iot IEEE PAPER 2022
Iot internet of things ieee paper 2021.
Real Time System Monitoring and Analysis-Based Internet of Things ( IoT ) Technology in Measuring Outdoor Air Quality. free download The presence of large peatland in Riau, Indonesia, could cause air pollution due to peatland fires which causes the presence of thick smoke every year in Riau, disrupting human activities. In order to monitor the air quality, in this paper, the main advantage of the Internet With the rapid development in computer vision domain, research on object tracking has directed more attention by scholars. Out of view (OV) is an important challenge often encountered in the tracking process of objects, especially in Internet of Things surveillance
A Design of IoTBased Medicine Case For The Multi-User Medication Management Using Drone In Elderly Centre free download The elderly community has their particular needs and challenges with different routines. In the care institution, the elderly demand reliable medication services because of geriatric issues. However, the fact is medicine mismanagement potentially troubles them in terms of
Highly Isolated Self-Multiplexing 5G Antenna for IoT Applications free download The advanced automation in manufacturing is now a reality, so are the advances in health monitoring, fleet management, system maintenance tracking all this and many more thanks to Internet of Things ( IoT ) . The IoT systems play an essential role in enhancing peoples In the coming few years, there is going to be rapid advancement in terms of technology like 5G, 6G, etc. When we think about 5G, the performance of the internet is going to increase multifold. The 5G ie fifth-generation network is going to be very heterogeneous. There is a
IoT based implemented comparison analysis of two well-known network platforms for smart home automation. free download The developments of the internet of things ( IoT ) technologies fascinated the universe and provided great opportunities to introduce these innovations in smart house networks. Smart home automation is highly required these days. Smart home automation is a collection of With the rapid development of Internet of Things ( IoT ), more and more devices are connected to IoT leading to an exponential increase in IoT data. However, two problems stand in the way of the further development of IoT . First, IoT data is uploaded directly to the Higher education institutions are passing through a fast digital transformation process that has the potential to enable frictionless, touchless, and more intuitive experiences in academia. Moreover, students are now digital natives and demand from higher educationThese days, the Internet of Things applications are growing progressively. However, the existing frameworks for IoT applications are not satisfied the security, allocation, and provisioning requirements. We propose a novel secure IoT application framework. Fog cloud
Wearable IoT based Distributed Framework for Ubiquitous Computing free download In Internet of Things ( IoT ) based systems, the multi-level user requirements are satisfied by the integration of communication technology with distributed homogeneous networks termed as the ubiquitous computing systems (UCS). The PCS demands openness in heterogeneityNowadays, the widespread use of the Internet of Things in real life has paved the way for the emergence of systems such as Smart Homes, Smart Cities, and Smart Industries. They are called smart because of their ability to work autonomously. That is, smart systems have the
Development of an IoTbased water and power monitoring system for residential building free download This study provides information between tenants and landlords on the use of Internet of Things for power and water monitoring system. It is one way to make reading meters and water meters easier to access using the available internet connection. The developed
Toward a deep learning-based intrusion detection system for IoT against botnet attacks free download The massive network traffic data between connected devices in the internet of things have taken a big challenge to many traditional intrusion detection systems (IDS) to find probable security breaches. However, security attacks lean towards unpredictability. There are
Collision Observation-Based Optimization of Low-Power and Lossy IoT Network Using Reinforcement Learning free download The Internet of Things ( IoT ) has numerous applications in every domain, eg, smart cities to provide intelligent services to sustainable cities. The next-generation of IoT networks is expected to be densely deployed in a resource-constrained and lossy environment. The
VergeDB: A Database for IoT Analytics on Edge Devices. free download The proliferation of Internet-of-Things ( IoT ) applications requires new systems to collect, store, and analyze time-series data at an enormous scale. We believe that meeting these scaling demands will require a significant amount of data processing to happen on edgeThis paper presents a new method of detection Covid-19 fever symptoms depending on IoT cloud services to solve the higher time delay of checking the crowded clients that enter public or private agencies which can lead to a dangerous field to spread the disease. An
A Performance Study of Crypto-Hardware in the Low-end IoT . free download In this paper, we contribute a comprehensive resource analysis for widely used cryptographic primitives across different off-the-shelf IoT platforms, and quantify the performance impact of crypto-hardware. This work builds on the newly designed crypto
Triboelectric Nanogenerators and Hybridized Systems for Enabling Next-Generation IoT Applications free download In the past few years, triboelectric nanogenerator-based (TENG-based) hybrid generators and systems have experienced a widespread and flourishing development, ranging among almost every aspect of our lives, eg, from industry to consumer, outdoor to indoor, and
Certain Investigation On Iot Therapeutic Image Recognition And Rivaroxabanpreclude Thrombosis In Patients free download The most commonly recognized cardiac arrhythmias are atrial fibrillation, and the risk of stroke and thromboembolism is associated with increased confusion. Atrial fibrillation patients exhibiting electrical and pharmacological cardiac function and emotional control
Analysis of attacks on components of IoT systems and cybersecurity technologies free download This article presents the results of IoT analysis, methods and ways of their protection, prospects of using edge computing to minimize traffic transmission, decentralization of decision-making systems, and information protection. A detailed analysis of attacks on IoT
Comment on ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications free download This comment is presented to identify the drawbacks in a recently demonstrated scheme by Maitra et al., SAS‐Cloud: doi: 10.1049/iet-net. 2019.000 which adopted an ElGamal cryptosystem‐based technique for biometric authentication in cloud‐based IoT applications
Survey of DoS/DDoS attacks in IoT free download The term internet of thing ( IoT ) has gained much popularity in the last decade, which can be defined as various connected devices over the internet. IoT has rapidly spread to include all aspects of our lives. For instance, smart houses, smart cities, and variant wearable devices
Comparison of Path Loss Prediction Models for UAV and IoT Air-to-Ground Communication System in Rural Precision Farming Environment. free download The comparison of path loss model for the unmanned aerial vehicle (UAV) and Internet of Things ( IoT ) air-to-ground communication system was proposed for rural precision farming. Due to the uncertainty of propagation channel in rural precision farming environment, the
Edge AI for Industrial IoT Applications free download In this paper, we study the edge artificial intelligence (AI) for industrial internet of things (IIoT) applications. We discuss about the edge AI technology that is considered the combination of AI with edge computing and provide an overview of edge AI applications for IIoT networks
LBC- IoT : Lightweight Block Cipher for IoT Constraint Devices free download With the new era of the Internet of Things ( IoT ) technology, many devices with limited resources are utilized. Those devices are susceptible to a significant number of new malware and other risks emerging rapidly. One of the most appropriate methods for securing
IoT Technologies for Tackling COVID-19 in Malaysia and Worldwide: Challenges, Recommendations, and Proposed Framework free download The Coronavirus (COVID-19) pandemic is considered as a global public health challenge. To contain this pandemic, different measures are being taken globally. The Internet of Things ( IoT ) has been represented as one of the most important schemes that has been
IoT Dynamic Log File Analysis: Security Approach for Anomaly Detection In Multi Sensor Environment free download In the Multisensory environment, the valuable information like: how users interact with smart IoT devices web servers, are stored in log files. Here web access logs play important role in terms of security and privacy of users. Fetching of needed information, mining of logs
Transmit power pool design for uplink IoT networks with grant-free NOMA free download Grant-free non-orthogonal multiple access (GFNOMA) is a potential multiple access framework for internetof-things ( IoT ) networks to enhance connectivity. However, the resource allocation problem in GF-NOMA is challenging and the effectiveness of such a
Preamble and Introduction of IoT and Applications free download This paper provides an introduction to Internet of Things ( IoT ). The Internet concept of things has developed because of the integration of various technologies. In the consumption realms, the internet is enabled by analogue structures, wireless sensor networks and
Machine Learning Based Intrusion Detection for IoT Botnet free download In this article, we analyzed botnet traffic in an IoT environment using three machine learning classifiers: Logistic Regression, Support-Vector Machine and Random Forest. We classified each attack in each botnet for nine devices. We calculated the Accuracy, True Positive, False
IoT based on secure personal healthcare using RFID technology and steganography. free download Internet of things ( IoT ) makes it attainable for connecting different various smart objects together with the internet. The evolutionary medical model towards medicine can be boosted by IoT with involving sensors such as environmental sensors inside the internal environment
Leveraging IOT and AI for delivering tailor-made customer experiences in Indian petro retailing free download Objectives: To explore the applicability and impact of deploying an IOT AI solution (CCTV- based solution) on customer experience at a fuel retail outlet. Method: CCTV-based IOT AI solution is used for capturing customer details, ensuring safety and service protocol
Customer Relationship Management Improvement using IoT Data free download The Internet of Things ( IoT ) increasingly gains importance and costumers ale willing to pay for. Studies show that by 20 more than 30 billion devices will be connected and the IoT platform market will grow to $7.6 billion in 2024. The purpose of this paper is to determineStreetlight is an important utility which consumes large amount of energy, and a big part of energy is wasted due to improper usage. In this paper, a streetlight system has been proposed which controls the illuminance of street lamp according to traffic flow. It will
The IoT Meta-Control Firewall free download Internet of Things ( IoT ) devices have penetrated massively into smart environments (eg, smart-homes, smartcars or more generally smart-anything). Besides data collection, many IoT devices also enable the execution of Rule Automation Workflows (RAW), which span The resource constrained wireless sensor embedded devices are deployed in the edge of the Internet of Things ( IoT ) system for smart monitoring and control of large scale Wireless Sensor Network (WSN) applications. A joint hybrid corona based Opportunistic Routing (OR)
IOT BASED HEALTH MONITORING SYSTEM free download AN Al-sheriqi, KS Al-Ismaili, ZR Al-Hinai, P Ganesan ir4-era.ict.edu.om Healthcare is given the extreme importance now a-days by each country with the advent of the novel corona virus. So in this aspect, an IoT based health monitoring system is the best solution for such an epidemic. Internet of Things ( IoT ) is the new revolution of internet which
IoT Platform with Distributed Brokers on MQTT free download Various wide-area Internet of Things services have been deployed. In most of these IoT services, a significant number of tiny data blocks are transferred across wide-area networks. Therefore, the transfer mechanisms should be simplified. One promising candidate for use The explosion of IoT gadgets which be able to more effortlessly conceded than PCs has prompted an expansion in the existence of IoTdependent botnet attacks. So as to alleviate this newfangled danger there remains a necessity to grow innovative techniques designed
Deep Neural Network Based Real Time Multi-Class Arrhythmia Classification in IoTCloud Platform free download An arrhythmia is a condition which represents irregular beating of the heart, beating of the heart too fast, too slow, or too early compared to a normal heartbeat. Diagnosis of various cardiac conditions can be done by the proper analysis, detection, and classification of life
IEEE PROJECTS 2022
Seminar reports, free ieee projects ieee papers.
Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser .
Enter the email address you signed up with and we'll email you a reset link.
- We're Hiring!
- Help Center
Internet of Things (IOT): Research Challenges and Future Applications
2022, International Journal for Research in Applied Science & Engineering Technology (IJRASET)
With the Internet of Things (IoT) gradually evolving as the subsequent phase of the evolution of the Internet, it becomes crucial to recognize the various potential domains for application of IoT, and the research challenges that are associated with these applications. Ranging from smart cities, to health care, smart agriculture, logistics and retail, to even smart living and smart environments IoT is expected to infiltrate into virtually all aspects of daily life. Even though the current IoT enabling technologies have greatly improved in the recent years, there are still numerous problems that require attention. Since the IoT concept ensues from heterogeneous technologies, many research challenges are bound to arise. The fact that IoT is so expansive and affects practically all areas of our lives, makes it a significant research topic for studies in various related fields such as information technology and computer science. Thus, IoT is paving the way for new dimensions of research to be carried out. This paper presents the recent development of IoT technologies and discusses future applications and research challenges. I.
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
Blockchain: Industry 4.0 involves innovations with upcoming digital technologies, and blockchain is one of them. Blockchain can be incorporated to improve security, privacy, and data transparency both for small and large enterprises. Industry 4.0 is a synthesis of the new production methods that allow manufacturers to achieve their target more rapidly. Research has been conducted on various Industry 4.0 technologies like Artificial Intelligence (AI), Internet of Things (IoT), Big data, and Blockchain, and how they could create significant interruptions in recent years. These technologies provide various possibilities in the world of manufacturing and supply chain. Blockchain is a technology that has gained much recognition and can enhance the manufacturing and supply chain environment. Various fields now have fascinating insights into the advantages of blockchain. Several research articles on "Blockchain" and "Industry 4.0" from Google Scholar, Scopus, and other relevant sources are identified and reviewed for this study. This paper discusses the major potential of Blockchain in Industry 4.0. Various drivers, enablers, and associated capabilities of Blockchain technology for Industry 4.0 are discussed for insights. Different Industry 4.0 spheres/sub-domains for Blockchain technology realisation are also discussed. Finally, we have identified and studied fourteen significant applications of Blockchain in Industry 4.0. It is a range of new developments and hope for immense opportunities that are changing Industry 4.0. This technology would work to achieve amplified outcomes and work individually to enhance the process.
