A Review On Internet of Things (Iot) : International Journal of Computer Applications March 2015

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

See

discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/273693976

A Review on Internet of Things (IoT)

Article in International Journal of Computer Applications · March 2015


DOI: 10.5120/19787-1571

CITATIONS READS

11 4,042

5 authors, including:

Muhammad Umar Farooq Muhammad Waseem


PAF Karachi Institute of Economics & Techno… Sir Syed University of Engineering and Techn…
3 PUBLICATIONS 36 CITATIONS 8 PUBLICATIONS 42 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Muhammad Umar Farooq on 17 March 2015.

The user has requested enhancement of the downloaded file.


International Journal of Computer Applications (0975 8887)
Volume 113 - No. 1, March 2015

A Review on Internet of Things (IoT)

M.U. Farooq Muhammad Waseem Sadia Mazhar


Electronic Engineering Department Telecomm. Engineering Department Electrical Engineering Department
PAF-Karachi Institute of Sir Syed University of Sir Syed University of
Economics & Technology, Engineering & Technology, Engineering & Technology,
Pakistan Pakistan Pakistan

Anjum Khairi Talha Kamal


Electronic Engineering Department Bio Medical Engineering Department
Sir Syed University of Sir Syed University of
Engineering & Technology, Engineering & Technology,
Pakistan Pakistan

ABSTRACT computing was first given by Mark Weiser [5]. However in 1999,
Bill Joy gave a clue about Device to Device communication in his
Internet, a revolutionary invention, is always transforming into taxonomy of internet [6]. In the very same year, Kevin Ashton pro-
some new kind of hardware and software making it unavoidable posed the term ”Internet of Things” to describe a system of inter-
for anyone. The form of communication that we see now is either connected devices [7].
human-human or human-device, but the Internet of Things (IoT)
promises a great future for the internet where the type of commu- The basic idea of IoT is to allow autonomous exchange of useful
nication is machine-machine (M2M). This paper aims to provide information between invisibly embedded different uniquely iden-
a comprehensive overview of the IoT scenario and reviews its en- tifiable real world devices around us, fueled by the leading tech-
abling technologies and the sensor networks. Also, it describes a nologies like Radio-Frequency IDentification (RFID) and Wireless
six-layered architecture of IoT and points out the related key chal- Sensor Networks (WSNs) [2] which are sensed by the sensor de-
lenges. vices and further processed for decision making, on the basis of
which an automated action is performed [1].
Keywords:
Internet of Things, RFID, WSN, IOT architecture, IoT Vision, IoT
applications, IoT security.

1. INTRODUCTION
With the continuous advancements in technology a potential in-
novation, IoT is coming down the road which is burgeoning as
an ubiquitous global computing network where everyone and ev-
erything will be connected to the Internet [1]. IoT is continually
evolving and is a hot research topic where opportunities are infi-
nite. Imaginations are boundless which have put it on the verge
of reshaping the current form of internet into a modified and inte-
grated version. The number of devices availing internet services is
increasing every day and having all of them connected by wire or
wireless will put a powerful source of information at our finger tips.
The concept of enabling interaction between intelligent machines is
a cutting-edge technology but the technologies composing the IoT
Fig. 1. Expected penetration of connected objects by the year 2020, ac-
are not something new for us [2]. IoT, as you can guess by its name,
cording to Cisco
is the approach of converging data obtained from different kinds of
things to any virtual platform on existing Internet infrastructure [3].
The concept of IoT dates back to 1982 when a modified coke ma- The paper is organized as follows. Section 2 analyzes the vision of
chine was connected to the Internet which was able to report the the IoT. Section 3 describes the generic architecture of the IoT. Sec-
drinks contained and that whether the drinks were cold [4]. Later, tion 4 discusses the technologies that IoT is composed of. Section
in 1991, a contemporary vision of IoT in the form of ubiquitous 5 forecasts the future applications. Section 6 discusses the privacy

1
International Journal of Computer Applications (0975 8887)
Volume 113 - No. 1, March 2015

and security challenges posed by IoT and finally Section 7 con-


cludes the paper.

