![]() |
10.5120/19787-1571 |
M u Farooq, Muhammad Waseem, Sadia Mazhar, Anjum Khairi and Talha Kamal. Article: A Review on Internet of Things (IoT). International Journal of Computer Applications 113(1):1-7, March 2015. Full text available. BibTeX
@article{key:article, author = {M.u. Farooq and Muhammad Waseem and Sadia Mazhar and Anjum Khairi and Talha Kamal}, title = {Article: A Review on Internet of Things (IoT)}, journal = {International Journal of Computer Applications}, year = {2015}, volume = {113}, number = {1}, pages = {1-7}, month = {March}, note = {Full text available} }
Abstract
Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unavoidable for anyone. The form of communication that we see now is either human-human or human-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-machine (M2M). This paper aims to provide a comprehensive overview of the IoT scenario and reviews its enabling technologies and the sensor networks. Also, it describes a six-layered architecture of IoT and points out the related key challenges.
References
- Rafiullah Khan, Sarmad Ullah Khan, Rifaqat Zaheer and Shahid Khan, "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges," in Proceedings of Frontiers of Information Technology (FIT), 2012, pp. 257-260
- Guicheng Shen and Bingwu Liu, "The visions, technologies, applications and security issues of Internet of Things," in E -Business and E -Government (ICEE), 2011, pp. 1-4
- Ling-yuan Zeng, "A Security Framework for Internet of Things Based on 4G Communication," in Computer Science and Network Technology (ICCSNT), 2012, pp. 1715-1718
- "The "Only" Coke Machine on the Internet," Carnegie Mellon University, School of Computer Science.
- M. Weiser, "The computer for the 21st century", Sci. Amer. , 1991, pp. 66 -75
- Jason Pontin, "Bill Joy's Six Webs," MIT Technology Review, 29 September 2005
- Kevin Ashton, "That 'Internet of Things' Thing", RFID Journal, 22 June 2009
- H. D. Ma, "Internet of things: Objectives and scientific challenge," in Journal of Computer Science and Technology, 2011, pp. 919-924
- Nich Heath, "What the Internet of Things means for you". It can be accessed at: http://www. techrepublic. com/blog/europeantechnology/ what-the-internet-of-things-means-for-you
- "Twine" by Supermechanical. It can be accessed at: http://supermechanical. com/twine
- De-Li Yang, Feng Liu and Yi-Duo Liang, "A Survey of the Internet of Things", in International Conference on E-Business Intelligence (ICEBI), 2010
- Bob Violino, "Top IT Vendors reveal their IOT strategies". It can be accessed at: http://www. networkworld. com/article/2604766/internet-ofthings/ top-it-vendors-reveal-their-iot-strategies. html
- Harald Sundmaeker, Patrick Guillemin, Peter Friess, Sylvie Woelffl, "Vision and challenges for realising the Internet of Things," Publications Office of the European Union, 2010
- Gartner, Inc. It can be accessed at: http://www. gartner. com/newsroom/id/2905717
- "From the ARPANET to the Internet" by Ronda Hauben - TCP Digest (UUCP). Retrieved 2007-07-05 It can be accessed at: http://www. columbia. edu/ rh120/other/tcpdigest paper. txt
- Jian An, Xiao-Lin Gui, Xin He, "Study on the Architecture and Key Technologies for Internet of Things," in Advances in Biomedical Engineering, Vol. 11, IERI-2012, pp. 329-335
- Lan Li, "Study of Security Architecture in the Internet of Things," in Measurement, Information and Control (MIC), 2012, Volume: 1, pp. 374-377
- "The Internet of Things," ITU Report, Nov 2005
- Wang Chen, "AN IBE BASED SECURITY SCHEME OF INTERNET OF THINGS," in Cloud Computing and Intelligent Systems (CCIS), 2012, pp. 1046, 1049
- Hui Suo, Jiafu Wan, Caifeng Zou, Jianqi Liu, "Security in the Internet of Things: A Review," in Computer Science and Electronics Engineering (ICCSEE), 2012, pp. 648-651
- MiaoWu, Ting-lie Lu, Fei-Yang Ling, ling Sun, Hui-Ying Du, "Research on the architecture of Internet of things," in Advanced Computer Theory and Engineering (ICACTE), 2010, pp. 484-487
- Xu Cheng, Minghui Zhang, Fuquan Sun, "Architecture of internet of things and its key technology integration based-on RFID," in Fifth International Symposium on Computational Intelligence and Design, pp. 294-297, 2012
- Debasis Bandyopadhyay, Jaydip Sen, "Internet of Things - Applications and Challenges in Technology and Standardization" inWireless Personal Communications, Volume 58, Issue 1, pp. 49-69
