Conference PaperPDF Available

A Survey on IoT Technologies, Evolution and Architecture

Authors:

Figures

Content may be subject to copyright.
2nd International Conference on Computer, Communication, and Signal Processing (ICCCSP 2018)
978-1-5386-1141-8/18/$31.00 ©2018 IEEE
A Survey on IoT Technologies, Evolution and
Architecture
R.M.Gomathi G.Hari Satya Krishna E.Brumancia Y. Mistica Dhas
Dept. of IT, Dept. of CSE, Dept. of IT, Dept. of IT,
School of Computing, School of Computing, School of Computing, School of Computing,
Sathyabama University, Sathyabama University, Sathyabama University,
Sathyabama University,
Chennai, India Chennai, India Chennai, India Chennai, India
gomssrm@gmail.com krishna1.ghs@gmail.com brumancia@gmail.com misticajimson@gmail.com
AbstractThe Internet Of Things (IoT) was initially called as
“Internet of Everything”. IoT objects have identifiers which are
unique. They have the ability to send the information over a
network interconnecting physical and virtual things without
requiring human-to-human or human-to-system interaction. It
provides the effective way of learning and interaction among
internet connected devices that include sensors, actuators,
services and other internet connected objects. The IoT can be
defined as things or objects connected to the internet than people.
The IoT system’s middleware can be described as intermediary
software system between the IoT devices and applications. The
IoT aim is to unite everything in the world under common
infrastructure. The main objective of this paper is to provide an
survey on Internet of Things, types of architectures, and the
technologies that are used in our daily life, smart environment.
However, this paper gives a good idea for new researches on
Internet of Things.
Keywords—Wireless Sensor Network; Internet of Things;
Transmission Control Protocol; Internet Protocol.
I. INTRODUCTION
The common man’s daily life, who works in the society
became the well known concept and it has many applications. The
Internet of Things is the exciting technological revolution since
the internet [1],[4]. The IoT is everywhere in the world that brings
the number of opportunities and impact every one. With Internet
of Things, the smart cities can be built where it manages the
parking spaces, street lighting, irrigation facilities, urban noise,
and waste can be monitored in real time applications. We can
build smart homes which are really safe and more efficient to
live. We can build smart environment that can automatically
monitoring the pollution from air and water and enabling the
early detection of Tsunami, earthquakes, forest fires and many
devastating disaster in the environment.
II. INTERNET OF THINGS
The Internet of Things is a paradigm shift in IT arena. As
from the definition the internet is the computer networks that
are globally interconnected and uses the Standard Internet
Protocol suite (TCP/IP) for serving the billions of users among
worldwide. It is a network consisting of millions of users that
include various sectors like public, private, academic, business
and government network consists of both local and global
scope of networks as shown in Fig.1. The networks are formed
by wireless, electronics, and optical networking technologies
[2],[3].
While the IoT offering the exciting opportunities, it still
remains challenging to manage the things that archives
seamless integration of the physical world. There are two IoT
communications APIs (Application Programming Interface).
They are,
1. REST (Representational State Transfer) based API
2. WebSocket based API
The IoT is an umbrella term in which many technologies
are involved. The following are the IoT enabling technologies.
WSN
Cloud Computing
Big Data Analytics
Embedded Systems
Security Protocols and Architecture
Communication Protocols
Web Services
Mobile Internet
Semantic Search Engine
Among all these technologies, Wireless Sensor Network is
the heart of IoT.
Fig.1. IoT Sensor World
Authorized licensed use limited to: Sathyabama Institute of Science and Technology. Downloaded on October 15,2020 at 03:41:06 UTC from IEEE Xplore. Restrictions apply.
2nd International Conference on Computer, Communication, and Signal Processing (ICCCSP 2018)
978-1-5386-1141-8/18/$31.00 ©2018 IEEE
The following are the main objectives of IoT:
To provide bridge between the poor and the rich
To distribute the resources of the world to the
needy
To be more proacti ve and less reactive
The M2M communication is networking of devices,
communicating or exchanging data without human interaction.
The differences between M2M and IoT are listed in Table.I.
