ArticlePDF Available

Internet of Things: Vision, Applications and Challenges

Authors:

Abstract and Figures

Internet of Things (IoT) being a powerful integration of radio-frequency identification (RFID), sensor and wireless devices, has given a challenging yet powerful opportunity to shape the existing systems thereby making them intelligent. Abounding applications are developed in the recent years. Millions of physical objects are expected to be connected to form a system creating wide distribution network inferencing meaningful deductions from raw data. This survey paper is an effort to describe IoT along with its vision, possible application domains and key challenges faced in making IoT a reality. This paper presents current state-of-art of IoT in a systematic manner.
Content may be subject to copyright.
ScienceDirect
Available online at www.sciencedirect.com
Procedia Computer Science 132 (2018) 1263–1269
1877-0509 © 2018 The Authors. Published by Elsevier Ltd.
This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/3.0/)
Peer-review under responsibility of the scientific committee of the International Conference on Computational Intelligence and Data Science
(ICCIDS 2018).
10.1016/j.procs.2018.05.042
10.1016/j.procs.2018.05.042
© 2018 The Authors. Published by Elsevier Ltd.
This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/3.0/)
Peer-review under responsibility of the scientic committee of the International Conference on Computational Intelligence and
Data Science (ICCIDS 2018).
1877-0509
Available online at www.sciencedirect.com
ScienceDirect
Procedia Computer Science 00 (2018) 000000
www.elsevier.com/locate/procedia
1877-0509© 2018 The Authors. Published by Elsevier B.V.
Peer-review under responsibility of the scientific committee of the International Conference on Computational Intelligence and
Data Science (ICCIDS 2018).
International Conference on Computational Intelligence and Data Science (ICCIDS 2018)
Internet of Things: Vision, Applications and Challenges
Rishika Mehtaa , Jyoti Sahnib, Kavita Khannac
aThe Northcap University, Gurugram
b The Northcap University, Gurugram
cThe Northcap University, Gurugram
Abstract
Internet of Things (IoT) being a powerful integration of radio-frequency identification (RFID), sensor and wireless devices, has
given a challenging yet powerful opportunity to shape the existing systems thereby making them intelligent. Abounding
applications are developed in the recent years. Millions of physical objects are expected to be connected to form a system
creating wide distribution network inferencing meaningful deductions from raw data.
This survey paper is an effort to describe IoT along with its vision, possible application domains and key challenges faced in
making IoT a reality. This paper presents current state-of-art of IoT in a systematic manner.
© 2018 The Authors. Published by Elsevier B.V.
Peer-review under responsibility of the scientific committee of the International Conference on Computational Intelligence and
Data Science (ICCIDS 2018).
Keywords: Internet of Things (IoT), near field communications, radio frequency identification (RFID), wireless sensor networks (WSNs), sensors
and Actuators;
1. Introduction
Today, more than two billion people are using the Internet to send and receive the e-mails, to access the web
content, to use social networking and to do a lot more activities. With time, a lot of people will be having access to
the vast available information, taking Internet to a higher level where gadgets and smart devices will be connecting,
communicating, computing and coordinating with each-other. It is clear that, within the next few years, the Internet
will grow as a huge network of networks and networked objects. Valuable information and services will always be
available, making it easier to design newer applications, introducing newer methods of working; newer methods of
communicating; newer methods of entertainment; thus, leading to newer ways of living.
* Corresponding author: Rishika Mehta
E-mail address: rishikamehta@ncuindia.edu
Available online at www.sciencedirect.com
ScienceDirect
Procedia Computer Science 00 (2018) 000000
www.elsevier.com/locate/procedia
1877-0509© 2018 The Authors. Published by Elsevier B.V.
Peer-review under responsibility of the scientific committee of the International Conference on Computational Intelligence and
Data Science (ICCIDS 2018).
International Conference on Computational Intelligence and Data Science (ICCIDS 2018)
Internet of Things: Vision, Applications and Challenges
Rishika Mehtaa , Jyoti Sahnib, Kavita Khannac
aThe Northcap University, Gurugram
b The Northcap University, Gurugram
cThe Northcap University, Gurugram
Abstract
Internet of Things (IoT) being a powerful integration of radio-frequency identification (RFID), sensor and wireless devices, has
given a challenging yet powerful opportunity to shape the existing systems thereby making them intelligent. Abounding
applications are developed in the recent years. Millions of physical objects are expected to be connected to form a system
creating wide distribution network inferencing meaningful deductions from raw data.
