Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

Internet of Things (IoT): Research, Architectures and Applications

Profile image of IJFRCSCE Journal

— Internet of Things is the concept of connecting any device (so long as it has an on/off switch) to the Internet and to other connected devices. The IoT is a giant network of connected things and people, all of which collect and share data about the way they are used and about the environment around them. Experts estimate that the IoT will consist of about 30 billion objects by 2020. This paper presents a study based on IoT and its applications in different field of science and technology. Along with the introduction of the IoT literature review is also provided. The paper also discusses the architecture and elements of the IoT along with its different applications.

Related Papers

International Journal for Research in Applied Science and Engineering Technology IJRASET

IJRASET Publication

The primary aim of this paper is to give an overview on the Internet of Things encompassing its architecture, technologies, its various applications and challenges associated with it. The Internet of Things refers to billions of physical devices that are connected to the Internet, all collecting and sharing data. Electronic sensors are embedded into everyday objects which allow them to communicate and exchange data over a network. It is a system comprising of interrelated computing devices, objects, animals or people that each have unique identification number (UID) for identification and have the ability to communicate and exchange data over a network without the need of human-to-human or human-to-machine intervention. This paper aims to provide concise yet detailed and structured concepts on IoT, discusses its various technical aspects and gives our view on IoT technologies, applications and related issues with comparison of other papers.

research papers on iot pdf

Gourav Misra , Arun Agarwal

The Internet of Things (IoT) has been inscription in this review paper. Internet of Things is a keyword to cover various challenges related to internet and the web to the real physical world. We know that, today internet has already taken an important part of everyday life and it has also dramatically changed the lives of human being. The most important factor of this invention is, integration or combination of several technologies with the communication system solutions. The most applicable factors of IoT is the identification and tracking various factors for smart objects. The universal sensing networks is enabled by Wireless Sensing Networks (WSN) and these technologies cuts across many areas of modern day living. The escalation of these devices in a communicating and actuating network will create the Internet of Things (IoT). Here the sensors and actuators combine easily with the environment around us and the information is shared across various platforms in order to develop a common operating picture (COP). Internet of Things predicts the future that, the advance digital world and the physical world will get linked by means of proper information and wireless communication system technologies. In this survey paper we have mentioned the visions, concepts, technologies, various challenges, some innovation directions, and various applications of Internet of Things (IoT).

IRJET Journal

IAEME PUBLICATION

IAEME Publication

IOT stands for "Internet of things", meaning various real world things connected with the internet. In upcoming days, IoT is gradually converting the real world things into the smart virtual things. The main goal is related to the Internet of Things is to combine all possible objects in this world under a common framework, not only also have can control on that object which is available in our surroundings,but also keep us up to date of their state related to that object.As an output, a huge amount of data is being generated and will be stored and after that this data is being processed in useful actions when needed then here we have command and control on that object, so that our life will be much simpler and secure and our impact on the environment will be reduced.In this era, internet access is convenient to individuals on their mobile devices as well as systems, so that easily information can be transferred through the internet at less cost.The main focus of this paper is to give an overview related to the Internet of things, their architectures, and important technologies and its applications and how these things play an important role in our daily life.

SSRN Electronic Journal

praveen bhanodia

Dr Shah Miah

Internet of things (IoT) has significantly altered the traditional lifestyle to a highly technologically advanced society. Some of the significant transformations that have been achieved through IoT are smart homes, smart transportation, smart city, and control of pollution. A considerable number of studies have been conducted and continue to be done to increase the use of technology through IoT. Furthermore, the research about IoT has not been done fully in improving the application of technology through IoT. Besides, IoT experiences several problems that need to be considered in order to get the full capability of IoT in changing society. This research paper addresses the key applications of IoT, the architecture of IoT, and the key issues affecting IoT. In addition, the paper highlights how big data analytics is essential in improving the effectiveness of IoT in various applications within society.

Muhammad Umar Farooq , Talha Kamal

Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unavoidable for anyone. The form of communication that we see now is either human-human or human-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-machine (M2M). This paper aims to provide a comprehensive overview of the IoT scenario and reviews its enabling technologies and the sensor networks. Also, it describes a six-layered architecture of IoT and points out the related key challenges.

Communications on Applied Electronics

Dr. Yusuf Perwej

International Journal of Computer Applications

Emrah Irmak

Ayushi Sharma

One of the fuzz words in the Information Technology is Internet of Things (IoT).In the upcoming era real world things like cars and buses, homes, factories, machine and tools will be connected to the internet in order to make our lives easy and more comfortable. The IoT aims to incorporate everything in our surroundings under a general infrastructure; it gives us control of things around us as well as keeps us informed of the state of the things. The main purpose of this paper is to provide a summarization of Internet of Things, architectures, and fundamental technologies and their usages in our day to day routine. IoT is an apprehensively connected system of smart devices that arrange automatically, share information, data and resources, responding to a situation and changes in the environment.

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

International Research Group - IJET JOURNAL

HARISHCHANDER ANANDARAM

International Journal of Advanced Trends in Computer Science and Engineering

WARSE The World Academy of Research in Science and Engineering

Subhash Kommina

International Journal of Engineering Research and Technology (IJERT)

IJERT Journal

International Journal of Innovative Research in Science, Engineering & Technology

Vrushali Dhanokar

Journal of Big Data

Mikhail Zymbler

International Journal IJRITCC

Digital Technologies and Applications

SANAA EL FILALI

International Journal for Research in Applied Science & Engineering Technology (IJRASET)

Zeinab Kamal

Advances in Smart Communication and Imaging Systems

International Journal of Current Engineering and Technology

Wireless Personal Communications

International Journal of Trend in Scientific Research and Development

ibrar ahmed

Mubashir Hussain

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

sensors-logo

Article Menu

research papers on iot pdf

  • Subscribe SciFeed
  • Recommended Articles
  • PubMed/Medline
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Exploring the full potentials of iot for better financial growth and stability: a comprehensive survey.

research papers on iot pdf

1. Introduction

  • In-depth examination of IoT developments and architecture: By thoroughly studying the developments in IoT and its intricate architecture, this paper offers valuable insights into the current state of IoT technology, setting a strong foundation for further research and innovation.
  • Rigorous analysis of trials and challenges: Through a careful analysis of the associated trials and challenges faced in the implementation of IoT, this study provides a clear understanding of the obstacles and potential roadblocks in IoT adoption, enabling stakeholders to proactively address these issues.
  • Holistic assessment of orientations and motivations driving IoT adoption: The comprehensive analysis of the orientations and motivations behind IoT adoption across diverse domains offers a rich understanding of the driving forces behind the rapid growth of IoT applications, empowering decision-makers to align their strategies with market trends.
  • Investigation of IoT technology adoption: By delving into the adoption of IoT technologies, this paper uncovers the transformative potential of IoT across various sectors, revealing the opportunities and applications that can revolutionize businesses and industries.
  • Forward-looking insights on future research challenges and open issues: With a careful review of future research challenges and thoughtful discussions on open issues, this study provides a roadmap for future researchers and practitioners to explore untapped possibilities and forge new frontiers in IoT advancements.

2. IoT Foundations: Literature Review

2.1. a comprehensive review of the foundational concepts of iot.

  • Connectivity: IoT thrives on connectivity, enabling devices to communicate with each other and with central systems. This interconnectedness forms the foundation for real-time data exchange and intelligent decision-making [ 18 , 27 ].
  • Sensing and Perception: IoT devices are equipped with sensors that capture and perceive the surrounding environment. These sensors can detect various parameters, such as temperature, humidity, motion, and more, allowing IoT systems to gather valuable data [ 27 , 34 ].
  • Data Analysis and Intelligence: The influx of data generated by IoT devices calls for advanced data analytics and artificial intelligence techniques. IoT leverages this intelligence to gain insights, detect patterns, and optimize processes, ultimately facilitating informed decision-making [ 35 , 36 ].
  • Automation and Control: IoT empowers automation by enabling devices to execute predefined tasks without human intervention. This automation fosters increased efficiency, reduced human errors, and enhanced productivity [ 34 , 36 ].
  • Scalability and Flexibility: The versatility of IoT allows seamless expansion and integration of new devices and technologies. The scalability of IoT systems ensures that they can adapt and accommodate diverse use cases [ 37 ].
  • Interoperability: For IoT to thrive, interoperability between different devices and platforms is crucial. IoT standards and protocols facilitate smooth communication and collaboration among heterogeneous IoT systems [ 38 , 39 , 40 ].
  • Security and Privacy: With the extensive data exchange, ensuring robust security and privacy measures is paramount. IoT systems must implement encryption, authentication, and other security mechanisms to safeguard sensitive data and protect users’ privacy [ 22 , 40 ].
  • Real-Time Responsiveness: The real-time nature of IoT enables immediate actions and responses. IoT systems can react promptly to changing conditions, making them ideal for applications requiring quick decision-making and response times [ 28 ].
  • Energy Efficiency: IoT devices are designed with energy efficiency in mind, ensuring prolonged battery life and reduced energy consumption. This characteristic is particularly vital for IoT applications that rely on battery-powered devices [ 41 ].
  • Ubiquitous Access: IoT extends beyond traditional computing devices and offers ubiquitous access to data and services. Users can interact with IoT systems through smartphones, wearables, and other connected devices from anywhere at any time [ 28 ].
  • Sensors: Sensors are crucial components in IoT devices as they enable the collection of real-time data from the physical environment [ 42 , 43 ]. Various types of sensors, such as temperature sensors, humidity sensors, motion sensors, light sensors, and proximity sensors, provide valuable insights into the surrounding conditions [ 44 , 45 ].
  • Actuators: Actuators are devices that can initiate physical actions based on the data collected by sensors or the instructions received from IoT systems. They can perform actions like opening or closing valves, turning on or off appliances, and controlling machinery [ 46 , 47 ].
  • Wearable Devices: Wearables, such as smartwatches, fitness trackers, and smart glasses, are IoT devices that are worn on the body [ 48 ]. They continuously monitor health and fitness data and often interact with smartphones or other connected devices [ 49 ].
  • Smart Home Devices: Smart home devices include smart thermostats, smart lights, smart locks, and smart appliances that can be controlled remotely or automated to optimize energy usage and enhance home security and comfort [ 11 ].
  • Connected Vehicles: IoT has revolutionized the automotive industry with connected vehicles that gather data and provide real-time insights on vehicle performance, maintenance needs, and driver behavior [ 31 ].
  • Industrial IoT (IIoT) Devices: In industrial settings, IoT devices play a crucial role in monitoring and optimizing manufacturing processes, predictive maintenance, and ensuring worker safety [ 42 ].
  • Smart Health Devices: IoT-enabled health devices, such as remote patient-monitoring systems, smart medical wearables, and health-tracking applications, are revolutionizing healthcare by providing continuous health monitoring and timely interventions [ 9 , 40 ].
  • Smart City Infrastructure: IoT is integral to building smart cities, with devices like smart traffic lights, smart waste management systems, and smart energy grids enhancing urban sustainability and efficiency [ 11 , 12 ].
  • Agricultural IoT Devices: IoT is transforming agriculture with devices like smart irrigation systems, soil sensors, and livestock monitoring systems, enabling precision farming and maximizing crop yields [ 13 ].
  • Connected Consumer Electronics: Many everyday consumer electronics, such as smart TVs, smart speakers, and smart home assistants, are IoT devices that provide a seamless user experience and connectivity [ 43 ].
  • IoT-A (Internet of Things—Architecture): IoT-A is a research project that aims to define a reference architecture for IoT systems. It provides a scalable and flexible framework, focusing on interoperability. The architecture is divided into three main views: the Application View, the Information View, and the Communication View. IoT-A emphasizes modularity and reusability of components, making it easier to design and deploy IoT solutions across various domains.
  • AWS IoT Architecture: Amazon Web Services (AWS) offers a comprehensive IoT architecture that leverages its cloud services. AWS IoT provides a scalable and secure platform for connecting devices, managing data, and building applications. It includes components like AWS IoT Core for device management and connectivity, AWS IoT Greengrass for edge computing capabilities, and AWS IoT Analytics for data processing and insights.
  • Microsoft Azure IoT Reference Architecture: Microsoft Azure provides a robust IoT reference architecture to help developers design scalable and secure IoT solutions. It incorporates various Azure services, such as Azure IoT Hub for device connectivity, Azure IoT Edge for edge computing, and Azure IoT Central for simplified device management.
  • IBM IoT Reference Architecture: IBM offers an IoT reference architecture that covers the entire IoT ecosystem, from edge devices to cloud-based applications. It emphasizes integration with the IBM Watson IoT Platform for device management, data processing, and AI-powered insights.
  • IoTivity: IoTivity is an open-source IoT framework developed by the Open Connectivity Foundation (OCF). It aims to provide a standardized and interoperable approach to IoT device connectivity and communication. IoTivity supports various IoT protocols, enabling seamless interoperability between different devices and ecosystems.
  • Google Cloud IoT Architecture: Google Cloud Platform (GCP) offers an IoT architecture that leverages Google Cloud IoT Core, Google Cloud Pub/Sub, and other GCP services. It provides a robust platform for device management, data ingestion, and analytics in IoT applications.
  • Hyperledger Caliper: Hyperledger Caliper is an open-source project under the Linux Foundation’s Hyperledger umbrella. While not a full IoT architecture, it allows benchmarking different blockchain frameworks for IoT use cases, focusing on performance evaluation.
  • ARM mbed: ARM’s mbed platform aims to provide a scalable and secure foundation for IoT devices and applications. It offers a suite of tools, operating systems, and device management capabilities that make it easier for developers to create IoT solutions.
  • OpenFog Consortium Architecture: The OpenFog Consortium focuses on edge computing in IoT. It has developed an architecture that addresses the challenges of deploying IoT and AI solutions at the edge of the network, emphasizing low-latency processing, data security, and scalability.

2.2. The Historical Development and Evolution of IoT Technologies

  • Early Concepts (1980s–1990s): The foundational ideas of IoT can be traced back to the 1980s and 1990s when researchers and technologists began envisioning a world where devices could be interconnected and communicate with each other. At this stage, the focus was mainly on machine-to-machine (M2M) communication and remote monitoring of industrial systems [ 21 , 43 , 54 ].
  • Emergence of RFID (Radio Frequency Identification) (1990s–2000s): The development of RFID technology marked a significant step in the evolution of IoT. RFID tags enabled the identification and tracking of objects and assets using radio waves, laying the groundwork for the idea of a connected world where objects and devices could be uniquely identified and accessed [ 42 , 50 , 51 , 52 , 53 , 54 ].
  • Proliferation of Internet Connectivity (2000s): The widespread adoption of the Internet in the early 2000s paved the way for the expansion of IoT technologies. The increasing availability of internet connectivity allowed devices and sensors to connect and transmit data over the web, creating the basis for IoT applications [ 22 , 43 ].
  • Advancements in Sensor Technology (2000s): The improvement and miniaturization of sensors during this period enabled the integration of various types of sensors into devices, making them capable of capturing data from their environment. These sensors became essential components of IoT devices, enabling them to collect real-time data [ 47 , 54 ].
  • Smart Home and Wearable Devices (2010s): The 2010s saw the rise of consumer-oriented IoT devices, such as smart home appliances and wearable devices. Smart thermostats, smart speakers, fitness trackers, and smartwatches gained popularity, showcasing the potential of IoT in enhancing daily life and user experiences [ 11 , 12 ].
  • Industrial IoT (IIoT) and Industry 4.0 (2010s): The convergence of IoT with industrial applications, known as the Industrial Internet of Things (IIoT) or Industry 4.0, became prominent. IIoT revolutionized manufacturing and industrial processes by enabling real-time monitoring, predictive maintenance, and data-driven decision-making [ 42 ].
  • Cloud Computing and Big Data (2010s): The advent of cloud computing and big data analytics provided the necessary infrastructure and tools to process and analyze the vast amounts of data generated by IoT devices. Cloud platforms allow for scalable and flexible data storage and processing, enhancing the capabilities of IoT applications [ 28 , 33 , 38 , 52 ].
  • Edge Computing (2010s): As IoT applications grew, the limitations of relying solely on cloud computing for data processing became apparent. Edge computing emerged as a solution, enabling data processing and analysis to occur closer to the data source, reducing latency, and improving real-time responsiveness [ 33 , 52 ].
  • Connectivity Advancements and 5G (2010s–2020s): The deployment of 5G networks and other connectivity advancements further accelerated the growth of IoT technologies. The high-speed, low-latency, and massive connectivity capabilities of 5G opened up new possibilities for IoT applications in various domains [ 56 ].
  • AI and Machine Learning Integration (2020s): The integration of artificial intelligence (AI) and machine learning (ML) with IoT technologies has unlocked powerful insights and automation capabilities. AI-driven analytics enable more sophisticated data processing and predictive decision-making in IoT applications [ 16 , 32 , 34 ].

3. Materials and Methods

3.1. related literature and research contributions.

  • Real-time Insights into the latest advancements, case studies, and practical applications of IoT technologies, to provide up-to-date information empower researchers, engineers, and innovators to make informed decisions and stay ahead of emerging trends.
  • Accelerating Innovation by sharing early-stage prototypes, experimental results, and proof-of-concept projects, grey literature fosters a culture of innovation.
  • Practical Implementation Guidance to provide valuable assistance to practitioners looking to deploy IoT systems effectively.
  • Use Case Exploration to inspire new use case ideas and encourage cross-industry collaboration.
  • Addressing Challenges by enabling researchers and practitioners to share their approaches to overcoming these challenges, thus fostering a collective effort to find viable solutions.

