Information Systems Frontiers

, Volume 17, Issue 2, pp 243–259 | Cite as

The internet of things: a survey



In recent year, the Internet of Things (IoT) has drawn significant research attention. IoT is considered as a part of the Internet of the future and will comprise billions of intelligent communicating ‘things’. The future of the Internet will consist of heterogeneously connected devices that will further extend the borders of the world with physical entities and virtual components. The Internet of Things (IoT) will empower the connected things with new capabilities. In this survey, the definitions, architecture, fundamental technologies, and applications of IoT are systematically reviewed. Firstly, various definitions of IoT are introduced; secondly, emerging techniques for the implementation of IoT are discussed; thirdly, some open issues related to the IoT applications are explored; finally, the major challenges which need addressing by the research community and corresponding potential solutions are investigated.


Literature Review IoT Internet of Things RFID Wireless Sensors Network Service Oriented Architecture 


  1. Alcaraz, C., & Lopez, J. (2010). A security analysis for wireless sensor mesh networks in highly critical systems. IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews, 40(4), 419–428.CrossRefGoogle Scholar
  2. Atzori, L., Iera, A., & Morabito, G. (2011). SIoT: giving a social structure to the internet of things. IEEE Communication Letters, 15(11), 1193–1195.CrossRefGoogle Scholar
  3. Bi, Z., Xu, L., & Wang, C. (2014). Internet of Things for enterprise systems of modern manufacturing. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2300338.
  4. Bluetooth SIG. (2014). Generic Attributed Profile (GATT). Bluetooth SIG Specification,
  5. Broll, G., Rukzio, E., Paolucci, M., Wagner, M., Schmidt, A., & Hussmann, H. (2009). Perci: pervasive service interaction with the internet of things. IEEE Internet Computing, 13(6), 74–81.CrossRefGoogle Scholar
  6. Cai, H., Xu, L., Xu, B., Xie, C., Qin, S., & Jiang, L. (2014). IoT-based configurable information service platform for product lifecycle management. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2306391.
  7. Chi, Q., Yan, H., Zhang, C., Pang, Z., & Xu, L. (2012). A reconfigurable smart sensor interface for industrial WSN in IoT environment. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2306798.
  8. Ciganek, A., Haseman, W., & Ramamurthy, K. (2014). Time to decisions: the drivers of innovation adoption decisions. Enterprise Information Systems, 8(2), 279–308.CrossRefGoogle Scholar
  9. Dada, A., & Thiesse, F. (2008). Sensor applications in the supply chain: the example of quality-based issuing of perishables. LNCS, 4952, 140–154.Google Scholar
  10. Deng, R. H., Li, Y., Yung, M., & Zhao, Y. (2010). A new framework for RFID privacy. LNCS, 6345, 1–18.Google Scholar
  11. EPCglobal. (2013). Radio-frequency identity protocols class-1 generation-2 uhf rfid protocol for communications at 860–960 MHz, Version 1.2.0,
  12. ETSI. (2013). The European Telecommunications Standards Institute, [cited 2013 May 20]; available from
  13. Fan, Y., Yin, Y., Xu, L., Zeng, Y., & Wu, F. (2014). IoT based smart rehabilitation system. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2302583.
  14. Fang S., Xu, L., Zhu, Y., Ahati, J., Pei, H., Yan, J., et al. (2014). An integrated system for regional environmental monitoring and management based on Internet of Things. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2302638.
  15. Fielding, R. T., & Taylor, R. N. (2002). Principled design of the modern web architecture. ACM Transactions Internet Technology, 2(2), 115–150.CrossRefGoogle Scholar