TABLE I
DIFFERENCES BETWEEN M2M AND IOT
M2M IoT
1. Focus is on la
y
er belo
w
1. Focus is on la
y
er above
the network layer the network layer
2. Sensing and actuating 2. Sensing and actuating
ma
y
not be involved ma
y
be involved
3. Emphasis is on hardware 3. Emphasis is on software
4. Cloud is not involved 4. Cloud is involved
III. EVOLUTION
Before the research of IoT’s in depth we look at the
evolution of Internet. In the early 1960s, a communication
between two computers was made possible through a network
called computer network. In 1980s the TCP/IP stack was
introduced. The use of internet was started in 1980s. Later the
(WWW) became available in 1991which made the internet to
become more popular. The mobiles phones are connected to
the internet where mobile internet was formed. With the use of
social networking the users are getting connected via internet
through connecting devices. The further step in IoT is to
connect all the objects around us together and communicate
via internet as shown in Fig.2.
In IoT, all the smart objects are connected to the internet.
They communicate with each other with human intervention.
Internet of things is becoming the latest and well known
concept in the IT sector. It attracts the attention of users by
enabling anytime, anyplace connectivity across the world and
also providing unique identity to every objects [4].
IV. IOT ARCHITECTURE
The main problems of an IoT are vast and broad concept
that is not proposed, uniform architecture. So, for making an
IoT to work it should consist of sensors, networks,
communication between the computer systems and
technologies. Here we are discussing the five-layer
architecture model of IoT as shown in Fig.3.
The Objects Layer is also called as perception layer that
represents the physical sensors of an IoT. The aim is to collect
the information from various devices and processing it. This
includes sensors to perform analysis on querying location,
temperature, weight, acceleration and humidity [5].
The Object Abstraction Layer Where Object
Abstraction is the transferring of data from an object later to
the service management by the channels. The data transferred
through the channels like RFID, 3G, GSM, UTMS, WIFI,
Bluetooth, etc. [5].
Service Management Layer is also called as middleware
layer pairs the service based on addresses and names. This
layer enabling the IoT programmers to work without the
hardware platform. This layer also processes the data received
and make decisions and delivers the requested data [5]
The Application Layer is used to provide the services that
are being requested by the customer. The service provided to the
customer should meet the customer needs. It is helpful in markets
smart homes, smart cities, and home automation [6].
The Business Layer is one of the biggest responsibilities
for building a business model, flow charts and graphs. It
supports the designing, analyzing, implementation of IoT
system related elements. It is eligible for comparing the
outputs of every layer with an expected one for enhancing the
user’s privacy.
Pre-Internet Internet of
Internet o
f
Internet of
Internet o
f
CONTENT SERVICES
PEOPLE THINGS
“Human TO “Machine TO
Human” “WWW” “WEB 2.0” “Social Machine”
1.Fixed & Media”
Mobile 1.Identification
telephony 1.E-mail 1.E-Productivit
y
2.Trackin
2.SMS 2 I nformation 1.Skype
2.E-Commerce 3,Monitoring
3.Entertainment 2.Facebook
4.Meterin
g
3.Twitte r
Smart
Smart IT
Smart Phones Smart Devices, Smart
Networks Platforms &
&
Objects & tags Data &
Services Applications Ambient
context
Fig.2. Evolution of IOT
Authorized licensed use limited to: Sathyabama Institute of Science and Technology. Downloaded on October 15,2020 at 03:41:06 UTC from IEEE Xplore. Restrictions apply.
2nd International Conference on Computer, Communication, and Signal Processing (ICCCSP 2018)
978-1-5386-1141-8/18/$31.00 ©2018 IEEE
Business Layer
Application Layer
Service Management
Object Abstraction
Objects
Fig.3. Five-Layer IoT Architecture Model
V. REQUIREMENTS OF AN IOT
The following are the hardware requirements that leads to
the development of an IoT in infrastructure as well as in the
communication networks. The main components of IoT are as
follows [7].
1) Power source and Power Management
2) Sensors or Actuators
3) Processor and memory storage
4) Wireless communication
5) UI/UX
VI. COMPONENTS OF IOT
The following are the functional components of IoT.
It is shown in Fig.4.
Component for interaction and communication with
other IoT.
Component for Processing and analysis of operations.
Component for internet Interaction.
Component for handling Web services of
applications.
Components to integrate application services.