2. VISION
In 2005, ITU reported about a ubiquitous networking era in which
all the networks are interconnected and everything from tires to
attires will be a part of this huge network [8]. Imagine yourself do-
ing an internet search for your watch you lost somewhere in your
house. So this is the main vision of IoT, an environment where
things are able to talk and their data can be processed to perform
desired tasks through machine learning [9]. A practical implemen-
tation of IoT is demonstrated by a soon-to-be released Twine, a
compact and low-power hardware working together with real-time
web software to make this vision a reality [10]. However different
people and organizations have their own different visions for the
IoT [11].
An article published in Network World revealed IoT strategies of
top IT vendors, they carried out some interviews from the key IT
vendors. As of HP’s vision, they see a world where people are al-
ways connected to their content. Cisco believes in the industrial Fig. 2. Six-Layered Architecture of IoT
automation and convergence of operational technology. Intel is fo-
cused on empowering billions of existing devices with intelligence. 3.2 Perception Layer
Microsoft does not consider IoT as any futuristic technology; they
This is the device layer of IoT which gives a physical meaning to
believe that it already exists in today’s powerful devices and that
each object. It consists of data sensors in different forms like RFID
the devices just need to be connected for a large amount of informa-
tags, IR sensors or other sensor networks [23] which could sense
tion which could be helpful. While, IBM has a vision of a Smarter
the temperature, humidity, speed and location etc of the objects.
Planet by remotely controlling the devices via secured servers [12].
This layer gathers the useful information of the objects from the
Despite of having different visions, they all agree about a network sensor devices linked with them and converts the information into
of interconnected devices therefore more developments within the digital signals which is then passed onto the Network Layer for
coming decades are expected to be seen including that of a new further action.
converged information society [13].
3.3 Network Layer
3. ARCHITECTURE The purpose of this layer is receive the useful information in the
form of digital signals from the Perception Layer and transmit it to
More than 25 Billion things are expected to be connected by 2020 the processing systems in the Middleware Layer through the trans-
[14] which is a huge number so the existing architecture of Internet mission mediums like WiFi, Bluetooth, WiMaX, Zigbee, GSM, 3G
with TCP/IP protocols, adopted in 1980 [15], cannot handle a net- etc with protocols like IPv4, IPv6, MQTT, DDS etc [24].
work as big as IoT which caused a need for a new open architecture
that could address various security and Quality of Service (QoS) 3.4 Middlware Layer
issues as well as it could support the existing network applications
using open protocols [16]. Without a proper privacy assurance, IoT This layer processes the information received from the sensor de-
is not likely to be adopted by many [17]. Therefore protection of vices [2]. It includes the technologies like Cloud computing, Ubiq-
data and privacy of users are key challenges for IoT [18]. uitous computing which ensures a direct access to the database to
store all the necessary information in it. Using some Intelligent Pro-
For further development of IoT, a number of multi-layered security cessing Equipment, the information is processed and a fully auto-
architectures are proposed. [19] described a three key level archi- mated action is taken based on the processed results of the infor-
tecture of IoT while [20] described a four key level architecture. mation.
[21] proposed a five layered architecture using the best features of
the architectures of Internet and Telecommunication management 3.5 Application Layer
networks based on TCP/IP and TMN models respectively. Simi-
larly a six-layered architecture was also proposed based on the net- This layer realizes the applications of IoT for all kinds of industry,
work hierarchical structure [22]. So generally it’s divided into six based on the processed data. Because applications promote the de-
layers as shown in the Fig. 2. velopment of IoT so this layer is very helpful in the large scale de-
velopment of IoT network [21]. The IoT related applications could
The six layers of IoT are described below: be smart homes, smart transportation, smart planet etc.

