Advertisement

Research Challenges in the Internet of Things (IoTs)

  • Seema Begum
  • Yao Nianmin
  • Syed Bilal Hussain ShahEmail author
  • Inam Ullah Khan
  • Satish Anamalamudi
Chapter
Part of the EAI/Springer Innovations in Communication and Computing book series (EAISICC)

Abstract

In the age of the technology and in the field of Computer Networking, devices integrated with the Internet of Things (IoT) resulted in a variety of popular E-Health, E-Commerce and E-Home. The Internet of Things will be next revolutionary term in the today internet. An important function of the IoT is to create various types of technologies, standards and then to integrate them. Today, the capacities of IoT are improving by establishing security for both small and large applications. To help and determine the direction of future research, IoT security challenges and privacy issues will be highlighted in this chapter. The chapter analyzes compares and consolidates the existing research, presents new findings and discusses innovations in the security of the IoT. The challenges in this chapter must be addressed, if the full potential of IoT is to be realized.

Keywords

Internet of Things (IoT) Research and development (R&D) Radiofrequency Identification (RFID) M2M, PC IP SIoTs POS ICTs MANETs RF IEEE 

References

  1. 1.
    Archive.org. (2016). Full text of “International Journal of Science and Research (IJSR)”. [online] Retrieved December 26, 2016, from https://archive.org/stream/MTMwOTEzMDI/MTIwMTMzNg==_djvu.txt
  2. 2.
    Dlodlo, N., & Kalezhi, J. (2015). The Internet of Things in agriculture for sustainable rural development. [online] Retrieved December 26, 2016, from https://www.researchgate.net/publication/277713549
  3. 3.
    Garg, G., Goyal, D., Aggarwal, H., Baindail, K., & Verma, G. (2016). Controlling home appliances in IOT environment. International Journal of Smart Home, 10(8), 11–18.CrossRefGoogle Scholar
  4. 4.
    Hongyan, L. (2015). Design and realization of smart home terminal applications based on IOT technology. International Journal of Smart Home, 9(8), 123–132.CrossRefGoogle Scholar
  5. 5.
    http://citeseerx.ist.psu.edu/. (2016). Intelligent traffic information system based on integration of Internet of Things and agent technology. [online] Retrieved December 26, 2016, from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.695.2856&rep=rep1&type=pdf
  6. 6.
    https://www.uio.no. (2016). RFID and IOT: An overview. [online] Retrieved December 26, 2016, from https://www.uio.no/studier/emner/matnat/ifi/INF5910CPS/h10/undervisningsmateriale/RFID-IoT.pdf
  7. 7.
    Iot.ieee.org. (2016). Research challenges in the internet of mobile things - IEEE Internet of Things. [online] Retrieved December 26, 2016, from http://iot.ieee.org/newsletter/march-2016/research-challenges-in-the-internet-of-mobile-things.html
  8. 8.
    Jain, D., & Krishna, P. (n.d.). A study on Internet of Things based applications. [online] Retrieved December 26, 2016, from https://arxiv.org/ftp/arxiv/papers/1206/1206.3891.pdf
  9. 9.
    Journal, R. (2016). What would be the best way for a local supermarket to transition to RFID technology?. [online] Rfidjournal.com. Retrieved December 26, 2016, from http://www.rfidjournal.com/blogs/experts/entry?11504
  10. 10.
    Kim, W. (2016). The business model of IoT information sharing open market for promoting IoT service. Journal of the Korea Society of IT Services, 15(3), 195–209.CrossRefGoogle Scholar
  11. 11.
    Lin, H., & Bergmann, N. (2016). IoT privacy and security challenges for smart home environments. Information, 7(3), 44.CrossRefGoogle Scholar
  12. 12.
    Mehta, A., & Patel, S. (2016). IoT based smart agriculture research opportunities and challenges. International Journal for Technological Research in Engineering ISSN (Online), 4(3), 2347–4718. [online] Retrieved December 26, 2016, from http://www.ijtre.com/images/scripts/2016040325.pdf.Google Scholar
  13. 13.
    Rahul, G., & Patel, S. (2016). A review of smart shopping systems. [online] https://www.irjet.net. Retrieved December 26, 2016, from https://www.irjet.net/archives/V3/i5/IRJET-V3I5441.pdf
  14. 14.
    Shiryaev. (2016). RFID technology and Internet of Things. [online] Slideshare.net. Retrieved December 26, 2016, from http://www.slideshare.net/rushtek/rfid-and-internet-of-things
  15. 15.
    Vujovic, V., & Maksimovic, M. (2015). The impact of the ‘Internet of Things’ on engineering education. University of East Sarajevo Lukavica, Bosnia and Herzegovina. [online] Retrieved December 26, 2016, from http://www.citethisforme.com/cite/journal