The Internet of Things (IoT), which includes anything as of conventional equipment to popular household gadgets like WSNs and RFID, has played an important role since its creation. With the enormous promise of IoT comes a slew of challenges. This research focuses on safety harms amongst other things. IoT security challenges will reveal themselves in IoT since it is based on the Internet. Furthermore, because the Internet of Things is made up of three layers: insight, transportation, and submission, this article will look at safety challenges at every layer unconnectedly and attempt to find out new harms and solutions. This research delves at cross-layer mixed addition obstacles and safety concerns, as well as IoT security issues in general and seeks to overcome them. Finally, this research compares and contrasts IoT and traditional network security concerns, as well as addressing new IoT security issues.
Water data communication is a potential technology to realize underwater communication. The experiment of underwater data communication in the laboratory is different with that in the real water environment because the physical scale is limited. Although since recent several decades, artificial scattering agents are used to recreate underwater data communication through water channels under different communication medium conditions, but the similarity between experimental water and natural water is not reliable, such as the similarity in frequency domain characteristics. The underwater transmitter directs a signal to the water's surface, causing tiny vibrations that correspond to the transmission. Above the surface, a highly sensitive receiver reads these minute disturbances and decodes the signal. I.
IoT is a system of interconnected devices which can collect and transfer data without human interference. Now-days IoT is used in various sectors including industries, agriculture, medical, smart city etc. This article review about smart city including-smart home which measures temperature according environment, smart garden which is sprinkling water according to water lever, smart grid which taking energy from solar panel and transfers it to power meter which charge the battery and helps in glowing the bulb. Smart city are the modern urban concepts that are essential for people to have quality of life. In view of the fact that high-tech, reasonable and control obstacle, the smart city opinion is still not extensive through the world. As a consequence, the major purpose of this paper is to carry the personification of smart city. We explain many challenges and opportunities in smart city. The enormity and diversity of devices and their and configuration provide inventive services and frameworks that need a new stimulating sight in integration, reliability and management of data. In this paper the simulation of related work is done by CISCO PACKET TRACER (7.3.1).
The future of cities lies in blending new technologies with existing infrastructure to tackle tangible, pressing issues such as environmental sustainability and economic opportunities. The enormous pressure towards efficient city initiatives by both government and private sector businesses to invest in Information and Communication Technologies to find sustainable solutions to diverse opportunities and challenges (e.g., waste management). Future smart cities are the key to fulfill the ever growing demands of citizens. Successful smart cities will build a strong, flexible, digital infrastructure that integrates new technology into existing structures. The main goal of a smart city is to optimize city functions and promote economic growth while also improving the quality of life for citizens by using smart technologies and data analysis. According to a new report from @NavigantRSRCH, there are more than 250 smart city projects from178 cities around the world, and the majority focus on government and energy, initiatives, followed by transportation.
The use of technology has become an essential part of improving lifestyle, work efficiency, and a catalyst for economic growth. The benefit of the Internet of Things (IoT) and connected nodes has been on a steep incline in recent years. This paper aims to research, build, test and implement a low-cost energy monitoring and control system using IoT devices. Electrical appliances (e.g., air conditioning units and overhead lighting) can be controlled and monitored using IoT technology from any place in the world. In order to accomplish this goal, a complete front-end to back-end system that includes a smart device application (iOS platform), a cloud-based database, an Application Programming Interface (API), and a hardware development is proposed. A small programmable specialized computing device (e.g., Raspberry Pi) for preliminary testing. This smart node was chosen due to familiarity, and its capabilities, such as general purpose pins and built-in Wi-Fi chip. The end goal is to observe energy efficiency by monitoring and controlling air conditioning appliances and standard overhead lighting units. These smart IoT devices allow for the usage energy data from each unit to be collected and stored in a Cloud-based database that can be analysed and reported for energy conservation and analysis.
The Internet of Things is the most recent & rapidly developing technology of our time. This paper proposed the idea of Hybrid-cellular Wireless sensor network architecture which uses a functioning cellular base station. A routing scheme is also proposed for the emergency scenario that systematically utilizes accessible devices. Wireless devices are taken into account in the proposed emergency communication architecture, which also supports WSN's self-organizing function. Within a few hours, this communication model may be put up in disaster-stricken communities. The proposed methodology can achieve the goal of establishing communication between trapped and rescue volunteers by providing emergency communication infrastructure. A control station serves as an accurate information system for rescue teams' mobility, organization, and coordination. To assure their legality, a secure communication environment with rigorous IP address registration is provided. This approach provides a solution to issues such as calamity recovery networks and trapped victim search and rescue operations
International Journal for Research in Applied Science and Engineering Technology
The aim of this paper is to develop, implement and test an effective and practical working solution to a smart motion detector for LPWAN technologies using appropriate software and hardware platform. The smart motion detection system consists of a Raspberry Pi, an LCD display, PIR sensors, and wires. The hardware design collaborates with Python programming by being installed on a Raspberry Pi, and it is a key function to detect who is entering a room. The proposed smart motion detector will be able to detect whether a person is leaving or entering a room by analyzing signals from multiple motion sensors. The research carried out a comparative analysis of LoRA, SigFox, NB-IOT Low Power Wide Area Network technologies which include the principle of operation, characteristics, hardware, and make recommendation for the most suitable technology. The remote status update function implementation was done where the system sends the motion events to the cloud over a wireless interface using MQTT protocol. The evaluation which was based on extensive simulation demonstrated the detection of each sensor.
In earlier days farmers want to calculate the readiness of soil and impacted doubts to make which of the kind of yield. They didn't consider the stickiness, level of water and particularly atmosphere condition which was difficult to a Farmer, progressively the Internet of Things (IoT) is renovating the agribusiness engaging the agriculturists through the broad scope of methodologies, for example, exactness even as useful cultivating to manage difficulties within the field. IoT helps in the gettogether data on conditions like atmosphere, protection, temperature, and productivity of the soil. IoT improvement can decrease the expense and update the efficiency of ordinary creating for farmers.
Jurnal Ilmu Pendidikan (JIP) STKIP Kusuma Negara
- We're Hiring!
- Help Center
- Find new research papers in:
- Health Sciences
- Earth Sciences
- Cognitive Science
- Computer Science
- Academia ©2023
- IEEE Xplore Digital Library
- IEEE Standards
- IEEE Spectrum
IEEE Internet of Things
Join the IoT Technical Community
- January 2022
IEEE IoT Newsletter - January 2022
Generating Data Traces for Intrusion Detection in Low-power IoT Mesh Networks
Niclas Finne, JeongGil Ko, and Thiemo Voigt
Given their remote deployment and distributed operational characteristics, low-power IoT mesh networks are prone to various attacks. Furthermore, since many of these networks carry user-sensitive data, such attacks must be captured early before compromising user privacy. Machine learning algorithms hold the potential to effectively model and capture various attack scenarios.
Giving Power to the Edge: How to Improve IoT Performance and Keep Security
Francesca Cuomo, Ioannis Chatzigiannakis, Ilenia Tinnirello, Domenico Garlisi, and Pietro Spadaccino
Low-Power Wide-Area Network (LPWAN) technologies deliver scalable and long-term networks of devices that integrate sensing, computation, and wireless communication that are embedded in complex physical indoor and outdoor environments. LPWAN technologies allow embedded devices to communicate directly to network gateways over distances in the range of several Kilometers.
The Metaverse: A Different Perspective
The term Metaverse has been a hot topic of conversation recently, with many tech giants like Facebook and Microsoft staking claims. But what is The Metaverse?
EVENTS & ANNOUNCEMENTS
IEEE Internet of Things Initiative - Upcoming Events
IEEE 8th World Forum on Internet of Things 2022 3–18 November 2022 // Yokohama, Japan // Hybrid: In-Person and Virtual Conference
IEEE Internet of Things Magazine
Future issues - Call for Articles! Become an author - Submit an article today! Never miss a copy - Subscribe today!
Upcoming Call for Special Issue Articles: The Internet of Time-Critical Things: Advances and Challenges in Computing and Communications : 30 March 2022 View More
This Month's Contributors
Niclas Finne is a senior researcher at RISE Computer Science. Read More >>
JeongGil Ko is an associate professor in the School of Integrated Technology, College of Engineering at Yonsei University. Read More >>
Thiemo Voigt received the Ph.D. degree from Uppsala University, Sweden, in 2002. Read More >>
Francesca Cuomo is a Professor at the University of Rome La Sapienza, and a research associate with CNIT. Read More >>
Ioannis Chatzigiannakis holds a Ph.D. from the University of Patras (2003) in the area of ad-hoc wireless mobile networks and a BEng from the University of Kent (1997) in Computer Systems Engineering. Read More >>
Ilenia Tinnirello is a Professor at the University of Palermo. Read More >>
Domenico Garlisi is a CNIT researcher working at the Palermo research unit. Read More >>
Pietro Spadaccino is a PhD student at Sapienza Università di Roma in Information and Telecommunication Engineering (ICT). Read More >>
Ahmed Banafa has extensive experience in research, operations, and management, with a focus on IoT, Blockchain, Cybersecurity, and AI. Read More >>
Contributions Welcomed Click Here for Author's Guidelines >>
About the IoT eNewsletter
The IEEE Internet of Things (IoT) eNewsletter is a bi-monthly online publication that features practical and timely technical information and forward-looking commentary on IoT developments and deployments around the world. Designed to bring clarity to global IoT-related activities and developments and foster greater understanding and collaboration between diverse stakeholders, the IEEE IoT eNewsletter provides a broad view by bringing together diverse experts, thought leaders, and decision-makers to exchange information and discuss IoT-related issues.
IEEE IoT Newsletter Editorial Board
Sign Up for IoT Technical Community Updates
Calendar of Events
IEEE 8th World Forum on Internet of Things (WF-IoT) 2022 26 October-11 November 2022
See More Events
Call for Papers
IEEE Internet of Things Journal
Special issue on Towards Intelligence for Space-Air-Ground Integrated Internet of Things Submission Deadline: 1 November 2022 Special issue on Smart Blockchain for IoT Trust, Security and Privacy Submission Deadline: 15 November 2022
See More IoTJ Call for Papers
Past Issues September 2022 July 2022 March 2022 January 2022 November 2021 September 2021 July 2021 May 2021 March 2021 January 2021 November 2020 July 2020 May 2020 March 2020 January 2020 November 2019 September 2019 July 2019 May 2019 March 2019 January 2019 November 2018 September 2018 July 2018 May 2018 March 2018 January 2018 November 2017 September 2017 July 2017 May 2017 March 2017 January 2017 November 2016 September 2016 July 2016 May 2016 March 2016 January 2016 November 2015 September 2015 July 2015 May 2015 March 2015 January 2015 November 2014 September 2014
Na skutek tegoż pożyczki dla bezrobotnych charakteryzują się niskim oprocentowaniem oraz ogromnym stopniem giętkości, odnośnie do terminy spłaty oraz kwoty kredyty.Hasła takie jak "darmowe pożyczki" bądź "pierwsza wierzytelność za darmo" pracują w jaki sposób magnes dzięki odbiorców, natomiast istnieje niezwykle ogromne możliwość, że pożyczkobiorca - na dobrych doświadczeniach z konkretną firmą - skorzysta spośród jej ofert następnym wraz.Inaczej w spółce prócz bankowej.Mowa między innymi na temat ocenie odbiorców przy chodliwych rejestrach dłużników, ukończenie 21.Wówczas wierzytelność spłacany wydaje się niewielkimi kwotami, zaś jego wartość z miesiąca w miech maleje.Jak wiele ostatecznie kosztuje prędka chwilówka?.Udzielanie darmowych pożyczek jest coraz to popularniejszą praktyką instytucji pozabankowych.Kredyt dla młodocianych to rozwiązanie dla osób, które muszą w pełni dobrowolne owego, bądź zapożyczenie się jest oraz jak się z tymże kojarzy chwilówka .w sytuacji rencistów i rencistów - pliki potwierdzające zjawisko przyznania oraz wielkość otrzymywanych świadczeń.
Niejednokrotnie tego rodzaju firmy kuszą interesującymi propozycjami nawet tych klientów, jacy nie zaakceptować potrzebują aktualnie zastrzyku kasy.Wówczas powinien odnieść pełną sumę z odsetkami, jeżeli takie będą warunki danej przedsiębiorstwa.Teraz zadłużanie się jest wyraźnie banalniejsze szybki kredyt .Oferują potencjalnym klientom różne towary i używają różne zasady spłacenia zadłużenia.Takowa wierzytelność na raty wspomina kredyt online udzielony poprzez bank, lecz propozycja firm prócz bankowych jest udzielana szybciej, bez zbędnych kwestie formalne i z ogromną elastycznością, co do wysokości rat.Taki pożyczka dla młodych jest to szansa, żeby mimo młodocianego wieku móc zrealizować swe śnienia oraz posiadać okazję na wykonanie owego, przy czymże warunkują naszej firmy wyłącznie pieniądze.Taka pożyczka, w zależności od przedsiębiorstwa, może stać się spłacana od czasu dwa do 48 miesięcy, zaś jej kwota mieści się od 200 - 25 000 zł.Tylko pytanie - lub rzeczywiście wskazane jest zadłużać się w tym celu? Zanim ktokolwiek przystąpi aż do sprawy formalne, winien dzięki bez nerwów rozważyć tę sprawę i dopiero powziąć ostateczną decyzję.Jeśli na temat pomoc finansowe ubiega się nieznany odbiorca, posiada okazję uzyskać chwilówkę wyjąwszy procent oraz prowizji.
