ONGOING CHALLENGES AND RESEARCH OPPORTUNITIES IN INTERNET OF THINGS (IOT)

  • Sachin Upadhyay Assistant Professor, Department of Mathematical Sciences & Computer Applications, Bundelkhand University, Jhansi (UP), India
Keywords: Internet of Things, IoT Applications, Future Technology

Abstract

The Internet of Things (IoT) opens opportunities for handheld devices, home appliances, and software to share and communicate information on the Internet. Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply convey information but process it in transit, connect peer to peer, and form advanced collaborations. This “Internet of Things (IoT)” infrastructure will be strongly integrated with the environment. This paper focuses on researching on the architecture and technology of Internet of Things. Moreover, the applications of Internet of Things are interpreted in this paper. We begin with general information security background of IoT and continue on with information security related challenges that IoT will encountered. Finally, we will also point out research directions that could be the future work for the solutions to the security challenges that IoT encounters. The future is Internet of Things, which will transform the real world objects into intelligent virtual objects.

Downloads

Download data is not yet available.

References

M. A. Ezechina, K. K. Okwara, C. A. U. Ugboaja. The Internet of Things (Iot): A Scalable Approach to Connecting Everything. The International Journal of Engineering and Science 4(1) (2015) 09-12.

G. Eason, B. Noble, and I.N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529-551, April 1955. (references) DOI: https://doi.org/10.1098/rsta.1955.0005

Ron Davies. The Internet of Things Opportunities and challenges. May 2015. [70] Friedemann Mattern and Christian Floerkemeier. From the Internet of Computers to the Internet of Things. https://www.vs.inf.ethz.ch/publ/papers/Internet-of-things.pdfJ. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68-73.

“Values and Principles.” Principles. Internet Society, 2015. http://www.internetsociety.org/who-we-are/mission/valuesandprinciples

Y. Aguiar, M. Vieira, E. Galy, J. Mercantini, and C. Santoni, Refining a User Behavior Model based on the Observation of Emotional States. COGNITIVE, 2011.

G. Schirner, D. Erdogmus, K. Chowdhury, and T. Padir, the Future of Human-in-the-Loop Cyber-Physical Systems. Computer 46, 1, 2013, pp. 36– 45. DOI: https://doi.org/10.1109/MC.2013.31

M. Huang, J. Li, X. Song, and H. Guo, Modeling Impulsive Injections of Insulin: Towards Artificial Pancreas. SIAM Journal of Applied Mathematics 72, 5, 2012, pp. 1524–1548. DOI: https://doi.org/10.1137/110860306

S. Mohammed, P. Fraisse, D. Guiraud, P. Poignet, and H. Makssoud, Towards a Co-contraction Muscle Control strategy for Paraplegics. CDCECC, 2005.

K. Tsui, D. Kim, A. Behal, D. Kontak, and H. Yanco, I Want That : Human-in-the-Loop Control of a Wheelchair-Mounted Robotic Arm. Journal of Applied Bionics and Biomechanics 8, 2011.https://www.linkedin.com/pulse/why-iot-needs-fog-computing-ahmed-banafa?trk=mp-author-card DOI: https://doi.org/10.1155/2011/698079

S. Ravi, A. Raghunathan, S. Chakradhar. Tamper Resistance Mechanisms for Secure, Embedded Systems, Proc. of 17th International Conference on VLSI Design, 2004. p. 605.

J. Deng, R. Han, and S. Mishra, Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks, Proc. of ACM/IEEE IPSN, 2006. pp. 292-300. DOI: https://doi.org/10.1145/1127777.1127822

T. Pering, Y. Agarwal, R. Gupta, and R. Want, “Coolspots: reducing the power consumption of wireless mobile devices with multiple radio interfaces,” in Proc. of ACM Mobile Systems, Applications and Services, pp. 220–232, 2006. DOI: https://doi.org/10.1145/1134680.1134704

A. Wood, L. Fang, J. Stankovic, and T. He, SIGF: A Family of Configurable, Secure Routing Protocols for Wireless Sensor Networks, ACM Security of Ad Hoc and Sensor Networks, Best Paper Award, October 31, 2006. DOI: https://doi.org/10.1145/1180345.1180351

W. Xu, W. Trappe, Y. Zhang, T. Wood, The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks, Proc. of MobiHoc, 2005. pp. 46-57. DOI: https://doi.org/10.1145/1062689.1062697

M. Balazinska, A. Deshpande, M.J. Franklin, P.B. Gibbons, J. Gray, S. Nath, M. Hansen, M. Liebhold, A. Szalay, V. Tao, "Data Management in the Worldwide Sensor Web," IEEE Pervasive Computing, vol.6, no.2, pp.30-40, April-June 2007 DOI: https://doi.org/10.1109/MPRV.2007.27

M. Bellis, "The History of the ENIAC Computer," About.com Guide

D. Estrin, "Participatory sensing: applications and architecture [Internet Predictions]," Internet Computing, IEEE, vol.14, no.1, pp.12-42, Jan.-Feb. 2010 DOI: https://doi.org/10.1109/MIC.2010.12

Published
2018-02-28
How to Cite
Upadhyay, S. (2018). ONGOING CHALLENGES AND RESEARCH OPPORTUNITIES IN INTERNET OF THINGS (IOT). International Journal of Engineering Technologies and Management Research, 5(2), 216-222. https://doi.org/10.29121/ijetmr.v5.i2.2018.647