We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Review on Internet of Things (IoT)

by M.u. Farooq, Muhammad Waseem, Sadia Mazhar, Anjum Khairi, Talha Kamal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Number 1
Year of Publication: 2015
Authors: M.u. Farooq, Muhammad Waseem, Sadia Mazhar, Anjum Khairi, Talha Kamal
10.5120/19787-1571

M.u. Farooq, Muhammad Waseem, Sadia Mazhar, Anjum Khairi, Talha Kamal . A Review on Internet of Things (IoT). International Journal of Computer Applications. 113, 1 ( March 2015), 1-7. DOI=10.5120/19787-1571

@article{ 10.5120/19787-1571,
author = { M.u. Farooq, Muhammad Waseem, Sadia Mazhar, Anjum Khairi, Talha Kamal },
title = { A Review on Internet of Things (IoT) },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 113 },
number = { 1 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume113/number1/19787-1571/ },
doi = { 10.5120/19787-1571 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:49:47.307997+05:30
%A M.u. Farooq
%A Muhammad Waseem
%A Sadia Mazhar
%A Anjum Khairi
%A Talha Kamal
%T A Review on Internet of Things (IoT)
%J International Journal of Computer Applications
%@ 0975-8887
%V 113
%N 1
%P 1-7
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unavoidable for anyone. The form of communication that we see now is either human-human or human-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-machine (M2M). This paper aims to provide a comprehensive overview of the IoT scenario and reviews its enabling technologies and the sensor networks. Also, it describes a six-layered architecture of IoT and points out the related key challenges.

