Browse > Article
http://dx.doi.org/10.3745/JIPS.03.0125

Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions  

Gafurov, Khusanbek (College of Information and Communication Engineering, Sungkyunkwan University)
Chung, Tai-Myoung (College of Information and Communication Engineering, Sungkyunkwan University)
Publication Information
Journal of Information Processing Systems / v.15, no.4, 2019 , pp. 797-819 More about this Journal
Abstract
Internet of Things (IoT) is the paradigm of network of Internet-connected things as objects that constantly sense the physical world and share the data for further processing. At the core of IoT lies the early technology of radio frequency identification (RFID), which provides accurate location tracking of real-world objects. With its small size and convenience, RFID tags can be attached to everyday items such as books, clothes, furniture and the like as well as to animals, plants, and even humans. This phenomenon is the beginning of new applications and services for the industry and consumer market. IoT is regarded as a fourth industrial revolution because of its massive coverage of services around the world from smart homes to artificial intelligence-enabled smart driving cars, Internet-enabled medical equipment, etc. It is estimated that there will be several dozens of billions of IoT devices ready and operating until 2020 around the world. Despite the growing statistics, however, IoT has security vulnerabilities that must be addressed appropriately to avoid causing damage in the future. As such, we mention some fields of study as a future topic at the end of the survey. Consequently, in this comprehensive survey of IoT, we will cover the architecture of IoT with various layered models, security characteristics, potential applications, and related supporting technologies of IoT such as 5G, MEC, cloud, WSN, etc., including the economic perspective of IoT and its future directions.
Keywords
Cloud; Edge; IoT; IoT Security; MEC/MCC; RFID; WSN; 5G;
Citations & Related Records
연도 인용수 순위
  • Reference
1 CISCO, "The Internet of Things reference model," 2014 [Online]. Available: http://cdn.iotwf.com/resources/71/IoT_Reference_Model_White_Paper_June_4_2014.pdf.
2 S. U. Maheswari, N. S. Usha, E. M. Anita, and K. R. Devi, "A novel robust routing protocol RAEED to avoid DoS attacks in WSN," in Proceedings of 2016 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, India, 2016, pp. 1-5.
3 F. Palermo, "Internet of Things done wrong stifles innovation," 2014 [Online]. Available: https://www.informationweek.com/strategic-cio/executive-insights-and-innovation/internet-of-things-done-wrong-stiflesinnovation/a/d-id/1279157.
4 A. Singh, S. Meshram, T. Gujar, and P. R. Wankhede, "Baggage tracing and handling system using RFID and IoT for airports," in Proceedings of 2016 International Conference on Computing, Analytics and Security Trends (CAST), Pune, India, 2016, pp. 466-470.
5 K. A. Patil and N. R. Kale, "A model for smart agriculture using IoT," in Proceedings of 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC), Jalgaon, India, 2016, pp. 543-545.
6 J. C. Zhao, J. F. Zhang, Y. Feng, and J. X. Guo, "The study and application of the IOT technology in agriculture," in Proceedings of 2010 3rd International Conference on Computer Science and Information Technology, Chengdu, China, 2010, pp. 462-465.
7 H. Suo, J. Wan, C. Zou, and J. Liu, "Security in the Internet of Things: a review," in Proceedings of 2012 International Conference on Computer Science and Electronics Engineering, Hangzhou, China, 2012, pp. 648-651.
8 J. Wu and W. Zhao, "Design and realization of WInternet: from net of things to Internet of Things," ACM Transactions on Cyber-Physical Systems, vol. 1, no. 1, article no. 2, 2017.
9 M. Wu, T. J. Lu, F. Y. Ling, J. Sun, and H. Y. Du, "Research on the architecture of Internet of Things," in Proceedings of 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), Chengdu, China, 2010, pp. 484-487.
10 K. Zhang, X. Liang, R. Lu, and X. Shen, "Sybil attacks and their defenses in the Internet of Things," IEEE Internet of Things Journal, vol. 1, no. 5, pp. 372-383, 2014.   DOI
11 K. Zhao and L. Ge, "A survey on the internet of things security," in Proceedings of 2013 9th International Conference on Computational Intelligence and Security, Leshan, China, 2013, pp. 663-667.
