Conference PaperPDF Available

Internet of Things: A Definition & Taxonomy

Authors:

Abstract and Figures

The Internet of Things (IoT) has various fields of application including health care, resource management, asset tracking, etc. Depending on the use case, various technologies like RFID, Wireless Sensor Network (WSN) or Smart Objects can be used. With each of these comes a specific vision of what the IoT and connected objects are and – to our knowledge – there is no global picture of the IoT. The issue with this approach is that specific problems have been addressed before global ones: what if something has been missed? We propose a definition and taxonomy for connected objects and the IoT.
Content may be subject to copyright.
Internet of Things: a definition & taxonomy
Bruno Dorsemaine, Jean-Philippe Gaulier,
Jean-Philippe Wary and Nizar Kheir
Orange
Paris, France
{bruno.dorsemaine, jeanphilippe1.gaulier,
jeanphilippe.wary, nizar.kheir}@orange.com
Pascal Urien
Telecom ParisTech
Paris, France
pascal.urien@telecom-paristech.fr
Abstract—The Internet of Things (IoT) has various fields of
application including health care, resource management, asset
tracking, etc. Depending on the use case, various technologies
like RFID, Wireless Sensor Network (WSN) or Smart Objects
can be used. With each of these comes a specific vision of what
the IoT and connected objects are and – to our knowledge – there
is no global picture of the IoT. The issue with this approach is
that specific problems have been addressed before global ones:
what if something has been missed? We propose a definition and
taxonomy for connected objects and the IoT.
Index Terms—Internet of Things; connected objects; definition;
taxonomy.
I. INTRODUCTION
The IoT is – soon to be – everywhere. According to many
companies like Gartner [1] and IBM [2], there will soon be
billions of objects connected together and gathering data on
everything they can in order to make predictions, improve
processes, etc. However in their predictions, some include
tablets and smartphones [3] whereas others do not [1]. As long
as there is no common definition of the IoT, it is impossible to
compare those evaluations or objects that uses really different
technologies (like RFID [4], WSN [4] or Smart Objects [5],
[6]).
The technology specific visions [7] come from the different
requirements and needs of the use cases the IoT is applied to.
A wireless access card will, in fact, have very different specifi-
cations when compared to a smart fridge: the access card will
most likely use RFID, use hardware cryptography, harvest its
electricity, be very constraint in terms of CPU, memory and
RAM, etc. whereas the fridge will communicate over Ethernet
or Wi-Fi with other machines on the Internet, be connected to
the mains, have very little to no constraints in terms of CPU,
memory and RAM, etc. Despite many differences between
these technologies and the possible applications, they still
make the connection of the physical world possible and have
needs in common like security.
This work includes itself in an approach to define security
policies for the IoT in a corporate environment. Due to the
lack of literature on the topic, the first step is to propose
a way to classify connected objects. Then derive classes of
objects according to their needs and, in the end, security
policies. Hence, to be able to easily classify various connected
objects – i.e. even if they use different technologies – a
Fig. 1. Architecture related to the IoT
precise and exhaustive definition is needed. This paper is
organized according to the following plan. We first define
what a connected object and the IoT are. Then, in Fig. III,
we propose a taxonomy. Afterwards, we give a few examples
of classification and finally conclude this paper.
II. A DEFINITION
Before giving a definition of the IoT, an end-to-end vision
is needed.
A. The architecture
Despite the number of possible fields of application the IoT
and the associated technologies can be applied to, connected
objects are always associated to the same kind of architecture:
data needing to be transported, stored, processed and made
available.
In [4], the authors described a generic four level architecture
(names of the levels have been changed to take the definition
we propose into account) that is being used for the IoT. It is
shown in Fig. 1:
The local environment contains the connected objects and
the local pickup points. These elements communicate
through wired technologies (Ethernet, optic fiber, etc.)
or wireless links [8] (Bluetooth Low Energy, Wi-Fi,
ZigBee, etc.). The local pickup points (optional) can be
smartphones, small computers and other objects. They are
used as gateways to reach the infrastructure by objects
that are not powerful enough (battery, computing power,
2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies
978-1-4799-8660-6/15 $31.00 © 2015 IEEE
DOI 10.1109/NGMAST.2015.71
72
etc.). Sometimes, they allow direct user interaction with
the objects (an application on a smartphone for example).
