Generic placeholder image

International Journal of Sensors, Wireless Communications and Control

Editor-in-Chief

ISSN (Print): 2210-3279
ISSN (Online): 2210-3287

Review Article

A Concise Review on Internet of Things: Architecture, Enabling Technologies, Challenges, and Applications

Author(s): Manasha Saqib* and Ayaz Hassan Moon

Volume 12, Issue 9, 2022

Published on: 02 January, 2023

Page: [629 - 650] Pages: 22

DOI: 10.2174/2210327913666221216160435

Price: $65

Abstract

Background: With the advancements of ubiquitous computing, wireless sensor networks, and machine-to-machine communication, the Internet of Things (IoT) has become a constantly growing concept. The IoT is a new paradigm that interconnects all smart physical devices to provide smart services to users. It effectively delivers user-required services by utilising internet connectivity, sensors, and various technologies and protocols for the analysis and collection of data. IoT is predicted to permeate practically every facet of daily life, from smart cities to health care, smart agriculture, logistics and retail, and even smart living and smart ecosystems. Since IoT systems are comprised of heterogeneous hardware and networking technologies, integrating them to the software/ application level to extract information from massive amounts of data is a difficult task.

Methods: In this survey, the definitions, elements, working, architecture, fundamental technologies, key challenges, and potential applications of IoT are systematically reviewed. Initially, the various definitions and elements of IoT are introduced, followed by an explanation of how an IoT works. Additionally, an outline of IoT in the context of the architecture is presented. The primary enabling technologies that will drive IoT research in the near future are examined in this paper. Furthermore, the major key challenges that the research community must address, as well as potential solutions, are investigated. Finally, the paper concludes with some potential IoT applications to demonstrate the concept's feasibility in real-world scenarios.

Conclusion: The goal of this survey is to assist future researchers in identifying IoT-specific challenges and selecting appropriate technology based on application requirements.

Keywords: Internet of things, architecture, enabling technologies, challenges, IoT applications, RFID.

