The Internet of Things: Definition, Tactile-Oriented Vision, Challenges and Future Research Directions

Author(s):  
Akintayo Johnson Akinyoade ◽  
Opeoluwa Tosin Eluwole
2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


Author(s):  
Maha Saadeh ◽  
Azzam Sleit ◽  
Khair Eddin Sabri ◽  
Wesam Almobaideen

Internet of Things (IoT) is considered as the future of the Internet that connects billions of objects all together. Trusted communication between these objects is a crucial requirement for the wide deployment of IoT services. Consequently, effective authentication procedures should be applied between the communicating objects. This paper provides a comprehensive survey of object authentication in the IoT. The survey aims to direct future researchers in the field of IoT object authentication by delving into the details of authentication schemes and going through different comparisons. Comparisons are based on various criteria which include authentication process characteristics, the underlying architecture, key generation and distribution techniques, supporting IoT challenges, security analysis, and performance evaluation. Additionally, this survey highlights the main issues and challenges of IoT objects authentication and recommends future research directions.


Technologies ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 22
Author(s):  
Eljona Zanaj ◽  
Giuseppe Caso ◽  
Luca De Nardis ◽  
Alireza Mohammadpour ◽  
Özgü Alay ◽  
...  

In the last years, the Internet of Things (IoT) has emerged as a key application context in the design and evolution of technologies in the transition toward a 5G ecosystem. More and more IoT technologies have entered the market and represent important enablers in the deployment of networks of interconnected devices. As network and spatial device densities grow, energy efficiency and consumption are becoming an important aspect in analyzing the performance and suitability of different technologies. In this framework, this survey presents an extensive review of IoT technologies, including both Low-Power Short-Area Networks (LPSANs) and Low-Power Wide-Area Networks (LPWANs), from the perspective of energy efficiency and power consumption. Existing consumption models and energy efficiency mechanisms are categorized, analyzed and discussed, in order to highlight the main trends proposed in literature and standards toward achieving energy-efficient IoT networks. Current limitations and open challenges are also discussed, aiming at highlighting new possible research directions.


2012 ◽  
Vol 198-199 ◽  
pp. 1755-1760 ◽  
Author(s):  
Guo Ping Zhou ◽  
Ya Nan Chen

Applying the Internet of Things (IOT) into ecological environmental monitoring is the goal of this paper. There are several advantages of the Internet of Things (IOT) applying in ecological environment monitoring. A hierarchical monitoring system is presented, including system architecture, hardware/software design, information flow and software implementation. In the end, using carbon dioxide gas in the atmosphere for experimental purposes, in data collection and analysis. Experiments showed that this system is capable of monitoring ecologica environment, which orientate the future research of forest ecosystem.


Info ◽  
2016 ◽  
Vol 18 (3) ◽  
pp. 42-57 ◽  
Author(s):  
Daeho Lee ◽  
Dong-Hee Shin

Purpose The purpose of this study is to categorize network neutrality according to its issues under debate and assess the state of the debate based on such organization. In addition, the study discusses the reasons that network neutrality is so difficult to solve and the future research directions that would do so. Design/methodology/approach This study presents a critical review of the current network neutrality issues and summarizes the economic background of each position in the debate. The relevant literature is organized by issue to examine the reasons that the network neutrality debate is so difficult to solve and determine the further study required to solve it. Findings An analysis of the relevant literature suggests that the proponents and opponents of network neutrality disagree on the best methods of developing the Internet. Therefore, future research and regulatory and practitioners’ applications would greatly benefit from a comprehensive review of that literature. Originality/value Network neutrality regulation is receiving increased attention because the development and significant influences of the Internet are becoming more apparent.


Author(s):  
Elodie Attié ◽  
Lars Meyer-Waarden

The internet of things, or the IoT, is progressively and surely invading environments, and is consequently creating new kinds of consumer needs and behaviors. More and more companies are getting involved in this growing field, showing the importance for them to understand this technology market. This chapter aims at studying the acceptance process of the IoT. More specifically, the main factors that influence consumer decisions to accept and use the IoT and smart objects have been tested, such as the ethical, wellbeing, social, and utility values. The importance of each benefit is demonstrated, according to specific targets and to examples of applications. A system of values that represents the promises of the IoT and the central needs of users is also described. Besides, a typology of users should help companies creating or refining targeting strategies and should guide consumers into their acceptance process. Finally, further research directions are discussed.


Author(s):  
Insaf Khelladi ◽  
Sylvaine Castellano

Some firms and industries were not willing to take full advantage of the internet and its endless opportunities, mainly because they rather focused on the inherent risks and challenges. However, when taking into consideration the specificities of the connected generation, the question is not anymore whether to go online or not, but rather to understand how, when, and where, especially in a luxury context. More specifically, the digital natives represent tomorrow's customers. This new market segment represents a main reason for luxury firms to adopt online strategies. Still, further analysis is needed to uncover the main objectives when firms decide to engage in digital activities. The authors herein investigate the concept of e-reputation. The authors expand on their initial study that focused on brand image and social media as determinants of online reputation. Recommendations and future research directions are suggested.


Author(s):  
Sylvaine Castellano ◽  
Insaf Khelladi

New opportunities and challenges are emerging thanks to the growing Internet importance and social media usage. Although practitioners have already recognized the strategic dimension of e-reputation and the power of social media, academic research is still in its infancy when it comes to e-reputation determinants in a social networks context. A study was conducted in the sports setting to explore the impact of social networks on the sportspeople's e-reputation. Whereas the study emphasized (1) the influence of social networks' perception on the sportspeople's e-reputation, and the neutral roles of (2) the motives for following sportspeople online, and (3) the negative content on the Internet, additional insights are formulated on maintaining, restoring and managing e-reputation on social networks. Finally, future research directions are suggested on the role of image to control e-reputation.


2019 ◽  
Vol 11 (3) ◽  
pp. 763 ◽  
Author(s):  
Frauke Behrendt

This article asks how cycling, a sustainable form of urban mobility, is discussed in the context of smart cities and the Internet of Things in European Commission (EC) policy documents, and how this compares to discussions around cars. Sustainable forms of transport, such as cycling, are a key issue for cities across the globe, including smart cities, while transport is increasingly becoming part of the Internet of Things (IoT). This article contributes to an understanding of how cars and bicycles are discussed in this context. To do so, 39 relevant EC policy documents (2014–2018) were identified and examined through keyword searches and rigorous document analysis. The results show how the vast majority of policy discussions in this area revolve around cars (including autonomous cars and smart vehicles), while cycling is hardly considered, with a strong affinity between IoT and cars. In addition, recent EC policy debates take place more around IoT than around Smart Cities, while sustainability is not considered much in the IoT context. The conclusion highlights the implications of sustainable urban modes of transport such as cycling being absent from IoT/smart debates, including lack of policy visibility and funding opportunities, underlining the significance of this research, and it also makes policy suggestions for addressing these issues and for future research.


Sign in / Sign up

Export Citation Format

Share Document