This survey paper is an effort to describe IoT along with its vision, possible application domains and key challenges faced in
making IoT a reality. This paper presents current state-of-art of IoT in a systematic manner.
© 2018 The Authors. Published by Elsevier B.V.
Peer-review under responsibility of the scientific committee of the International Conference on Computational Intelligence and
Data Science (ICCIDS 2018).
Keywords: Internet of Things (IoT), near field communications, radio frequency identification (RFID), wireless sensor networks (WSNs), sensors
and Actuators;
1. Introduction
Today, more than two billion people are using the Internet to send and receive the e-mails, to access the web
content, to use social networking and to do a lot more activities. With time, a lot of people will be having access to
the vast available information, taking Internet to a higher level where gadgets and smart devices will be connecting,
communicating, computing and coordinating with each-other. It is clear that, within the next few years, the Internet
will grow as a huge network of networks and networked objects. Valuable information and services will always be
available, making it easier to design newer applications, introducing newer methods of working; newer methods of
communicating; newer methods of entertainment; thus, leading to newer ways of living.
* Corresponding author: Rishika Mehta
E-mail address: rishikamehta@ncuindia.edu
1264 Rishika Mehta et al. / Procedia Computer Science 132 (2018) 1263–1269
2 Rishika Mehta/ Procedia Computer Science 00 (2018) 000000
In this scenario, the concept of Internet will diminish, giving rise to the new concept of connected ‘smart’ devices
[1]. The IoT will shape the Internet in such a way that it will materialize machine-to-machine (M2M) learning [2].
The Internet infrastructure will exist as a strong backbone.
The restructuring will take place by making physical devices ‘smart’ thereby, making them capable of
doing things on their own, thus, giving rise to ‘Internet of things.’ The IoT aims to make the use of smart
technologies by connecting things anytime to accomplish anything at any place. The IoT concept came into
existence in 1998 and the term Internet of Things was introduced by Kevin Ashton in 1999 [30].
IoT basically allows for independent yet secure connection for the interaction of real world devices [3]. The
IoT reduces physical work by automating day to day chores [4]. The objects which are connected to Internet are
growing rapidly. The smart phones embed various sensors and actuators which sense the information, perform
computation on that data, and transmit the valuable data thus gathered with the help of Internet [5]. By using such
network with various devices embedding the sensors, we will be able to create various newer applications that will
lead to convincing benefits [6].
The smart objects in IoT can be identified uniquely. These devices have Radio -Frequency Identification
(RFID) tags or bar-codes which are sensed by the sensor devices [6]. The sensors share the collected data over the
Internet for processing by the processing unit. The processing result is communicated to decision making and action
invoking system to invoke the appropriate action.
This paper discusses the current IoT scenario with its background, the primitive architecture of IoT,
possible futuristic applications and the key challenges. The paper organization is as follows. Section I gave the
introduction. Section II briefly describes the background and scope of IoT including the vision of IoT. Section III
shows the basic architecture of IoT. Section IV discusses various futuristic applications of IoT. Section V discusses
the key challenges and Section VI concludes the paper.
2. Background and Scope
2.1. Background Information
IOT can be contemplated as a comprehensive network framework consisting of various connected real-world
objects, which depend on sensory, communication, networking, and information processing technologies [19]. The
base technology for IOT is RFID which works by allowing microchips to transfer identifying data to the reader via
wireless medium. Through RFID, any person can analyze, trace, and monitor the objects connected with RFID tags
[20]. Other fundamental technology being Wireless Sensor Networks (WSNs), mainly works on intelligent sensors
for sensing and monitoring. RFID finds its application in transportation of goods to consumers, production of
pharmaceutical goods, and retail since 1980s [21, 22] and WSN applies to traffic, healthcare and industrial
monitoring [23, 24]. The advancement in both the technologies accelerate the growth of IoT. A lot of other
technologies and devices including barcodes, location-based service, SoA, near field communication, Wimax,
ZigBee, cloud computing etc. are also getting used to make a comprehensive network to empower IoT [25]-[29]
(refer Fig 1).
Fig 1: Technologies empowering IoT [22]
Rishika Mehta et al. / Procedia Computer Science 132 (2018) 1263–1269 1265
Rishika Mehta/ Procedia Computer Science 00 (2018) 000000 3
2.2 IoT Vision
Various definitions of IoT co-exist due to the fact that everyone gives it a meaning according to their own
perspective leading to obvious fuzziness. The definition is a mix of two terms-Internet and Things. The former gives
it a network-oriented vision whereas the latter one pushes it towards objects which are combined to get settled in a
single architecture. IoT signifies “world-wide network of interconnected objects uniquely addressable based on
standard communication protocols” [11]. The biggest challenge in IoT is to uniquely identify each object in parallel
with representation and storage of the information that is exchanged among the objects.