3.2. Formulation of Research Questions

3.3. prisma systematic searching strategy, 3.3.1. identification: selection criteria.

  • C1: Papers published before 2013 were excluded.
  • C2: Incomplete papers or papers presenting only a table of contents, abstracts of conferences, tutorials, keynote talks, technical reports, editorial papers, or short papers were excluded, as were papers not written in English.
  • C3: Papers lacking abstracts or full-text availability were omitted.
  • C4: Papers not directly aligned with the proposed research questions were also excluded, ensuring a laser-focused approach to our study.

3.3.2. Screening Stage

  • Title and Abstract Screening: In the initial stage, researchers diligently review the titles and abstracts of all retrieved studies, carefully identifying those that align with the research question. Studies that do not meet the inclusion criteria or lack relevance to the topic of interest are expeditiously excluded at this stage.
  • Full-Text Screening: Following the title and abstract screening, the remaining studies undergo in-depth scrutiny of their full texts. This comprehensive step involves an extensive examination of the study content to ascertain whether it satisfies the predetermined inclusion criteria. Studies that fail to meet the criteria or lack sufficient information are systematically excluded from the final selection.

3.3.3. Eligibility

3.4. quality assessment, 3.5. data extraction, 4. study results, 4.1. results related to iot technologies, 4.1.1. hardware-level, 4.1.2. network-level.

  • Personal Area Network (PAN): PAN is the smallest network type, designed for connecting devices close to each other, typically within a range of a few meters. It is commonly used for communication between personal devices, such as smartphones, smartwatches, and other wearable gadgets.
  • Local Area Network (LAN): LAN covers a relatively small geographic area, such as a home, office, or campus. It enables devices to communicate within a confined space and is often used to connect IoT devices within a specific location, like smart thermostats, security cameras, and printers.
  • Wide Area Network (WAN): WAN encompasses a larger geographic area and is used to connect devices across broader regions. Cellular networks and satellite connections are examples of WAN technologies that facilitate communication between IoT devices spread over significant distances.
  • Wireless Sensor Network (WSN): WSN consists of interconnected sensors that collaborate to collect and transmit data. These networks are often used for monitoring and control applications, such as environmental sensing, agriculture, and industrial automation.
  • Industrial IoT (IIoT) Network: IIoT networks are tailored for industrial settings and involve connecting various devices and systems in manufacturing, energy, transportation, and other sectors. IIoT optimizes processes, enhances productivity, and enables predictive maintenance.
  • Mesh Network: In a mesh network, IoT devices are interconnected, creating multiple pathways for data to travel. This redundancy enhances network reliability and coverage, making it suitable for applications requiring high resilience and extensive coverage.
  • Cellular Network: Cellular networks leverage existing telecommunications infrastructure to provide IoT connectivity. They offer reliable, widespread coverage, making them suitable for applications like fleet management, asset tracking, and smart cities.
  • Satellite Network: Satellite networks provide global IoT coverage, particularly in remote or inaccessible areas. They are vital for applications such as maritime tracking, remote environmental monitoring, and disaster response.
  • LPWAN (Low Power Wide Area Network): LPWAN technologies, like LoRaWAN and Sigfox, enable long-range communication with minimal power consumption. They are ideal for connecting battery-operated devices like smart meters and agricultural sensors.
  • Networks (5G): The introduction of 5G networks brings higher data speeds, lower latency, and increased device connectivity. It enhances IoT applications that demand real-time responsiveness, such as autonomous vehicles and augmented reality.

4.1.3. Software Level

4.1.4. storage level, 4.2. results related to iot challenges, 4.2.1. security and privacy challenges.

  • Confidentiality: At the heart of data security lies the principle of confidentiality. These imperative delegates the imposition of stringent controls on data access, achieved through a harmonious blend of physical and logical restrictions. Failing to uphold confidentiality casts a dire shadow, potentially leading to unauthorized data exposure, undermining trust, and paving the way for cyber espionage.
  • Integrity: The integrity of data forms the backbone of accurate decision-making and seamless operations. Ensuring data remains unadulterated and up to date is critical. Any compromise to data integrity can sow the seeds of misinformation, fueling erroneous actions, and eroding stakeholders’ confidence in the system’s veracity.
  • Availability: The unimpeded accessibility of data to authorized individuals is a linchpin of operational efficacy. Delays or interruptions in data availability can cripple critical processes, hinder informed decision-making, and stifle the timely execution of actions, potentially leading to operational breakdowns.
  • Authenticity: The assurance of authentic communication within the IoT ecosystem is essential to avoid fraudulent interactions. The ability to unequivocally verify the identity of communication partners establishes the bedrock of trust and ensures that data exchanges occur with the intended entities. Failure to ensure authenticity opens the door to impersonation and unauthorized access.
  • Privacy: The preservation of individual privacy stands as a cardinal principle, shielding individuals from intrusive intrusions and unwarranted disruptions. Neglecting privacy not only infringes upon personal rights but also invites breaches that can tarnish the reputation of the system’s operators, potentially leading to legal repercussions.
  • Non-repudiation: Warranting the veracity of messages or transactions is integral to a secure IoT ecosystem. Non-repudiation precludes the possibility of a sender denying their involvement or the occurrence of a transaction. Its absence leaves room for malicious repudiation, complicating dispute resolution and eroding trust.
  • Key Management: The management of cryptographic keys is an essential aspect of data security, ensuring compliance with established standards and regulations. Inadequate key management can result in unauthorized access, compromised data, and regulatory non-compliance, bearing far-reaching legal and financial consequences.
  • Symmetric Encryption: A swiftness characterizes symmetric encryption, where both encryption and decryption pivot upon a singular key—the cryptic “secret key.” While speed is its hallmark, this technique mandates a critical prelude—an accord between sender and receiver on the elusive shared key. A delicate choice, this key’s dissemination necessitates utmost care, as an ill-fated misplacement can lead to the key’s possession by unauthorized entities, thus compromising the very tenets of confidentiality.
  • Asymmetric Encryption: In contrast, asymmetric encryption is a system of duality, orchestrated through a key pair: the public and private keys. The recipient, designated as the (forthcoming) guardian of the keys, ensures that potential senders access the public key. Upon this foundation, the sender adroitly employs the recipient’s key to encode the message, setting the stage for an intricate dance wherein the recipient wields their private key to decode this encrypted enigma.

4.2.2. Interoperability and Efficiency Challenges

4.2.3. data management and analytics challenges, 4.2.4. network complexity and bandwidth challenges, 4.2.5. scalability, 4.2.6. power consumption and battery life challenges, 4.3. results related to general iot applications, 4.3.1. smart cities.

  • The smart economy endeavors to fortify the city’s commercial prowess, wherein parameters such as innovation, entrepreneurship, labor market adaptability, productivity, and global integration coalesce to determine competitiveness on the financial stage.
  • Intelligent citizens embody the collective human and social capital, encompassing not only the educational attainment of residents but also their diversity, open-mindedness, creative faculties, quality of social interactions, and civic engagement.
  • Intelligent governance orchestrates a transparent, all-encompassing administrative modality that nurtures robust civic participation.
  • Intelligent mobility accentuates both local and international accessibility, facilitated by an interconnected ICT infrastructure and innovative, sustainable, secure transportation systems.
  • An intelligent environment fosters ecological stewardship, advocating for a superior quality of life through the nurturing of green spaces, enhancement of air quality, sustainable resource management, and environmental safeguarding. Exemplars of such management are observable in localized eco-districts.
  • An intelligent lifestyle encompasses the gamut of life-quality constituents, spanning cultural enrichment, healthcare provisioning, housing, education, tourism, safety enforcement, and social cohesiveness.

4.3.2. Smart Home

  • Enhanced time management: The programming of mundane tasks such as shutter control, alarm activation, or gate manipulation via smartphones culminates in a significant temporal dividend.
  • Augmented security: Through automation systems, homes are fortified against potential break-ins and intrusions.
  • Prudent energy consumption: Automation empowers the modulation of thermostats based on temporal parameters, ushering in the benefits of sustained ambient temperatures.

4.3.3. Remote Learning

4.3.4. transportation.

  • Automating tasks hitherto reliant on human intervention.
  • Real-time monitoring and dynamic adjustment of road network performance.
  • Acquisition of data previously garnered through costly infrastructural investments, now harnessed from more prolific sources.
  • The transition from analyses rooted in historical data to those propelled by intelligent systems equipped with real-time data analytics.
  • Empowerment of road users with choices influenced by a plethora of channels, encompassing mobile devices and in-vehicle systems, supplanting the erstwhile monopoly of road signs.

4.3.5. Wearables

  • Empowerment through smart locks, wherein doors yield to the prompt of a smartphone, harmonizing convenience with security.
  • Strategic modulation of lights and thermostats through intelligent control mechanisms, engendering energy conservation and operational cost containment.
  • The advent of voice assistants—such as Alexa or Siri—enables seamless calendar management, note-taking, reminders, email dispatch, and messaging, underscoring an era of intuitive interactivity.
  • The orchestration of connected printer sensors that discern ink levels, triggers the procurement of additional cartridges, thereby precluding disruptions to workflow.
  • Surveillance cameras, rendered “smart” by connectivity, proffer the ability to transmit live content to the Internet, extending the purview of surveillance beyond physical confines.

4.3.6. Smart Retail

4.3.7. e-health.

  • The burgeoning landscape of wearables, evolving at a rapid commercial clip, offers insights into the behavior of individuals and materials. From headgear to timepieces to footwear, the spectrum of IoT-enabled wearables is expanding, capturing metrics like heart rate, caloric intake and expenditure, food consumption patterns, and an intricate web of behavioral facets. While ethical and philosophical challenges remain salient, the potential applications of this deluge of information, whether predictive or therapeutic, are prodigious.
  • The proliferation of real-time environmental awareness, propelled by the impending deluge of health-related data, beckons a plethora of ethical quandaries. Nevertheless, even when anonymized, this trove of information holds utility as a decision-making compass for public health initiatives and individual diagnoses. Expedited diagnoses during rapid disease outbreaks can tip the balance between life and death.
  • Decision support systems are anchored in the analysis of data gleaned from sensor networks, offering the potential for predictive maintenance and real-time monitoring, thus nurturing the prospect of continuous enhancement.
  • Streamlined manufacturing processes within healthcare institutions stand to gain traction. Elevated data management efficacy can empower hospitals to bolster productivity and optimize the utilization of critical equipment through enhanced scheduling. Expedited access to diagnostics like MRI scans can manifest as a pivotal determinant in patient outcomes, exemplifying the IoT’s capacity to chart optimal usage patterns for such assets.
  • Resource consumption optimization bears transformative promise, potentially influencing physician remuneration paradigms. The profound reservoirs of patient-specific data, encompassing both individual profiles and broader demographics, hold the potential to accurately gauge care efficacy, treatment outcomes, and anomalies.
  • Autonomous systems operating within open environments echo the ethos of preventive healthcare. Sensors and mobile applications, intertwined with smartphones, wield the potential to proactively detect diseases and instigate preemptive treatments. Moreover, the quantification of risks inherent in patient interactions emerges within the purview of IoT’s capabilities.

4.3.8. Industrial Internet

4.3.9. smart supply chain.

  • Enter the domain of connected forklifts, a real-time locational awareness coupled with automatic cargo recording, liberating operators from halts for manual data entry.
  • The aegis of connected silos ushers in the optimization of truck loading, fostering security by detecting instances such as uncleaned trucks before loading.
  • The orchestration of real-time monitoring of transport conditions can precipitate pre-emptive quality inspections, nipping anomalies in the bud.
  • Augmented reality unfurls its utility as a “hands-free kit” within the warehouse, charting new avenues for seamless exploration.
  • Embark upon drone-assisted inventory mechanisms, coupled with the finesse of 3D modeling of loading flows.
  • SAP solutions, standing as pillars of support, shine particularly bright within these innovative narratives, underpinned by their unique capability to holistically integrate disparate processes [ 36 ].

4.3.10. Smarts Water System

4.3.11. smart irrigation, 4.3.12. precision agricultural, 4.3.13. real-time monitoring, 4.3.14. agriculture warehouse monitoring, 4.4. results related to iot applications in finance.

  • Accelerated Decision-Making: At the nucleus of manifold business determinations, including investment choices, lies the edifice of exhaustive data analytics, corporate pattern decipherment, and market research. IoT devices emerge as instrumental assets for amassing and dissecting customer data, endowing businesses with pivotal insights into their exigencies, thereby expediting the decision-making matrix. The integration of IoT with contemporary frontiers like AI amplifies its potential, particularly within the precincts of the banking sphere. By harnessing AI, ML, and RPA, financial luminaries are endowed with the capability to adroitly scrutinize voluminous data troves, thereby concretizing judicious strategic decisions concerning resource allocation.
  • Optimized Finance and Accounting Dynamics: The rhythmic cadence of finance and accounting entwines effective inter-departmental communication, akin to a system’s harmonious overture. Through the complete automation of these intricate conduits, organizations can transcend reliance on manual synchronization. IoT devices, constituting conduits for real-time data assimilation and cloud-based updates, alleviate the labyrinthine labyrinth of workflow intricacies, thereby salvaging precious temporal and cognitive resources otherwise expended in consolidating and structuring data disseminated across multifarious teams.
  • Elevated Operational Prowess: IoT’s imprint reverberates in real-time surveillance of personnel and operational performance, bequeathing an avenue to vigilantly monitor working hours through IoT entities like wearables, whilst promptly unearthing any deviations through alert mechanisms. Moreover, IoT devices impart invaluable metrics, propelling the assessment of critical machinery’s optimal functionality—A testament to the flawless operations of apparatus like ATMs and consumer kiosks, thus underpinning their seamless efficacy.

4.4.1. IoT Payments

4.4.2. customer service, 4.4.3. identity management, 4.4.4. credit risk management, 4.4.5. fraud detection, 4.4.6. auditing, 5. discussion and open issues, 5.1. importance of iot in finance.

  • Enhanced Perception and Computing Skills: The evolution of computing, sensing, and data analytics is not just benefiting businesses but also enriching consumer experiences. Consider the transformation of smart fridges from being considered impractical and expensive a decade ago to becoming indispensable within ten years. This rapid evolution underscores the dynamic potential of IoT technologies in reshaping the financial landscape.
  • Rising Consumer Awareness: Modern consumers are increasingly immersed in technology, fostering higher expectations for innovative devices. The willingness to embrace groundbreaking technologies and share personal data has expanded. Manufacturers are now less concerned about market acceptance and more focused on rapid innovation, driving intense competition and stimulating financial growth.
  • Automation and Efficiency Advancements: IoT solutions typically lead to reduced operational costs and ensure continuous device availability. Improved automation and connectivity empower machines to exert enhanced control, leading to diminished human errors. The adoption of IoT technologies encourages a cascading effect where successful automation of one process incentivizes further automation, ultimately culminating in end-to-end efficiency.

5.2. IoT Architecture

5.2.1. significance of iot architectures.

  • Data-Driven Insights: IoT architecture allows financial institutions to collect and analyze vast amounts of real-time data from various sources, such as customer transactions, market trends, and financial indicators. This data-driven approach enables more informed decision-making, helping financial organizations identify new opportunities, optimize processes, and develop innovative products and services.
  • Enhanced Customer Experience: By leveraging IoT architecture, financial institutions can personalize customer interactions and services. Through IoT-enabled devices and applications, customers can access their accounts, make transactions, and receive tailored financial advice seamlessly. This enhanced customer experience leads to increased customer satisfaction, loyalty, and retention, ultimately driving financial growth.
  • Operational Efficiency: IoT architecture optimizes operational processes within the financial sector. Automated systems and smart devices can monitor and manage assets, detect anomalies, and predict maintenance needs. This results in reduced operational costs, improved resource utilization, and streamlined workflows, contributing to overall financial efficiency and profitability.
  • Risk Management and Fraud Prevention: IoT architecture enhances risk management by providing real-time monitoring and early detection of potential risks. For instance, IoT sensors can track changes in market conditions, asset values, or transaction patterns, enabling proactive risk mitigation. Additionally, IoT-driven security measures, such as biometric authentication and surveillance, help prevent fraud and protect sensitive financial data.
  • Innovative Products and Services: IoT architecture enables the creation of innovative financial products and services that cater to evolving customer needs. For example, IoT-powered insurance solutions can offer usage-based premiums, where premiums are adjusted based on actual driving behavior or health monitoring. These novel offerings attract new customers and revenue streams.
  • Cross-Sector Collaboration: IoT architecture encourages collaboration between the financial sector and other industries, such as retail, healthcare, and transportation. Joint ventures and partnerships can lead to the development of integrated solutions, like point-of-sale financing for retail purchases or healthcare payment plans tied to IoT health monitoring devices.
  • Market Expansion: IoT architecture facilitates market expansion by reaching underserved or unbanked populations. Through IoT-enabled mobile banking, financial services can be delivered to remote areas without traditional banking infrastructure, increasing financial inclusion and opening new markets.
  • Data Monetization: Financial institutions can leverage IoT-generated data as an additional revenue stream. By anonymizing and aggregating data, they can offer valuable insights to businesses, policymakers, and researchers. This data monetization strategy contributes to financial growth beyond core banking activities.
  • Regulatory Compliance: IoT architecture can aid in meeting regulatory requirements by providing accurate and auditable records of transactions, processes, and customer interactions. This ensures transparency, accountability, and compliance, reducing legal risks and potential penalties.