3.1 Coding Layer 3.6 Business Layer


Coding layer is the foundation of IoT which provides identification This layer manages the applications and services of IoT and is re-
to the objects of interest. In this layer, each object is assigned a sponsible for all the research related to IoT. It generates different
unique ID which makes it easy to discern the objects [22]. business models for effective business strategies [1].

2
International Journal of Computer Applications (0975 8887)
Volume 113 - No. 1, March 2015

4. TECHNOLOGIES 4.2 Wireless Sensor Network (WSN)


The development of a ubiquitous computing system where digi-
tal objects can be uniquely identified and can be able to think and WSN is a bi-directional wirelessly connected network of sensors in
interact with other objects to collect data on the basis of which au- a multi-hop fashion, built from several nodes scattered in a sensor
tomated actions are taken, requires the need for a combination of field each connected to one or several sensors which can collect the
new and effective technologies which is only possible through an object specific data such as temperature, humidity, speed etc and
integration of different technologies which can make the objects to then pass on to the processing equipment [26]. The sensing nodes
be identified and communicate with each other [25]. In this section communicate in multi-hop Each sensor is a transceiver having an
we discuss the relevant technologies that can help in the large-scale antenna, a micro-controller and an interfacing circuit for the sensors
development of IoT. as a communication, actuation and sensing unit respectively along
with a source of power which could be both battery or any energy
4.1 Radio Frequency IDentification (RFID) harvesting technology [29] However [2] has proposed an additional
unit for saving the data, named as Memory Unit which could also
be a part of the sensing node. A typical sensing node is shown in
RFID is the key technology for making the objects uniquely iden- the figure below:
tifiable. Its reduced size and cost makes it integrable into any ob-
ject [19]. It is a transceiver microchip similar to an adhesive sticker
which could be both active and passive, depending on the type of
application [26]. Active tags have a battery attached to them due
to which they are always active and therefore continuously emit
the data signals while Passive tags just get activated when they are
triggered. Active tags are more costly than the Passive tags however
they have a wide range of useful applications [2]. RFID system is
composed of readers and associated RFID tags which emit the iden-
tification, location or any other specifics about the object, on get-
ting triggered by the generation of any appropriate signal [27]. The
emitted object related data signals are transmitted to the Readers
using radio frequencies which are then passed onto the processors
to analyze the data.

Fig. 4. A typical sensing node

Wireless Sensors Network technology and RFID technology when


combined together opens up possibilities for even more smart de-
vices, for which a number of solutions have been proposed [26]. An
example solution is provided by the Intel Research Labs in the form
of Wireless Identification Sensing Platform (WISP) [30]. WISP is a
passive wireless sensor network with built-in light, temperature and
many other sensors [31]. Both WSN and RFID Sensor Networks
have their own advantages but RFID Sensor Networks have a low
range and their communication is Asymmetric while WSNs have
Fig. 3. RFID Scenario a comparatively longer range and their communication is Peer-to-
Peer. Moreover most of the WSNs are based on the IEEE 802.15.4
Depending on the type of application, RFID frequencies are divided standard [26], which specifies the Physical and MAC layer of Low-
into four different frequencies ranges [28], which are given below: Rate Wireless Personal Area Networks (LR-WPANs) [32].
(1) Low frequency (135 KHz or less) The technologies that enables the integration of WSN with the IOT
are a hot research topic, many solutions have been proposed for that
(2) High Frequency (13.56MHz) including that of a 6LOWPAN standard [33], that allows IPv6 pack-
(3) Ultra-High Frequency (862MHz 928MHz) ets to be transmitted through the networks that are computationally
(4) Microwave Frequency (2.4G , 5.80) restricted. Also there’s ROLL routing standard for end-to-end rout-
ing solutions [34].
Bar Code is also an identification technology which has almost the
same function as an RFID but RFID is more effective than a Bar 4.3 Cloud Computing
Code due to a number of its benefits. RFID being a radio technol-
ogy doesn’t require the reader to be physically in its vision while With millions of devices expected to come by 2020 [14], the cloud
Bar Code is an optical technology which cannot work unless its seems to be the only technology that can analyze and store all the
reader is placed in front of it. Moreover, an RFID can work as an data effectively. It is an intelligent computing technology in which
actuator to trigger different events and it has even modification abil- number of servers are converged on one cloud platform to allow
ities which Bar codes clearly don’t have. sharing of resources between each other which can be accessed at

