DOI QR코드

DOI QR Code

Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions

  • Gafurov, Khusanbek (College of Information and Communication Engineering, Sungkyunkwan University) ;
  • Chung, Tai-Myoung (College of Information and Communication Engineering, Sungkyunkwan University)
  • Received : 2019.01.03
  • Accepted : 2019.04.18
  • Published : 2019.08.31

Abstract

Internet of Things (IoT) is the paradigm of network of Internet-connected things as objects that constantly sense the physical world and share the data for further processing. At the core of IoT lies the early technology of radio frequency identification (RFID), which provides accurate location tracking of real-world objects. With its small size and convenience, RFID tags can be attached to everyday items such as books, clothes, furniture and the like as well as to animals, plants, and even humans. This phenomenon is the beginning of new applications and services for the industry and consumer market. IoT is regarded as a fourth industrial revolution because of its massive coverage of services around the world from smart homes to artificial intelligence-enabled smart driving cars, Internet-enabled medical equipment, etc. It is estimated that there will be several dozens of billions of IoT devices ready and operating until 2020 around the world. Despite the growing statistics, however, IoT has security vulnerabilities that must be addressed appropriately to avoid causing damage in the future. As such, we mention some fields of study as a future topic at the end of the survey. Consequently, in this comprehensive survey of IoT, we will cover the architecture of IoT with various layered models, security characteristics, potential applications, and related supporting technologies of IoT such as 5G, MEC, cloud, WSN, etc., including the economic perspective of IoT and its future directions.

Keywords

References

  1. F. Mattern and C. Florkemeier, "Vom internet der computer zum internet der dinge," Informatik-Spektrum, vol. 33, no. 2, pp. 107-121, 2010. https://doi.org/10.1007/s00287-010-0417-7
  2. J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, "A survey on internet of things: architecture, enabling technologies, security and privacy, and applications," IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1125-1142, 2017. https://doi.org/10.1109/JIOT.2017.2683200
  3. K. K. Patel and S. M. Patel, "Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application & future challenges," International Journal of Engineering Science and Computing, vol. 6, no. 5, pp. 6122-6131, 2016.
  4. A. Mosenia and N. K. Jha, "A comprehensive study of security of Internet-of-Things," IEEE Transactions on Emerging Topics in Computing, vol. 5, no. 4, pp. 586-602, 2016. https://doi.org/10.1109/TETC.2016.2606384
  5. L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: a survey," Computer Networks, vol. 54, no. 15, pp. 2787-2805, 2010. https://doi.org/10.1016/j.comnet.2010.05.010
  6. R. Buyya and A. Dastjerdi, Internet of Things Principles and Paradigms. Cambridge, MA: Morgan Kaufmann, 2016.
  7. A. B. Pawar and S. Ghumbre, "A survey on IoT applications, security challenges and counter measures," in Proceedings of 2016 International Conference on Computing, Analytics and Security Trends (CAST), Pune, India, 2016, pp. 294-299.
  8. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): a vision, architectural elements, and future directions," Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013. https://doi.org/10.1016/j.future.2013.01.010
  9. H. Sundmaeker, P. Guillemin, P. Friess, and S. Woelffle, Vision and Challenges for Realising the Internet of Things. Brussel, Belgium: Cluster of European Research Projects on the Internet of Things, 2010.
  10. R. Khan, S. U. Khan, R. Zaheer, and S. Khan, "Future Internet: the internet of things architecture, possible applications and key challenges," in Proceedings of 2012 10th International Conference on Frontiers of Information Technology, Islamabad, India, 2012, pp. 257-260.
  11. D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, "Internet of Things: vision, applications and research challenges," Ad Hoc Networks, vol. 10, no. 7, pp. 1497-1516, 2012. https://doi.org/10.1016/j.adhoc.2012.02.016
  12. CISCO, "The Internet of Things reference model," 2014 [Online]. Available: http://cdn.iotwf.com/resources/71/IoT_Reference_Model_White_Paper_June_4_2014.pdf.
