Introduction To Iot
Introduction To Iot
Chapter 1
Introduction to IoT
arXiv:2312.06689v2 [cs.CR] 12 Jan 2024
1 2
Tajkia Nuri Ananna , Munshi Saifuzzaman
1
Department of CSE, Metropolitan University, Sylhet 3104, Bangladesh
2
Dynamic Solution innovators, Dhaka 1206, Bangladesh
Email Address of the Corresponding Author: [email protected]
Abstract
The Internet of Things has rapidly transformed the 21st century, enhancing decision-making
processes and introducing innovative consumer services such as pay-as-you-use models. The
integration of smart devices and automation technologies has revolutionized every aspect of
our lives, from health services to the manufacturing industry, and from the agriculture sec-
tor to mining. Alongside the positive aspects, it is also essential to recognize the significant
safety, security, and trust concerns in this technological landscape. This chapter serves as
a comprehensive guide for newcomers interested in the IoT domain, providing a foundation
for making future contributions. Specifically, it discusses the overview, historical evolution,
key characteristics, advantages, architectures, taxonomy of technologies, and existing appli-
cations in major IoT domains. In addressing prevalent issues and challenges in designing
and deploying IoT applications, the chapter examines security threats across architectural
layers, ethical considerations, user privacy concerns, and trust-related issues. This discussion
equips researchers with a solid understanding of diverse IoT aspects, providing a compre-
hensive understanding of IoT technology along with insights into the extensive potential and
impact of this transformative field.
Keywords: Architectural Layers, Ethical Considerations, Security Threats, Hardware Plat-
forms, Trust-related Issues, Taxonomy of technologies.
1.1 Introduction
In today’s ubiquitous digital landscape, the Internet has profoundly impacted global exis-
tence, marking an ongoing journey towards even more pervasive connectivity—ushering in
the era of the Internet of Things (IoT). A groundbreaking invention in recent decades, IoT
revolutionizes the interaction between the physical and digital realms, as defined by Verme-
san et al. [1]. In this interconnected landscape, the digital world engages with the physical
Ananna et al. Revised on January 12, 2023
world through an array of sensors and actuators. Pena-López et al. [2] offer an expansive
interpretation, characterizing IoT as a paradigm where computing and networking seam-
lessly integrate into virtually any object, empowering remote querying and modification.
Broadly, the term ”Internet of Things” describes a transformative realm where nearly every
daily device is intricately linked to a network, enabling collaborative utilization for intelli-
gent and automated tasks. The concept of IoT was first introduced by Peter T. Lewis in
1985, defining it as the fusion of individuals, processes, and technology with interconnected
devices and sensors. This facilitates remote monitoring, status assessment, manipulation,
and trend analysis of these devices [3]. The IoT journey, far from its conclusion, promises
a future where diverse devices seamlessly connect to the web, reshaping human existence in
unprecedented ways.
The IoT is a network of interconnected devices with sensors, actuators, processors, and
various communication technologies. Sensors collect real-time data from both internal states
and external surroundings, ranging from mobile phones to microwave ovens. Actuators, in
turn, respond to data or commands, enabling automation and remote control of physical
devices. Data collected by sensors undergoes processing either at the network edge or on
central servers, with some preprocessing occurring directly in the sensors or end devices.
Processed data is then transmitted to remote servers for further analysis, storage, and pro-
cessing. These data form the basis for analysis, decision-making, and subsequent actions,
which can be physical (e.g., adjusting a smart thermostat) or virtual (e.g., sending notifica-
tions) [4]. The applications of IoT are extensive and diverse, impacting various aspects of
our lives. From personal convenience in smart homes to healthcare and fitness innovations,
IoT has the potential to influence personal, financial, physical, educational, professional,
and mental aspects of individuals. In smart homes, IoT enables remote control of electrical
appliances, lighting, coffee brewing, thermostat adjustments, and even hands-free operations
through voice commands [5]. In healthcare, wearable IoT devices offer remote monitoring,
allowing caregivers and healthcare professionals to provide timely assistance in emergencies.
Additionally, individuals can use wearable devices to track sleep patterns, physical activity,
and overall fitness [6]. These examples only scratch the surface of IoT’s broad application
landscape, indicating the exciting possibilities and challenges that researchers are exploring
for the future.
The IoT has the potential to transform how people interact with technology, providing
greater convenience, efficiency, and personalization in daily life. Despite its transformative
impact, IoT faces challenges. The sheer number of devices and the substantial data gen-
erated pose significant challenges, with a projected 41.6 billion IoT devices producing 79.4
zettabytes of data by 2025 [7]. Addressing this requires scalable architectures and enhanced
processing capabilities. Moreover, IoT heavily relies on wireless communication, leading to
challenges such as distortion and unreliability in geographically dispersed locations. En-
suring dependable data transmission becomes a pivotal challenge, emphasizing the critical
role of communication technologies in the IoT landscape. Beyond technical hurdles, various
general and domain-specific challenges are crucial for the success of IoT. Identifying and ad-
dressing these multifaceted challenges collectively is essential to unlocking the full potential
of IoT and overcoming obstacles for broader adoption and integration into our lives.
Motivation of this chapter: IoT is not a novel concept; researchers have been explor-
ing this field for decades. Consequently, the question arises: what sets this chapter apart
2
Ananna et al. Revised on January 12, 2023
from others, and why should readers invest their time in exploring the basics presented here?
While there are several book chapters introducing IoT, many share outdated concepts, lack-
ing the latest insights from the ongoing exploration of this dynamic field. For instance, in
[8], only IoT applications are discussed, and in [9], authors overlook major domains, includ-
ing IoT applications, advantages, challenges, and technologies. Notably, Nagaraj et al. [10]
present a well-structured discussion covering technologies, architectures, applications, and
challenges. However, their discussion is limited to these aspects, with a less extensive ex-
ploration of the application section. Therefore, the need arises for a comprehensive chapter
that covers all aspects and incorporates recent additions in the IoT field. This chapter goes
beyond the basics, encompassing fundamental components, characteristics, and advantages.
It delves into architectures, provides a taxonomy of technologies used in IoT, explores a
significant number of applications across diverse domains, and addresses ethical consider-
ations as well as legal and regulatory issues. In essence, our chapter serves as a holistic
guide, covering the most significant facets of IoT, from foundational principles to emerging
research challenges and future directions. Readers are encouraged to explore this chapter for
a thorough and up-to-date understanding of the evolving landscape of IoT.
Contributions: The contributions of this chapter can be summarized as follows:
1. This chapter provides an introductory overview of the IoT with the aim of assisting
future contributors. It assesses the benefits, generic architecture, key technologies
underpinning IoT, and its diverse applications across various domains.
2. Recent studies have been examined to facilitate this assessment. Additionally, this
chapter encompasses a taxonomy of IoT technologies, including extensive coverage of
field communication.
3. In conclusion, this chapter offers a comprehensive discussion of the open research chal-
lenges, ethical considerations, as well as the legal and regulatory aspects of IoT.
Chapter organization: It begins with an exploration of the fundamentals in Section
1.2, covering the history 1.2.1, components 1.2.2, and characteristics 1.2.3. In Section 1.3,
the advantages of IoT are examined. By introducing a generic architecture in Section 1.4,
the taxonomy of technologies that underpin IoT operations are discussed in detail in Section
3
Ananna et al. Revised on January 12, 2023
1.5. Furthermore, Section 1.6 explores the extensive array of application domains of IoT,
with a focus on multiple promising research works within each domain, aiming to provide a
comprehensive understanding of its real-world applications. It concludes in Section 1.7 by
addressing the key challenges that IoT faces today, considering insights from the reviewed
literature, and sheds light on potential future scopes and developments in the ever-evolving
realm of IoT technology. Table 1.1 represents some abbreviations mentioned in this chapter.
4
Ananna et al. Revised on January 12, 2023
to the practical use of systems for remotely monitoring electrical grid meters via telephone
lines during that era [12].
In the 1980s, there was a growing interest in enhancing physical objects with sensors and
intelligence. Commercial service providers began supporting public access to ARPANET,
an early precursor to the modern Internet, during this time. Satellites and landlines played
pivotal roles in establishing the foundational communication infrastructure for the emerging
IoT. The concept of a network of smart devices was initially explored as early as 1982 when
a Coca-Cola vending machine3 at Carnegie Mellon University was modified to connect to
ARPANET. This allowed local programmers to remotely monitor the vending machine’s
contents, ensuring drinks were available and cold before making a purchase. However, the
technology was challenging to manage, and progress in this field was limited during that
period [13]. In parallel, during the 1980s, local area networks (LANs) gained popularity and
proved effective for real-time communication and document sharing among groups of PCs.
In the 1990s, advancements in wireless technology set the stage for the widespread adop-
tion of ”machine-to-machine” (M2M) solutions in enterprise and industrial contexts, par-
ticularly for equipment monitoring and operation. However, many of these early M2M
solutions relied on closed, purpose-built networks and proprietary or industry-specific stan-
dards rather than utilizing Internet Protocol (IP)-based networks and Internet standards
[14]. By the mid-1990s, the Internet had expanded its global reach, offering new possibilities
for researchers and technologists to explore ways to enhance connections between humans
and machines. A significant milestone in this journey was the creation of the first Internet-
connected ’device’ by John Romkey—an IP-enabled toaster that could be controlled over the
Internet. This innovative toaster was showcased at an Internet conference in 1990, marking
an early example of the IoT in action [15].