5.2.2. Reference Architectures

  • Standardization and Best Practices: IoT reference architectures establish a set of best practices and standardized approaches for building IoT solutions. This consistency helps ensure that IoT deployments are reliable, scalable, and maintainable.
  • Interoperability: IoT reference architectures often promote interoperability by defining common protocols, communication standards, and data formats. This ensures that devices and systems from different vendors can work together seamlessly, fostering a more diverse and open IoT ecosystem.
  • Scalability: Reference architectures help IoT systems scale effectively by guiding how to add more devices, gateways, and components as the IoT deployment grows. This scalability is crucial as IoT deployments can rapidly expand in terms of the number of connected devices.
  • Security: Security is a paramount concern in IoT. Reference architectures typically include security best practices for device authentication, data encryption, access control, and other aspects of IoT security. Following these guidelines helps mitigate security risks.
  • Reduced Development Time and Costs: IoT reference architectures can significantly reduce development time and costs by providing a well-defined structure and reusable components. Developers can leverage existing architectural patterns and design principles rather than starting from scratch.
  • Flexibility: While reference architectures provide a structured framework, they are often flexible enough to accommodate various use cases and industries. They can be adapted to specific requirements while maintaining a solid foundation.
  • Ecosystem Growth: IoT reference architectures encourage the growth of the IoT ecosystem by making it easier for organizations and developers to enter the market. They can accelerate innovation and drive the development of new IoT solutions.
  • Risk Mitigation: By following established reference architectures, organizations can reduce the risk of project failure or costly mistakes. These architectures are based on proven principles and real-world experiences, helping organizations make informed decisions.
  • IoT-A: IoT-A (IoT Architecture) is an architecture developed by the European Union’s IoT research project. It focuses on the architectural aspects of IoT, including the modeling of IoT systems, resource management, and data processing.
  • IBM IoT Reference Architecture: IBM has created a comprehensive IoT reference architecture that covers device management, connectivity, data processing, analytics, and application enablement. It emphasizes the importance of data-driven insights in IoT solutions.
  • Industrial Internet Consortium (IIC) IoT Reference Architecture: IIC, a consortium focused on industrial IoT, has published an IoT reference architecture that addresses the specific needs of industrial applications, including manufacturing, energy, and healthcare.
  • Microsoft Azure IoT Reference Architecture: Microsoft offers its reference architecture for building IoT solutions on its Azure cloud platform. It covers device connectivity, data processing, analytics, and integration with Azure services.
  • AWS IoT Reference Architectures: Amazon Web Services (AWS) provides various reference architectures for IoT applications, including edge computing, data processing, and serverless IoT.
  • Open Connectivity Foundation (OCF): OCF has defined IoT reference architecture for interoperable and secure connectivity among IoT devices. It focuses on standardizing communication protocols and data models.
  • IETF IoT Reference Architectures: The Internet Engineering Task Force (IETF) has produced a series of RFCs (Request for Comments) related to IoT reference architectures and security considerations, emphasizing the importance of secure communication.

5.3. Current Advances to Simulate or Implement IoT

  • Message queuing systems play a pivotal role in facilitating crucial interactions between producers and consumers. Notably, 16% of the scrutinized papers employed message queuing systems. Among these, Mosquitto (47%), Kafka (23%), Apache ActiveMQ (9%), RabbitMQ (8%), and Celery (8%) emerged as the most utilized systems.
  • In addressing the critical need for efficient data storage in IoT implementations, our examination revealed the prevalent usage of databases such as MySQL, Redis, MongoDB, HBase, SQLite, PostgreSQL, CouchDB, and DynamoDB. MySQL stood out as the most prevalent choice, constituting 31% of the selections.
  • Cloud services play a pivotal role in numerous IoT applications, providing reliable computational power and storage resources. Our analysis highlighted a diverse spectrum of cloud technologies and services adopted by the selected articles, including Apache Hadoop, Amazon EC2, Apache Spark, Amazon S3, Amazon IoT, and Amazon EMR.
  • Containers and services hold paramount significance in constructing robust IoT solutions. Container platforms offer a comprehensive toolkit for IoT design and management, bolstering system resilience against failures. Prominent tools in this domain encompass Docker, OSGi, Docker Swarm, and Kubernetes.

5.4. IoT Open Issues

5.4.1. system design, 5.4.2. a comprehensive evaluation of iot requirements, 5.4.3. flexible and broad-purpose methodologies, 5.4.4. regulatory and legal issues, 5.4.5. ethical considerations, 5.4.6. environmental effects, 5.5. financial insights.

  • First, it is essential to consider the powerful dependence on the quantity of data, especially training data. Given the differences in activities, services, and management protocols in IoT systems around the world, how to guarantee the usefulness of the developed methods is a question to consider. Therefore, it is necessary to implement evaluation methods for performance tests.
  • Secondly, for the commercial development of a system, there might be ethical and legal issues, concerning the use of the data from the training phase, as the performance depends on the quality of the training data.

5.6. Recommendations and Practical Implications

  • Comprehensive Regulatory Frameworks: Establish comprehensive and adaptive regulatory frameworks that encompass technical standards, data privacy, security protocols, and environmental sustainability. Collaboration between policymakers, industry stakeholders, and research bodies is essential to ensure that regulations remain agile in the face of rapid technological advancements.
  • Interdisciplinary Collaboration: Foster collaborative ecosystems that transcend traditional disciplinary boundaries. Engage experts from diverse domains such as technology, law, ethics, financials, and environmental science to devise holistic solutions that balance innovation with ethical, legal, and environmental considerations.
  • Ethical Guidelines and Education: Develop clear ethical guidelines for IoT design, deployment, and use. Educate developers, users, and decision-makers about the ethical implications of IoT technologies to promote responsible innovation and ensure alignment with societal values.
  • Resource-Efficient Design: Prioritize resource-efficient design principles in IoT devices and systems. Incorporate energy-efficient hardware, renewable energy sources, and sustainable manufacturing processes to minimize the environmental footprint while enhancing operational efficiency.
  • Circular Economy Approach: Embrace a circular economy approach by designing IoT devices for durability, repairability, and recyclability. Implement strategies that extend product lifecycles and facilitate responsible disposal, reducing electronic waste and conserving valuable resources.
  • Privacy-Preserving Technologies: Integrate privacy-preserving technologies, such as encryption, differential privacy, and decentralized architectures, to safeguard sensitive data in IoT ecosystems. Strive for a harmonious balance between data utility and individual privacy rights.
  • Dynamic Risk Assessment: Implement dynamic risk assessment mechanisms that continuously monitor and adapt to emerging threats in IoT ecosystems. Utilize machine learning and artificial intelligence algorithms to detect anomalies, predict vulnerabilities, and facilitate timely mitigation.
  • Stakeholder Engagement: Foster transparent communication and collaboration among IoT stakeholders, including manufacturers, consumers, regulators, and advocacy groups. Engage in open dialogues to address concerns, gather feedback, and collectively shape the evolution of IoT systems.
  • Education and Skill Development: Invest in education and skill development programs that equip individuals with the knowledge and expertise required to navigate the complexities of IoT. Empower professionals to implement and manage IoT technologies while upholding ethical, legal, and environmental standards.
  • Long-Term Impact Assessment: Conduct comprehensive, long-term impact assessments of IoT implementations to quantify their effects on financial, environmental, and societal dimensions. These assessments can inform decision-making and guide the evolution of IoT strategies.
  • Innovation for Sustainability: Encourage research and innovation that explicitly targets the enhancement of IoT’s environmental sustainability. Support initiatives that explore novel energy harvesting techniques, eco-friendly materials, and innovative data processing methods.
  • Global Collaboration: Foster international collaboration to establish universally accepted standards and practices for IoT deployments. Global cooperation can harmonize efforts, eliminate redundancies, and accelerate the adoption of sustainable IoT solutions.
  • Business Strategy and Decision-Making: The study emphasizes the transformative impact of IoT on organizations and daily lives. Businesses can leverage IoT technologies to make more informed decisions, optimize processes, and enhance operational effectiveness. The insights gained from IoT data can guide strategic planning and resource allocation.
  • Operational Efficiency: The study highlights the advantages of IoT in improving overall productivity. IoT devices and sensors can monitor and control various aspects of business operations, leading to streamlined processes, reduced inefficiencies, and cost savings.
  • Data Handling and IT Infrastructure: With the increasing volume of data generated by IoT devices, the study underscores the importance of robust IT systems capable of handling and processing this data effectively. Businesses need to invest in scalable and secure IT architectures to manage and analyze the data generated by IoT devices.
  • IoT Architecture Development: The study recognizes the challenge of developing appropriate IoT architectures to meet evolving requirements. Businesses must focus on designing flexible and adaptable architectures that can accommodate diverse use cases and circumstances while ensuring data integrity and security.
  • Research and Innovation: The study’s systematic review of existing IoT research provides a comprehensive overview of the current state of the field. This can guide further research and innovation by identifying gaps, trends, and emerging areas of interest within the IoT domain.
  • Problem Identification and Resolution: By highlighting unresolved difficulties in the IoT business landscape, the study encourages ongoing dialogue and investigation. Businesses can use these insights to address challenges, develop innovative solutions, and drive continuous improvement.
  • Encouraging Further Inquiry: The study contributes to the broader conversation around IoT by recognizing and critically assessing issues. It catalyzes further inquiry and exploration, motivating researchers and practitioners to delve deeper into the complexities of IoT technologies and their applications.
  • Adaptation to Change: The study underscores the dynamic nature of business settings in the face of technological breakthroughs. Businesses need to remain agile and adaptive to embrace IoT-driven changes, ensuring they stay competitive and relevant in a rapidly evolving landscape.
  • Collaboration and Knowledge Sharing: The study’s comprehensive review and categorization of IoT research create opportunities for collaboration and knowledge sharing among researchers, practitioners, and stakeholders. This can lead to cross-disciplinary insights and innovative solutions.
  • Awareness and Education: The study contributes to raising awareness about the significance of IoT technologies in contemporary business environments. It highlights the need for businesses to stay informed, educated, and proactive in adopting IoT strategies to stay ahead in the market.

5.7. Strength and Limitation

  • Scope and Generalizability: The study’s focus on a specific set of 84 research papers may limit the generalizability of its findings. The selected papers might not fully represent the entire breadth of IoT research and applications, potentially overlooking important perspectives and advancements.
  • Time Sensitivity: The rapidly evolving nature of IoT technologies means that the conclusions drawn from this study might become outdated relatively quickly. Breakthroughs, challenges, and trends may emerge that are not adequately addressed in the current research landscape.
  • Methodological Limitations: While the study employs a systematic review strategy following PRISMA guidelines, the methodology itself might have limitations. For instance, the inclusion/exclusion criteria for research papers and the search terms used could influence the selection of papers and potentially omit relevant studies.
  • Lack of Real-World Validation: While the study aims to encourage further dialogue and investigation, the actual impact of the study’s findings on real-world business practices and decision-making remains to be seen.
  • Comprehensive Understanding: The study offers a thorough examination of the current ecosystem of IoT studies by systematically reviewing and categorizing 84 research papers. This comprehensive approach provides a holistic view of the field’s current state and trends.
  • Methodological Rigor: The study follows the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) guidelines, indicating a high level of methodological rigor and systematic selection of relevant research papers.
  • Categorization Framework: The adoption of an empirical categorization strategy helps organize a wide range of IoT research topics and applications, making it easier for readers to grasp the diversity of the field.
  • Practical Relevance: By focusing on the applications of IoT in business settings, the study addresses a practical and pertinent aspect of the technology’s impact. This emphasis on real-world implications enhances its relevance to corporate management and decision-making.
  • Gap Identification: The study’s exploration of unresolved difficulties and challenges in the IoT business landscape highlights gaps in current knowledge and understanding. This can guide future research efforts and stimulate further inquiry.
  • Encouragement of Dialogue: The study’s intention to foster additional discussion and investigation within the dynamic and evolving domain of IoT demonstrates its commitment to driving ongoing progress and innovation.
  • Research Overview: The study’s systematic review and categorization offer a valuable resource for researchers seeking to gain a consolidated understanding of the diverse research topics and areas within the IoT domain.
  • Foundational Insights: The study’s overview of IoT research provides foundational insights for individuals who are new to the field, helping them grasp key concepts, applications, and challenges.
  • Reference for Decision-Makers: The study’s insights into the advantages of IoT for business purposes, operational effectiveness, and decision-making processes can guide corporate leaders in understanding the potential benefits of IoT adoption.
  • Contribution to Knowledge: By identifying and critically assessing existing research, the study contributes to the ongoing conversation around IoT technologies, enriching the collective knowledge and informing future directions.
  • Research Roadmap: The study’s categorization and analysis serve as a roadmap for potential areas of further investigation, offering guidance to researchers interested in advancing the understanding and application of IoT.

6. Conclusions

Author contributions, institutional review board statement, informed consent statement, data availability statement, conflicts of interest.