The transport level allows the objects or local pickup
points to communicate with the command servers.
The storage and data mining generally take place in the
cloud and allow the processing of the data.
Finally, the user, or other systems, can access the data
through APIs or GUIs.
We can notice, that only the first level – the local environ-
ment – is specific to the IoT, the other three can be found
anywhere massive amount of data are being treated.
B. A definition of the IoT
Taking into account the previous elements, a definition for
a connected object could be: “Sensor(s) and/or actuator(s) car-
rying out a specific function and that are able to communicate
with other equipment. It is part of an infrastructure allowing
the transport, storage, processing and access to the generated
data by users or other systems.”
Then, a definition for the IoT would be: “Group of in-
frastructures interconnecting connected objects and allowing
their management, data mining and the access to the data they
generate.”
III. A TAXONOMY FOR CONNECTED OBJECTS
Following from the definitions, we described a taxonomy for
connected objects as shown in Fig. 2. It revolves around the
following categories: energy, communication, functional at-
tributes, local user interface, hardware and software resources
and cost. As the IoT is a relatively new and evolving field,
this taxonomy is extensible in order to take new cases into
account.
A. Energy
For many objects, energy is critical. In some cases, it can
even determine the lifespan of an object. This characteristic
can be divided in two parts:
Source. The way the object will use to get its power
is extremely important: it will determine many other
characteristics like the ability to work continuously, the
computational power of the CPU, etc. In [9], the authors
provide with four types of power source for a con-
nected object: harvesting (the energy is gathered from the
environment, e.g. solar panels), periodically recharged
or replaced,non-replaceable primary source (the power
source determines the lifespan of the object) and mains-
powered (the power source is virtually unlimited).
Management. The management of the power source can
be summed up to how the power source will be used
and, in the end to how long the object can operate
with a given amount of power. In [9], three types of
power management are described for the communication
interfaces, they can also be applied to the management
of the power source in general:
Normally-off. The object is off most of the time and
wakes up periodically or on a given signal from the
environment (power available through harvesting, for
example).
Low power. The object has to preserve its battery to
last over time; hence it has to be able to consume
the lowest amount of power possible.
Always-on. There is no reason for the object to
implement specific measures in order to limit power
consumption.
B. Communication
As some objects provide several communication interfaces,
it is possible to give one occurrence of this section for each
of these interfaces.
1) Type: The object can communicate with the pickup
points using various types of interfaces that can be divided
in two categories: wired and wireless. Wired interfaces can
include Ethernet, buses... whereas light, Wi-Fi, etc. are wire-
less ones.
2) Local pickup point: In Fig. 1, the local pickup point is
part of the local environment level. It is a gateway to the other
parts of the architecture for the objects that are connected to it.
The use of a local pickup point may have implications on the
battery life, computational power and cost of an object because
the object may not have to use heavy protocols/addressing
systems (it does not need to communicate with machines on
the Internet thanks to the local pickup point) and so does not
need a big computational power for this purpose.
3) Total disconnection: Sometimes, it is possible to disable
the “connected” feature of an object (or at least not to
use it) but to keep its main functionalities (e.g. counting
and displaying the number of steps for a pedometer). It is
sometimes called “chip silence”. In other cases, the object
cannot function properly without a connection to the pickup
point and the rest of the architecture.
4) Initiation of the communications: Either the object or the
pickup point can initiate the communication, it has an impact
on how the communication interfaces are being used. There
are three possibilities:
Object. In this case, as the object is the one that starts the
communication its interfaces does not have to be turned
on all the time. It means that the object will be able to
save power while it is not communicating by turning its
communication interfaces off.
Pickup point. In this mode, this object needs to wait for
the pickup point to initiate the communication. It means
that, contrary to the previous mode, the object cannot
turn its communication interfaces off and that it has to
be registered with the pickup point.