  16. 16.
    Alam, M., Trapps, P., Mumtaz, S., & Rodriguez, J. (2016). Context-aware cooperative testbed for energy analysis in beyond 4G networks. Telecommunication Systems.  https://doi.org/10.1007/s11235-016-0171-5 CrossRefGoogle Scholar
  17. 17.
    Khan, F., Rahman, F., Khan, S., & Kamal, S. A. (2018). Performance analysis of transport protocols for multimedia traffic over mobile Wi-Max network under Nakagami fading. In Information technology-New generations (pp. 101–110). Cham: Springer.CrossRefGoogle Scholar
  18. 18.
    Alam, M., Albano, M., Radwan, A., & Rodriguez, J. (2013). CANDi: Context-aware node discovery for short-range cooperation. Transactions on Emerging Telecommunications Technologies, 26(5), 861–875.  https://doi.org/10.1002/ett.2763 CrossRefGoogle Scholar
  19. 19.
    Khan, F., & Nakagawa, K. (2013). Comparative study of spectrum sensing techniques in cognitive radio networks. In 2013 World Congress on Computer and Information Technology (WCCIT) (pp. 1–8). IEEE.Google Scholar
  20. 20.
    Zebra Technology. (n.d.). How the Internet of Things is transforming education. [online] Retrieved December 26, 2016, from https://www.zebra.com/ap/en.htmlGoogle Scholar
  21. 21.
    Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2014). PASCCC: Priority-based application-specific congestion control clustering protocol. Computer Networks, 74, 92–102.CrossRefGoogle Scholar
  22. 22.
    Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2015, August). A Sybil attack detection scheme for a centralized clustering-based hierarchical network. In 2015 IEEE Trustcom/BigDataSE/ISPA (Vol. 1, pp. 318–325). IEEE.Google Scholar
  23. 23.
    Khan, F. (2014, May). Fairness and throughput improvement in multihop wireless ad hoc networks. In 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE) (pp. 1–6). IEEE.Google Scholar
  24. 24.
    Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014, September). A robust authentication scheme for observing resources in the internet of things environment. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 205–211). IEEE.Google Scholar
  25. 25.
    Jan, M., Nanda, P., Usman, M., & He, X. (2017). PAWN: A payload-based mutual authentication scheme for wireless sensor networks. Concurrency and Computation: Practice and Experience, 29(17).CrossRefGoogle Scholar
  26. 26.
    Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2013, November). Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network. In 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC) (pp.1400–1407). IEEE.Google Scholar
  27. 27.
    Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2018). A Sybil attack detection scheme for a forest wildfire monitoring application. Future Generation Computer Systems, 80, 613–626.CrossRefGoogle Scholar
  28. 28.
    Jan, M. A., Nanda, P., & He, X. (2013, June). Energy evaluation model for an improved centralized clustering hierarchical algorithm in WSN. In International Conference on Wired/Wireless Internet Communication (pp. 154–167). Berlin, Heidelberg: Springer.CrossRefGoogle Scholar
  29. 29.
    Usman, M., Jan, M. A., & He, X. (2017). Cryptography-based secure data storage and sharing using HEVC and public clouds. Information Sciences, 387, 90–102.CrossRefGoogle Scholar
  30. 30.
    Usman, M., Jan, M. A., He, X., & Nanda, P. (2016, August). Data sharing in secure multimedia wireless sensor networks. In 2016 IEEE Trustcom/BigDataSE/ISPA (pp. 590–597). IEEE.Google Scholar
  31. 31.
    Jan, M. A., Usman, M., He, X., & Rehman, A. U. (2018). SAMS: A seamless and authorized multimedia streaming framework for WMSN-based IoMT. IEEE Internet of Things Journal.  https://doi.org/10.1109/JIOT.2018.2848284
  32. 32.
    Jan, M. A., Jan, S. R., Usman, M., & Alam, M. (2018). State-of-the-art congestion control protocols in WSN: A survey. IoT EAI.  https://doi.org/10.4108/eai.26-3-2018.154379 CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Seema Begum
    • 1
  • Yao Nianmin
    • 1
  • Syed Bilal Hussain Shah
    • 2
    Email author
  • Inam Ullah Khan
    • 3
  • Satish Anamalamudi
    • 4
  1. 1.School of Computer Science and Technology, Dalian University of TechnologyDalianP.R. China
  2. 2.School of Information and Communication Engineering, Dalian University of TechnologyDalianP.R. China
  3. 3.Isra University, Islamabad Campus, School of Engineering and Applied Sciences (SEAS)IslamabadPakistan
  4. 4.Faculty of Computer Science and EngineeringSRM UniversityChennaiIndia

Personalised recommendations