Next »
Graphical Abstract
[1]
Ashton K. That ‘internet of things’ thing. RFID J 2009; 22(7): 97-114.
[2]
Radio-Frequency Identification. Wikipedia, the Free Encyclopedia Available from:http://en.wikipedia.org/wiki/Radio-frequency_identification[Accessed: May 2016]
[3]
Saqib M, Jasra B, Moon AH. A Systematized security and communication protocols stack review for internet of things. 2020 IEEE International Conference for Innovation in Technology (INOCON). 1-9.
[http://dx.doi.org/10.1109/INOCON50539.2020.9298196]
[5]
Gamundani AM. An impact review on internet of things attacks. 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC). 114-8.
[http://dx.doi.org/10.1109/ETNCC.2015.7184819]
[6]
Mahalle PN, Anggorojati B, Prasad NR, Prasad R. Identity authentication and capability based access control (iacac) for the internet of things. J Cyber Secur Mobil 2013; 1(4): 309-48.
[http://dx.doi.org/10.13052/jcsm2245-1439.142]
[7]
Rizzardi A, Sicari S, Miorandi D, Coen-Porisini A. AUPS: An open source authenticated publish/subscribe system for the internet of things. Inf Syst 2016; 62: 29-41.
[http://dx.doi.org/10.1016/j.is.2016.05.004]
[8]
Haller S. The Things in the Internet of Things. In Poster at the (IoT 2010) Tokyo, Japan. 2013.
[http://dx.doi.org/10.1201/b13090]
[9]
Kang K, Pang Z, Wang C. Security and privacy mechanism for health internet of things. J China Univ Post Telecommun 2013; 20: 64-8.
[http://dx.doi.org/10.1016/S1005-8885(13)60219-8]
[10]
Vermesan O, Friess P, Eds. Internet of things-from research and innovation to market deployment. Aalborg: River publishers 2014; Vol. 29.
[12]
Koshizuka N, Sakamura K. Ubiquitous ID: standards for ubiquitous computing and the internet of things. IEEE Pervasive Comput 2010; 9(4): 98-101.
[http://dx.doi.org/10.1109/MPRV.2010.87]
[13]
Javaid M, Haleem A, Rab S, Pratap Singh R, Suman R. Sensors for daily life: A review. Sensors Inter 2021; 2: 100121.
[http://dx.doi.org/10.1016/j.sintl.2021.100121]
[14]
Nemarich CP. Time domain reflectometry liquid level sensors. IEEE Instrum Meas Mag 2001; 4(4): 40-4.
[http://dx.doi.org/10.1109/5289.975464]
[15]
Lucklum F, Jakoby B. Non-contact liquid level measurement with electromagnetic–acoustic resonator sensors. Meas Sci Technol 2009; 20(12): 124002.
[http://dx.doi.org/10.1088/0957-0233/20/12/124002]
[16]
Antonio-Lopez JE, Sanchez-Mondragon JJ. LiKamWa P, May-Arrioja DA. Fiber-optic sensor for liquid level measurement. Opt Lett 2011; 36(17): 3425-7.
[http://dx.doi.org/10.1364/OL.36.003425] [PMID: 21886232]
[17]
Zhang M, Xing Y, Zhang Z, Chen Q. Design and experiment of FBG-based icing monitoring on overhead transmission lines with an improvement trial for windy weather. Sensors (Basel) 2014; 14(12): 23954-69.
[http://dx.doi.org/10.3390/s141223954] [PMID: 25615733]
[18]
Yamazoe N. Toward innovations of gas sensor technology. Sens Actuators B Chem 2005; 108(1-2): 2-14.
[http://dx.doi.org/10.1016/j.snb.2004.12.075]
[19]
Lu L, Su X, Zhang C, Gao Q, Bu X. Study on the efficiency of temperature/strain measurement for ultra-long-distance optical fiber composite overhead power transmission lines. Appl Sci (Basel) 2022; 12(21): 11043.
[http://dx.doi.org/10.3390/app122111043]
[20]
Micco A, Ricciardi A, Quero G, Crescitelli A, Bock WJ, Cusano A. Simple technique for integrating compact silicon devices within optical fibers. Opt Lett 2014; 39(4): 861-4.
[http://dx.doi.org/10.1364/OL.39.000861] [PMID: 24562226]
[21]
Paladino D, Quero G, Caucheteur C, Mégret P, Cusano A. Hybrid fiber grating cavity for multi-parametric sensing. Opt Express 2010; 18(10): 10473-86.
[http://dx.doi.org/10.1364/OE.18.010473] [PMID: 20588901]
[22]