The three visions of IoT [8] are shown in fig 2:
1. Things Oriented Vision
2. Internet Oriented Vision
3. Semantic Oriented Vision
Fig 2: Vision of IoT [8]
A. Things Oriented Vision
In this vision, objects are tracked by sensors and technologies using RFID [27]. Each object is uniquely identified by
Electronic Product Code (EPC). The data is collected through sensors and sensor based embedded system. This
vision depends on RFID-based sensor networks and other sensor-based networks which integrate technologies based
on RFID, sensing, computing devices and the global connectivity.
B. Internet Oriented Vision
The internet-oriented vision sees the various physical devices interacting with each other. The sensor-based objects
can be determined uniquely and their whereabouts can be regularly monitored. These smart embedded objects can
be considered as microcomputers with computing resources.
C. Semantic Oriented Vision
This vision states that the data collected through sensors will be huge. Thus, the collected data is processed
effectively. The raw data is processed in order to make it consistent and least redundant which is useful for better
representations and interpretation.
From things perspective, IoT focuses on the integration of smart devices or objects in a single architecture,
where things being RFID tags, the Internet perspective gives IoT a network-oriented meaning. As IP being the
worldwide accepted protocol to connect the various communicating objects, it has the power to make IoT a reality.
1266 Rishika Mehta et al. / Procedia Computer Science 132 (2018) 1263–1269
4 Rishika Mehta/ Procedia Computer Science 00 (2018) 000000
Lastly, the number of objects that will be connected through IoT will be huge in number, so, the issues related to
representation, storage, interconnection, search and management of the collected information will be quite
challenging. To tackle this, semantic technologies will bring about the solutions for the vast information ge nerated
by IoT.
3. IoT architecture
The IoT associates trillions of objects or devices which will generate a lot of traffic and to handle that huge data
storage will be needed [12]. The issues like security and privacy also needs to be ensured when proposing the new
architecture for IoT addressing scalability, interoperability, reliability, QoS etc. The primitive architecture of IoT is
proposed in [10] and [12].
Fig 3: IoT Architecture [10] [12]
The five-layered architecture of IoT which is shown in Fig.3 is discussed below:
1) Perception Layer: The Perception layer also called as ‘Device Layer’, is composed of physical devices and
sensors. The sensors include RFID or barcodes based on identification of the objects. This layer works on
identifying and collecting the information via sensor devices. Based on the kind of sensors we prefer to gather the
data, the data can be geographic, temperature-specific, orientation-specific etc. The gathered data is thus sent to
Network layer for its secure transmission and processing.
2) Network Layer: The Network layer is also known to be the ‘Transmission Layer’. This layer guarantees for the
secure transfer of the information gathered from sensors to the information processing system. The transmission
media can be wired or wireless and technology can be 3G, UMTS, Wi-Fi, Bluetooth, infrared, ZigBee, etc based on
the sensors. Thus, the Network layer is responsible for transmitting the information from Device layer to
Middleware layer.
3) Middleware Layer: Each smart object communicates with other devices only if they implement same service
type. It takes the data from Network layer and stores it in the database. It processes information and decides the
solution by analyzing the results.
4) Application Layer: This layer is responsible for managing the application globally depending on the processing of
objects information in the Middleware layer. The various applications of IoT are smart health, smart agriculture,
smart home, smart city, smart transportation, etc.
5) Business Layer: This layer manages the complete IoT system in terms of the applications and services. It makes
business models, graphs, flowcharts etc. on the basis of data obtained from previous layer. Depending on the result
analysis, this layer will predict the future actions.
Rishika Mehta et al. / Procedia Computer Science 132 (2018) 1263–1269 1267
Rishika Mehta/ Procedia Computer Science 00 (2018) 000000 5
4. Applications
IoT applications are still in their nascent stages. However, its use is spreading expeditiously. As for now, some
applications are getting developed in the field of healthcare, logistics, inventory control, supply & chain,
transportation, security and privacy. A brief idea about the possible applications of IoT in various domains is
discussed below.
1) Natural calamities prediction: The sensors through their interaction, coordination and simulation can predict the
natural calamities like earthquake, hurricane, volcanic eruptions etc. so as to initiate feasible actions in time.
