Internet of Things (IoT)
E. Bertino, Kim-Kwang Raymond Choo, Dimitrios Georgakopoulos
et al.
The Internet of Things (IoT) is the latest Internet evolution that incorporates a diverse range of things such as sensors, actuators, and services deployed by different organizations and individuals to support a variety of applications. The information captured by IoT present an unprecedented opportunity to solve large-scale problems in those application domains to deliver services; example applications include precision agriculture, environment monitoring, smart health, smart manufacturing, and smart cities. Like all other Internet based services in the past, IoT-based services are also being developed and deployed without security consideration. By nature, IoT devices and services are vulnerable to malicious cyber threats as they cannot be given the same protection that is received by enterprise services within an enterprise perimeter. While IoT services will play an important role in our daily life resulting in improved productivity and quality of life, the trend has also “encouraged” cyber-exploitation and evolution and diversification of malicious cyber threats. Hence, there is a need for coordinated efforts from the research community to address resulting concerns, such as those presented in this special section. Several potential research topics are also identified in this special section.
861 sitasi
en
Computer Science
Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT
Thangaramya Kalidoss, K. Kulothungan, Logambigai Rajasekaran
et al.
Abstract Wireless Sensor Networks (WSNs) are used in the design of Internet of Things (IoT) for sensing the environment, collecting the data and to send them to the base station and the locations used for analysis. In WSNs for IoT, intelligent routing is an important phenomena that is necessary to enhance the Quality of Service (QoS) in the network. Moreover, the energy required for communication in the IoT based sensor networks is an important challenge to avoid immense packet loss or packet drop, fast energy depletion and unfairness across the network leading to reduction in node performance and increase in delay with respect to packet delivery. Hence, there is an extreme need to check energy usage by the nodes in order to enhance the overall network performance through the application of intelligent machine learning techniques for making effective routing decisions. Many approaches are already available in the literature on energy efficient routing for WSNs. However, they must be enhanced to suite the WSN in IoT environment. Therefore, a new Neuro-Fuzzy Rule Based Cluster Formation and Routing Protocol for performing efficient routing in IoT based WSNs. From the experiments conducted in this research work using the proposed model, it is proved that the proposed routing algorithm provided better network performance in terms of the metrics namely energy utilization, packet delivery ratio, delay and network lifetime.
326 sitasi
en
Computer Science
Challenges and opportunities in IoT healthcare systems: a systematic review
Sureshkumar Selvaraj, S. Sundaravaradhan
318 sitasi
en
Computer Science
Machine Learning for Resource Management in Cellular and IoT Networks: Potentials, Current Solutions, and Open Challenges
Fatima Hussain, Syed Ali Hassan, Rasheed Hussain
et al.
Internet-of-Things (IoT) refers to a massively heterogeneous network formed through smart devices connected to the Internet. In the wake of disruptive IoT with a huge amount and variety of data, Machine Learning (ML) and Deep Learning (DL) mechanisms will play a pivotal role to bring intelligence to the IoT networks. Among other aspects, ML and DL can play an essential role in addressing the challenges of resource management in large-scale IoT networks. In this article, we conduct a systematic and in-depth survey of the ML- and DL-based resource management mechanisms in cellular wireless and IoT networks. We start with the challenges of resource management in cellular IoT and low-power IoT networks, review the traditional resource management mechanisms for IoT networks, and motivate the use of ML and DL techniques for resource management in these networks. Then, we provide a comprehensive survey of the existing ML- and DL-based resource management techniques in wireless IoT networks and the techniques specifically designed for HetNets, MIMO and D2D communications, and NOMA networks. To this end, we also identify the future research directions in using ML and DL for resource allocation and management in IoT networks.
311 sitasi
en
Computer Science, Engineering
Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities
Ning Wang, Pu Wang, Amir Alipour-Fanid
et al.
The fifth generation (5G) wireless technologies serve as a key propellent to meet the increasing demands of the future Internet of Things (IoT) networks. For wireless communication security in 5G IoT networks, physical-layer security (PLS) has recently received growing interest. This paper aims to provide a comprehensive survey of the PLS techniques in 5G IoT communication systems. The investigation consists of four hierarchical parts. In the first part, we review the characteristics of 5G IoT under typical application scenarios. We then introduce the security threats from the 5G IoT physical-layer and categorize them according to the different purposes of the attacker. In the third part, we examine the 5G communication technologies in 5G IoT systems and discuss their challenges and opportunities when coping with physical-layer threats, including massive multiple-input-multiple-output (MIMO), millimeter wave (mmWave) communications, nonorthogonal multiple access (NOMA), full-duplex technology, energy harvesting (EH), visible light communication (VLC), and unmanned aerial vehicle (UAV) communications. Finally, we discuss open research problems and future works about PLS in the IoT system with technologies of 5G and beyond.