Object and pickup point. Either the object or the pickup
point can start a communication. As previously, the object
has to constantly listen of its interfaces and register itself
to the pickup point.
5) Security:
Authentication. This process allows the objects and
pickup points to recognize each other, to know who
73
Fig. 2. Taxonomy for connected objects
they are talking to. Several types of authentication are
possible:
Mutual. Both the object and the pickup point prove
their identity. The main problem it raises is that there
is a need for configuration on both sides. The most
problematic one is the objects’: they might not be
easily reachable physically, management might not
be possible, etc. It could be an issue if there is a
new pickup point to configure for example.
One way. There are two possibilities here: the object
or the pickup point authenticates itself. In either
of these possibilities, the other component can be
a fake, there is no way for the authenticated one
to be sure. The case of the authentication of the
pickup point raises the same issues as in the mutual
authentication case.
None. There is no authentication between the two
components. Either of them could be a fake.
Identification. Whereas the authentication allows objects
to know that they are part of a known group, identification
makes it possible to differentiate two object that belong
to the the same group. As with authentication, three types
of identification are possible: mutual,one way and none.
Encryption. Encryption is what makes it theoretically
impossible for an attacker to eavesdrop a communica-
tion if it is implemented correctly with state of the art
algorithms. Not using encryption is not necessarily a
problem if the transmitted data is not sensitive (e.g. a
temperature reading emitted from a weather station). A
simple classification could take the form of a yes/no
answer or sort objects according to the algorithms they
use to encrypt their communications.
Integrity. It is possible for a communication to be dis-
turbed by external elements. In this case, insuring the
integrity of the data is possible but at a certain cost:
information has to be added to the initial data in order to
insure integrity. This additional information has to be cal-
culated/verified (computational power) and sent/received
with the rest of the data (communication). Hence, in some
cases, it is more interesting to accept transmitting data
without integrity controls (e.g. with many sensors in the
same area gathering the same kind of data, it might be
simpler not to use integrity checks but to discriminate
some results by correlation). Objects could be classified
with a yes/no answer or based the algorithms that are
being used.
6) Physical specifications: The following characteristics
are intimately linked and also play a big role in the choice of
the “energy” specifications: the lower the rate and the range
are, the lower the power consumption will be for a given
amount of data to transmit.
Rate.Itisthetheoretical maximum amount of data the
communication interface can send in a given amount
of time. It is generally measured in Kb/s or Mb/s. A
good way to classify objects for this criteria could be the
technologies that are being used or ranges of rates.
Range.Itisthetheoretical maximum distance the data
can reach while remaining understandable with a given
technology. To classify objects according to this charac-
teristic, the technologies or ranges of distances in meters
or types of networks (PAN, LAN, building scale, city
scale, etc.) can be used.
C. Functional attributes
1) Interactions:
Sensor. The object is able to extract various data from
its environment like temperature, light exposure or just
give its position (e.g. RFID tag). There are two types of
sensors:
Sensor with memory. These sensors can store the data
they gather in order to send it periodically. This can
74
be used to save power or if the pickup point is not
always reachable.
Sensor without memory. With this kind of sensors,
if the data is not send when gathered, it is lost. It
means that the object has to emit continuously and
that a pickup point must be reachable.
Actuator. The object is able to act within its environment:
make a movement, produce cold, emit light, etc.
Sensor and actuator. The object is a hybrid of the two
previous categories: it can gather data and act within its
environment. As such, it inherits the specificities of the
sensors and can have memory or not.
2) Mobility: Some objects have been made with the idea
of it moving (e.g. a pedometer) and others have not (e.g. a
thermometer). We considered two categories of objects for this
criteria:
Fixed. The object is fixed or is in a static / very constraint
(in terms of mobility) environment, a room for example.
It has not been made with it moving in mind.
Mobile. The object has been made to move.
3) Management: Depending on the use case, objects can
be manageable or not. In the case of a manageable object,
another question could be weather it is possible physically or
over one of the communication interfaces.