Zeng W, Gao H. Optic fiber sensing IOT technology and application research. Sensors & Transducers 2014; 180(10): 16.
[23]
Want R. An introduction to RFID technology. IEEE Pervasive Comput 2006; 5(1): 25-33.
[http://dx.doi.org/10.1109/MPRV.2006.2]
[24]
Want R. Near field communication. IEEE Pervasive Comput 2011; 10(3): 4-7.
[http://dx.doi.org/10.1109/MPRV.2011.55]
[25]
McDermott-Wells P. Bluetooth scatternet models. IEEE Potentials 2005; 23(5): 36-9.
[http://dx.doi.org/10.1109/MP.2005.1368914]
[26]
Ferro E, Potorti F. Bluetooth and wi-fi wireless protocols: a survey and a comparison. IEEE Wirel Commun 2005; 12(1): 12-26.
[http://dx.doi.org/10.1109/MWC.2005.1404569]
[27]
Crosby GV, Vafa F. Wireless sensor networks and LTE-A network convergence 38th Annual IEEE conference on local computer networks. 731-4.
[http://dx.doi.org/10.1109/LCN.2013.6761322]
[28]
Levis P, Madden S, Polastre J, et al. TinyOS: An operating system for sensor networksAmbient intelligence. Berlin, Heidelberg: Springer 2005; pp. 115-48.
[http://dx.doi.org/10.1007/3-540-27139-2_7]
[29]
Cao Q, Abdelzaher T, Stankovic J, He T. The liteos operating system: Towards unix-like abstractions for wireless sensor networks 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008). 233-44.
[http://dx.doi.org/10.1109/IPSN.2008.54]
[30]
Xing XJ, Wang JL, Li MD. Services and key technologies of the Internet of Things. ZTE Commun 2010; 2:-011.
[31]
Gigli M, Koo S. Internet of things: services and applications categorization. Adv Inter Things 2011; 1(2): 27-31.
[http://dx.doi.org/10.4236/ait.2011.12004]
[32]
Vertan C, Merkmale RF. Resource description framework (rdf). Links 2004.
[33]
McGuinness D L, Van Harmelen F. OWL web ontology language overview W3C recommendation. 2004; 10: p. (10)2004.
[34]
Bansal S, Kumar D. IoT ecosystem: A survey on devices, gateways, operating systems, middleware and communication. Int J Wirel Inf Netw 2020; 27(3): 340-64.
[http://dx.doi.org/10.1007/s10776-020-00483-7]
[35]
Wu M, Lu TJ, Ling FY, Sun J, Du HY. Research on the architecture of Internet of Things. In 2010 3rd international conference on advanced computer theory and engineering (ICACTE). 5: V5-484.
[36]
Abdmeziem MR, Tandjaoui D, Romdhani I. Architecting the internet of things: state of the art. Robots and Sensor Clouds 2016; pp. 55-75.
[37]
Khan R, Khan SU, Zaheer R, Khan S. Future internet: the internet of things architecture, possible applications and key challenges. In 2012 10th international conference on frontiers of information technology. 2012; pp. 257-60. IEEE
[http://dx.doi.org/10.1109/FIT.2012.53]
[38]
Jia X, Feng Q, Fan T, Lei Q. RFID technology and its applications in Internet of Things (IoT) In 2012 2nd international conference on consumer electronics, communications and networks (CECNet) . 2012; pp. 1282-5. IEEE
[39]
Leo M, Battisti F, Carli M, Neri A. A federated architecture approach for Internet of Things security. 2014 Euro Med Telco Conference (EMTC). 1-5. IEEE. 2014.
[http://dx.doi.org/10.1109/EMTC.2014.6996632]
[40]
Bandyopadhyay S, Sengupta M, Maiti S, Dutta S. A survey of middleware for internet of things Recent trends in wireless and mobile networks. Berlin, Heidelberg: Springer 2011; pp. 288-96.
[http://dx.doi.org/10.1007/978-3-642-21937-5_27]
[41]
Shi YR, Hou T. Internet of Things key technologies and architectures research in information processing. Appl Mech Mater 2013; 347-350: 2511-5.
[http://dx.doi.org/10.4028/www.scientific.net/AMM.347-350.2511]
[42]
Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 2015; 17(4): 2347-76.
[http://dx.doi.org/10.1109/COMST.2015.2444095]
[43]
