Ali 2015 Ijca 906430
Ali 2015 Ijca 906430
Ali 2015 Ijca 906430
net/publication/320532203
CITATIONS
READS
118
74,756
3 authors:
Zainab H. Ali
Hesham Arafat Ali
Kafrelsheikh University
Mansoura University
18 PUBLICATIONS 240 CITATIONS
187 PUBLICATIONS 2,185 CITATIONS
Mahmoud M. Badawy
Mansoura University
13 PUBLICATIONS 387 CITATIONS
Some of the authors of this publication are also working on these related projects:
Smart electrical grids based on cloud, IoT, and big data View project
All content following this page was uploaded by Zainab H. Ali on 20 October 2017.
3
International Journal of Computer Applications (0975 –
8887)
2.1. Definitions and History new space named “infrastructure of IoT”, which provides
In 1991, Mark Weiser has described the vision of the future
support systems to serve the special things, which can
Internet under the name of “Ubiquitous Computing”.
provide various services such as goods identification,
Through this vision he was focused on how to turn on the
location identification and data protection. Fig 2 depicts the
smart livable environment in the presence of mobile phone
three dimensions of IoT and relationship between them.
technology this provide a powerful multimedia system [6].
Kevin Ashton is a one of the pioneers talk about IoT [2]. In this end, There are several approaches to build an
According to Atzori A.lera et al [7], classified IoT to three architecture of IoT, the paper will focusing on two kinds
paradigms namely, i) internet oriented (Middleware), ii) namely, architecture called “EPC global network“ and
things oriented (Sensors), and iii) semantic oriented another called “Unite and ubiquitous IoTs or U2IoTs”, to
(Knowledge). In 1999 Neil Gershenfeld was speaking about create an application on IoT, the architectural approach
similar things from the Massachusetts Institute of favored which based on an open architecture the EPC
Technology, MIT Media Lab in his book “When Things global network. The system designed by AutoID center for
Start to think”. conveying the dynamic information about objects/things to
provide a history of the product movement for the
In 1999 Auto- ID labs and MIT sought to develop
authorized users, the RFID technology plays a key role to
Electronic Product Code EPC, and use RFID to identify
differentiate between these mobile objects, this system is
things on the network. In 2003-2004 the emergence of
called “the EPC global network”. The IoT uses the EPC
projects serving IoT idea such as Cooltown, Internet0, and
global network as a principle to design the architecture
the Disappearing Computer initiative, also IoT start to
framework [10].
appear in book titles for the first time. RFID is deployed
was published on a massive scale by the US Department of The future architecture of IoT seeks to achieve connection
Defense. In 2005 IoT entered a new level when published between real-world, cyber-world and social world. Unite
its first report by International Telecommunication Union and ubiquitous IoTs or U2IoTs is considered as a different
ITU. In 2008 a group of companies such as Cisco, Intel, kind of IoT architecture, it’s used to integrate the physical
SAP and over 50 other members of companies met to create world with the cyber world. The U2IoTs consists of a set of
IPSO Alliance, to promote the use of Internet protocol (IP) heterogeneous systems, including unit of IoT to resemble
and to activate IoT concept. In 2008-2009 IoT was human neural network that provides solutions to specific
"Born" by Cisco Cisco Internet Business Solutions Group applications; U2IoTs includes the industrial IoT, local
(IBSG) [8]. From the previous perspectives can be defined youth, national IoT, and global IoT which integration of
IoT as a set of smart things/objects such as home devices, multiple Unit IoTs with ubiquitous features, and it is similar
mobile, laptop, etc., addressed by a unique addressing to the social organization framework. The main
scheme and connected to the Internet through a unified characteristics of U2IoT model are cyber, physical, social
framework this framework may be cloud computing. Fig 1 co-existence, connectivity and interactivity, space-time
depicts IoT technology. consistency and multi-identity status [10].
3
International Journal of Computer Applications (0975 –
8887)
Table 1. The similarities and differences between IoT, Internet, and WSN [10]
Characteristics IoT Internet WSN
Comm. Protocol Lightweight Comm. (TCP/IP) Lightweight Comm.
protocols. protocols.
Scale degree of Area Cover wide area Cover wide area Cover local area
Networking Determine backbone Determine Self-organization
Approach backbone
Identify objects Must Can not Can
Type of nodes Active and passive Active Active
WSN+ dynamic smart Set of networks Dynamic smart
things+ Internet surrounded contains set of objects
Network design
by intelligent environment Fixed objects
3
International Journal of Computer Applications (0975 –
8887)
transmission request is made, ii) Proactive protocols: initial contracted to delivery time service, this feature provides
path before the request is made. In [12], Sudip Misra et al. QoS.
proposed the protocol under the name of “fault-tolerant
routing protocol” for IoT. This protocol has designed by The middleware layer consists of three main layers are: i)
using learning automate (LA) and cross-layer concept. LA Service composition layer: the common layer on top of
dealing with optimization problems to choose optimal SOA middleware; it provides the functionality for
solutions, the need to cross-layer is saving energy of the composition of single service and builds specific
items of IoT (i.e. FRID). application. This layer concerned about services or
providing services only. Service composition architecture
3.3 Heterogeneity consists of individual architecture of the participating
The IoT environment is the best-known example to services, this architecture published SLA [14].
