Research Article

A Review on Internet of Things (IoT)

by  M.U. Farooq, Muhammad Waseem, Sadia Mazhar, Anjum Khairi, Talha Kamal
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Issue 1
Published: March 2015
Authors: M.U. Farooq, Muhammad Waseem, Sadia Mazhar, Anjum Khairi, Talha Kamal
10.5120/19787-1571
PDF

M.U. Farooq, Muhammad Waseem, Sadia Mazhar, Anjum Khairi, Talha Kamal . A Review on Internet of Things (IoT). International Journal of Computer Applications. 113, 1 (March 2015), 1-7. DOI=10.5120/19787-1571

                        @article{ 10.5120/19787-1571,
                        author  = { M.U. Farooq,Muhammad Waseem,Sadia Mazhar,Anjum Khairi,Talha Kamal },
                        title   = { A Review on Internet of Things (IoT) },
                        journal = { International Journal of Computer Applications },
                        year    = { 2015 },
                        volume  = { 113 },
                        number  = { 1 },
                        pages   = { 1-7 },
                        doi     = { 10.5120/19787-1571 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2015
                        %A M.U. Farooq
                        %A Muhammad Waseem
                        %A Sadia Mazhar
                        %A Anjum Khairi
                        %A Talha Kamal
                        %T A Review on Internet of Things (IoT)%T 
                        %J International Journal of Computer Applications
                        %V 113
                        %N 1
                        %P 1-7
                        %R 10.5120/19787-1571
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unavoidable for anyone. The form of communication that we see now is either human-human or human-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-machine (M2M). This paper aims to provide a comprehensive overview of the IoT scenario and reviews its enabling technologies and the sensor networks. Also, it describes a six-layered architecture of IoT and points out the related key challenges.

