scholarly journals Multimedia Internet of Things: A Comprehensive Survey

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 8202-8250 ◽  
Author(s):  
Ali Nauman ◽  
Yazdan Ahmad Qadri ◽  
Muhammad Amjad ◽  
Yousaf Bin Zikria ◽  
Muhammad Khalil Afzal ◽  
...  
2019 ◽  
Vol 21 (2) ◽  
pp. 1676-1717 ◽  
Author(s):  
Muhammad Salek Ali ◽  
Massimo Vecchio ◽  
Miguel Pincheira ◽  
Koustabh Dolui ◽  
Fabio Antonelli ◽  
...  

2021 ◽  
Vol 8 (4) ◽  
pp. 718-752
Author(s):  
Othmane Friha ◽  
Mohamed Amine Ferrag ◽  
Lei Shu ◽  
Leandros Maglaras ◽  
Xiaochan Wang

2019 ◽  
Vol 1 (2) ◽  
pp. 73-78
Author(s):  
Arun Kumar K ◽  
Ashwin D ◽  
Surendar M ◽  
Manju Parkavi N ◽  
Banumathi P ◽  
...  

The emerging development in smart vehicles has improved transportation seamlessly. This paper deals with incorporating the modern technologies like Artificial Intelligence and Internet of Things(IoT) with the traditional transportation system. It states how AI algorithms can be integrated with IoT powered vehicles to manage and avoid crashing with idle vehicles on a speedway and assists for safer driving using the traffic symbol analysis to reduce accidents. Several communication standards for data transmission between the vehicle and control system has been stated. It also provides additional features like emergency or assistance for vehicles in speedway. It uses complex learning and analysis algorithms to improve the efficiency of driving and reduce rear-end collisions. This paper hence gives a comprehensive survey of the enabling technologies, protocols, and architecture for IoT powered transport.


2017 ◽  
Vol 2017 ◽  
pp. 1-41 ◽  
Author(s):  
Mohamed Amine Ferrag ◽  
Leandros A. Maglaras ◽  
Helge Janicke ◽  
Jianmin Jiang ◽  
Lei Shu

In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1) Machine to Machine Communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Internet of Sensors (IoS). Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed.


2021 ◽  
Author(s):  
Ihsan Ali

<div>Data collection is an essential part of sensor devices, particularly in such technologies Like Internet of Things (IoT), wireless sensor networks (WSN), and sensor cloud (SC). In recent years, various literature had been published in these research areas to propose different models, architectures, and contributions in the domains. Due to the importance of efficient data collection regarding reducing. energy consumption, latency, network lifetime, and general cost, a momentous literature volume has been published to facilitate data collection. Hence, review studies have been conducted on data collection in these domains in isolation. However, a lack of comprehensive review collectively identifies and analyzes the differences and similarities among the data collection proposals in IoT, WSN, and SC. The main objective of this research is to conduct a comprehensive survey to explore the current state, use cases, contributions, performance measures, evaluation measures, and architecture in the IoT, WSN, and SC research domains. The findings indicate that studies on data collection in IoT, WSN, and SC are relatively consistent with stable output in the last five years. Nine novel contributions are found with models, algorithms, and frameworks being the most utilized by the selected studies. In conclusion, key research challenges and future research directions have been identified and discussed.</div>


Sign in / Sign up

Export Citation Format

Share Document