D. Local user interface
1) Object: Sometimes, the object has components that are
dedicated to a direct interaction with its user so that they can
configure it, use its basic functions, etc. There are four types
of interfaces:
Active. Parts of the object are dedicated to the interaction
with the user: buttons, etc.
Passive. The user cannot interact directly with the object
but the it can communicate with them through various
components: screen, lights, sounds, vibrations, etc.
Active and passive. The object is a hybrid of the two
previous categories and both the object and the user can
interact with each other.
None. Nor the object or the user can interact directly with
each other.
2) Direct use: If the object has an active or active/passive
user interface, it sometimes is possible for the user to – at
least – use its basic functionalities.
3) Use through local pickup point: If the object communi-
cates with the rest of the architecture through a local pickup
point, it might be possible for the user to – at least – use the
basic functions of the object through the local pickup point.
E. Hardware and software resources
1) Hardware resources: The amount of RAM, memory and
CPU the object has at its disposal conditions many things like
the “intelligence” that can be embedded in the object, the type
of power source it will rely on, etc. In [9], the authors defined a
three ranges classification of devices using RAM and memory
but it only addresses “small” (in terms of RAM and memory)
devices.
2) Security:
Hardware cryptography. Hardware cryptography can be
provided by an object in order to make encryption
faster (than with the same algorithm implemented with
software). The classification can be made with a yes/no
answer or by using the names of the algorithms.
Containment. Whether processes can be executed in a
contained manner or not.
Proven code. In some cases, the user needs to be sure
that the object will work as it is expected to, that its
behavior is deterministic. Then, proving the object’s code
is needed.
Identification. When the user can physically interact with
the object, the identification process can ensure – if
correctly implemented – that the user and the object are
who/what they say they are. As with the identification for
the communication, there are three possibilities: mutual,
one way and none.
Authentication. When the user can physically interact
with the object, the authentication process can ensure –
if correctly implemented – that the user and the object
have the right to interact with each other. As with the
authentication for the communication, there are three
possibilities: mutual,one way and none.
Resource access management. It is possible to access the
object’s resources (every component of the object is seen
as a resource) through the infrastructure (including local
pickup points if possible) and the object if a suitable local
interface is provided. Resource access management gives
the possibility to authorize or not access to some of the
resources e.g. a measurement, a specific process.
Accountability. Whether the object keeps traces of its
activity or not.
3) Dependability: The object can provide several means to
ensure that its information is correct (e.g. an open/close sensor
that has two different ways of knowing if what it monitors is
open or closed) is more dependable than an object that only
provides one.
4) Operating system:
Software and hardware. The object runs with an operating
system that is both software and hardware.
Kernel only and hardware. The object only runs a kernel
on a hardware platform.
Pure hardware. The operating system that the object runs
with is pure hardware.
5) Software updates: Whether it is possible or not for the
object’s software to be updated.
IV. EXAMPLES OF CLASSIFICATION
Fig. 3 describes the classification of a few objects according
to the previously defined taxonomy. Those have been selected
because of the variety of use cases they represent. Their
classification highlights the interdependencies between the
characteristics an object can have, like the type of power
source, how it is being managed, the rate and range provided
by the communication interface, etc.
75
To explicit the interdependencies, we can take the example
of the RFID access card from Fig. 3. This device is only
powered by its local collector when at the right distance.
Hence, it does not include a power source and does not use lots
of power to function. Contrary to an object that is connected
to the mains, power consumption is critical here and is
impacted by many characteristics. As most of the access card’s
work consists in cryptography and communication, hardware
cryptography (it also is faster than software cryptography and
does not require a strong and energy consumer processor as
it uses dedicated components) is being and so is a very low
rate and range wireless communication interface.
In comparison to the access card, the smart washing
machine has completely different specifications (only using
the previously defined taxonomy, not the really use cases).
The fact that it is not mobile has a huge impact on other
characteristics: a high rate wired connection is available and
the device is powered through the mains. Among the other
differences are the user interface (it is possible to use the object
directly) and the security measures (the type of resources the
object needs to function is impacted).
