
successively favoring and acquiring industrial automation,
this makes use of various control devices for managing
different processes and machines in an industry, as a result,
the need for human intervention reduces. Concerning the
current report, the industrial market size is expected to
reach 73.5 billion US dollars by 2023 which highlights the
growth of IoT in Industrial Automation.
7.7. Connected Cars
New services are presented by automotive manufactur-
ers in the wake of swift advancements in technology.
The environment of connected vehicles contributes to
autonomous driving and gives a new meaning to mobility.
Connected cars technology is a network of sensors, anten-
nas, embedded software, and communication technologies,
with capabilities of making error-free decisions, speed and
consistency. As claimed by the market research consult-
ing firm, the globally connected car market is expected
to reach $280.36 billion by 2026. Connected cars put for-
ward the connectivity with comfort, performance, safety,
and security.
7.8. Smart Retail
IoT improves the retail sector by adding advanced digi-
tal tools to this process. It gives accurate data to retail
companies regarding consumer behavior. Retailers are opt-
ing IoT techniques to upgrade store operations, reducing
theft, expanding pick up, authorizing accurate inventory
management.
8. SECURITY CONCERNS OF IoT
The security concerns are widely classified in Technolog-
ical concerns and Security concerns. The technological
concern is a result of the heterogeneous and ubiquitous
nature of IoT devices, whereas the processes that should
be imposed to attain a protected network lead to a security
dilemmas. Technological challenges are concerned with
wireless technologies, extend the capabilities, energy, and
distributed nature. Security issues prerequisite the aptness
to safeguard the security by authentication, confidential-
ity, end-to-end protection, integrity, etc. [23]. To attain
a secure communication below listed security regulations
must be taken into consideration.
8.1. Confidentiality
To attain confidentiality, data should only available to
legitimate users. A user in an IoT nutshell can be a device,
human, and internal objects. Consequently, it is hard to
ensure that sensors don’t publicize the gathered data to sur-
rounding objects. Another key challenge is to make users
acquainted with data management mechanisms to certify
data protection.
8.2. Integrity
Connected devices are exchanging data henceforth to
ensure integrity it is necessary to ensure that data is com-
ing through the appropriate source and not mutated in
the process of communication. In IoT communication,
integrity can be accomplished by preserving end-to-end
security. Firewalls and protocols are used to handle the
data traffic, but it does not assure security at the endpoints.
8.3. Availability
IoT envisioned connecting a huge number of smart
devices. Data should be available always to the users any-
time they need it, likewise, devices and services must also
be available when essential.
8.4. Authentication
In the connected environment every object must be pro-
ficient to recognize and authenticate other objects. Due
to the nature of IoT, this process can be grueling as
things like objects, people, processing units, assistance,
and access providers are befuddle. Therefore, a method
requires to authenticate these things during the process of
interaction.
8.5. Lightweight Solutions
An exclusive security feature Lightweight solution is intro-
duced to overcome the stumbling blocks of the devices
such as their power efficacy and computing efficiency. This
is a constraint that must be kept in mind during designing
protocols for data and devices.
8.6. Heterogeneity
Various objects or things having distinct capabilities, com-
plexities, Features, Versions and technical aspects are cou-
pled in IoT. Another problem examined is the change in
surroundings whenever a device communicates to distinct
devices. To attain security, an optimal cryptography system
and compatible security protocols are required.
9. CONCLUSION
Right at this time, the Internet of Things is a well-known
title. Communication among things/devices depends on the
Internet. Everyone is prone to technology in some manner.
It becomes a need of today’s life. Most of the time people,
as well as things, are connected. One of the major issues
is the security of these devices during the communication
process. Compatibility issue is also there in devices [1].
Plenty of research has already been done in the area of
the Internet of Things still there is more work to do. It
is required to make this domain a bit secure and reliable
using standard protocols and efficient technologies.
2474 J. Comput. Theor. Nanosci. 17, 2469–2475, 2020
RESEARCH ARTICLE
Kaur et al. Internet of Things: Architecture, Applications, and Security Concerns
References
1. Goyal, K.K., Garg, A., Rastogi, A. and Singhal, S., 2018.A
literature survey on the internet of things (IoT). International
Journal Advanced Networking and Applications, 9(6), pp.3663–
3668.