  • Mazhar, T.; Irfan, H.M.; Haq, I.; Ullah, I.; Ashraf, M.; Shloul, T.A.; Ghadi, Y.Y.; Imran; Elkamchouchi, D.H. Analysis of Challenges and Solutions of IoT in Smart Grids Using AI and Machine Learning Techniques: A Review. Electronics 2023 , 12 , 242. [ Google Scholar ] [ CrossRef ]
  • Aloi, G.; Caliciuri, G.; Fortino, G.; Gravina, R.; Pace, P.; Russo, W.; Savaglio, C. Enabling IoT interoperability through opportunistic smartphone-based mobile gateways. J. Netw. Comput. Appl. 2017 , 81 , 74–84. [ Google Scholar ] [ CrossRef ]
  • Wanasinghe, T.R.; Gosine, R.G.; James, L.A.; Mann GK, I.; de Silva, O.; Warrian, P.J. The Internet of things in the oil and gas industry: A systematic review. IEEE Internet Things J. 2020 , 7 , 8654–8673. [ Google Scholar ] [ CrossRef ]
  • Razzaque, M.A.; Milojevic-Jevric, M.; Palade, A.; Clarke, S. Middleware for Internet of Things: A survey. IEEE Internet Things J. 2015 , 3 , 70–95. [ Google Scholar ] [ CrossRef ]
  • Yushi, L.; Fei, J.; Hui, Y. Study on application modes of military Internet of Things (miot). In Proceedings of the 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE), Zhangjiajie, China, 25–27 May 2012; Volume 3, pp. 630–634. [ Google Scholar ] [ CrossRef ]
  • Meyer, J.; Boll, S. Smart health systems for personal health action plans. In Proceedings of the 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services, Natal, Brazil, 15–18 October 2014; pp. 404–410. [ Google Scholar ] [ CrossRef ]
  • Fan, Y.J.; Yin, Y.H.; Xu, L.D.; Zeng, Y.; Wu, F. Iot-based smart rehabilitation system. IEEE Trans. Ind. Inform. 2014 , 10 , 1568–1577. [ Google Scholar ] [ CrossRef ]
  • Vippalapalli, V.; Ananthula, S. Internet of Things (IoT) based smart health care system. In Proceedings of the 2016 International Conference on Signal Processing, Communication, Power, and Embedded System (SCOPES), Paralakhemundi, India, 3–5 October 2016; pp. 1229–1233. [ Google Scholar ] [ CrossRef ]
  • Haouel, J.; Ghorbel, H.; Bargaoui, H. Towards an IoT architecture for persons with disabilities and applications. In Proceedings of the International Conference on IoT Technologies for HealthCare, Västerås, Sweden, 18–19 October 2016; pp. 159–161. [ Google Scholar ] [ CrossRef ]
  • Gaikwad, P.P.; Gabhane, J.P.; Golait, S.S. A survey based on smart homes system using internet-of-things. In Proceedings of the 2015 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC), Melmaruvathur, India, 22–23 April 2015; pp. 0330–0335. [ Google Scholar ] [ CrossRef ]
  • Kasmi, M.; Bahloul, F.; Tkitek, H. Smart home based on Internet of Things and cloud computing. In Proceedings of the 2016 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), Hammamet, Tunisia, 18–20 December 2016; pp. 82–86. [ Google Scholar ] [ CrossRef ]
  • Gea, T.; Paradells, J.; Lamarca, M.; Roldán, D. Smart cities as an application of Internet of Things: Experiences and lessons learned in Barcelona. In Proceedings of the 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Taichung, Taiwan, 3–5 July 2013; pp. 552–557. [ Google Scholar ] [ CrossRef ]
  • Cambra, C.; Sendra, S.; Lloret, J.; Garcia, L. An IoT service-oriented system for agriculture monitoring. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Zixuan, Y.; Zhifang, W.; Chang, L. Research on marine environmental monitoring system based on the Internet of Things technology. In Proceedings of the 2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT), Harbin, China, 20–22 August 2016; pp. 121–125. [ Google Scholar ] [ CrossRef ]
  • Evans, D. Cisco. L’internet des Objets. 2011. Available online: http://www.cisco.com/web/CA/solutions/executive/assets/pdf/internetof-things-fr.pdf (accessed on 13 January 2023).
  • Sahni, Y.; Cao, J.; Zhang, S.; Yang, L. Edge mesh: A new paradigm to enable distributed intelligence in Internet of things. IEEE Access 2017 , 5 , 16441–16458. [ Google Scholar ] [ CrossRef ]
  • San Emeterio de la Parte, M.; Martínez-Ortega, J.F.; Hernández Díaz, V.; Martinez, N.L. Big Data and precision agriculture: A Novel spatio-temporal Semantic IoT Data Management Framework for Improved Interoperability. J Big Data 2023 , 10 , 52. [ Google Scholar ] [ CrossRef ]
  • Ren, Y.; Huang, D.; Wang, W.; Yu, X. BSMD: A blockchain-based secure storage mechanism for big spatio-temporal data. Future Gener. Comput. Syst. 2023 , 138 , 328–338. [ Google Scholar ] [ CrossRef ]
  • Safa, M.; Pandian, A.; Gururaj, H.L.; Ravi, V.; Krichen, M. Real-time health care big data analytics model for improved QoS in cardiac disease prediction with IoT devices. Health Technol. 2023 , 13 , 473–483. [ Google Scholar ] [ CrossRef ]
  • Bi, Z.; Jin, Y.; Maropoulos, P.; Zhang, W.-J.; Wang, L. Internet of things (IoT) and big data analytics (BDA) for digital manufacturing (DM). Int. J. Prod. Res. 2023 , 61 , 4004–4021. [ Google Scholar ] [ CrossRef ]
  • Kumar, M.; Mukherjee, P.; Verma, S.; Kavita; Shafi, S.; Wozniak, M. A smart privacy-preserving framework for industrial IoT using hybrid meta-heuristic algorithm. Sci. Rep. 2023 , 13 , 5372. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Zubaydi, H.D.; Varga, P.; Molnár, S. Leveraging Blockchain Technology for Ensuring Security and Privacy Aspects in Internet of Things: A Systematic Literature Review. Sensors 2023 , 23 , 788. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Najafi, S.E.; Nozari, H.; Edalatpanah, S.A. Investigating the Key Parameters Affecting Sustainable IoT-Based Marketing. In Computational Intelligence Methodologies Applied to Sustainable Development Goals ; Verdegay, J.L., Brito, J., Cruz, C., Eds.; Studies in Computational Intelligence; Springer: Cham, Switzerland, 2022; Volume 1036. [ Google Scholar ] [ CrossRef ]
  • Ediagbonya, V.; Tioluwani, C. The role of fintech in driving financial inclusion in developing and emerging markets: Issues, challenges, and prospects. Technol. Sustain. 2023 , 2 , 100–119. [ Google Scholar ] [ CrossRef ]
  • Jarašūnienė, A.; Čižiūnienė, K.; Čereška, A. Research on Impact of IoT on Warehouse Management. Sensors 2023 , 23 , 2213. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Nagaty, K.A. IoT Commercial and Industrial Applications and AI-Powered IoT. InFrontiers of Quality Electronic Design (QED) ; Iranmanesh, A., Ed.; Springer: Cham, Switzerland, 2023. [ Google Scholar ] [ CrossRef ]
  • Orfanos, V.A.; Kaminaris, S.D.; Papageorgas, P.; Piromalis, D.; Kandris, D. A Comprehensive Review of IoT Networking Technologies for Smart Home Automation Applications. J. Sens. Actuator Netw. 2023 , 12 , 30. [ Google Scholar ] [ CrossRef ]
  • Pal, A.; Rath, H.K.; Shailendra, S.; Bhattacharyya, A. IoT standardization: The road ahead. In Internet of Things-Technology, Applications, and Standardization ; IntechOpen: London, UK, 2018; pp. 53–74. [ Google Scholar ] [ CrossRef ]
  • Bader, S.R.; Maleshkova, M.; Lohmann, S. Structuring reference architectures for the industrial Internet of things. Future Internet 2019 , 11 , 151. [ Google Scholar ] [ CrossRef ]
  • Gaber, M.M.; Aneiba, A.; Basurra, S.; Batty, O.; Elmisery, A.M.; Kovalchuk, Y.; Rhanam, M.H.U. Internet of things and data mining: From applications to techniques and systems. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 2019 , 9 , e1292. [ Google Scholar ] [ CrossRef ]
  • Wei, Z.; Jia, Y.; Yao, Y.; Zhu, L.; Guan, L.; Mao, Y.; Liu, P.; Zhang, Y. Discovering and understanding the security hazards in the interactions between IoT devices, mobile apps, and clouds on smart home platforms. In Proceedings of the 28th Security Symposium, Santa Clara, CA, USA, 14–16 August 2019; pp. 1133–1150. [ Google Scholar ]
  • Piccialli, F.; Cuomo, S.; Di Cola, V.S.; Casolla, G. A machine learning approach for IoT cultural data. J. Ambient. Intell. Humaniz. Comput. 2019 , 1–12. [ Google Scholar ] [ CrossRef ]
  • Fatima, H.; Hussain, R.; Hassan, S.A.; Hossain, E. Machine learning in IoT security: Current solutions and future challenges. IEEE Commun. Surv. Tutor. 2020 , 22 , 1686–1721. [ Google Scholar ] [ CrossRef ]
  • Zeng, Q.; Lv, Z.; Li, C.; Shi, Y.; Lin, Z.; Liu, C.; Song, G. FedProLs: Federated learning for IoT perception data prediction. Appl. Intell. 2023 , 53 , 3563–3575. [ Google Scholar ] [ CrossRef ]
  • Allioui, H.; Allioui, A. The Financial Sphere in the Era of COVID-19: Trends and Perspectives of Artificial Intelligence. In Finance, Law, and the Crisis of COVID-19 ; Contributions to Management Science, Mansour, N., Vadell, M.B., Eds.; Springer: Cham, Switzerland, 2022. [ Google Scholar ] [ CrossRef ]
  • Allioui, H.; Allioui, A.; Mourdi, Y. AI-Based Logistics Solutions to Tackle COVID-19 Pandemic and Ensure a Sustainable Financial Growth. In Advanced AI and Internet of Health Things for Combating Pandemics ; Lahby, M., Pilloni, V., Banerjee, J.S., Mahmud, M., Eds.; Internet of Things; Springer: Cham, Switzerland, 2023. [ Google Scholar ] [ CrossRef ]
  • Yavari, A.; Korala, H.; Georgakopoulos, D.; Kua, J.; Bagha, H. Sazgar IoT: A Device-Centric IoT Framework and Approximation Technique for Efficient and Scalable IoT Data Processing. Sensors 2023 , 23 , 5211. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Pliatsios, A.; Kotis, K.; Goumopoulos, C. A systematic review on semantic interoperability in the IoE-enabled smart cities. Internet Things 2023 , 22 , 100754. [ Google Scholar ] [ CrossRef ]
  • Lemus-Zúñiga, L.-G.; Félix, J.M.; Fides-Valero, A.; Benlloch-Dualde, J.-V.; Martinez-Millana, A. A Proof-of-Concept IoT System for Remote Healthcare Based on Interoperability Standards. Sensors 2022 , 22 , 1646. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Abounassar, E.M.; El-Kafrawy, P.; Abd El-Latif, A.A. Security and Interoperability Issues with Internet of Things (IoT) in Healthcare Industry: A Survey. In Security and Privacy Preserving for IoT and 5G Networks ; Abd El-Latif, A.A., Abd-El-Atty, B., Venegas-Andraca, S.E., Mazurczyk, W., Gupta, B.B., Eds.; Studies in Big Data; Springer: Cham, Switzerland, 2022; Volume 95. [ Google Scholar ] [ CrossRef ]
  • Bharany, S.; Sharma, S.; Khalaf, O.I.; Abdulsahib, G.M.; Al Humaimeedy, A.S.; Aldhyani, T.H.H.; Maashi, M.; Alkahtani, H. A Systematic Survey on Energy-Efficient Techniques in Sustainable Cloud Computing. Sustainability 2022 , 14 , 6256. [ Google Scholar ] [ CrossRef ]
  • Cleber, M.; Sadok, D.; Kelner, J. An IoT sensor and scenario survey for data researchers. J. Br. Comput. Soc. 2019 , 25 , 4. [ Google Scholar ] [ CrossRef ]
  • Albrecht, S.; Van Laerhoven, K. How to build smart appliances? IEEE Pers. Commun. 2001 , 8 , 66–71. [ Google Scholar ] [ CrossRef ]
  • Khelif, F.; Bradai, A.; Benslimane, A.; Rawat, P.; Atri, M. A survey of localization systems in Internet of things. Mob. Netw. Appl. 2019 , 24 , 761–785. [ Google Scholar ] [ CrossRef ]
  • Andrews, L.J.B.; Raja, L. Mobile android-based remote patient monitoring system through wearable sensors. J. Discret. Math. Sci. Cryptogr. 2019 , 22 , 557–568. [ Google Scholar ] [ CrossRef ]
  • Vijaya, R.S.; Nalluri, S.; Ramasubbareddy, S.; Govinda, K.; Swetha, E. Brilliant corp yield prediction utilizing Internet of Things. In Data Engineering and Communication Technology ; Springer: Singapore, 2020; pp. 893–902. [ Google Scholar ] [ CrossRef ]
  • Salah, M. IoT physical layer: Sensors, actuators, controllers, and programming. In The Era of Internet of Things ; Springer: Cham, Switzerland, 2019; pp. 21–47. [ Google Scholar ] [ CrossRef ]
  • Tournier, J.; Lesueur, F.; Mouel, F.; Guyon, L.; Hassine, H.B. A survey of IoT protocols and their security issues through the lens of a generic IoT stack. Internet Things 2021 , 16 , 100264. [ Google Scholar ] [ CrossRef ]
  • Lee, J.S.; Dong, M.F.; Sun, Y.H. A preliminary study of low power wireless technologies: ZigBee and Bluetooth low energy. In Proceedings of the 2015 IEEE 10th Conference on Industrial Electronics and Applications (ICIEA), Auckland, New Zealand, 15–17 June 2015; pp. 135–139. [ Google Scholar ] [ CrossRef ]
  • Jabraeil Jamali, M.A.; Bahrami, B.; Heidari, A.; Allahverdizadeh, P.; Norouzi, F. IoT Architecture. In Towards the Internet of Things. EAI/Springer Innovations in Communication and Computing ; Springer: Cham, Switzerland, 2020. [ Google Scholar ] [ CrossRef ]
  • Gupta, B.B.; Quamara, M. An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols. Concurr. Comput. Pract. Exp. 2020 , 32 , e4946. [ Google Scholar ] [ CrossRef ]
  • Alfonso, I.; Garcés, K.; Castro, H.; Cabot, J. A model-based infrastructure for the specification and runtime execution of self-adaptive IoT architectures. Computing 2023 , 105 , 1883–1906. [ Google Scholar ] [ CrossRef ]
  • Moreta, N.; Aragon, D.; Oña, S.; Jaramillo, A.; Ibarra, J.; Jahankhani, H. Comparison of Cybersecurity Methodologies for the Implementing of a Secure IoT Architecture. In Cybersecurity in the Age of Smart Societies ; Jahankhani, H., Ed.; Advanced Sciences and Technologies for Security Applications; Springer: Cham, Switzerland, 2023. [ Google Scholar ] [ CrossRef ]
  • Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013 , 29 , 1645–1660. [ Google Scholar ] [ CrossRef ]
  • Elijah, O.; Rahman, T.A.; Orikumhi, I.; Leow, C.Y.; Hindia, M.N. An overview of Internet of Things (IoT) and data analytics in agriculture: Benefits and challenges. IEEE Internet Things J. 2018 , 5 , 3758–3773. [ Google Scholar ] [ CrossRef ]
  • Pons, M.; Valenzuela, E.; Rodríguez, B.; Nolazco-Flores, J.A.; Del-Valle-Soto, C. Utilization of 5G Technologies in IoT Applications: Current Limitations by Interference and Network Optimization Difficulties—A Review. Sensors 2023 , 23 , 3876. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • PRISMA. 2023. Available online: http://www.prisma-statement.org/?AspxAutoDetectCookieSupport=1 (accessed on 13 January 2023).
  • Mengist, W.; Soromessa, T.; Legese, G. Method for Conducting Systematic Literature Review and Meta-Analysis for Environmental Science Research. MethodsX 2020 , 7 , 100777. [ Google Scholar ] [ CrossRef ]
  • Arshad, R.; Zahoor, S.; Shah, M.A.; Wahid, A.; Yu, H. Green IoT: An Investigation on Energy Saving Practices for 2020 and beyond. IEEE Access 2017 , 5 , 15667–15681. [ Google Scholar ] [ CrossRef ]
  • Albreem, M.A.; Sheikh, A.M.; Alsharif, M.H.; Jusoh, M.; Yasin, M.N. Green Internet of Things (GIoT): Applications, practices, awareness, and challenges. IEEE Access 2021 , 9 , 38833–38858. [ Google Scholar ] [ CrossRef ]
  • Miorandi, D.; Sicari, S.; De Pellegrini, F.; Chlamtac, I. Internet of things: Vision, applications and research challenges. Ad. Hoc. Netw. 2012 , 10 , 1497–1516. [ Google Scholar ] [ CrossRef ]
  • Baliga, J.; Ayre, R.W.; Hinton, K.; Tucker, R.S. Green cloud computing: Balancing energy in processing, storage, and transport. Proc. IEEE 2011 , 99 , 149–167. [ Google Scholar ] [ CrossRef ]
  • Shaikh, F.K.; Zeadally, S. Energy harvesting in wireless sensor networks: A comprehensive review. Renew. Sustain. Energy Rev. 2016 , 55 , 1041–1054. [ Google Scholar ] [ CrossRef ]
  • Akkaya, K.; Guvenc, I.; Aygun, R.; Pala, N.; Kadri, A. IoT-based occupancy monitoring techniques for energy-efficient smart buildings. In Proceedings of the 2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW 2015), New Orleans, LA, USA, 9–12 March 2015; pp. 58–63. [ Google Scholar ]
  • Amendola, S.; Lodato, R.; Manzari, S.; Occhiuzzi, C.; Marrocco, G. RFID technology for IoT-based personal healthcare in smart spaces. IEEE Internet Things J. 2014 , 1 , 144–152. [ Google Scholar ] [ CrossRef ]
  • Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A survey on Internet of things: Architecture, enabling technologies, security, privacy, and applications. IEEE Internet Things J. 2017 , 4 , 1125–1142. [ Google Scholar ] [ CrossRef ]
  • Goudos, S.K.; Dallas, P.I.; Chatziefthymiou, S.; Kyriazakos, S. A survey of IoT key enabling and future technologies: 5G, mobile IoT, semantic web, and applications. Wirel. Pers. Commun. 2017 , 97 , 1645–1675. [ Google Scholar ] [ CrossRef ]
  • Alam, M.M.; Malik, H.; Khan, M.I.; Pardy, T.; Kuusik, A.; Le Moullec, Y. A survey on the roles of communication technologies in IoT-based personalized healthcare applications. IEEE Access 2018 , 6 , 36611–36631. [ Google Scholar ] [ CrossRef ]
  • Taivalsaari, A.; Mikkonen, T. A taxonomy of IoT client architectures. IEEE Softw. 2018 , 35 , 83–88. [ Google Scholar ] [ CrossRef ]
  • Yaqoob, I.; Ahmed, E.; Hashem, I.A.T.; Ahmed, A.I.A.; Gani, A.; Imran, M.; Guizani, M. Internet of Things architecture: Recent advances, taxonomy, requirements, and open challenges. IEEE Wirel. Commun. 2017 , 24 , 10–16. [ Google Scholar ] [ CrossRef ]
  • Ray, P. A survey on Internet of Things architectures. J. King Saud Univ.-Comput. Inf. Sci. 2018 , 30 , 291–319. [ Google Scholar ] [ CrossRef ]
  • Sheng, Z.; Yang, S.; Yu, Y.; Vasilakos, A.V.; Mccann, J.A.; Leung, K.k. A survey on the ietf protocol suite for the Internet of Things: Standards, challenges, and opportunities. IEEE Wirel. Commun. 2013 , 20 , 91–98. [ Google Scholar ] [ CrossRef ]
  • Weyrich, M.; Ebert, C. Reference architectures for the Internet of Things. IEEE Softw. 2016 , 1 , 112–116. [ Google Scholar ] [ CrossRef ]
  • Minoli, D.; Sohraby, K.; Occhiogrosso, B. IoT considerations, requirements, and architectures for smart buildings—Energy optimization and next-generation building management systems. IEEE Internet Things J. 2017 , 4 , 269–283. [ Google Scholar ] [ CrossRef ]
  • Guillaume, B.; Benjamin, D.; Vincent, C. Review of the Impact of IT on the Environment and Solution with a Detailed Assessment of the Associated Gray Literature. Sustainability 2022 , 14 , 2457. [ Google Scholar ] [ CrossRef ]
  • Naghib, A.; Jafari Navimipour, N.; Hosseinzadeh, M.; Sharifi, A. A comprehensive and systematic literature review on the big data management techniques in the Internet of things. Wirel. Netw. 2023 , 29 , 1085–1144. [ Google Scholar ] [ CrossRef ]
  • IoT Analytics. 2023. Available online: https://iot-analytics.com (accessed on 3 June 2023).
  • MQ. 2023. Available online: https://www.emqx.com/en (accessed on 10 June 2023).
  • IBM. Real-Time Analytics on IoT Data. 2023. Available online: https://www.ibm.com/blog/real-time-analytics-on-iot-data/ (accessed on 10 June 2023).
  • MMAT. 2018. Available online: http://mixedmethodsappraisaltoolpublic.pbworks.com/w/file/fetch/127916259/MMAT_2018_criteria-manual_2018-08-01_ENG.pdf (accessed on 13 January 2023).
  • Kiljander, J.; D’elia, A.; Morandi, F.; Hyttinen, P.; Mattila, J.T.; Oja, A.Y.; Soininen, J.P.; Cinotti, T.S. Semantic interoperability architecture for pervasive computing and Internet of Things. IEEE Access 2014 , 2 , 856–873. [ Google Scholar ] [ CrossRef ]
  • Cirani, S.; Davoli, L.; Ferrari, G.; Leone, R.; Medagliani, P.; Picone, M.; Veltri, L. A scalable and self-configuring architecture for service discovery on the Internet of Things. IEEE Internet Things J. 2014 , 1 , 508–521. [ Google Scholar ] [ CrossRef ]