3
International Journal of Computer Applications (0975 8887)
Volume 113 - No. 1, March 2015

any time and any place [35]. Cloud computing is the most important combined with Nano technologies are a cost-effective solution for
part of IoT, which not only converges the servers but also processes improvising the communication system of IoT and other advan-
on an increased processing power and analyzes the useful infor- tages like size reduction of sensors and actuators, integrated ubiq-
mation obtained from the sensors and even provide good storage uitous computing devices and higher range of frequencies etc [39].
capacity [36]. But this is just a beginning of unleashing the true po-
tential of this technology. Cloud computing interfaced with smart 4.7 Optical Technologies
objects using potentially millions of sensors can be of enormous
benefits and can help IoT for a very large scale development so re- Rapid developments in the field of Optical technologies in the form
searches are being carried out since IoT will be totally dependent of technologies like Li-Fi and Cisco’s BiDi optical technology
on the Cloud Computing. could be a major breakthrough in the development of IoT. Li-Fi,
an epoch-making Visible Light Communication (VLC) technology,
will provide a great connectivity on a higher bandwidth for the ob-
jects interconnected on the concept of IoT. Similarly Bi-Directional
(BiDi) technology gives a 40G ethernet for a big data from multi-
farious devices of IoT [40].

5. APPLICATIONS
Most of the daily life applications that we normally see are al-
ready smart but they are unable to communicate with each other
and enabling them to communicate with each other and share use-
ful information with each other will create a wide range of inno-
vative applications [41]. These emerging applications with some
autonomous capabilities would certainly improve the quality of our
lives. A few of such applications are already in the market [26], let’s
take the example of the Google Car which is an initiative to provide
a self-driving car experience with real-time traffic, road conditions,
Fig. 5. A typical Cloud Computing Scenario weather and other information exchanges [42], all due to the con-
cept of IoT. There are a number of possible future applications that
can be of great advantage. In this section, we present few of these
applications.
4.4 Networking Technologies
5.0.1 Smart Traffic System. Traffic is an important part of a soci-
These technologies have an important role in the success of IoT ety therefore all the related problems must be properly addressed.
since they are responsible for the connection between the objects, There is a need for a system that can improve the traffic situation
so we need a fast and an effective network to handle a large number based on the traffic information obtained from objects using IoT
of potential devices. For wide-range transmission network we com- technologies [43]. For such an intelligent traffic monitoring sys-
monly use 3G, 4G etc. but As we know, mobile traffic is so much tem, realization of a proper system for automatic identification of
predictable since it only has to perform the usual tasks like making vehicles and other traffic factors is very important for which we
a call, sending a text message etc. so as we step into this modern era need IoT technologies instead of using common image processing
of ubiquitous computing, it will not be predictable anymore which methods [44]. The intelligent traffic monitoring system will provide
calls for a need of a super-fast, super-efficient fifth generation wire- a good transportation experience by easing the congestion. It will
less system which could offer a lot more bandwidth [37]. Similarly provide features like theft-detection, reporting of traffic accidents,
for a short-range communication network we use technologies like less environmental pollution. The roads of this smart city will give
Bluetooth, WiFi etc. diversions with climatic changes or unexpected traffic jams due to
which driving and walking routes will be optimized [1]. The traf-
4.5 Nano Technologies fic lighting system will be weather adaptive to save energy. Avail-
ability of parking spaces throughout the city will be accessible by
everyone.
This technology realizes smaller and improved version of the things
that are interconnected. It can decrease the consumption of a sys- 5.0.2 Smart Environment. Prediction of natural disasters such as
tem by enabling the development of devices in nano meters scale flood, fire, earthquakes etc will be possible due to innovative tech-
which can be used as a sensor and an actuator just like a normal nologies of IoT. There will be a proper monitoring of air pollution
device. Such a nano device is made from nano components and in the environment.
the resulting network defines a new networking paradigm which is
Internet of Nano-Things [38]. 5.0.3 Smart Home. IoT will also provide DIY solutions for
Home Automation with which we will be able to remotely con-
4.6 Micro-Electro-Mechanical Systems (MEMS) trol our appliances as per our needs. Proper monitoring of utility
meters, energy and water supply will help saving resources and
Technologies detecting unexpected overloading, water leaks etc. There will be
MEMS are a combination of electric and mechanical components proper encroachment detection system which will prevent burglar-
working together to provide several applications including sensing ies. Gardening sensors will be able to measure the light, humidity,
and actuating which are already being commercially used in many temperature, moisture and other gardening vitals, as well as it will
field in the form of transducers and accelerometers etc. MEMS water the plants according to their needs.