2. Polgavande, A.S. and Kulkarni, A.D., 2017. Internet of things
(IoT): A literature review. International Journal of Research
in Advent Technology (IJRAT) Special Issue, E-ISSN: 2321-
9637.
3. Patel, A.K. and Patel, B.M., 2016. Internet of things (IoT): A litera-
ture review. IJSRD—International Journal for Scientific Research &
Development, 4(5), pp.1001–1003.
4. Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013.Inter-
net of things (IoT): A vision. Architectural Elements, and Future
Directions, 29(7), pp.1645–1660.
5. Lee, I. and Lee K., The internet of things (IoT): Applications, invest-
ments, and challenges for enterprises.
6. Khan, R., Khan S., Zaheer R. and Khan S., 2012. Future Internet:
The Internet of Things Architecture, Possible Applications and Key
Challenges. 10th International Conference on Frontiers of Informa-
tion Technology (FIT): Proceedings.
7. Gigli, M. and Koo S., 2011. Internet of things: Services and appli-
cations categorization. Advances in Internet of Things, 2011(1),
pp.27–31.
8. Madakam, S., Ramaswamy, R. and Tripathi, S., 2015. Internet of
things (IoT): A literature review. Journal of Computer and Commu-
nications, 3, pp.164–173, DOI: 10.4236/jcc.2015.35021.
9. Hukeri, P.A. and Ghewari, P.B., 2017. Review paper on IoT based
technology. International Research Journal of Engineering and
Technology (IRJET), 4(1), pp.1580–1582.
10. Jia,X.,Feng,Q.,Fan,T.andLeiQ.,2012.RFID Technol-
ogy and Its Applications in Internet of Things (IoT), IEEE.
pp.1282–1285.
11. Mahmoud, R., Yousuf, T., Aloul, F. and Zualkernan, I.,
2015. Internet of things (IoT) security: Current status, chal-
lenges, and prospective measures, DOI: 10.1109/ICITST.2015.741
2116.
12. Asghar, M.H., RFID and EPC as key technology on Internet of
Things (IoT), pp.121–123, ISSN: 0976-8491 (Online), ISSN: 2229-
4333 (Print).
13. Desai, K. and Mahalakshami, 2018. Internet of things (IoT): A
review of literature. International Research Journal of Management
and Commerce, 5(2), pp.121–123.
14. Asghari, P., Rahmani, A. and Javadi, H., 2018. Internet of things
applications: A systematic review, www.elsevier.com/locate/comnet.
15. Chase, J., 2013.The Evolution of the Inter net of Things, Texas
Instruments. Dallas, Texas, Texas Instruments Incorporate.
16. Soumyalatha and Hegde, G.S., 2016. Study of IoT: Understand-
ing IoT architecture, applications, issues and challenges. Interna-
tional Journal of Advanced Networking & Applications (IJANA), 7,
pp.477–482, ISSN: 0975-0282.
17. Sethi, P., Smruti, R. and Hindawi, S., 2017. Review Article: Inter-
net of Things: Architectures, protocols, and applications. Journal of
Electrical and Computer Engineering, p.25, Article ID 9324035.
18. Li,S.,Li,D.X.andShanshan,2014. The internet of things: A survey.
Zhao Inf. Syst. Front (2015), 17, pp.243–259.
19. Ghasempou, A., 2019. Internet of things in smart grid:
Architecture, Applications, Services, Key Technologies, and
Challenges. DOI: 10.3390/inventions4010022, www.mdpi.com/
journal/inventions.
20. Saleem, Y., Crespi, N. and Rehmani, H.M., Internet of things-aided
smart grid: Technologies, architectures, applications, prototypes, and
future research directions.
21. Banka, S., Madan, I. and Saranya S., 2018. Smart healthcare mon-
itoring using IoT. International Journal of Applied Engineering
Research, 13(15), pp.11984–11989, © Research India Publications.
http://www.ripublication.com.
22. Sedrati, A. and Mezrioui A., 2018. A survey of security challenges in
internet of things. Advances in Science, Technology and Engineering
Systems Journal, 3(1), pp.274–280.
23. Vignesh, and Samydurai, A., Security on internet of things (IoT)
with challenges and countermeasures. International Journal of Engi-
neering Development and Research (www.ijedr.org), 5(1), ISSN:
2321-9939, IJEDR1701065.
Received: 20 December 2019. Accepted: 10 January 2020.
J. Comput. Theor. Nanosci. 17, 2469–2475, 2020 2475