  • Tracey, D.; Sreenan, C. A holistic architecture for the Internet of Things, sensing services, and big data. In Proceedings of the 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, Delft, The Netherlands, 13–16 May 2013; pp. 546–553. [ Google Scholar ] [ CrossRef ]
  • Catarinucci, L.; Donno, D.; Mainetti, L.; Palano, L.; Patrono, L.; Steranizzi, M.L.; Tarricone, L. An IoT-aware architecture for smart healthcare systems. IEEE Internet Things J. 2015 , 2 , 515–526. [ Google Scholar ] [ CrossRef ]
  • Sarkar, C.; Nambi, A.U.S.N.; Prasad, R.V.; Rahim, A.; Neisse, R.; Baldini, G. Diat: A scalable distributed architecture for IoT. IEEE Internet Things J. 2014 , 2 , 230–239. [ Google Scholar ] [ CrossRef ]
  • Vucinic, M.; Tourancheau, B.; Rousseau, F.; Duda, A.; Damon, L.; Guizzetti, R. Object security architecture for the Internet of Things. Ad. Hoc. Netw. 2015 , 32 , 3–16. [ Google Scholar ] [ CrossRef ]
  • Guo, Y.; Zhu, H.; Yang, L. Service-oriented network virtualization architecture for the Internet of Things. China Commun. 2016 , 13 , 163–172. [ Google Scholar ] [ CrossRef ]
  • Hou, L.; Zhao, S.; Xiong, X.; Zheng, K.; Chatzimisios, P.; Hossain, M.S.; Xiang, W. Internet of Things cloud: Architecture and implementation. IEEE Commun. Mag. 2016 , 54 , 32–39. [ Google Scholar ] [ CrossRef ]
  • Balampanis, S.; Sotiriadis, S.; Petrakis, E.G.M. Internet of Things architecture for enhanced living environments. IEEE Cloud Comput. 2016 , 3 , 28–34. [ Google Scholar ] [ CrossRef ]
  • Da Cunha, M.S.; Almeira, M.C.; Fernandes, R.F.; Carrijo, R.S. Proposal for an IoT architecture in industrial processes. In Proceedings of the 2016 12th IEEE International Conference on Industry Applications (INDUSCON), Curitiba, PR, Brazil, 20–23 November 2016; pp. 1–7. [ Google Scholar ] [ CrossRef ]
  • Roffia, L.; Morandi, F.; Kiljander, J.; Elia, A.D.; Vergari, F.; Viola, F.; Bononi, L.; Cinotti, T.S. A semantic publish-subscribe architecture for the Internet of Things. IEEE Internet Things J. 2016 , 3 , 1274–1296. [ Google Scholar ] [ CrossRef ]
  • Beligianni, F.; Alamaniotis, M.; Fevgas, A.; Tsompanopoulou, P.; Bozanis, P.; Tsoukalas, L.H. An Internet of Things Architecture for Preserving the Privacy of Energy Consumption. In Proceedings of the Mediterranean Conference on Power Generation, Transmission, Distribution and Energy Conversion (MedPower), Belgrade, Serbia, 6–9 November 2016. [ Google Scholar ] [ CrossRef ]
  • Lloret, J.; Tomas, J.; Canovas, A.; Parra, L. An integrated IoT architecture for smart metering. IEEE Commun. Mag. 2016 , 54 , 50–57. [ Google Scholar ] [ CrossRef ]
  • Kaur, N.; Sood, S.K. An energy-efficient architecture for the Internet of Things (IoT). IEEE Syst. J. 2015 , 11 , 796–805. [ Google Scholar ] [ CrossRef ]
  • Zhu, T.; Dhelim, S.; Zhou, Z.; Yang, S.; Ning, H. An architecture for aggregating information from distributed data nodes for industrial Internet of Things. Comput. Electr. Eng. 2017 , 58 , 337–349. [ Google Scholar ] [ CrossRef ]
  • Perles, A.; Pérez-Marín, E.; Mercado, R.; Segrelles, J.D.; Blanquer, I.; Zarzo, M.; Diego, F.j.G. An energy-efficient Internet of Things (IoT) architecture for preventive conservation of cultural heritage. Future Gener. Comput. Syst. 2018 , 81 , 566–581. [ Google Scholar ] [ CrossRef ]
  • Mendoza, J.; Ordóñez, H.; Ordonez, A.; Jurado, J.L. Architecture for embedded software in microcontrollers for Internet of Things (IoT) in fog water collection. Procedia Comput. Sci. 2017 , 109 , 1092–1097. [ Google Scholar ] [ CrossRef ]
  • Manogaran, G.; Varatharajan, R.; Lopez, D.; Kumar, P.M.; Sundarasekar, R.; Thota, C. A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Gener. Comput. Syst. 2018 , 82 , 375–387. [ Google Scholar ] [ CrossRef ]
  • Pape, S.; Rannenberg, K. Applying privacy patterns to the Internet of Things (IoT) architecture. Mob. Networks Appl. 2019 , 24 , 925–933. [ Google Scholar ] [ CrossRef ]
  • Liu, C.; Chen, F.; Zhao, C.; Wang, T.; Zhang, C.; Zhang, Z. Ipv6-based architecture of community medical Internet of Things. IEEE Access 2018 , 6 , 7897–7910. [ Google Scholar ] [ CrossRef ]
  • Kumar, P.M.; Gandhi, U.D. A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases. Comput. Electr. Eng. 2018 , 65 , 222–235. [ Google Scholar ] [ CrossRef ]
  • Usamentiaga, R.; Fernandez, M.A.; Villan, F.Z.; Carus, L. Temperature monitoring for electrical substations using infrared thermography: Architecture for industrial Internet of Things. IEEE Trans. Ind. Inform. 2018 , 14 , 5667–5677. [ Google Scholar ] [ CrossRef ]
  • Moosavi, S.R.; Gia, T.N.; Rahmani, A.M.; Nigussie, E.; Virtanem, S.; Isoaho, J.; Isoaho, J.; Tenhunen, H. Sea: A secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput. Sci. 2015 , 52 , 452–459. [ Google Scholar ] [ CrossRef ]
  • Guo, H.; Ren, J.; Zhang, D.; Zhang, Y.; Hu, J. A scalable and manageable IoT architecture based on transparent computing. J. Parallel Distrib. Comput. 2018 , 118 , 5–13. [ Google Scholar ] [ CrossRef ]
  • Suarez, J.; Quevedo, J.; Vidal, I.; Corujo, D.; Reinoso, J.G.; Aguiar, R.L. A secure IoT management architecture based on information-centric networking. J. Netw. Comput. Appl. 2016 , 63 , 190–204. [ Google Scholar ] [ CrossRef ]
  • De Morais, B.; de Aquino Junior, G.S. A software reference architecture for IoT-based healthcare applications. In Proceedings of the International Conference on Computational Science and Its Applications, Melbourne, VIC, Australia, 2–5 July 2018; pp. 173–188. [ Google Scholar ] [ CrossRef ]
  • Lopes, N.; Pinto, P.; Furtado, P.; Silva, J. Iot architecture proposal for disabled people. In Proceedings of the 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Larnaca, Cyprus, 8–10 October 2014; pp. 152–158. [ Google Scholar ] [ CrossRef ]
  • Kitagami, S.; Ogino, T.; Suganuma, T.; Shiratori, N. Proposal of a multiagent-based flexible IoT edge computing architecture harmonizing its control with cloud computing. In Proceedings of the 2017 Fifth International Symposium on Computing and Networking (CANDAR), Aomori, Japan, 19–22 November 2017; p. 22. [ Google Scholar ] [ CrossRef ]
  • Loria, M.; Toja, M.; Carchiolo, V.; Malgeri, M. An efficient real-time architecture for collecting IoT data. In Proceedings of the 2017 Federated Conference on Computer Science and Information Systems (FedCSIS), Prague, Czech Republic, 3–6 September 2017; pp. 1157–1166. [ Google Scholar ] [ CrossRef ]
  • Xu, D.G.; Qin, L.H.; Park, J.H.; Zhou, J.L. Odsa: Chord-based object discovery service architecture for the Internet of Things. Wirel. Pers. Commun. 2013 , 73 , 1455–1476. [ Google Scholar ] [ CrossRef ]
  • Kim, H.; Wasicek, A.; Mehne, B.; Lee, E. A secure network architecture for the Internet of Things based on local authorization entities. In Proceedings of the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria, 22–24 August 2016; pp. 114–122. [ Google Scholar ] [ CrossRef ]
  • Sicari, S.; Cappiello, C.; De Pellegrini, F.; Miorandi, D.; Porisini, A.C. A security-and quality-aware system architecture for Internet of Things. Inf. Syst. Front. 2016 , 18 , 665–677. [ Google Scholar ] [ CrossRef ]
  • Tao, M.; Zuo, J.; Liu, Z.; Castiglione, A.; Palmieri, F. Multilayer cloud architectural model and ontology-based security service framework for IoT-based smart homes. Future Gener. Comput. Syst. 2018 , 78 , 1040–1051. [ Google Scholar ] [ CrossRef ]
  • Hu, P.; Ning, H.; Chen, L.; Daneshmand, M. An Open Internet of Things System Architecture Based on Software-Defined Device. IEEE Internet Things J. 2018 , 6 , 2583–2592. [ Google Scholar ] [ CrossRef ]
  • Mecibah, R.; Djamaa, B.; Yachir, A.; Aissani, M. A scalable semantic resource discovery architecture for the Internet of Things. In Proceedings of the International Conference on Computer Science and Its Applications, Algiers, Algeria, 24–25 April 2018; pp. 37–47. [ Google Scholar ] [ CrossRef ]
  • Mainetti, L.; Mighali, V.; Patrono, L.; Rametta, P. A novel rule-based semantic architecture for IoT building automation systems. In Proceedings of the 2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 16–18 September 2015; pp. 124–131. [ Google Scholar ] [ CrossRef ]
  • Tomovic, S.; Yoshigoe, K.; Maljevic, I.; Radusinovic, I. Software-defined fog network architecture for IoT. Wirel. Pers. Commun. 2017 , 92 , 181–196. [ Google Scholar ] [ CrossRef ]
  • Lunardi, R.; Michelin, R.; Neu, C.V.; Zorzo, A.F. Distributed access control on IoT ledger-based architecture. In Proceedings of the NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, 23–27 April 2018; pp. 1–7. [ Google Scholar ] [ CrossRef ]
  • Sicari, S.; Rizzardi, A.; Miorandi, D.; Cappiello, C.; Porsini, A.C. A secure and quality-aware prototypical architecture for the Internet of Things. Inf. Syst. 2016 , 58 , 43–55. [ Google Scholar ] [ CrossRef ]
  • Shanbhag, R.; Shankarmani, R. Architecture for Internet of Things to minimize human intervention. In Proceedings of the 2015 International Conference on Advances in Computing, Communications, and Informatics (ICACCI), Kochi, India, 10–13 August 2015; pp. 2348–2353. [ Google Scholar ] [ CrossRef ]
  • Din, S.; Ghayvat, H.; Paul, A.; Ahmad, A.; Rathore, M.; Shafi, I. An architecture to analyze big data on the Internet of Things. In Proceedings of the 2015 9th International Conference on Sensing Technology (ICST), Auckland, New Zealand, 8–10 December 2015; pp. 677–682. [ Google Scholar ] [ CrossRef ]
  • Khan, W.Z.; Aalsalem, M.Y.; Khan, M.K.; Hossain, M.S.; Atiuzzaman, M. A reliable Internet of Things-based architecture for oil and gas industry. In Proceedings of the 2017 19th International Conference on Advanced Communication Technology (ICACT), PyeongChang, Republic of Korea, 19–22 February 2017; pp. 705–710. [ Google Scholar ] [ CrossRef ]
  • Javed, A.; Heljanko, K.; Buda, A.; Framling, K. Cefiot: A fault-tolerant IoT architecture for edge and cloud. In Proceedings of the 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 5–8 February 2018; pp. 813–818. [ Google Scholar ] [ CrossRef ]
  • Xu, Y.; Helal, A. Scalable cloud-sensor architecture for the Internet of Things. IEEE Internet Things J. 2015 , 3 , 285–298. [ Google Scholar ] [ CrossRef ]
  • Wang, K.; Wang, Y.; Sun, Y.; Guo, S.; Wu, J. Green industrial Internet of Things architecture: An energy-efficient perspective. IEEE Commun. Mag. 2016 , 54 , 48–54. [ Google Scholar ] [ CrossRef ]
  • Iqbal, J.; Khan, M.; Talha, M.; Farman, H.; Jan, B.; Muhammad, A.; Khattak, H.A. A generic Internet of Things architecture for controlling electrical energy consumption in smart homes. Sustain. Cities Soc. 2018 , 43 , 443–450. [ Google Scholar ] [ CrossRef ]
  • Ma, M.; Shi, G.; Li, F. Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario. IEEE Access 2019 , 7 , 34045–34059. [ Google Scholar ] [ CrossRef ]
  • Luo, J.; Yin, L.; Hu, J.; Wang, C.; Liu, X.; Fan, X.; Luo, H. Container-based fog computing architecture and energy-balancing scheduling algorithm for energy IoT. Future Gener. Comput. Syst. 2019 , 97 , 50–60. [ Google Scholar ] [ CrossRef ]
  • Marques, P.; Manfroi, D.; Deitos, E.; Cegoni, J.; Castilhos, R.; Rochol, J.; Pignaton, E.; Kunst, R. An IoT-based smart cities infrastructure architecture applied to a waste management scenario. Ad. Hoc. Netw. 2019 , 87 , 200–208. [ Google Scholar ] [ CrossRef ]
  • Tiburski, R.T.; Moratelli, C.R.; Johann, S.F.; Neves, M.V.; De Matos, E.; Amaral, L.A.; Hessel, F. Lightweight security architecture based on embedded virtualization and trust mechanisms for IoT edge devices. IEEE Commun. Mag. 2019 , 57 , 67–73. [ Google Scholar ] [ CrossRef ]
  • Zarca, A.M.; Bernabe, J.B.; Trapero, R.; Rivera, D.; Villalabos, J.; Skarmeta, A.; Bianchi, S.; Zafeiropoulos, A.; Gouvas, P. Security Management Architecture for NFV/SDN-Aware IoT Systems. IEEE Internet Things J. 2019 , 6 , 8005–8020. [ Google Scholar ] [ CrossRef ]
  • Urbina, M.; Acosta, T.; Lázaro, J.; Astarloa, A.; Bidarte, U. Smart Sensor: SoC Architecture for the Industrial Internet of Things. IEEE Internet Things J. 2019 , 6 , 6567–6577. [ Google Scholar ] [ CrossRef ]
  • Chekired, D.A.; Khoukhi, L. Multi-tier fog architecture: A new delay-tolerant network for IoT data processing. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Sun, Y.; Qiao, X.; Cheng, B.; Chen, J. A low-delay, lightweight publish/subscribe architecture for delay-sensitive IoT services. In Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, 28 June–3 July 2013; pp. 179–186. [ Google Scholar ] [ CrossRef ]
  • Pérez, S.; Garcia-Carrillo, D.; Marín-López, R.; Ramos, J.L.H.; Perez, R.M.; Skarmeta, A.F. Architecture of security association establishment based on boot-strapping technologies for enabling secure IoT infrastructures. Future Gener. Comput. Syst. 2019 , 95 , 570–585. [ Google Scholar ] [ CrossRef ]
  • Tekeste, T.; Saleh, H.; Mohammad, B.; Ismail, M. Ultra-low power qrs detection and ECG compression architecture for IoT healthcare devices. IEEE Trans. Circuits Syst. I Regul. Pap. 2018 , 66 , 669–679. [ Google Scholar ] [ CrossRef ]
  • Malche, T.; Maheshwary, P.; Kumar, R. Environmental monitoring system for smart city based on secure Internet of Things (IoT) architecture. Wirel. Pers. Commun. 2019 , 107 , 2143–2172. [ Google Scholar ] [ CrossRef ]
  • Dang-Ha, T.H.; Roverso, D.; Olsson, R. Graph of virtual actors (gova): A big data analytics architecture for IoT. In Proceedings of the 2017 IEEE International Conference on Big Data and Smart Computing (BigComp), Jeju, Republic of Korea, 13–16 February 2017; pp. 162–169. [ Google Scholar ]
  • Ahad, M.A.; Biswas, R. Request-based, secured, and energy-efficient (rbsee) architecture for handling IoT big data. J. Inf. Sci. 2019 , 45 , 227–238. [ Google Scholar ] [ CrossRef ]
  • Wang, X. The architecture design of the wearable health monitoring system based on Internet of Things technology. Int. J. Grid Util. Comput. 2015 , 6 , 207–212. [ Google Scholar ] [ CrossRef ]
  • Darabseh, A.; Freris, N.M. A software-defined architecture for control of IoT cyber-physical systems. arXiv 2018 , arXiv:1810.03822. [ Google Scholar ]
  • Almajali, S.; Abou-Tair, D.D.I.; Salameh, H.B.; Ayyash, M.; Elgala, H. A distributed multi-layer mec-cloud architecture for processing large-scale IoT-based multimedia applications. Multimed. Tools Appl. 2019 , 78 , 24617–24638. [ Google Scholar ] [ CrossRef ]
  • Rocha, V.; Brandão, A.F. A scalable multiagent architecture for monitoring IoT devices. J. Netw. Comput. Appl. 2019 , 139 , 1–14. [ Google Scholar ] [ CrossRef ]
  • Pillai, A.S.; Chandraprasad, G.S.; Khwaja, A.S.; Anpalagan, A. A service-oriented IoT architecture for disaster preparedness and forecasting system. Internet Things 2019 , 14 , 100076. [ Google Scholar ] [ CrossRef ]
  • Gopikrishnan, S.; Priakanth, P.; Awangga, R.M. Hsir: Hybrid architecture for sensor identification and registration for IoT applications. J. Supercomput. 2019 , 75 , 5000–5018. [ Google Scholar ] [ CrossRef ]
  • Naranjo, P.G.V.; Pooranian, Z.; Shojafar, M.; Conti, M.; Buyya, R. FOCAN: A Fog-supported smart city network architecture for the management of applications on the Internet of Everything environments. J. Parallel Distrib. Comput. 2019 , 132 , 274–283. [ Google Scholar ] [ CrossRef ]
  • Maktoubian, J.; Ansari, K. An IoT architecture for preventive maintenance of medical devices in healthcare organizations. Health Technol. 2019 , 9 , 233–243. [ Google Scholar ] [ CrossRef ]
  • Naranjo, P.; Baccarelli, E.; Scarpiniti, M. Design and energy-efficient resource management of virtualized networked fog architectures for the real-time support of IoT applications. J. Supercomput. 2018 , 74 , 2470–2507. [ Google Scholar ] [ CrossRef ]
  • Aravind, M.; Wiklander, G.; Palmheden, J.; Dobrin, R. An event-based messaging architecture for vehicular Internet of Things (IoT) platforms. In Proceedings of the International Conference on ICT Innovations, Skopje, Macedonia, 18–23 September 2017; pp. 37–46. [ Google Scholar ]
  • Ibrahim, H.; Mostafa, N.; Halawa, H.; Elsalamouny, M.; Daoud, R.; Amer, H.; Adel, Y.; Shaarawi, A.; Khattab, A.; ElSayed, H. A layered IoT architecture for greenhouse monitoring and remote control. SN Appl. Sci. 2019 , 1 , 223. [ Google Scholar ] [ CrossRef ]
  • Lomotey, R.K.; Pry, J.C.; Chai, C. Traceability and visual analytics for the Internet-of-Things (IoT) architecture. World Wide Web 2018 , 21 , 7–32. [ Google Scholar ] [ CrossRef ]
  • Mesmoudi, Y.; Lamnaour, M.; El Khamlichi, Y.; Tahiri, A.; Touhafi, A.; Braeken, A. A Middleware based on Service Oriented Architecture for Heterogeneity Issues within the Internet of Things (MSOAH-IoT). J. King Saud Univ.-Comput. Inf. Sci. 2018 , 32 , 1108–1116. [ Google Scholar ] [ CrossRef ]
  • Almeida, R.B.; Junes, V.R.C.; Machado, R.S.; da Rosa, D.Y.L.; Donato, L.M.; Yamin, A.C.; Pernas, A.M. A distributed event-driven architectural model based on situational awareness applied on Internet of Things. Inf. Soft. Technol. 2019 , 111 , 144–158. [ Google Scholar ] [ CrossRef ]
  • Valecce, G.; Strazzella, S.; Radesca, A.; Grieco, L.A. Solarfertigation: Internet of Things architecture for smart agriculture. In Proceedings of the 2019 IEEE International Conference on Communications Workshops (ICC Workshops), Shanghai, China, 20–24 May 2019; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Lee, S.H.; Huang, K.W.; Yang, C.S. TBAS: Token-based authorization service architecture in Internet of Things scenarios. Int. J. Distrib. Sens. Netw. 2017 , 13 , 1–14. [ Google Scholar ] [ CrossRef ]
  • Mourdı, Y.; Sadgal, M.; Berrada Fathı, W.; El Kabtane, H. A Machine Learning Based Approach to Enhance MOOC Users’ Classification. Turk. Online J. Distance Educ. 2020 , 21 , 47–68. [ Google Scholar ] [ CrossRef ]
  • Indrakumari, R.; Poongodi, T.; Suresh, P.; Balamurugan, B. The growing role of the Internet of Things in healthcare wearables. In Emergence of Pharmaceutical Industry Growth with Industrial IoT Approach ; Academic Press: Cambridge, MA, USA, 2020; pp. 163–194. [ Google Scholar ] [ CrossRef ]
  • Athul, J. Smart retail 4.0 IoT consumer retailer model for retail intelligence and strategic marketing of in-store products. In Proceedings of the 17th International Business Horizon-INBUSH ERA-2017, Noida, India, 8–10 February 2017. [ Google Scholar ]
  • Liao, S.-H.; Yang, L.L. Mobile payment and online to offline retail business models. J. Retail. Consum. Serv. 2020 , 57 , 102230. [ Google Scholar ] [ CrossRef ]
  • Benomar, Z.; Longo, F.; Merlino, G.; Puliafito, A. Cloud-based Network Virtualization in IoT with OpenStack. ACM Trans. Internet Technol. 2021 , 22 , 1–26. [ Google Scholar ] [ CrossRef ]
  • Benomar, Z.; Longo, F.; Merlino, G.; Puliafito, A.A. Cloud-Based and Dynamic DNS Approach to Enable the Web of Things. IEEE Trans. Netw. Sci. Eng. 2021 , 9 , 3968–3978. [ Google Scholar ] [ CrossRef ]