  13. S. U. Maheswari, N. S. Usha, E. M. Anita, and K. R. Devi, "A novel robust routing protocol RAEED to avoid DoS attacks in WSN," in Proceedings of 2016 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, India, 2016, pp. 1-5.
  14. F. Palermo, "Internet of Things done wrong stifles innovation," 2014 [Online]. Available: https://www.informationweek.com/strategic-cio/executive-insights-and-innovation/internet-of-things-done-wrong-stiflesinnovation/a/d-id/1279157.
  15. A. Singh, S. Meshram, T. Gujar, and P. R. Wankhede, "Baggage tracing and handling system using RFID and IoT for airports," in Proceedings of 2016 International Conference on Computing, Analytics and Security Trends (CAST), Pune, India, 2016, pp. 466-470.
  16. K. A. Patil and N. R. Kale, "A model for smart agriculture using IoT," in Proceedings of 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC), Jalgaon, India, 2016, pp. 543-545.
  17. J. C. Zhao, J. F. Zhang, Y. Feng, and J. X. Guo, "The study and application of the IOT technology in agriculture," in Proceedings of 2010 3rd International Conference on Computer Science and Information Technology, Chengdu, China, 2010, pp. 462-465.
  18. Z. Ju and Y. Li, "Analysis on Internet of Things (IOT) based on the "Subway Supermarket" e-commerce mode of TESCO," in Proceedings of 2011 International Conference on Information Management, Innovation Management and Industrial Engineering, Shenzhen, China, 2011, pp. 430-433.
  19. F. J. Wu, Y. F. Kao, and Y. C. Tseng, "From wireless sensor networks towards cyber physical systems," Pervasive and Mobile Computing, vol. 7, no. 4, pp. 397-413, 2011. https://doi.org/10.1016/j.pmcj.2011.03.003
  20. A. R. Biswas and R. Giaffreda, "IoT and cloud convergence: opportunities and challenges," in Proceedings of 2014 IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea, 2014, pp. 375-376.
  21. W. Yu, F. Liang, X. He, W. G. Hatcher, C. Lu, J. Lin, and X. Yang, "A survey on the edge computing for the Internet of Things," IEEE Access, vol. 6, pp. 6900-6919, 2017. https://doi.org/10.1109/access.2017.2778504
  22. T. Subramanya, L. Goratti, S. N. Khan, E. Kafetzakis, I. Giannoulakis, and R. Riggio, "A practical architecture for mobile edge computing," in Proceedings of 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Berlin, Germany, 2017, pp. 1-4.
  23. S. Mumtaz, K. M. S. Huq, and J. Rodriguez, "Direct mobile-to-mobile communication: paradigm for 5G," IEEE Wireless Communications, vol. 21, no. 5, pp. 14-23, 2014. https://doi.org/10.1109/MWC.2014.6940429
  24. P. Yadav and S. Vishwakarma, "Application of Internet of Things and big data towards a smart city," in Proceedings of 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoTSIU), Bhimtal, India, 2018, pp. 1-5.
  25. M. S. Mahdavinejad, M. Rezvan, M. Barekatain, P. Adibi, P. Barnaghi, and A. P. Sheth, "Machine learning for Internet of Things data analysis: a survey," Digital Communications and Networks, vol. 4, no. 3, pp. 161-175, 2018. https://doi.org/10.1016/j.dcan.2017.10.002
  26. M. Weiser, "The computer for the 21st century," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 3, no. 3, pp. 3-11, 1999. https://doi.org/10.1145/329124.329126
  27. N. Gyory and M. Chuah, "IoTOne: integrated platform for heterogeneous IoT devices," in Proceedings of 2017 International Conference on Computing, Networking and Communications (ICNC), Santa Clara, CA, 2017, pp. 783-787.