2) Water shortage detection: The IoT can find out the shortage of water at possible locations. The group of sensors,
along with simulation tasks not only monitors water intercession but may also be able to identify the sewage release
in the water stream leading to accidental hazards with severe after-effects.
3) Smart Homes: The IoT has the capability of making the homes smart by managing energy consumption,
providing interaction among the home appliances, spotting emergencies, ensuring safety etc.
4) Healthcare: The IoT can be of great help in medical area for enhancing the lives of many by monitoring metrics
associated with health, managing medicines in inventory etc.
5) Smart farming: Through a group of sensors different land requirements can be identified and particular actions
can be taken as per the need of the land. Various use case scenarios include smart wrapping up of seeds, fertilizers to
cater to particular environmental conditions. Smart farming will help in adopting better farming practices by getting
acquainted with the various possible land conditions and climate instability. This will drastically enhance the
productivity by averting the incorrect farming practices.
6) Smart Transport: The intelligent network of sensors will be able to efficiently monitor the traffic and can
implement fascinating and much needed feature of ceaseless electronic highway toll, law enforcement, monitoring
rules breaching by vehicles, decreasing environmental pollution, alleviating traffic etc.
7) Smart Cities: The IoT also finds its application in designing smart cities e.g., observing and controlling the good
air quality, identifying emergency routes etc.
8) Smart Security: The IoT sensors also find their applications in the area of security e.g. inspection of spaces,
maintaining infrastructure and equipments, alarming etc.
The IoT applications will keep on evolving with time but at the same time it has to overcome many
challenges pertaining to privacy, complexity, sufficient spectrum for associating large number of smart devices etc.
A number of possible key challenges are listed in the section below.
5. Key Challenges
The IoT can give a new dimension to the Internet and can contribute to extensive financial gains but it also faces
some challenges [9, 28]. Some of them are listed below.
1) Unique Identity Management: The IoT aims at connecting millions and billions of physical objects which should
be uniquely identifiable over the Internet. Thus, proper identity management scheme is needed which will
dynamically assign and manage unique names for a wide range of physical devices.
2) Standardization and Interoperability: Many vendors introduce their devices having different technologies not
known to everyone. There should be a standardized mechanism to ensure interoperability of all the physical and
sensor devices.
3) Privacy of the Information: The IoT makes the use of various object identification technologies like RFID, 2D-
barcodes etc. As each object will be carrying these tags, it is extremely important to ensure privacy of the
information thus, preventing unauthorized access.
4) Safety of physical devices: The objects irrespective of their geographic location need to be prevented from
physical damage, unauthorized access in order to ensure its safety.
5) Confidentiality of information: The sensor devices transmit the information to the information processing system
over the transmission media. The sensors should follow the encryption mechanisms to ensure data integrity at the
information processing system.
1268 Rishika Mehta et al. / Procedia Computer Science 132 (2018) 1263–1269
6 Rishika Mehta/ Procedia Computer Science 00 (2018) 000000
6) Network security: The sensor devices send data either over wired or wireless transmission media. The
transmission unit should tackle with this huge data without any loss of information and should incorporate strict
measures so that no external intervention occurs.
6. Conclusion
The rising idea of Internet of Things (IoT) has the potential of improving our day-to-day life by interconnecting the
smart objects, technologies, and applications. IoT would automate nearly all activities around us. This paper
presented an outline of this very concept, technologies empowering it, its vision and various possible applications.
This should impart sound knowledge and provide a base for researchers who are keen to have an insight
into IoT, key technologies and its architecture. Further, the possible applications have also been discussed. The
challenges are also briefly discussed to give an insight about the issues faced in making IoT a reality.
References:
[1] J. Zheng, D. Simplot-Ryl, C. Bisdikian, and H. Mouftah (2011) “The Internet of Things.” IEEE Communications Magazine 49(11):30-31.
[2] Y. Huang and G.Y. Huang and G. Li. (2010) “Descriptive Models for Internet of Things.” IEEE International Conference on Intelligent
Control and Information Processing (ICIC IP).
[3] T. Fan and Y. Chen. (2010) “A Scheme of Data Management in the Internet of Things,” 2nd IEEE International Conference on Network
Infrastructure and Digital Content.
[4] Y. Huang and G. Li. (2010) “A Semantic Analysis for Internet of Things,” International Conference on Intelligent Computation Technology
and Automation (ICICTA).