12 A. M. Nia, M. Mozaffari-Kermani, S. Sur-Kolay, A. Raghunathan, and N. K. Jha, "Energy-efficient long-term continuous personal health monitoring," IEEE Transactions on Multi-Scale Computing Systems, vol. 1, no. 2, pp. 85-98, 2015.   DOI
13 C. Li, A. Raghunathan, and N. K. Jha, "Hijacking an insulin pump: security attacks and defenses for a diabetes therapy system," in Proceedings of 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, Columbia, MO, 2011, pp. 150-156.
14 J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, "Wireless sensor network security: a survey," in Security in Distributed, Grid, Mobile, and Pervasive Computing. Boca Raton, FL: CRC Press, 2007, pp. 367-410.
15 A. Alsaidi and F. Kausar, "Security attacks and countermeasures on cloud assisted IoT applications," in Proceedings of 2018 IEEE International Conference on Smart Cloud (SmartCloud), New York, NY, 2018, pp. 213-217.
16 M. Tehranipoor and F. Koushanfar, "A survey of hardware Trojan taxonomy and detection," IEEE Design & Test of Computers, vol. 27, no. 1, pp. 10-25, 2010.
17 G. Hernandez, O. Arias, D. Buentello, and Y. Jin, "Smart nest thermostat: a smart spy in your home," in Proceedings of the Black Hat, Las Vegas, NV, 2014, pp. 1-8.
18 P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, "M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags," in Ubiquitous Intelligence and Computing. Heidelberg: Springer, 2006, pp. 912-923.
19 Z. Ju and Y. Li, "Analysis on Internet of Things (IOT) based on the "Subway Supermarket" e-commerce mode of TESCO," in Proceedings of 2011 International Conference on Information Management, Innovation Management and Industrial Engineering, Shenzhen, China, 2011, pp. 430-433.
20 F. J. Wu, Y. F. Kao, and Y. C. Tseng, "From wireless sensor networks towards cyber physical systems," Pervasive and Mobile Computing, vol. 7, no. 4, pp. 397-413, 2011.   DOI
21 I. Andrea, C. Chrysostomou, and G. Hadjichristofi, "Internet of Things: security vulnerabilities and challenges," in Proceedings of 2015 IEEE Symposium on Computers and Communication (ISCC), 2015, pp. 180-187.
22 M. Cho, "Kakao AI speaker begins official sales," 2017 [Online]. Available: https://www.zdnet.com/article/kakao-ai-speaker-begins-official-sales/.
23 A. Gluhak, S. Krco, M. Nati, D. Pfisterer, N. Mitton, and T. Razafindralambo, "A survey on facilities for experimental internet of things research," IEEE Communications Magazine, vol. 49, no. 11, pp. 58-67, 2011.   DOI
24 A. K. Sikder, G. Petracca, H. Aksu, T. Jaeger, and A. S. Uluagac, "A survey on sensor-based threats to Internetof-Things (IoT) devices and applications," 2018 [Online]. Available: https://arxiv.org/abs/1802.02041.
25 S. Bera, S. Misra, and A. V. Vasilakos, "Software-defined networking for internet of things: a survey," IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1994-2008, 2017.   DOI
26 S. H. Ahmed, G. Kim, and D. Kim, "Cyber physical system: architecture, applications and research challenges," in Proceedings of 2013 IFIP Wireless Days (WD), Valencia, Spain, 2013, pp. 1-5.
27 M. V. Bharathi, R. C. Tanguturi, C. Jayakumar, and K. Selvamani, "Node capture attack in wireless sensor network: a survey," in Proceedings of 2012 IEEE International Conference on Computational Intelligence and Computing Research, Coimbatore, India, 2012, pp. 1-3.
28 F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the Internet of Things," in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland, 2012, pp. 13-16.
29 M. S. Rahman, A. H. M. Noman, F. Shahari, M. Aslam, C. S. Gee, C. R. Isa, and S. Pervin, "Efficient energy consumption in industrial sectors and its effect on environment: a comparative analysis between G8 and Southeast Asian emerging economies," Energy, vol. 97, pp. 82-89, 2016.   DOI
30 P. Brizzi, D. Conzon, H. Khaleel, R. Tomasi, C. Pastrone, A. M. Spirito, M. Knechtel, F. Pramudianto, and P. Cultrona, "Bringing the Internet of Things along the manufacturing line: a case study in controlling industrial robot and monitoring energy consumption remotely," in Proceedings of 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation (ETFA), Cagliari, Italy, 2013, pp. 1-8.