  28. P. Gaur and M. P. Tahiliani, "Operating systems for IoT devices: a critical survey," in Proceedings of 2015 IEEE Region 10 Symposium, Ahmedabad, India, 2015, pp. 33-36.
  29. K. Xu, Y. Qu, and K. Yang, "A tutorial on the internet of things: from a heterogeneous network integration perspective," IEEE Network, vol. 30, no. 2, pp. 102-108, 2016. https://doi.org/10.1109/MNET.2016.7437031
  30. A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of Things: a survey on enabling technologies, protocols, and applications," IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2347-2376, 2015. https://doi.org/10.1109/COMST.2015.2444095
  31. S. Madakam, R. Ramaswamy, and S. Tripathi, "Internet of Things (IoT): a literature review," Journal of Computer and Communications, vol. 3, pp. 164-173, 2015.
  32. N. Abbas, Y. Zhang, A. Taherkordi, and T. Skeie, "Mobile edge computing: a survey," IEEE Internet of Things Journal, vol. 5, no. 1, pp. 450-465, 2018. https://doi.org/10.1109/JIOT.2017.2750180
  33. A. A. Gendreau and M. Moorman, "Survey of intrusion detection systems towards an end to end secure Internet of Things," in Proceedings of 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria, 2016, pp. 84-90.
  34. A. H. Ngu, M. Gutierrez, V. Metsis, S. Nepal, and Q. Z. Sheng, "IoT middleware: a survey on issues and enabling technologies," IEEE Internet of Things Journal, vol. 4, no. 1, pp. 1-20, 2016. https://doi.org/10.1109/JIOT.2016.2615180
  35. A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, "Internet of Things for smart cities," IEEE Internet of Things Journal, vol. 1, no. 1, pp. 22-32, 2014. https://doi.org/10.1109/JIOT.2014.2306328
  36. T. Qiu, N. Chen, K. Li, M. Atiquzzaman, and W. Zhao, "How can heterogeneous Internet of Things build our future: a survey," IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 2011-2027, 2018. https://doi.org/10.1109/COMST.2018.2803740
  37. N. Aleisa and K. Renaud, "Privacy of the Internet of Things: a systematic literature review (extended discussion)," 2016 [Online]. Available: https://arxiv.org/abs/1611.03340.
  38. A. K. Sikder, G. Petracca, H. Aksu, T. Jaeger, and A. S. Uluagac, "A survey on sensor-based threats to Internetof-Things (IoT) devices and applications," 2018 [Online]. Available: https://arxiv.org/abs/1802.02041.
  39. S. Bera, S. Misra, and A. V. Vasilakos, "Software-defined networking for internet of things: a survey," IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1994-2008, 2017. https://doi.org/10.1109/JIOT.2017.2746186
  40. S. H. Ahmed, G. Kim, and D. Kim, "Cyber physical system: architecture, applications and research challenges," in Proceedings of 2013 IFIP Wireless Days (WD), Valencia, Spain, 2013, pp. 1-5.
  41. I. Andrea, C. Chrysostomou, and G. Hadjichristofi, "Internet of Things: security vulnerabilities and challenges," in Proceedings of 2015 IEEE Symposium on Computers and Communication (ISCC), 2015, pp. 180-187.
  42. M. V. Bharathi, R. C. Tanguturi, C. Jayakumar, and K. Selvamani, "Node capture attack in wireless sensor network: a survey," in Proceedings of 2012 IEEE International Conference on Computational Intelligence and Computing Research, Coimbatore, India, 2012, pp. 1-3.
  43. F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the Internet of Things," in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland, 2012, pp. 13-16.
  44. A. Botta, W. De Donato, V. Persico, and A. Pescape, "On the integration of cloud computing and Internet of Things," in Proceedings of 2014 International Conference on Future Internet of Things and Cloud, Barcelona, Spain, 2014, pp. 23-30.
