The Internet of Things (IoT): a survey of techniques, operating systems, and trends

2019 ◽  
Vol 38 (1) ◽  
pp. 5-66 ◽  
Author(s):  
Elham Ali Shammar ◽  
Ammar Thabit Zahary

Purpose Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. To enable the vision of IoT, it utilizes technologies such as ubiquitous computing, context awareness, RFID, WSN, embedded devices, CPS, communication technologies, and internet protocols. IoT is considered to be the future internet, which is significantly different from the Internet we use today. The purpose of this paper is to provide up-to-date literature on trends of IoT research which is driven by the need for convergence of several interdisciplinary technologies and new applications. Design/methodology/approach A comprehensive IoT literature review has been performed in this paper as a survey. The survey starts by providing an overview of IoT concepts, visions and evolutions. IoT architectures are also explored. Then, the most important components of IoT are discussed including a thorough discussion of IoT operating systems such as Tiny OS, Contiki OS, FreeRTOS, and RIOT. A review of IoT applications is also presented in this paper and finally, IoT challenges that can be recently encountered by researchers are introduced. Findings Studies of IoT literature and projects show the disproportionate importance of technology in IoT projects, which are often driven by technological interventions rather than innovation in the business model. There are a number of serious concerns about the dangers of IoT growth, particularly in the areas of privacy and security; hence, industry and government began addressing these concerns. At the end, what makes IoT exciting is that we do not yet know the exact use cases which would have the ability to significantly influence our lives. Originality/value This survey provides a comprehensive literature review on IoT techniques, operating systems and trends.

2006 ◽  
Vol 40 (3) ◽  
pp. 286-295 ◽  
Author(s):  
Andrew Buxton

PurposeTo review the variety of software solutions available for putting CDS/ISIS databases on the internet. To help anyone considering which route to take.Design/methodology/approachBriefly describes the characteristics, history, origin and availability of each package. Identifies the type of skills required to implement the package and the kind of application it is suited to. Covers CDS/ISIS Unix version, JavaISIS, IsisWWW, WWWISIS Versions 3 and 5, Genisis, IAH, WWW‐ISIS, and OpenIsis.FindingsThere is no obvious single “best” solution. Several are free but may require more investment in acquiring the skills to install and configure them. The choice will depend on the user's experience with CDS/ISIS formatting language, HTML, programming languages, operating systems, open source software, and so on.Originality/valueThere is detailed documentation available for most of these packages, but little previous guidance to help potential users to distinguish and choose between them.


2016 ◽  
Vol 117 (3/4) ◽  
pp. 289-292 ◽  
Author(s):  
Bruce Massis

Purpose – The purpose of this paper is to consider the Internet of Things (IOT) and its potential impact on libraries. Design/methodology/approach – This paper presents a literature review and a commentary on this topic that have been addressed by professionals, researchers and practitioners. Findings – In communicating the issues when comprehending the scope of the IOT, libraries need not succumb to the sometimes near-hysteria that surrounds the rhetoric regarding security and privacy. But, librarians must actively engage in the conversation and its subsequent actions to respond to patrons who use library networks and devices with calm, logical and transparent answers to those questions concerning what they are doing to ensure that security and privacy vulnerabilities are regularly addressed. Originality/value – The value in concentrating on this topic is to provide background and suggest several approaches to security and privacy concerns regarding the IOT.


2016 ◽  
Vol 13 (1) ◽  
pp. 204-211
Author(s):  
Baghdad Science Journal

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.