In 1991, Mark Weiser’s paper “The Computer of the 21st Century” [16] and academic
events like UbiComp and PerCom shaped the contemporary IoT vision [14]. Global Po-
sitioning System (GPS) became a reality in early 1993 with the Department of Defense
establishing a stable system of 24 satellites. Privately owned commercial satellites soon fol-
lowed, enhancing IIoT functionality [3]. In early 1994, Reza Raji introduced the IoT concept
in IEEE Spectrum, describing it as “moving small data packets to integrate and automate
from home appliances to entire factories” [17]. Later that year, Steve Mann invented the
near-real-time WearCam, powered by a 64-processor setup. Between 1993 and 1997, compa-
nies proposed IoT solutions, including Microsoft’s “at Work” and Novell’s NEST. Momentum
grew as Bill Joy introduced device-to-device communication in his ”Six Web” framework at
the 1999 World Economic Forum [3].
The term “Internet of Things” was coined by Peter T. Lewis in a 1985 speech during the
Congressional Black Caucus Foundation’s 15th Annual Legislative Weekend in Washington,
D.C. Lewis defined IoT as the integration of people, processes, and technology with con-
nectable devices and sensors for remote monitoring, status assessment, manipulation, and
trend evaluation related to these devices [3]. In 1997, Paul Saffo described sensors and their
future roles. British technologist Kevin Ashton, while serving as the executive director of
the Auto-ID Center at MIT, independently coined the term “Internet of Things”. During
his time at Procter and Gamble, he explored radio-frequency identification (RFID), a tech-
3
The ”Only” Coke Machine on the Internet. Available at: Carnegie Mellon University
5
Ananna et al. Revised on January 12, 2023
nology framework enabling physical devices to connect via microchips and wireless signals.
In the same year, they developed a global RFID-based item identification system [14].
In 1999, Kevin Ashton was the first to describe the IoT and proposed the name “Internet
of Things” during a presentation for Procter and Gamble. He believed RFID technology,
primarily designed for inventory tracking, was a significant prerequisite for the IoT, allowing
computers to efficiently manage and monitor individual objects. The concept of tagging
objects has been realized through technologies like digital watermarking, barcodes, and QR
codes, used for identification and tracking purposes [18]. Subsequent technological advance-
ments, including the proliferation of smartphones, cloud computing, improved processing
power, and enhanced software algorithms, along with the availability of sophisticated sen-
sors capable of measuring various parameters, laid the foundation for robust data collection,
storage, and processing for the IoT’s growth.
As a significant step forward in commercializing IoT, LG announced plans to launch a
smart refrigerator capable of autonomously managing its contents in 2000. Walmart and
the US Department of Defense pioneered inventory tracking using RFID and the IoT in
2002−2003. RFID gained prominence in the US Army’s Savi program in 2003, and Walmart
expanded its RFID usage worldwide that same year. In 2004, Cornelius “Pete” Peterson,
CEO of NetSilicon, predicted that IoT devices would dominate the next era of information
technology, particularly in fields like medical devices and industrial controls [3]. In 2005,
numerous articles in mainstream newspapers such as The Guardian, Scientific American,
and The Boston Globe discussed IoT’s future direction.
The IPSO Alliance was founded in 2008 to promote the use of IP in networks of “smart
objects”, while the FCC allowed the use of the “white” label in 2008. Google initiated
the development of autonomous cars in 2009, and in 2011, Google’s Nest smart thermostat
entered the market, enabling remote heating management. In June 2012, major Internet
service providers and web-based companies agreed to expand the global Internet’s address
space by enabling IPv6 for their services and products, a significant step towards a viable
IoT. This led to substantial growth and interest in the field. IT giants like Cisco, IBM, and
Ericsson later took numerous educational and commercial initiatives related to IoT. Cisco
Systems estimated that the IoT was ”born” between 2008 and 2009, with the things/people
ratio growing from 0.08 in 2003 to 1.84 in 2010 [18].
1.2.2 Components
The IoT consists of several key components that serve as the essential building blocks for
constructing an IoT system. This section provides an in-depth exploration of the principal
components of the IoT. IoT comprises three main components: (1) sensors/devices, and
actuators; (2) storage and data analytics; and (3) interpretation and visualization tools.
Each of these is further categorized into various subcomponents.
1. Sensors/Devices: Sensors play a crucial and essential role within an IoT system. Given
that IoT operates by gathering data from the surrounding environment, it is necessary
6
Ananna et al. Revised on January 12, 2023
for all IoT applications to incorporate one or more sensors to meet this need. A defining
characteristic of IoT devices is their context awareness, which is made possible through
the utilization of sensor technology. Sensors are not only compact and cost-effective
but also energy-efficient. However, they are subject to limitations such as battery
capacity and ease of deployment. [4]. An overview of various types of sensors has been
provided below.
7
Ananna et al. Revised on January 12, 2023
2. Actuators: Actuators hold a crucial role and operate in direct contrast to sensors.
They transform energy into physical motion and are typically positioned on the outer
periphery of a system. Take, for instance, a scenario involving a smart home system
that incorporates numerous sensors and actuators. In this setup, the actuators receive
signals from the sensors and, depending on the context, carry out actions such as
locking or unlocking doors, toggling lights or electrical devices on or off, regulating the
house’s temperature, or setting alarms for emergencies. Essentially, actuators respond
to and execute commands based on the signals they receive from sensors or other
devices.
8
Ananna et al. Revised on January 12, 2023
2. Cloud: The cloud serves as the central hub of an IoT network, taking on pivotal roles
in data processing, storage, and management. The key characteristics of the cloud
include the ability to store and process extensive data generated by devices, scalability
to effortlessly handle thousands of devices, flexibility by allowing devices to be added
or removed as needed without requiring a complete system reconfiguration, supervision
and management by the cloud service provider, and cost-effectiveness.
While cloud services are not mandatory for IoT, the recent shift toward edge and fog
computing empowers local data processing. Nevertheless, the cloud is incorporated
into the system for its scalability. storage and cost-effective service provision [28].
Furthermore, cloud-based services offer security functionalities such as encryption and
authentication while enabling remote access and control of IoT devices.
3. Analytics: This represents one of the most intricate and vital layers within IoT. It
involves the analysis of data, generating valuable insights through the application of
diverse machine learning (ML) algorithms and statistical analysis techniques. Nu-
merous applications of analytics in IoT encompass anomaly detection, environmental
monitoring, energy management, smart cities, and agriculture [29].
© Copyright www.free-ppt-templates-download.com
Connectivity 1 10 Security
Dynamic and
Self Adapting 3 8 Heterogeneity
Unique
Identity 4 7 Interoperability
9
Ananna et al. Revised on January 12, 2023
1.2.3 Characteristics
This segment essentially serves as the user interface (UI). The UI offers a platform for users
to interact directly with the application or system, facilitating communication. A user in-
terface is not always reliant on a screen. For instance, a TV remote utilizes a user interface
comprising multiple buttons, while devices like the Amazon Echo respond to voice com-
mands for control. Receiving automatic notifications, monitoring information proactively,
and controlling the system remotely are some common examples of user interfaces in IoT
systems [30]. The IoT characteristics discussed in this chapter are illustrated in Figure 1.1.
1. Connectivity: Connectivity is the most vital requirement of IoT. The main aspect of
IoT is a network with millions of devices connected to each other. The connectivity
remains constant, allowing anyone from anywhere to connect to the IoT network at
any given moment.
2. Intelligent decision making capability: The extraction of knowledge from the data
generated is highly significant. Consider a sensor that produces data; however, the
true value of that data lies in its proper interpretation. This represents a crucial aspect
of IoT, wherein IoT devices possess the capability to transform raw data collected by
sensors into meaningful information and make decisions based on it.
3. Dynamic and Self Adapting: IoT devices should have the ability to adapt to changes
in context, their surrounding environment, and the existing situation. For instance,
within a surveillance system, cameras are capable of switching between day and night
modes or adjusting their resolution in response to motion detection, demonstrating
their adaptability.
4. Unique Identity: Every IoT device should have a unique identity and unique identifier.
IoT device interfaces enable users to inquire about device information, monitor their
status, and remotely manage them. Having a distinct identity is essential to empower
users to safeguard their devices, whether through password protection or alternative
security measures [33].
5. Self Configuring: IoT devices possess the capability to autonomously update their sys-
tems in response to the situation, eliminating the need for user intervention. Moreover,
they exhibit flexibility in network management, allowing new devices to seamlessly join
the network and permitting any device to depart from the network at any time.
6. Scalability: The IoT network is experiencing a continual growth in the number of
connected devices, resulting in a substantial and continuous generation of data. Con-
sequently, scalability emerges as the foremost feature of any IoT system.
7. Interoperability: IoT devices rely on standardized protocols and technologies to guar-
antee seamless communication among themselves and with other systems. Interoper-
ability represents a fundamental block of the IoT, signifying the capacity for various
IoT devices and systems to interact and share data, irrespective of the underlying tech-
nology or the manufacturer. Hence, IoT devices employ standardized protocols, data
formats, and technologies to uphold interoperability.
10
Ananna et al. Revised on January 12, 2023
10. Security: The presence of millions of internet-connected devices and the vast amount
of data generated underscore the vulnerability of the IoT network to security threats.