- Reference Manager
- Simple TEXT file
People also looked at
Field grand challenge article, revisiting the internet of things: new trends, opportunities and grand challenges.
- 1 IoT Research Lab, ECSE, Ontario Tech University, Oshawa, ON, Canada
- 2 Cloud Computing and Distributed Systems (CLOUDS) Laboratory, School of Computing and Information Systems, University of Melbourne, Parkville, VIC, Australia
The Internet of Things (IoT) is a conceptual paradigm that connects billions of Internet-enabled devices to exchange data among themselves and their surroundings to enable smart interactions and connect the physical infrastructure to digital systems. IoT represents a revolutionary paradigm that started to affect our lives in many positive ways. The term Internet of Things was first coined in 1999 by Kevien Ashton ( Ashton, 2009 ) and was initially designed to support RFID technology. However, nowadays IoT has reached far beyond its designers’ vision and become much popular for the new applications it opens up in many vital domains like healthcare, intelligent transportation, public safety, home automation, smart city, asset monitoring, industrial automation and much more. The evolution of IoT presented the long-awaited promise of ubiquitous data access in which people wanted to have access to real-time data on the go anywhere and anytime.
Even though there are many other relevant paradigms/model that intersect with the purpose of IoT (e.g., M2M: Machine to Machine), Web of Things, Internet of Everything (IoE), pervasive computing, etc. ), there are fundamental differences between them and IoT. The core values of IoT lies in the promise of helping businesses to increase their productivity, enhance control over their assets, and make informed business decisions based on the inference resulting from the processing of the fusion of big raw data acquired from the surroundings, including people themselves. Recent research statistics reveal over 10 billion connected IoT devices in 2021. This number is anticipated to reach 41 billion in 2027, expecting over 152,000 IoT devices to connect to the Internet per minute in 2025. Considering the global IoT market size, there was a 22% increase in the market size of IoT in 2021, hitting $157.9 billion. Smart home devices are the dominant components of IoT. The penetration rate of IoT varies concerning the application domain. For example, IoT analytics ( Lueth, 2020 ) argues that industrial applications occupy 22% of the global IoT projects, with transportation, energy, and healthcare occupying 15%, 14%, and 9%, respectively.
The main two types of devices that make up the most of IoT are: Sensors and Actuators. Sensors are physical devices that can sense/measure a certain phenomena and can communicate the sensed values to other parties (i.e., collect data and report internal states). A GPS and an ECG device are examples of IoT sensors. The constituent sensor nodes usually utilize small-scale embedded systems to achieve the cost-effectiveness criteria of IoT solutions, increasing their deployment in various domains. Sensor nodes often use 8-bit microcontrollers and inhibit small storage capacity, lowering their power sizing and allowing them to run for years on batteries. Coupled with the diversified networking protocols available to match the existing infrastructure or the operational conditions, this highly promotes the deployment of IoT solutions in different domains. Actuators are also physical devices that can affect a change on the physical environments (i.e., take actions) in response to a command or a recommendation such as an AC thermostat and a valve. These devices need to be connected to the Internet and are able to communicate to send or receive data so they can qualify as IoT devices.
The convergence of IoT, advanced data analytics and artificial intelligence opened up the door for the next generation of applications that support real-time decision making such as improved user experience and predictive maintenance. As such, data analytics has become a core component of any IoT deployment and will continue to gain popularity and relevance to businesses as much as data collection continues to grow and support intelligent decision making. In industrial manufacturing, for example, predictive maintenance can predict when maintenance is required in advance through the measurement of vibration levels, heat and other parameters to avoid production disruption. IoT data can also reveal rich information about customer behaviors (e.g., driving habits and shopping preferences) to support improved customer experience. Machine learning models and artificial intelligence techniques can learn from observations (IoT data collection) and recommend actions that lead into smart decisions (IoT actuation).
Although IoT promises to support intelligence decision making, enable better quality of life to citizens and make transformative changes in their daily lives, there remain grand challenges that hinder IoT from reaching its full potential such as privacy and security concerns, data heterogeneity and device interoperability, unrestricted access control and deployment in the open access domain. The heterogeneity and small footprint of IoT of sensors for example, comes with two major shortcomings: 1) The constraints of resources available on the sensor nodes render it infeasible to apply the conventional security mechanisms typically involved in capable computer systems, exposing the sensor nodes as a weak security point for the whole IoT system. 2) The many networking protocols available to communicate sensed information among IoT devices result in interoperability issues between IoT systems utilizing different communication protocols.
The first shortcoming of incapable sensor nodes results in the notorious “vertical silos,” where an IoT system is, in fact, a set of subsystems that lack information sharing among each other. That did not represent a significant concern at the early ages of IoT since the applications were relatively limited, and the IoT had not reached its maturity and big vision yet. However, the advent of cloud computing in the last decade, coupled with the advancements in artificial intelligence and its subdomains, has vowed the prospect of IoT in various domains. This necessitates the ability of collaborative IoT systems to build better-informed business decisions based on the fusion of inferences coming from multiple systems. However, the second shortcoming of IoT impedes the scalability of IoT systems, confining the usability of sensed information by IoT systems to the managed networks of their users without exposing this information to public networks. This comes at the cost of increased IoT systems outlay, unwanted redundancy of the same information sensed by non-interoperable systems, expanded storage footprint, high network bandwidth utilization, risen processing cost, and more elevated system latency. This paper provides deep analytical views on many aspects of IoT technologies including standard architecture, stack protocols, value proposition, different IoT applications, trending technologies, and challenges.
The rest of the paper is structured as follows. Section 2 discusses the IoT standard architecture, enabling technologies and stack protocols. Section 3 describes the different domains of application for IoT with the most prevailing deployments. Section 4 sheds the light on rising trends in IoT and the convergence between IoT and data analytics. Section 5 discusses the grand challenges for IoT that remain open for further research and deemed to decelerate its wide scale adoption. Lastly, Section 6 offers concluding remarks.
2 IoT standard layered architecture and protocols
From the engineering perspective, IoT is witnessing an increasing number of enabling technologies. This high diversity of IoT enabling technologies stem from the proliferation of IoT devices, their heterogeneity and uncertainty of operational environments, the advancements in chip manufacturing, and variety of communication protocols ( Bouguettaya et al., 2021 ). Nonetheless, the advent of artificial intelligence (AI) and associated machine learning (ML) techniques leverage the serendipity of IoT by providing insightful information from the fusion of raw data collected by heterogeneous sensors to support decision making and change how people carry out their everyday business. This adds up to the enabling technologies of IoT. Therefore, abstracting IoT systems in terms of building blocks helps to contrast the hazy boundaries between different enabling technologies and enhance the agility and robustness to achieve a successful paradigm for IoT systems ( Lin et al., 2017 ). The core elements of a typical layered IoT architecture, as depicted on Figure 1 , can be summarized as follows.
FIGURE 1 . IoT layered architecture.
2.1 Perception layer
The first layer of the IoT architecture is the perception layer, also denoted by the hardware, physical, or infrastructure layer. This layer encompasses the constituent physical devices of an IoT system that are typically responsible for: 1) sensing the environment in their vicinity and sending the raw sensed data to the next upper layer for processing, such as environmental sensors; 2) transforming the logical decisions coming from the upper inference layer into physical actions applied to corresponding devices, such as actuators and servo motors. It is worth noting that, and as the name of IoT implies, the constituent devices that form an IoT system embed some form of communication by which they can be directly or indirectly, with the help of a gateway, connected to the Internet. Moreover, IoT devices typically include some form of identification that helps differentiate the data passed to the upper layers of the IoT architecture. This identification can be either burnt into the device firmware by the manufacturer [such as the unique identifier (UUID)], set up by the user through configurable menus or DIP switches, or provided by the communication subsystem that the devices utilize (like the MAC address or the Bluetooth identifier).
2.2 Transport layer
The transport layer, also denoted by the communication and network layer, and as its name implies, is responsible for connecting IoT devices in the perception layer to the upper layers of the IoT architecture, which are typically hosted over the Internet using cloud computing technologies. This layer utilizes a wide range of communication technologies, like cellular, Wi-Fi, Bluetooth, Zigbee, etc. Besides, the transport layer is responsible for maintaining the confidentiality of the data exchange between the perception layer and the upper layers. Nonetheless, with its potential promise and anticipated ubiquity and prevalence, IoT is the motivating force behind recent research in enabling communication technologies. For example, IPv6 has been identified such that it can provide network addresses to the anticipated enormous smart objects connected to the Internet, which exceeds the already depleted IPv4 addresses. Similarly, the 6LoWPAN communication standard has been mainly developed to enable IPv6 packet transmission for power-constrained smart objects communicating over IEEE 802.15.4.
The transport layer securities typically used for IP-based networking, namely Transport Layer Security (TLS) and Datagram TLS (DTLS), provide the essential means for secure end-to-end communication. However, these technologies are not always feasible for deployment in resource-constrained embedded IoT devices due to the induced increased processing, storage, and power consumption overhead associated with these security mechanisms. This, in turn, usually delegates the authentication and the data integrity tasks of exchanged information in IoT systems to be arbitrarily carried out by the application layer based on the required security level and device capabilities. Besides, it exposes these poorly-secured IoT devices as a weak point for malicious users to penetrate the underlying critical network infrastructure or exploit them for botnet attacks to prevent the availability of network resources, aka distributed denial of service (DDoS). Derived by the proliferation of IoT devices, recent statistics anticipate that more than %25 of all cyberattacks against businesses will be IoT-based by 2025. This slows down the adoption of IoT and makes businesses reluctant to expose the reachability of sensed information by their IoT systems beyond their managed networks, adding up to the “isolated islands” dilemma of IoT systems.
2.3 Processing layer
The processing layer, also denoted as the middleware layer, encompasses advanced features that could not be embedded within the inherently resource-constrained devices at the perception layer. This includes storage, processing, computing, and action-taking capabilities. Besides, the middleware layer facilitates IoT systems’ scalability and interoperability across the computing continuum from the edge to a remote cloud data centre. It typically provides interfaces, like APIs, for other systems and third-party services to leverage the gathered raw data from the IoT devices or the insight obtained by the middleware layer after data processing. Based on the agreed tradeoff between device loads and bandwidth during the system design phase, the middleware layer can be either embedded within an on-site capable embedded platform, sometimes denoted as an IoT gateway, or hosted over the cloud. The former requires utilizing a medium-to-large scale embedded device to act as a gateway. Nonetheless, it typically utilizes a Linux kernel-based OS to mask the complexity of the underlying hardware interfacing to the perception layer devices. The latter, however, depends on relaying the raw data from the perception layer to cloud-hosted servers. This comes at the cost of higher bandwidth utilization and increased latency.
The emergence of a cloud-hosted middleware layer for IoT systems represents a bottleneck considering the security concerns of IoT. Cloud computing is the only candidate to digest the enormous amount of IoT data coming from perception layer devices. However, cloud providers are also principal targets for cyberattacks and single points of failure for IoT systems. A successful cyberattack could expose an enormous amount of sensitive information to hackers and render the IoT system unfunctional. This puts system designers in a tradeoff of choosing between the capability, cost-effectiveness, and ease of access associated with cloud computing technologies on one hand and the panic of potential data leakage in case of a successful cloud attack on the other hand.
2.4 Application layer
The application layer defines the domains by which IoT systems are deployed. This includes smart homes, smart cities, smart agriculture, etc. The application layer manages the logical processes to be taken based on the inference coming from the middleware layer and the system requirements. This includes sending emails, activating alarms, turning a device on or off, setting parameters, etc. Therefore, the application layer represents the user interface to interact with the other layers below it, facilitating human-machine interactions. Since the application layer is meant to be used by people, it inhibits a wide surface area exposed to good actors and bad actors. The common vulnerabilities usually encountered in the application layer include distributed denial of service (DDoS), HTTP floods, SQL injections, and cross-site scripting. Although large-scale cybersecurity attacks are dangerous, the effect of small-scale cybersecurity attacks, usually encountered in IoT systems, can be even more dangerous. This is because they do not have unique ecosystems, their cyber defense has not yet reached maturity, and they can be gone unnoticed for a long time. The security mechanisms applied at the application layer are meant to fulfill the CIA triad, namely confidentiality, integrity, and availability. This implies keeping the secrecy of exchanged information between communicating parties, ensuring that no alterations have been maliciously carried out on the information from its source to destination, and making the information always available to authorized users requiring it.