V. C ONCLUSION
In this paper, we proposed a generic definition for connected
objects as well as the Internet of Things. Following on from
these definitions, we were able to define a taxonomy for
connected objects.
With these elements, we defined a common vocabulary that
covers existing and forthcoming equipment. It can be used to
easily classify and compare objects on a common scale.
The next step will consist in extracting object classes –
based on security requirements – from the proposed taxonomy,
providing a generic end-to-end risk analysis for each of these
classes and defining security measures in order to reduce the
risks to an acceptable level.
REFERENCES
[1] J. Tully. (2015) Mass adoption of the internet of things will create new
opportunities and challenges for enterprises.
[2] P. Brody and V. Pureswaran. (2014) Device democracy – saving the future
of the internet of things.
[3] D. Evans. (2011) The internet of things how the next evolution of the
internet is changing everything.
[4] L. D. X. Shancang Li and S. Zhao, “The internet of things: a survey,”
Information Systems Frontiers, vol. 17, pp. 243–259, 2015.
[5] F. K. Gerd Kortuem, Dan Fitton and V. Sundramoorthy. (2010) Smart
objects as building blocks for the internet of things.
[6] J.-P. Vasseur and A. Dunkels, Interconnecting Smart Objects with IP –
The Next Internet, 2010.
[7] A. I. Luigi Atzori and G. Morabito, “The internet of things: A survey,”
Computer Networks, vol. 54, no. 15, pp. 2787–2805, 2010.
[8] L. P. Luca Mainetti and A. Vilei, “Evolution of wireless sensor networks
towards the internet of things: a survey,” in Proc. Software, Telecommu-
nications and Computer Networks (SoftCOM), 2011, Dubrovnik, Croatia,
2011, pp. 1–6.
[9] M. E. C. Bormann and A. Keranen, “Terminology for constrained-node
networks,” RFC 7228, May 2014.
76
Fig. 3. Classification of a few connected objects
77
... The Term IoT is an acronym for Internet of Things. Various authors have analysed the literature on the IoT and translated it into definitions [15][16][17]. According to Gubbi et al., the definition of the IoT for smart environments is the "Interconnection of sensing and actuating devices providing the ability to share information across platforms through a unified framework, developing a common operating picture for enabling innovative applications. ...
... They describe connected objects as "Sensor(s) and/or actuator(s) carrying out a specific function and that are able to communicate with other equipment. It is part of an infrastructure allowing the transport, storage, processing and access to the generated data by users or other systems" [16]. Atzori et al. understand the IoT as "a conceptual framework that leverages on the availability of heterogeneous devices and interconnection solutions, as well as augmented physical objects providing a shared information base on global scale, to support the design of applications involving at the same virtual level both people and representations of objects" [17]. ...
Article
Full-text available
The integration of Digital Twins (DTs) is becoming increasingly important in various industries. This entails the need for a comprehensive and practical IT infrastructure framework. This paper presents a modifiable medium-level architecture that serves as a link between established reference architectures such as RAMI 4.0 and the pragmatic implementation of Digital Twins. The functionalities of an IT infrastructure are considered, and functional hardware and software components for fulfilling these are described. The proposed architecture is suitable for various deployment scenarios, including local, cloud and hybrid cloud–edge configurations. In order to improve the applicability of the medium-level architecture, a step-by-step procedure is also proposed, which helps to transfer the overarching requirements for a Digital Twin into a suitable IT infrastructure. Finally, the results are demonstrated by an exemplary application to a two-stage industrial gearbox.
... IIoT is intended to maximize asset utilization, minimize downtime, and optimize productivity in industrial settings as opposed to consumer oriented IoT applications, which are primarily focused on enhancing convenience and lifestyle. According to Dorsemaine et al. (2015), the industrial internet of things is a collection of infrastructures that permit object interconnection for the purposes of management, data mining, and data access. In this meaning, items are the sensor(s) as well as actuator(s) that allow equipment to communicate with one another. ...