31 S. Richardson, "Welcome to Songdo, South Korea: the smartest of smart cities," 2018 [Online]. Available: https://www.worldcrunch.com/smarter-cities-1/welcome-to-songdo-south-korea-the-smartest-of-smart-cities.
32 A. Cenedese, A. Zanella, L. Vangelista, and M. Zorzi, "Padova smart city: an urban internet of things experimentation," in Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Sydney, Australia, 2014, pp. 1-6.
33 J. Green, "Green cities on the cheap: low-cost solutions for a sustainable world," 2011 [Online]. Available: https://grist.org/smart-cities/2011-12-28-green-cities-on-the-cheap-low-cost-solutions-sustainable-world/.
34 M. T. Lazarescu, "Design of a WSN platform for long-term environmental monitoring for IoT applications," IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 3, no. 1, pp. 45-54, 2013.   DOI
35 A. Botta, W. De Donato, V. Persico, and A. Pescape, "On the integration of cloud computing and Internet of Things," in Proceedings of 2014 International Conference on Future Internet of Things and Cloud, Barcelona, Spain, 2014, pp. 23-30.
36 M. Sharifi, S. S. Kashi, and S. P. Ardakani, "Lap: a lightweight authentication protocol for smart dust wireless sensor networks," in Proceedings of 2009 International Symposium on Collaborative Technologies and Systems, Baltimore, MD, 2009, pp. 258-265.
37 The TerraSwarm Research Center [Online]. Available: https://terraswarm.org.
38 Y. Jararweh, A. Doulat, O. AlQudah, E. Ahmed, M. Al-Ayyoub, and E. Benkhelifa, "The future of mobile cloud computing: integrating cloudlets and mobile edge computing," in Proceedings of 2016 23rd International Conference on Telecommunications (ICT), Thessaloniki, Greece, 2016, pp. 1-5.
39 F. Mattern and C. Florkemeier, "Vom internet der computer zum internet der dinge," Informatik-Spektrum, vol. 33, no. 2, pp. 107-121, 2010.   DOI
40 J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, "A survey on internet of things: architecture, enabling technologies, security and privacy, and applications," IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1125-1142, 2017.   DOI
41 A. A. Cardenas, S. Amin, and S. Sastry, "Secure control: towards survivable cyber-physical systems," in Proceedings of 2008 the 28th International Conference on Distributed Computing Systems Workshops, Beijing, China, 2008, pp. 495-500.
42 J. Tan and S. G. Koo, "A survey of technologies in Internet of Things," in Proceedings of 2014 IEEE International Conference on Distributed Computing in Sensor Systems, Marina Del Rey, CA, 2014, pp. 269-274.
43 A. Manzalini and N. Crespi, "An edge operating system enabling anything-as-a-service," IEEE Communications Magazine, vol. 54, no. 3, pp. 62-67, 2016.   DOI
44 O. Salman, I. Elhajj, A. Kayssi, and A. Chehab, "Edge computing enabling the Internet of Things," in Proceedings of 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy, 2015, pp. 603-608.
45 T. Lin, B. Park, H. Bannazadeh, and A. Leon-Garcia, "Demo abstract: End-to-end orchestration across SDI smart edges," in Proceedings of 2016 IEEE/ACM Symposium on Edge Computing (SEC), Washington, DC, 2016, pp. 127-128.
46 M. R. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L. A. Grieco, G. Boggia, and M. Dohler, "Standardized protocol stack for the internet of (important) things," IEEE Communications Surveys & Tutorials, vol. 15, no. 3, pp. 1389-1406, 2012.
47 H. B. Pandya and T. A. Champaneria, "Notice of retraction Internet of Things: survey and case studies," in Proceedings of 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), Visakhapatnam, India, 2015, pp. 1-6.
48 T. Subramanya, L. Goratti, S. N. Khan, E. Kafetzakis, I. Giannoulakis, and R. Riggio, "A practical architecture for mobile edge computing," in Proceedings of 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Berlin, Germany, 2017, pp. 1-4.