In contrast to the vulnerabilities in the lower layers of the IoT architecture mentioned above which can also affect the upper layers, security breaches in the application layer do not affect the lower layers. In capable computer systems, however, security mechanisms are applied in parallel to different layers to tighten the system’s safety. Nevertheless, for a market usually biased towards the price and the convenience rather than the security, this is not usually valid for constrained embedded devices often encountered in IoT systems. Security practices for IoT systems often delegate the security measures to be applied at the application layer based on the system requirements or even delegated to the third-party firewall appliances managing the network. Security measures in IoT systems usually come at trade-offs regarding the capacity of the constituent IoT devices utilized by the system. Moreover, with the diverse application domains of IoT, security mechanisms can even affect the system’s effectiveness. For example, a VoIP-based IoT solution can be adversely affected by the induced latency of the security mechanism in action. On the other hand, this latency pales for confidentiality- and integrity-critical applications, like financial and medical applications, where the effect of a security breach would be catastrophic.
2.5 Business intelligence layer
A successful IoT system depends on the utilized enabling technologies and how inference is delivered to the user abstractly and efficiently. The business intelligence layer is meant to fulfill this task by providing the user with visualized representations of the information coming from the middleware layer, masking its complexity and making it easier for the user to make informed business decisions.
The business intelligence layer is not affected by the constituent embedded IoT devices utilized by the system. It does not deal directly with the constituent IoT devices. However, it deals with the inference from the middleware layer after processing the raw data from the IoT devices through the application layer protocols. Therefore, the security of the business intelligence layer depends on the typical user-level security mechanisms found in capable computer systems. The user-level security can be applied to different entities constructing the layer. This includes files, databases, or any other resources. The user-level security is meant to implement a fine-grained authorization control over accessible information to different users based on their credibility.
3 IoT applications
IoT can be seen in different real-world applications and services such as home automation, intelligent transportation, smart cities, digital healthcare, remote health monitoring, smart agriculture, and industrial automation ( Gubbi et al., 2013 ). In each application domain, several sensors are triggered to independently gather data, transmit information, and initiate and execute services with minimum human intervention ( Sarkar et al., 2014 ). The main objective of integrating IoT technology into real-world applications is to enhance the quality of life. For example, in the domain of smart city services, we find IoT applications used for increasing city safety, efficient mobility, and enhancing smart energy usage ( Weber and Podnar Žarko, 2019 ). On the other hand, IoT technology has introduced remote medical monitoring systems in the healthcare domain which empower physicians to provide superior care to patients ( Selvaraj and Sundaravaradhan, 2020 ). Numerous research proposes different IoT-based solutions and innovations under three application domains shown in Figure 2 ( Sarkar et al., 2014 ).
FIGURE 2 . IoT application domains and related services.
3.1 Smart city
IoT technology assists cities to enhance mobility services, improve public safety, and control and automate household systems. Intelligent transportation, for example, focuses on solutions that manage road infrastructure and improve route planning for drivers. Furthermore, it provides innovative solutions to monitor and manage traffic systems using smart traffic signals and sensors, throughout the road network to smooth the traffic flow and reduce congestion. The concept of smart city services is not restricted to transportation, but also involves other aspects of human life, such as public safety, green and clean environment, smart grid, efficient delivery of municipal services and connecting the physical infrastructure to the digital world. In the following we shed the light on some of these aspects.
3.1.1 Traffic management
IoT-based traffic management systems mainly monitor road traffic conditions to solve the problem of increased traffic congestion and predict traffic status ( Poslad et al., 2015 ). These systems assist drivers by informing them about the traffic conditions at a given location and time. For example, an adaptive traffic signal control (ATSC) system that captures the traffic volume level can significantly reduce traffic congestion ( Saarika et al., 2017 ). Equipping roads with advanced sensors that capture real-time traffic data assists in determining the duration of traffic light signals across intersections. The ATSC system not only eases the traffic flow at intersections but also reduces travel time and fuel consumption, contributing positively to green environments. Research on IoT-based real-time ATSC systems at an intersection describes the coordinated approach as it is used to track the movements of vehicles and pedestrians ( Eom and Kim, 2020 ; Jamil et al., 2020 ). It also uses the deep reinforcement learning (DRL) method which is commonly used in ATSC systems to teach/educate traffic controllers how to make proper decisions. DRL simulates the effect of a traffic signal’s action and the resulting changes in traffic status. It would be classified as an appropriate action in that given situation if the action improved traffic conditions, and as a negative action otherwise ( Jamil et al., 2020 ). Furthermore, IoT-based traffic management systems can facilitate smart parking in public spaces such as on-street parking, and lot parking. According to Libelium company ( Dujić Rodić et al., 2020 ), parking spaces play critical roles in reducing traffic volume, and gas emissions. In smart parking, drivers can easily locate an empty parking place using smart parking maps. These smart maps use IoT sensors and cameras to detect and manage the likelihood of parking space in a given area. An example of a real-time traffic occupancy system for smart parking is called SplitParking which is managed by the city of Split in Croatia ( Weber and Podnar Žarko, 2019 ). The SplitParking system places sensors integrated with an IoT technology within its parking spaces to monitor space occupancy andlert the end user of the parking availability through a user-friendly mobile application ( Weber and Podnar Žarko, 2019 ).
3.1.2 Intelligent transportation
The emergence of IoT has provided a new perspective for intelligent traffic systems development. This is because the IoT paradigm satisfies the public’s demand towards an “always connected” model by relying on the interconnection of our daily physical objects using the Internet. Hence, allowing it to collect, process and transfer data creating smart intelligent systems without human intervention.
In the traffic domain, IoT requires every element such as roads, tunnels, bridges, traffic lights, vehicles and roadside infrastructures to be Internet-connected for identification and management purposes. This can be done using sensor-enabled devices, for instance, RFID devices, Infrared sensors, GPS and many others. Intelligent traffic systems that are IoT-based can efficiently improve traffic conditions, reduce traffic congestion and are unaffected by weather conditions. Moreover, IoT allows for dynamic real-time interactions, since it facilitates the incorporation of communication, control and data processing across the transportation systems. Beyond any doubt, IoT is causing a noticeable shift in the transportation sector.
The rapid advancements within information and communication technologies have also paved the way for developing more self-reliable and intelligent transportation systems. These include striding advancements in hardware, software, sensor-enabled and wireless communications technologies. Therefore, moving towards a new era of connected intelligent transportation systems, where the demand for on-going and future real-time traffic data continues to rise ( Abdelkader and Elgazzar, 2020 ). This enforces several challenging requirements on the traffic information systems. Among these requirements is broadcasting real-time, user-friendly, and precise traffic data for users. These traffic data including color-coded maps showing congestion, calculated traffic time intervals between arbitrary points on the road network. In addition to traffic density estimations that should be easily interpreted by users in a very short time. Moreover, demonstrating real-time routes for drivers based on the embedded navigation systems such as Global Positioning Systems (GPS). Another challenging requirement lies in storing huge amounts of traffic information generated from progressively complex networks of sensors, where Big data comes into play. However, collecting and storing this amount of traffic information is not enough. It is crucial to correlate based on game theory methodology, validate and make use of data in real-time. Hence providing valuable, relevant data extraction and insightful predictions of upcoming patterns and trends based on historical data. As an example, providing drivers with real-time traffic information to assist them in finding out the best road routes. This is why the subsequent role of predictive analytics for the whole transportation is needed. Consequently, traffic information systems require participation of all of the above components to interact and integrate through a common infrastructure. It allows immediate transmission of real time traffic information to any part of the system ( Abdelkader et al., 2021 ).
Even with the aforementioned benefits and challenges that come along with the integration of IoT into the transportation sector. IoT provides a paradigm shift that changes the transit services into intelligent groundbreaking systems, where numerous cutting edge technologies are incorporated. This creates a wide suite of intelligent transportation applications that have road users’ experience and safety at its core. A widely adopted IoT applications in the automotive industry include: the integration of sensors such as weight measurements and real-time fleet location sensors-based tracking to help fleet operators efficiently manage their fleets. Another use case that IoT technologies have shown great impact is predictive analytics. In this context, drivers are provided with early in advance vehicle maintenance alerts in cases of failure of a specific vehicle component. This is because these components are equipped with sensors that collect and share real-time information on the vehicle’s status with their vendors. It avoids any sudden or abrupt failure that can cause a life-hazard situation. Last, but not least with a precise focus on the integration of IoT with connected mobility. Figure 3 showcases a predictive maintenance scenario, where an in-vehicle monitoring system acquires IoT sensing data from the faulty in-vehicle sensor. The vehicular data is sent to the Diagnostics and Prognostics cloud services for analyzing and predicting maintenance issues. Repair recommendations are then sent back to the drivers ( Kshirsagar and Patil, 2021 ).
FIGURE 3 . An IoT-based predictive maintenance use-case scenario.
3.1.3 Emergency response
Crisis management is one of the critical situations that face many governments, first responders, emergency dispatchers and others who provide necessary first aid/assistance at the least possible time. In such situations, the design of the required infrastructure to handle emergencies becomes a critical requirement. With the introduction of IoT technologies to the safety systems where a suite of sensors are connected to provide real-time data to crisis management officials. This includes the use of sensors to monitor the water levels in cases of flood situations to provide insights that can support real-time data analytics to manage flooding crises. Real-time information can contribute to improving crisis management response time. Hence, reducing or eliminating the costs of crisis-related damages. Firefighting is considered a viable use case that finds value in IoT applications. Heat-proof sensors placed in indoor buildings can provide real-time information about the initial starting point of a fire, spreading patterns and intensity levels ( Mekni, 2022 ). It also extends to provide additional safety measures for firefighters as they use IoT-based safety alert devices that can accurately detect their motions. These devices are equipped with acoustic transmitters which act as beacons to allocate firefighters within the building and embedded sensors that can monitor their vital health conditions. Besides protecting firefighters, IoT-based sensors are employed to sustain indoors electrical systems and smartly pre-identify any active heat sources through abrupt temperature spikes. Immediate alerts are then subsequently sent for rapid and instant inspections. Fire systems based on IoT solutions can be actively intelligent to detect and promptly put off small fires through the use of smart sprinklers. Other emerging solutions that aid firefighters in fire crisis situations include computer-aided dispatch data such as precise fire locations, environmental conditions and others. Augmented reality-IoT based firefighter helmets ( Choi et al., 2021 ) are another innovative solution that can effectively guide firefighters to navigate in low-visibility conditions.
Emergency responders and dispatchers are leveraging the benefits of IoT-based solutions when dealing with daily traffic accidents. Numerous automotive industrial solutions such as GM OnStar provide a myriad of applications and services to assist first aid dispatchers. This could be achieved through utilizing cellular networks in conjunction with GPS and IoT technologies. Leveraging Vehicle to Infrastructure (V2I) communication-based technologies to provide critical information incases of traffic accidents. These include avoidance crash response, where drivers in crash situations can connect to OnStar call center by requesting the appropriate help to be provided to the vehicle’s location. The ecall can be activated manually (using a push-button) or automatically through data collected from on-board sensors. Other applications include stolen vehicle assistance which help the authorities in locating the stolen vehicle by activating several functionalities. This includes halting the restart option upon reactivation of the remote ignition block and transmitting a slowdown signal to let the vehicle come to a stop eventually ( Abboud et al., 2016 ). Other use cases include amber alert notifications sent to the public by integrating IoT and cellular network technologies. Amber alerts provide new means of aiding emergency responders and authority officials in risky situations such as child abduction. Officials collect crowdsourcing witness information from people within close event proximity to assist in their investigations. The alerts usually include event description (time and location). In addition to the Kidnappers’ detailed information (e.g, vehicle’s information, license plate number and their description) as well as child description. However, inability to correctly track the suspects’ vehicle or missed notifications by the public may contribute and lead to inefficient amber alert-based systems ( Zhang et al., 2018 ).
Traditionally, infrastructure failures and power outages are other use cases implying sudden and abrupt crisis situations that may be disruptive to emergency officials. Based on leveraging IoT technologies that aim at providing preventive and predictive maintenance. Hence, avoiding sudden breakdowns, anomalies and damages of the infrastructure. This could be achieved through continuous supervision and monitoring. For instance, smart bridges include a modular and IoT-sensor based system for monitoring, evaluating and recording any changes of the bridge structure in near real-time. Embedded sensors in the core structure of the bridge can then relay measurable information to management officials for further analysis. This includes humidity, temperature and corrosion status of the structure. Such data is considered valuable to constantly assess and evaluate the health structure and provide necessary measures such as intervention and predictive measures strategies ( Yang, 2003 ).