Hence, safety and security emerge as pivotal characteristics of the IoT. Ensuring safety
is of paramount importance to preserve the effectiveness of IoT’s advantages, including
efficiency and novel experiences.
1. Efficient Data Collection: IoT-based data collection has been particularly beneficial in
sectors such as healthcare and finance [37]. A straightforward illustration of efficient
data collection is the integration of IoT in the retail sector. Internet-connected tags
can provide data on purchase decisions and sales trends, whether weekly or monthly.
11
Ananna et al. Revised on January 12, 2023
This enhanced data gathering can improve inventory management and reveal valu-
able insights into customer behavior, ultimately contributing to the prosperity of the
business.
2. Control and Automation: IoT has provided its customers with a more convenient
lifestyle and allows them to control their daily activities with the touch of a button.
One simple yet remarkable example is the smart bulb, which can be controlled without
even touching the switches; the user can simply turn off or on the light remotely. Not
only can the light bulb, coffee maker, or any other electrical device in the home be
controlled with the tip of the device, but they can also be controlled using a voice
command when they are linked to Google’s or Amazon’s voice assistants.
5. Improved Quality of Life: The advent of IoT has significantly improved the lives of
its users in numerous ways. Real-time health monitoring, including devices like blood
pressure monitors and fitness trackers, empowers users to maintain their well-being
effectively. Smart homes offer a stress-free and effortless lifestyle. These advantages
extend beyond individuals and can benefit entire industries or communities. Smart
devices, linked not only to intelligent traffic lights but also to road safety monitors
and toll gates, can provide drivers with real-time information about road conditions
on their route.
6. Cost and Time Effective: IoT minimizes human effort and relies heavily on real-time
data transmission, leading to time savings. For example, real-time patient monitoring
benefits both patients and doctors by eliminating the need for physical meetings, thus
saving time for both parties. IoT aids businesses in streamlining their workflows by
offering valuable insights and real-time information, resulting in cost reductions. In
addition to businesses, individuals can reduce their everyday expenses through the use
of IoT.
7. Asset Tracking: This process involves tracking products within a business or logistics
management system. Manual asset tracking is labor-intensive and time-consuming,
but it can be streamlined through the application of IoT technologies like barcodes
and RFID tags. These technologies allow for remote monitoring of goods and provide
stakeholders with information about any faults or problems in real time [38].
12
Ananna et al. Revised on January 12, 2023
8. Data Analysis for Research Purpose: The enormous amount of data collected from
IoT devices has become a blessing for researchers in various fields like healthcare,
education, business, etc. The healthcare researchers can use the data collected via
biosensors to invent cures and vaccines for disease; the finance industry can use the
data to understand trends and improve customer experience; the super shops can
analyze customer behavior and improve their businesses; and so on.
9. Big Data and Predictive Analysis: “Big data” has been a widely recognized term in
the world long before the emergence of IoT. It involves the collection and analysis
of massive volumes of data. One of the primary objectives of IoT is to amass data
from diverse sources, sending this information back to systems for analysis. Effective
analysis of big data can yield valuable insights, spanning from stock market predictions
to understanding customer behavior, thereby enhancing the business landscape.
10. Increased Productivity: IoT utilization in both industry and homes has the potential
to boost productivity significantly. For instance, in a smart home, users can stream-
line various household tasks using voice commands, enabling efficient multitasking.
Similarly, in a business setting, analyzing customer behavior can enhance customer
satisfaction, ultimately contributing to the prosperity of the enterprise. As an exam-
ple, 46% of businesses that embraced IoT strategies saw improvements in efficiency,
even though only 29% initially anticipated such improvements [39]. In the healthcare
sector, doctors can offer more extensive services to their patients if they do not need
to make physical visits to each patient individually.
11. Safety and Security: The incorporation of IoT offers users a means of security not only
in their homes but also in their businesses, schools, offices, and virtually anywhere.
Individuals can remotely monitor their valuable assets, such as vehicles and other
important items. Parents can even keep track of their children’s whereabouts from
their workplaces, providing peace of mind. IoT allows for vehicle tracking and the
setup of alert systems in case of unusual incidents. Financial companies and banks can
enhance the security of their confidential rooms or vehicles by utilizing IoT [34].
12. Enhance Customer Engagement: The IoT offers several avenues for enhancing cus-
tomer engagement. It achieves this by leveraging valuable customer data, personalizing
experiences, improving convenience, and enabling real-time interactions.
13. Efficient Resource Utilization:IoT facilitates efficient resource utilization through var-
ious mechanisms and capabilities. Its ability to collect and monitor real-time infor-
mation allows organizations to track the status of their resources, such as equipment
and machinery, enabling the identification of inefficiencies. Predictive maintenance
powered by IoT in the industrial sector can anticipate machinery failures, reducing
downtime and optimizing resource allocation for maintenance.
14. Improved Technology: The innovation brought about by IoT leads to the creation
of newer and more advanced technologies on the market. For instance, consider the
scenario of an air conditioner that was initially controlled manually with a remote.
With the advent of IoT, users can now operate it using voice commands or control it
13
Ananna et al. Revised on January 12, 2023
Application Layer
Network Layer
Perception Layer
remotely. When such innovations hit the market, they spark competition, driving the
development of improved solutions based on user feedback. This cycle of innovation in
response to IoT advancements contributes to the continuous progression of technology
[37].
14
Ananna et al. Revised on January 12, 2023
According to this generalized architecture, also known as the three-layer architecture, the
IoT system is divided into three layers [61], namely (i) the application layer, (ii) the network
layer, and (iii) the perception layer. Every one of these layers possesses inherent security
challenges [62]. A visual representation of the generic three-layer architecture is featured in
Fig. 1.3. The details are described below.
1. Perception Layer : The perception layer, also known as the sensor layer, is the founda-
tional layer of IoT architecture [61]. This layer engages with smart devices, including
but not limited to smartwatches and smart rings, employing an array of sensors and
actuators. The principal objective of this layer pertains to the collection of data from
these intelligent devices via sensors, subsequently transmitting the acquired data to
the upper layer known as the network layer.
2. Network Layer : The network layer, also known as the transmission layer, is the middle
layer of the IoT architecture [63]. This layer is responsible for receiving the information
passed from the perception layer and determining the routes to transmit the processed
data to various connected IoT devices and applications using integrated networks such
as wired or wireless secure connections. The network layer is the core layer of the IoT
three-layer architecture, as it uses various devices such as routing devices, gateways,
switches, and hubs and operates them by using various communication technologies
such as WiFi, Bluetooth, 3G, LTE, Zigbee, etc. In summary, the network layer is
responsible for transmitting data to and from several applications through interfaces
and gateways using multiple communication technologies and protocols.
3. Application Layer : Serving as the uppermost tier within the IoT architecture, denoted
as the application layer or business layer, as referenced in [58], this layer is tasked with
the aggregation of data from the network layer, thereby striving to attain the objective
of establishing a smart environment, the ultimate aim of the IoT paradigm. This
layer accommodates a diverse array of applications, each characterized by their own
requirements. Examples of such applications are smart grids, smart cities, and smart
transportation, as elaborated in [62]. Moreover, this layer assumes the responsibility of
upholding the data’s authenticity, integrity, and confidentiality, as elaborated in [64].
The three-layer architecture is the generalized and most common architecture, and several
systems have integrated this architecture [64]. Although this multi-layer architecture seems
simple at first glance, the functionalities of the network and application layers might get
complex at times. For example, the network layer is not only responsible for data trans-
mission but also provides data services such as data aggregation and processing, etc. On
the other hand, the application layer is not solely responsible for providing service to cus-
tomers and users but also provides data analysis, conducts data mining, etc. Therefore, in
response to specific requirements, additional layers have been incorporated, building upon
the fundamental layers. For instance, the four-layered or five-layered architectures enhance
the system’s flexibility. Nonetheless, the three-layer architecture serves as the foundation
for all these variations. Furthermore, new-generation applications require shorter response
times and low energy consumption as IoT devices have limited capacity [65, 66]. Therefore,
researchers have utilized fog and cloud layers, which are visualized in Fig. 1.4.
15
Ananna et al. Revised on January 12, 2023
Cloud
Layer Data Centers
Fog
Fog nodes
Layer
Healthcare
Traffic
End agriculture Smart devices
Devices
City Grid Industry
IoT Technology
Wireless
Hardware platforms Cloud Solutions Hardware & Software
Communication
Mobile
LPWAN RFID
Communication
Licensed Unlicensed
16
Ananna et al. Revised on January 12, 2023
Table 1.2: Comparison between popular short-range technologies based on various parame-
ters.
