ONGOING CHALLENGES AND RESEARCH OPPORTUNITIES IN INTERNET OF THINGS (IOT)
DOI:
https://doi.org/10.29121/ijetmr.v5.i2.2018.647Keywords:
Internet of Things, IoT Applications, Future TechnologyAbstract
The Internet of Things (IoT) opens opportunities for handheld devices, home appliances, and software to share and communicate information on the Internet. Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply convey information but process it in transit, connect peer to peer, and form advanced collaborations. This “Internet of Things (IoT)” infrastructure will be strongly integrated with the environment. This paper focuses on researching on the architecture and technology of Internet of Things. Moreover, the applications of Internet of Things are interpreted in this paper. We begin with general information security background of IoT and continue on with information security related challenges that IoT will encountered. Finally, we will also point out research directions that could be the future work for the solutions to the security challenges that IoT encounters. The future is Internet of Things, which will transform the real world objects into intelligent virtual objects.
Downloads
References
M. A. Ezechina, K. K. Okwara, C. A. U. Ugboaja. The Internet of Things (Iot): A Scalable Approach to Connecting Everything. The International Journal of Engineering and Science 4(1) (2015) 09-12.
G. Eason, B. Noble, and I.N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529-551, April 1955. (references) DOI: https://doi.org/10.1098/rsta.1955.0005
Ron Davies. The Internet of Things Opportunities and challenges. May 2015. [70] Friedemann Mattern and Christian Floerkemeier. From the Internet of Computers to the Internet of Things. https://www.vs.inf.ethz.ch/publ/papers/Internet-of-things.pdfJ. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68-73.
“Values and Principles.” Principles. Internet Society, 2015. http://www.internetsociety.org/who-we-are/mission/valuesandprinciples
Y. Aguiar, M. Vieira, E. Galy, J. Mercantini, and C. Santoni, Refining a User Behavior Model based on the Observation of Emotional States. COGNITIVE, 2011.
G. Schirner, D. Erdogmus, K. Chowdhury, and T. Padir, the Future of Human-in-the-Loop Cyber-Physical Systems. Computer 46, 1, 2013, pp. 36– 45. DOI: https://doi.org/10.1109/MC.2013.31
M. Huang, J. Li, X. Song, and H. Guo, Modeling Impulsive Injections of Insulin: Towards Artificial Pancreas. SIAM Journal of Applied Mathematics 72, 5, 2012, pp. 1524–1548. DOI: https://doi.org/10.1137/110860306
S. Mohammed, P. Fraisse, D. Guiraud, P. Poignet, and H. Makssoud, Towards a Co-contraction Muscle Control strategy for Paraplegics. CDCECC, 2005.
K. Tsui, D. Kim, A. Behal, D. Kontak, and H. Yanco, I Want That : Human-in-the-Loop Control of a Wheelchair-Mounted Robotic Arm. Journal of Applied Bionics and Biomechanics 8, 2011.https://www.linkedin.com/pulse/why-iot-needs-fog-computing-ahmed-banafa?trk=mp-author-card DOI: https://doi.org/10.1155/2011/698079
S. Ravi, A. Raghunathan, S. Chakradhar. Tamper Resistance Mechanisms for Secure, Embedded Systems, Proc. of 17th International Conference on VLSI Design, 2004. p. 605.
J. Deng, R. Han, and S. Mishra, Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks, Proc. of ACM/IEEE IPSN, 2006. pp. 292-300. DOI: https://doi.org/10.1145/1127777.1127822
T. Pering, Y. Agarwal, R. Gupta, and R. Want, “Coolspots: reducing the power consumption of wireless mobile devices with multiple radio interfaces,” in Proc. of ACM Mobile Systems, Applications and Services, pp. 220–232, 2006. DOI: https://doi.org/10.1145/1134680.1134704
A. Wood, L. Fang, J. Stankovic, and T. He, SIGF: A Family of Configurable, Secure Routing Protocols for Wireless Sensor Networks, ACM Security of Ad Hoc and Sensor Networks, Best Paper Award, October 31, 2006. DOI: https://doi.org/10.1145/1180345.1180351
W. Xu, W. Trappe, Y. Zhang, T. Wood, The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks, Proc. of MobiHoc, 2005. pp. 46-57. DOI: https://doi.org/10.1145/1062689.1062697
M. Balazinska, A. Deshpande, M.J. Franklin, P.B. Gibbons, J. Gray, S. Nath, M. Hansen, M. Liebhold, A. Szalay, V. Tao, "Data Management in the Worldwide Sensor Web," IEEE Pervasive Computing, vol.6, no.2, pp.30-40, April-June 2007 DOI: https://doi.org/10.1109/MPRV.2007.27
M. Bellis, "The History of the ENIAC Computer," About.com Guide
D. Estrin, "Participatory sensing: applications and architecture [Internet Predictions]," Internet Computing, IEEE, vol.14, no.1, pp.12-42, Jan.-Feb. 2010 DOI: https://doi.org/10.1109/MIC.2010.12
Downloads
Published
How to Cite
Issue
Section
License
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- The work described has not been formally published before, except in the form of an abstract or as part of a published lecture, review, thesis, or overlay journal.
- That it is not under consideration for publication elsewhere.
- That its release has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Copyright
Authors who publish with International Journal of Engineering Technologies and Management Research agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or edit it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
For More info, please visit CopyRight Section