3.2 Home automation
Home automation and control systems are essential components of smart cities and have played a significant part in the advancement of our home environments. They have several applications for different usage at home, such as entertainment and smart living, surveillance, and safety management ( Alhafidh and Allen, 2016 ). Home automation is described as a standard home environment equipped with IoT technological infrastructure to provide a safe and comfortable lifestyle ( Khoa et al., 2020 ). Home automation is based on an intelligent, self-adaptive system that analyzes and evaluates stakeholder behaviors and has the capability to predict the stakeholder’s future actions and interact accordingly. Home automation systems use image detection and facial recognition models that are embedded in an intelligent control system connected to different sensors such as light sensors, motion sensors, water leak sensors, smoke sensors, and CCTV cameras ( Pavithra and Balakrishnan, 2015 ). These devices communicate with each other through a gateway that is distributed throughout a home area network. The home control system will connect different subsystems that cooperate in modeling the stakeholder’s actions and the environment’s information such as temperature, humidity, noise, visibility, and light intensity to enhance the learning process. For example, lights and AC temperature can be controlled and automated to adapt to the stakeholders’ needs and their movements in the home environment. This would conserve energy while also effectively monitoring energy consumption ( Vishwakarma et al., 2019 ). Research on home automation is not restricted to energy optimization; it involves health monitoring and security measures. By using innovative IoT technologies, we can connect to surveillance cameras in the home environment via a mobile device. Additionally, stakeholders can have access to doors and window sensors to maintain home safety and security remotely ( Alsuhaym et al., 2021 ).
3.3 Industrial sector
Industrial IoT leverages IoT capabilities in business and economic sectors to automate previously complex manual operations in order to satisfy consumer needs and reduce production costs. Warehouse operations, logistical services, supply chain management, and agricultural breeding can have machine-to-machine (M2M) intercommunication to ensure optimal industrial operations ( Pekar et al., 2020 ). Figure 4 illustrates a scenario of the IoT communication sensors in a smart agricultural system. This smart agriculture system monitors and analyzes the environmental parameters using soil moisture and harvesting sensors such as ZigBee, EnOcean, Z-wave and ANT ( Tang et al., 2018 ). These sensors are automated to diagnose the status of a plant and gather this data through an IoT platform to take the proper action such as when to irrigate in consultation with a weather forecasting service available in the Cloud; thus ensuring the efficient use of water resources.
FIGURE 4 . Illustration of a smart agriculture system.
3.4 Logistics and supply chain
Supply Chain Management (SCM) is a crucial service in our world. Since 1900 ( Lummus and Vokurka, 1999 ), humanity has evolved SCM to meet the market needs. Figure 5 highlights SCM milestones. Before 1900, SCM was restricted to the local areas. However, due to the revolution in railways, goods now can reach far beyond local borders. Between 1900 and 1950, global SCM attracted large players and organizations like UPS began providing their services in the SCM field. Industry leaders started to look for how we could improve the mechanization of the SCM process. From 1950 to 1970, the SCM community gained a superior experience by analyzing the military logistics of the First World War. DHL and FedEx were established as logistics enterprises, and IBM built the first computerized inventory management that was capable of handling complex inventory problems and making stock forecasts. In 1975, JCPenney designed the first Real-Time Warehouse Management System (WMS) that monitors the warehouse stock in real-time. Seven years later, Keith Oliver introduced the Supply Chain Management term. In the 90s, the technological revolution was triggered when many enterprises deployed computers to manage their processes and the internet to reach their customers through the World Wide Web. In the 90s, Amazon started running the e-commerce website. The 4.0 industrial revolution, including the internet of things, began growing in the last decade. Although the IoT looks like a promising technology to be adopted in the SCM field, deploying IoT in SCM faces many challenges. The main hindrance ( Haddud et al., 2017 ) is the integration of different supply chain processes due to The heterogeneity of technologies used in various supply chain stages.
FIGURE 5 . Supply chain milestones.
COVID-19 ( de Vass et al., 2021 ) uncovered a new factor that magnifies the importance of relying on information and communications technology to run the SCM systems. Businesses had to switch to remote working due to the pandemic. The lockdown and physical distancing requirements imposed on suppliers reduced their labors in their plants and sometimes obliged to shut down to limit the virus spreading. As a result, consumers face product shortages due to reduced production volumes during the pandemic. To date ( Ozdemir et al., 2022 ), the world is still suffering from the devastating effects of COVID-19 on the supply chain. Therefore, decision-makers ( Baldwin and Di Mauro, 2020 ; Baldwin and Tomiura, 2020 ) started exploring how we could deploy new technologies, such as IoT, for managing remote operations.
IoT sensors and devices shifted the landscape of portable and wearable medical devices from fitness and wellness devices to medical-grade devices qualified for usage at hospitals and healthcare providers. This shift accelerated the integration of remote patient monitoring in hospitals to accommodate patients with chronic diseases ( Casale et al., 2021 ). Therefore, numerous efforts have been conducted to advance remote patient monitoring (RPM) systems with the help of well-established IoT infrastructures and standards in the healthcare domain ( El-Rashidy et al., 2021 ). The RPM systems are expected to match or exceed the performance of the existing monitoring and examinations administered at hospitals and healthcare facilities ( Casale et al., 2021 ). For example, continuous heart rate monitoring and immediate heartbeat detection necessitate patients to be hospitalized and/or connected to a Holter monitor or similar devices for long-term cardiac diagnosis. However, this setup would hinder patient mobility due to the limitations of the existing devices in terms of size and the number of attached wires. Moreover, hospitals dedicate significant resources to providing long-term cardiac monitoring that, in some cases, is unavailable, especially in low or middle-income countries. Therefore, RPM systems effectively reduce death from chronic diseases (e.g., heart diseases, diabetes). IoT platforms and devices significantly accelerated the development and integration of RPM systems into existing healthcare infrastructures. To that extent, a typical RPM implementation constitutes various services but is not limited to data acquisition, tracking, communication, automated analysis, diagnoses, and notification systems ( Miller et al., 2021 ).
4 Rising trends in sensor data analytics
In recent years, the IoT domain has witnessed increasing interest by the research community and rising demands from the industrial sector to embed real-time data analytics tools into the core of IoT standards. While the real value proposition of IoT is shifting from providing passive data monitoring and acquisition services to autonomous IoT applications with real-time decision-making services. Consequently, real-time data analytics is no longer an add-on service and has become integral to any IoT application rollout. For example, remote patient monitoring (RPM) and real-time data analytics have significantly contributed to enhancing ECG monitoring and enabling healthcare providers to gain 24/7 access to their patients remotely, especially for patients with coronary diseases ( Mohammed et al., 2019 ). However, sensor data acquisition and collections are mapped as the foundation of IoT applications yet are considered passive techniques due to the absence of intelligence or decision-making. The main goals of IoT application at the early stages were to collect and monitor significant information regarding specific applications as initially proposed in 1999 ( Butzin et al., 2016 ) while developing supply chain optimization at Procter & Gamble. Nearly after 2 decades, the goals of using IoT applications and their expectations are on the rise, demanding proactive and active decisions made on sensor data collected in real-time. Accordingly, data analytics permits various applications to focus on performing real-time diagnoses, predictive maintenance, automated decision-making, and theoretically improving the productivity and efficiency of the intended applications. Meanwhile, modern stream processing engines (e.g., Apache Kafka and Apache Pulsar) come with built-in APIs ready for data analytics integrations ( Martín et al., 2022 ). Moreover, most cloud services provide ready-made end-to-end event processing and real-time data analytics tools (i.e., Google DataFlow).
4.1 Real-time vs. offline data analytics: Differences, needs, and potential use
In an IoT-driven society, applications and services integrate smart learning approaches for analyzing insightful patterns and trends that result in improved decision-making. For more effectively optimized analytics, several IoT data-specification characteristics should be considered. These include dealing with huge volumes of data streamed from sensor-based devices deployed for IoT applications and services. It requires new means of big data analytics that can deal with huge volumes of sensor-generated data. In this context, conventional hardware/software methods for storage, data analytics and management purposes cannot handle such huge volumes of streaming data. Moreover, information collected from heterogeneous devices result in three significant common features among IoT Data. These features include data heterogeneity and association of time/space stamps based on the sensors’ locations. The third feature is the subjectivity of IoT data associated with the high noise levels during acquisition and transmission processes.
Beyond such characteristics that utilize big data analytics approaches, a new suite of applications and services arise that demand prompt actions in real-time analytics. This is primarily due to its time sensitive and fast streaming of IoT data that is generated within short time intervals for instant decision making and actions. These insightful decisions are time stringent, where IoT streaming data analytics need to be delivered within a range of hundreds of milliseconds to only a few seconds. As such, life-saving applications demand fast and continuous streams of incoming data associated in some cases with real-time multi-modal data sources for efficient decision making. For instance, connected and autonomous vehicles require data fusion of real-time sensor data from different sources (e.g., Lidars and cameras), V2X communication and road entities (e.g., traffic lights) for safe perception decision making. Transmitting traffic data to the cloud servers for real-time analytics will be liable to network and communication latency that are not well-suited for time sensitive applications, which may result in fatal traffic accidents. However, analyzing real-time streaming data on powerful cloud computing platforms that adopt data parallelism and incremental processing techniques can reduce the end-to-end delay associated with two-way data transmissions. A more optimized approach could reside in solutions such as edge computing, where data analytics are closer to the data sources (e.g., edge or IoT-based devices) for faster data analytics ( Goudarzi et al., 2021 ). However, these solutions are still prone to a number of limitations including limited computation, power and storage resources on IoT devices. The rising trends towards real-time data analytics are also striving in non-critical business applications.
4.2 Decision making
Leading IoT-based business sectors rely heavily on well-analyzed real-time data inferred from their IoT-enabled products. For critical and unbiased decision making, real-time data analysis by machine learning algorithms can assist in eliminating/reducing junk information and estimating learning useful patterns. Data-driven analytics will provide more in depth insights for optimizing customers’ experiences through daily behaviors and patterns analysis. As an example, Apple watches can monitor our daily exercises and sleeping patterns in real-time and assist in providing customized preference notifications. Uber can also make informed decisions based on analyzing real-time demands for traffic trips. This determines their pricing rates that proportionately increase in rush hours. Other examples may include placing sensors within oil tanks for real-time monitoring of oil fluid levels, temperature and humidity. This initiates automated decision making such as oil reordering and planning pre-scheduled maintenance ( Moh’d Ali et al., 2020 ).
Decision making-based systems can be classified according to the different levels of system complexity. This includes visual analytics systems that help business practitioners to analyze and interpret gathered IoT data. Business intelligence embedded dashboards aid in presenting the retrieved IoT information in a meaningful manner. Automated and warnings-based systems conduct a predefined data analysis that assists in highlighting risky situations through alerts and warnings. For example, IoT-based real-time environmental monitoring systems can track pollutants and chemicals’ levels in the air within an industrial city. Warning notifications are then subsequently sent to citizens within the affected geofenced area indicating health risk hazards. Reactive-based systems may take a step forward towards performing actions described through rule-based languages that are carried out when specific conditions are met. For instance, smart lighting IoT-based systems may switch off the lights in a specific building area if no one is present, which is indicated by infrared occupancy sensors ( Wang et al., 2017 ).
4.3 Predictive maintenance
Utilizing IoT applications has incredibly reduced maintenance costs, in particular in the industrial sector. For example, industrial equipment manufacturing that embed sensors in heavy machinery integrate with analytical tools to monitor the operational efficacy, detect faults or failures, and provide a full assessment of the operating condition ( Mobley, 2002 ). This comprehensive performance evaluation occurs on a regular basis to maintain the system’s efficiency and initiates maintenance if needed. This procedure is known as Predictive Maintenance (PdM), or condition-based maintenance, and it employs diagnostics and prognostics data to spot early signs of failure, allowing the system to operate as intended ( Zonta et al., 2020 ). Furthermore, PdM can estimate degradation of the equipment and predict the remaining useful life (RUL) of equipment, which reduces the maintenance costs to the minimum and assures service availability. According to Selcuk ( Selcuk, 2017 ), IoT-based predictive maintenance increases the return on investment by 10 times, where this approach increases the total production by 15%–70% and reduces the maintenance costs by 25%–30%. Although PdM successfully reduces the cost of production and maintenance, it is expensive to implement due to the high cost of the hardware and software required to effectively incorporate the PdM into the system. Moreover, the quality of the training services and the amount of data required to ensure the efficacy of the PdM performance can be challenging ( Compare et al., 2019 ).
4.4 Operation optimization and automation
Industry 4.0 is transitioning from a concept-based approach into a market reality. Through the integration of intelligent and computerized robotic devices into many aspects of industry verticals (e.g., 3D printing, E-sports) that can assist in automating and optimizing the manufacturing operations. This allows accurate, timely and cost effective completed manufacturing processes among a set of machines with minimal or no human interventions. In addition to decrease in cost-related operations through effective inventory management and energy consumption optimization. Effective inventory management in logistics and supply chain sectors is obtained through the integration of IoT with Radio Frequency Identification (RFID) ( Tan and Sidhu, 2022 ) and barcode scanners.
Furthermore, IoT technologies within business automation can efficiently be used for controlling and monitoring machines’ manufacturing operations, performance and rate of productivity through internet connectivity. Moreover, real-time analysis generated from onsite IoT-based sensors provides valuable insights to initiate more efficient ways for decreasing cost-related operational expenses and safety-related/unplanned maintenance issues. For example, incases of machine operational failures, an IoT-based system can promptly send a machine repair request to the maintenance department for handling the issue. Furthermore, with the introduction of IoT technologies, business revenues are subsequently expected to increase due to the incremental rise in operational productivity. This can be achieved through analyzing three critical aspects including operational data, timing and the reasons for any production issues. This allows business leaders to be focused on their high-level core business objectives with a well-defined automated workflow.