4
International Journal of Computer Applications (0975 8887)
Volume 113 - No. 1, March 2015

5.0.4 Smart Hospitals. Hospitals will be equipped with smart 6.3 Cloud Computing Abuse
flexible wearable embedded with RFID tags which will be given to
the patients on arrivals, through which not just doctors but nurses Cloud Computing is a big network of converged servers which
will also be able to monitor heart rate, blood pressure, temperature allow sharing of resources between each other. These shared re-
and other conditions of patients inside or outside the premises of sources can face a lot of security threats like Man-in-the-middle
hospital [45]. There are many medical emergencies such as cardiac attack (MITM), Phishing etc. Steps must be taken to ensure the
arrest but ambulances take some time to reach patient, Drone Am- complete security of the clouding platform [49]. Cloud Security
bulances are already in the market which can fly to the scene with Alliance (CSA) proposed some possible threats among which few
the emergency kit so due to proper monitoring, doctors will be able are Malicious Insider, Data Loss, Accounts Hijacking and Mon-
to track the patients and can send in the drone to provide quick strous use of Shared Computers etc [50] which are summarized as
medical care until the ambulance arrive. followed:

5.0.5 Smart Agriculture. It will monitor Soil nutrition, Light, (1) Malicious Insider is a threat that someone from the inside who
Humidity etc and improve the green housing experience by au- have an access to the user’s data could be involved in data ma-
tomatic adjustment of temperature to maximize the production. nipulating.
Accurate watering and fertilization will help improving the water (2) Data Loss is a threat in which any miscreant user who has an
quality and saving the fertilizers respectively [46]. unauthorized access to the network can modify or delete the
existing data.
5.0.6 Smart Retailing and Supply-chain Management. IoT with (3) Man-in-the-middle (MITM) is a kind of Account Hijacking
RFID provides many advantages to retailers. With RFID equipped threat in which the attacker can alter or intercept messages in
products, a retailer can easily track the stocks and detect shoplift- the communication between two parties.
ing. It can keep a track of all the items in a store and to prevent them
from going out-of-stock, it places an order automatically. Moreover (4) Cloud computing could be used in a monstrous ways because if
the retailer can even generate the sales chart and graphs for effec- the attacker gets to upload any malicious software in the server
tive strategies. e.g. using a zombie-army (botnet), it could get the attacker a
control of many other connected devices.