User interface to accessIoT.
A. Device (The Thing)
The IoT devices have unique identies. It is a physical
device that is embedded with sensors, actuators, electronics,
software, network connectivity enabling the objects collecting
and exchange of data. It performs remote sensing, actuating
and monitoring capability. The term “Things”, in IoT refer to
variety of devices that can collect and transfer the data to other
devices. In general, there are two groups: constrained and
standard devices. The IoT devices have on board or attached
sensors. The data can be exchanged with other connected
devices and applications. They also send the data to
centralized servers or cloud based application backends for
processing the data. Constrained devices are very small whose
computing capabilities (such as power, storage, and so on) are
low. The Bluetooth Low Energy (BLE) networks are unable to
reach cloud platform directly. Standard devices are similar to
small computers and route data directly to cloud platform via
network. These Constrained devices need to go through some
kind of gateway device to reach cloud platform.
B. Local Network
The IoT is an interconnected devices as we mentioned
above and the huge amount of data will be generated. We are
well known that networks are used to transmit the signals that
are collected by the sensors with all the different components
routers, bridges, LAN, MAN, WAN. The connecting of
networks over the sensors can also be done with technologies
including Wi-Fi, Wi-Max, Ethernet, LTE (Long Term
Evolution). The wide spread network adoption in IoT is as
follows.
1) High data rate
2) Low prices if data usage
3) IPV6 deployment
C. Internet
The internet is the system of globally interconnected
computer networks by using the internet protocol suite for
linking of devices worldwide. This network consists of
public, private, government, business networks of local to
global scope. Nowadays communications like media,
telephony, radio, television, paper mail and newspapers
have been overcome by the internet and giving birth to
new services such as internet telephony, internet television,
emails, etc. The newspapers and books are adapting to
website technology in colleges. So the internet enabled and
accelerated to new forums of personal interactions by
instant messaging, internet forums and social networking.
D. Backend Services
The services offered are, devices monitoring, device
control services, data publishing services and services for
data discovery. According to the definition, backend
services is a set of cloud based services that helps to build
your app backend. It features a fast data storage, easy to
manage user management. A pretty final product is an
obvious goal of every IoT enterprise strategy. The front
end of an IoT solution ensures end-users that will add
value or increase security in their lives. Once the product
collects data, it sends to the cloud. The data in cloud will
be running on servers that allow you to store, views
perform computation on your data.
E. Applicaions
The inter-connected devices share all the collected
information with people, to the cloud applications and also
to other devices. The connected devices capture and utilize
every bit of data in daily life. The connectivity is going
beyond laptops and mobile phones, its going towards
connected cars, smart homes, smart cities, wearable’s,
health care, etc. The following are the real most
applications of an IoT [8].
1. Smart Home
Authorized licensed use limited to: Sathyabama Institute of Science and Technology. Downloaded on October 15,2020 at 03:41:06 UTC from IEEE Xplore. Restrictions apply.
2nd International Conference on Computer, Communication, and Signal Processing (ICCCSP 2018)
978-1-5386-1141-8/18/$31.00 ©2018 IEEE
With the creation of IoT, the functions of smart home
are switching of lights after you left home, unlocks the
door for others for temporary access [8].
2. Wearables
Wearables have been experiencing the greatest
demand in markets all over the world. Wearables may be
worn or carried on the body. They sense and transfer the
information about the users. These devices cover
information about fitness, health and entertainment [8].
3. Connected Cars
The connected car is equipped with Internet
access,and allows the car to share internet access with
other devices both inside and outside the vehicle. Cars will
exchange data with other cars and alerting drivers. They
communicate with sensors on signs on road signals, bus
stops. They also get traffic updates and rerouting alerts.
And they’ll communicate with your house, office, and
smart devices, acting as an digital assistant, gathering
information you need to go about your day.
4. Smart Cities
It is another important application of IoT generating
curiosity among world’s population. The smart cities have
integrated sensors and monitoring devices connected
through internet. The collected data can be analyzed to
manage sewage system, power plant etc., The examples of
smart cities is energy management, water distribution,
urban security and environmental monitoring. It uses IoT
to collect and analyze data in order to interact directly with
city infrastructure.
