CFP last date
20 May 2024
Reseach Article

A Review of Network Evolution towards a Smart Connected World

by Olivia Haring, Sylvia Worlali Azumah, Nelly Elsayed
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 5
Year of Publication: 2021
Authors: Olivia Haring, Sylvia Worlali Azumah, Nelly Elsayed
10.5120/ijca2021921311

Olivia Haring, Sylvia Worlali Azumah, Nelly Elsayed . A Review of Network Evolution towards a Smart Connected World. International Journal of Computer Applications. 183, 5 ( May 2021), 1-8. DOI=10.5120/ijca2021921311

@article{ 10.5120/ijca2021921311,
author = { Olivia Haring, Sylvia Worlali Azumah, Nelly Elsayed },
title = { A Review of Network Evolution towards a Smart Connected World },
journal = { International Journal of Computer Applications },
issue_date = { May 2021 },
volume = { 183 },
number = { 5 },
month = { May },
year = { 2021 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number5/31921-2021921311/ },
doi = { 10.5120/ijca2021921311 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:15:55.617242+05:30
%A Olivia Haring
%A Sylvia Worlali Azumah
%A Nelly Elsayed
%T A Review of Network Evolution towards a Smart Connected World
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 5
%P 1-8
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the rapid innovations in technology, wireless internetconnected devices are more ubiquitous than ever and can be found in virtually every aspect of both our personal and professional lives. In this paper, we propose a comprehensive literature review that focuses on various network components that create connectivity among different devices, specifically Wireless Sensor Networks (WSNs), Radio-Frequency Identification (RFID) tags, Internet of Things (IoT) devices, and how these devices helped usher in the 4th Industrial Revolution, or Industry 4.0. This paper focuses on the protocols, architecture, uses, security concerns, and solutions used in these network technologies, as well as their differences and similarities.

