Call for Paper - February 2021 Edition
IJCA solicits original research papers for the February 2021 Edition. Last date of manuscript submission is January 20, 2021. Read More

A Review on Internet of Things (IoT)

International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 113 - Number 1
Year of Publication: 2015
M. U. Farooq
Muhammad Waseem
Sadia Mazhar
Anjum Khairi
Talha Kamal

M u Farooq, Muhammad Waseem, Sadia Mazhar, Anjum Khairi and Talha Kamal. Article: A Review on Internet of Things (IoT). International Journal of Computer Applications 113(1):1-7, March 2015. Full text available. BibTeX

	author = {M.u. Farooq and Muhammad Waseem and Sadia Mazhar and Anjum Khairi and Talha Kamal},
	title = {Article: A Review on Internet of Things (IoT)},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {113},
	number = {1},
	pages = {1-7},
	month = {March},
	note = {Full text available}


Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unavoidable for anyone. The form of communication that we see now is either human-human or human-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-machine (M2M). This paper aims to provide a comprehensive overview of the IoT scenario and reviews its enabling technologies and the sensor networks. Also, it describes a six-layered architecture of IoT and points out the related key challenges.


  • Rafiullah Khan, Sarmad Ullah Khan, Rifaqat Zaheer and Shahid Khan, "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges," in Proceedings of Frontiers of Information Technology (FIT), 2012, pp. 257-260
  • Guicheng Shen and Bingwu Liu, "The visions, technologies, applications and security issues of Internet of Things," in E -Business and E -Government (ICEE), 2011, pp. 1-4
  • Ling-yuan Zeng, "A Security Framework for Internet of Things Based on 4G Communication," in Computer Science and Network Technology (ICCSNT), 2012, pp. 1715-1718
  • "The "Only" Coke Machine on the Internet," Carnegie Mellon University, School of Computer Science.
  • M. Weiser, "The computer for the 21st century", Sci. Amer. , 1991, pp. 66 -75
  • Jason Pontin, "Bill Joy's Six Webs," MIT Technology Review, 29 September 2005
  • Kevin Ashton, "That 'Internet of Things' Thing", RFID Journal, 22 June 2009
  • H. D. Ma, "Internet of things: Objectives and scientific challenge," in Journal of Computer Science and Technology, 2011, pp. 919-924
  • Nich Heath, "What the Internet of Things means for you". It can be accessed at: http://www. techrepublic. com/blog/europeantechnology/ what-the-internet-of-things-means-for-you
  • "Twine" by Supermechanical. It can be accessed at: http://supermechanical. com/twine
  • De-Li Yang, Feng Liu and Yi-Duo Liang, "A Survey of the Internet of Things", in International Conference on E-Business Intelligence (ICEBI), 2010
  • Bob Violino, "Top IT Vendors reveal their IOT strategies". It can be accessed at: http://www. networkworld. com/article/2604766/internet-ofthings/ top-it-vendors-reveal-their-iot-strategies. html
  • Harald Sundmaeker, Patrick Guillemin, Peter Friess, Sylvie Woelffl, "Vision and challenges for realising the Internet of Things," Publications Office of the European Union, 2010
  • Gartner, Inc. It can be accessed at: http://www. gartner. com/newsroom/id/2905717
  • "From the ARPANET to the Internet" by Ronda Hauben - TCP Digest (UUCP). Retrieved 2007-07-05 It can be accessed at: http://www. columbia. edu/ rh120/other/tcpdigest paper. txt
  • Jian An, Xiao-Lin Gui, Xin He, "Study on the Architecture and Key Technologies for Internet of Things," in Advances in Biomedical Engineering, Vol. 11, IERI-2012, pp. 329-335
  • Lan Li, "Study of Security Architecture in the Internet of Things," in Measurement, Information and Control (MIC), 2012, Volume: 1, pp. 374-377
  • "The Internet of Things," ITU Report, Nov 2005
  • Wang Chen, "AN IBE BASED SECURITY SCHEME OF INTERNET OF THINGS," in Cloud Computing and Intelligent Systems (CCIS), 2012, pp. 1046, 1049
  • Hui Suo, Jiafu Wan, Caifeng Zou, Jianqi Liu, "Security in the Internet of Things: A Review," in Computer Science and Electronics Engineering (ICCSEE), 2012, pp. 648-651
  • MiaoWu, Ting-lie Lu, Fei-Yang Ling, ling Sun, Hui-Ying Du, "Research on the architecture of Internet of things," in Advanced Computer Theory and Engineering (ICACTE), 2010, pp. 484-487
  • Xu Cheng, Minghui Zhang, Fuquan Sun, "Architecture of internet of things and its key technology integration based-on RFID," in Fifth International Symposium on Computational Intelligence and Design, pp. 294-297, 2012