[5] Q. Zhou and J. Zhang. (2011) “Research Prospect of Internet of Things Geography,” 19th International Conference on Geoinformatics.
[6] J. Li, Z. Huang, and X. Wang. (2011) “Countermeasure Research about Developing Internet of Things Economy,” International Conference
on E -Business and E -Government (ICEE).
[7] Y.Yu, J. Wang, and G. Zhou (2010) “The Exploration in the Education of Professionals in Applied Internet of Things Engineering,” 4th
International Conference on Distance Learning and Education (ICDLE).
[8] Bandyopadhyay, Debasis, and Jaydip Sen.(2011) "Internet of things: Applications and challenges in technology and standardization"
in Wireless Personal Communications 58(1):49-69.
[9] G. Gang, L. Zeyong, and J. Jun. (2011) “Internet of Things Security Analysis,” International Conference on Internet Technology and
Applications (iTAP).
[10] M. Wu, T. Lu, F. Ling, J. Sun, and H. Du. (2010), “Research on the Architecture of Internet of Things,” in 3rd International Conference on
Advanced Computer Theory and Engineering (ICACTE).
[11] INFSO D.4 Networked Enterprise and RFID INFSO G.2 Micro and Nanosystems. (2008) ”Internet of Things in 2020, Roadmap for the
Future,” Co-operation with the Working Group RFID of the ETP EPOSS1(1).
[12] L. Tan and N. Wang. (2010) “Future internet: The internet of things,” 3rd Int. Conf. Adv. Comput. Theory Eng. (ICACTE), Chengdu,
China:376-380.
[13] X. Jia, O. Feng, T. Fan, and Q. Lei. (2012) “RFID technology and its applications in internet of things (IoT),” 2nd IEEE Int. Conf. Consum.
Electron., Commun. Netw. (CECNet), Yichang, China:12821285.
[14] C. Sun. (2012) “Application of RFID technology for logistics on internet of things,”AASRI Procedia (1): 106111.
[15] E. W. T. Ngai, K. K. Moon, F. J. Riggins, and C. Y. Yi (2008) “RFID research: An academic literature review (19952005) and future
research directions,” Int.J. Prod. Econ.112(2):510520.
[16] S. Li, L. Xu, and X. Wang.(2013) “Compressed sensing signal and data acquisition in wireless sensor networks and internet of things,” IEEE
Trans. Ind. Informat. 9(4):21772186.
[17] W. He and L. Xu. (2014) “Integration of distributed enterprise applications: A survey,” IEEE Trans. Ind. Informat.10(1): 3542.
[18] D. Uckelmann, M. Harrison, and F. Michahelles (2011) “An architectural approach towards the future internet of things,” in Architecting the
Internet of Things. D. Uckelmann, M. Harrison, and F. Michahelles, Eds., New York, NY, USA: Springer:124.
[19] S. Li, L. Xu, X. Wang, and J. Wang. (2012) “Integration of hybrid wireless networks in cloud services oriented enterprise information
systems,” Enterp. Inf. Syst. 6(2):165187.
[20] L. Wang, L. Xu, Z. Bi, and Y. Xu, (2014) “Data filtering for RFID and WSN integration,” IEEE Trans. Ind. Informat .10 (1):408418.
[21] L. Ren, L. Zhang, F. Tao, X. Zhang, Y. Luo, and Y. Zhang (2012) “A methodology towards virtualization-based high performance
simulation platform supporting multidisciplinary design of complex products,” Enterp. Inf. Syst. 6 (3 ):267290.
[22] F. Tao, Y. Laili, L. Xu, and L. Zhang.(2013) “FC-PACO-RM: A parallel method for service composition optimal-selection in cloud
manufacturing system,” IEEE Trans. Ind. Informat. 9( 4):20232033.
Rishika Mehta et al. / Procedia Computer Science 132 (2018) 1263–1269 1269
Rishika Mehta/ Procedia Computer Science 00 (2018) 000000 7
[23] Q. Li, Z. Wang, W. Li, J. Li, C. Wang, and R. Du. (2013) “Applications integration in a hybrid cloud computing environment: Modelling
and platform,” Enterp. Inf. Syst.7 (3):237271.
[24] M. Zhang, T. Yu, G.F. Zhai. (2011)”Smart Transport System Based on The Internet of Things,” Amm. 48(49):10731076.
[25] M. Yun, B. Yuxin. (2010) “Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid”, Advances in
Energy Engineering (ICAEE):6972.