302 sitasi
en
Computer Science
A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT
Sheng Ding, Jin Cao, Chen Li
et al.
With the sharp increase in the number of intelligent devices, the Internet of Things (IoT) has gained more and more attention and rapid development in recent years. It effectively integrates the physical world with the Internet over existing network infrastructure to facilitate sharing data among intelligent devices. However, its complex and large-scale network structure brings new security risks and challenges to IoT systems. To ensure the security of data, traditional access control technologies are not suitable to be directly used for implementing access control in IoT systems because of their complicated access management and the lack of credibility due to centralization. In this paper, we proposed a novel attribute-based access control scheme for IoT systems, which simplifies greatly the access management. We use blockchain technology to record the distribution of attributes in order to avoid single point failure and data tampering. The access control process has also been optimized to meet the need for high efficiency and lightweight calculation for IoT devices. The security and performance analysis show that our scheme could effectively resist multiple attacks and be efficiently implemented in IoT systems.
284 sitasi
en
Computer Science
A survey of DDoS attacking techniques and defence mechanisms in the IoT network
Ruchi Vishwakarma, A. Jain
280 sitasi
en
Computer Science
Blockchain and IoT-Based Cognitive Edge Framework for Sharing Economy Services in a Smart City
M. A. Rahman, Md Mamunur Rashid, M. S. Hossain
et al.
In this paper, we propose a Blockchain-based infrastructure to support security- and privacy-oriented spatio-temporal smart contract services for the sustainable Internet of Things (IoT)-enabled sharing economy in mega smart cities. The infrastructure leverages cognitive fog nodes at the edge to host and process offloaded geo-tagged multimedia payload and transactions from a mobile edge and IoT nodes, uses AI for processing and extracting significant event information, produces semantic digital analytics, and saves results in Blockchain and decentralized cloud repositories to facilitate sharing economy services. The framework offers a sustainable incentive mechanism, which can potentially support secure smart city services, such as sharing economy, smart contracts, and cyber-physical interaction with Blockchain and IoT. Our unique contribution is justified by detailed system design and implementation of the framework.
259 sitasi
en
Computer Science
IoT Technology, Applications and Challenges: A Contemporary Survey
S. Balaji, Karan Nathani, R. Santhakumar
258 sitasi
en
Computer Science
Machine learning and data analytics for the IoT
Erwin Adi, A. Anwar, Zubair A. Baig
et al.
The Internet of Things (IoT) applications have grown in exorbitant numbers, generating a large amount of data required for intelligent data processing. However, the varying IoT infrastructures (i.e., cloud, edge, fog) and the limitations of the IoT application layer protocols in transmitting/receiving messages become the barriers in creating intelligent IoT applications. These barriers prevent current intelligent IoT applications to adaptively learn from other IoT applications. In this paper, we critically review how IoT-generated data are processed for machine learning analysis and highlight the current challenges in furthering intelligent solutions in the IoT environment. Furthermore, we propose a framework to enable IoT applications to adaptively learn from other IoT applications and present a case study in how the framework can be applied to the real studies in the literature. Finally, we discuss the key factors that have an impact on future intelligent applications for the IoT.
209 sitasi
en
Computer Science, Engineering
LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment
Mohammad Wazid, A. Das, K. VivekanandaBhat
et al.