5. IoT in Agriculture
Smart farming is quickly arising in agriculture
business. The ioT sensors deployed in field provides data
about crops, rain fall, nutrition of soil and so on.
Fig.4. IoT Functional Blocks
VII. SENSORS
The Sensors play major important role in IoT. It is the
tiny battery operated device with low power, less energy and
limited storage capabilities.
A. Sensor Types
The following are the various types of sensor which
are widely used for many applications.
1) Light Sensor
2) Temperature sensor
3) Force Sensor
4) Position Sensor
5) Speed Sensor
6) Sound Sensor
7) Chemical Sensor
B. Sensor Classes
There are two types of classes on sensors based on Output
and Data type. In output, there are analog and Digital. In Data
type, there are scalar and vector.
1. Analog Sensors
Analog sensors produces continuous output signal. The
various types of analog sensors are accelerometers, pressure
sensors, light sensors, sound sensors, temperature sensors, and
so on. It finds changes in vibration, position, velocity and
sensing motion are called accelerometers. All these are analog
quantities and they tend to be continuous in nature. The
thermometer can measure temperature of liquid and
continuously responds to temperature changes as the liquid is
heated up or cooled down.
2. Digital Sensors
Digital sensors are often used for analytical measurements
Digital sensors produce a binary output signal in the form of a
logic “1” or a logic “0. Theses digital sensors are replacing the
drawbacks of analog sensors. They produce discrete values,
which may be a single “bit” (serial transmission), or by
combining bits to produce a single “byte” output (parallel
transmission).
3. Scalar Sensors
Scalar Sensors produce output signal or voltage which is
proportional to magnitude of quantity being measured.
Physical quantities such as temperature, color, pressure,
strain,, etc. are all scalar quantities as only their magnitude is
sufficient to convey on information.
For example, the temperature of a room can be measured
using a thermometer, which responds to temperature changes
irrespective of the orientation of the sensor or its direction.
4. Vector Sensors
Vector sensors produce output signal or voltage which is
proportional to magnitude as well as orientation of the
quantity being measured. Physical quantities such as sound,
image, velocity, acceleration, orientation, etc. are all vector
quantities, as only their magnitude is not sufficient to convey
the complete information.
For example, the acceleration of the body can be
measured using an accelerometer, which gives components of
acceleration of the body with respect to the x, y, z coordinate
axes.
Management
Security
Application
Services
Communication
Devices
Authorized licensed use limited to: Sathyabama Institute of Science and Technology. Downloaded on October 15,2020 at 03:41:06 UTC from IEEE Xplore. Restrictions apply.
2nd International Conference on Computer, Communication, and Signal Processing (ICCCSP 2018)
978-1-5386-1141-8/18/$31.00 ©2018 IEEE
VIII. IOT CATEGORIES
The following are the two categories of IoT.
A. Industrial IoT
1) IoT device connects to an IP network and the global internet.
2) Communication between the nodes done using regular as
well as industry specific technologies.
B.Consumer IoT
1) IoT device communicates within the locally networked
devices.
2) Local communication is done mainly via Bluetooth, Zigbee
or Wi-fi.
3) Generally limited to local communication by a gateway.
IX. IOT PROTOCOLS
The dimensions of selecting an IoT protocol are as follows:
Transmission range, Privacy, Battery power, QOS, Addressing,
Application, Architecture and Capabilities. The top 10 IoT
protocols are listed below. They are.
1. BT (BlueTooth)
2. BTE (BlueTooth Low Energy)
3. RFID (Radio Frequency Identification)
4. Wi-Fi (Wireless Fidelty)
5. Cellular
6. Near Field Communication (NFC)
7. SigFox
8. Wireless HART
9. REST
10. Ingenu
The data can be transmitted in an energy efficient secure
manner for Smart Home Systems (SHS). It is secured by secret
key which has been generated by chaotic system. Message
integrity and authenticity is addressed by message authentication
codes [9]. The multimedia transmission via IoT is achieved by
dividing the large multimedia versions into simpler sessions
[10]. Omar Said et al., proposed adaptive version of real-time
transport protocol (RTP) and real-time control protocol (RTCP)
which outperform other protocols. energy-efficient centroid
based routing protocol (EECRP) is proposed which evenly
distribute the energy load in the network by calculating the
centroid’s position. It is mainly suitable for those network types
that need long lifetime [11].