[26] H. Jun-Wei, Y. Shouyi, L. Leibo, Z. Zhen, W. Shaojun. (2011) “A Crop Monitoring System Based on Wireless Sensor Network, Procedia
Environmental Sciences:558565.
[27] D.Singh. (2013) "Developing an Architecture: Scalability, Mobility, Control, and Isolation on Future Internet Services", Second
International Conference on Advances in Computing, Communications and Informatics (ICACCI-2013), Mysore, India.
[28] Z. Hu. (2011) “The research of several key question of Internet of Things,” International Conference on Intelligence Science and
Information Engineering (ISIE).
[29] Da Xu, Li, Wu He, and Shancang Li. (2014) "Internet of things in industries: A survey." IEEE Transactions on industrial
informatics 10(4):2233-2243.
[30] Ashton, Kevin (2009), "That ‘internet of things’ thing." RFID journal 22(7):97-114.
... IoT vision systems can oversee quality control processes, ensuring that products meet stringent standards. IoT vision to enhance the customer experience through personalized advertisements and automated checkout systems [8][9][10] . • The Internet of Things (IoT) represents a massive shift in the way we interact with technology, integrating a network of interconnected devices capable of collecting and exchanging data. ...
... Through intelligent resource management and environmental monitoring, IoT can contribute to a more sustainable future [10][11][12][13] . ...
Article
Full-text available
The Internet of Things (IoT) represents a paradigm shift in how perceive and interact with the physical world through technology. At its essence, IoT is a concept where everyday objects, equipped with sensors, software, and connectivity, can collect and exchange data over the internet. This interconnected network of devices enables seamless communication and interaction between physical and digital systems, creating opportunities for automation, efficiency improvements, and enhanced decision-making capabilities. IoT applications span a wide range of domains including smart homes, healthcare, agriculture, transportation, and manufacturing, where sensors gather real-time data, which is then processed and analyzed to derive actionable insights. The theoretical underpinnings of IoT emphasize connectivity, data analytics, automation, and the potential for transformative impact across industries. However, challenges such as security, privacy, interoperability, and managing vast amounts of data remain critical considerations in realizing the full potential of IoT. As technology advances and standards evolve, the theoretical promise of IoT continues to drive innovation, offering a vision of a more connected, intelligent, and efficient world.
... The progress in both technologies has driven the expansion of IoT. Additionally, all these elements are connected through communication protocol and a wide range of other technologies and devices like barcodes, location-based services, Service-Oriented Architecture (SOA), WiMAX, Zig-Bee, cloud computing, low-power Wi-Fi, Message Queuing Telemetry Transport (MQTT), Low Power Personal Area Network for IPv6 (6LoWPAN), Near Field Communication (NFC), Bluetooth Low Energy (BLE), to create a comprehensive network that empowers IoT [41], [42]. Figure 3 depicts the IoT architecture enabling technologies. ...
... The desired features of architecture for IoT include scalability, interoperability, reliability, QoS, and decentralization of hetero-geneous devices in IoT within design. As a result, breaking down the IoT architecture into four stages is seen as a more powerful way to facilitate interactions amongst IoT devices in real-time situations [41], [43], [44]. ...
Article
Full-text available
The rapid advancement of technology has set higher standards for the next generation of wireless communication networks, known as 6G. These networks go beyond the simple task of connecting devices and aim to establish a self-sustaining system within society. One of the key factors in achieving this goal is the integration of AI services and apps through the Internet of Things (IoT), which will be made possible with the support of 6G technology. The advancement of artificial intelligence (AI) will play a crucial role in enhancing the protocols, architectures, and operations of 6G networks. To achieve collaborative AI in IoT applications, Federated Learning (FL) has emerged as a popular method. FL enables AI training without the need for data sharing, ensuring privacy and security. However, FL also faces challenges, such as the presence of malicious data and the risk of single-point failure. To address these concerns, blockchain technology (BCT) offers a secure and efficient solution. By leveraging blockchain, these issues can be effectively tackled, providing a reliable framework for implementing FL-IoT applications.
... Additionally, they needed a technology that allows them to gather, manage, process, and analyze the data generated by devices that can sense events and contexts and act accordingly [4]. The IoT technology has enabled organizations to enhance their efficiency by automating their production and logistics [5] [6]. IoT permitted a transparent and visible supply chain that allowed companies to reduce inventory costs and improve service delivery. ...
... These advancements promise to not only enhance our quality of life but also optimize resource utilization, making the most of our finite resources. This section delves into the various definitions of IoT and explores the foundational building blocks that make it all possible [21][22]. ...