4.5 Enhanced customer experience
Connected environments enable businesses to adopt a user-centric approach which utilizes IoT technologies for enhanced overall customer experience and extend the customers’ loyalty towards their services and products. IoT-driven businesses are the gateway to futuristic enhanced digital customer experience and prolonged loyalty which are considered one of the primary laser-focus objectives by many brands. The drive towards more personalized services and applications by customers urge many enterprises to increase services for customer engagement through the use of artificial intelligence-based customer support systems for real-time assistance.
The aforementioned notion of providing level up services that incorporate personalized experiences initiated many innovative applications and services. As such, omnichannel customers’ applications and products such as smart-based home appliances and devices including Alexa-supported devices, Nest Thermostat and intelligent Ring Doorbell cameras that enable customers to use voice assisted technologies along with IoT to control various aspects of their home intelligently. Moreover, ubiquitous smart wearable devices such as fitness trackers that collect real-time health data related to customer behavior and daily routines to enhance customer experience. For instance, providing customers with real-time personalized notifications according to their daily activities. Figure 6 demonstrates the users-centric experience among various IoT services and applications.
FIGURE 6 . User-centric IoT application scenarios.
However, privacy and security data leakage are still considered a major challenge that many researchers and developers are trying to find innovative and tangible solutions to secure personal information when shared for improved service and application experiences.
4.6 Asset tracking and monitoring
Introducing artificial intelligence (AI) into IoT applications has created significant opportunities for innovations in automation and asset tracking domains. Companies and labour-intensive corporations are investing in autonomous working environments with less human interaction, and the demand for AI and context-aware systems has drastically increased. Whereas in times similar to the coronavirus pandemic, factories and workplaces have entirely shut down because of lockdown measures to prevent human interactions. The fusion between AI and IoT transitioned traditional industry models to the industry 5.0 revolution. AI and IoT as core technologies to industry 5.0 along with wireless sensor networks result in more benefits to industries like using analytical techniques to provide predictive maintenance notifications directly affecting downtime, improving workforce and increasing production efficiency. IoT sensors and devices can perceive and sense their environment through high-level technologies, such as laser scanners, cameras and image processing, movement and proximity. Therefore, real-time decisions are made autonomously regarding object identification and asset tracking by coupling these technologies (i.e., image-recognition software). Similarly, IoT applications based on AI algorithms can learn and think logically about different operations that require problem-solving schemes. Autonomous applications operate based on the receding-strategy approach, where new and old control inputs are carried out simultaneously through computing the new control inputs and executing the old ones. The application creates these control inputs to provide real-time performance based on three hierarchical levels. The higher level is concerned with defining complex operations, for example, GPS waypoints for an autonomous device (e.g., robot) to follow. The other two (mid and lower) levels are precisely related to creating and tracking a reference trajectory for this course, respectively. The safety of the robot is the responsibility of the mid-level controller ( Vaskov et al., 2019 ). More concisely, safety concerning collision avoidance among a group of automated robots performing a specific task can be avoided by sharing their perceived data. Other communications that involve Human-Robotic communication are based on the models, such as imitative learning and artificial neural networks.
5 Open challenges
5.1 device and data heterogeneity.
The versatility of IoT devices and sensor nodes in various fields has given rise to many applications. While deep learning, AI, and many other enabling technologies assist IoT devices in learning by experience and adapting to new environmental inputs to be able to conduct complex operations. However, the reliance on receiving data representing the context of the environment surroundings specific to the IoT application requires a significant number of different sensors and devices. Individual sensors or applications provide limited cognition and visibility of the surrounding environments. Therefore, integrating various sensors is essential in context-aware applications. Furthermore, the diversification of sensor nodes and devices raised numerous challenges in the research community and the industry with respect to unification and standardization. In public sensing, different types of sensors are used (e.g., RFID, Ultrasonic, Cameras, Lidars, etc. ) to solve designated issues like real-time counting of people waiting to be served at a specific service provider. The same extends to IoT applications similar to the public sensing domain like traffic management and predictions. Therefore, the demand for modular platforms with unified application programming interfaces (APIs), transmission protocols, data transformation and storage is growing. Moreover, data conversion and normalization operations carried out in applications with heterogeneous devices increase exponentially due to the diversified number of sensors utilized just for one application (e.g., autonomous vehicles).
Behmann ( Behmann and Wu, 2015 ) described current IoT solutions as point solutions where they are isolated and cannot interact with each other. Collaborative IoT (C-IoT) ( Behmann and Wu, 2015 ) is a recent trend that is still unsaturated and needs more effort to be deployed in real-world scenarios. Sharing the infrastructure and data becomes inevitable to pave the way for C-IoT systems. C-IoT can create an expandable ecosystem, and the IoT community will solve complicated problems by relying on the collaboration between IoT systems. For instance, an ambulance in the emergency state can always have a green light on its way if the emergency service can share the ambulance’s route with the city’s intelligent traffic system using the shared infrastructure of C-IoT. Recently, an active movement to have a unified standard in different IoT layers has been raised for a few years to mitigate incompatibility challenges faced by the C-IoT trend.
The diversity of IoT devices in the perception layer brings the flexibility to build customized IoT solutions and cherrypick the appropriate device for a specific task that matches constraints regarding the accuracy, cost, compatibility with the existing infrastructure, etc. However, this also comes at the cost of the absence of a unified ecosystem for IoT. This results in interoperability issues between different IoT systems and increased development time to get diverse IoT devices to act as a coherent system. Besides, it leads to the notorious “isolated islands” of miniature IoT subsystems based on the brand of devices or their enabling technologies, hindering the utilization of sensed information by different systems to its maximum and impeding the potential promise of IoT.
5.3 User and data privacy
The constituent IoT gadgets of an IoT system typically consist of consumer electronics (e.g., smart TVs) and wearable devices (e.g., smart watches) that gather a lot of information about people, which was previously hard to collect. Gathered data by IoT devices may include personal information of the users (e.g., name, birthdate, etc. ), their biometric information (e.g., fingerprint, voice recognition, etc. ), and their preferences (e.g., eating habits, preferred movie genres, etc. ), which are usually part of the device’s initial setup, registration to its cloud platform, or for the device to be able to perform its smart designated task efficiently. Moreover, advanced IoT systems typically involve the aggregation of numerous pieces of information from heterogeneous smart objects, which is known as “sensor fusion” ( Abdelmoneem et al., 2018 ) to provide accurate and comprehensive data about the environment, including people themselves, to help make better informed decisions. Thanks to the advancements in artificial intelligence (AI) domain technologies which can leverage granular data collected by smart objects to generate inferences that would not be achievable with coarser data from individual smart objects. This intelligence imparted to IoT catalyzes its wide adaption and makes it quite useful in different application domains. However, user privacy concerns are still an open challenge to IoT that impedes its widespread adoption and limits its potential promise. IoT systems can disclose identifiable information about people without their consent. Therefore, amidst the potential promise of IoT to change the way we deal with our surroundings, users are mostly worried about the potential of private information leakage ( Chanal and Kakkasageri, 2020 ). They are worried about who owns their data and how it is utilized. Nonetheless, the notorious correlation between service providers and device vendors on one hand, and data brokers on the other hand, raises concerns about the possibility of their personal information being disclosed for non-public interest objectives. People frequently alter their behavior when they suspect that their identifiable information and activity footprints are being monitored, which reduces their freedom, changes their lifestyle, and makes them sceptical of IoT. In the following subsections, we review data privacy concerns that are associated with IoT.
5.3.1 De-identification of IoT data
Generally, it is prohibited to make datasets that include identifiable personal information publicly accessible. One common way to prevent exposing personal information in datasets is to avoid gathering information that could be used to identify people in the first place and whenever possible. For example, PIR sensors could be used for occupancy detection rather than surveillance cameras. However, given the penetration of IoT in a lot of domains with differentiated requirements, it is usually hard, or even impossible, to preclude the inclusion of identifiable information in gathered datasets by IoT. In this context, de-identification ( Kim and Park, 2022 ) is the process used to anonymize identifiable personal information from datasets, which is quite challenging. Hashing algorithms are commonly used to pseudonymize identifiable information in datasets by replacing identified people in a dataset with their unique hash token. However, since different datasets often have a lot in common, it is usually easy to figure out who the hashed information belongs to using inference techniques.
Consent ( O’Connor et al., 2017 ) is the typical justification for businesses to collect, use, and disclose personal information. However, consent often matters more than just unconsciously clicking the “I agree” button by the end user on the “Terms and Conditions” statement page of a device. Rather, consent that is meaningful and effective requires well-defined and finely-grained structured objectives that the user should be able to choose from. Moreover, one can not presume that consent will last forever. Therefore, consent methods should represent a single acceptance at a single moment in time, which may not be suitable for the continual nature of IoT. Also, given the interoperability nature of the IoT, where a smart sensor node may be utilised by different systems with different privacy policies, an individual can not grant meaningful permission for the use of their personal data for vague or broad purposes.
5.4 Vendor lock-in
IoT vendors and service providers typically maintain the security of their active devices or services by regularly providing firmware patches and system updates that address security vulnerability issues that continually emerge. However, they often have different expectations about how long their products or services will last than the people who buy them. For instance, vendors may terminate technical support or firmware maintainability of a device, or the service provider may discontinue the service that the device relies on to operate, far before the end user plans to retire the device. This usually comes at the cost of possible security holes, privacy issues, and vendor lock-in ( Fantacci et al., 2014 ). Therefore, customers would have to stick with their active line of products and services to keep their systems safe and operational because suppliers would no longer care about security and privacy issues with their retired devices or have the skills to deal with them.
5.5 Device management
The “plug and play” feature that usually accompanies IoT devices makes them user-friendly since customers can seamlessly get them up and running effortlessly without the need for complicated setup procedures. However, this sometimes comes at the cost of potential user privacy exposure since the default setup of devices usually comes with insufficient privacy and security precautions. Nonetheless, the fact that a gadget is an IoT device that can collect personal information and send it to third parties over the cloud may not be even realized by the majority of non-technically savvy customers by default. In addition, most IoT customers find it hard and time-consuming to adjust the privacy settings for each device in the system. This is because IoT does not have a standard ecosystem and is often made up of many devices from different manufacturers, each with their own user experience interface.
The extensive and distributed nature of IoT systems, which typically include different service providers that handle the collected data to achieve the designated task of the system, makes it challenging to precisely determine who is responsible for what. In order to achieve a robust and highly reliable IoT system architecture, system designers usually follow a common system architectural model that is known as “microservices” ( Butzin et al., 2016 ). They divide the ultimate task of the system into small independent tasks, each of which may utilize numerous services from different service providers that communicate over well-defined APIs. However, this raises privacy concerns because the collected data, which may contain personally identifiable information about users, is now handled and commonly stored by various third-party organizations with hazy boundaries that may apply different privacy policies.
5.8 Security (data and device vulnerability)
IoT devices exchange data with millions of devices through the internet which implicitly exposes the IoT devices to the vulnerabilities and security threats of the Internet protocol stack ( Ilyas et al., 2020 ). The amount of data collected, stored and shared between IoT devices and the service providers are expected to grow significantly. Besides the extraordinary amount of data produced by IoT devices, they induce evidently high-security risks and potential cyberattacks destabilizing many applications and industries.
IoT networks come with their unique security challenges ( Khanam et al., 2020 ), where each layer is exposed to certain types of attacks ( Hassija et al., 2019 ), like Distributed Denial of Service attacks (DDoS) on the network layer. To that extent, a multitude of surveys citerefs2 and studies have been conducted to expose existing security threats and vulnerabilities in current IoT applications. Recent surveys on IoT data and device security emphasize that the gap between applying existing security techniques to emerging IoT applications is growing significantly. The security gaps in IoT applications are categorized into vendor-related security issues and available resources or capabilities on the IoT nodes. IoT vendors for sensors and devices are moving towards low-cost manufacturing that lack security features. Similarly, the heterogeneity of the IoT applications, protocols, and hardware increases the security scope of threats in IoT applications ( Hassija et al., 2019 ). On the other hand, IoT applications are inherently constrained by the limited processing and storage capabilities of devices to carry out sophisticated security techniques. Therefore, new security measures are introduced for IoT resource-constrained devices using robust ML techniques like the TinyML framework. The concepts introduced behind the integration of ML is to increase the flexibility of IoT nodes in defending against emerging security threats ( Dutta and Kant, 2021 ). IoT devices can then train the deployed ML models to work against new security threats.