  45. A. A. Cardenas, S. Amin, and S. Sastry, "Secure control: towards survivable cyber-physical systems," in Proceedings of 2008 the 28th International Conference on Distributed Computing Systems Workshops, Beijing, China, 2008, pp. 495-500.
  46. Z. Chen, G. Xu, V. Mahalingam, L. Ge, J. Nguyen, W. Yu, and C. Lu, "A cloud computing based network monitoring and threat detection system for critical infrastructures," Big Data Research, vol. 3, pp. 10-23, 2016. https://doi.org/10.1016/j.bdr.2015.11.002
  47. X. Fu, Z. Ling, W. Yu, and J. Luo, "Cyber Crime Scene Investigations $(C^2SI)$ through cloud computing," in Proceedings of 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops, Genova, Italy, 2010, pp. 26-31.
  48. G. Gan, Z. Lu, and J. Jiang, "Internet of Things security analysis," in Proceedings of 2011 International Conference on Internet Technology and Applications, Wuhan, China, 2011, pp. 1-4.
  49. M. Leo, F. Battisti, M. Carli, and A. Neri, "A federated architecture approach for Internet of Things security," in Proceedings of 2014 Euro Med Telco Conference (EMTC), Naples, Italy, 2014, pp. 1-5.
  50. R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, "Internet of Things (IoT) security: current status, challenges and prospective measures," in Proceedings of 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, UK, 2015, pp. 336-341.
  51. J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis & defenses," in Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, CA, 2004, pp. 259-268.
  52. R. P. Padhy, M. R. Patra, and S. C. Satapathy, "Cloud computing: security issues and research challenges," International Journal of Computer Science and Information Technology & Security (IJCSITS), vol. 1, no. 2, pp. 136-146, 2011.
  53. W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, "Edge computing: vision and challenges," IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637-646, 2016. https://doi.org/10.1109/JIOT.2016.2579198
  54. V. Soni, P. Modi, and V. Chaudhri, "Detecting Sinkhole attack in wireless sensor network," International Journal of Application or Innovation in Engineering & Management, vol. 2, no. 2, pp. 29-32, 2013.
  55. I. Stojmenovic and S. Wen, "The fog computing paradigm: Scenarios and security issues," in Proceedings of 2014 Federated Conference on Computer Science and Information Systems, Warsaw, Poland, 2014, pp. 1-8.
  56. H. Suo, J. Wan, C. Zou, and J. Liu, "Security in the Internet of Things: a review," in Proceedings of 2012 International Conference on Computer Science and Electronics Engineering, Hangzhou, China, 2012, pp. 648-651.
  57. J. Wu and W. Zhao, "Design and realization of WInternet: from net of things to Internet of Things," ACM Transactions on Cyber-Physical Systems, vol. 1, no. 1, article no. 2, 2017.
  58. M. Wu, T. J. Lu, F. Y. Ling, J. Sun, and H. Y. Du, "Research on the architecture of Internet of Things," in Proceedings of 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), Chengdu, China, 2010, pp. 484-487.
  59. K. Zhang, X. Liang, R. Lu, and X. Shen, "Sybil attacks and their defenses in the Internet of Things," IEEE Internet of Things Journal, vol. 1, no. 5, pp. 372-383, 2014. https://doi.org/10.1109/JIOT.2014.2344013
  60. K. Zhao and L. Ge, "A survey on the internet of things security," in Proceedings of 2013 9th International Conference on Computational Intelligence and Security, Leshan, China, 2013, pp. 663-667.
  61. A. M. Nia, M. Mozaffari-Kermani, S. Sur-Kolay, A. Raghunathan, and N. K. Jha, "Energy-efficient long-term continuous personal health monitoring," IEEE Transactions on Multi-Scale Computing Systems, vol. 1, no. 2, pp. 85-98, 2015. https://doi.org/10.1109/TMSCS.2015.2494021
  62. C. Li, A. Raghunathan, and N. K. Jha, "Hijacking an insulin pump: security attacks and defenses for a diabetes therapy system," in Proceedings of 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, Columbia, MO, 2011, pp. 150-156.