  16. Fleisch, E. (2013) What is the Internet of things? [cited 2013 May 20]; available from .
  17. Floerkemeier, C., Roduner, C., & Lampe, M. (2007). RFID application development with the Accada middleware platform. IEEE Systems Journal, 1(2), 82–94.CrossRefGoogle Scholar
  18. Frenken, T., Spiess, P., & Anke, J. (2008). A flexible and extensible architecture for device-level service deployment. LNCS, 5377, 230–241.Google Scholar
  19. Gama, K., Touseau, L., & Donsez, D. (2012). Combining heterogeneous service technologies for building an Internet of Things middleware. Computer Communications, 35(4), 405–417.CrossRefGoogle Scholar
  20. Guinard, D., Trifa, V., Pham, T., & Liechti, O. (2009). Towards physical mashups in the web of things. Proc. IEEE Sixth International Conference on Networked Sensing Systems (INSS 09), Pittsburgh, PA, pp.196–199.Google Scholar
  21. Guinard, D., Trifa, V., Karnouskos, S., & Spiess, P. (2010). Interacting with the SoA-based internet of things: discovery, query, selection, and on-demand provisioning of web services. IEEE Transactions on Service Computing, 3(3), 223–235.CrossRefGoogle Scholar
  22. Guo, J., Xu, L. D., Xiao, G., & Gong, Z. (2012). Improving multilingual semantic interoperation in cross-organizational enterprise systems through concept disambiguation. IEEE Transactions on Industrial Informatics, 8(3), 647–658.CrossRefGoogle Scholar
  23. Hachani, S., Gzara, L., & Verjus, H. (2013). A service-oriented approach for flexible process support within enterprises: application on PLM systems. Enterprise Information Systems, 7(1), 79–99.CrossRefGoogle Scholar
  24. He, W., & Xu, L. (2014). Integration of distributed enterprise applications: a survey. IEEE Transactions on Industrial Informatics, 10(1), 35–42.CrossRefGoogle Scholar
  25. He, W., Yan, G., & Xu, L. (2014) Developing vehicular data cloud services in the IoT environment. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2299233.
  26. Hepp, M., Siorpaes, K., & Bachlechner, D. (2007). Harvesting Wiki consensus: using wikipedia entries as vocabulary for knowledge management. IEEE Internet Computing, 11(5), 54–65.CrossRefGoogle Scholar
  27. Hernandez-Castro, J. C., Tapiador, J., Peris-Lopez, P., & Quisquater, J. (2013). Cryptanalysis of the SASI ultra-light weight RFID authentication protocol, [cited 2013 May 20]; available from .
  28. Hunter, D., Yu, H., Pukish, M., Kolbusz, J., & Wilamowski, B. (2012). Selection of proper neural network sizes and architectures-a comparative study. IEEE Transactions on Industrial Informatics, 8(2), 228–240.CrossRefGoogle Scholar
  29. IERC. (2013). Coordinating and building a broadly based consensus on the ways to realise the internet of things in Europe, [cited 2013 May 20]; available from
  30. Ilic, A., Staake, T., & Fleisch, E. (2009). Using sensor information to reduce the carbon footprint of perishable goods. IEEE Pervasive Computing, 8(1), 22–29.CrossRefGoogle Scholar
  31. ITU. (2013). The internet of Things, International Telecommunication Union (ITU), Internet Report [cited 2013 May 20]; available from
  32. Jara, A. J., Zamora-Izquierdo, M. A., & Skarmeta, A. F. (2013). Interconnection framework for mHealth and remote monitoring based on the internet of things. IEEE Journal on Selected Areas in Communications, 31(9), 47–65.CrossRefGoogle Scholar
  33. Jardim-Goncalves, R., Grilo, A., Agostinho, C., Lampathaki, F., & Charalabidis, Y. (2013). Systematisation of interoperability body of knowledge: the foundation for enterprise interoperability as a science. Enterprise Information Systems, 7(1), 7–32.CrossRefGoogle Scholar
  34. Jiang, H., Zhao, S., Zhang, Y., & Chen, Y. (2012a). The cooperative effect between technology standardization and industrial technology innovation based on Newtonian mechanics. Information Technology and Management, 13(4), 251–262.CrossRefGoogle Scholar
  35. Jiang, H., Zhao, S., Qiu, S., & Chen, Y. (2012b). Strategy for technology standardization based on the theory of entropy. Information Technology and Management, 13(4), 311–320.CrossRefGoogle Scholar
  36. Jiang, H., Zhao, S., Wang, X., & Bi, Z. (2013). Applying electromagnetic field theory to study the synergistic relationships between technology standardization and technology development. Systems Research and Behavioral Science, 30(3), 272–286.CrossRefGoogle Scholar
  37. Jiang, L., Xu, L., Cai, H., Jiang, Z., Bu, F., & Xu, B. (2014). An IoT oriented data storage framework in cloud computing platform. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2306384.