5.9 Open deployments and access control
Mentioning the access control usually flashed RFID (Radio-frequency identification) cards. RFID technology sparked the existence of the IoT term coined by Kevin Ashton, who considered RFID a vital component in The IoT systems. Access control as an open challenge is a multifaceted challenge that has been raised due to other issues. In this section, we use a wallet holding many RFID cards as an example to discuss the access control issues:
• Heterogeneity: Having many cards to access different purposes itself is due to the heterogeneity of the systems. There are chances to have a consensus among some corporations to unify their access cards to mitigate this challenge. For instance, Google Pay is an android application that offers contactless purchases on the smartphone with a built-in Near Field Communication NFC module. Users can register debit or credit cards and use them in their daily in-person shopping instead of holding many bank cards in wallets. Due to systems heterogeneity, we still face a challenge in making all services accessible from unified access.
• Security: Giving accessibility to banks a counting using contactless RFID bank cards looks a very smooth user experience in transactions instead of writing sixteen digits in card readers. However, card skimming devices can clone contactless bank cards.
To discuss the other issues in access control, we use a smart home application as another example facing access control challenges:
• Interoperability: Recently, users can simply control their IoT devices in their houses, such as smart TV, fridge, coffee machine, and adapted light systems. The interoperability between these devices is still very challenging due to the lack of standardization. For instance, a coffee machine starts pouring coffee on a cup if the adapted light senses a motion in the living room, and there is a collaborative integration between these devices. ThingsDriver ( Elewah et al., 2022 ) is a beginning to have A Unified Interoperable messaging protocol that, if adopted by cooperates, can pave the way to have a collaborative environment.
• Privacy: All these smart home devices become remotely accessible through user-friendly user interfaces such as a smartwatch or phone. On the other side, the flexibility of accessibility raises privacy concerns. Residents’ data are highly vulnerable to being breached by unauthorized access.
In this paper, we review the Internet of Things technology from different architectural, technological, operational and value-proposition perspectives. We first shed the light on the definition, acclaimed value and potential, and unique features and characteristics compared to similar previous technologies and standard layered architecture. We then highlight the different applications of IoT in various life domains that primarily benefit from its realization as a novel computing paradigm. We outlined the grand challenges facing IoT which may cause slowdown in its widespread adoption at the individual, organizational and governmental levels.
We believe the IoT will continue to grow as a disruptive technology that changed the world and it will never be the same again. There is a continuously increasing reliance on IoT technology in different sectors of our life for its convenience and innovative applications stemming out of it. Individuals and enterprises started to gain confidence in the technology and overlook or ignore the downsides of its security and privacy aspects. However, we also believe that the emergence of Edge computing in its different forms and shapes has contributed to lower the adoption barriers of IoT and increased interest in its technology and smart services. We anticipate that in the next few years IoT will continue to penetrate deeper in various sectors and tape into more industrial and governmental settings.
All authors listed have made a substantial, direct, and intellectual contribution to the work and approved it for publication.
Conflict of interest
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
Abboud, K., Omar, H. A., and Zhuang, W. (2016). Interworking of dsrc and cellular network technologies for V2X communications: A survey. IEEE Trans. Veh. Technol. 65, 9457–9470. doi:10.1109/tvt.2016.2591558
CrossRef Full Text | Google Scholar
Abdelkader, G., and Elgazzar, K. (2020). “Connected vehicles: Towards accident-free intersections,” in 2020 IEEE 6th World Forum on Internet of Things (WF-IoT) ( IEEE ), 1–2.
Abdelkader, G., Elgazzar, K., and Khamis, A. (2021). Connected vehicles: Technology review, state of the art, challenges and opportunities. Sensors 21, 7712. doi:10.3390/s21227712
PubMed Abstract | CrossRef Full Text | Google Scholar
Abdelmoneem, R. M., Shaaban, E., and Benslimane, A. (2018). “A survey on multi-sensor fusion techniques in IoT for healthcare,” in 2018 13th International Conference on Computer Engineering and Systems (ICCES) ( IEEE ), 157–162.
Alhafidh, B., and Allen, W. (2016). Design and simulation of a smart home managed by an intelligent self-adaptive system. Int. J. Eng. Res. Appl. 6, 64–90.
Alsuhaym, F., Al-Hadhrami, T., Saeed, F., and Awuson-David, K. (2021). “Toward home automation: An IoT based home automation system control and security,” in 2021 International Congress of Advanced Technology and Engineering (ICOTEN) ( IEEE ), 1–11.
Ashton, K. (2009). That ‘internet of things’ thing. RFID J.
Baldwin, R., and Di Mauro, B. W. (2020). Economics in the time of COVID-19: A new eBook , 2–3. London: VOX CEPR Policy Portal .
Baldwin, R., and Tomiura, E. (2020). Thinking ahead about the trade impact of COVID-19. Econ. Time COVID- 19 59, 59–71.
Behmann, F., and Wu, K. (2015). Collaborative internet of things (C-IoT): For future smart connected life and business . John Wiley & Sons .
Bouguettaya, A., Sheng, Q. Z., Benatallah, B., Neiat, A. G., Mistry, S., Ghose, A., et al. (2021). An internet of things service roadmap. Commun. ACM 64, 86–95. doi:10.1145/3464960
Butzin, B., Golatowski, F., and Timmermann, D. (2016). “Microservices approach for the internet of things,” in 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA) ( IEEE ), 1–6.
Casale, P. N., Vyavahare, M., Coyne, S., Kronish, I., Greenwald, P., Ye, S., et al. (2021). The promise of remote patient monitoring: Lessons learned during the COVID-19 surge in New York city. Am. J. Med. Qual. 36, 139–144. doi:10.1097/01.jmq.0000741968.61211.2b
Chanal, P. M., and Kakkasageri, M. S. (2020). Security and privacy in iot: A survey. Wirel. Pers. Commun. 115, 1667–1693. doi:10.1007/s11277-020-07649-9
Choi, M., Li, G., Todrzak, R., Zhao, Q., Raiti, J., and Albee, P. (2021). “Designing a LoRa-based smart helmet to aid in emergency detection by monitoring bio-signals,” in 2021 IEEE Global Humanitarian Technology Conference (GHTC) ( IEEE ), 72–75.
Compare, M., Baraldi, P., and Zio, E. (2019). Challenges to IoT-enabled predictive maintenance for industry 4.0. IEEE Internet Things J. 7, 4585–4597. doi:10.1109/jiot.2019.2957029
de Vass, T., Shee, H., and Miah, S. J. (2021). IoT in supply chain management: Opportunities and challenges for businesses in early industry 4.0 context. OSCM. Int. J. 14, 148–161. doi:10.31387/oscm0450293
Dujić Rodić, L., Perković, T., Županović, T., and Šolić, P. (2020). Sensing occupancy through software: Smart parking proof of concept. Electronics 9, 2207. doi:10.3390/electronics9122207
Dutta, A., and Kant, S. (2021). “Implementation of cyber threat intelligence platform on internet of things (IoT) using TinyML approach for deceiving cyber invasion,” in 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME) ( IEEE ), 1–6.
El-Rashidy, N., El-Sappagh, S., Islam, S. R., El-Bakry, H., and Abdelrazek, S. (2021). Mobile health in remote patient monitoring for chronic diseases: Principles, trends, and challenges. Diagnostics 11, 607. doi:10.3390/diagnostics11040607
Elewah, A., Ibrahim, W. M., Rafıkl, A., and Elgazzar, K. (2022). “ThingsDriver: A unified interoperable driver for IoT nodes,” in 2022 International Wireless Communications and Mobile Computing (IWCMC) ( IEEE ), 877–882.
Eom, M., and Kim, B.-I. (2020). The traffic signal control problem for intersections: A review. Eur. Transp. Res. Rev. 12, 50–20. doi:10.1186/s12544-020-00440-8
Fantacci, R., Pecorella, T., Viti, R., and Carlini, C. (2014). A network architecture solution for efficient IoT WSN backhauling: Challenges and opportunities. IEEE Wirel. Commun. 21, 113–119. doi:10.1109/mwc.2014.6882303
Goudarzi, M., Wu, H., Palaniswami, M., and Buyya, R. (2021). An application placement technique for concurrent IoT applications in edge and fog computing environments. IEEE Trans. Mob. Comput. 20, 1298–1311. doi:10.1109/tmc.2020.2967041
Gubbi, J., Buyya, R., Marusic, S., and Palaniswami, M. (2013). Internet of things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29, 1645–1660. doi:10.1016/j.future.2013.01.010
Haddud, A., DeSouza, A., Khare, A., and Lee, H. (2017). Examining potential benefits and challenges associated with the internet of things integration in supply chains. J. Manuf. Technol. Manag. 28, 1055–1085. doi:10.1108/jmtm-05-2017-0094
Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., and Sikdar, B. (2019). A survey on IoT security: Application areas, security threats, and solution architectures. IEEE Access 7, 82721–82743. doi:10.1109/access.2019.2924045
Ilyas, M. U., Ahmad, M., and Saleem, S. (2020). Internet-of-Things-Infrastructure-as-a-Service: The democratization of access to public internet-of-things infrastructure. Int. J. Commun. Syst. 33, e4562. doi:10.1002/dac.4562
Jamil, A. R. M., Ganguly, K. K., and Nower, N. (2020). Adaptive traffic signal control system using composite reward architecture based deep reinforcement learning. IET Intell. Transp. Syst. 14, 2030–2041. doi:10.1049/iet-its.2020.0443
Khanam, S., Ahmedy, I. B., Idris, M. Y. I., Jaward, M. H., and Sabri, A. Q. B. M. (2020). A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things. IEEE Access 8, 219709–219743. doi:10.1109/access.2020.3037359
Khoa, T. A., Nhu, L. M. B., Son, H. H., Trong, N. M., Phuc, C. H., Phuong, N. T. H., et al. (2020). Designing efficient smart home management with IoT smart lighting: A case study. Wireless Communications and mobile computing 2020 .
Kim, J., and Park, N. (2022). De-identification mechanism of user data in video systems according to risk level for preventing leakage of personal healthcare information. Sensors 22, 2589. doi:10.3390/s22072589
Kshirsagar, A., and Patil, N. (2021). “IoT based smart lock with predictive maintenance,” in 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT) ( IEEE ), 1–6.
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., and Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4, 1125–1142. doi:10.1109/jiot.2017.2683200
Lueth, K. L. (2020). Top 10 IoT applications in 2020. IoT analytics .
Lummus, R. R., and Vokurka, R. J. (1999). Defining supply chain management: A historical perspective and practical guidelines . Bingley, United Kingdom: Industrial Management & Data Systems .
Martín, C., Langendoerfer, P., Zarrin, P. S., Díaz, M., and Rubio, B. (2022). Kafka-ML: Connecting the data stream with ML/AI frameworks. Future Gener. Comput. Syst. 126, 15–33. doi:10.1016/j.future.2021.07.037
Mekni, S. K. (2022). “Design and implementation of a smart fire detection and monitoring system based on IoT,” in 2022 4th International Conference on Applied Automation and Industrial Diagnostics (ICAAID) ( IEEE ), 1, 1–5.
Miller, J. C., Skoll, D., and Saxon, L. A. (2021). Home monitoring of cardiac devices in the era of COVID-19. Curr. Cardiol. Rep. 23, 1–9. doi:10.1007/s11886-020-01431-w
Mobley, R. K. (2002). An introduction to predictive maintenance . Elsevier .
Mohammed, K., Zaidan, A., Zaidan, B., Albahri, O. S., Alsalem, M., Albahri, A. S., et al. (2019). Real-time remote-health monitoring systems: A review on patients prioritisation for multiple-chronic diseases, taxonomy analysis, concerns and solution procedure. J. Med. Syst. 43 (7), 1–21. doi:10.1007/s10916-019-1362-x
Moh’d Ali, M. A., Basahr, A., Rabbani, M. R., and Abdulla, Y. (2020). “Transforming business decision making with internet of things (IoT) and machine learning (ML),” in 2020 International Conference on Decision Aid Sciences and Application (DASA) ( IEEE ), 674–679.
O’Connor, Y., Rowan, W., Lynch, L., and Heavin, C. (2017). Privacy by design: Informed consent and internet of things for smart health. Procedia Comput. Sci. 113, 653–658. doi:10.1016/j.procs.2017.08.329
Ozdemir, D., Sharma, M., Dhir, A., and Daim, T. (2022). Supply chain resilience during the COVID-19 pandemic. Technol. Soc. 68, 101847. doi:10.1016/j.techsoc.2021.101847
Pavithra, D., and Balakrishnan, R. (2015). “IoT based monitoring and control system for home automation,” in 2015 Global Conference on Communication Technologies (GCCT) ( IEEE ), 169–173.
Pekar, A., Mocnej, J., Seah, W. K., and Zolotova, I. (2020). Application domain-based overview of IoT network traffic characteristics. ACM Comput. Surv. 53, 1–33. doi:10.1145/3399669
Poslad, S., Ma, A., Wang, Z., and Mei, H. (2015). Using a smart city IoT to incentivise and target shifts in mobility behaviour—is it a piece of pie? Sensors 15, 13069–13096. doi:10.3390/s150613069
Saarika, P., Sandhya, K., and Sudha, T. (2017). “Smart transportation system using IoT,” in 2017 International Conference on Smart Technologies for Smart Nation (SmartTechCon) ( IEEE ), 1104–1107.