Click here to enlarge figure

DatabaseURL Address
ScienceDirect
Taylor & Francis
IEEE Xplore
Springer
Wiley
InderScience
Sage
JSTOR
Search Statement
Internet of Things
IoT
“Internet of Things” or “IoT”
(“Internet of Things” or “IoT”) and not an “inductive output tube”
(“Internet of Things” or “IoT”) and “challenges”
(“Internet of Things” or “IoT”) and “trends”
(“Internet of Things” or “IoT”) and “technologies”
(“Internet of Things” or “IoT”) and “applications”
(“Internet of Things” or “IoT”) and “Security and Privacy”
PublicationsThematicTechnologies and ParadigmsAdvantages and Drawbacks
MQ [ ]White papers platformLiterature and tutorialsA guide to concise information on IoT advances
Kiljander et al. [ ]ImplementationProgramming language: Python
Operating system: Linux (Ubuntu) Technologies: OSGi, Apache Jena, VirtualBox
An interoperable and incorporated system for pervasive computing, without scalability.
Cirani et al. [ ]SimulationProgramming language: Java Operating system: Contiki, Linux (Ubuntu)
Simulation tools: Cooja
Self-configuration and service discovery, without
traffic efficiency statistics.
Tracey et al. [ ]ImplementationProgramming language: C and Java
Operating system: Linux and Contiki
Technologies: Hadoop HBase
The proposition considered mixed resource devices, but without presenting fault tolerance or self-management strategies.
Catarinucci et al. [ ]Case study: Smart healthProgramming language: Java
Operating system: Contiki Technologies: MySQL.
Improvement of traffic overhead and interoperability, without addressing the data issues in smart health.
Sarkar et al. [ ]Case study Simulation tools: SecKit Interoperability without efficiency statistics.
Vucinic et al. [ ]SimulationOperating system: Contiki Simulation tools: Cooja, MSPsimImprovement of security, latency, and optimization of energy consumption
Guo et al. [ ]Case study: Smart campus (Nanjing University)_Services semantic description without any evaluation results.
Hou et al. [ ]ImplementationTechnologies: Redis, Node.jsImprovement of system performance, without addressing security and privacy issues
Balampanis et al. [ ]Case study: Health monitoringTechnologies: Firmware, OpenStack cloud system Improvement of the flexibility
Without considering network performance as well as the accuracy of collected data.
Da Cunha et al. [ ] Case study: Industrial environmentsTechnologies: Mosquito An architecture for IIoT to reduce development time.
Roffia et al. [ ]Case study: Public lighting systemlanguage: SPARQL
Operating system: Linux (Ubuntu)
Technologies: Smart-M3 Query
Event detection algorithm without considering eminent protocols (i.e., HTTP, MQTT, 6LoWPAN, and CoAP).
Beligianni et al. [ ]Case study: Smart metering___ Study of smart metering considering privacy concerns.
Lloret et al. [ ]study: Smart meteringTechnologies: Spark, MLib Case The study considered big data and knowledge extraction.
Kaur et al. [ ]Case study: University campusProgramming language: JavaScript
Technologies: EC2, EMR, Hadoop clusters
Privacy concerns are considered.
Zhu et al. [ ]Case study: Product tracing systemSemantic language: Semantic Web Rule Language The study considered the availability and heterogeneity of information.
Perles et al. [ ]Case study: Cultural heritage monitoringTechnologies: Docker, Docker Swarm, MongoDB, SPARK cluster.Specific architecture for monitoring.
Mendoza et al. [ ]Case study: Fog water collectionProgramming language: C++
Development platform: MediaTek LinkIt ONE
Ensuring the quality attributes during the design phase.
Manogaran et al. [ ]Case study: Health monitoring systemDataset: Cleveland heart disease DB
Technologies: Amazon KMS, Apache HBase, Amazon CloudTrail, EBS, EMR, Pig, S3
Addressing data management issues in healthcare applications.
Pape et al. [ ]Case study: Smart vehicles___Addressing privacy concerns.
Liu et al. [ ]Case study: healthcare systemTechnologies: MySQL Modeling environment: Ptolemy II Addressing the interconnection in a heterogeneous network.
Kumar et al. [ ]Case study: Health monitoring systemProgramming language: Java
Technologies: Hbase, HDFS, EMR, mahout, Pig, S3
Dataset: Heart Disease
Management issues in Big data are addressed without considering the energy efficiency, security, and privacy issues.
Usamentiaga et al. [ ]Case study: Temperature monitoringProgramming language: Python and C++
Technologies: Kafka, Docker
The approach addressed data management issues.
Moosavi et al. [ ]Case study: Health monitoring systemOperating system: Ubuntu
Technologies: MySQL
Management of authentication and authorizations for resource-controlled devices.
Guo et al. [ ]ImplementationOperating system: MetaOS, OpenWrt, CentOAddressing scalability, heterogeneity, and resource management.
Suarez et al. [ ]Simulation and implementationProgramming language: Java
Simulation tools: NS-3
Studying interoperation, energy efficiency, and security.
De Morais et al. [ ]Case study: Health monitoring system__ Addressing security and privacy issues.
Lopes et al. [ ]Case study: Healthcare monitoring for disabled people__Addressing data volume as well as heterogeneity.
Kitagami et al. [ ]Case study: Energy management system__Decreasing the communication and improving the load between edge servers and the cloud.
Loria et al. [ ]Use case: Back-end of “SeeYourBox” servicesProgramming language: Python
Technologies: Radis, AWS IoT
Studying the scalability without evaluation results.
Xu et al. [ ]Theoretical analysis and simulationProgramming language: C++
Simulation tools: P2PSim
Addressing load balancing and scalability concerns.
Kim et al. [ ]ImplementationProgramming language: JavaScript
Technologies: Node.JS, Mosquitto
A lightweight and security approach.
Sicari et al. [ ]ImplementationTechnologies: MongoDB2, Mosquitto, Node.jsTackling security and heterogeneity issues.
Tao et al. [ ]Case study: Smart homeSemantic language: Semantic Web Rule Language
Operating system: Ubuntu
Technologies: EC2, KVM, OpenStack, VMware vCenter, VMware vSphere
Ensuring interoperability, and security.
Hu et al. [ ]Case study: Smart health care__ Enhancing device discovery services.
Mecibah et al. [ ]SimulationProgramming language: MatlabEnsuring effective resource exploration in the IoT ecosystem.
Mainetti et al. [ ]SimulationProgramming language: Java
Technologies: OSGi Semantic language: Semantic Web Rule Language
Dealing with the heterogeneity of data.
Tomovic et al. [ ]Case study__ Increasing resource management in a mixed IoT ecosystem (video surveillance, transportation, precision agriculture)
Lunardi et al. [ ]Case study: Smart buildingsOperating system: Linux (Ubuntu) Ensuring access management.
Sicari et al. [ ]Case study: Smart retailing experience__ Enhancing reliability, data quality, security, and privacy.
Shanbhag et al. [ ]Case study: Smart officeTechnologies: MySQL, PHP, RESTful API Minimizing human intervention.
Din et al. [ ]Health monitoring system (case study)Technologies: Hadoop Dataset: mHealth dataset Developing the processing time, but with questionable flexibility.
Khan et al. [ ]Case study: IIoT__ Reducing human intervention
Javed et al. [ ]Case study: Surveillance camera systemOperating system: Linux Technologies: Docker, Kubernetes, Kafka Supplying fault-tolerant architectures.
Not considering the scalability.
Xu et al. [ ]Case study: Smart homeDataset: PLCouple1
Technologies: Amazon CloudWatch, EC2, OSGi
Addressing heterogeneity without much interest in scalability and energy efficiency.
Wang et al. [ ]Case study: IIoTTechnologies: RESTful service Enhancement of resource use.
Iqbal et al. [ ]Case study: Smart homeOperating system: Linux, Windows server 2008 Technologies: Hadoop, SPARK Enhancement of resource use.
Ma et al. [ ]SimulationEvaluation: Simulation Simulation tools: OMNeT++Ensuring lightweight security considering malicious node blocking mechanism.
Luo et al. [ ]ImplementationTechnologies: Docker, KVM, Libvirt, MySQL, RedisEnsuring an energy-aware algorithm.
Marques et al. [ ]Case study: Intelligent waste managementTechnologies: Mosquitto Application protocols regarding latency, power consumption, throughput, and concurrent users.
Tiburski et al. [ ]ImplementationProgramming language: C
Technologies: Hellfire Hypervisor
Ensuring integrity, confidentiality, and availability, without addressing privacy issues.
Zarca et al. [ ]Case study: Building management systemProgramming language: Python
Technologies: MySQL, RabbitMQ, Storm, Kafka Simulation tools: Cooja
Ensuring higher scalability as well as minimizing human intervention.
Urbina et al. [ ]ImplementationProgramming language: Python and JAVA Operating system: Linaro Establishing real-time event processing with high availability.
Chekired et al. [ ]SimulationProgramming language: MATLAB
Simulation tools: NS-2
Tackling the workload offloading.
Sun et al. [ ]Case study: Production systemProgramming language: C++
Technologies: RESTful web services
Simulation tools: OverSim and OMNeT++
Ensuring low latency, but
without the possibility of use for precise tasks in extensive systems.
Pérez et al. [ ]Case study: Building automationTechnologies: ProVerif Simulation tools: Cooja Addressing end-to-end security with credential institutions for constrained devices.
Tekeste et al. [ ]Case Study: Health monitoring systemDataset: Physio net
Programming language: Verilog-RTL
Ensuring scalability based on lossless data compression technique.
Malche et al. [ ]Case study: Environmental monitoringProgramming language: Python
Technologies: Mosquito, MongoDB
Forbidding unauthorized access to sensors.
Dang-Ha et al. [ ]Implementation__Using graph database
Ahad MA et al. [ ]Implementation__Optimizing energy consumption without any efficiency statistics.
Wang et al. [ ]Case study: Health monitoring system__Introducing requirement assessment for communication technologies.
Darabseh et al. [ ]SimulationProgramming languages: Python
Technologies: virtual box
Addressing extendibility issues and security analysis for cyber-physical systems.
Almajali et al. [ ]Case study: Car tracking applicationProgramming languages: Java, C#, ASP.Net
Technologies: Microsoft IIS Simulation tools: CloudSim
Addressing efficiency as well as heterogeneity.
Rocha et al. [ ]SimulationProgramming languages: Java
Simulation tools: PeerSim
Addressing scalability without energy consumption evaluation.
Pillai et al. [ ]ImplementationProgramming languages: Java and Javascript
Technologies: Amazon ML, AWS Data Pipeline, AWS IoT, DynamoDB
Ensuring data management combined with data availability.
Gopikrishnan et al. [ ]implementationProgramming languages: Java
Technologies: Mosquitto Simulation tools: Cooja
Addressing confidentiality, registration, traffic, and energy consumption issues.
Naranjo et al. [ ]Case study: Smart cityProgramming languages: Java
Simulation tools: iFogSim
Enhancing efficiency regarding data heterogeneity for better communication technologies.
Maktoubian et al. [ ]Case study: Health monitoring__ Considering the monitoring and maintenance.
Naranjo et al. [ ]SimulationProgramming languages: Java
Technologies: Docker Simulation tools: iFogSim
Addressing energy consumption and latency.
Aravind et al. [ ]Case study: Smart vehiclesSimulation tools: self-developed Decreasing data transmission and increasing the effectiveness regarding the processing time and network bandwidth.
Ibrahim et al. [ ]Case study: Greenhouse monitoringSimulation tools: Riverbed Modeler Addressing real-time feedback, self-organized networks, data management, and latency.
Lomotey et al. [ ]ImplementationTechnologies: CouchDB, EC2Addressing data traceability and integrity.
Mesmoudi et al. [ ]Case study: Smart homeProgramming language: Java
Technologies: TomCat, SQLite
Tackling heterogeneity issues and introducing an SOA-based middleware.
Almeida et al. [ ]ImplementationProgramming language: Python, JavaScript Operating system: Linux (Debian) Technologies: Hadoop, Docker, Redis, MySQL Considering flexibility and heterogeneity.
Valecce et al. [ ]Case study: Smart agricultureProgramming language: Typescript
Technologies: ActiveMQ, MongoDB, SQLite, Heroku Platform, AWS IoT
Introducing an automation and monitoring architecture for smart agriculture.
Lee et al. [ ]Case study: Health monitoringOperating system: Linux Technologies: Apache HTTP Server, Postgresql Introducing a token-based approach.
Mourdi et al. [ ]Remote learning systemProgramming language: PythonIntroducing a novel remote leaning platform
Indrakumari et al. [ ]Academic study___Study the growing need for heath wearables
Athul et al. [ ]Case study retailsProgramming language: PythonIntroducing retailer and customer models
Shu-Hsien [ ]Case study Mobile payment __ State of art of existing business models
Classes Technologies
Message queuing systemsRabbitMQ, Apache Kafka, Mosquitto, Celery, ActiveMQ, MongoDB, Apache HBase, Redis, DynamoDB, CouchDB, SQLite, PostgreSQL, Amazon web services, Amazon EMR, Amazon EC2, Amazon S3, Amazon EBS, Amazon CloudWatch, Amazon CloudTrail, Amazon KMS, Amazon SNS, AWS IoT, AWS data pipeline, AWS ML, Apache Hadoop, Apache Mahout, Apache Pig, Apache Spark, Apache Storm, Apache Jena, Apache HTTP server, Apache Tomcat, Microsoft IIS, OpenStack, FIWARE, KeyRock, Google Cloud Messaging, Heroku Platform, Open Service Gateway Initiative, Docker, Docker Swarm, Kubernetes, etc.
DatabasePostgreSQL, SQLite, CouchDB, DynamoDB, MySQL, HBase, MongoDB, Redis, etc.
Cloud frameworks, platforms, and servicesApache Spark, Apache Hadoop, Apache Pig, Apache Mahout, Apache Storm, Apache TomCat, Apache HTTP server, Apache Jena, AWS KMS, AWS cloud trail, Amazon EBS, Amazon EC2, Amazon S3, Amazon ML, AWS Data Pipeline, Amazon EMR, Amazon CloudWatch, Amazon SNS, Microsoft ITS web platforms, Fiware, OpenStack, Google Cloud Message, Heroku Platform, etc.
Containers and service platformDocker swarm, Kubemetes, Docker, OSGi, etc.
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