  38. Joshi, G. P., & Kim, S. W. (2013). Survey, nomenclature and comparison of reader anti-collision protocols in RFID, IETE Technical Review, [cited 2013 May 20]; available from
  39. Juels, A. (2006). RFID security and privacy: a research survey. IEEE Selected Areas in Communications, 24(2), 381–394.CrossRefGoogle Scholar
  40. Kang, K., Pang, Z., Xu, L., Ma, L., & Wang, C. (2014). An interactive trust model for application market of the Internet of Things. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2306799.
  41. Karpischek, S., Michahelles, F., Resatsch, F., & Fleisch, E. (2009). Mobile sales assistant – an NFC-based product information system for retailers. Proceedings of the First International Workshop on Near Field Communications 2009, Hagenberg, Austria, 2009, pp.20–23.Google Scholar
  42. Kataev, M., Bulysheva, L., Emelyanenko, A., & Emelyanenko, V. (2013). Enterprise systems in Russia: 1992–2012. Enterprise Information Systems, 7(2), 169–186.CrossRefGoogle Scholar
  43. Kirtsis, D. (2011). Closed-loop PLM for intelligent products in the era of the internet of things. Computer-Aided Design, 43(5), 479–501.CrossRefGoogle Scholar
  44. Klair, D. K., Chin, K.-W., & Raad, R. (2010). A survey and tutorial of RFID anti-collision protocols. IEEE Communications Surveys and Tutorials, 12(3), 400–421.CrossRefGoogle Scholar
  45. Kranenburg, V. (2013). Moscow futurodesign lab co-create urban intelligence: designing smart interfaces between people and city, [cited 2013 May 20]; available from
  46. Kranenburg, R., & Anzelmo, E. (2011) The Internet of Things, 1st Berlin Symposium on Internet and society, Oct 25–27, 2011.Google Scholar
  47. Krapelse, H. J. (2013). RFID application in healthcare – scoping and identifying areas for RFID deployment in healthcare delivery, RAND Europe. [cited 2013 May 20]; available from
  48. Lam, C., & Ip, W. (2012). An improved spanning tree approach for the reliability analysis of supply chain collaborative network. Enterprise Information Systems, 6(4), 405–418.CrossRefGoogle Scholar
  49. Li, L. (2012). Effects of enterprise technology on supply chain collaboration: analysis of China-linked supply chain. Enterprise Information Systems, 6(1), 55–77.CrossRefGoogle Scholar
  50. Li, L. (2013). Technology designed to combat fakes in the global supply chain. Business Horizons, 56(2), 167–177.CrossRefGoogle Scholar
  51. Li, L., & Liu, J. (2012). An efficient and flexible web services-based multidisciplinary design optimisation framework for complex engineering systems. Enterprise Information Systems, 6(3), 345–371.CrossRefGoogle Scholar
  52. Li, S., Xu, L., Wang, X., & Wang, J. (2012a). Integration of hybrid wireless networks in cloud services oriented enterprise information systems. Enterprise Information Systems, 6(2), 165–187.CrossRefGoogle Scholar
  53. Li, Y., Hou, M., Liu, H., & Liu, Y. (2012b). Towards a theoretical framework of strategic decision, supporting capability and information sharing under the context of Internet of Things. Information Technology and Management, 13(4), 205–216.CrossRefGoogle Scholar
  54. Li, Q., Wang, Z., Li, W., Li, J., Wang, C., & Du, R. (2013a). Applications integration in a hybrid cloud computing environment: modelling and platform. Enterprise Information Systems, 7(3), 237–271.CrossRefGoogle Scholar
  55. Li, S., Xu, L., & Wang, X. (2013b). Compressed sensing signal and data acquisition in wireless sensor networks and internet of things. IEEE Transactions on Industrial Informatics, 9(4), 2177–2186.CrossRefGoogle Scholar
  56. Li, L., Li, S., & Zhao, S. (2014a). QoS-aware scheduling of service-oriented Internet of Things. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2306782.
