... Therefore, to reduce the risk of hacking essential data and to increase data protection such as a person's behavior pattern, habits, sleeping order, locations, and physical conditions over time-trust and privacy are very challenging as open issues. • Power management: Based on the studied literature, energy consumption (Wu et al., 2017), (Wu et al., 2018), (Niitsuet al., 2018), (Tekeste et al., 2019), (Hallforset al., 2018), (Ray et al., 2019d), (Yang et al., 2016), (He et al., 2017) Sensor-based and resource-based approaches Central South University, China (Chen et al., 2018), (Tang et al., 2019) Sensor-based and security-based approaches COMSATS Institute of Information Technology, Pakistan , Application-based approaches ESCP Business School, France (Zhou and Piramuthu, 2018), ( Jia et al., 2018) Security Security-based approaches Monash University, Australia (Wu et al., 2017), (Wu et al., 2018) Sensor-based approaches National Dong Hwa University, Taiwan (Yeh, 2016), (Hou and Yeh, 2015) Security-based approaches National Institute of Standards and Technology, USA (Laplante et al., 2018), ( Laplante et al., 2018) Application-based approaches Pennsylvania State University, USA (Laplante et al., 2018), ( Laplante et al., 2018) Application-based approaches Singapore Approaches University, Singapore Sensor-based approaches Widener University, USA (Laplante et al., 2018), ( Laplante et al., 2018) Application-based approaches Shahed University, Iran (Akhbarifar et al., 2020), ( Fotouhi et al., 2020) Communicationbased and resourcebased approaches National University of Singapore, Singapore (Sengupta and Bhunia, 2020), (Gope et al., 2020) Application-based and resource-based approaches Beirut Arab University, Lebanon (Muthuet al., 2020), (Huifeng et al., 2020) Sensor-based approaches (Elstset al., 2018), (Chen et al., 2018), (Abdelmoneem et al., 2020), (Awanet al., 2019), (Sengupta and Bhunia, 2020), (Minet al., 2019), (Bharathiet al., 2020), (Catarinucciet al., 2015), (Abdellatif et al., 2018), (Aktas et al., 2018), (Chehri and Mouftah, 2020), (Qiu et al., 2017), (Chanak and Banerjee, 2020), (Sharavana Kumar and Sarma Dhulipala, 2020), (Tuliet al., 2020), (Rahmaniet al., 2018), (Ramírez López et al., 2019), , (Vedaeiet al., 2020), (Boussada et al., 2019), (Tao et al., 2019), (Rani et al., 2019), (Hamza et al., 2020), (Yang et al., 2019), (Aghili et al., 2019), (Karimian et al., 2019), (Benadda et al., 2018), , (Xu, 2020), (Islam and Young Shin, 2020), (Li and Jing, 2019), (Gope and Hwang, 2016), (Ullah et al., 2020b) is the main open issue to decrease high operational costs and massive carbon production in HIoT systems. In addition, a typical HIoT network includes small devices with limited battery power. ...