... Dhirani et al. [7] describe IIoT as a concept for implementing separate technologies, including IoT, cloud computing, and artificial intelligence, together with other inventive solutions covering monitoring and automation. Dorsemaine et al. [8] define IIoT as a "group of infrastructures, interconnecting connected objects and allowing their management, data mining, and the access to data they generate where connected objects are sensor(s) and/or actuator(s) carrying out a specific function that are able to communicate with other equipment". Boyes et al. [5] point out that IoT devices are connected via networks, using different sensors or computing capabilities, and collaborate with other IoT objects that are using or sending data. ...
Conference Paper
Full-text available
Open Source Intelligence (OSINT) tools enable the collection of OSINT information from publicly available sources. In parallel, Cyber Threat Intelligence (CTI) harnesses this intelligence , employing Artificial Intelligence (AI) for automated data analysis for threat detection to identify potential vul-nerabilities and security threats. The research focuses on Industrial Internet of Things (IIoT) within edge computing environments to create Edge Intelligence with the support of CTI platforms. The reason is the vulnerability against cy-berattacks in production environments. Potential security threats and attacks should be detected based on OSINT information in Enterprise IoT environments. AI with Federated Learning can be integrated into CTI environments, which will be represented by an example of an Energy Cloud Environment that distributes data between multiple networks to detect attacks and prevent future vulnerabilities by distributing the OSINT information. It will be shown that CTI platforms are valuable tools that can complement the protection of IoT devices to enhance security. Future data breaches can be prevented in Enterprise IoT environments with the innovative methods and open source tools for formatting data as Indicators of Compromise (IoC) presented in the paper. The referenced best practices can be reused for other Enterprise environments and expanded on a global level.
... The IoT is a network of connected devices, which are sensors and/or actuators fulfilling a specific application [7]. Via the network they can, for instance, mutually exchange data or store and process data centrally and feed back the gained knowledge. ...
Preprint
As part of the Internet of Things, industrial devices are now also connected to cloud services. However, the connection to the Internet increases the risks for Industrial Control Systems. Therefore, a threat analysis is essential for these devices. In this paper, we examine Industrial Internet of Things devices, identify and rank different sources of threats and describe common threats and vulnerabilities. Finally, we recommend a procedure to carry out a threat analysis on these devices.
... infrastructure enables communication with other equipment along with the storage, processing, and distribution of data to other systems and users [7]. Cloud services realize universal accessible utility services, e.g., for device management, and centralized data processing for analytics, which may be supported by Artificial Intelligence (AI). ...
Preprint
The growing connectivity of industrial devices as a result of the Internet of Things is increasing the risks to Industrial Control Systems. Since attacks on such devices can also cause damage to people and machines, they must be properly secured. Therefore, a threat analysis is required in order to identify weaknesses and thus mitigate the risk. In this paper, we present a systematic and holistic procedure for analyzing the attack surface and threats of Industrial Internet of Things devices. Our approach is to consider all components including hardware, software and data, assets, threats and attacks throughout the entire product life cycle.
Article
Full-text available
Smart city initiatives aim to enhance urban domains such as healthcare, transportation, energy , education, environment, and logistics by leveraging advanced information and communication technologies, particularly the Internet of Things (IoT). While IoT integration offers significant benefits, it also introduces unique challenges. This paper provides a comprehensive review of IoT-based management in smart cities. It includes a discussion of a generalized architecture for IoT in smart cities, evaluates various metrics to assess the success of smart city projects, explores standards pertinent to these initiatives, and delves into the challenges encountered in implementing smart cities. Furthermore, the paper examines real-world applications of IoT in urban management, highlighting their advantages, practical impacts, and associated challenges. The research methodology involves addressing six key questions to explore IoT architecture, impacts on efficiency and sustainability, insights from global examples, critical standards, success metrics, and major deployment challenges. These findings offer valuable guidance for practitioners and policymakers in developing effective and sustainable smart city initiatives. The study significantly contributes to academia by enhancing knowledge, offering practical insights, and highlighting the importance of interdisciplinary research for urban innovation and sustainability, guiding future initiatives towards more effective smart city solutions.