  57. Li, S., Oikonomou, G., Tryfonas, T., & Chen, TM. (2014). A distributed consensus algorithm for decision-making in service-oriented Internet of Things. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2306331.
  58. Malatras, A., Asgari, A., & Bauge, T. (2008). Web enabled wireless sensor networks for facilities management. IEEE Systems Journal, 2(4), 500–512.CrossRefGoogle Scholar
  59. Marry, W. (2013). Disruptive civil technologies six technologies with potential impacts on us interests out to 2025, [cited 2013 May 20]; available from
  60. Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: vision, applications and research challenges. Ad hoc Networks, 10(7), 1497–1516.CrossRefGoogle Scholar
  61. Mitrokotsa, A., Rieback M. R., & Tanenbaum, A. S. (2013). Classifying RFID attacks and defences. [cited 2013 May 20]; available from
  62. Mutti, C., & Floerkemeier, C. (2008) CDMA-based RFID systems in dense scenarios: Concepts and challenges. Proc. IEEE Int. Conf. on RFID, Las Vegas, NV, pp. 215–222.Google Scholar
  63. Panetto, H., & Cecil, J. (2013). Editorial Information systems for enterprise integration, interoperability and networking: theory and applications. Enterprise Information Systems, 7(1), 1–6.CrossRefGoogle Scholar
  64. Pautasso, C., & Wilde, E. (2009). Why is the web loosely coupled? A multifaceted metric for service design. Proc. 18th International World Wide Web Conference (WWW 09), pp. 911–920.Google Scholar
  65. Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006). M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags. Lecture Notes in Computer Science, 4159, 912–923.CrossRefGoogle Scholar
  66. Pretz, K. (2013). The Next Evolution of the Internet. [cited 2013 May 20]; available from
  67. Ren, L., Zhang, L., Tao, F., Zhang, X., Luo, Y., & Zhang, Y. (2012). A methodology towards virtualisation-based high performance simulation platform supporting multidisciplinary design of complex products. Enterprise Information Systems, 6(3), 267–290.CrossRefGoogle Scholar
  68. Roman, R., & Lopez, J. (2009). Integrating wireless sensor networks and the internet: a security analysis. Internet Research, 19(2), 246–259.CrossRefGoogle Scholar
  69. Roman, R., Alcaraz, C., Lopez, J., & Sklavos, N. (2011). Key management systems for sensor networks in the context of the Internet of Things. Computers and Electrical Engineering, 37(2), 147–159.CrossRefGoogle Scholar
  70. Tan, W., Xu, W., Yang, F., Xu, L., & Jiang, C. (2013). A framework for service enterprise workflow simulation with multi-agents cooperation. Enterprise Information Systems, 7(4), 523–542.CrossRefGoogle Scholar
  71. Tao, F., Cheng, Y., Xu, L., Zhang, L., & Li, B. (2014a). CCIoT-CMfg: cloud computing and Internet of Things based cloud manufacturing service system. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2306383.
  72. Tao, F., Zuo, Y., Xu, L., & Zhang, L. (2014b). IoT based intelligent perception and access of manufacturing resource towards cloud manufacturing. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2306397.
  73. Ulmer, J., Belaud, J., & Le Lann, J. (2013). A pivotal-based approach for enterprise business process and IS integration. Enterprise Information Systems, 7(1), 61–78.CrossRefGoogle Scholar
  74. van Looy, A., Backer, M., & Poels, G. (2014). A conceptual framework and classification of capability areas for business process maturity. Enterprise Information Systems, 8(2), 188–224.Google Scholar
  75. Vermesan, O. (2013). CERP-IoT strategic research agenda. [cited 2013 May 20]; available from
  76. Vilamovska, A. M., Hatziandreu, E., Schindler, H. R., Oranje-Nassau, C. V., Vries, H., Krapels, J. (2012). Study on the requirements and options for RFID application in healthcare Identifying areas for Radio Frequency Identification deployment in healthcare delivery: a review of relevant literature. Directorate General Information Society and Media, European Commission. Santa Monica, CA, USA: The RAND Corporation.Google Scholar
  77. Viriyasitavat, W., Xu, L., & Viriyasitavat, W. (2014a). Compliance checking for requirement-oriented service workflow interoperations. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2301132.