OWC
Parameters Bluetooth ZigBee LR-WPAN Wi-Fi
VLC BS-ILC
IEEE 802.11a/b/c/ IEEE 802.15.7m
Standard IEEE 802.15.1 IEEE 802.15.4 IEEE 802.15.4 LoRaWAN
d/g/n/ac/ah IEEE 802.15.13
Mainly at 2.4 GHz a: 5GHz, b: 2.4GHz, Varies by region,
868/915 MHz,
Frequency Band 1MHz - 2.48GHz Optionally 868MHz g: 2.4GHz, n: 2.4GHz 400-800 THz Europe: 868 MHz
2.4 GHz
or 915MHz 802.11ah: 1/2/16MHz USA: 915 MHz
a: 54Mbps, b: 11Mbps,
15.13: multi gigabit
Data Rate 1Mbps - 3 Mbps 20kbps to 250kbps 40-250 kbps g: 54Mbps, ah: 300Mbps 100Gbps
Recent: 100 Gbps
n: 600Mbps, ac: 7Gbps
Typically, within a room
Classic: 100m
Transmission range 10-100 meters 10-100 meters 100m to 1km 7m: 200 meters 200 meters
BLE: 240m
15.13: Several meters
Classic: High Transmitters: Moderate
Energy consumption Low Low Moderate to high Very low
BLE: Low Receivers:Minimal
Cost Cost-effective cost-effective Cost-effective moderate to high moderate to high Cost-effective
FHSS, FDMA CSMA/CA,
RA protocol CSMA/CA CSMA/CA CSMA/CD, CSMA/CA LBT
TDMA based polling TDMA/CDMA
GFSK, DQPSK,
Modulation type BPSK/O-QPSK BPSK/O-QPSK BPSK/QPSK/QAM OOK/PPM/OFDM CSS
π/4-DQPSK
the hardware platforms, such as the purpose of the IoT device or the type of connectivity it
requires.
The two most accessible and popular hardware platforms are the Raspberry Pi and
Arduino. Both of them have strong data acquisition, processing, and storage capabilities
and provide both wireless and wired connectivity. However, in terms of power management,
Arduino is superior to Raspberry Pi because Raspberry Pi does not contain sleep or suspend
modes for power utilization, while Arduino does [67]. Intel Galileo Gen and Intel Edison are
examples of using an Arduino IDE.
Short-Range Technologies
Short-range technologies are commonly used in IoT applications to enable communication
between devices within a limited proximity. These technologies are well-suited for scenarios
where devices need to exchange data within a small coverage area, typically spanning from
a few meters to a few kilometers. There are several short-range technologies, each with
unique characteristics and advantages suited for specific purposes. Table 1.2 provides a
comprehensive overview of various short-range technologies used in the IoT environment,
categorized based on various parameters such as frequency band, data rate, transmission
range, and more. The table summarizes the technical specifications of Bluetooth, ZigBee,
Wi-Fi, LR-WPAN, VLC, and BS-ILC [68, 32].
17
Ananna et al.
Table 1.3: Comparison between popular long-range technologies based on various parameters.
Mobile Communication Technology LPWAN TECHNOLOGIES
Technologies
UNLICENSED LPWAN LICENSED LPWAN
Parameters 2G 3G 4G 5G WiMax
LoRa Sigfox LTE-M NB-IoT
5G NR,
UMTS, LTE, LTE-A, Proprietary
Standard GSM, CDMA Wi-Fi 6 IEEE 802.16 LoRaWAN R1.0 3GPP LTE 3GPP LTE
CDMA2000 IEEE 802.16 technology
(802.11ax)
850MHz,
850MHz, 700MHz, 2.3GHz, Unlicensed ISM
900MHz, 60MHz - Unlicensed ISM Licensed LTE Licensed LTE
Frequency band 1900MHz, 1700/2100MHz, 2.5GHz, bands, 125kHz,
1800MHz, 80GHz bands, 100Hz bands, 1.4MHz bands, 200kHz
2100MHz 2500MHz 3.5GHz 250kHz
1900MHz
1Gbps -
9Kbps - 384Kbps - 100Mbps - 16d: 75Mbps 0.3Kbps - 100bps - 300bps - 200bps -
18
19
Ananna et al. Revised on January 12, 2023
but also to deliver high reliability and low-latency transmissions. However, it is essential to
acknowledge that there are existing issues and constraints that must be resolved for their
effective implementation. It is anticipated that the development of even more advanced
technologies will address critical IoT challenges. Simultaneously, efforts should focus on
intelligently integrating existing and emerging technologies to unlock their full potential and
optimize system performance [68].
RFID
RFID is a technology that consists of one or more readers and several RFID tags. These
tags are small microchips, have unique codes, and can be on items like products in a store or
even access cards. When an RFID reader device sends out electromagnetic radio waves, the
tags respond with their unique Electronic Product Codes (EPCs) [69]. The reader captures
these codes and sends them to a computer, which can then figure out what the tags belong
20
Ananna et al. Revised on January 12, 2023
to. This technology is used in various ways, like keeping track of inventory in stores, allowing
access to secure areas, or monitoring packages as they move through the delivery process.
M2M
M2M communication is gaining popularity and involves direct communication between com-
puters, embedded processors, smart sensors, actuators, and mobile devices. It comprises
four main components: sensing, heterogeneous access, information processing, and appli-
cations and processing. In practical terms, M2M functions within a five-part framework: a
device for responding to requests, gateways to interact and connect, an area network for pro-
viding connectivity between devices and gateways, applications serving as middleware, and
a communication network to facilitate communication between gateways and applications.
M2M technology is applied across various sectors, including healthcare, smart robotics, cy-
ber transportation systems (CTS), manufacturing systems, smart home technologies, and
smart grids [69].
21
Ananna et al. Revised on January 12, 2023
has categorized and provided brief descriptions of the areas where IoT integration has been
implemented or proposed.
Waste Management
Waste management is a crucial operation in any city, whether it is considered a smart city
or not, as it directly impacts the livability of the area. Thus, an efficient waste management
system is essential for any society. Integrating the IoT into waste management offers multiple
benefits. It enables the detection of waste levels and real-time tracking of garbage truck
routes, leading to more efficient route planning. Moreover, it can streamline the manual labor
involved in waste separation and monitor the disposal process. Sensors on garbage vehicles
22
Ananna et al. Revised on January 12, 2023
connected to a central software system achieve these tasks by analyzing and controlling the
system based on the data collected [70]. This approach reduces the cost of manual processes
and enhances recycling management.
Smart grid
A traditional grid system is an electrical grid that includes transmission lines, transformers,
and various communication utilities responsible for delivering electricity from power plants
to homes or businesses. One significant limitation of the traditional grid is its one-way
communication, which prevents power plants from efficiently responding to increasing power
demands from consumers. To address this challenge, the smart grid establishes a two-
way communication system between utilities and consumers, which enables more effective
management of economic, sustainable, and secure power resources [79]. Integrating IoT into
grid systems enables equipping houses and businesses with smart meters that monitor energy
generation, storage, and consumption, and transmit this data to the smart grid.
23
Ananna et al. Revised on January 12, 2023
many parts of the world. Therefore, implementing smart water systems is not a luxury but
a necessity. The primary role of smart water systems is to monitor, measure, and efficiently
distribute water usage. Hauber-Davidson and Idris have designed a notable model in this
field, the smart water metre [81]. These metres can detect water inflow and outflow and
identify any potential leaks. Additionally, smart water metres can utilize data from smart
river sensors and weather information to assist in flood prediction [4].
24
Ananna et al. Revised on January 12, 2023
convenient for patients. Istepanian et al. [84] have introduced an IoT-integrated noninvasive
blood glucose monitoring device to continuously monitor glucose levels, eliminating the need
for fingerstick testing. It is worth noting that optical sensors, such as infrared LED and
near-infrared photodiode setups, have also been used for glucose level measurements.
Temperature Monitoring
Traditionally, temperature measurement methods involve using thermometers placed in the
mouth, ear, or rectum, but these methods often cause discomfort for the patient and pose
an elevated risk of infection. However, recent advancements in IoT-based temperature moni-
toring applications have effectively addressed these issues. For instance, authors in [86] have
introduced a 3D-printed wearable device designed to be inserted into the ear. This device
utilizes an infrared sensor to measure temperature from the tympanic membrane, ensuring
accuracy while remaining environment-independent.
Mood Monitoring
The integration of IoT into the mood monitoring domain offers numerous advantages. IoT
can detect a person’s mental state by analyzing heartbeats through wearable devices. Kaur
et al. [92] have proposed a wearable device capable of tracking a driver’s emotions, including
anger, stress, terror, and sadness. The intelligent system, by analyzing emotion variations,
determines whether the driver has entered a subconscious state and stops the vehicle’s DC
motor accordingly.
Medication Management
Adherence to medication schedules is vital but challenging for elderly individuals with mem-
ory issues. Fortunately, the integration of IoT offers a solution to this problem, and numerous
research efforts have explored using IoT to track patients’ medication compliance. In [94],
a medical box was created to remind individuals to take medications, featuring three trays
for different times of the day. The system also measures vital health parameters (i.e., blood
pressure, temperature, blood oxygen levels, etc.) and facilitates two-way communication
between patients and doctors through a mobile application.
25
Ananna et al. Revised on January 12, 2023
Wheelchair Management
Wheelchairs are vital tools in the lives of individuals who are physically unable to move
independently, providing both physiological assistance and psychological support. However,
for individuals with brain damage who lack the capability to operate a wheelchair, researchers
have been exploring the addition of navigation and tracking systems, with IoT playing a
crucial role in these wheelchair advancements. An advanced and automated smart wheelchair
was reported in a study [97], which not only monitors movement but also offers features
such as an umbrella, foot mat, head mat, and obstacle detection. These innovations have
significantly improved interaction with the living environment and enhanced the user’s overall
experience.