49 A. R. Biswas and R. Giaffreda, "IoT and cloud convergence: opportunities and challenges," in Proceedings of 2014 IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea, 2014, pp. 375-376.
50 W. Yu, F. Liang, X. He, W. G. Hatcher, C. Lu, J. Lin, and X. Yang, "A survey on the edge computing for the Internet of Things," IEEE Access, vol. 6, pp. 6900-6919, 2017.   DOI
51 S. Mumtaz, K. M. S. Huq, and J. Rodriguez, "Direct mobile-to-mobile communication: paradigm for 5G," IEEE Wireless Communications, vol. 21, no. 5, pp. 14-23, 2014.   DOI
52 P. Yadav and S. Vishwakarma, "Application of Internet of Things and big data towards a smart city," in Proceedings of 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoTSIU), Bhimtal, India, 2018, pp. 1-5.
53 C. Bormann, A. P. Castellani, and Z. Shelby, "CoAP: an application protocol for billions of tiny internet nodes," IEEE Internet Computing, vol. 16, pp. 62-67, 2012.   DOI
54 D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel, "Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses," in Proceedings of 2008 IEEE Symposium on Security and Privacy, Oakland, CA, 2008, pp. 129-142.
55 N. N. Dao, T. V. Phan, J. Kim, T. Bauschert, and S. Cho, "Securing heterogeneous IoT with intelligent DDoS attack behavior learning," 2017 [Online]. Available: https://arxiv.org/abs/1711.06041.
56 S. Schneider, "Understanding the protocols behind the Internet of Things," 2013 [Online]. Available: https://www.electronicdesign.com/iot/understanding-protocols-behind-internet-things.
57 Object Management Group, "Data Distribution Service (DDS), version 1.2," 2007 [Online]. Available: https://www.omg.org/spec/DDS/1.2/About-DDS/.
58 C. Gomez and J. Paradells, "Wireless home automation networks: a survey of architectures and technologies," IEEE Communications Magazine, vol. 48, no. 6, pp. 92-101, 2010.   DOI
59 Y. Liu, "The study on smart city construction assessment based on TOPSIS-"the Beijing-Tianjin-Tangshan City Clusters" as the case," in Proceedings of 2016 International Conference on Smart City and Systems Engineering (ICSCSE), Hunan, China, 2016, pp. 321-325.
60 S. Weagle, "The rise of IoT botnet threats and DDoS attacks," 2018. [Online]. Available: https://www.corero.com/blog/870-the-rise-of-iot-botnet-threats-and-ddos-attacks.html.
61 P. Gaur and M. P. Tahiliani, "Operating systems for IoT devices: a critical survey," in Proceedings of 2015 IEEE Region 10 Symposium, Ahmedabad, India, 2015, pp. 33-36.
62 M. S. Mahdavinejad, M. Rezvan, M. Barekatain, P. Adibi, P. Barnaghi, and A. P. Sheth, "Machine learning for Internet of Things data analysis: a survey," Digital Communications and Networks, vol. 4, no. 3, pp. 161-175, 2018.   DOI
63 M. Weiser, "The computer for the 21st century," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 3, no. 3, pp. 3-11, 1999.   DOI
64 N. Gyory and M. Chuah, "IoTOne: integrated platform for heterogeneous IoT devices," in Proceedings of 2017 International Conference on Computing, Networking and Communications (ICNC), Santa Clara, CA, 2017, pp. 783-787.
65 K. K. Patel and S. M. Patel, "Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application & future challenges," International Journal of Engineering Science and Computing, vol. 6, no. 5, pp. 6122-6131, 2016.
66 M. Zhang, A. Raghunathan, and N. K. Jha, "Trustworthiness of medical devices and body area networks," Proceedings of the IEEE, vol. 102, no. 8, pp. 1174-1188, 2014.   DOI
67 Z. Chen, G. Xu, V. Mahalingam, L. Ge, J. Nguyen, W. Yu, and C. Lu, "A cloud computing based network monitoring and threat detection system for critical infrastructures," Big Data Research, vol. 3, pp. 10-23, 2016.   DOI
68 X. Fu, Z. Ling, W. Yu, and J. Luo, "Cyber Crime Scene Investigations $(C^2SI)$ through cloud computing," in Proceedings of 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops, Genova, Italy, 2010, pp. 26-31.