Chapter
The landscape of wireless communication networks has undergone a breathtaking evolution in recent years, reshaping how we connect, communicate, and interact with the world. This transformation is not merely a technological revolution but a profound societal shift that has touched every aspect of our lives. This book, "Wireless Communication Networks and Applications," is an expansive and in-depth exploration of this dynamic field, offering readers a comprehensive guide to the fundamental principles, state-of-the-art technologies, and practical applications that define the realm of wireless communications. In the age of ubiquitous connectivity, wireless networks have seamlessly woven into the fabric of our daily routines, fostering instantaneous communication and data transfer across an extensive array of devices and platforms. From smartphones and tablets to wearables and the Internet of Things (IoT) devices, the influence of wireless networks is omnipresent, reshaping how we work, entertain ourselves, and stay connected. This book endeavors to unravel the intricacies of wireless communication networks, providing readers with a robust foundation in the underlying theories, protocols, and architectures that govern their operations. The exploration spans a diverse range of topics, delving into the physics of radio wave propagation, sophisticated modulation techniques, multiple access schemes, and the critical considerations of network security. By covering such a broad spectrum, the book ensures that readers gain a holistic understanding of the multifaceted world of wireless communication networks. Furthermore, it is attuned to the field's pulse, addressing the latest advancements in wireless technologies, such as the deployment of 5G networks, the advent of Wi-Fi 6, and the emergence of novel wireless standards. By doing so, the book equips readers with the knowledge and insights necessary to navigate the rapidly evolving wireless landscape with confidence and foresight. Beyond theoretical foundations, the book extends its reach into the practical realm, exploring the real-world applications of wireless networks across diverse domains. Cellular networks, wireless sensor networks, and vehicular networks are scrutinized for their tangible impacts and potential contributions to society. Real-world case studies and practical examples are interwoven seamlessly throughout the book, serving as beacons of illumination that reinforce theoretical concepts and shed light on the challenges and solutions inherent in designing, deploying, and optimizing wireless communication networks. Designed to cater to a diverse audience, whether students, researchers, engineers, or wireless communication enthusiasts, this book strives to be a valuable and accessible resource. As we navigate the intricate pathways of wireless communication networks, this book serves as a compass, pointing us toward a deeper understanding of the subject matter and providing a panoramic view of this everevolving field's vast potential and future directions. With its comprehensive coverage, practical examples, and forward-looking perspective, "Wireless Communication Networks and Applications" is an essential addition to anyone seeking to deepen their understanding and stay abreast of the latest developments in this dynamic and exciting domain
Article
Full-text available
Radio Frequency Identification RFID is a non-contact automatic identification technology, which signals through radio frequency automatic identification and access to relevant target data, no need for manual intervention to identify job can work in a variety of harsh environment. Because the logistics in the production control flow with information not to match, more and more can not satisfy a realistic and future demand. Internet of Things overcome traditional the blemish of the form code, be subjected to international logistics field and international community business enterprise biggest concern and research.
Article
Full-text available
Internet of Things (IoT) has provided a promising opportunity to build powerful industrial systems and applications by leveraging the growing ubiquity of radio-frequency identification (RFID), and wireless, mobile, and sensor devices. A wide range of industrial IoT applications have been developed and deployed in recent years. In an effort to understand the development of IoT in industries, this paper reviews the current research of IoT, key enabling technologies, major IoT applications in industries, and identifies research trends and challenges. A main contribution of this review paper is that it summarizes the current state-of-the-art IoT in industries systematically.
Article
Full-text available
In order to realize the full-scale sharing, free circulation and transaction, and on-demand-use of manufacturing resource and capabilities in modern enterprise systems (ES), Cloud manufacturing (CMfg) as a new service-oriented manufacturing paradigm has been proposed recently. Compared with cloud computing, the services that are managed in CMfg include not only computational and software resource and capability service, but also various manufacturing resources and capability service. These various dynamic services make ES more powerful and to be a higher-level extension of traditional services. Thus, as a key issue for the implementation of CMfg-based ES, service composition optimal-selection (SCOS) is becoming very important. SCOS is a typical NP-hard problem with the characteristics of dynamic and uncertainty. Solving large scale SCOS problem with numerous constraints in CMfg by using the traditional methods might be inefficient. To overcome this shortcoming, the formulation of SCOS in CMfg with multiple objectives and constraints is investigated first, and then a novel parallel intelligent algorithm, namely full connection based parallel adaptive chaos optimization with reflex migration (FC-PACO-RM) is developed. In the algorithm, roulette wheel selection and adaptive chaos optimization are introduced for search purpose, while full-connection parallelization in island model and new reflex migration way are also developed for efficient decision. To validate the performance of FC-PACO-RM, comparisons with 3 serial algorithms and 7 typical parallel methods are conducted in three typical cases. The results demonstrate the effectiveness of the proposed method for addressing complex SCOS in CMfg.