Mashal I, Alsaryrah O, Chung TY, Yang CZ, Kuo WH, Agrawal DP. Choices for interaction with things on Internet and underlying issues. Ad Hoc Netw 2015; 28: 68-90.
[http://dx.doi.org/10.1016/j.adhoc.2014.12.006]
[44]
Balaji S, Nathani K, Santhakumar R. IoT technology, applications and challenges: a contemporary survey. Wirel Pers Commun 2019; 108(1): 363-88.
[http://dx.doi.org/10.1007/s11277-019-06407-w]
[45]
Council A. Global Trends 2025: A Transformed World. Executive Summary of the National Intelligence Council report of the same name 2008.
[46]
Perwej Y, AbouGhaly MA, Kerim B, Harb H A M. An extended review on internet of things (iot) and its promising applications. Commun Appl Electr (CAE) ISSN 2019; 2394-4714.
[47]
Zhang J, Lai R, Kuo CCJ. Adaptive directional total-variation model for latent fingerprint segmentation. IEEE Trans Inf Forensics Secur 2013; 8(8): 1261-73.
[http://dx.doi.org/10.1109/TIFS.2013.2267491]
[48]
Raj A, Shetty SD. IoT eco-system, layered architectures, security and advancing technologies: A comprehensive survey. Wirel Pers Commun 2021; 1-37.
[49]
Khoo B. RFID as an Enabler of the internet of things: Issues of security and privacy 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing. 709-12.
[http://dx.doi.org/10.1109/iThings/CPSCom.2011.83]
[50]
Amendola S, Lodato R, Manzari S, Occhiuzzi C, Marrocco G. RFID technology for IoT-based personal healthcare in smart spaces. IEEE Internet Things J 2014; 1(2): 144-52.
[http://dx.doi.org/10.1109/JIOT.2014.2313981]
[51]
Hutabarat DP, Patria D, Budijono S, Saleh R. Human tracking application in a certain closed area using RFID sensors and IP camera. 2016; pp. In 2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE). 11-6. IEEE.
[http://dx.doi.org/10.1109/ICITACEE.2016.7892401]
[52]
Zou Y, Xiao J, Han J, Wu K, Li Y, Ni LM. Grfid: A device-free rfid-based gesture recognition system. IEEE Trans Mobile Comput 2017; 16(2): 381-93.
[http://dx.doi.org/10.1109/TMC.2016.2549518]
[53]
Sobin CC. A survey on architecture, protocols and challenges in IoT. Wirel Pers Commun 2020; 112(3): 1383-429.
[http://dx.doi.org/10.1007/s11277-020-07108-5]
[54]
Rayes A, Salam S. The things in iot: Sensors and actuators Internet of Things From Hype to Reality. Cham: Springer 2022; pp. 63-82.
[http://dx.doi.org/10.1007/978-3-030-90158-5_3]
[56]
Vidgren N, Haataja K, Patino-Andres JL, Ramirez-Sanchis JJ, Toivanen P. Security threats in ZigBee-enabled systems: Vulnerability evaluation, practical experiments, countermeasures, and lessons learned. 2013; pp. In 2013 46th Hawaii International Conference on System Sciences. 5132-8. IEEE.
[57]
Gulati K, Boddu RSK, Kapila D, Bangare SL, Chandnani N, Saravanan G. A review paper on wireless sensor network techniques in Internet of Things (IoT). Mater Today Proc 2021.
[58]
Chung MA, Chang WH. Low‐cost, low‐profile and miniaturized single‐plane antenna design for an Internet of Thing device applications operating in 5G, 4G, V2X, DSRC, WiFi 6 band, WLAN, and WiMAX communication systems. Microw Opt Technol Lett 2020; 62(4): 1765-73.
[http://dx.doi.org/10.1002/mop.32229]
[59]
Vijayalakshmi AV, Arockiam L. A study on security issues and challenges in IoT. Int J Eng Sci Manage Res 2016; 3(11): 34-43.
[60]
Curran K, Millar A, Mc Garvey C. Near field communication. Iran J Electr Comput Eng 2012; 2(3): 371.
[61]
Coskun V, Ozdenizci B, Ok K. A survey on near field communication (NFC) technology. Wirel Pers Commun 2013; 71(3): 2259-94.
[http://dx.doi.org/10.1007/s11277-012-0935-5]
[62]
Basir R, Qaisar S, Ali M, et al. Fog computing enabling industrial internet of things: State-of-the-art and research challenges. Sensors (Basel) 2019; 19(21): 4807.
[http://dx.doi.org/10.3390/s19214807] [PMID: 31694254]