X. CONCLUSION
The idea of Internet of Things providing a special path for our
modern life. It is aiming to prove quality of life by connecting
smart devices, technologies and applications. It is bringing many
technologies in our day to day life and making a life simpler and
easier. There are still various applications that IoT can
implement in domains including transport, governance, medical,
education, etc. In this paper, we finally presented the overview
on enabling technologies and need for IoT in industrial and
business sector. The main focus of this paper is tracking a person
using sensors with transfer of data.
ACKNOWLEDGMENT
We are thankful to the management of Sathyabama
Institute of Science and Technology for providing us all the
necessary facilities required for preparing this manuscript.
REFERENCES
[1] Anne H. Ngu, Mario Gutierrez et al., “IoT Middleware: A Survey on Issues
and Enabling Technologies”, IEEE INTERNET OF THINGS JOURNAL,
VOL. 4, NO. 1, FEBRUARY 2017.
[2]Nunberg, G. (2012) The Advent of the Internet: 12th April, Courses.
[3]www.ijrat.org
[4]Aggarwal, R. and Lal Das, M., “RFID Security in the Context of “Internet
of Things”, First International Conference on Security of Internet of Internet
of Things, Kerala, http://dx.doi.org/10.1145/2490428.2490435, Pp.51-56,
17-19 August 2012.
[5]Ala Al-Fuqaha, et al., “Internet of Things: A Survey on Enabling
Technologies, Protocols, and Applications”, IEEE COMMUNICATION
SURVEYS & TUTORIALS, VOL.17, NO. 4, FOURTH QUARTER 2015.
[6]R. Khan, S. U. Khan, R. Zaheer and S. Khan, “Future Internet: The Internet
of Things architecture, possible applications and key challenges”, In Proc.
10th Int. Conf. FIT, pp. 257-260, 2012.
[7] https://www.quora.com
[8] https://www.analyticsvidhya.com
[9] Tianyi Song, Ruinian Li, Bo Mei, et al., “A privacy Preserving
Communication Protocol for IoT Applications in Smart Homes”, IEEE
INTERNET OF THINGS JOURNAL, VOL. 4, NO. 6, DECEMBER 2017.
[10]Omar Said et al., “IoT-RTP and IoT-RTCP: Adaptive Protocols for
Multimedia Transmission over Internet of Things Environments”, IEEE
access, VOLUME 5, SEP 2017
[11]JIAN SHEN, ANXI WANG, et al., ”An Efficient Centroid-Based Routing
Protocol for Energy Management in WSN-Assisted Iot”, IEEE Access,
VOLUME 5, SEP 2017.
Authorized licensed use limited to: Sathyabama Institute of Science and Technology. Downloaded on October 15,2020 at 03:41:06 UTC from IEEE Xplore. Restrictions apply.
... world that the Internet of Things (IoT) presents, security is of the utmost significance. The hazards connected with data breaches, privacy violations, and cyber-attacks are becoming more obvious as IoT devices spread across a variety of industries, from healthcare and transportation to smart homes and industrial automation (1). ...
Chapter
This book series will be the great platform to share ideas and knowledge among the Industry experts, researchers and academics. Several current and upcoming frontier technologies, innovative solutions, research results, as well as enterprises related to internet of things and their applications will be published.
... In the realm of IoT ecosystems, especially those characterized by high device density, Bluetooth is emerging as the first choice for wireless communication among IoT gadgets. This preference is due to Bluetooth's minimal energy requirements, the cost-effectiveness of its radio components, and its innate ability to establish direct connections with smartphones, thus providing a seamless interface for users [1][2][3]. Concurrently, the development and integration of sophisticated RFF methods for IoT devices are underscored by the critical need for identifying and mitigating unauthorized access. This capability not only strengthens the security framework of network infrastructures, but also protects against intrusion into critical systems [4,5]. ...