2014 ◽  
Vol 8 (4) ◽  
pp. 480-499 ◽  
Author(s):  
Emad Abu-Shanab

Purpose – This study aims to explore technology adoption research and propose a trust antecedents model, where trust in government, trust in technology, information quality, Internet familiarity and privacy and security concerns are hypothesized to predict Jordanians trust in e-government. Also, trust in e-government extended the Theory of Reasoned Action in predicting the intention to use e-government. Design/methodology/approach – Proposed a model and tried to empirically test it using a sample of 759 Jordanians who filled a survey consisting of items measuring the previously mentioned constructs. A structural equation modeling technique was used to test the model. Findings – Results supported the proposed research model, where all proposed variables significantly predicted intention to use e-government services. Also, a partial least squares estimate of the model indicated a significant prediction of trust in e-government by all proposed variables except the Internet familiarity construct. The coefficient of determination for intention to use was 0.465, and for trust in e-government 0.415. Research limitations/implications – The study utilized a newly developed instrument in Arabic, and diverse categories of subjects, where some of them were considering a public e-learning system when responding to items. Practical implications – This research is important to public officials and the Jordanian e-government project, as it emphasized the importance of trust constructs (TiT and TiG) as major influencers on the trust propensity related to e-government. Also, other constructs like information quality showed significant influence; where the type and characteristics of information posted on e-government Web sites influence the adoption decision on the long run. Jordanians’ perceptions regarding information posted on e-government Web site were all at moderate levels. More emphasis on making information more accurate, recent, comprehensive and original is needed. Social implications – This study showed a relative deficiency in Jordanians perceptions towards trusting the Internet. It seems that they reflected a moderate trust in its legal, technical and security levels. Finally, this study emphasized the role of privacy and security issues in influencing the level of trust in e-government systems. Similarly, transparency and knowledge equity are important dimensions that need to be addressed. Originality/value – This study is one of the largest studies with respect to the size of its sample that explores trust in e-government in Jordan. The focus on trust antecedents and the empirical test of the model is a first attempt in the literature, where a structural model was explored raising the level of accuracy of estimation to its required potential. The number of constructs to be explored at the same time is an addition to the area of e-government technology adoption.


Subject IoT ecosystem. Significance The market for the Internet of Things (IoT) or connected devices is expanding rapidly, with no manufacturer currently forecast to dominate the supply chain. This has fragmented the emerging IoT ecosystem, triggering questions about interoperability and cybersecurity of IoT devices. Impacts Firms in manufacturing, transportation and logistics and utilities are expected to see the highest IoT spending in coming years. The pace of IoT adoption is inextricably linked to that of related technologies such as 5G, artificial intelligence and cloud computing. Data privacy and security will be the greatest constraint to IoT adoption.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Xianke Sun ◽  
Gaoliang Wang ◽  
Liuyang Xu ◽  
Honglei Yuan

PurposeIn data grids, replication has been regarded as a crucial optimization strategy. Computing tasks are performed on IoT gateways at the cloud edges to obtain a prompt response. So, investigating the data replication mechanisms in the IoT is necessary. Henceforth, a systematic survey of data replication strategies in IoT techniques is presented in this paper, and some suggestions are offered for the upcoming works. In two key classifications, various parameters dependent on the analysis of the prevalent approaches are considered. The pros and cons associated with chosen strategies have been explored, and the essential problems of them have been presented to boost the future of more effective data replication strategies. We have also discovered gaps in papers and provided solutions for them.Design/methodology/approachProgress in Information Technology (IT) growth has brought the Internet of Things (IoT) into life to take a vital role in our everyday lifestyles. Big IoT-generated data brings tremendous data processing challenges. One of the most challenging problems is data replication to improve fault-tolerance, reliability, and accessibility. In this way, if the primary data source fails, a replica can be swapped in immediately. There is a significant influence on the IoT created by data replication techniques, but no extensive and systematic research exists in this area. There is still no systematic and full way to address the relevant methods and evaluate them. Hence, in the present investigation, a literature review is indicated on the IoT-based data replication from papers published until 2021. Based on the given guidelines, chosen papers are reviewed. After establishing exclusion and inclusion criteria, an independent systematic search in Google Scholar, ACM, Scopus, Eric, Science Direct, Springer link, Emerald, Global ProQuest, and IEEE for relevant studies has been performed, and 21(6 paper analyzed in section 1 and 15 paper analyzed in section 3) papers have been analyzed.FindingsThe results showed that data replication mechanisms in the IoT algorithms outperform other algorithms regarding impressive network utilization, job implementation time, hit ratio, total replication number, and the portion of utilized storage in percentage. Although a few ideas have been suggested that fix different facets of IoT data management, we predict that there is still space for development and more study. Thus, in order to design innovative and more effective methods for future IoT-based structures, we explored open research directions in the domain of efficient data processing.Research limitations/implicationsThe present investigation encountered some drawbacks. First of all, only certain papers published in English were included. It is evident that some papers exist on data replication processes in the IoT written in other languages, but they were not included in our research. Next, the current report has only analyzed the mined based on data replication processes and IoT keyword discovery. The methods for data replication in the IoT would not be printed with keywords specified. In this review, the papers presented in national conferences and journals are neglected. In order to achieve the highest ability, this analysis contains papers from major global academic journals.Practical implicationsTo appreciate the significance and accuracy of the data often produced by different entities, the article illustrates that data provenance is essential. The results contribute to providing strong suggestions for future IoT studies. To be able to view the data, administrators have to modify novel abilities. The current analysis will deal with the speed of publications and suggest the findings of research and experience as a future path for IoT data replication decision-makers.Social implicationsIn general, the rise in the knowledge degree of scientists, academics, and managers will enhance administrators' positive and consciously behavioral actions in handling IoT environments. We anticipate that the consequences of the present report could lead investigators to produce more efficient data replication methods in IoT regarding the data type and data volume.Originality/valueThis report provides a detailed literature review on data replication strategies relying on IoT. The lack of such papers increases the importance of this paper. Utilizing the responses to the study queries, data replication's primary purpose, current problems, study concepts, and processes in IoT are summarized exclusively. This approach will allow investigators to establish a more reliable IoT technique for data replication in the future. To the best of our understanding, our research is the first to provide a thorough overview and evaluation of the current solutions by categorizing them into static/dynamic replication and distributed replication subcategories. By outlining possible future study paths, we conclude the article.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Satyanarayana Pamarthi ◽  
R. Narmadha

PurposeNowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine with the IoT via the sensing capability of Internet-connected devices and the Internet access ability of sensor nodes. It is essential to shelter the network from attacks over the Internet by keeping the secure router.Design/methodology/approachThis paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT) applications. The literature review is focused on various types of attacks concentrated in each contribution and the adoption of prevention and mitigation models are observed. In addition, the types of the dataset used, types of attacks concentrated, types of tools used for implementation, and performance measures analyzed in each contribution are analyzed. Finally, an attempt is made to conclude the review with several future research directions in designing and implementing IDS for MANETs that preserve the security aspects of IoT.FindingsIt observed the different attack types focused on every contribution and the adoption of prevention and mitigation models. Additionally, the used dataset types, the focused attack types, the tool types used for implementation, and the performance measures were investigated in every contribution.Originality/valueThis paper presents a literature review on diverse contributions of attack detection and prevention, and the stand of different machine learning and deep learning models along with the analysis of types of the dataset used, attacks concentrated, tools used for implementation and performance measures on the network security for IoT applications.


2018 ◽  
Vol 7 (1.7) ◽  
pp. 186
Author(s):  
R Priyadarshini ◽  
N Malarvizhi

Cloud IaaS, a virtual data center is an instant computing infrastructure provided and managed over the Internet. The provider owns the resource and maintains it in the level specified in the SLA. The user is permitted to use the resources as services like operating systems, security, networking, application developing servers, application deploying tools, databases, etc., on the basis of pay-per-use model. The providers and users both are concerned over integrity, privacy and security issues. This study distinguishes the issues identified with the cloud IaaS layer and strategies to overcome them to maximize the performance.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Saira Beg ◽  
Saif Ur Rehman Khan ◽  
Adeel Anjum

PurposeSimilarly, Zhu et al. (2014) and Zhang et al. (2014) stated that addressing privacy concerns with the recommendation process is necessary for the healthy development of app recommendation. Recently, Xiao et al. (2020) mentioned that a lack of effective privacy policy hinders the development of personalized recommendation services. According to the reported work, privacy protection technology methods are too limited for mobile focusing on data encryption, anonymity, disturbance, elimination of redundant data to protect the recommendation process from privacy breaches. So, this situation motivated us to conduct a systematic literature review (SLR) to provide the viewpoint of privacy and security concerns as mentioned in current state-of-the-art in the mobile app recommendation domain.Design/methodology/approachIn this work, the authors have followed Kitchenham guidelines (Kitchenham and Charters, 2007) to devise the SLR process. According to the guidelines, the SLR process has three main phases: (1) define, (2) conduct the search and (3) report the results. Furthermore, the authors used systematic mapping approach as well to ensure the whole process.FindingsBased on the selected studies, the authors proposed three main thematic taxonomies, including architectural style, security and privacy strategies, and user-usage in the mobile app recommendation domain. From the studies' synthesis viewpoint, it is observed that the majority of the research efforts have focused on the movie recommendation field, while the mainly used privacy scheme is homomorphic encryption. Finally, the authors suggested a set of future research dimensions useful for the potential researchers interested to perform the research in the mobile app recommendation domain.Originality/valueThis is an SLR article, based on existing published research, where the authors identified key issues and future directions.


Sign in / Sign up

Export Citation Format

Share Document