References
  1. A. H. M. Aman, E. Yadegaridehkordi, Z. S. Attarbashi, R. Hassan, and Y. Park, “A survey on trend and classification of internet of things reviews,” 2020. ID: 1.
  2. S. Tree, “Wireless sensor networks,” Self, vol. 1, no. R2, p. C0, 2014.
  3. P. Rawat, K. D. Singh, H. Chaouchi, and J. M. Bonnin, “Wireless sensor networks: a survey on recent developments and potential synergies,” The Journal of supercomputing, vol. 68, pp. 1–48, 2013; 2014.
  4. M. Kocakulak and I. Butun, “An overview of wireless sensor networks towards internet of things,” in 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), pp. 1–6, 2017.
  5. J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer networks, vol. 52, no. 12, pp. 2292– 2330, 2008.
  6. C. S. Raghavendra, K. M. Sivalingam, and T. Znati, Wireless sensor networks. Springer, 2006.
  7. M. A. Perillo and W. B. Heinzelman, “Wireless sensor network protocols.,” 2005.
  8. R. Bruno, M. Conti, and E. Gregori, “Mesh networks: commodity multihop ad hoc networks,” IEEE communications magazine, vol. 43, no. 3, pp. 123–131, 2005.
  9. T. Baykas, L. Goratti, T. Rasheed, and S. Kato, “On the spectrum efficiency of mesh and star topology wide area wireless sensor networks,” in 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC), pp. 1819–1823, IEEE, 2014.
  10. M. K. Singh, S. I. Amin, S. A. Imam, V. K. Sachan, and A. Choudhary, “A survey of wireless sensor network and its types,” in 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), pp. 326–330, IEEE, 2018.
  11. Q. Mamun, “A qualitative comparison of different logical topologies for wireless sensor networks,” Sensors, vol. 12, no. 11, pp. 14887–14913, 2012.
  12. M. J. McGrath and C. N. Scanaill, “Key sensor technology components: hardware and software overview,” in Sensor technologies, pp. 51–77, Springer, 2013.
  13. M. A. M. Vieira, C. N. Coelho, D. j. da Silva, and J. M. da Mata, “Survey on wireless sensor network devices,” in EFTA 2003. 2003 IEEE Conference on Emerging Technologies and Factory Automation. Proceedings (Cat. No. 03TH8696), vol. 1, pp. 537–544, IEEE, 2003.
  14. L. M. Borges, F. J. Velez, and A. S. Lebres, “Survey on the characterization and classification of wireless sensor network applications,” IEEE Communications Surveys Tutorials, vol. 16, no. 4, pp. 1860–1890, 2014.
  15. A. Ali, Y. Ming, S. Chakraborty, and S. Iram, “A comprehensive survey on real-time applications of wsn,” Future internet, vol. 9, no. 4, p. 77, 2017.
  16. B. Kan, L. Cai, and L. Zhao, “An accurate energy model for WSN node and its optimal design,” in 2007 International Conference on Communications, Circuits and Systems, pp. 328–332, IEEE, 2007.
  17. S. K. Singh, M. Singh, D. K. Singh, et al., “Routing protocols in wireless sensor networks–a survey,” International Journal of Computer Science & Engineering Survey (IJCSES), vol. 1, no. 2, pp. 63–83, 2010.
  18. K. Akkaya and M. Younis, “A survey on routing protocols for wireless sensor networks,” Ad hoc networks, vol. 3, no. 3, pp. 325–349, 2005.
  19. H. M. A. Fahmy, “Protocol stack of wsns,” in Wireless Sensor Networks, pp. 55–68, Springer, 2016.
  20. S. Nedevschi, L. Popa, G. Iannaccone, S. Ratnasamy, and D. Wetherall, “Reducing network energy consumption via sleeping and rate-adaptation.,” in NsDI, vol. 8, pp. 323–336, 2008.
  21. D. Resner, G. M. de Araujo, and A. A. Fr¨ohlich, “Design and implementation of a cross-layer IoT protocol,” Science of Computer Programming, vol. 165, pp. 24–37, 2018.
  22. D. E. Boubiche, S. Athmani, S. Boubiche, and H. Toral- Cruz, “Cybersecurity issues in wireless sensor networks: Current challenges and solutions,”Wireless personal communications, 2020.
  23. J. Curtin, R. J. Kauffman, and F. J. Riggins, “Making the MOSTout of RFID technology: a research agenda for the study of the adoption, usage and impact of rfid,” 2007.
  24. R.Weinstein, “RFID: a technical overview and its application to the enterprise,” IT professional, vol. 7, no. 3, pp. 27–33, 2005.
  25. E. Ngai, K. K. Moon, F. J. Riggins, and Y. Y. Candace, “RFID research: An academic literature review (1995–2005) and future research directions,” International Journal of Production Economics, vol. 112, no. 2, pp. 510–520, 2008.
  26. “Rfid,”
  27. M. R. Rieback, B. Crispo, and A. S. Tanenbaum, “The evolution of RFID security,” IEEE pervasive computing, vol. 5, no. 1, pp. 62–69, 2006.
  28. J. Landt, “The history of RFID,” IEEE potentials, vol. 24, no. 4, pp. 8–11, 2005.
  29. K. Jung and S. Lee, “A systematic review of RFID applications and diffusion: key areas and public policy issues,” Journal of open innovation, vol. 1, no. 1, pp. 1–19, 2015.
  30. D. M. Dobkin, The RF in RFID: UHF RFID in practice. Newnes, 2012.
  31. A. Ibrahim and G. Dalkilic, “Review of different classes of RFID authentication protocols,” Wireless Networks, vol. 25, no. 3, pp. 961–974, 2019.
  32. J. Al-Kassab andW.-C. Rumsch, “Challenges for RFID crossindustry standardization in the light of diverging industry requirements,” IEEE systems journal, vol. 2, no. 2, pp. 170–177, 2008.
  33. N. Adhiarna and J.-J. Rho, “Standardization and global adoption of radio frequency identification (RFID): strategic issues for developing countries,” in 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, pp. 1461–1468, IEEE, 2009.
  34. J. H. Khor, J. H. Khor, W. Ismail, W. Ismail, M. I. Younis, M. I. Younis, M. K. Sulaiman, M. K. Sulaiman, M. G. Rahman, and M. G. Rahman, “Security problems in an RFID system,” Wireless personal communications, vol. 59, no. 1, pp. 17–26, 2011.
  35. K. Lounis and M. Zulkernine, “Attacks and defenses in shortrange wireless technologies for IoT,” 2020. ID: 1.
  36. R. Pateriya and S. Sharma, “The evolution of RFID security and privacy: A research survey,” in 2011 International Conference on Communication Systems and Network Technologies, pp. 115–119, IEEE, 2011.
  37. S. Al-Sarawi, M. Anbar, K. Alieyan, and M. Alzubaidi, “Internet of things (IoT) communication protocols,” in 2017 8th International conference on information technology (ICIT), pp. 685–690, IEEE, 2017.
  38. S. Kumar, P. Tiwari, and M. Zymbler, “Internet of things is a revolutionary approach for future technology enhancement: a review,” Journal of Big Data, vol. 6, no. 1, p. 111, 2019. ID: Kumar2019.
  39. P. Suresh, J. V. Daniel, V. Parthasarathy, and R. Aswathy, “A state of the art review on the internet of things (IoT) history, technology and fields of deployment,” in 2014 International conference on science engineering and management research (ICSEMR), pp. 1–8, IEEE, 2014.
  40. M. Burhan, R. Rehman, B. Khan, and B.-S. Kim, “Iot elements, layered architectures and security issues: A comprehensive survey,” Sensors (Basel, Switzerland), vol. 18, no. 9, p. 2796, 2018.
  41. N. M. Kumar and P. K. Mallick, “The internet of things: Insights into the building blocks, component interactions, and architecture layers,” Procedia computer science, vol. 132, pp. 109–117, 2018.
  42. C. Li and B. Palanisamy, “Privacy in internet of things: From principles to technologies,” IEEE Internet of Things Journal, vol. 6, no. 1, pp. 488–505, 2019. Cited By :21.
  43. Y. Lu, A. Wang, and S. Liu, A mutual authentication lightweight RFID protocol for IoT devices, vol. 1227 CCIS. 2020.
  44. H. Lasi, P. Fettke, H.-G. Kemper, T. Feld, and M. Hoffmann, “Industry 4.0,” Business & information systems engineering, vol. 6, no. 4, pp. 239–242, 2014.
  45. A. Kravets, A. A. Bolshakov, M. V. Shcherbakov, O. Library, and I. Network, Cyber-physical systems: industry 4.0 challenges, vol. 260. Cham: Springer, 2020; 2019.
Index Terms

Computer Science
Information Sciences

Keywords

Internet of Things Industry 4.0 wireless sensor network RFID networks