Article
Full-text available
The proliferation of radio frequency (RF) devices in contemporary society, especially in the fields of smart homes, Internet of Things (IoT) gadgets, and smartphones, underscores the urgent need for robust identification methods to strengthen cybersecurity. This paper delves into the realms of RF fingerprint (RFF) based on applying the Jensen-Shannon divergence (JSD) to the statistical distribution of noise in RF signals to identify Bluetooth devices. Thus, through a detailed case study, Bluetooth RF noise taken at 5 Gsps from different devices is explored. A noise model is considered to extract a unique, universal, permanent, permanent, collectable, and robust statistical RFF that identifies each Bluetooth device. Then, the different JSD noise signals provided by Bluetooth devices are contrasted with the statistical RFF of all devices and a membership resolution is declared. The study shows that this way of identifying Bluetooth devices based on RFF allows one to discern between devices of the same make and model, achieving 99.5% identification effectiveness. By leveraging statistical RFFs extracted from noise in RF signals emitted by devices, this research not only contributes to the advancement of the field of implicit device authentication systems based on wireless communication but also provides valuable insights into the practical implementation of RF identification techniques, which could be useful in forensic processes.
... Through computational intelligence and data science, they navigated the complex interplay between IoT technologies, shedding light on its transformative impact and the hurdles impeding its widespread adoption. The study by Gomathi et al. [10] provided a complete overview of IoT, covering different aspects of architectures and technologies that shape smart environments. This study established the framework for understanding IoT's progress and potential by investigating the function of middleware and emphasizing IoT's goal of unifying global infrastructure. ...
... Industry 4.0 has led to a massive increase in the number of edge device based systems Gomathi et al. (2018) and has seen a growth in the number of sensitive data-driven industries. IoT devices are one of the widely used edge devices Chen et al. (2018) . ...
Article
Data poisoning attack is one of the common attacks that decreases the performance of a model in edge machine learning. The mechanism used in most of the existing data poisoning attacks diverges the gradients to a minimal extent which prevents models from achieving minima. In our approach, we have come with a new data poisoning attack that inverts the loss function of a benign model. The inverted loss function is then used to create malicious gradients at every SGD iteration, which is almost opposite to that of minima. Such gradients are then used to generate poisoned labels and inject those labels into the dataset. We have tested our attack in three different datasets, i.e. MNIST, Fashion-MNIST, and CIFAR-10, along with some preexisting data poisoning attacks. We have measured the performance of a global model in terms of accuracy drop in federated machine learning settings. The observed result suggests that our attack can be 1.6 times stronger than the targeted attack and 3.2 times stronger than a random poisoning attack in certain cases.
Article
Full-text available
The integration of the internet of things (IoT) has revolutionized diverse industries, introducing interconnected devices and IoT sensor networks for improved data acquisition. However, this connectivity exposes IoT ecosystems to emerging threats, with botnets posing significant risks to security. This research aims to develop an innovative solution for detecting botnets in IoT sensor networks. Leveraging insights from existing research, the study focuses on designing a hybrid self-organization map (SOM) Approach that integrates lightweight deep learning (DL) techniques. The objective is to enhance detection accuracy by exploring various DL architectures. Proposed methodology aims to balance computational efficiency for resource-constrained IoT devices while improving the discriminatory power of the detection system. The study advancing IoT cybersecurity and addresses critical challenges in botnet detection within IoT sensor networks. The testing of the artificial neural networks (ANN) classifier involves three models, each represented based on parameters related to the construction of the training models. The most effective ANN achieves 86%, works on anomaly intrusion detection systems (AIDS).
Article
Full-text available
Logistics is defined as the process of transporting, storing, and delivering goods from the producer to the final user. In today’s globalized world, logistics have become increasingly complex, making it imperative to address challenges related to data integrity, transparency, and secure storage. The incorporation of IoT devices in logistics allows for real-time monitoring of goods, vehicles, and environmental conditions. However, this generates vast amounts of data, which necessitates a reliable and secure data storage and management system. These aforementioned issues can be addressed by deploying a blockchain-based solution. Blockchain is an innovative technology that operates on a decentralized database system and it has different applications which include finance, healthcare, and so on. This research proposed a blockchain-IoT-based model for enhancing the logistics process. The proposed model utilized the Interplanetary file system for the secured and efficient storage of logistics data on a distributed and decentralized network and the SHA-256 hashing algorithm to ensure the anonymity of users’ private information. The model also establishes rules by using smart contracts, which increases efficiency. The performance evaluation of the proposed model was done based on the security, latency, cost, and throughput of the transaction. The experimental results and performance evaluation show that the proposed model is more efficient and secure than the existing blockchain-based systems. Additionally, the proposed model offers the real-time monitoring of goods while in transit. The proposed model offers the solution to the security, storage, and interoperability challenges in the IoT logistics system. It also provides recommendations to logistics stakeholders to adopt blockchain technology. Despite the implications, the limitation of this study is that it was tested in a controlled environment.
Article
Full-text available
With the advent of the Internet of Things (IoT) paradigm, the cloud model is unable to offer satisfactory services for latency-sensitive and real-time applications due to high latency and scalability issues. Hence, an emerging computing paradigm named as fog/edge computing was evolved, to offer services close to the data source and optimize the quality of services (QoS) parameters such as latency, scalability, reliability, energy, privacy, and security of data. This article presents the evolution in the computing paradigm from the client-server model to edge computing along with their objectives and limitations. A state-of-the-art review of Cloud Computing and Cloud of Things (CoT) is presented that addressed the techniques, constraints, limitations, and research challenges. Further, we have discussed the role and mechanism of fog/edge computing and Fog of Things (FoT), along with necessitating amalgamation with CoT. We reviewed the several architecture, features, applications, and existing research challenges of fog/edge computing. The comprehensive survey of these computing paradigms offers the depth knowledge about the various aspects, trends, motivation, vision, and integrated architectures. In the end, experimental tools and future research directions are discussed with the hope that this study will work as a stepping-stone in the field of emerging computing paradigms.
Article
Full-text available
Wireless sensor networks (WSNs) distribute hundreds to thousands of inexpensive micro-sensor nodes in their regions, and these nodes are important parts of Internet of Things (IoT). In WSN-assisted IoT, the nodes are resource constrained in many ways, such as storage resources, computing resources, energy resources and so on. Robust routing protocols are required to maintain a long network lifetime and achieve higher energy utilization. In this paper, we propose a new energyefficient centroid-based routing protocol (EECRP) for WSNassisted IoT to improve the performance of the network. The proposed EECRP includes three key parts: a new distributed cluster formation technique that enables the self-organization of local nodes, a new series of algorithms for adapting clusters and rotating the cluster head (CH) based on the centroid position to evenly distribute the energy load among all sensor nodes, and a new mechanism to reduce the energy consumption for long-distance communications. In particular, the residual energy of nodes is considered in EECRP for calculating the centroid’s position. Our simulation results indicate that EECRP performs better than LEACH, LEACH-C and GEEC. In addition, EECRP is suitable for networks that require a long lifetime and whose base station (BS) is located in the network.
Article
Full-text available
Recently, the Internet of Things (IoT) has attracted the interest of network researchers all over the world. Multimedia transmission through IoT presents an important challenge owing to nodes diversity. In this paper, adaptive versions of the Real-time Transport Protocol (RTP) and Real-time Control Protocol (RTCP), i.e., IoT-RTP and IoT-RTCP, are proposed. In these versions, the nature of IoT environments such as transmission channels heterogeneity, sudden change in session size, and different multimedia sources are considered. The basic idea of the proposed adaptive versions is to divide the large multimedia sessions into simple sessions with awareness of network status. To achieve this target, additional fields are added to the RTP and RTCP headers. These fields work under certain conditions to decrease the network overload. Finally, to test the performance of the proposed IoT-RTP and IoT-RTCP, a simulation environment is constructed using the network simulation package (NS2).The results of intensive simulations proved that the proposed adaptive versions of the multimedia protocols outperform the basic ones in terms of end-to-end delay, delay jitter, number of receiver reports, packet loss, throughput, and energy consumption.
Article
Full-text available
The Internet of Things (IoT) provides the ability for human and computers to learn and interact from billions of things that include sensors, actuators, services, and other Internet connected objects. The realization of IoT systems will enable seamless integration of the cyber-world with our physical world and will fundamentally change and empower human interaction with the world. A key technology in the realization of IoT systems is middleware, which is usually described as a software system designed to be the intermediary between IoT devices and applications. In this paper, we first motivate the need for an IoT middleware via an IoT application designed for real-time prediction of blood alcohol content using smartwatch sensor data. This is then followed by a survey on the capabilities of the existing IoT middleware. We further conduct a thorough analysis of the challenges and the enabling technologies in developing an IoT middleware that embraces the heterogeneity of IoT devices and also supports the essential ingredients of composition, adaptability and security aspects of an IoT system.
Article
Full-text available
This paper provides an overview of the Internet of Things (IoT) with emphasis on enabling technologies, protocols, and application issues. The IoT is enabled by the latest developments in RFID, smart sensors, communication technologies, and Internet protocols. The basic premise is to have smart sensors collaborate directly without human involvement to deliver a new class of applications. The current revolution in Internet, mobile, and machine-to-machine (M2M) technologies can be seen as the first phase of the IoT. In the coming years, the IoT is expected to bridge diverse technologies to enable new applications by connecting physical objects together in support of intelligent decision making. This paper starts by providing a horizontal overview of the IoT. Then, we give an overview of some technical details that pertain to the IoT enabling technologies, protocols, and applications. Compared to other survey papers in the field, our objective is to provide a more thorough summary of the most relevant protocols and application issues to enable researchers and application developers to get up to speed quickly on how the different protocols fit together to deliver desired functionalities without having to go through RFCs and the standards specifications. We also provide an overview of some of the key IoT challenges presented in the recent literature and provide a summary of related research work. Moreover, we explore the relation between the IoT and other emerging technologies including big data analytics and cloud and fog computing. We also present the need for better horizontal integration among IoT services. Finally, we present detailed service use-cases to illustrate how the different protocols presented in the paper fit together to deliver desired IoT services.
Conference Paper
Full-text available
The Internet is continuously changing and evolving. The main communication form of present Internet is human-human. The Internet of Things (IoT) can be considered as the future evaluation of the Internet that realizes machine-to-machine (M2M) learning. Thus, IoT provides connectivity for everyone and everything. The IoT embeds some intelligence in Internet-connected objects to communicate, exchange information, take decisions, invoke actions and provide amazing services. This paper addresses the existing development trends, the generic architecture of IoT, its distinguishing features and possible future applications. This paper also forecast the key challenges associated with the development of IoT. The IoT is getting increasing popularity for academia, industry as well as government that has the potential to bring significant personal, professional and economic benefits.
Article
The development of the Internet of Things (IoT) has made extraordinary progress in recent years in both academic and industrial fields. There are quite a few smart home systems that have been developed by major companies to achieve home automation. However, the nature of smart homes inevitably raises security and privacy concerns. In this paper, we propose an improved energy-efficient, secure, and privacy-preserving communication protocol for the smart home systems. In our proposed scheme, data transmissions within the smart home system are secured by a symmetric encryption scheme with secret keys being generated by chaotic systems. Meanwhile, we incorporate Message Authentication Codes (MAC) to our scheme to guarantee data integrity and authenticity. We also provide detailed security analysis and performance evaluation in comparison with our previous work in terms of computational complexity, memory cost, and communication overhead.
Conference Paper
Internet has emerged as a medium to connect entities across the world for emailing, conferencing, trading, gaming and so on. Internet of Things (IoT) is emerging as a global network for connecting any objects (physical or virtual) across the globe, ranging applications from home appliances to consumer electronics. In IoT, physical objects such as home appliances, vehicles, supply-chain items, containers, etc. should have unique identities for interacting among themselves. As a result, unique identification of trillion of objects is a foremost requirement in IoT. RFID (Radio Frequency IDentification) technology plays an important role in IoT for solving identification issues of objects around us in a cost effective manner. The usage of low cost RFID tags draws greater attention from researchers in recent past, as the cost of supply-chain items should not exceed much because of embedded tag cost. The communication between tag and reader takes place over insecure channel. Therefore, security concern has become an important issue in RFID systems. In recent years, several light-weight protocols and improvements have been proposed for RFID security. Some of them have succeeded with their security claim, but many protocols suffer from security weaknesses or design flaws. In this paper, we discuss a recently proposed protocol's strengths and weaknesses and then proposed an improved protocol, retaining efficiency of the protocol intact.
The Advent of the Internet: 12
  • G Nunberg
  • Ala Al-Fuqaha
Ala Al-Fuqaha, et al., "Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications", IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL.17, NO. 4, FOURTH QUARTER 2015.