Abstract Internet of Things (IoT) becomes a new era of the Internet, which consists of several connected physical smart objects (i.e., sensing devices) through the Internet. IoT has different types of applications, such as smart home, wearable devices, smart connected vehicles, industries, and smart cities. Therefore, IoT based applications become the essential parts of our day-to-day life. In a cloud-based IoT environment, cloud platform is used to store the data accessed from the IoT sensors. Such an environment is greatly scalable and it supports real-time event processing which is very important in several scenarios (i.e., IoT sensors based surveillance and monitoring). Since some applications in cloud-based IoT are very critical, the information collected and sent by IoT sensors must not be leaked during the communication. To accord with this, we design a new lightweight authentication mechanism in cloud-based IoT environment, called LAM-CIoT. By using LAM-CIoT, an authenticated user can access the data of IoT sensors remotely. LAM-CIoT applies efficient “one-way cryptographic hash functions” along with “bitwise XOR operations”. In addition, fuzzy extractor mechanism is also employed at the user's end for local biometric verification. LAM-CIoT is methodically analyzed for its security part through the formal security using the broadly-accepted “Real-Or-Random (ROR)” model, formal security verification using the widely-used “Automated Validation of Internet Security Protocols and Applications (AVISPA)” tool as well as the informal security analysis. The performance analysis shows that LAM-CIoT offers better security, and low communication and computation overheads as compared to the closely related authentication schemes. Finally, LAM-CIoT is evaluated using the NS2 network simulator for the measurement of network performance parameters that envisions the impact of LAM-CIoT on the network performance of LAM-CIoT and other schemes.
205 sitasi
en
Computer Science
IoT Ecosystem: A Survey on Devices, Gateways, Operating Systems, Middleware and Communication
Sharu Bansal, Dilip Kumar
201 sitasi
en
Computer Science
An Overview of Patient’s Health Status Monitoring System Based on Internet of Things (IoT)
Kadhim Takleef Kadhim, Ali M. Alsahlany, S. Wadi
et al.
201 sitasi
en
Computer Science
Learning-Driven Detection and Mitigation of DDoS Attack in IoT via SDN-Cloud Architecture
N. Ravi, S. Shalinie
The Internet-of-Things (IoT) network is growing big owing to its utility in smart applications. An IoT network is susceptible to security breaches, in majority due to the resource-constrained nature of IoT. Of the various breaches, the Distributed Denial-of-Service (DDoS) attack can snip off the network service to the users in various ways, such as consumption of server’s resources, saturating link bandwidth, etc. These types of DDoS breaches can turn out to be a catastrophe in critical IoT use cases. This article delves into tackling the DDoS attack triggered by malicious wireless IoT on IoT servers. Our security scheme leverages the cloud and software-defined network (SDN) paradigm to mitigate the DDoS attack on IoT servers. We have proposed a novel mechanism named learning-driven detection mitigation (LEDEM) that detects DDoS using a semisupervised machine-learning algorithm and mitigates DDoS. We tested LEDEM in the testbed and emulated topology, and compared the results with state-of-the-art solutions. We achieved an improved accuracy rate of 96.28% in detecting DDoS attack.
200 sitasi
en
Computer Science
Impact of COVID-19 on IoT Adoption in Healthcare, Smart Homes, Smart Buildings, Smart Cities, Transportation and Industrial IoT
M. Umair, M. A. Cheema, Omer Cheema
et al.
COVID-19 has disrupted normal life and has enforced a substantial change in the policies, priorities and activities of individuals, organisations and governments. These changes are proving to be a catalyst for technology and innovation. In this paper, we discuss the pandemic’s potential impact on the adoption of the Internet of Things (IoT) in various broad sectors, namely healthcare, smart homes, smart buildings, smart cities, transportation and industrial IoT. Our perspective and forecast of this impact on IoT adoption is based on a thorough research literature review, a careful examination of reports from leading consulting firms and interactions with several industry experts. For each of these sectors, we also provide the details of notable IoT initiatives taken in the wake of COVID-19. We also highlight the challenges that need to be addressed and important research directions that will facilitate accelerated IoT adoption.
166 sitasi
en
Computer Science, Medicine
Survey, comparison and research challenges of IoT application protocols for smart farming
D. Glaroudis, Athanasios C. Iossifides, P. Chatzimisios
Abstract Smart farming era has already begun and its societal and environmental implications are expected to be huge. In this context, the Internet of Things (IoT) technologies have become the major path forward towards novel farming practices. The unprecedented capability of data collection and management offered by IoT is based on several factors of the underlying communication network architecture and technology, one of the most important being the application level protocol that is used among IoT nodes, gateways, and application servers. This work offers an up-to-date survey of research efforts on the IoT application layer protocols, focusing on their basic characteristics, their performance as well as their recent use in agricultural applications. Furthermore, it provides a comparison among them, in terms of well-accepted key performance indicators and comments on their suitability in the framework of smart farming as well as the corresponding challenges that have to be faced towards their efficient implementation.