Article
Today's manufacturing environments are very dynamic and turbulent. Traditional enterprise information systems (EISs) have mostly been implemented upon hierarchical architectures, which are inflexible to adapt changes and uncertainties promptly. Next-generation EISs must be agile and adaptable to accommodate changes without significant time delays. It is essential for an EIS to obtain real-time data from the distributed and dynamic manufacturing environment for decision making. Wireless sensor networks (WSNs) and radio-frequency identification (RFID) systems provide an excellent infrastructure for data acquisition, distribution, and processing. In this paper, some key challenges related to the integration of WSN and RFID technologies are discussed. A five-layer system architecture has been proposed to achieve synergistic performance. For the integration of WSN and RFID, one of the critical issues is the low efficiency of communication due to redundant data as redundant data increases energy consumption and causes time delay. To address it, an improved data cleaning algorithm has been proposed; its feasibility and effectiveness have been verified via simulation and a comparison with a published algorithm. To illustrate the capacity of the developed architecture and new data cleaning algorithm, their application in relief supplies storage management has been discussed.
Article
Many industrial enterprises acquire disparate systems and applications over the years. The need to integrate these different systems and applications is often prominent for satisfying business requirements and needs. In an effort to help researchers in industrial informatics understand the state-of-the-art of the enterprise application integration, we examined the architectures and technologies for integrating distributed enterprise applications, illustrated their strengths and weaknesses, and identified research trends and opportunities in this increasingly important area.
Article
The emerging compressed sensing (CS) theory can significantly reduce the number of sampling points that directly corresponds to the volume of data collected, which means that part of the redundant data is never acquired. It makes it possible to create standalone and net-centric applications with fewer resources required in Internet of Things (IoT). CS-based signal and information acquisition/compression paradigm combines the nonlinear reconstruction algorithm and random sampling on a sparse basis that provides a promising approach to compress signal and data in information systems. This paper investigates how CS can provide new insights into data sampling and acquisition in wireless sensor networks and IoT. First, we briefly introduce the CS theory with respect to the sampling and transmission coordination during the network lifetime through providing a compressed sampling process with low computation costs. Then, a CS-based framework is proposed for IoT, in which the end nodes measure, transmit, and store the sampled data in the framework. Then, an efficient cluster-sparse reconstruction algorithm is proposed for in-network compression aiming at more accurate data reconstruction and lower energy efficiency. Performance is evaluated with respect to network size using datasets acquired by a real-life deployment.
Conference Paper
We are designing a novel architecture to support future internet services which is going to solve fundamental issues such as addressing, mobility, routing scalability challenges, security and control to support trillion of things to connect with internet. In this paper we have presented an efficient hierarchical identification mapping server (IMS) which uses separation mechanism of identification (ID) and location (LOC). IMS introduces huge amount of LOC independent globally unique Flat ID and Bloom Filter (BF) has been introduces the management of Flat IDs during the Lookup process into the IMS. Hence, we can state that hierarchical IMS architecture could be an alternative solution of current internet oriented innovations in a scalable manner. The aim of architecture is the coverage of Internet and sensors oriented smart objects.
Article
The paper analyzes the characteristics of an intelligent transportation system (ITS) to explore the impact on urban transport of the ideas from "the Internet of Things (IOT)" before its official appearance, and further outlook for the driving force from smart traffic guided by IOT.
Article
With the development of application services providers and cloud computing, more and more small- and medium-sized business enterprises use software services and even infrastructure services provided by professional information service companies to replace all or part of their information systems (ISs). These information service companies provide applications, such as data storage, computing processes, document sharing and even management information system services as public resources to support the business process management of their customers. However, no cloud computing service vendor can satisfy the full functional IS requirements of an enterprise. As a result, enterprises often have to simultaneously use systems distributed in different clouds and their intra enterprise ISs. Thus, this article presents a framework to integrate applications deployed in public clouds and intra ISs. A run-time platform is developed and a cross-computing environment process modelling technique is also developed to improve the feasibility of ISs under hybrid cloud computing environments.