Rehabilitation System
The application of IoT in this field is versatile and has proven effective in various areas,
including cancer treatment, sports injury recovery, stroke rehabilitation, and addressing
physical disabilities. For instance, an innovative smart walker was introduced in a particular
study [98]. Doctors and caregivers can access the collected data through a mobile application,
facilitating better monitoring and support, as this walker utilizes a multi-modal sensor to
monitor the patient’s walking pattern.
Fitness
Regular physical activity and maintaining a high level of fitness significantly influence the
quality of an individual’s life. Developers have created various applications leveraging the
IoT to facilitate fitness monitoring and promote healthier lifestyles. These approaches in-
clude assessing users’ activity levels and revealing metrics, including the duration of physical
activity and periods of inactivity, by utilizing smartphone accelerometer data. Nowadays,
wearable fitness trackers are readily available in the market and have gained popularity as
convenient devices for monitoring fitness levels, for instance, smart mats to provide insights
into users’ workout routines [100] and fitness assessment and training load monitoring to
optimize athletes’ hydration strategies [101].
26
Ananna et al. Revised on January 12, 2023
employs virtual reality to simulate realistic training environments. This framework also en-
ables interaction with surgeons from around the world, fostering collaborative learning and
expertise sharing [107]. Monitoring haemoglobin levels in the blood has become more acces-
sible through portable devices equipped with photoplethysmography sensors, light-emitting
diodes (LEDs), and photodiodes. These devices enable the non-invasive measurement of
haemoglobin levels, enhancing healthcare monitoring and diagnosis [109].
Numerous other HIoT applications are currently in use or under research, underscoring
the ongoing revolutionary impact of IoT in the field of healthcare. It is expected that the IoT
will continue to drive advancements and improvements in healthcare delivery and patient
outcomes.
27
Ananna et al. Revised on January 12, 2023
2. Plant Life Information Monitoring: Wireless sensor devices, when connected to plants,
enable remote and continuous monitoring of both external factors (such as diseases,
pests, and leaf color) and internal factors (including chlorophyll content and photosyn-
thetic rate). This technology allows for early disease detection and promotes overall
healthy plant growth. Porto et al. [116] have introduced a citrus traceability system
that assesses environmental conditions for optimal growth, identifying and preventing
plant diseases to ensure robust citrus crop health.
Diseases Monitoring
The integration of IoT for real-time and continuous monitoring offers farmers and relevant
authorities the capability to identify diseases at an early stage and implement preventive
28
Ananna et al. Revised on January 12, 2023
measures before they escalate. The farm’s environment plays a pivotal role in disease oc-
currence. For example, the framework introduced in [121] integrates various sensor devices
through wireless sensor networks for monitoring various environmental factors.
29
Ananna et al. Revised on January 12, 2023
personal activities within smart homes to applications in the healthcare industry. Further-
more, they extend to professional activities such as monitoring, delivery, and object control
within manufacturing industries or warehouses.
30
Ananna et al. Revised on January 12, 2023
31
Ananna et al. Revised on January 12, 2023
1. Security: Different layers of the IoT are vulnerable to various kinds of attacks based
on the technologies and protocols used in these layers. According to [140], IoT layers
including perception layer, network layer, and application layer face various security
attacks. As the major role of the perception layer is to collect data, the security
challenges in this layer focus on falsifying the data and destroying perception devices.
Attacks including Node Capture Attacks, Malicious code Injection Attacks, False Data
Injection Attacks, Replay Attacks, Cryptanalysis Attacks and Side Channel Attacks,
Eavesdropping and Interference, and Sleep Deprivation Attacks are faced by this layer
[140].
Since the basic function of network layer is to transmit collected data, particularly
using wireless technologies, security challenges in this layer revolve around the avail-
ability of network resources and the wireless network. Challenges at the Network
Layer encompass Denial-of-Service (DoS) Attacks, Spoofing Attacks, Sinkhole Attacks,
Wormhole Attacks, Man-in-the-Middle Attacks, Routing Information Attacks, Sybil
Attacks, and Unauthorized Access [140]. Application layer, which focuses on providing
user-requested services, challenges primarily revolve around software attacks, including
phishing attacks, malicious viruses/worms, malicious scripts [140].
It is imperative to propose secure, robust, and reliable authentication schemes to detect
and defend unauthorized access [141]. Virus detection techniques and script detection
techniques such as honeypot techniques, static code analysis, and dynamic action de-
tection must be implemented to defend against worms, viruses, and malicious scripts
bridging firewalls. Furthermore, introducing secured routing protocols is essential to
ensure secure routing.
2. Privacy: IoT devices continuously generate vast amounts of real-time data, which
32
Ananna et al. Revised on January 12, 2023
undergoes three main stages: (1) Data Collection, (2) Data Aggregation , and (3) Data
Mining and Analytics. While these processes enhance our lives by providing various
services, they also raise concerns about data privacy in the IoT. Privacy breaches in
IoT can have serious repercussions for both the IoT network and its users, including
financial losses, property damage, and even risks to human safety and security [140,
142].
For instance, consider the smart grid, where adversaries can readily seize control of the
smart metres, allowing them to access or manipulate the collected data. This could
potentially compromise the confidentiality and privacy of energy consumption data. By
using this altered data, utility providers may make inaccurate assessments of energy
supply and demand within the grid, resulting in erroneous energy dispatch decisions.
This, in turn, could lead to imbalances in energy supply and demand, potentially
causing widespread power outages. In the healthcare industry, if an adversary manages
to acquire a patient’s health data, they could manipulate medication prescriptions
or medical records, leading to significant health risks and potential insurance fraud.
Therefore, it is imperative to deploy privacy preservation schemes to prevent data
leakage and ensure that private data remains inaccessible to adversaries [140, 143].
There are three main groups for categorizing privacy-preserving mechanisms in the con-
text of IoT data processing: (i) privacy preservation during data collection, (ii) privacy
preservation during data aggregation, and (iii) privacy preservation during data mining
and analytics. While various techniques, such as encryption and key management, can
be applied to protect privacy in data collection, mining, and analytics, the majority of
efforts in IoT privacy preservation have focused on data aggregation. Data aggregation
involves processing relevant data in multiple locations, making it challenging to ensure
privacy using traditional encryption methods. As a result, researchers have developed
several privacy-preserving mechanisms specifically for data aggregation, which can be
categorized as follows:
33
Ananna et al. Revised on January 12, 2023
schemes that strike a balance between privacy and data utility, making it a crucial
area for future research [21, 140]. In summary, safeguarding data privacy in the IoT is
crucial to preventing these adverse outcomes and maintaining the security and integrity
of both individuals and the IoT ecosystem.
Compatibility
Interconnecting devices from various vendors in an IoT network can pose monitoring and
management challenges. Different industries currently rely on a multitude of standards to
support their applications. Given the vast amounts of data, diverse device types, and the
presence of various entities, utilising standard interfaces becomes crucial. This importance
is amplified, especially for applications that need to accommodate both cross-organisational
collaborations and a wide array of system limitations. Addressing these issues requires all
industries to adhere to specific standards, but achieving such universal compliance can be a
daunting and impractical task.
Scalability
In the future, heterogeneous devices are expected to continuously join the ever-expanding
IoT network. As a result, as the number of devices increases, ensuring smooth connectivity,
effective data management, and overall system performance on a small scale becomes increas-
ingly challenging. Therefore, the scalability of IoT poses an ongoing challenge for the future
of this technology. To effectively address scalability challenges, it is essential to construct
a scalable architecture, utilizing technologies like modular components, load balancers, and
distributed systems.
Energy Efficiency
Small smart devices that comprise IoT systems often have limited battery power, which is
not easily replaceable. This limitation can lead to a global energy crisis and high power
consumption, as well as constraints on memory and processing capabilities. Consequently,
routing processes and compute-intensive applications may not run efficiently on these de-
vices. While some routing protocols do support low-power communication, they are still
in the early stages of development, and the constrained energy of smart devices may not
be sufficient to fully utilize these WSN routing protocols. To tackle these challenges ef-
fectively, it’s essential to emphasize the creation of low-power hardware and the adoption
of energy-efficient protocols like MQTT-SN or CoAP rather than relying on more power-
intensive alternatives such as HTTP. Additionally, harnessing over-the-air (OTA) firmware
updates can ensure devices remain optimized and bug-free, thus diminishing the necessity
for physical maintenance visits. Duty cycling, as another viable approach, aids in curbing
power consumption significantly.
Mobility Management
Mobility management in the IoT refers to the ability to handle devices that move within the
network seamlessly. It is a crucial aspect because many IoT devices are not stationary and
need to communicate as they change locations. The presence of mobile devices in IoT setups
can lead to challenges in how routing protocols and IoT networks work efficiently. The cur-
34
Ananna et al. Revised on January 12, 2023
rent methods used for devices that move, like in sensor networks, mobile adhoc networks, and
vehicular networks, can’t effectively handle the various problems related to routing because
these sensors have limited processing power and energy resources. To address these chal-
lenges, IoT systems employ various mobility management techniques and protocols, aiming
to provide reliable and seamless communication for mobile devices in the IoT ecosystem.
Other Challenges
In addition to the previously mentioned challenges, IoT technology faces several other issues.
The widespread adoption of IoT devices and technology, coupled with our increasingly reliant
lifestyles, has led to users becoming highly dependent on IoT applications. This reliance is
particularly critical in healthcare, where patients heavily depend on healthcare applications.