199 sitasi
en
Computer Science
Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management
In Lee
Along with the growing threat of cyberattacks, cybersecurity has become one of the most important areas of the Internet of Things (IoT). The purpose of IoT cybersecurity is to reduce cybersecurity risk for organizations and users through the protection of IoT assets and privacy. New cybersecurity technologies and tools provide potential for better IoT security management. However, there is a lack of effective IoT cyber risk management frameworks for managers. This paper reviews IoT cybersecurity technologies and cyber risk management frameworks. Then, this paper presents a four-layer IoT cyber risk management framework. This paper also applies a linear programming method for the allocation of financial resources to multiple IoT cybersecurity projects. An illustration is provided as a proof of concept.
199 sitasi
en
Computer Science
Understanding acceptance of eHealthcare by IoT natives and IoT immigrants: An integrated model of UTAUT, perceived risk, and financial cost
Wissal Ben Arfi, Imed Ben Nasr, T. Khvatova
et al.
Abstract The Internet of Things (IoT) is a modern disruptive technological approach that connects devices and people in a smart way at any time and at any place. The development of IoT is forecast to generate high economic value, improve efficiency of enterprises’ operational processes, and benefit the personal and professional lives of its end users. This new model of human–technology interaction is under-researched, especially with regard to eHealth. The current study aims to close this research gap by investigating IoT adoption in eHealthcare from the customer perspective and by including financial cost in the extended Unified Theory of Acceptance and Use of Technology (UTAUT) framework. The model is validated based on data collected from a randomly selected sample of 268 potential users of IoT-based healthcare devices in France. Structural modeling reveals that the cost of using IoT in eHealthcare is the key barrier to IoT adoption. Age is a significant mediator of customers’ intention to use IoT in eHealthcare and inspires the formulation of two new categories: IoT natives and IoT immigrants. The findings have practical application for IoT developers, policymakers, and potentially for marketers.
A Review on the Role of Machine Learning in Enabling IoT Based Healthcare Applications
H. Bharadwaj, Aayush Agarwal, V. Chamola
et al.
The Internet of Things (IoT) is playing a vital role in the rapid automation of the healthcare sector. The branch of IoT dedicated towards medical science is at times termed as Healthcare Internet of Things (H-IoT). The key elements of all H-IoT applications are data gathering and processing. Due to the large amount of data involved in healthcare, and the enormous value that accurate predictions hold, the integration of machine learning (ML) algorithms into H-IoT is imperative. This paper aims to serve both as a compilation as well as a review of the various state of the art applications of ML algorithms currently being integrated with H-IoT. Some of the most widely used ML algorithms have been briefly introduced and their use in various H-IoT applications has been analyzed in terms of their advantages, scope, and possible improvements. Applications have been divided into the domains of diagnosis, prognosis and spread control, assistive systems, monitoring, and logistics. In healthcare, practical use of a model requires it to be highly accurate and to have ample measures against security attacks. The applications of ML algorithms in H-IoT discussed in this paper have shown experimental evidence of accuracy and practical usability. The constraints and drawbacks of each of these applications have also been described.
147 sitasi
en
Computer Science
A Survey and Future Directions on Clustering: From WSNs to IoT and Modern Networking Paradigms
A. Shahraki, Amirhosein Taherkordi, Øystein Haugen
et al.
Many Internet of Things (IoT) networks are created as an overlay over traditional ad-hoc networks such as Zigbee. Moreover, IoT networks can resemble ad-hoc networks over networks that support device-to-device (D2D) communication, e.g., D2D-enabled cellular networks and WiFi-Direct. In these ad-hoc types of IoT networks, efficient topology management is a crucial requirement, and in particular in massive scale deployments. Traditionally, clustering has been recognized as a common approach for topology management in ad-hoc networks, e.g., in Wireless Sensor Networks (WSNs). Topology management in WSNs and ad-hoc IoT networks has many design commonalities as both need to transfer data to the destination hop by hop. Thus, WSN clustering techniques can presumably be applied for topology management in ad-hoc IoT networks. This requires a comprehensive study on WSN clustering techniques and investigating their applicability to ad-hoc IoT networks. In this article, we conduct a survey of this field based on the objectives for clustering, such as reducing energy consumption and load balancing, as well as the network properties relevant for efficient clustering in IoT, such as network heterogeneity and mobility. Beyond that, we investigate the advantages and challenges of clustering when IoT is integrated with modern computing and communication technologies such as Blockchain, Fog/Edge computing, and 5G. This survey provides useful insights into research on IoT clustering, allows broader understanding of its design challenges for IoT networks, and sheds light on its future applications in modern technologies integrated with IoT.
141 sitasi
en
Computer Science