Chapter
The increasing prevalence and ubiquity of autonomous cars has prompted researchers and industry to make substantial advancements and improvements in the development of an intelligent transportation system. The primary objective of the intelligent transportation system (ITS) is to enhance traffic efficiency through the reduction of traffic congestion. The platform provides clients with additional data, including historical traffic information, facilities in the surrounding area, real-time updates on operating status, and availability of seats. Currently, a multitude of technologies are being incorporated into ITS, such as artificial intelligence (AI) and the Internet of Things (IoT). IoT encompasses a collection of interconnected physical items, sometimes referred to as “things,” which are equipped with integrated sensors, software, and other technological components enabling them to communicate and share data with other objects, devices, and systems over the Internet. This chapter will examine the function of IoT in ITS. The initial segment will consist of an overview of the IoT platform. The introduction of ITS will follow thereafter. Subsequently, the role of IoT in ITS will be examined. This chapter will discuss three essential components of intelligent transportation systems: smart management systems, smart parking, and smart roadways. Furthermore, a depiction of the Internet of Things’ role in accident detection is delineated. This chapter demonstrates the efficacy of incorporating cloud computing into IoT in the context of intelligent transportation systems.
Article
The Internet of Things (IoT) connects physical objects to the internet, enabling autonomous data collection and analysis. In environmental monitoring, IoT plays a crucial role in gathering real-time data on parameters like air and water quality, weather, wildlife behavior, and urban heat islands. This abstract explores how IoT is used in environmental monitoring, covering standards, device types, and applications. IoT comprises interconnected devices that collect environmental data and transmit it for analysis, facilitating continuous observation and better resource management. Standards like MQTT and communication technologies like Wi-Fi govern IoT implementation. Environmental monitoring involves assessing air and water quality, weather conditions, wildlife behavior, and urban heat islands. Air quality monitoring measures pollutant levels in the atmosphere using IoT-based sensor networks. Water quality monitoring assesses chemical and biological characteristics of water bodies. Weather and climate monitoring observe atmospheric conditions using IoT-based sensor networks. Wildlife monitoring tracks animal movements and behavior using IoT-enabled devices. Urban heat island monitoring assesses temperature distribution in urban areas using IoT-based sensors. IoT revolutionizes environmental monitoring by enabling real-time, remote observation across various domains, contributing to better resource management and sustainability efforts.
Article
Full-text available
This study investigates data-driven business model innovation (DDBMI) for incumbent manufacturers, underscoring its importance in various strategic and managerial contexts. Employing topic modeling, the study identifies nine key topics of DDBMI. Through qualitative thematic synthesis, these topics are further refined, interpreted, and categorized into three levels: Enablers, value creators, and outcomes. This categorization aims to assess incumbent manufacturers’ preparedness for DDBMI. Additionally, a knowledge framework is developed based on the identified nine key topics of DDBMI to aid incumbent manufacturers in enhancing their understanding of DDBMI, thereby facilitating the practical application and interpretation of data-driven approaches to business model innovation.
Article
Full-text available
In recent year, the Internet of Things (IoT) has drawn significant research attention. IoT is considered as a part of the Internet of the future and will comprise billions of intelligent communicating ‘things’. The future of the Internet will consist of heterogeneously connected devices that will further extend the borders of the world with physical entities and virtual components. The Internet of Things (IoT) will empower the connected things with new capabilities. In this survey, the definitions, architecture, fundamental technologies, and applications of IoT are systematically reviewed. Firstly, various definitions of IoT are introduced; secondly, emerging techniques for the implementation of IoT are discussed; thirdly, some open issues related to the IoT applications are explored; finally, the major challenges which need addressing by the research community and corresponding potential solutions are investigated.
Article
Full-text available
The combination of the Internet and emerging technologies such as nearfield communications, real-time localization, and embedded sensors lets us transform everyday objects into smart objects that can understand and react to their environment. Such objects are building blocks for the Internet of Things and enable novel computing applications. As a step toward design and architectural principles for smart objects, the authors introduce a hierarchy of architectures with increasing levels of real-world awareness and interactivity. In particular, they describe activity-, policy-, and process-aware smart objects and demonstrate how the respective architectural abstractions support increasingly complex application.