69 G. Gan, Z. Lu, and J. Jiang, "Internet of Things security analysis," in Proceedings of 2011 International Conference on Internet Technology and Applications, Wuhan, China, 2011, pp. 1-4.
70 M. Leo, F. Battisti, M. Carli, and A. Neri, "A federated architecture approach for Internet of Things security," in Proceedings of 2014 Euro Med Telco Conference (EMTC), Naples, Italy, 2014, pp. 1-5.
71 A. Mosenia and N. K. Jha, "A comprehensive study of security of Internet-of-Things," IEEE Transactions on Emerging Topics in Computing, vol. 5, no. 4, pp. 586-602, 2016.   DOI
72 L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: a survey," Computer Networks, vol. 54, no. 15, pp. 2787-2805, 2010.   DOI
73 R. Buyya and A. Dastjerdi, Internet of Things Principles and Paradigms. Cambridge, MA: Morgan Kaufmann, 2016.
74 A. B. Pawar and S. Ghumbre, "A survey on IoT applications, security challenges and counter measures," in Proceedings of 2016 International Conference on Computing, Analytics and Security Trends (CAST), Pune, India, 2016, pp. 294-299.
75 J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): a vision, architectural elements, and future directions," Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013.   DOI
76 H. Sundmaeker, P. Guillemin, P. Friess, and S. Woelffle, Vision and Challenges for Realising the Internet of Things. Brussel, Belgium: Cluster of European Research Projects on the Internet of Things, 2010.
77 R. Khan, S. U. Khan, R. Zaheer, and S. Khan, "Future Internet: the internet of things architecture, possible applications and key challenges," in Proceedings of 2012 10th International Conference on Frontiers of Information Technology, Islamabad, India, 2012, pp. 257-260.
78 D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, "Internet of Things: vision, applications and research challenges," Ad Hoc Networks, vol. 10, no. 7, pp. 1497-1516, 2012.   DOI
79 J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis & defenses," in Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, CA, 2004, pp. 259-268.
80 R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, "Internet of Things (IoT) security: current status, challenges and prospective measures," in Proceedings of 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, UK, 2015, pp. 336-341.
81 R. P. Padhy, M. R. Patra, and S. C. Satapathy, "Cloud computing: security issues and research challenges," International Journal of Computer Science and Information Technology & Security (IJCSITS), vol. 1, no. 2, pp. 136-146, 2011.
82 W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, "Edge computing: vision and challenges," IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637-646, 2016.   DOI
83 J. S. Jang, Y. L. Kim, and J. H. Park, "A study on the optimization of the uplink period using machine learning in the future IoT network," in Proceedings of 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), Sydney, Australia, 2016, pp. 1-3.
84 P. Baronti, P. Pillai, V. W. Chook, S. Chessa, A. Gotta, and Y. F. Hu, "Wireless sensor networks: a survey on the state of the art and the 802.15. 4 and ZigBee standards," Computer Communications, vol. 30, no. 7, pp. 1655-1695, 2017.   DOI
85 I. Ishaq, D. Carels, G. K. Teklemariam, J. Hoebeke, F. van den Abeele, E. De Poorter, I. Moerman, and P. Demeester, "IETF standardization in the field of the Internet of Things (IoT): a survey," Journal of Sensor and Actuator Networks, vo. 2, no. 2, pp. 235-287, 2013.   DOI
86 Y. Lee, "How to navigate your way through Seoul," 2018 [Online]. Available: https://10mag.com/how-tonavigate-your-way-through-seoul/.
87 M. Suresh, U. Muthukumar, and J. Chandapillai, "A novel smart water-meter based on IoT and smartphone app for city distribution management," in Proceedings of 2017 IEEE Region 10 Symposium (TENSYMP), Cochin, India, 2017, pp. 1-5.
88 E. Leverett and A. Kaplan, "Towards estimating the untapped potential: a global malicious DDoS mean capacity estimate," Journal of Cyber Policy, vol. 2, no. 2, pp. 195-208, 2017.   DOI
89 G. A. Babu, K. Guruvayoorappan, V. S. Variyar, and K. P. Soman, "Design and fabrication of robotic systems: converting a conventional car to a driverless car," in Proceedings of 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India, 2017, pp. 857-863.