  63. D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel, "Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses," in Proceedings of 2008 IEEE Symposium on Security and Privacy, Oakland, CA, 2008, pp. 129-142.
  64. N. N. Dao, T. V. Phan, J. Kim, T. Bauschert, and S. Cho, "Securing heterogeneous IoT with intelligent DDoS attack behavior learning," 2017 [Online]. Available: https://arxiv.org/abs/1711.06041.
  65. S. Schneider, "Understanding the protocols behind the Internet of Things," 2013 [Online]. Available: https://www.electronicdesign.com/iot/understanding-protocols-behind-internet-things.
  66. C. Bormann, A. P. Castellani, and Z. Shelby, "CoAP: an application protocol for billions of tiny internet nodes," IEEE Internet Computing, vol. 16, pp. 62-67, 2012. https://doi.org/10.1109/MIC.2012.29
  67. Object Management Group, "Data Distribution Service (DDS), version 1.2," 2007 [Online]. Available: https://www.omg.org/spec/DDS/1.2/About-DDS/.
  68. C. Gomez and J. Paradells, "Wireless home automation networks: a survey of architectures and technologies," IEEE Communications Magazine, vol. 48, no. 6, pp. 92-101, 2010. https://doi.org/10.1109/MCOM.2010.5473869
  69. Y. Liu, "The study on smart city construction assessment based on TOPSIS-"the Beijing-Tianjin-Tangshan City Clusters" as the case," in Proceedings of 2016 International Conference on Smart City and Systems Engineering (ICSCSE), Hunan, China, 2016, pp. 321-325.
  70. S. Weagle, "The rise of IoT botnet threats and DDoS attacks," 2018. [Online]. Available: https://www.corero.com/blog/870-the-rise-of-iot-botnet-threats-and-ddos-attacks.html.
  71. M. Zhang, A. Raghunathan, and N. K. Jha, "Trustworthiness of medical devices and body area networks," Proceedings of the IEEE, vol. 102, no. 8, pp. 1174-1188, 2014. https://doi.org/10.1109/JPROC.2014.2322103
  72. A. M. Nia, S. Sur-Kolay, A. Raghunathan, and N. K. Jha, "Physiological information leakage: a new frontier in health information security," IEEE Transactions on Emerging Topics in Computing, vol. 4, no. 3, pp. 321-334, 2016. https://doi.org/10.1109/TETC.2015.2478003
  73. A. Juels, "RFID security and privacy: a research survey," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, 2006. https://doi.org/10.1109/JSAC.2005.861395
  74. M. R. Rieback, B. Crispo, and A. S. Tanenbaum, "RFID Guardian: a battery-powered mobile device for RFID privacy management," in Information Security and Privacy. Heidelberg: Springer, 2015, pp. 184-194.
  75. F. Griffiths and M. Ooi, "The fourth industrial revolution-Industry 4.0 and IoT [Trends in Future I&M]," IEEE Instrumentation & Measurement Magazine, vol. 21, no. 6, pp. 29-43, 2018. https://doi.org/10.1109/MIM.2018.8573590
  76. G. Press, "A very short history of Internet of Things," 2014 [Online]. Available: https://www.forbes.com/sites/gilpress/2014/06/18/a-very-short-history-of-the-internet-of-things/.
  77. Wikipeia, "Internet of Things," [Online]. Available: https://en.wikipedia.org/wiki/Internet_of_things#cite_noteETC:_Bill_Joy's_Six_Webs-12.
  78. Postscapes, "Internet of Things (IoT) history," [Online]. Available: https://www.postscapes.com/internet-ofthings-history/.
  79. J. Porter, "The history of Internet of Things (IoT) and how it's changed today," 2018 [Online]. Available: https://www.techprevue.com/history-iot-changed-today/.