Article
Wireless Sensor Networks (WSNs) are playing more and more a key role in several application scenarios such as healthcare, agriculture, environment monitoring, and smart metering. Furthermore, WSNs are characterized by high heterogeneity because there are many different proprietary and non-proprietary solutions. This wide range of technologies has delayed new deployments and integration with existing sensor networks. The current trend, however, is to move away from proprietary and closed standards, to embrace IP-based sensor networks using the emerging standard 6LoWPAN/IPv6. This allows native connectivity between WSN and Internet, enabling smart objects to participate to the Internet of Things (IoT). Building an all-IP infrastructure from scratch, however, would be difficult because many different sensors and actuators technologies (both wired and wireless) have already been deployed over the years. After a review of the state of the art, this paper sketches a framework able to harmonize legacy and new installations, allowing migrating to an all-IP environment at a later stage. The Building Automation use case has been chosen to discuss potential benefits of the proposed framework.
Article
Smart object technology, sometimes called the Internet of Things, is having a profound impact on our day-to-day lives. Interconnecting Smart Objects with IP is the first book that takes a holistic approach to the revolutionary area of IP-based smart objects. Smart objects are the intersection of networked embedded systems, wireless sensor networks, ubiquitous and pervasive computing, mobile telephony and telemetry, and mobile computer networking. This book consists of three parts, Part I focuses on the architecture of smart objects networking, Part II covers the hardware, software, and protocols for smart objects, and Part III provides case studies on how and where smart objects are being used today and in the future. The book covers the fundamentals of IP communication for smart objects, IPv6, and web services, as well as several newly specified low-power IP standards such as the IETF 6LoWPAN adaptation layer and the RPL routing protocol. This book contains essential information not only for the technical reader but also for policy makers and decision makers in the area of smart objects both for private IP networks and the Internet.Shows in detail how connecting smart objects impacts our lives with practical implementation examples and case studies Provides an in depth understanding of the technological and architectural aspects underlying smart objects technology Offers an in-depth examination of relevant IP protocols to build large scale smart object networks in support of a myriad of new services Table of ContentsPart I: The Architecture Chapter 1: What are Smart objects? Chapter 2: The IP protocol architecture Chapter 3: Why IP for smart objects? Chapter 4: IPv6 for Smart Object Networks and The Internet of Things Chapter 5: Routing Chapter 6: Transport Protocols Chapter 7: Service Discovery Chapter 8: Security for Smart Objects Chapter 9: Web services For Smart Objects Chapter 10: Connectivity models for smart object networks Part II: The Technology Chapter 11: What is a Smart Object? Chapter 12: Low power link layer for smart objects networks Chapter 13: uIP A Lightweight IP Stack Chapter 14: Standardization Chapter 15: IPv6 for Smart Object Networks - A Technology Refresher Chapter 16: The 6LoWPAN Adaptation Layer Chapter 17: RPL Routing in Smart Object Networks Chapter 18: The IPSO Alliance Chapter 19: Non IP Technology Part III: The Applications Chapter 20: Smart Grid Chapter 21: Industrial Automation Chapter 22: Smart Cities and Urban Networks Chapter 23: Home Automation Chapter 24: Building Automation Chapter 25: Structural Health Monitoring Chapter 26: Container Tracking
Mass adoption of the internet of things will create new opportunities and challenges for enterprises
  • J Tully
J. Tully. (2015) Mass adoption of the internet of things will create new opportunities and challenges for enterprises.
Device democracy -saving the future of the internet of things
  • P Brody
  • V Pureswaran
P. Brody and V. Pureswaran. (2014) Device democracy -saving the future of the internet of things.
Terminology for constrained-node networks
  • M E C Bormann
  • A Keranen
M. E. C. Bormann and A. Keranen, "Terminology for constrained-node networks," RFC 7228, May 2014.