6. SECURITY AND PRIVACY CHALLENGES 7. CONCLUSION


IoT makes every thing and person locatable and addressable which With the incessant burgeoning of the emerging IoT technologies,
will make our lives much easier than before; however without a the concept of Internet of Things will soon be inexorably develop-
lack of confidence about the security and privacy of the user’s data, ing on a very large scale. This emerging paradigm of networking
it’s more unlikely to be adopted by many [47]. So for its ubiquitous will influence every part of our lives ranging from the automated
adoption, IoT must have a strong security infrastructure. Some of houses to smart health and environment monitoring by embedding
the possible IoT related issues are as followed: intelligence into the objects around us. In this paper we discussed
the vision of IoT and presented a well-defined architecture for its
6.1 Unauthorized Access to RFID deployment. Then we highlighted various enabling technologies
and few of the related security threats. And finally we discussed
An unauthorized access to tags that contains the identification data a number of applications resulting from the IoT that are expected
is a major issue of IoT which can expose any kind of confidential to facilitate us in our daily lives. Researches are already being car-
information about the user so it needs to be addressed. Not just the ried out for its wide range adoption, however without addressing
tag can be read by a miscreant reader but it can even be modified or the challenges in its development and providing confidentiality of
possibly be damaged. In this context, [47] summarized some of the the privacy and security to the user, it’s highly unlikely for it to
real life threats of RFID which includes RFID Virus, Side Channel be an omni-present technology. The deployment of IoT requires
Attack with a cell-phone and SpeedPass Hack. strenuous efforts to tackle and present solutions for its security and
privacy threats.
6.2 Sensor-Nodes Security Breach
WSNs are vulnerable to several types of attacks because sensor 8. REFERENCES
nodes are the part of a bi-directional sensor network as discussed in [1] Rafiullah Khan, Sarmad Ullah Khan, Rifaqat Zaheer and
Section 4.2, which means other than the transmission of data, ac- Shahid Khan, ”Future Internet: The Internet of Things Archi-
quisition of data is also possible. [48] described some of the possi- tecture, Possible Applications and Key Challenges,” in Pro-
ble attacks that includes Jamming, tampering, Sybil, Flooding and ceedings of Frontiers of Information Technology (FIT), 2012,
some other kinds of attacks, which are summarized as followed: pp. 257-260
(1) Jamming obstructs the entire network by interfering with the [2] Guicheng Shen and Bingwu Liu, ”The visions, technologies,
frequencies of sensor nodes. applications and security issues of Internet of Things,” in E
-Business and E -Government (ICEE), 2011, pp. 1-4
(2) Tampering is the form of attack in which the node data can
be extracted or altered by the attacker to make a controllable [3] Ling-yuan Zeng, ”A Security Framework for Internet of
node. Things Based on 4G Communication,” in Computer Science
and Network Technology (ICCSNT), 2012, pp. 1715-1718
(3) Sybil attack claims multiple pseudonymous identities for a [4] ”The ”Only” Coke Machine on the Internet,” Carnegie Mellon
node which gives it a big influence. University, School of Computer Science.
(4) Flooding is a kind of a DOS attack caused by a large amount [5] M. Weiser, ”The computer for the 21st century”, Sci. Amer.,
of traffic that results in memory exhaustion. 1991, pp.66 -75