  80. W. Belk, "Visual history of IoT - far beyond 'smart' things," 2016 [Online]. Available: https://medium.com/@wbelk/visual-history-of-iot-far-beyond-smart-things-325664d9794.
  81. J. Van Camp, "The 8 best smart speakers with Alexa and Google Assistant," 2019 [Online]. Available: https://www.wired.com/story/best-smart-speakers/.
  82. M. Cho, "Kakao AI speaker begins official sales," 2017 [Online]. Available: https://www.zdnet.com/article/kakao-ai-speaker-begins-official-sales/.
  83. A. Gluhak, S. Krco, M. Nati, D. Pfisterer, N. Mitton, and T. Razafindralambo, "A survey on facilities for experimental internet of things research," IEEE Communications Magazine, vol. 49, no. 11, pp. 58-67, 2011. https://doi.org/10.1109/MCOM.2011.6069710
  84. P. Brizzi, D. Conzon, H. Khaleel, R. Tomasi, C. Pastrone, A. M. Spirito, M. Knechtel, F. Pramudianto, and P. Cultrona, "Bringing the Internet of Things along the manufacturing line: a case study in controlling industrial robot and monitoring energy consumption remotely," in Proceedings of 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation (ETFA), Cagliari, Italy, 2013, pp. 1-8.
  85. M. S. Rahman, A. H. M. Noman, F. Shahari, M. Aslam, C. S. Gee, C. R. Isa, and S. Pervin, "Efficient energy consumption in industrial sectors and its effect on environment: a comparative analysis between G8 and Southeast Asian emerging economies," Energy, vol. 97, pp. 82-89, 2016. https://doi.org/10.1016/j.energy.2015.12.109
  86. S. Richardson, "Welcome to Songdo, South Korea: the smartest of smart cities," 2018 [Online]. Available: https://www.worldcrunch.com/smarter-cities-1/welcome-to-songdo-south-korea-the-smartest-of-smart-cities.
  87. A. Cenedese, A. Zanella, L. Vangelista, and M. Zorzi, "Padova smart city: an urban internet of things experimentation," in Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Sydney, Australia, 2014, pp. 1-6.
  88. J. Green, "Green cities on the cheap: low-cost solutions for a sustainable world," 2011 [Online]. Available: https://grist.org/smart-cities/2011-12-28-green-cities-on-the-cheap-low-cost-solutions-sustainable-world/.
  89. M. T. Lazarescu, "Design of a WSN platform for long-term environmental monitoring for IoT applications," IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 3, no. 1, pp. 45-54, 2013. https://doi.org/10.1109/JETCAS.2013.2243032
  90. M. Sharifi, S. S. Kashi, and S. P. Ardakani, "Lap: a lightweight authentication protocol for smart dust wireless sensor networks," in Proceedings of 2009 International Symposium on Collaborative Technologies and Systems, Baltimore, MD, 2009, pp. 258-265.
  91. The TerraSwarm Research Center [Online]. Available: https://terraswarm.org.
  92. Y. Jararweh, A. Doulat, O. AlQudah, E. Ahmed, M. Al-Ayyoub, and E. Benkhelifa, "The future of mobile cloud computing: integrating cloudlets and mobile edge computing," in Proceedings of 2016 23rd International Conference on Telecommunications (ICT), Thessaloniki, Greece, 2016, pp. 1-5.
  93. A. Manzalini and N. Crespi, "An edge operating system enabling anything-as-a-service," IEEE Communications Magazine, vol. 54, no. 3, pp. 62-67, 2016. https://doi.org/10.1109/MCOM.2016.7432173
  94. O. Salman, I. Elhajj, A. Kayssi, and A. Chehab, "Edge computing enabling the Internet of Things," in Proceedings of 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy, 2015, pp. 603-608.
  95. T. Lin, B. Park, H. Bannazadeh, and A. Leon-Garcia, "Demo abstract: End-to-end orchestration across SDI smart edges," in Proceedings of 2016 IEEE/ACM Symposium on Edge Computing (SEC), Washington, DC, 2016, pp. 127-128.