Moreover, IoT devices can sometimes unexpectedly interfere with human activities, result-
ing in unanticipated and autonomous behaviors. The IoT network introduces ambiguity,
making it challenging to distinguish between physical and virtual devices and even humans
due to the ease of transformation between these categories. Quality and traffic control have
become more complex due to the miniaturization and huge number of IoT devices. Manag-
ing unique identifications for each IoT device is also a growing concern. Furthermore, the
IoT goes beyond geographical boundaries, with applications like healthcare offering services
35
Ananna et al. Revised on January 12, 2023
internationally. Nations face challenges due to the global reach of IoT, as data generated
within their borders can be collected and transmitted to service providers located anywhere
in the world, giving rise to concerns regarding data privacy and jurisdiction. Addressing these
multifaceted challenges will require careful consideration and international collaboration to
ensure the effective and secure implementation of IoT technology.
Information
privacy
considerations
Information
rectification Information
and availability collection
Integrity of
Managing data
information
Adapted from [148], the following outlines the five main categories that divide the ethical
concerns related to IoT. The aim of putting forth these issues is to safeguard privacy rights
by regulating how organizations manage information generated by IoT devices. These ethical
standards, designed to establish guidelines for organizations, should also prompt individual
concerns regarding privacy, as they serve as legal safeguards to protect individuals.
36
Ananna et al. Revised on January 12, 2023
3. Managing data: Organizations should specify the situations in which they might utilize
or share the information they have gathered. Under specific conditions, an organization
can employ personal data for direct marketing purposes. Nonetheless, they have the
option of disclosing it internationally, but before doing so, they must set the safeguards
that will be used to protect this information.
4. Integrity of information: Entities should gather and share precise, current, and com-
prehensive information. Reasonable precautions must be in place to prevent misuse,
interference, loss, and unauthorized access, changes, or disclosure.
37
Springer Studies in Computational Intelligence
standard protocols, and regulations to limit third-party data usage. This holistic approach
aims to overcome the multifaceted challenges that the IoT faces.
1.8 Conclusions
The IoT has rapidly become an integral part of the 21st century, enhancing daily decision-
making and ushering in innovative consumer services like pay-as-you-use. The seamless
integration of smart devices and automation technologies has revolutionized every aspect
of our lives. However, amidst this technological marvel, we must acknowledge significant
concerns related to security, privacy, intellectual property rights, safety, and trust. These
concerns continue to demand further investigation. This chapter has provided a compre-
hensive overview of IoT for newcomers seeking to explore this domain and gain a thorough
understanding to make future contributions.The chapter covers fundamental IoT concepts,
historical development, architectures, advantages, and technology taxonomy. It explores
diverse applications in domains such as smart cities and healthcare while addressing chal-
lenges and providing possible future directions. This discussion serves as a solid foundation
for researchers interested in developing practical IoT projects or pioneering new theoretical
approaches within the IoT field, equipping them with a deep understanding of various as-
pects of IoT. This, in turn, provides a good ground for researchers who are interested in
designing realistic IoT projects or developing novel theoretical approaches in the IoT field
Ananna et al. Revised on January 12, 2023
References
[2] I. Peña-López et al., “Itu internet report 2005: the internet of things,” 2005.
[3] W. Contributors, “Internet of things,” 2023. [Online; accessed September 16, 2023].
[4] P. Sethi, S. R. Sarangi, et al., “Internet of things: architectures, protocols, and appli-
cations,” Journal of electrical and computer engineering, vol. 2017, 2017.
[6] P. Dalal, G. Aggarwal, and S. Tejasvee, “Internet of things (iot) in healthcare system:
Ia3 (idea, architecture, advantages and applications),” in Proceedings of the Interna-
tional Conference on Innovative Computing & Communications (ICICC), 2020.
[7] D. Technologies, “Internet of things and data placement.” [Online; accessed October
02, 2023].
[8] T. Kramp, R. Van Kranenburg, and S. Lange, “Introduction to the internet of things,”
Enabling things to talk: Designing IoT solutions with the IoT architectural reference
model, pp. 1–10, 2013.
[10] A. Nagaraj, Introduction to sensors in IoT and cloud computing applications. Bentham
Science Publishers, 2021.
[11] S. Greengard, “Internet of things,” 2023. [Online; accessed September 16, 2023].
[12] W. Contributors, “Machine to machine,” 2023. [Online; accessed September 16, 2023].
[13] V. of Humanity, “Iot technologies explained: History, examples, risks & future,” 2023.
[Online; accessed September 16, 2023].
39
Ananna et al. Revised on January 12, 2023
[14] K. Rose, S. Eldridge, and L. Chapin, “The internet of things: An overview,” The
internet society (ISOC), vol. 80, pp. 1–50, 2015.
[15] J. Romkey, “Toast of the iot: the 1990 interop internet toaster,” IEEE Consumer
Electronics Magazine, vol. 6, no. 1, pp. 116–119, 2016.
[16] M. Weiser, “The computer for the 21 st century,” Scientific american, vol. 265, no. 3,
pp. 94–105, 1991.
[17] R. Raji, “Smart networks for control,” IEEE Spectrum, vol. 31, no. 6, pp. 49–55, 1994.
[18] K. D. Foote, “A brief history of the internet of things,” 2022. [Online; accessed Septem-
ber 16, 2023].
[19] A. Schmidt and K. Van Laerhoven, “How to build smart appliances?,” IEEE personal
communications, vol. 8, no. 4, pp. 66–71, 2001.
[20] M. L. Nerkar, “Recognize human physical activity using smartphone sensors: A re-
view,”
[23] P. K. Sekhar, E. L. Brosha, R. Mukundan, and F. Garzon, “Chemical sensors for envi-
ronmental monitoring and homeland security,” The Electrochemical Society Interface,
vol. 19, no. 4, p. 35, 2010.
[26] C. Point, “What is an iot gateway?.” [Online; accessed October 03, 2023].
[27] daviteq, “Iot gateway – a key to connect the world,” 2020. [Online; accessed October
03, 2023].
[29] Tisha, “What are the major components of internet of things (iot)?,” 2023. [Online;
accessed October 03, 2023].
40
Ananna et al. Revised on January 12, 2023
[30] A. Junnila, “How iot works – part 4: User interface.” [Online; accessed October 03,
2023].
[31] S. Sebastian, P. Ray, et al., “Development of iot invasive architecture for complying
with health of home,” Proceedings of I3CS, Shillong, pp. 79–83, 2015.
[32] P. P. Ray, “A survey on internet of things architectures,” Journal of King Saud
University-Computer and Information Sciences, vol. 30, no. 3, pp. 291–319, 2018.
[33] R. Sultania, “What are the characteristics of internet of things(iot),” 2023. [Online;
accessed October 03, 2023].
[34] S. Kuyoro, F. Osisanwo, and O. Akinsowon, “Internet of things (iot): an overview,”
in Proc. of the 3th International Conference on Advances in Engineering Sciences and
Applied Mathematics (ICAESAM), pp. 23–24, 2015.
[35] N. Zubovich, “Advantages of internet of things: 10 benefits you should know,” 2023.
[Online; accessed September 15, 2023].
[36] A. A. Laghari, K. Wu, R. A. Laghari, M. Ali, and A. A. Khan, “A review and state
of art of internet of things (iot),” Archives of Computational Methods in Engineering,
pp. 1–19, 2021.
[37] G. Gimpel, “Bringing dark data into the light: Illuminating existing iot data lost
within your organization,” Business Horizons, vol. 63, no. 4, pp. 519–530, 2020.
[38] Y. Khan, M. B. M. Su’ud, M. M. Alam, S. F. Ahmad, A. Y. B. Ahmad, and N. Khan,
“Application of internet of things (iot) in sustainable supply chain management,” Sus-
tainability, vol. 15, no. 1, p. 694, 2022.
[39] Impactmybiz, “5 benefits of the internet of things (iot) for smbs,” 2022. [Online;
accessed October 03, 2023].
[40] O. Elijah, T. A. Rahman, I. Orikumhi, C. Y. Leow, and M. N. Hindia, “An overview
of internet of things (iot) and data analytics in agriculture: Benefits and challenges,”
IEEE Internet of things Journal, vol. 5, no. 5, pp. 3758–3773, 2018.
[41] Y. Bo and H. Wang, “The application of cloud computing and the internet of things in
agriculture and forestry,” in 2011 International Joint Conference on Service Sciences,
pp. 168–172, IEEE, 2011.
[42] H. J. Marvin, Y. Bouzembrak, E. M. Janssen, H. v. van der Fels-Klerx, E. D. van
Asselt, and G. A. Kleter, “A holistic approach to food safety risks: Food fraud as an
example,” Food research international, vol. 89, pp. 463–470, 2016.
[43] L. Manning, “Food fraud: Policy and food chain,” Current Opinion in Food Science,
vol. 10, pp. 16–21, 2016.
[44] D. Folinas, I. Manikas, and B. Manos, “Traceability data management for food chains,”
British Food Journal, vol. 108, no. 8, pp. 622–633, 2006.
41
Ananna et al. Revised on January 12, 2023
[45] M. Asplund and S. Nadjm-Tehrani, “Attitudes and perceptions of iot security in critical
societal services,” IEEE Access, vol. 4, pp. 2130–2138, 2016.