References
  • Rafiullah Khan, Sarmad Ullah Khan, Rifaqat Zaheer and Shahid Khan, "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges," in Proceedings of Frontiers of Information Technology (FIT), 2012, pp. 257-260
  • Guicheng Shen and Bingwu Liu, "The visions, technologies, applications and security issues of Internet of Things," in E -Business and E -Government (ICEE), 2011, pp. 1-4
  • Ling-yuan Zeng, "A Security Framework for Internet of Things Based on 4G Communication," in Computer Science and Network Technology (ICCSNT), 2012, pp. 1715-1718
  • "The "Only" Coke Machine on the Internet," Carnegie Mellon University, School of Computer Science.
  • M. Weiser, "The computer for the 21st century", Sci. Amer. , 1991, pp. 66 -75
  • Jason Pontin, "Bill Joy's Six Webs," MIT Technology Review, 29 September 2005
  • Kevin Ashton, "That 'Internet of Things' Thing", RFID Journal, 22 June 2009
  • H. D. Ma, "Internet of things: Objectives and scientific challenge," in Journal of Computer Science and Technology, 2011, pp. 919-924
  • Nich Heath, "What the Internet of Things means for you". It can be accessed at: http://www. techrepublic. com/blog/europeantechnology/ what-the-internet-of-things-means-for-you
  • "Twine" by Supermechanical. It can be accessed at: http://supermechanical. com/twine
  • De-Li Yang, Feng Liu and Yi-Duo Liang, "A Survey of the Internet of Things", in International Conference on E-Business Intelligence (ICEBI), 2010
  • Bob Violino, "Top IT Vendors reveal their IOT strategies". It can be accessed at: http://www. networkworld. com/article/2604766/internet-ofthings/ top-it-vendors-reveal-their-iot-strategies. html
  • Harald Sundmaeker, Patrick Guillemin, Peter Friess, Sylvie Woelffl, "Vision and challenges for realising the Internet of Things," Publications Office of the European Union, 2010
  • Gartner, Inc. It can be accessed at: http://www. gartner. com/newsroom/id/2905717
  • "From the ARPANET to the Internet" by Ronda Hauben - TCP Digest (UUCP). Retrieved 2007-07-05 It can be accessed at: http://www. columbia. edu/ rh120/other/tcpdigest paper. txt
  • Jian An, Xiao-Lin Gui, Xin He, "Study on the Architecture and Key Technologies for Internet of Things," in Advances in Biomedical Engineering, Vol. 11, IERI-2012, pp. 329-335
  • Lan Li, "Study of Security Architecture in the Internet of Things," in Measurement, Information and Control (MIC), 2012, Volume: 1, pp. 374-377
  • "The Internet of Things," ITU Report, Nov 2005
  • Wang Chen, "AN IBE BASED SECURITY SCHEME OF INTERNET OF THINGS," in Cloud Computing and Intelligent Systems (CCIS), 2012, pp. 1046, 1049
  • Hui Suo, Jiafu Wan, Caifeng Zou, Jianqi Liu, "Security in the Internet of Things: A Review," in Computer Science and Electronics Engineering (ICCSEE), 2012, pp. 648-651
  • MiaoWu, Ting-lie Lu, Fei-Yang Ling, ling Sun, Hui-Ying Du, "Research on the architecture of Internet of things," in Advanced Computer Theory and Engineering (ICACTE), 2010, pp. 484-487
  • Xu Cheng, Minghui Zhang, Fuquan Sun, "Architecture of internet of things and its key technology integration based-on RFID," in Fifth International Symposium on Computational Intelligence and Design, pp. 294-297, 2012
  • Debasis Bandyopadhyay, Jaydip Sen, "Internet of Things - Applications and Challenges in Technology and Standardization" inWireless Personal Communications, Volume 58, Issue 1, pp. 49-69
  • Ying Zhang, "Technology Framework of the Internet of THings and Its Application," in Electrical and Control Engineering (ICECE), 2011, pp. 4109-4112
  • Benjamin Khoo, "RFID as an Enabler of the Internet of Things: Issues of Security and Privacy," in Internet of Things (iThings/CPSCom), 2011, pp. 709-712
  • L. Atzori, A. Iera, G. Morabito, "The Internet of Things: A survey," in Computer Networks - Science Direct
  • H. Zhang, L. Zhu, "Internet of Things: Key technology, architecture and challenging problems", in Computer Science and Automation Engineering (CSAE), 2011, Volume: 4, pp. 507-512
  • L. G. Guo, Y. R. Huang, J. Cai, L. G. QU, "Investigation of Architecture, Key Technology and Application Strategy for the Internet of Things," in Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC), 2011, Volume: 2, pp. 1196-1199
  • Sohraby, K. , Minoli, D. , Znati, T. "Wireless sensor networks: technology, protocols, and applications", John Wiley and Sons, 2007 ISBN 978-0-471-74300-2, pp. 15-18
  • "WISP" by Intel Labs; It can be accessed at: http://wisp. wikispaces. com
  • E. M. Tapia, S. S. Intille, and K. Larson, "Portable wireless sensors for object usage sensing in the home: Challenges and practicalities," in Proceedings of the European Ambient Intelligence Conference. vol. LNCS 4794 Berlin Heidelberg: Springer-Verlag 2007
  • IEEE 802. 15 WPAN Task Group 4. It can be accessed at: http://www. ieee802. org/15/pub/TG4. html
  • G. Montenegro, N. Kushalnagar, J. Hui, D. Culler, "Transmission of IPv6 Packets over IEEE 802. 15. 4 Networks"
  • R. Roman, C. ALcaraz, J. Lopez, N. Sklavos, "Key Management Systems for Sensor Networks in the Context of the Internet of Things,"Computers & Electrical Engineering, Volume: 37, Issue: 2, 2011, pp. 147-159
  • B. B. P. Rao, P. Saluia, N. Sharma, A. Mittal, S. V. Sharma, "Cloud computing for Internet of Things & sensing based applications," in Sensing Technology (ICST), 2012 Sixth International Conference, IEEE
  • X. Xiaohui, "Study on Security Problems and Key Technologies of The Internet of Things," Computational and Information Sciences (ICCIS), 2013, pp. 407-410
  • O. Vermesan, P. Friess, "Internet of Things ? From Research and Innovation to Market Deployment," River Publishers, pp. 74-75
  • I. Akyildiz and J. Jornet, "THE INTERNET OF NANOTHINGS," IEEE Wireless Communications, Volume: 17 Issue: 6, 2010, pp. 58-63
  • V. M. Lubecke, Jung-Chih Chiao, "MEMS technologies for enabling high frequency communications circuits," in Telecommunications in Modern Satellite, Cable and Broadcasting Services, 1999, Volume: 2, pp. 382-389
  • "Cisco 40 Gigabit Module". It can be accessed at: http://www. cisco. com/c/en/us/products/interfacesmodules/ 40-gigabit-modules/index. html
  • R. Abdmeziem, D. Tandjaoui, "Internet of Things: Concept, Building blocks, Applications and Challenges, Computers and Society, Cornell University"
  • "What we're driving at," Google Official Blog. It can be accessed at: http://googleblog. blogspot. com/2010/10/what-were-drivingat. html
  • Y. Cao, W. Li, J. Zhang, "Real-time traffic information collecting and monitoring system based on the internet of things," in Pervasive Computing and Applications (ICPCA), 2011 6th International Conference, pp. 45-49
  • L. Xiao, Z. Wang, "Internet of Things: A New Application for Intelligent Traffic Monitoring System," in JOURNAL OF NETWORKS, 2011
  • P. Fuhrer, D. Guinard, "Building a Smart Hospital using RFID technologies,"
  • F. TongKe, "Smart Agriculture Based on Cloud Computing and IoT," in Journal of Convergence Information Technology (JCIT), Jan'13
  • "RFID Security Issues - Generation2 Security". It can be accessed at: http://www. thingmagic. com/index. php/rfid-security-issues
  • Y. Wang, G. Attebury And B. Ramamurthy, "A Survey on Security Issues in Wireless Sensor Networks," in IEEE communications Survey and Tutorials, 2nd Quarter 2006.
  • M. Aamir, Prof. X. Hong, A. A. Wagan, M. Tahir, M. Asif, "Cloud Computing Security Challenges and their Compromised Attributes," in International Journal of Scientific Engineering and Technology, Volume 3, Issue 4, pp. 395-399
  • V. Ashktorab, S. R. Taghizadeh, "Security Threats and Countermeasures in Cloud Computing," in International Journal of Application or Innovation in Engineering and Management (IJAIEM), Volume 1, Issue 2, Oct'12.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Internet of Things RFID WSN IOT architecture IoT Vision IoT applications IoT security.

Powered by PhDFocusTM