  96. J. Tan and S. G. Koo, "A survey of technologies in Internet of Things," in Proceedings of 2014 IEEE International Conference on Distributed Computing in Sensor Systems, Marina Del Rey, CA, 2014, pp. 269-274.
  97. M. R. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L. A. Grieco, G. Boggia, and M. Dohler, "Standardized protocol stack for the internet of (important) things," IEEE Communications Surveys & Tutorials, vol. 15, no. 3, pp. 1389-1406, 2012.
  98. H. B. Pandya and T. A. Champaneria, "Notice of retraction Internet of Things: survey and case studies," in Proceedings of 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), Visakhapatnam, India, 2015, pp. 1-6.
  99. P. Baronti, P. Pillai, V. W. Chook, S. Chessa, A. Gotta, and Y. F. Hu, "Wireless sensor networks: a survey on the state of the art and the 802.15. 4 and ZigBee standards," Computer Communications, vol. 30, no. 7, pp. 1655-1695, 2017. https://doi.org/10.1016/j.comcom.2006.12.020
  100. I. Ishaq, D. Carels, G. K. Teklemariam, J. Hoebeke, F. van den Abeele, E. De Poorter, I. Moerman, and P. Demeester, "IETF standardization in the field of the Internet of Things (IoT): a survey," Journal of Sensor and Actuator Networks, vo. 2, no. 2, pp. 235-287, 2013. https://doi.org/10.3390/jsan2020235
  101. Y. Lee, "How to navigate your way through Seoul," 2018 [Online]. Available: https://10mag.com/how-tonavigate-your-way-through-seoul/.
  102. J. S. Jang, Y. L. Kim, and J. H. Park, "A study on the optimization of the uplink period using machine learning in the future IoT network," in Proceedings of 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), Sydney, Australia, 2016, pp. 1-3.
  103. M. Suresh, U. Muthukumar, and J. Chandapillai, "A novel smart water-meter based on IoT and smartphone app for city distribution management," in Proceedings of 2017 IEEE Region 10 Symposium (TENSYMP), Cochin, India, 2017, pp. 1-5.
  104. G. A. Babu, K. Guruvayoorappan, V. S. Variyar, and K. P. Soman, "Design and fabrication of robotic systems: converting a conventional car to a driverless car," in Proceedings of 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India, 2017, pp. 857-863.
  105. ] D. Anstee, P. Bowen, C. F. Chui, and G. Sockrider, "Worldwide Infrastructure Security Report (volume XII)," Arbort Networks special report, 2017.
  106. E. Leverett and A. Kaplan, "Towards estimating the untapped potential: a global malicious DDoS mean capacity estimate," Journal of Cyber Policy, vol. 2, no. 2, pp. 195-208, 2017. https://doi.org/10.1080/23738871.2017.1362020
  107. A. Alsaidi and F. Kausar, "Security attacks and countermeasures on cloud assisted IoT applications," in Proceedings of 2018 IEEE International Conference on Smart Cloud (SmartCloud), New York, NY, 2018, pp. 213-217.
  108. M. Tehranipoor and F. Koushanfar, "A survey of hardware Trojan taxonomy and detection," IEEE Design & Test of Computers, vol. 27, no. 1, pp. 10-25, 2010.
  109. G. Hernandez, O. Arias, D. Buentello, and Y. Jin, "Smart nest thermostat: a smart spy in your home," in Proceedings of the Black Hat, Las Vegas, NV, 2014, pp. 1-8.
  110. J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, "Wireless sensor network security: a survey," in Security in Distributed, Grid, Mobile, and Pervasive Computing. Boca Raton, FL: CRC Press, 2007, pp. 367-410.
  111. P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, "M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags," in Ubiquitous Intelligence and Computing. Heidelberg: Springer, 2006, pp. 912-923.