[46] M. Selinger, A. Sepulveda, J. Buchan, et al., “Education and the internet of every-
thing,” Cisco Consulting Services and Cisco EMEAR Education Team, 2013.
[47] R. Lutz, “The implications of the internet of things for education,” Retrieved on, 2014.
[48] L. Barreto, A. Amaral, and T. Pereira, “Industry 4.0 implications in logistics: an
overview,” Procedia manufacturing, vol. 13, pp. 1245–1252, 2017.
[49] G.-H. Kim, O.-H. Kwon, and A.-S. Oh, “Design of warehouse management system us-
ing ips under bluetooth environment,” International Journal of Multimedia and Ubiq-
uitous Engineering, vol. 11, no. 6, pp. 281–288, 2016.
[50] W. Ding, “Study of smart warehouse management system based on the iot,” in In-
telligence Computation and Evolutionary Computation: Results of 2012 International
Conference of Intelligence Computation and Evolutionary Computation ICEC 2012
Held July 7, 2012 in Wuhan, China, pp. 203–207, Springer, 2013.
[51] K. Rameel, A. Bhujbal, and M. Goudar, “Iot enabled automated robotic service for
warehouses,” Int. J. Eng. Technol. Sci. Res, vol. 4, pp. 588–592, 2017.
[52] S. Liawatimena, B. Felix, A. Nugraha, and R. Evans, “A mini forklift robot,” in The
2nd International Conference on Next Generation Information Technology, pp. 127–
131, IEEE, 2011.
[53] S. Lu, C. Xu, R. Y. Zhong, and L. Wang, “A rfid-enabled positioning system in
automated guided vehicle for smart factories,” Journal of Manufacturing Systems,
vol. 44, pp. 179–190, 2017.
[54] A. S. Alluhaidan, M. S. Alluhaidan, and S. Basheer, “Retracted article: Internet of
things based intelligent transportation of food products during covid,” Wireless per-
sonal communications, vol. 127, no. Suppl 1, pp. 27–27, 2022.
[55] F. Famá, J. N. Faria, and D. Portugal, “An iot-based interoperable architecture for
wireless biomonitoring of patients with sensor patches,” Internet of Things, vol. 19,
p. 100547, 2022.
[56] Y. Song, F. R. Yu, L. Zhou, X. Yang, and Z. He, “Applications of the internet of things
(iot) in smart logistics: A comprehensive survey,” IEEE Internet of Things Journal,
vol. 8, no. 6, pp. 4250–4274, 2020.
[57] S. M. Nagarajan, G. G. Deverajan, P. Chatterjee, W. Alnumay, and V. Muthuku-
maran, “Integration of iot based routing process for food supply chain management in
sustainable smart cities,” Sustainable Cities and Society, vol. 76, p. 103448, 2022.
[58] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Inter-
net of things: A survey on enabling technologies, protocols, and applications,” IEEE
communications surveys & tutorials, vol. 17, no. 4, pp. 2347–2376, 2015.
42
Ananna et al. Revised on January 12, 2023
[59] B. Varghese and R. Buyya, “Next generation cloud computing: New trends and re-
search directions,” Future Generation Computer Systems, vol. 79, pp. 849–861, 2018.
[60] M. Satyabrata, “Iot functional blocks,” 2023. [Online; accessed August 26, 2023].
[61] L. Atzori, A. Iera, G. Morabito, and M. Nitti, “The social internet of things (siot)–
when social networks meet the internet of things: Concept, architecture and network
characterization,” Computer networks, vol. 56, no. 16, pp. 3594–3608, 2012.
[62] R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, “Internet of things (iot) secu-
rity: Current status, challenges and prospective measures,” in 2015 10th international
conference for internet technology and secured transactions (ICITST), pp. 336–341,
IEEE, 2015.
[63] M. Leo, F. Battisti, M. Carli, and A. Neri, “A federated architecture approach for
internet of things security,” in 2014 Euro Med Telco Conference (EMTC), pp. 1–5,
IEEE, 2014.
[64] M. Wu, T.-J. Lu, F.-Y. Ling, J. Sun, and H.-Y. Du, “Research on the architecture of
internet of things,” in 2010 3rd international conference on advanced computer theory
and engineering (ICACTE), vol. 5, pp. V5–484, IEEE, 2010.
[65] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: Vision and challenges,”
IEEE internet of things journal, vol. 3, no. 5, pp. 637–646, 2016.
[67] M. Murphy, “8 best iot hardware platforms (2022 edition),” 2021. [Online; accessed
October 03, 2023].
[68] J. Ding, M. Nemati, C. Ranaweera, and J. Choi, “Iot connectivity technologies and
applications: A survey,” IEEE Access, vol. 8, pp. 67646–67673, 2020.
[69] S. H. Shah and I. Yaqoob, “A survey: Internet of things (iot) technologies, applications
and challenges,” 2016 IEEE Smart Energy Grid Engineering (SEGE), pp. 381–385,
2016.
[70] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, “Internet of things for
smart cities,” IEEE Internet of Things journal, vol. 1, no. 1, pp. 22–32, 2014.
[71] A. Cenedese, A. Zanella, L. Vangelista, and M. Zorzi, “Padova smart city: An urban
internet of things experimentation,” in Proceeding of IEEE International Symposium
on a World of Wireless, Mobile and Multimedia Networks 2014, pp. 1–6, IEEE, 2014.
[72] J. P. Lynch and K. J. Loh, “A summary review of wireless sensors and sensor networks
for structural health monitoring,” Shock and vibration digest, vol. 38, no. 2, pp. 91–130,
2006.
43
Ananna et al. Revised on January 12, 2023
[74] X. Li, W. Shu, M. Li, H.-Y. Huang, P.-E. Luo, and M.-Y. Wu, “Performance evaluation
of vehicle-based mobile sensor networks for traffic monitoring,” IEEE transactions on
vehicular technology, vol. 58, no. 4, pp. 1647–1653, 2008.
[75] J.-W. Hsieh, S.-H. Yu, Y.-S. Chen, and W.-F. Hu, “Automatic traffic surveillance sys-
tem for vehicle tracking and classification,” IEEE Transactions on intelligent trans-
portation systems, vol. 7, no. 2, pp. 175–187, 2006.
[76] W. Hu, X. Hu, J.-q. Deng, C. Zhu, G. Fotopoulos, E. C.-H. Ngai, and V. C. Leung,
“Mood-fatigue analyzer: towards context-aware mobile sensing applications for safe
driving,” in Proceedings of the 1st ACM Workshop on Middleware for Context-Aware
Applications in the IoT, pp. 19–24, 2014.
[77] A. O. Kotb, Y.-c. Shen, and Y. Huang, “Smart parking guidance, monitoring and
reservations: a review,” IEEE Intelligent Transportation Systems Magazine, vol. 9,
no. 2, pp. 6–16, 2017.
[78] L.-E. Y. Mimbela, L. A. Klein, et al., “Summary of vehicle detection and surveillance
technologies used in intelligent transportation systems,” 2007.
[79] F. Al-Turjman and M. Abujubbeh, “Iot-enabled smart grid via sm: An overview,”
Future generation computer systems, vol. 96, pp. 579–590, 2019.
[80] J. Lin, W. Yu, and X. Yang, “Towards multistep electricity prices in smart grid electric-
ity markets,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 1,
pp. 286–302, 2015.
[81] G. Hauber-Davidson and E. Idris, “Smart water metering,” Water, vol. 33, no. 3,
pp. 38–41, 2006.
[82] T. Wu, J.-M. Redouté, and M. Yuce, “A wearable, low-power, real-time ecg monitor
for smart t-shirt and iot healthcare applications,” in Advances in Body Area Networks
I: Post-Conference Proceedings of BodyNets 2017, pp. 165–173, Springer, 2019.
[83] M. Bansal and B. Gandhi, “Iot & big data in smart healthcare (ecg monitoring),” in
2019 International Conference on Machine Learning, Big Data, Cloud and Parallel
Computing (COMITCon), pp. 390–396, IEEE, 2019.
[85] S. Sunny and S. S. Kumar, “Optical based non invasive glucometer with iot,” in 2018
International Conference on Power, Signals, Control and Computation (EPSCICON),
pp. 1–3, IEEE, 2018.
44
Ananna et al. Revised on January 12, 2023
[86] H. Ota, M. Chao, Y. Gao, E. Wu, L.-C. Tai, K. Chen, Y. Matsuoka, K. Iwai, H. M.
Fahad, W. Gao, et al., “3d printed “earable” smart devices for real-time detection of
core body temperature,” ACS sensors, vol. 2, no. 7, pp. 990–997, 2017.
[88] Q. Xin and J. Wu, “A novel wearable device for continuous, non-invasion blood pressure
measurement,” Computational Biology and Chemistry, vol. 69, pp. 134–137, 2017.
[90] Y. Fu and J. Liu, “System design for wearable blood oxygen saturation and pulse
measurement device,” Procedia manufacturing, vol. 3, pp. 1187–1194, 2015.
[92] J. Kaur, N. Batra, and S. Goyal, “Smartemodetect: An internet of things based emo-
tion monitoring wearable technology for drivers,” Journal of Computational and The-
oretical Nanoscience, vol. 16, no. 9, pp. 3969–3973, 2019.
[93] D. Kushawaha, D. De, V. Mohindru, and A. K. Gupta, “Sentiment analysis and mood
detection on an android platform using machine learning integrated with internet of
things,” in Proceedings of ICRIC 2019: Recent Innovations in Computing, pp. 223–238,
Springer, 2020.