Allioui, H.; Mourdi, Y. Exploring the Full Potentials of IoT for Better Financial Growth and Stability: A Comprehensive Survey. Sensors 2023 , 23 , 8015. https://doi.org/10.3390/s23198015

Allioui H, Mourdi Y. Exploring the Full Potentials of IoT for Better Financial Growth and Stability: A Comprehensive Survey. Sensors . 2023; 23(19):8015. https://doi.org/10.3390/s23198015

Allioui, Hanane, and Youssef Mourdi. 2023. "Exploring the Full Potentials of IoT for Better Financial Growth and Stability: A Comprehensive Survey" Sensors 23, no. 19: 8015. https://doi.org/10.3390/s23198015

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Internet of Things - Open Access Research

Articles, call for papers, journals and more on iot.

Internet of Things - Open Access Research - SpringerOp © © wladimir1804 / Getty Images / iStock

Take a look at our open access journals covering the Internet of Things, browse selected freely available research and submit your IoT manuscript to our SpringerOpen journals. 

Selected IoT Article Collections

Research and Challenges of Wireless Networks in Internet of Things

Research and Challenges of Wireless Networks in Internet of Things

Published in EURASIP Journal on Wireless Communications and Networking

Recent Advances in Internet of Things Security and Privacy

Recent Advances in Internet of Things Security and Privacy

Published in EURASIP Journal on Wireless Communications and Networking.

Internet of Things Article Highlights

This paper presents a detailed overview of recent works carried out in the field of smart water quality monitoring. Also, a power efficient, simpler solution for in-pipe water quality monitoring based on Internet of Things technology is presented

To allow doctors to monitor the physical parameters of the patient’s body in real time and to understand the changes in the patient’s condition in time, the medical remote monitoring system based on the Internet of Things was studied


New algorithms and architectures in the context of 5G shall be explored to ensure the efficiency, robustness, and consistency in variable application environments


With the evolving Internet of Things, location-based services have recently become very popular. For modern wireless sensor networks (WSNs), ubiquitous positioning is elementary


The Internet of Things (IoT) is an interconnected network of objects which range from simple sensors to smartphones and tablets


The fifth generation (5G) of cellular networks will bring 10 Gb/s user speeds, 1000-fold increase in system capacity, and 100 times higher connection density. In response to these requirements, the 5G networks will incorporate technologies

The Internet of Things (IoT) is expected to interconnect objects using both existing communication technologies and new emerging technologies

The Internet of Things is a paradigm in which everyday items are connected to the internet and share information with other devices. This new paradigm also means that criminals and terrorists would be able to influence the physical world from the comfort of their homes

Wireless communication plays a critical role in determining the lifetime of Internet-of-Things (IoT) systems. In this paper, Hitch Hiker 2.0, a component binding model that provides support for multi-hop data aggregation is proposed

Read more open access articles here

Featured Open Access Journals covering IoT

Smart Water - SpringerOpen

        

EURASIP Journal on Advances in Signal Processing - SpringerOpen

                         

Human-centric Computing and Information Sciences - SpringerOpen

         

EURASIP Journal on Wireless Communications and Networking - SpringerOpen

    

Find more open access journals here

Submit your IoT manuscript

Submit your IoT manuscript

Are you looking for a journal to submit your own Internet of Things research to? Read our tips on how to find the right journal here: 

Register with us and stay up to date

Register - SpringerOpen

As a registered user you can:

•  Add article alerts from all SpringerOpen journals

•  Easily manage your article alerts

•  Receive regular news from your preferred subject areas

arXiv's Accessibility Forum starts next month!

Help | Advanced Search

Computer Science > Artificial Intelligence

Title: automated design of agentic systems.

Abstract: Researchers are investing substantial effort in developing powerful general-purpose agents, wherein Foundation Models are used as modules within agentic systems (e.g. Chain-of-Thought, Self-Reflection, Toolformer). However, the history of machine learning teaches us that hand-designed solutions are eventually replaced by learned solutions. We formulate a new research area, Automated Design of Agentic Systems (ADAS), which aims to automatically create powerful agentic system designs, including inventing novel building blocks and/or combining them in new ways. We further demonstrate that there is an unexplored yet promising approach within ADAS where agents can be defined in code and new agents can be automatically discovered by a meta agent programming ever better ones in code. Given that programming languages are Turing Complete, this approach theoretically enables the learning of any possible agentic system: including novel prompts, tool use, control flows, and combinations thereof. We present a simple yet effective algorithm named Meta Agent Search to demonstrate this idea, where a meta agent iteratively programs interesting new agents based on an ever-growing archive of previous discoveries. Through extensive experiments across multiple domains including coding, science, and math, we show that our algorithm can progressively invent agents with novel designs that greatly outperform state-of-the-art hand-designed agents. Importantly, we consistently observe the surprising result that agents invented by Meta Agent Search maintain superior performance even when transferred across domains and models, demonstrating their robustness and generality. Provided we develop it safely, our work illustrates the potential of an exciting new research direction toward automatically designing ever-more powerful agentic systems to benefit humanity.
Comments: Website:
Subjects: Artificial Intelligence (cs.AI)
Cite as: [cs.AI]
  (or [cs.AI] for this version)
  Focus to learn more arXiv-issued DOI via DataCite

Submission history

Access paper:.

  • Other Formats

license icon

References & Citations

  • Google Scholar
  • Semantic Scholar

BibTeX formatted citation

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

research papers on iot pdf

Online Students

For All Online Programs

International Students

On Campus, need or have Visa

Campus Students

For All Campus Programs

Academic Referencing: How to Cite a Research Paper

A student holding a stack of books in a library working on academic referencing for their research paper.

Learning how to conduct accurate, discipline-specific academic research can feel daunting at first. But, with a solid understanding of the reasoning behind why we use academic citations coupled with knowledge of the basics, you’ll learn how to cite sources with accuracy and confidence.

Amanda Girard, a research support manager of Shapiro Library at SNHU.

When it comes to academic research, citing sources correctly is arguably as important as the research itself. "Your instructors are expecting your work to adhere to these professional standards," said Amanda Girard , research support manager of Shapiro Library at Southern New Hampshire University (SNHU).

With Shapiro Library for the past three years, Girard manages the library’s research support services, which includes SNHU’s 24/7 library chat and email support. She holds an undergraduate degree in professional writing and a graduate degree in library and information science. She said that accurate citations show that you have done your research on a topic and are knowledgeable about current ideas from those actively working in the field.

In other words, when you cite sources according to the academic style of your discipline, you’re giving credit where credit is due.

Why Cite Sources?

Citing sources properly ensures you’re following high academic and professional standards for integrity and ethics.

Shannon Geary '16, a peer tutor at SNHU.

“When you cite a source, you can ethically use others’ research. If you are not adequately citing the information you claim in your work, it would be considered plagiarism ,” said Shannon Geary '16 , peer tutor at SNHU.

Geary has an undergraduate degree in communication  from SNHU and has served on the academic support team for close to 2 years. Her job includes helping students learn how to conduct research  and write academically.

“In academic writing, it is crucial to state where you are receiving your information from,” she said. “Citing your sources ensures that you are following academic integrity standards.”

According to Geary and Girard, several key reasons for citing sources are:

  • Access. Citing sources points readers to original sources. If anyone wants to read more on your topic, they can use your citations as a roadmap to access the original sources.
  • Attribution. Crediting the original authors, researchers and experts  shows that you’re knowledgeable about current ideas from those actively working in the field and adhering to high ethical standards, said Girard.
  • Clarity. “By citing your sources correctly, your reader can follow along with your research,” Girard said.
  • Consistency. Adhering to a citation style provides a framework for presenting ideas within similar academic fields. “Consistent formatting makes accessing, understanding and evaluating an author's findings easier for others in related fields of study,” Geary said.
  • Credibility. Proper citation not only builds a writer's authority but also ensures the reliability of the work, according to Geary.

Ultimately, citing sources is a formalized way for you to share ideas as part of a bigger conversation among others in your field. It’s a way to build off of and reference one another’s ideas, Girard said.

How Do You Cite an Academic Research Paper?

A blue icon of a person working at a desk

Any time you use an original quote or paraphrase someone else’s ideas, you need to cite that material, according to Geary.

“The only time we do not need to cite is when presenting an original thought or general knowledge,” she said.

While the specific format for citing sources can vary based on the style used, several key elements are always included, according to Girard. Those are:

  • Title of source
  • Type of source, such as a journal, book, website or periodical

By giving credit to the authors, researchers and experts you cite, you’re building credibility. You’re showing that your argument is built on solid research.

“Proper citation not only builds a writer's authority but also ensures the reliability of the work,” Geary said. “Properly formatted citations are a roadmap for instructors and other readers to verify the information we present in our work.”

Common Citation Styles in Academic Research

Certain disciplines adhere to specific citation standards because different disciplines prioritize certain information and research styles . The most common citation styles used in academic research, according to Geary, are:

  • American Psychological Association, known as APA . This style is standard in the social sciences such as psychology, education and communication. “In these fields, research happens rapidly, which makes it exceptionally important to use current research,” Geary said.
  • Modern Language Association, known as MLA . This style is typically used in literature and humanities because of the emphasis on literature analysis. “When citing in MLA, there is an emphasis on the author and page number, allowing the audience to locate the original text that is being analyzed easily,” Geary said.
  • Chicago Manual of Style, known as Chicago . This style is typically used in history, business and sometimes humanities. “(Chicago) offers flexibility because of the use of footnotes, which can be seen as less distracting than an in-text citation,” Geary said.

The benefit of using the same format as other researchers within a discipline is that the framework of presenting ideas allows you to “speak the same language,” according to Girard.

APA Citation for College: A Brief Overview

APA Citation for College: A Brief Overview

Are you writing a paper that needs to use APA citation, but don’t know what that means? No worries. You’ve come to the right place.

How to Use MLA Formatting: A Brief Overview

How to Use MLA Formatting: A Brief Overview

Are you writing a paper for which you need to know how to use MLA formatting, but don’t know what that means? No worries. You’ve come to the right place.

How to Ensure Proper Citations

Keeping track of your research as you go is one of the best ways to ensure you’re citing appropriately and correctly based on the style that your academic discipline uses.

“Through careful citation, authors ensure their audience can distinguish between borrowed material and original thoughts, safeguarding their academic reputation and following academic honesty policies,” Geary said.

Some tips that she and Girard shared to ensure you’re citing sources correctly include:

  • Keep track of sources as you work. Writers should keep track of their sources every time an idea is not theirs, according to Geary. “You don’t want to find the perfect research study and misplace its source information, meaning you’d have to omit it from your paper,” she said.
  • Practice. Even experienced writers need to check their citations before submitting their work. “Citing requires us to pay close attention to detail, so always start your citation process early and go slow to ensure you don’t make mistakes,” said Geary. In time, citing sources properly becomes faster and easier.
  • Use an Online Tool . Geary recommends the Shapiro Library citation guide . You can find sample papers, examples of how to cite in the different academic styles and up-to-date citation requirements, along with information and examples for APA, MLA and Chicago style citations.
  • Work with a Tutor. A tutor can offer support along with tips to help you learn the process of academic research. Students at SNHU can connect with free peer tutoring through the Academic Support tab in their online courses, though many colleges and universities offer peer tutoring.

Find Your Program

How to cite a reference in academic writing.

A citation consists of two pieces: an in-text citation that is typically short and a longer list of references or works cited (depending on the style used) at the end of the paper.

“In-text citations immediately acknowledge the use of external source information and its exact location,” Geary said. While each style uses a slightly different format for in-text citations that reference the research, you may expect to need the page number, author’s name and possibly date of publication in parentheses at the end of a sentence or passage, according to Geary.

A blue and white icon of a pencil writing on lines

A longer entry listing the complete details of the resource you referenced should also be included on the references or works cited page at the end of the paper. The full citation is provided with complete details of the source, such as author, title, publication date and more, Geary said.

The two-part aspect of citations is because of readability. “You can imagine how putting the full citation would break up the flow of a paper,” Girard said. “So, a shortened version is used (in the text).”

“For example, if an in-text citation reads (Jones, 2024), the reader immediately knows that the ideas presented are coming from Jones’s work, and they can explore the comprehensive citation on the final page,” she said.

The in-text citation and full citation together provide a transparent trail of the author's process of engaging with research.

“Their combined use also facilitates further research by following a standardized style (APA, MLA, Chicago), guaranteeing that other scholars can easily connect and build upon their work in the future,” Geary said.

Developing and demonstrating your research skills, enhancing your work’s credibility and engaging ethically with the intellectual contributions of others are at the core of the citation process no matter which style you use.

A degree can change your life. Choose your program  from 200+ SNHU degrees that can take you where you want to go.

A former higher education administrator, Dr. Marie Morganelli is a career educator and writer. She has taught and tutored composition, literature, and writing at all levels from middle school through graduate school. With two graduate degrees in English language and literature, her focus — whether teaching or writing — is in helping to raise the voices of others through the power of storytelling. Connect with her on LinkedIn .

Explore more content like this article

A student at a desk, typing on a computer

What is Considered Plagiarism And How to Avoid It

A person researching the difference between certificates and degrees on the laptop.

Degrees vs. Certificate Programs: What's the Difference?

An SNHU graduate at Commencement earning their degree

How Many Credits Do You Need to Graduate College?

About southern new hampshire university.

Two students walking in front of Monadnock Hall

SNHU is a nonprofit, accredited university with a mission to make high-quality education more accessible and affordable for everyone.

Founded in 1932, and online since 1995, we’ve helped countless students reach their goals with flexible, career-focused programs . Our 300-acre campus in Manchester, NH is home to over 3,000 students, and we serve over 135,000 students online. Visit our about SNHU  page to learn more about our mission, accreditations, leadership team, national recognitions and awards.

  • Skip to main content
  • Skip to search
  • Skip to footer

Products and Services

Manufacturing robot arm and two manufacturing workers looking at a tablet.