  78. Viriyasitavat, W., Xu, L., & Viriyasitavat, W. (2014b). A new approach for compliance checking in service workflows. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2301143.
  79. Wang, C. (2012). Editorial advances in information integration infrastructures supporting multidisciplinary design optimization. Enterprise Information Systems, 6(3), 265.Google Scholar
  80. Wang, X., & Xu, X. (2012). DIMP: an interoperable solution for software integration and product data exchange. Enterprise Information Systems, 6(3), 291–314.CrossRefGoogle Scholar
  81. Wang, F., Ge, B., Zhang, L., Chen, Y., Xin, Y., & Li, X. (2013). A systems framework of security management in enterprise systems. Systems Research and Behavioral Science, 30(3), 287–299.CrossRefGoogle Scholar
  82. Wang, C., Bi, Z., & Xu, L. (2014). IoT and cloud computing in automation of assembly modelling systems. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2300346.
  83. Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S., Balazinska, M., & Borriello, G. (2009). Building the internet of things using RFID: the RFID ecosystem experience. IEEE Internet Computer, 13(3), 48–55.CrossRefGoogle Scholar
  84. Wilamowski, B. (2010). Challenges in Applications of Computational Intelligence in Industrial Electronics. Proceedings of IEEE International Symposium on Industrial Electronics (IEEE ISIE 2010), Bari, Italy, July 4–7, 2010, pp. 15–22.Google Scholar
  85. Xiao, G., Guo, J., Xu, L., Gong, Z. (2014). User interoperability with heterogeneous IoT devices through transformation. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2306772.
  86. Xing, Y., Li, L., Bi, Z., Wilamowska-Korsak, M., & Zhang, L. (2013). Operations research (OR) in service industries: a comprehensive review. Systems Research and Behavioral Science, 30(3), 300–353.CrossRefGoogle Scholar
  87. Xu, L. (2011a). Enterprise systems: state-of-the-art and future trends. IEEE Transactions on Industrial Informatics, 7(4), 630–640.CrossRefGoogle Scholar
  88. Xu, L. (2011b). Information architecture for supply chain quality management. International Journal of Production Research, 49(1), 183–198.CrossRefGoogle Scholar
  89. Xu, L., & Viriyasitavat, W. (2014). A novel architecture for requirement-oriented participation decision in service workflows. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2301378.
  90. Xu, L. D., Viriyasitavat, W., Ruchikachorn, P., & Martin, A. (2012a). Using propositional logic for requirements verification of service workflow. IEEE Transactions on Industrial Informatics, 8(3), 639–646.CrossRefGoogle Scholar
  91. Xu, L. D., Wang, C., Bi, Z., & Yu, J. (2012b). AutoAssem: an automated assembly planning system for complex products. IEEE Transactions on Industrial Informatics, 8(3), 669–678.CrossRefGoogle Scholar
  92. Xu, B., Xu, L., Cai, H., Xie, C., Hu, J., & Bu, F. (2014). Ubiquitous data accessing method in IoT-based information system for emergency medical services. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2306382.
  93. Zheng, X., Martin, P., Brohman, K., & Xu, L. (2014a). CLOUDQUAL: a quality model for cloud services. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2306329.
  94. Zheng, X., Martin, P., Brohman, K., & Xu, L. (2014b). Cloud service negotiation in IoT environment: a mixed approach. IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2014.2305641.

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.Faculty of EngineeringUniversity of BristolCliftonUK
  2. 2.Department of Information Technology and Decision ScienceOld Dominion UniversityNorfolkUSA
  3. 3.School of ComputingUniversity of the West of ScotlandPaisleyUK

Personalised recommendations