[95] D. Karagiannis and K. S. Nikita, “Design and development of a 3d printed iot portable
pillbox for continuous medication adherence,” in 2020 IEEE International Conference
on Smart Internet of Things (SmartIoT), pp. 352–353, IEEE, 2020.
[96] Y. K. Lee, J. M. Lim, K. S. Eu, Y. H. Goh, and Y. Tew, “Real time image pro-
cessing based obstacle avoidance and navigation system for autonomous wheelchair
application,” in 2017 Asia-Pacific Signal and Information Processing Association An-
nual Summit and Conference (APSIPA ASC), pp. 380–385, IEEE, 2017.
45
Ananna et al. Revised on January 12, 2023
[98] C. Nave and O. Postolache, “Smart walker based iot physical rehabilitation system,”
in 2018 International Symposium in Sensing and Instrumentation in IoT Era (ISSI),
pp. 1–6, IEEE, 2018.
[99] Y. Jiang, “Combination of wearable sensors and internet of things and its application
in sports rehabilitation,” Computer Communications, vol. 150, pp. 167–176, 2020.
[102] M. Heshmat and A.-R. S. Shehata, “A framework about using internet of things for
smart cancer treatment process,” in Proceedings of the international conference on
industrial engineering and operations management, pp. 1206–1211, 2018.
[105] K. Pradhan and P. Chawla, “Medical internet of things using machine learning al-
gorithms for lung cancer detection,” Journal of Management Analytics, vol. 7, no. 4,
pp. 591–623, 2020.
[106] Z. Liu, C. Yao, H. Yu, and T. Wu, “Deep reinforcement learning with its application
for lung cancer detection in medical internet of things,” Future Generation Computer
Systems, vol. 97, pp. 1–9, 2019.
[107] J. Cecil, A. Gupta, M. Pirela-Cruz, and P. Ramanathan, “An iomt based cyber train-
ing framework for orthopedic surgery using next generation internet technologies,”
Informatics in Medicine Unlocked, vol. 12, pp. 128–137, 2018.
[108] H. Su, S. E. Ovur, Z. Li, Y. Hu, J. Li, A. Knoll, G. Ferrigno, and E. De Momi, “Internet
of things (iot)-based collaborative control of a redundant manipulator for teleoperated
minimally invasive surgeries,” in 2020 IEEE international conference on robotics and
automation (ICRA), pp. 9737–9742, IEEE, 2020.
[109] K. Bhatia and M. Singh, “Towards development of portable instantaneous smart op-
tical device for hemoglobin detection non invasively,” Health and Technology, vol. 9,
no. 1, pp. 17–23, 2019.
46
Ananna et al. Revised on January 12, 2023
[111] C. Yuanyuan and Z. Zuozhuang, “Research and design of intelligent water-saving ir-
rigation control system based on wsn,” in 2020 IEEE International Conference on
Artificial Intelligence and Computer Applications (ICAICA), pp. 695–697, IEEE, 2020.
[112] Z. Li, J. Wang, R. Higgs, L. Zhou, and W. Yuan, “Design of an intelligent management
system for agricultural greenhouses based on the internet of things,” in 2017 IEEE
international conference on computational science and engineering (CSE) and IEEE
international conference on embedded and ubiquitous computing (EUC), vol. 2, pp. 154–
160, IEEE, 2017.
[113] X. Chen, “Study on growth condition monitoring and management techniques of millet
field based on internet of things,” Shanxi Agricultural University, 2015.
[114] F.-T. Lin, Y.-C. Kuo, J.-C. Hsieh, H.-Y. Tsai, Y.-T. Liao, and H.-C. Lee, “A self-
powering wireless environment monitoring system using soil energy,” IEEE Sensors
Journal, vol. 15, no. 7, pp. 3751–3758, 2015.
[115] Q. Xie, M. Wu, J. Bao, P. Zheng, W. Liu, X. Liu, and H. Yu, “A deep learning-based
detection method for pig body temperature using infrared thermography,” Computers
and Electronics in Agriculture, vol. 213, p. 108200, 2023.
[118] Y. Onishi, T. Yoshida, H. Kurita, T. Fukao, H. Arihara, and A. Iwai, “An automated
fruit harvesting robot by using deep learning,” Robomech Journal, vol. 6, no. 1, pp. 1–8,
2019.
[119] L. Jiang and K. Sun, “Research on security traceability platform of agricultural prod-
ucts based on internet of things,” in 2017 7th International Conference on Mechatron-
ics, Computer and Education Informationization (MCEI 2017), pp. 146–150, Atlantis
Press, 2017.
[120] H. Gu, X. Zhang, X. Qin, et al., “Construction of pork trace ability system,” Hei-
longjiang Agric Sci, vol. 2018, no. 05, pp. 46–49, 2018.
[121] N. Materne and M. Inoue, “Iot monitoring system for early detection of agricultural
pests and diseases,” in 2018 12th South East Asian Technical University Consortium
(SEATUC), vol. 1, pp. 1–5, IEEE, 2018.
47
Ananna et al. Revised on January 12, 2023
[124] D.-M. Han and J.-H. Lim, “Design and implementation of smart home energy manage-
ment systems based on zigbee,” IEEE Transactions on Consumer Electronics, vol. 56,
no. 3, pp. 1417–1425, 2010.
[125] Y. Qu, X. Ming, Z. Liu, X. Zhang, and Z. Hou, “Smart manufacturing systems: state
of the art and future trends,” The International Journal of Advanced Manufacturing
Technology, vol. 103, pp. 3751–3768, 2019.
[126] Y. Lu, K. C. Morris, S. Frechette, et al., “Current standards landscape for smart
manufacturing systems,” National Institute of Standards and Technology, NISTIR,
vol. 8107, no. 3, 2016.
[128] S.-H. Liao and L.-L. Yang, “Mobile payment and online to offline retail business mod-
els,” Journal of Retailing and Consumer Services, vol. 57, p. 102230, 2020.
[129] L. Liu, B. Zhou, Z. Zou, S.-C. Yeh, and L. Zheng, “A smart unstaffed retail shop
based on artificial intelligence and iot,” in 2018 IEEE 23rd International workshop on
computer aided modeling and design of communication links and networks (CAMAD),
pp. 1–4, IEEE, 2018.
[130] A. Jayaram, “Smart retail 4.0 iot consumer retailer model for retail intelligence and
strategic marketing of in-store products,” Proceedings of the 17th international business
horizon-INBUSH ERA-2017, Noida, India, vol. 9, 2017.
[133] M. Javaid, A. Haleem, R. P. Singh, S. Rab, and R. Suman, “Upgrading the manufactur-
ing sector via applications of industrial internet of things (iiot),” Sensors International,
vol. 2, p. 100129, 2021.
48
Ananna et al. Revised on January 12, 2023
[134] G. Liang, J. Cao, and W. Zhu, “Circlesense: A pervasive computing system for rec-
ognizing social activities,” in 2013 IEEE International Conference on Pervasive Com-
puting and Communications (PerCom), pp. 201–206, IEEE, 2013.
[135] Y.-K. Row and T.-J. Nam, “Camy: applying a pet dog analogy to everyday ubicomp
products,” in Proceedings of the 2014 ACM International Joint Conference on Perva-
sive and Ubiquitous Computing, pp. 63–74, 2014.
[138] M. Chen, J. Zhou, G. Tao, J. Yang, and L. Hu, “Wearable affective robot,” IEEE
Access, vol. 6, pp. 64766–64776, 2018.
[139] W. Kassab and K. A. Darabkh, “A–z survey of internet of things: Architectures, pro-
tocols, applications, recent advances, future directions and recommendations,” Journal
of Network and Computer Applications, vol. 163, p. 102663, 2020.
[140] J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A survey on internet of
things: Architecture, enabling technologies, security and privacy, and applications,”
IEEE internet of things journal, vol. 4, no. 5, pp. 1125–1142, 2017.
[141] S. Das, M. P. Singh, and S. Namasudra, “A lightweight authentication and key agree-
ment protocol for iot-based smart healthcare system,” in 2023 World Conference on
Communication & Computing (WCONF), pp. 1–5, IEEE, 2023.
[142] A. Singh, A. Kumar, and S. Namasudra, “Dnacds: Cloud ioe big data security and
accessing scheme based on dna cryptography,” Frontiers of Computer Science, vol. 18,
no. 1, p. 181801, 2024.
[144] S. Das and S. Namasudra, “A novel hybrid encryption method to secure healthcare
data in iot-enabled healthcare infrastructure,” Computers and Electrical Engineering,
vol. 101, p. 107991, 2022.
49
Ananna et al. Revised on January 12, 2023
[146] A. H. Hussein, “Internet of things (iot): Research challenges and future applications,”
International Journal of Advanced Computer Science and Applications, vol. 10, no. 6,
2019.
[147] S. G. Tzafestas, “Ethics and law in the internet of things world,” Smart cities, vol. 1,
no. 1, pp. 98–120, 2018.
[148] X. Carron, R. Bosua, S. Maynard, and A. Ahmad, “The internet of things and its
impact on individual privacy: an australian privacy principle perspective,” Computer
Law & Security Review, vol. 21, no. 1, pp. 4–15, 2016.
50