[63]
Eun H, Lee H, Oh H. Conditional privacy preserving security protocol for NFC applications. IEEE Trans Consum Electron 2013; 59(1): 153-60.
[http://dx.doi.org/10.1109/TCE.2013.6490254]
[64]
Vejlgaard B, Lauridsen M, Nguyen H, Kovács IZ, Mogensen P, Sorensen M. Coverage and capacity analysis of sigfox, lora, gprs, and nb-iot. n 2017 IEEE 85th vehicular technology conference (VTC Spring) . 2017; pp. 1-5. IEEE.
[http://dx.doi.org/10.1109/VTCSpring.2017.8108666]
[65]
Mekki K, Bajic E, Chaxel F, Meyer F. A comparative study of LPWAN technologies for large-scale IoT deployment. ICT express 2019; 5(1): 1-7.
[66]
Adelantado F, Vilajosana X, Tuset-Peiro P, Martinez B, Melia-Segui J, Watteyne T. Understanding the limits of LoRaWAN. IEEE Commun Mag 2017; 55(9): 34-40.
[http://dx.doi.org/10.1109/MCOM.2017.1600613]
[67]
Akpakwu GA, Silva BJ, Hancke GP, Abu-Mahfouz AM. A survey on 5G networks for the Internet of Things Communication technologies and challenges. IEEE Access 2008; 6: 3619-47.
[http://dx.doi.org/10.1109/ACCESS.2017.2779844]
[68]
Nunez M. What Is 5G and How Will It Make My Life Better? Available on line 2018; 14.
[69]
Global mobile Suppliers Association The road to 5G: Drivers, Applications, Requirements and Technical Development Global Mobile Suppliers Association Surrey, UK 2015.
[70]
Li S, Da Xu L, Zhao S. 5G Internet of Things: A survey. J Ind Inf Integr 2018; 10: 1-9.
[71]
ETSI Machine-to-machine communications (M2M): Functional architecture. Int Telecomm Union 2011.
[72]
Fizza K, Banerjee A, Mitra K, et al. QoE in IoT: a vision, survey and future directions. Discov Int Things 2021; 1(1): 4.
[http://dx.doi.org/10.1007/s43926-021-00006-7]
[73]
Abssi Y, Mishra S, Shukla MK. Cloud computing and security in the IoT era. Helix 2020; 10(04): 51-8.
[76]
Rathee G, Garg S, Kaddoum G, Choi BJ. Decision-making model for securing IoT devices in smart industries. IEEE Trans Industr Inform 2021; 17(6): 4270-8.
[http://dx.doi.org/10.1109/TII.2020.3005252]
[77]
Balliu M, Bastys I, Sabelfeld A. Securing IoT apps. IEEE Secur Priv 2019; 17(5): 22-9.
[http://dx.doi.org/10.1109/MSEC.2019.2914190]
[78]
Matharu GS, Upadhyay P, Chaudhary L. The internet of things: Challenges & security issues 2014 International Conference on Emerging Technologies (ICET). 54-9.
[http://dx.doi.org/10.1109/ICET.2014.7021016]
[79]
Datta SK, Bonnet C. Integrating named data networking in internet of things architecture. 2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW). 1-2.
[http://dx.doi.org/10.1109/ICCE-TW.2016.7520967]
[80]
Baccelli E, Mehlis C, Hahm O, Schmidt TC, Wählisch M. Information centric networking in the IoT: Experiments with NDN in the wild. Proceedings of the 1st ACM conference on information-centric networking. 77-86.
[http://dx.doi.org/10.1145/2660129.2660144]
[81]
Gupta A, Christie R, Manjula R. Scalability in internet of things: features, techniques and research challenges. Int J Comput Intell Res 2017; 13(7): 1617-27.
[82]
Kumar S, Tiwari P, Zymbler M. Internet of Things is a revolutionary approach for future technology enhancement: a review. J Big Data 2019; 6(1): 111.
[http://dx.doi.org/10.1186/s40537-019-0268-2]
[83]
Ryan P, Watson R. Research challenges for the internet of things: what role can or play? Systems 2017; 5(1): 24.
[http://dx.doi.org/10.3390/systems5010024]
[84]
Badawy MM, Ali ZH, Ali HA. QoS provisioning framework for service-oriented internet of things (IoT). Cluster Comput 2020; 23(2): 575-91.
[http://dx.doi.org/10.1007/s10586-019-02945-x]
[85]
Raj JS, Basar A. QoS optimization of energy efficient routing in IoT wireless sensor networks. J ISMAC 2019; 1(01): 12-23.