References
  1. Rafiullah Khan, Sarmad Ullah Khan, Rifaqat Zaheer and Shahid Khan, "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges," in Proceedings of Frontiers of Information Technology (FIT), 2012, pp. 257-260
  2. Guicheng Shen and Bingwu Liu, "The visions, technologies, applications and security issues of Internet of Things," in E -Business and E -Government (ICEE), 2011, pp. 1-4
  3. Ling-yuan Zeng, "A Security Framework for Internet of Things Based on 4G Communication," in Computer Science and Network Technology (ICCSNT), 2012, pp. 1715-1718
  4. "The "Only" Coke Machine on the Internet," Carnegie Mellon University, School of Computer Science.
  5. M. Weiser, "The computer for the 21st century", Sci. Amer. , 1991, pp. 66 -75
  6. Jason Pontin, "Bill Joy's Six Webs," MIT Technology Review, 29 September 2005
  7. Kevin Ashton, "That 'Internet of Things' Thing", RFID Journal, 22 June 2009
  8. H. D. Ma, "Internet of things: Objectives and scientific challenge," in Journal of Computer Science and Technology, 2011, pp. 919-924
  9. Nich Heath, "What the Internet of Things means for you". It can be accessed at: http://www. techrepublic. com/blog/europeantechnology/ what-the-internet-of-things-means-for-you
  10. "Twine" by Supermechanical. It can be accessed at: http://supermechanical. com/twine
  11. De-Li Yang, Feng Liu and Yi-Duo Liang, "A Survey of the Internet of Things", in International Conference on E-Business Intelligence (ICEBI), 2010
  12. Bob Violino, "Top IT Vendors reveal their IOT strategies". It can be accessed at: http://www. networkworld. com/article/2604766/internet-ofthings/ top-it-vendors-reveal-their-iot-strategies. html
  13. Harald Sundmaeker, Patrick Guillemin, Peter Friess, Sylvie Woelffl, "Vision and challenges for realising the Internet of Things," Publications Office of the European Union, 2010
  14. Gartner, Inc. It can be accessed at: http://www. gartner. com/newsroom/id/2905717
  15. "From the ARPANET to the Internet" by Ronda Hauben - TCP Digest (UUCP). Retrieved 2007-07-05 It can be accessed at: http://www. columbia. edu/ rh120/other/tcpdigest paper. txt
  16. Jian An, Xiao-Lin Gui, Xin He, "Study on the Architecture and Key Technologies for Internet of Things," in Advances in Biomedical Engineering, Vol. 11, IERI-2012, pp. 329-335
  17. Lan Li, "Study of Security Architecture in the Internet of Things," in Measurement, Information and Control (MIC), 2012, Volume: 1, pp. 374-377
  18. "The Internet of Things," ITU Report, Nov 2005
  19. Wang Chen, "AN IBE BASED SECURITY SCHEME OF INTERNET OF THINGS," in Cloud Computing and Intelligent Systems (CCIS), 2012, pp. 1046, 1049
  20. Hui Suo, Jiafu Wan, Caifeng Zou, Jianqi Liu, "Security in the Internet of Things: A Review," in Computer Science and Electronics Engineering (ICCSEE), 2012, pp. 648-651
  21. MiaoWu, Ting-lie Lu, Fei-Yang Ling, ling Sun, Hui-Ying Du, "Research on the architecture of Internet of things," in Advanced Computer Theory and Engineering (ICACTE), 2010, pp. 484-487
  22. Xu Cheng, Minghui Zhang, Fuquan Sun, "Architecture of internet of things and its key technology integration based-on RFID," in Fifth International Symposium on Computational Intelligence and Design, pp. 294-297, 2012
  23. Debasis Bandyopadhyay, Jaydip Sen, "Internet of Things - Applications and Challenges in Technology and Standardization" inWireless Personal Communications, Volume 58, Issue 1, pp. 49-69
  24. Ying Zhang, "Technology Framework of the Internet of THings and Its Application," in Electrical and Control Engineering (ICECE), 2011, pp. 4109-4112
  25. Benjamin Khoo, "RFID as an Enabler of the Internet of Things: Issues of Security and Privacy," in Internet of Things (iThings/CPSCom), 2011, pp. 709-712
  26. L. Atzori, A. Iera, G. Morabito, "The Internet of Things: A survey," in Computer Networks - Science Direct
  27. H. Zhang, L. Zhu, "Internet of Things: Key technology, architecture and challenging problems", in Computer Science and Automation Engineering (CSAE), 2011, Volume: 4, pp. 507-512
  28. L. G. Guo, Y. R. Huang, J. Cai, L. G. QU, "Investigation of Architecture, Key Technology and Application Strategy for the Internet of Things," in Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC), 2011, Volume: 2, pp. 1196-1199
  29. Sohraby, K. , Minoli, D. , Znati, T. "Wireless sensor networks: technology, protocols, and applications", John Wiley and Sons, 2007 ISBN 978-0-471-74300-2, pp. 15-18
  30. "WISP" by Intel Labs; It can be accessed at: http://wisp. wikispaces. com
  31. E. M. Tapia, S. S. Intille, and K. Larson, "Portable wireless sensors for object usage sensing in the home: Challenges and practicalities," in Proceedings of the European Ambient Intelligence Conference. vol. LNCS 4794 Berlin Heidelberg: Springer-Verlag 2007
  32. IEEE 802. 15 WPAN Task Group 4. It can be accessed at: http://www. ieee802. org/15/pub/TG4. html
  33. G. Montenegro, N. Kushalnagar, J. Hui, D. Culler, "Transmission of IPv6 Packets over IEEE 802. 15. 4 Networks"
  34. R. Roman, C. ALcaraz, J. Lopez, N. Sklavos, "Key Management Systems for Sensor Networks in the Context of the Internet of Things,"Computers & Electrical Engineering, Volume: 37, Issue: 2, 2011, pp. 147-159
  35. B. B. P. Rao, P. Saluia, N. Sharma, A. Mittal, S. V. Sharma, "Cloud computing for Internet of Things & sensing based applications," in Sensing Technology (ICST), 2012 Sixth International Conference, IEEE
  36. X. Xiaohui, "Study on Security Problems and Key Technologies of The Internet of Things," Computational and Information Sciences (ICCIS), 2013, pp. 407-410
  37. O. Vermesan, P. Friess, "Internet of Things ? From Research and Innovation to Market Deployment," River Publishers, pp. 74-75
  38. I. Akyildiz and J. Jornet, "THE INTERNET OF NANOTHINGS," IEEE Wireless Communications, Volume: 17 Issue: 6, 2010, pp. 58-63
  39. V. M. Lubecke, Jung-Chih Chiao, "MEMS technologies for enabling high frequency communications circuits," in Telecommunications in Modern Satellite, Cable and Broadcasting Services, 1999, Volume: 2, pp. 382-389
  40. "Cisco 40 Gigabit Module". It can be accessed at: http://www. cisco. com/c/en/us/products/interfacesmodules/ 40-gigabit-modules/index. html
  41. R. Abdmeziem, D. Tandjaoui, "Internet of Things: Concept, Building blocks, Applications and Challenges, Computers and Society, Cornell University"
  42. "What we're driving at," Google Official Blog. It can be accessed at: http://googleblog. blogspot. com/2010/10/what-were-drivingat. html
  43. Y. Cao, W. Li, J. Zhang, "Real-time traffic information collecting and monitoring system based on the internet of things," in Pervasive Computing and Applications (ICPCA), 2011 6th International Conference, pp. 45-49
  44. L. Xiao, Z. Wang, "Internet of Things: A New Application for Intelligent Traffic Monitoring System," in JOURNAL OF NETWORKS, 2011
  45. P. Fuhrer, D. Guinard, "Building a Smart Hospital using RFID technologies,"
  46. F. TongKe, "Smart Agriculture Based on Cloud Computing and IoT," in Journal of Convergence Information Technology (JCIT), Jan'13
  47. "RFID Security Issues - Generation2 Security". It can be accessed at: http://www. thingmagic. com/index. php/rfid-security-issues
  48. Y. Wang, G. Attebury And B. Ramamurthy, "A Survey on Security Issues in Wireless Sensor Networks," in IEEE communications Survey and Tutorials, 2nd Quarter 2006.
  49. M. Aamir, Prof. X. Hong, A. A. Wagan, M. Tahir, M. Asif, "Cloud Computing Security Challenges and their Compromised Attributes," in International Journal of Scientific Engineering and Technology, Volume 3, Issue 4, pp. 395-399
  50. V. Ashktorab, S. R. Taghizadeh, "Security Threats and Countermeasures in Cloud Computing," in International Journal of Application or Innovation in Engineering and Management (IJAIEM), Volume 1, Issue 2, Oct'12.
Index Terms

Computer Science
Information Sciences

Keywords

Internet of Things RFID WSN IOT architecture IoT Vision IoT applications IoT security.