scholarly journals IoT-based smart cities: a bibliometric analysis and literature review

2021 ◽  
Vol 13 (2) ◽  
pp. 115-136
Author(s):  
Katarzyna Szum

Abstract Modern cities face many challenges related to globalisation, metropolisation and digitalisation. The smart city concept, which has been gaining popularity in recent years, is considered an answer to their needs. One of the paradigms of modern smart cities is the Internet of Things. This article aims to identify the main research directions and trends in the scientific literature in the field of Internet-of-Things-based smart cities. The author of the paper conducted a bibliometric analysis of publications from 2012–2021, collected from the Web of Science, Scopus and IEEE Xplore databases. The methodology includes: (i) the selection of databases and key words, (ii) defining search criteria, (iii) data export, creation of an aggregate database and record selection, and (iv) the analysis of the results and identification of the major research trends. The study involved 1019 publications. The last stage of the research process identified the leading countries, institutions, journals, and authors in terms of publication activity, as well as the most frequently occurring terms. The key word analysis allowed identifying five main research directions: IoT application domains in smart cities, IoT architecture for smart cities, energy, security and privacy and data. Within each area, the main research themes have been identified, and selected publications have been reviewed.

2021 ◽  
Vol 2021 ◽  
pp. 1-19
Author(s):  
Irfan Muhammad ◽  
Hirley Alves ◽  
Onel Alcaraz López ◽  
Matti Latva-aho

The Internet of Things (IoT) facilitates physical things to detect, interact, and execute activities on-demand, enabling a variety of applications such as smart homes and smart cities. However, it also creates many potential risks related to data security and privacy vulnerabilities on the physical layer of cloud-based Internet of Things (IoT) networks. These can include different types of physical attacks such as interference, eavesdropping, and jamming. As a result, quality-of-service (QoS) provisioning gets difficult for cloud-based IoT. This paper investigates the statistical QoS provisioning of a four-node cloud-based IoT network under security, reliability, and latency constraints by relying on the effective capacity model to offer enhanced QoS for IoT networks. Alice and Bob are legitimate nodes trying to communicate with secrecy in the considered scenario, while an eavesdropper Eve overhears their communication. Meanwhile, a friendly jammer, which emits artificial noise, is used to degrade the wiretap channel. By taking advantage of their multiple antennas, Alice implements transmit antenna selection, while Bob and Eve perform maximum-ratio combining. We further assume that Bob decodes the artificial noise perfectly and thus removes its contribution by implementing perfect successive interference cancellation. A closed-form expression for an alternative formulation of the outage probability, conditioned upon the successful transmission of a message, is obtained by considering adaptive rate allocation in an ON-OFF transmission. The data arriving at Alice’s buffer are modeled by considering four different Markov sources to describe different IoT traffic patterns. Then, the problem of secure throughput maximization is addressed through particle swarm optimization by considering the security, latency, and reliability constraints. Our results evidence the considerable improvements on the delay violation probability by increasing the number of antennas at Bob under strict buffer constraints.


2019 ◽  
Vol 11 (13) ◽  
pp. 3606 ◽  
Author(s):  
Yi-Ming Guo ◽  
Zhen-Ling Huang ◽  
Ji Guo ◽  
Hua Li ◽  
Xing-Rong Guo ◽  
...  

Smart cities have been a global concern in recent years, involving comprehensive scientific research. To obtain a structural overview and assist researchers in making insights into the characteristics of smart cities research, bibliometric analysis was carried out in this paper. With the application of the bibliometric analysis software VOSviewer and CiteSpace, 4409 smart cities were identified by the core collection of the Web of Science in publications between 1998 and 2019 and used in the analysis of this paper. Concretely, this research visually demonstrates a comprehensive overview of the field relating to smart cities in terms of the production of regular publications, main domain of smart cities researchers, most influential countries (institutions, sources and authors), and interesting research directions in the smart city researches. We also present the research collaboration among countries (regions), organizations and authors based on a series of cooperation analyses. The bibliometric analysis of the existing work provided a valuable and seminal reference for researchers and practitioners in smart cities-related research communities.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xinjia Zhang ◽  
Yang Song ◽  
Shijun Wang ◽  
Sitong Qian

Brownfield has become one of the critical issues in modern cities. Over the past few decades, a considerable number of papers on brownfield research have been published. This study reviewed 773 documents themed with “brownfield” in the Web of Science core database between 1980 and 2020 and used the CiteSpace software to sort out the spatial and temporal distribution, knowledge groups, subject structures and hotspot fields, and evolutionary trends of global brownfield research. The analysis focuses on distribution of lead authors and their institutions, high-frequency categories and keywords, high influential journals, author contribution, and evolutionary trends based on coword analysis, coauthor analysis, cocitation analysis, and cluster analysis of documents. On the basis of the aforementioned keywords, clusters, and citation bursts analysis, this paper establishes a multidisciplinary framework for brownfield research, suggesting the main research directions for the future development, which provides theoretical support and practical guidance for the research direction of future brownfield research.


The future of Internet of Things (IoT) is already upon us. The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. While enjoying the convenience and efficiency that IoT brings to us, new threats from IoT also have emerged. There are increasing research works to ease these threats, but many problems remain open. To better understand the essential reasons of new threats and the challenges in current research, this survey first proposes the concept of “IoT features”. Then, the security and privacy effects of eight IoT new features were discussed including the threats they cause, existing solutions and challenges yet to be solved.


SAGE Open ◽  
2021 ◽  
Vol 11 (3) ◽  
pp. 215824402110475
Author(s):  
Ya Sun ◽  
Gongyuan Wang ◽  
Haiying Feng

This study aimed to present the status quo of linguistic studies on social media in the past decade. In particular, it conducted a bibliometric analysis of articles from the field of linguistics of the database of Web of Science Core Collection with the aid of the tool CiteSpace to identify the general characteristics, major strands of linguistics, main research methods, and important research themes in the area of linguistic studies on social media. The main findings are summarized as follows. First, the study reported the publication trend, main publication venues, researched social media platforms, and languages used in researched social media. Second, sociolinguistics and pragmatics were found to be major strands of linguistics used in relevant studies. Third, the study identified seven main research methods: discourse analysis, critical discourse analysis, conversation analysis, multimodal analysis, narrative analysis, ethnographic analysis, and corpus analysis. Fourth, important research themes were extracted and classified based on four dimensions of the genre framework of social media studies. They were the participation nature and technology affordances of social media in the dimension of compositional level, the researched topics of education, (language) policy and politics in the dimension of thematic orientations, the researched discursive practices of (im)politeness, humor, indexicality and multilingualism in the dimension of stylistic traits, and the researched communicative functions of constructing identity, communicating (language) ideology, and expressing attitude in the pragmatic dimension. Moreover, linguistic studies on social media tended to be characterized by cross-disciplinary and mixed-method approaches.


2020 ◽  
Vol 12 (18) ◽  
pp. 7262
Author(s):  
Israr Ahmad ◽  
Munam Ali Shah ◽  
Hasan Ali Khattak ◽  
Zoobia Ameer ◽  
Murad Khan ◽  
...  

Adoption of the Internet of Things for the realization of smart cities in various domains has been pushed by the advancements in Information Communication and Technology. Transportation, power delivery, environmental monitoring, and medical applications are among the front runners when it comes to leveraging the benefits of IoT for improving services through modern decision support systems. Though with the enormous usage of the Internet of Medical Things, security and privacy become intrinsic issues, thus adversaries can exploit these devices or information on these devices for malicious intents. These devices generate and log large and complex raw data which are used by decision support systems to provide better care to patients. Investigation of these enormous and complicated data from a victim’s device is a daunting and time-consuming task for an investigator. Different feature-based frameworks have been proposed to resolve this problem to detect early and effectively the access logs to better assess the event. But the problem with the existing approaches is that it forces the investigator to manually comb through collected data which can contain a huge amount of irrelevant data. These data are provided normally in textual form to the investigators which are too time-consuming for the investigations even if they can utilize machine learning or natural language processing techniques. In this paper, we proposed a visualization-based approach to tackle the problem of investigating large and complex raw data sets from the Internet of Medical Things. Our contribution in this work is twofold. Firstly, we create a data set through a dynamic behavioral analysis of 400 malware samples. Secondly, the resultant and reduced data set were then visualized most feasibly. This is to investigate an incident easily. The experimental results show that an investigator can investigate large amounts of data in an easy and time-efficient manner through the effective use of visualization techniques.


2021 ◽  
Vol 17 (6) ◽  
pp. 155014772110268
Author(s):  
Xueya Xia ◽  
Sai Ji ◽  
Pandi Vijayakumar ◽  
Jian Shen ◽  
Joel J. P. C. Rodrigues

Internet of Things devices are responsible for collecting and transmitting data in smart cities, assisting smart cities to release greater potential. As Internet of Things devices are increasingly connected to smart cities, security and privacy have gradually become important issues. Recently, research works on mitigating security challenges of Internet of Things devices in smart cities mainly focused on authentication. However, in most of the existing authentication protocols, the trustworthiness evaluation of Internet of Things devices in smart cities is ignored. Considering the trustworthiness evaluation of Internet of Things devices is an important constituent of data source authentication, in this article, a cloud-aided trustworthiness evaluation mechanism is first designed to improve the credibility of the Internet of Things devices in smart cities. Furthermore, aiming at the problem that the user’s privacy is easy to leak in the process of authentication, an anonymous authentication and key agreement scheme based on non-interactive zero knowledge argument is proposed. The proposed scheme can ensure the privacy preservation and data security of Internet of Things devices in smart cities. The security analysis demonstrates that the proposed scheme is secure under q-SDH problem. The experimental simulation indicates that the performance of the proposal is greatly improved compared with other similar schemes.


2020 ◽  
Vol 25 (6) ◽  
pp. 737-745
Author(s):  
Subba Rao Peram ◽  
Premamayudu Bulla

To provide secure and reliable services using the internet of things (IoT) in the smart cities/villages is a challenging and complex issue. A high throughput and resilient services are required to process vast data generated by the smart city/villages that felicitates to run the applications of smart city. To provide security and privacy a scalable blockchain (BC) mechanism is a necessity to integrate the scalable ledger and transactions limit in the BC. In this paper, we investigated the available solutions to improve its scalability and efficiency. However, most of the algorithms are not providing the better solution to achieve scalability for the smart city data. Here, proposed and implemented a hybrid approach to improve the scalability and rate of transactions on BC using practical Byzantine fault tolerance and decentralized public key algorithms. The proposed Normachain is compares our results with the existing model. The results show that the transaction rate got improved by 6.43% and supervision results got improved by 17.78%.


2016 ◽  
Vol 2 ◽  
pp. 139-152
Author(s):  
Paul Meara

This paper is the fourth instalment in a series of studies which attempt to plot the way research in L2 vocabulary acquisition has developed over the last fifty years. Earlier papers have analysed the research for 1982, 1983 and 2006 (Meara 2012, 2014, 2015). This paper follows on directly from my analysis of the 1983 research, and it uses the same bibliometric techniques that were used in the earlier papers: the co-citation methodology, first developed by Small (1973) and White and Griffith (1981). The analysis of the 1984 data shows some consolidation of the main research themes, but for the most part the L2 vocabulary research published in this year continues to be made up of small research clusters, sharing few common points of reference.


Sign in / Sign up

Export Citation Format

Share Document