5
International Journal of Computer Applications (0975 8887)
Volume 113 - No. 1, March 2015

[6] Jason Pontin, ”Bill Joy’s Six Webs,” MIT Technology Review, [25] Benjamin Khoo, ”RFID as an Enabler of the Internet of
29 September 2005 Things: Issues of Security and Privacy,” in Internet of Things
[7] Kevin Ashton, ”That ’Internet of Things’ Thing”, RFID Jour- (iThings/CPSCom), 2011, pp. 709-712
nal, 22 June 2009 [26] L.Atzori, A.Iera, G. Morabito, ”The Internet of Things: A sur-
vey,” in Computer Networks - Science Direct
[8] H.D. Ma, ”Internet of things: Objectives and scientific chal-
lenge,” in Journal of Computer Science and Technology, [27] H. Zhang, L. Zhu, ”Internet of Things: Key technology, ar-
2011, pp. 919-924 chitecture and challenging problems”, in Computer Science
and Automation Engineering (CSAE), 2011, Volume: 4, pp.
[9] Nich Heath, ”What the Internet of Things means for you”. 507-512
It can be accessed at:
[28] L.G. Guo, Y.R. Huang, J. Cai, L.G. QU, ”Investigation of Ar-
http://www.techrepublic.com/blog/european-
chitecture, Key Technology and Application Strategy for the
technology/what-the-internet-of-things-means-for-you
Internet of Things,” in Cross Strait Quad-Regional Radio Sci-
[10] ”Twine” by Supermechanical. It can be accessed at: ence and Wireless Technology Conference (CSQRWC), 2011,
http://supermechanical.com/twine Volume: 2, pp. 1196-1199
[11] De-Li Yang, Feng Liu and Yi-Duo Liang, ”A Survey of the In- [29] Sohraby, K., Minoli, D., Znati, T. ”Wireless sensor net-
ternet of Things”, in International Conference on E-Business works: technology, protocols, and applications”, John Wiley
Intelligence (ICEBI), 2010 and Sons, 2007 ISBN 978-0-471-74300-2, pp. 15-18
[12] Bob Violino, ”Top IT Vendors reveal their IOT strategies”. [30] ”WISP” by Intel Labs; It can be accessed at:
It can be accessed at: http://wisp.wikispaces.com
http://www.networkworld.com/article/2604766/internet-of- [31] E. M. Tapia, S. S. Intille, and K. Larson, ”Portable wireless
things/top-it-vendors-reveal-their-iot-strategies.html sensors for object usage sensing in the home: Challenges and
[13] Harald Sundmaeker, Patrick Guillemin, Peter Friess, Sylvie practicalities,” in Proceedings of the European Ambient In-
Woelffl, ”Vision and challenges for realising the Internet of telligence Conference. vol. LNCS 4794 Berlin Heidelberg:
Things,” Publications Office of the European Union, 2010 Springer-Verlag 2007
[14] Gartner, Inc. It can be accessed at: [32] IEEE 802.15 WPAN Task Group 4.
http://www.gartner.com/newsroom/id/2905717 It can be accessed at:
http://www.ieee802.org/15/pub/TG4.html
[15] ”From the ARPANET to the Internet” by Ronda Hauben - [33] G. Montenegro, N. Kushalnagar, J. Hui, D. Culler, ”Transmis-
TCP Digest (UUCP). Retrieved 2007-07-05 sion of IPv6 Packets over IEEE 802.15.4 Networks”
It can be accessed at:
http://www.columbia.edu/ rh120/other/tcpdigest paper.txt [34] R. Roman, C. ALcaraz, J.Lopez, N. Sklavos, ”Key Manage-
ment Systems for Sensor Networks in the Context of the Inter-
[16] Jian An, Xiao-Lin Gui, Xin He, ”Study on the Architecture net of Things,”Computers & Electrical Engineering, Volume:
and Key Technologies for Internet of Things,” in Advances in 37, Issue: 2, 2011, pp. 147-159
Biomedical Engineering, Vol.11, IERI-2012, pp. 329-335 [35] B.B.P. Rao, P.Saluia, N.Sharma, A.Mittal, S.V.Sharma,
[17] Lan Li, ”Study of Security Architecture in the Internet of ”Cloud computing for Internet of Things & sensing based ap-
Things,” in Measurement, Information and Control (MIC), plications,” in Sensing Technology (ICST), 2012 Sixth Inter-
2012, Volume: 1, pp. 374-377 national Conference, IEEE
[18] ”The Internet of Things,” ITU Report, Nov 2005 [36] X.Xiaohui, ”Study on Security Problems and Key Technolo-
[19] Wang Chen, ”AN IBE BASED SECURITY SCHEME OF gies of The Internet of Things,” Computational and Informa-
INTERNET OF THINGS,” in Cloud Computing and Intel- tion Sciences (ICCIS), 2013, pp. 407-410
ligent Systems (CCIS), 2012, pp. 1046, 1049 [37] O.Vermesan, P.Friess, ”Internet of Things ? From Research
and Innovation to Market Deployment,” River Publishers, pp.
[20] Hui Suo, Jiafu Wan, Caifeng Zou, Jianqi Liu, ”Security in 74-75
the Internet of Things: A Review,” in Computer Science and
Electronics Engineering (ICCSEE), 2012, pp. 648-651 [38] I.Akyildiz and J.Jornet, ”THE INTERNET OF NANO-
THINGS,” IEEE Wireless Communications, Volume: 17 Is-
[21] Miao Wu, Ting-lie Lu, Fei-Yang Ling, ling Sun, Hui-Ying Du, sue: 6, 2010, pp. 58-63
”Research on the architecture of Internet of things,” in Ad-
[39] V.M. Lubecke, Jung-Chih Chiao, ”MEMS technologies
vanced Computer Theory and Engineering (ICACTE), 2010,
for enabling high frequency communications circuits,” in
pp. 484-487
Telecommunications in Modern Satellite, Cable and Broad-
[22] Xu Cheng, Minghui Zhang, Fuquan Sun, ”Architecture of in- casting Services, 1999, Volume: 2, pp. 382-389
ternet of things and its key technology integration based-on [40] ”Cisco 40 Gigabit Module”. It can be accessed at:
RFID,” in Fifth International Symposium on Computational http://www.cisco.com/c/en/us/products/interfaces-
Intelligence and Design, pp. 294-297, 2012 modules/40-gigabit-modules/index.html
[23] Debasis Bandyopadhyay, Jaydip Sen, ”Internet of Things - [41] R. Abdmeziem, D.Tandjaoui, ”Internet of Things: Concept,
Applications and Challenges in Technology and Standardiza- Building blocks, Applications and Challenges, Computers
tion” in Wireless Personal Communications, Volume 58, Issue and Society, Cornell University”
1, pp. 49-69 [42] ”What we’re driving at,” Google Official Blog.
[24] Ying Zhang, ”Technology Framework of the Internet of It can be accessed at:
THings and Its Application,” in Electrical and Control En- http://googleblog.blogspot.com/2010/10/what-were-driving-
gineering (ICECE), 2011, pp. 4109-4112 at.html