  • Debasis Bandyopadhyay, Jaydip Sen, "Internet of Things - Applications and Challenges in Technology and Standardization" inWireless Personal Communications, Volume 58, Issue 1, pp. 49-69
  • Ying Zhang, "Technology Framework of the Internet of THings and Its Application," in Electrical and Control Engineering (ICECE), 2011, pp. 4109-4112
  • Benjamin Khoo, "RFID as an Enabler of the Internet of Things: Issues of Security and Privacy," in Internet of Things (iThings/CPSCom), 2011, pp. 709-712
  • L. Atzori, A. Iera, G. Morabito, "The Internet of Things: A survey," in Computer Networks - Science Direct
  • H. Zhang, L. Zhu, "Internet of Things: Key technology, architecture and challenging problems", in Computer Science and Automation Engineering (CSAE), 2011, Volume: 4, pp. 507-512
  • L. G. Guo, Y. R. Huang, J. Cai, L. G. QU, "Investigation of Architecture, Key Technology and Application Strategy for the Internet of Things," in Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC), 2011, Volume: 2, pp. 1196-1199
  • Sohraby, K. , Minoli, D. , Znati, T. "Wireless sensor networks: technology, protocols, and applications", John Wiley and Sons, 2007 ISBN 978-0-471-74300-2, pp. 15-18
  • "WISP" by Intel Labs; It can be accessed at: http://wisp. wikispaces. com
  • E. M. Tapia, S. S. Intille, and K. Larson, "Portable wireless sensors for object usage sensing in the home: Challenges and practicalities," in Proceedings of the European Ambient Intelligence Conference. vol. LNCS 4794 Berlin Heidelberg: Springer-Verlag 2007
  • IEEE 802. 15 WPAN Task Group 4. It can be accessed at: http://www. ieee802. org/15/pub/TG4. html
  • G. Montenegro, N. Kushalnagar, J. Hui, D. Culler, "Transmission of IPv6 Packets over IEEE 802. 15. 4 Networks"
  • R. Roman, C. ALcaraz, J. Lopez, N. Sklavos, "Key Management Systems for Sensor Networks in the Context of the Internet of Things,"Computers & Electrical Engineering, Volume: 37, Issue: 2, 2011, pp. 147-159
  • B. B. P. Rao, P. Saluia, N. Sharma, A. Mittal, S. V. Sharma, "Cloud computing for Internet of Things & sensing based applications," in Sensing Technology (ICST), 2012 Sixth International Conference, IEEE
  • X. Xiaohui, "Study on Security Problems and Key Technologies of The Internet of Things," Computational and Information Sciences (ICCIS), 2013, pp. 407-410
  • O. Vermesan, P. Friess, "Internet of Things ? From Research and Innovation to Market Deployment," River Publishers, pp. 74-75
  • I. Akyildiz and J. Jornet, "THE INTERNET OF NANOTHINGS," IEEE Wireless Communications, Volume: 17 Issue: 6, 2010, pp. 58-63
  • V. M. Lubecke, Jung-Chih Chiao, "MEMS technologies for enabling high frequency communications circuits," in Telecommunications in Modern Satellite, Cable and Broadcasting Services, 1999, Volume: 2, pp. 382-389
  • "Cisco 40 Gigabit Module". It can be accessed at: http://www. cisco. com/c/en/us/products/interfacesmodules/ 40-gigabit-modules/index. html
  • R. Abdmeziem, D. Tandjaoui, "Internet of Things: Concept, Building blocks, Applications and Challenges, Computers and Society, Cornell University"
  • "What we're driving at," Google Official Blog. It can be accessed at: http://googleblog. blogspot. com/2010/10/what-were-drivingat. html
  • Y. Cao, W. Li, J. Zhang, "Real-time traffic information collecting and monitoring system based on the internet of things," in Pervasive Computing and Applications (ICPCA), 2011 6th International Conference, pp. 45-49
  • L. Xiao, Z. Wang, "Internet of Things: A New Application for Intelligent Traffic Monitoring System," in JOURNAL OF NETWORKS, 2011
  • P. Fuhrer, D. Guinard, "Building a Smart Hospital using RFID technologies,"
  • F. TongKe, "Smart Agriculture Based on Cloud Computing and IoT," in Journal of Convergence Information Technology (JCIT), Jan'13
  • "RFID Security Issues - Generation2 Security". It can be accessed at: http://www. thingmagic. com/index. php/rfid-security-issues
  • Y. Wang, G. Attebury And B. Ramamurthy, "A Survey on Security Issues in Wireless Sensor Networks," in IEEE communications Survey and Tutorials, 2nd Quarter 2006.
  • M. Aamir, Prof. X. Hong, A. A. Wagan, M. Tahir, M. Asif, "Cloud Computing Security Challenges and their Compromised Attributes," in International Journal of Scientific Engineering and Technology, Volume 3, Issue 4, pp. 395-399
  • V. Ashktorab, S. R. Taghizadeh, "Security Threats and Countermeasures in Cloud Computing," in International Journal of Application or Innovation in Engineering and Management (IJAIEM), Volume 1, Issue 2, Oct'12.