[http://dx.doi.org/10.36548/jismac.2019.1.002]
[86]
Saqib M, Jasra B, Moon A H. A lightweight three factor authentication framework for IoT based critical applications. ournal of King Saud University-Computer and Information Sciences 2021.
[87]
Shang W, Ding Q, Marianantoni A, Burke J, Zhang L. Securing building management systems using named data networking. IEEE Netw 2014; 28(3): 50-6.
[http://dx.doi.org/10.1109/MNET.2014.6843232]
[88]
Liu J, Xiao Y, Chen CP. Authentication and access control in the internet of things. In 2012 32nd international conference on distributed computing systems workshops. 588-92. IEEE.
[http://dx.doi.org/10.1109/ICDCSW.2012.23]
[89]
Zhang ZK, Cho MCY, Wang CW, Hsu CW, Chen CK, Shieh S. IoT security: ongoing challenges and research opportunities. In 2014 IEEE 7th international conference on service-oriented computing and applications . 230-4. IEEE.
[http://dx.doi.org/10.1109/SOCA.2014.58]
[90]
Al-Mahdi H, Kalil MA. A dynamic hop-aware buffer management scheme for multi-hop ad hoc networks. IEEE Wirel Commun Lett 2016; 6(1): 1.
[http://dx.doi.org/10.1109/LWC.2016.2625278]
[91]
Sobin CC. An efficient buffer management policy for DTN. Procedia Comput Sci 2016; 93: 309-14.
[http://dx.doi.org/10.1016/j.procs.2016.07.215]
[92]
Ahmad A, Cuomo S, Wu W, Jeon G. Intelligent algorithms and standards for interoperability in internet of things. Future Gener Comput Syst 2019; 92: 1187-91.
[http://dx.doi.org/10.1016/j.future.2018.11.015]
[93]
Noura M, Atiquzzaman M, Gaedke M. Interoperability in internet of things: Taxonomies and open challenges. Mob Netw Appl 2019; 24(3): 796-809.
[http://dx.doi.org/10.1007/s11036-018-1089-9]
[94]
Mukherjee A, Paul HS, Dey S, Banerjee A. ANGELS for distributed analytics in IoT. In 2014 IEEE World Forum on Internet ofThings (WF-IoT). 565-70. IEEE
[http://dx.doi.org/10.1109/WF-IoT.2014.6803230]
[95]
Pawar M, Agarwal J. A literature survey on security issues of WSN and different types of attacks in network. Indian J Comput Sci Eng 2017; 8(2): 80-3.
[96]
Saqib M, Jasra B, Moon AH. Mutual authentication protocol for green internet of things in content centric network. J Green Eng 2020; 10: 4896-909.
[97]
Batalla JM, Vasilakos A, Gajewski M. Secure smart homes: Opportunities and challenges. ACM Comput Surv 2018; 50(5): 1-32.
[http://dx.doi.org/10.1145/3122816]
[98]
Patel KK, Patel SM. Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application & future challenges. International journal of engineering science and computing. Int J Eng Sci 2016; 6(5)
[99]
Porkodi R, Bhuvaneswari V. The internet of things (IOT) applications and communication enabling technology standards An overview 2014 International conference on intelligent computing applications. 324-9.
[http://dx.doi.org/10.1109/ICICA.2014.73]
[100]
Vilamovska A M, Hatziandreu E, Schindler H R, Van Oranje-Nassau C, De Vries H. Study on the requirements and options for RFID application in health care. Identifying areas for RFID deploymentin healthcare delivery: a review of relevant literature 2009.
[101]
Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B. A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 2019; 7: 82721-43.
[http://dx.doi.org/10.1109/ACCESS.2019.2924045]
[102]
Indrakumari R, Poongodi T, Suresh P, Balamurugan B. The growing role of internet of things in healthcare wearable’s emergence of pharmaceutical industry growth with industrial IoT approach. Academic Press 2020; pp. 163-94.
[http://dx.doi.org/10.1016/B978-0-12-819593-2.00006-6]
[104]
Hermann M, Pentek T, Otto B. Design principles for Industries 40 scenarios. IEEE Computer Society. 2016; 2016.

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy