Internet of Things Research Challenges

Author(s):  
Mahmoud Elkhodr ◽  
Seyed Shahrestani ◽  
Hon Cheung

The Internet of Things (IoT) promises to revolute communications on the Internet. The IoT enables numerous business opportunities in fields as diverse as e-health, smart cities, smart homes, among many others. It incorporates multiple long-range, short-range, and personal area wireless networks and technologies into the designs of IoT applications. This will result in the IoT being pervasive in many areas which raise many challenges. This chapter reviews the major research issues challenging the IoT with regard to security, privacy, and management.

2017 ◽  
pp. 260-277
Author(s):  
Mahmoud Elkhodr ◽  
Seyed Shahrestani ◽  
Hon Cheung

The Internet of Things (IoT) promises to revolute communications on the Internet. The IoT enables numerous business opportunities in fields as diverse as e-health, smart cities, smart homes, among many others. It incorporates multiple long-range, short-range, and personal area wireless networks and technologies into the designs of IoT applications. This will result in the IoT being pervasive in many areas which raise many challenges. This chapter reviews the major research issues challenging the IoT with regard to security, privacy, and management.


2021 ◽  
Vol 27 (2) ◽  
Author(s):  
O.C. Ngige ◽  
C.E. Chibudike ◽  
D.O. Omotosho

This paper accesses the Internet of Things (IoT) in conjunction with the emergence of Wireless Technologies. Internet of Things (IoT) refers to a type of network to connect anything with the Internet, based on stipulated protocols through information sensing equipment to conduct information exchange and communications; in order to achieve smart recognitions, positioning, tracing, monitoring, and administration. This investigates the Internet of Things (IoT) and its incorporation of multiple long-range, short-range, and personal area wireless networks and technologies into the designs of IoT applications. Particularly, it focuses on ZigBee, 6LoWPAN, Bluetooth Low Energy, LoRa, and so on. This enables numerous business opportunities in fields as diverse as e-health, smart cities, and smart homes, among many others. This research briefly discussed about IoT, some of the major evolving and enabling wireless technologies in the IoT, Smart Environnent Application Domain, and Application of IoT. Benefits and Challenges of IoT.


The future of Internet of Things (IoT) is already upon us. The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. While enjoying the convenience and efficiency that IoT brings to us, new threats from IoT also have emerged. There are increasing research works to ease these threats, but many problems remain open. To better understand the essential reasons of new threats and the challenges in current research, this survey first proposes the concept of “IoT features”. Then, the security and privacy effects of eight IoT new features were discussed including the threats they cause, existing solutions and challenges yet to be solved.


Author(s):  
In Lee

As the Internet of Things (IoT) opens up new business opportunities, firms are trying to understand the impacts of the IoT revolution on their supply chain. Despite the tremendous interest by supply chain managers to leverage the IoT, there are still a paucity of studies that integrate the management side of supply chain with the technical side of the IoT. This chapter attempts to fill the current gap in research. This chapter discusses capabilities of the IoT-based supply chain applications. Then, it presents a conceptual framework of the IoT applications essential for smart supply chain. Finally, this chapter discusses technical and managerial challenges faced by supply chain managers in implementing the IoT.


2020 ◽  
pp. 1557-1574
Author(s):  
In Lee

As the Internet of Things (IoT) opens up new business opportunities, firms are trying to understand the impacts of the IoT revolution on their supply chain. Despite the tremendous interest by supply chain managers to leverage the IoT, there are still a paucity of studies that integrate the management side of supply chain with the technical side of the IoT. This chapter attempts to fill the current gap in research. This chapter discusses capabilities of the IoT-based supply chain applications. Then, it presents a conceptual framework of the IoT applications essential for smart supply chain. Finally, this chapter discusses technical and managerial challenges faced by supply chain managers in implementing the IoT.


2020 ◽  
Vol 17 (6) ◽  
pp. 2552-2556
Author(s):  
Sarita Simaiya ◽  
Umesh Kumar Lilhore ◽  
Sanjeev Kumar Sharma ◽  
Kamali Gupta ◽  
Vidhu Baggan

A revolutionary technology well into the world of technology has been in the modern world of technology the Internet of Things. Due to continuing increases as nothing more than a consequence of either the rapid development of computing Internet of things-based applications implementations. Many technologies become increasingly embraced throughout compatible devices such as home automation and also smart cities. These IoT applications become operated on both the Internet, whereby information becomes transported publicly between a network to the next, therefore flowing information requires a great deal of further privacy consideration to guarantee IoT applications become reliable Internet of things technologies have been using various techniques of data protection of security and privacy. However, all such modern security systems have always been sufficient to ensure the Internet of things perceived safety. A Blockchain has become a revolutionary authoritative digital technology that really transforms commercial transactions absolutely. This is also a collaborative service that facilitates it uses a variety of features of cybersecurity. Blockchain technology seems to be the missing piece of the puzzle throughout the IoT to address problems of usability, anonymity, including security. Block chain’s crypto algorithms must enable transparency from customers very confidential. Throughout this research article, we introduce an analysis of IoT security concerns; blockchain gets addressed briefly as well as later addresses the security of IoT applications dependent on blockchain technologies.


2017 ◽  
Vol 76 ◽  
pp. 301-313 ◽  
Author(s):  
Cristian González García ◽  
Daniel Meana-Llorián ◽  
B. Cristina Pelayo G-Bustelo ◽  
Juan Manuel Cueva Lovelle ◽  
Nestor Garcia-Fernandez

2021 ◽  
Vol 9 (1) ◽  
pp. 912-931
Author(s):  
Pavan Madduru

To meet the growing demand for mobile data traffic and the stringent requirements for Internet of Things (IoT) applications in emerging cities such as smart cities, healthcare, augmented / virtual reality (AR / VR), fifth-generation assistive technologies generation (5G) Suggest and use on the web. As a major emerging 5G technology and a major driver of the Internet of Things, Multiple Access Edge Computing (MEC), which integrates telecommunications and IT services, provides cloud computing capabilities at the edge of an access network. wireless (RAN). By providing maximum compute and storage resources, MEC can reduce end-user latency. Therefore, in this article we will take a closer look at 5G MEC and the Internet of Things. Analyze the main functions of MEC in 5G and IoT environments. It offers several core technologies that enable the use of MEC in 5G and IoT, such as cloud computing, SDN / NFV, information-oriented networks, virtual machines (VMs) and containers, smart devices, shared networks and computing offload. This article also provides an overview of MEC's ​​role in 5G and IoT, a detailed introduction to MEC-enabled 5G and IoT applications, and future perspectives for MEC integration with 5G and IoT. Additionally, this article will take a closer look at the MEC research challenges and unresolved issues around 5G and the Internet of Things. Finally, we propose a use case that MEC uses to obtain advanced intelligence in IoT scenarios.


Author(s):  
In Lee

As the Internet of Things (IoT) opens up new business opportunities, firms are trying to understand the impacts of the IoT revolution on their supply chain. Despite the tremendous interest by supply chain managers to leverage the IoT, there are still a paucity of studies that integrate the management side of supply chain with the technical side of the IoT. This chapter attempts to fill the current gap in research. This chapter discusses capabilities of the IoT-based supply chain applications. Then, it presents a conceptual framework of the IoT applications essential for smart supply chain. Finally, this chapter discusses technical and managerial challenges faced by supply chain managers in implementing the IoT.


Author(s):  
Rashmi Roges

The advancements in the field of electronics and wireless technology have put forward the idea of the Internet of Things which can be rightly called the third industrial revolution The Internet of Things technology is about connecting and communicating with anything anywhere at any time. The concept of the internet of things can be fully materialized with the help of its supporting technologies including the smart sensors, processors, and highly efficient communication protocols. The smart sensor nodes communicate with the base stations using different communication protocols. A brief review of the requirements of the IoT systems are studies and the communication protocols for the short-range and long-range IoT applications are discussed and compared in this study. Various short range and long range communication protocols which are used for the IoT applications are summarized along with the range covered and the number of nodes that can be connected. The major requirements and constrains of communication protocols employed in IoT applications are discussed. The study concludes that the choice of technology to be considered for the implementation of an IoT system is deeply connected with the types of applications which specify the range to be covered, the number of devices to be connected, the operational bandwidth available, the rate of transmission and the cost of the system.


Sign in / Sign up

Export Citation Format

Share Document