6
International Journal of Computer Applications (0975 8887)
Volume 113 - No. 1, March 2015

[43] Y.Cao, W.Li, J.Zhang, ”Real-time traffic information collect-


ing and monitoring system based on the internet of things,”
in Pervasive Computing and Applications (ICPCA), 2011 6th
International Conference, pp. 45-49
[44] L.Xiao, Z.Wang, ”Internet of Things: A New Application
for Intelligent Traffic Monitoring System,” in JOURNAL OF
NETWORKS, 2011
[45] P.Fuhrer, D.Guinard, ”Building a Smart Hospital using RFID
technologies,”
[46] F.TongKe, ”Smart Agriculture Based on Cloud Computing
and IoT,” in Journal of Convergence Information Technology
(JCIT), Jan’13
[47] ”RFID Security Issues - Generation2 Security”.
It can be accessed at:
http://www.thingmagic.com/index.php/rfid-security-issues
[48] Y.Wang, G.Attebury And B.Ramamurthy, ”A Survey on Se-
curity Issues in Wireless Sensor Networks,” in IEEE commu-
nications Survey and Tutorials, 2nd Quarter 2006.
[49] M.Aamir, Prof. X.Hong, A.A.Wagan, M.Tahir, M.Asif,
”Cloud Computing Security Challenges and their Compro-
mised Attributes,” in International Journal of Scientific En-
gineering and Technology, Volume 3, Issue 4, pp. 395-399
[50] V. Ashktorab, S.R.Taghizadeh, ”Security Threats and Coun-
termeasures in Cloud Computing,” in International Journal of
Application or Innovation in Engineering and Management
(IJAIEM), Volume 1, Issue 2, Oct’12.

View publication stats

You might also like