90 ] D. Anstee, P. Bowen, C. F. Chui, and G. Sockrider, "Worldwide Infrastructure Security Report (volume XII)," Arbort Networks special report, 2017.
91 G. Press, "A very short history of Internet of Things," 2014 [Online]. Available: https://www.forbes.com/sites/gilpress/2014/06/18/a-very-short-history-of-the-internet-of-things/.
92 K. Xu, Y. Qu, and K. Yang, "A tutorial on the internet of things: from a heterogeneous network integration perspective," IEEE Network, vol. 30, no. 2, pp. 102-108, 2016.   DOI
93 A. M. Nia, S. Sur-Kolay, A. Raghunathan, and N. K. Jha, "Physiological information leakage: a new frontier in health information security," IEEE Transactions on Emerging Topics in Computing, vol. 4, no. 3, pp. 321-334, 2016.   DOI
94 A. Juels, "RFID security and privacy: a research survey," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, 2006.   DOI
95 M. R. Rieback, B. Crispo, and A. S. Tanenbaum, "RFID Guardian: a battery-powered mobile device for RFID privacy management," in Information Security and Privacy. Heidelberg: Springer, 2015, pp. 184-194.
96 F. Griffiths and M. Ooi, "The fourth industrial revolution-Industry 4.0 and IoT [Trends in Future I&M]," IEEE Instrumentation & Measurement Magazine, vol. 21, no. 6, pp. 29-43, 2018.   DOI
97 A. A. Gendreau and M. Moorman, "Survey of intrusion detection systems towards an end to end secure Internet of Things," in Proceedings of 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria, 2016, pp. 84-90.
98 A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of Things: a survey on enabling technologies, protocols, and applications," IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2347-2376, 2015.   DOI
99 S. Madakam, R. Ramaswamy, and S. Tripathi, "Internet of Things (IoT): a literature review," Journal of Computer and Communications, vol. 3, pp. 164-173, 2015.
100 N. Abbas, Y. Zhang, A. Taherkordi, and T. Skeie, "Mobile edge computing: a survey," IEEE Internet of Things Journal, vol. 5, no. 1, pp. 450-465, 2018.   DOI
101 A. H. Ngu, M. Gutierrez, V. Metsis, S. Nepal, and Q. Z. Sheng, "IoT middleware: a survey on issues and enabling technologies," IEEE Internet of Things Journal, vol. 4, no. 1, pp. 1-20, 2016.   DOI
102 A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, "Internet of Things for smart cities," IEEE Internet of Things Journal, vol. 1, no. 1, pp. 22-32, 2014.   DOI
103 T. Qiu, N. Chen, K. Li, M. Atiquzzaman, and W. Zhao, "How can heterogeneous Internet of Things build our future: a survey," IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 2011-2027, 2018.   DOI
104 N. Aleisa and K. Renaud, "Privacy of the Internet of Things: a systematic literature review (extended discussion)," 2016 [Online]. Available: https://arxiv.org/abs/1611.03340.
105 W. Belk, "Visual history of IoT - far beyond 'smart' things," 2016 [Online]. Available: https://medium.com/@wbelk/visual-history-of-iot-far-beyond-smart-things-325664d9794.
106 Wikipeia, "Internet of Things," [Online]. Available: https://en.wikipedia.org/wiki/Internet_of_things#cite_noteETC:_Bill_Joy's_Six_Webs-12.
107 Postscapes, "Internet of Things (IoT) history," [Online]. Available: https://www.postscapes.com/internet-ofthings-history/.
108 J. Porter, "The history of Internet of Things (IoT) and how it's changed today," 2018 [Online]. Available: https://www.techprevue.com/history-iot-changed-today/.
109 J. Van Camp, "The 8 best smart speakers with Alexa and Google Assistant," 2019 [Online]. Available: https://www.wired.com/story/best-smart-speakers/.
110 V. Soni, P. Modi, and V. Chaudhri, "Detecting Sinkhole attack in wireless sensor network," International Journal of Application or Innovation in Engineering & Management, vol. 2, no. 2, pp. 29-32, 2013.
111 I. Stojmenovic and S. Wen, "The fog computing paradigm: Scenarios and security issues," in Proceedings of 2014 Federated Conference on Computer Science and Information Systems, Warsaw, Poland, 2014, pp. 1-8.