Build a smart and secure factory, ready for Industry 4.0 manufacturing

Smart manufacturing for the modern age, harness the potential of industry 4.0 with advanced it solutions for ot.

Get more productivity with less downtime. And get better cross-team collaboration.

New opportunities to improve manufacturing

Use intelligent Cisco solutions to automate your industrial networks, secure your operations, improve IT and operational technology (OT) collaboration, and make your manufacturing smarter.

Produce more, adapt faster, with ease

Boost manufacturing innovations and efficiency with a resilient, scalable, and flexible industrial network that only Cisco can deliver. 

Build a wireless network that gets it done

Improve flexibility by connecting your vehicles and mobile assets using 5G, ultra-reliable wireless backhaul, or Wi-Fi. Cisco has it all and can help you choose the right wireless technology for your factory.

Protect your operations with your network

Get visibility into assets, enforce segmentation to build ISA/IEC62443 zones and conduits, and obtain zero-trust remote access with a Cisco industrial network that has cybersecurity built in, not bolted on.

Make your operations data work for you

Empower your applications with real-time data from your factory assets. A Cisco industrial network can help you to select, extract, transform, and securely transport data from your factory floor to your multicloud.

Explore our products, solutions, and events

Industrial automation.

Connect your industrial control systems and production assets to a flexible, automated factory network.

Industrial cybersecurity

See into your connected assets and network traffic, contain threats, and enable secure remote access.

Industrial mobility

Get an ultra-reliable wireless network for mobile equipment and improve production flexibility.

Industrial data orchestration

Get new insights for better production decisions with data from your assets.

Secure remote access

Give your vendors and staff secure, simple remote access for monitoring, managing, and updating production assets.

Industrial Ethernet switches

Get simplicity and safety when you connect your production assets with our managed layer 2 and layer 3 switches. 

Industrial wireless

Make mobile technology work for you with comprehensive wireless connectivity portfolio.

Cisco Cyber Vision

Gain deep visibility into your assets and network traffic. Stop threats and secure your operations.

Cisco Identity Services Engine (ISE)

Define segmentation policies for creating zones and conduits that your network can enforce to contain threats.

Cisco Secure Equipment Access

Keep remote access to your operations safe, scalable, and controlled.

Cisco Edge Intelligence

Get data-driven insights and make better decisions with real-time data collection built into your network.

Cisco Catalyst Center

Automate, monitor, and protect your production network with an intelligent network management system.

Featured partnerships

Rockwell automation.

Developed, tested, and proven network architectures to accelerate your transition to smart manufacturing.

Schneider Electric

Solutions built in collaboration to turn the promise of industrial IoT into reality.

News and events

Iiot world manufacturing day.

Build a firm foundation for Industry 4.0 innovations with robust wired and wireless networks.

On-demand Cisco manufacturing webinar

Join factory networking experts to learn about smart manufacturing challenges and solutions.

On-demand webinar on CPwE architecture

Learn about Converged Plantwide Ethernet architecture and its new enhancements for broader visibility and better resiliency.

Cisco manufacturing at Cisco Live U.S. 2023

Get key insights from some of the largest manufacturers in the world with our summit takeaways. 

Cisco manufacturing at Hannover Messe 2023

Discover how Cisco is preparing for a sustainable tomorrow with innovative solutions.

On-demand webinar on industrial cybersecurity

Start your compliance journey by understanding how IEC 62443-3 defines the foundational requirements for securing IACS.

research papers on iot pdf

Create the factory of the future

Cisco manufacturing products and services are helping to digitize factories by using Industry 4.0 and IIoT innovations.

Start your journey here

Improve efficiencies and cut costs.

Learn how Cisco industrial network can help you virtualize hardware resources in your factory.

Benefit from validated architectures

Erase deployment risk through tested and proven Cisco manufacturing network architectures.

Empower your network to secure operations

Deploy OT security at scale with visibility, enforcement, and ZTNA gateway embedded into your network equipment.

Comply with ISA/IEC 62443

Understand the requirements of the ISA/IEC 62443 cybersecurity standards and start your journey to compliance.

Choose a wireless network that works

Don’t force-fit. We compare available wireless technologies to help you select the right fit.

More resources to help you on your way

See how much you can gain with industrial IoT innovations through Cisco products and solutions.

research papers on iot pdf

Cisco unveils 2024 State of Industrial Networking Report

Delve into our comprehensive survey, where insights from more than 1000 professionals across 17 countries and 20 sectors illuminate the transformative influence of cybersecurity challenges, connection opportunities between IT and OT, and the impact of AI on industrial networking. 

Save on software and licensing

Cisco Enterprise Agreement

All your Cisco software. One licensing agreement.

Get software licenses for all the Cisco industrial networking equipment you need with one simple, cross-portfolio agreement. Everything you need, in one place.

Keep your operations safe. And save.

Get discounts on Cisco Cyber Vision

Connect your assets, get better visibility, and understand your security posture with Cisco Cyber Vision and industrial switches.

Hear from our customers

E80 group ensures safe and efficient operations of their agvs.

E80 Group logo

"By leveraging the hosted and built-in defense-in-depth security features of Cisco Industrial Ethernet switches, we gain the visibility, segmentation, and device authentication necessary to detect and contain malware before it can compromise the security and safety of our deployments."

Fabio Oleari, Manager of OT Cybersecurity

Audi transforms its manufacturing operations

Audi logo

"To increase security, decrease support requirements, and improve flexibility, Audi is developing its Edge Cloud for Production (EC4P) platform. EC4P virtualizes production assets and relies on software-defined networking by Cisco IoT and Enterprise solutions that provide a scalable, resilient, secure, and deterministic network"

Dr. Henning Löser, head of Production Labs

Northvolt expands its manufacturing footprint

Northvolt logo

"They have the mindset to move at a pace that we need to, and really to take automation data to the next level. Our switching equipment on the floor is completely integrated with the control and management plane on top that allows us to automate quite a lot of tasks, and tasks that are not automated can be done remotely."

Marko Milosavljevic, director of Operations and Infrastructure

Velta Technology scales with security

Velta Technology logo

"Gaining visibility into industrial assets is key to securing operations. The combination of Cyber Vision and Cisco industrial networking makes it simple to gain visibility at scale. It’s the foundation for a robust OT network and a comprehensive approach to IoT security.""

Dino Busalachi, CTO and co-founder

Velta Technology

Unilin Group protects its manufacturing operations

Unilin Group logo

"Previously, we had firewalls in place, but little visibility of what was behind each firewall. Cisco Cyber Vision gives us the visibility of exactly what devices are connected, their profiles, how much traffic they generate, what they are communicating, and who has remote access to them."

Pascal Pauwels, infrastructure director

Unilin Group

Nissan transforms its operations

Nissan logo

"Cisco leads the industry as one of the most prominent global network device vendors. Cisco also offers a wealth of different manufacturing solutions that support smart factories. Furthermore, it offers highly advanced technology, and we can be assured that its offerings reflect global best practices."

Yuichi Murai, supervisor of the Powertrain Production Engineering Department

Schedule a 1:1 consult

Unlock the potential of smart manufacturing and watch your operations transform.

We’d love to discuss your manufacturing initiatives with you. To schedule a free, no-obligation consultation, submit the form and one of our experts will reach out to you.

IMAGES

  1. (PDF) Internet of Things (IoT): A Basic Concept and Analysis Security

    research papers on iot pdf

  2. (PDF) A REVIEW PAPER ON “IOT” & IT’s SMART APPLICATIONS

    research papers on iot pdf

  3. (PDF) Review Paper on IOT Based Home Automation System

    research papers on iot pdf

  4. (PDF) A Review on Internet of Things (IoT)

    research papers on iot pdf

  5. (PDF) IoT: Networking Technologies and Research Challenges

    research papers on iot pdf

  6. (PDF) The Internet of Things (IoT) Applications and Communication

    research papers on iot pdf

VIDEO

  1. AFNS Most Repeated Test Questions

  2. DAY

  3. 9 #polity #exampractice #education #group2practicebits #objectivequestions #mcq

  4. AQA GCSE English Language

  5. IIOT for Smart Factory Data acquisition and Control Exhibition

  6. Bibhas Adhikari at QCE23

COMMENTS

  1. (PDF) Internet of Things (IoT): Definitions, Challenges, and Recent

    two categories, namely, i) General challenges: which. include common challenges between IoT and traditional. network such as communication, heterogeneity, QoS, scalability, virtualization, data ...

  2. Internet of Things (IoT) for Next-Generation Smart Systems: A Review of

    The Internet of Things (IoT)-centric concepts like augmented reality, high-resolution video streaming, self-driven cars, smart environment, e-health care, etc. have a ubiquitous presence now. These applications require higher data-rates, large bandwidth, increased capacity, low latency and high throughput. In light of these emerging concepts, IoT has revolutionized the world by providing ...

  3. (Pdf) Internet of Things (Iot): an Overview on Research Challenges and

    This paper focus on future applications of Internet of Things. The Internet of things (IoT) describes the network of physical objects—"things"—that are embedded with sensors, software, and ...

  4. (PDF) The Internet of Things (IoT): An Overview

    Nowadays, the IoT, early defined as Machine-to-Machine (M2M) communications, becomes a key concern of ICT world and research communities. In this paper, we provide an overview study of the IoT ...

  5. The 10 Research Topics in the Internet of Things

    communications. Over the past two decades, IoT has been an active area of research and development endeavors by many technical and commercial communities. Yet, IoT technology is still not mature and many issues need to be addressed. In this paper, we identify 10 key research topics and discuss the research problems and opportunities within ...

  6. PDF THE INTERNET OF THINGS: AN OVERVIEW

    evelopment challenges are emerging.This overview document is designed to help the Internet Society community navigate the dialogue surrounding the Internet of Things in light of the competing predic. ions about its promises and perils. The Internet of Things engages a broad set of ideas that are complex and int.

  7. Internet of Things: Architectures, Protocols, and Applications

    All of these applications are not yet readily available; however, preliminary research indicates the potential of IoT in improving the quality of life in our society. Some uses of IoT applications are in home automation, fitness tracking, health monitoring, environment protection, smart cities, and industrial settings. 9.1. Home Automation

  8. Developing IoT applications: challenges and frameworks

    Despite their pervasiveness, developing IoT applications remains challenging and time-consuming. This is because it involves dealing with several related issues, such as lack of proper identification of roles of various stakeholders, as well as the lack of appropriate frameworks to address the large-scale and heterogeneity in IoT systems [7].

  9. Artificial intelligence Internet of Things: A new paradigm of

    This paper has reviewed and discussed the convergence of the AIoT, where the advantages of intelligent machine-learning algorithms are integrated into resource-constrained IoT sensors and devices to enable large-scale and complex sensor deployments for IoT infrastructures. The paper has discussed the AIoT from several aspects and layers ...

  10. (PDF) Internet of Things (IoT): Research, Architectures and

    The IoT has the potential to add a new dimension to this process by enabling communications with and among smart objects, thus leading to the vision of „„anytime, anywhere, anymedia, anything" communications. This paper provided a research review about the Internet of Things (IoT). Different aspects of the IoT are discussed in this paper.

  11. PDF Security in Internet of Things: Issues, Challenges and Solutions

    Abstract. In the recent past, Internet of Things (IoT) has been a focus of research. With the great potential of IoT, there comes many types of issues and challenges. Security is one of the main issues for IoT technologies, applications, and platforms. In order to cover this key aspect of IoT, this paper reviews the

  12. PDF Internet of Things (IOT): Research Challenges and Future Applications

    Abstract—With the Internet of Things (IoT) gradually evolving as the subsequent phase of the evolution of the Internet, it becomes crucial to recognize the various potential domains for application of IoT, and the research challenges that are associated with these applications. Ranging from smart cities, to health care, smart agriculture ...

  13. Sensors

    This research adopts an incremental explanatory approach, guided by the principles of the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA). A rigorous examination of 84 research papers has allowed us to delve deeply into the current landscape of IoT research.

  14. The 10 Research Topics in the Internet of Things

    Since the term first coined in 1999 by Kevin Ashton, the Internet of Things (IoT) has gained significant momentum as a technology to connect physical objects to the Internet and to facilitate machine-to-human and machine-to-machine communications. Over the past two decades, IoT has been an active area of research and development endeavors by many technical and commercial communities. Yet, IoT ...

  15. IoT Security Challenges and Mitigations: An Introduction

    IoT-specific attacks include the sinkhole attack, the HELLO flood, the wormhole attack and the Sybil attack [7]. This paper contributes survey-style introductory discussion on: IoT layer models, topologies, protocols and the lack of standards across the same. Vulnerabilities that exist in IoT, associated IoT-specific

  16. (PDF) Internet of things (IoT)

    PDF | On May 1, 2021, Lakshmana Kumar Ramasamy and others published Internet of things (IoT) | Find, read and cite all the research you need on ResearchGate

  17. PDF Chapter 3: Internet of Things (IoT)

    Taiwan's IoT economic opportunity is set to increase global market share from 3.8% in 2015 to 4.2% in 2020, and to 5% in 2025. At the end of 2018, the value of Taiwan's IoT grew by 19% to US$39.1 billion, accounting for 4.24% of the global Internet of Things (Figure 19).

  18. IoT applications and challenges in smart cities and services

    1 INTRODUCTION. Internet of Things (IoT) is a network in which smart systems, that is, appliances, buildings, homes, vehicles, power generation, distribution and utilization centres supported with advance electronic sensors and actuators are connected and controlled via advanced communication and automation technologies [1, 2].IoT based technologies are rapidly growing at local, residential ...

  19. A Comprehensive Review on Internet of Things Applications in Power

    In the realm of power systems, the Internet of Things (IoT) emerges as a transformative force, steering a shift towards sustainable and distributed energy solutions for global economic growth. This comprehensive investigation navigates through various applications of IoT, unfolding its benefits and multifaceted impacts on society, the environment, and the economy. Real-world applications ...

  20. Internet of Things

    The Internet of Things (IoT) is an interconnected network of objects which range from simple sensors to smartphones and tablets ... The fifth generation (5G) of cellular networks will bring 10 Gb/s user speeds, 1000-fold increase in system capacity, and 100 times higher connection density. In response to these requirements, the 5G networks will ...

  21. Architecture and Applications of IoT Devices in Socially Relevant

    A multitude of IoT-enabled devices are continually being explored and introduced annually, fostering robust competition among researchers and businesses seeking to leverage the IoT landscape, given the substantial market potential of these devices. The selection of IoT architectures, communication protocols, and components is contingent upon the task's nature and the data sensitivity the ...

  22. (PDF) Internet of Things-IOT: Definition, Characteristics, Architecture

    Key Terms: IOT (Inte rnet of Things), IOT def initions, IOT functional v iew, architecture, cha racteristics, future challeng es. I. INTRODUCTION The IOT concept was coined by a member of the Radio

  23. PDF Internet of Things (IoT) and The Role of IoT in Education

    RISTICS OF IOTKey characteristics of IoT are as follows:2.1 Intelligence: IoT comes with the combination of algorithms. and computation, software & hardware that makes it smart. Ambient intelligence in IoT enhances its capabilities which facilitate the things to respond in an intelligent way to a particular s.

  24. [2408.08435] Automated Design of Agentic Systems

    Researchers are investing substantial effort in developing powerful general-purpose agents, wherein Foundation Models are used as modules within agentic systems (e.g. Chain-of-Thought, Self-Reflection, Toolformer). However, the history of machine learning teaches us that hand-designed solutions are eventually replaced by learned solutions. We formulate a new research area, Automated Design of ...

  25. How to Cite a Research Paper

    You can find sample papers, examples of how to cite in the different academic styles and up-to-date citation requirements, along with information and examples for APA, MLA and Chicago style citations. Work with a Tutor. A tutor can offer support along with tips to help you learn the process of academic research.

  26. Cisco Smart Manufacturing

    "To increase security, decrease support requirements, and improve flexibility, Audi is developing its Edge Cloud for Production (EC4P) platform. EC4P virtualizes production assets and relies on software-defined networking by Cisco IoT and Enterprise solutions that provide a scalable, resilient, secure, and deterministic network"

  27. (PDF) IoT in Smart Cities: A Survey of Technologies, Practices and

    The IoT for Smart Cities has many different domains and draws upon various underlying systems for its operation. In this paper, we provide a holistic coverage of the Internet of Things in Smart ...

  28. Early science and colossal stone engineering in Menga, a Neolithic

    Here, we examine a great Neolithic engineering feat: the Menga dolmen, Iberia's largest megalithic monument. As listed by UNESCO, the Antequera megalithic site includes two natural formations, La Peña de los Enamorados and El Torcal karstic massif, and four major megalithic monuments: Menga, Viera, El Romeral, and the one recently discovered at Piedras Blancas, at the foot of La Peña de ...

  29. Research on the Aerodynamic Noise Performance of a Novel Structure of

    Abstract. In systems with high downstream flow resistance, a single fan is prone to operating in an unstable range and generating backflow downstream of the hub. Conventional fans in series could overcome system resistance by increasing the pressure rise capacity. However, conventional fans in series do not improve the flow deterioration in the hub area of a single fan but instead posed a ...

  30. (PDF) Internet of Things: Smart Sensors, Smart Applications and

    In this research paper, challenges in creating composite product's assembly plans are discussed and IoT based approach for automation of assembly modeling system is presented by integrating cloud ...