- Ying Zhang, "Technology Framework of the Internet of THings and Its Application," in Electrical and Control Engineering (ICECE), 2011, pp. 4109-4112
- Benjamin Khoo, "RFID as an Enabler of the Internet of Things: Issues of Security and Privacy," in Internet of Things (iThings/CPSCom), 2011, pp. 709-712
- L. Atzori, A. Iera, G. Morabito, "The Internet of Things: A survey," in Computer Networks - Science Direct
- H. Zhang, L. Zhu, "Internet of Things: Key technology, architecture and challenging problems", in Computer Science and Automation Engineering (CSAE), 2011, Volume: 4, pp. 507-512
- L. G. Guo, Y. R. Huang, J. Cai, L. G. QU, "Investigation of Architecture, Key Technology and Application Strategy for the Internet of Things," in Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC), 2011, Volume: 2, pp. 1196-1199
- Sohraby, K. , Minoli, D. , Znati, T. "Wireless sensor networks: technology, protocols, and applications", John Wiley and Sons, 2007 ISBN 978-0-471-74300-2, pp. 15-18
- "WISP" by Intel Labs; It can be accessed at: http://wisp. wikispaces. com
- E. M. Tapia, S. S. Intille, and K. Larson, "Portable wireless sensors for object usage sensing in the home: Challenges and practicalities," in Proceedings of the European Ambient Intelligence Conference. vol. LNCS 4794 Berlin Heidelberg: Springer-Verlag 2007
- IEEE 802. 15 WPAN Task Group 4. It can be accessed at: http://www. ieee802. org/15/pub/TG4. html
- G. Montenegro, N. Kushalnagar, J. Hui, D. Culler, "Transmission of IPv6 Packets over IEEE 802. 15. 4 Networks"
- R. Roman, C. ALcaraz, J. Lopez, N. Sklavos, "Key Management Systems for Sensor Networks in the Context of the Internet of Things,"Computers & Electrical Engineering, Volume: 37, Issue: 2, 2011, pp. 147-159
- B. B. P. Rao, P. Saluia, N. Sharma, A. Mittal, S. V. Sharma, "Cloud computing for Internet of Things & sensing based applications," in Sensing Technology (ICST), 2012 Sixth International Conference, IEEE
- X. Xiaohui, "Study on Security Problems and Key Technologies of The Internet of Things," Computational and Information Sciences (ICCIS), 2013, pp. 407-410
- O. Vermesan, P. Friess, "Internet of Things ? From Research and Innovation to Market Deployment," River Publishers, pp. 74-75
- I. Akyildiz and J. Jornet, "THE INTERNET OF NANOTHINGS," IEEE Wireless Communications, Volume: 17 Issue: 6, 2010, pp. 58-63
- V. M. Lubecke, Jung-Chih Chiao, "MEMS technologies for enabling high frequency communications circuits," in Telecommunications in Modern Satellite, Cable and Broadcasting Services, 1999, Volume: 2, pp. 382-389
- "Cisco 40 Gigabit Module". It can be accessed at: http://www. cisco. com/c/en/us/products/interfacesmodules/ 40-gigabit-modules/index. html
- R. Abdmeziem, D. Tandjaoui, "Internet of Things: Concept, Building blocks, Applications and Challenges, Computers and Society, Cornell University"
- "What we're driving at," Google Official Blog. It can be accessed at: http://googleblog. blogspot. com/2010/10/what-were-drivingat. html
- Y. Cao, W. Li, J. Zhang, "Real-time traffic information collecting and monitoring system based on the internet of things," in Pervasive Computing and Applications (ICPCA), 2011 6th International Conference, pp. 45-49
- L. Xiao, Z. Wang, "Internet of Things: A New Application for Intelligent Traffic Monitoring System," in JOURNAL OF NETWORKS, 2011
- P. Fuhrer, D. Guinard, "Building a Smart Hospital using RFID technologies,"
- F. TongKe, "Smart Agriculture Based on Cloud Computing and IoT," in Journal of Convergence Information Technology (JCIT), Jan'13
- "RFID Security Issues - Generation2 Security". It can be accessed at: http://www. thingmagic. com/index. php/rfid-security-issues
- Y. Wang, G. Attebury And B. Ramamurthy, "A Survey on Security Issues in Wireless Sensor Networks," in IEEE communications Survey and Tutorials, 2nd Quarter 2006.
- M. Aamir, Prof. X. Hong, A. A. Wagan, M. Tahir, M. Asif, "Cloud Computing Security Challenges and their Compromised Attributes," in International Journal of Scientific Engineering and Technology, Volume 3, Issue 4, pp. 395-399
- V. Ashktorab, S. R. Taghizadeh, "Security Threats and Countermeasures in Cloud Computing," in International Journal of Application or Innovation in Engineering and Management (IJAIEM), Volume 1, Issue 2, Oct'12.