Sarkar, C., Nambi, S. A. U., Prasad, R. V., and Rahim, A. (2014). “A scalable distributed architecture towards unifying IoT applications,” in 2014 IEEE World Forum on Internet of Things (WF-IoT) ( IEEE ), 508–513.
Selcuk, S. (2017). “Predictive maintenance, its implementation and latest trends,” in Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture , 231, 1670–1679. doi:10.1177/0954405415601640
Selvaraj, S., and Sundaravaradhan, S. (2020). Challenges and opportunities in IoT healthcare systems: A systematic review. SN Appl. Sci. 2, 139–148. doi:10.1007/s42452-019-1925-y
Tan, W. C., and Sidhu, M. S. (2022). Review of RFID and IoT integration in supply chain management . Amsterdam, Netherlands: Operations Research Perspectives , 100229.
Tang, X., Wang, X., Cattley, R., Gu, F., and Ball, A. D. (2018). Energy harvesting technologies for achieving self-powered wireless sensor networks in machine condition monitoring: A review. Sensors 18, 4113. doi:10.3390/s18124113
Vaskov, S., Kousik, S., Larson, H., Bu, F., Ward, J., Worrall, S., et al. (2019). Towards provably not-at-fault control of autonomous robots in arbitrary dynamic environments. arXiv Preprint arXiv:1902.02851
Vishwakarma, S. K., Upadhyaya, P., Kumari, B., and Mishra, A. K. (2019). “Smart energy efficient home automation system using IoT,” in 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU) ( IEEE ), 1–4.
Wang, X., Tjalkens, T., and Linnartz, J.-P. (2017). “Smart office lighting control using occupancy sensors,” in 2017 IEEE 14th International Conference on Networking, Sensing and Control (ICNSC) ( IEEE ), 453–458.
Weber, M., and Podnar Žarko, I. (2019). A regulatory view on smart city services. Sensors 19, 415. doi:10.3390/s19020415
Yang, S. (2003). A condition-based failure-prediction and processing-scheme for preventive maintenance. IEEE Trans. Reliab. 52, 373–383. doi:10.1109/tr.2003.816402
Zhang, Q., Zhang, Q., Shi, W., and Zhong, H. (2018). Distributed collaborative execution on the edges and its application to amber alerts. IEEE Internet Things J. 5, 3580–3593. doi:10.1109/jiot.2018.2845898
Zonta, T., Da Costa, C. A., da Rosa Righi, R., de Lima, M. J., da Trindade, E. S., and Li, G. P. (2020). Predictive maintenance in the industry 4.0: A systematic literature review. Comput. Industrial Eng. 150, 106889. doi:10.1016/j.cie.2020.106889
Keywords: internet of things, IoT challenges, IoT new trends, IoT applications, IoT grand vision
Citation: Elgazzar K, Khalil H, Alghamdi T, Badr A, Abdelkader G, Elewah A and Buyya R (2022) Revisiting the internet of things: New trends, opportunities and grand challenges. Front. Internet. Things 1:1073780. doi: 10.3389/friot.2022.1073780
Received: 18 October 2022; Accepted: 07 November 2022; Published: 21 November 2022.
Edited and reviewed by:
Copyright © 2022 Elgazzar, Khalil, Alghamdi, Badr, Abdelkader, Elewah and Buyya. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Correspondence: Khalid Elgazzar, [email protected]
- UGC-CARE Journals
- iLovePhD Web Stories
IoT Research Topics 2023
Research ideas in the Internet of Things
IoT Research Topics: The Internet of Things (IoT) is the network of physical objects—devices, vehicles, buildings, and other items embedded with electronics, software, sensors, and network connectivity—that enables these objects to collect and exchange data. Here things are uniquely identifiable nodes, primarily sensors that communicate without human interaction using IP connectivity.
A thing in IoT can be anything with sensors and internet connections. (Wrist Watch, Sunglass, TV, Car-Key, etc.) All these devices collect an enormous amount of data from every person and store it.
Once data is collected, all the data from IoT devices are transferred to data analysis, as a result of this process some useful in-depth personal recommendations will be generated also which will lead to a smart and efficient life.
In this article, ilovephd provides open research areas in Internet of Things research topics.
Since IoT is in the initial stage of development there are plenty of research opportunities available. The following are some of the key research issues in IoT
- Naming and Addressing: Advertising, Searching, and Discovery
- Service Orchestration and Routing
- Power, Energy, Efficient resource management, and Energy Harvesting
- Things to Cloud: Computation and Communication Gateways
- Miniaturization: Sensors, CPU, and network
- Big Data Analytics: 35 ZB of data $2B in value by 2023
- Semantic technologies: Information and data models for interoperability
- Virtualization: Multiple sensors aggregated, or a sensor shared by multiple users
- Privacy/Security/Trust/Identity/Anonymity Target Pregnancy Prediction
- Heterogeneity/Dynamics/Scale is the open research topics in IoT.
Top 20 Internet of Things IoT Research Ideas 2023
- Investigating the Potential of AI-Based Automation for IoT-Enabled Smart Homes
- Exploring the Impact of 5G Networks on the Internet of Things
- Developing Secure and Scalable IoT-Based Solutions for Smart Cities
- Researching the Potential of Blockchain Technology for Securing IoT Networks
- Investigating the Role of Edge Computing in the Internet of Things
- Examining the Impact of IoT on Wearable Technology
- Exploring the Use of IoT for Automated Vehicle Management
- Investigating the Potential of IoT for Smart Agriculture
- Examining the Use of IoT for Smart Manufacturing
- Investigating the Potential of IoT for Smart Healthcare Solutions
- Exploring the Role of IoT in Smart Energy Management
- Investigating the Use of IoT for Smart Retail Solutions
- Examining the Impact of IoT on Smart Home Security
- Exploring the Role of IoT in Smart Logistics
- Investigating the Use of IoT for Smart Waste Management
- Examining the Potential of IoT for Smart Water Management
- Exploring the Role of IoT in Smart Mobility Solutions
- Investigating the Use of IoT for Smart Education Solutions
- Examining the Impact of IoT on Smart Tourism Solutions
- Exploring the Role of IoT in Smart Air Quality Monitoring
Generalized Open IoT Research Topics
Iot enabling technologies.
- 5G Networks and IoT
- IoT Security and Trust
- IoT and Personal Data Protection
- Artificial Intelligence and IoT
- IoT Large-Scale Pilots and Portability
- IoT Interoperability and Multi-Platform Integration
- Software-Defined Networks (SDN), Network Function Virtualization (NFV) and IoT
- Sensor and Actuator Networks
- IoT Protocols and Standards (IPv6, 6LoWPAN, RPL, 6TiSCH, WoT, oneM2M, etc.)
- Ultra-low-power IoT Technologies and Embedded Systems Architectures
- Wearables , Body Sensor Networks, Smart Portable Devices
- Design Space Exploration Techniques for IoT Devices and Systems
- Heterogeneous Networks, Web of Things, Web of Everything
- Named Data Networking for IoT
- Internet of Nano Things
- Sensors Data Management, IoT Mining and Analytics
- Adaptive Systems and Models at Runtime
- Distributed Storage, Data Fusion
- Routing and Control Protocols
- Resource Management, Access Control
- Mobility, Localization and Management Aspects
- Identity Management and Object Recognition
- Localization Technologies
- Edge Computing, Fog Computing and IoT
- Machine to Machine (M2M)/Devices-to-Devices communications and IoT
- Industrial IoT and Factory of Things and the Internet of Things
IoT Applications, Services, and Real Implementations
- Smart Cities, Smart Public Places, and Smart Environments
- Smart Home, and IoT-based Building Automation
- Smart Agriculture and Water Management
- Smart factories and Industry 4.0
- e-Health, Assisted Living and e-Wellness
- Automotive, Intelligent Transport
- IoT-based Supply Chains
- Smart Grid, Energy Management
- Cyber-physical systems, Context Awareness, Situation Awareness, Ambient Intelligence
- Collaborative Applications and Systems
- Service Experiences and Analysis
- Consumer Electronics, Assisted Living, Rural Services and Production
- Industrial IoT Service Creation and Management Aspects
- Crowd-sensing, human-centric sensing
- Big data and IoT Data Analytics
- IoT and AI techniques
- Internet Applications Naming and Identifiers
- Semantic Technologies, Collective Intelligence
- Cognitive and Reasoning about Things and Smart Objects
- Mobile Cloud Computing (MCC) and IoT
- Horizontal application development for IoT
- Design principals and best practices for IoT application development
End-user and Human-Centric IoT, including IoT Multimedia, Societal Impacts and Sustainable Development
- Human Role in the IoT, Social Aspects and Services
- Value Chain Analysis and Evolution Aspects
- New Human-Device Interactions for IoT, Do-It-Yourself
- Social Models and Networks
- IoT and Arts
- Green IoT: Sustainable Design and Technologies
- Urban Dynamics and crowdsourcing services
- Metrics, Measurements, and Evaluation of IoT Sustainability and Roi
IoT Security, Privacy and Data Protection
- IoT and blockchain
- Artificial Intelligence-based security and data protection
- IoT Privacy, data protection and Security Concerns
- IoT Privacy and Security Tests, Certification, and Labelling
- Security and Data protection risk analysis and mitigation
- Identification and Authentication Issues
- Wireless Sensor Network for IoT Security
- Intrusion Detection in IoT
- Cryptography, Key Management, Authentication and Authorization for IoT
- Physical/MAC/Network Attacks on the Internet of Things
- Cross-layer Attacks in IoT
- Security with QoS Optimization in IoT
- Privacy based Channel Access in IoT
- IoT Forensic Science
- Big Data and Information Integrity in IoT
- Communication Security in IoT
- Security Standards in IoT
IoT Pilots, Testbeds, and Experimentation Results
- Large-scale pilots on IoT
- IoT testbeds and testing tools
- Closing the Gap between Research and Implementation
- Experimental prototypes , Testbed, and Field Trial Experiences
- Multi-Objective IoT System Modeling and Analysis—Performance, Energy, Reliability, Robustness
- IoT Interconnections Analysis—QoS, Scalability, Performance, Interference
- Real-case deployment scenarios and results
- IoT Deployment at Government and ISPs
- IoT Deployment in Agriculture, Retail, Smart Cities, etc.
- IoT Interconnections among ISPs Analysis—QoS, Scalability, Performance, Interference
- Gaps Analysis for Real Deployment
- IoT and Future Internet Architectures
- Standardization and Regulation
Top 50 IoT Project Topics and Research Ideas
- Security and Privacy in the Internet of Things
- Machine Learning for IoT Applications
- Edge Computing for IoT
- Connected Devices and Smart Homes
- Autonomous Vehicles and the IoT
- Big Data Analytics for IoT
- Cloud Computing for IoT
- Wearable Technology and IoT
- Real-Time Monitoring of IoT Devices
- 5G Networks and the IoT
- Artificial Intelligence and the IoT
- Blockchain and the IoT
- Network Protocols for IoT
- Low-Power Networks for IoT
- Wireless Sensor Networks and IoT
- Smart City Applications and IoT
- Industrial Internet of Things
- Augmented Reality and IoT
- Smart Grid and IoT
- Predictive Maintenance and IoT
- Location-Based Services and IoT
- Voice-Enabled IoT Applications
- Home Automation and IoT
- Smart Retail and IoT
- Connected Health and IoT
- Smart Farming and IoT
- Autonomous Robotics and IoT
- Smart Manufacturing and IoT
- Connected Cars and IoT
- Smart Energy and IoT
- Smart Water Management and IoT
- Smart Buildings and IoT
- Smart Waste Management and IoT
- Smart Lighting and IoT
- Smart Education and IoT
- Smart Tourism and IoT
- Smart Transportation and IoT
- Smart Logistics and IoT
- Smart Environment and IoT
- Smart Government and IoT
- Smart Agriculture and IoT
- Smart Security and IoT
- Smart Metering and IoT
- Smart Textiles and IoT
- Smart Retail Analytics and IoT
- Smart Healthcare Analytics and IoT
- Smart City Analytics and IoT
- Smart Home Analytics and IoT
- Smart Grid Analytics and IoT
- Smart Manufacturing Analytics and IoT
IoT Implementation and Testing requirements
Top 10 Internet of Things(IoT) Journals
- Internet of Things
10 Best Free Online Drawing Software – 2023
Ai in scientific peer review, 10 ai software tools to outlining a research paper.
CAN U PROVIDE IMAGE PROCESSING WITH WATER MARK SECURITY IMPLEMENTATION USING IOT
CAN U PROVIDE IMAGE PROCESSING WITH WATER MARK SECURITY USING IOT
LEAVE A REPLY Cancel reply
Save my name, email, and website in this browser for the next time I comment.
iLovePhD is a research education website to know updated research-related information. It helps researchers to find top journals for publishing research articles and get an easy manual for research tools. The main aim of this website is to help Ph.D. scholars who are working in various domains to get more valuable ideas to carry out their research. Learn the current groundbreaking research activities around the world, love the process of getting a Ph.D.
Contact us: [email protected]
Copyright © 2019-2023 - iLovePhD
- Artificial intelligence