represent the heterogeneity issue because it contains a
plethora of the different devices in their nature; the main ii) Service Management layer: the layer allows
objective of IoT is creating a common way to abstract the management in IoT. Service management can be classified
heterogeneity of these devices and achieving the optimal into two areas are: i) runtime: services that based on time as
exploitation of their functionality. In this vein, the a critical factor to implement them directly. ii) Design time:
researchers always seek to find an effective method to deal services a part of maintenance lifestyle and service
with these devices regardless of their nature.In [13], C. G. development [15]. Service management layer encompasses
Garcia et al. sought to introduce solutions to some of the is a set of services such as object dynamic discovery, status
IoT problems such as interconnection, heterogeneity, and monitoring, service policy enforcement, service Meta
generate an application that allows people to interconnect model updates and service configuration, some of
services over the Internet, these solutions are represented in: middleware include additional features that are related to
creating a domain specific language (DSL), graphic editor Qos management and lock management. It’s notable that
and IoT platform Midgar software. For instance, over recent through the service management layer can develop new
years emerged a lot of applications used to solve the services during run-time [7].
heterogeneous objects problem over the Internet e.g. iii) Object abstraction: the need to object abstraction layer
WhatsApp, Skype and so on, it’s considered as a simple is summarized in vast and heterogeneous objects which
example to overcome this problem. The authors have scattered through IoT, layer organized harmonizing access
reviewed Midgar software to handle the heterogeneous to different devices with common language and procedure.
smart things through the IoT environment and DSL Object abstraction includes wrapping layer consists of two
software is designed for the specific purpose, the main idea sub-layers, interface sub-layer that management,
of this software is generating a domain which allows the incoming/outcoming messages and it provides an interface
interaction between things easy, regardless their nature. exposing the available method through a standard web
The authors have reviewed Midgar software to handle the service interface. Second sub-layer is a communication sub-
heterogeneous smart things through the IoT environment layer that implements logic at web service methods and
and DSL software is designed for the specific purpose is translate these methods at devices to communicate with
generating a domain to enable the interaction between real-world objects [7].
things easily regardless their nature. The Midgar Software
used to avoid the complexities in traditional methods that
3.4. Interoperability
Interoperability concept can be defined as the ability to
are used to handle this problem. In the future the
create systems or devices cooperating with each other in an
connectivity is won’t be limited to the electronic devices,
efficient way. In [16] Jussi et al. sought to use the semantic
but it will also include people this is will climb the problem;
for this reason can be considered Midgar as a first step in level interoperability architecture for pervasive the
computing and IoT; the architecture is relied on the
this point.Moreover, IoT like any networks uses the service
semantic information sharing solutions called “smart-M3”.
oriented architecture (SOA) approach to enhance the
heterogeneous resource behavior (i.e. Sensors and The principle idea of the proposed architecture relies on
Actuators) and it provides the highest level of flexibility dividing IoT environment into small spaces to facilitate
and scalability to the system in both the external integration their management process. A Semantic Information Broker
processes and the exchange processes within the SIB is used to provide methods for agents to share semantic
middleware. information with each other and also provides monitoring
and updating of the physical world in real time. The main
3.3.1. Middleware Layer observation of the architecture, performance after using the
The middleware layer is a software layer or a set of sub- agent interaction operations scale very well also enable
layers interposed between the technological and the interaction with the physical world in real time. The
application layer, it provides a standard way for architecture needs for tools the support development and
representation and communication. In general, the deployment of devices and applications in the future IoT
middleware layer supports the transparency concept that is systems.
used to hide all complex details from end user; actually the
transparency concept is a one of the most distinctive 3.5. Quality of Service (QoS)
features of distributed systems.The Service oriented Ideally, QoS is defined as “the amount of time that is taken
Architecture (SOA) is a common example of the to deliver the message from the sender and the receiver” if
middleware technology that is used to deal with IoT, SOA this time is equal or less than pre-specified time
allows to re-use and utilize real world service in a dynamic requirement the QoS is achieved. ITU re-defined QoS
way [7]. The SOA supports some of the services and one of concept as a degree of conformance of delivering service to
them is called “Service Level Agreement (SLA)”, which the user by the provider with agreement between them [17].
used to make an agreement between the service provider For QoS assurance, must cope with service models to
and service user, the most important feature of SLA is the determine which degree of QoS for each Internet service.
4
International Journal of Computer Applications (0975 –
8887)
Moreover, Internet services can be classified according to systems and software like applications or services to run
Internet service models which considered as a supplement upon the same server through creating more than virtual
to provide the following: firstly, the ability to categorize machine inside the physical machine. The vision of this
Internet applications by priority; and secondly, determining concept helps to increase the performance of the network
QoS demands necessary to achieve user satisfaction. A via increasing utilization, maximizing scalability, saving
service models consist of three main models based on three cost, etc. [20]. Actually, there are three areas used to
factors, namely, a delay factor is concerned with time, represent the virtualization technology, namely, i) network
which can be classified into Hard Real Time (HRT), Soft virtualization, storage virtualization, and server
Real Time (SRT), and Non-Real Time (NRT), a critical virtualization.
factor is concerned with the kind of process/application (i.e.
Sensitive application or not) (yes/no), and finally, an In [3], S. Alam et al. have created the framework called “an
interactivity factor depending on the user’s subscription IoT Virtualization Framework based on Sensor as a service
(yes/no). According to table 2, the major types of Internet notion” this frame consists of three layers are: real world
service models are: an open service model, an Supple layer, semantic layer and virtualization layer in addition
service model, and a complete service model, the main separately database to record useful information. Primarily,
function of these categories helping to offer QoS the main challenges in the IoT environment can be
provisioning upon Internet services [18]In [19], Ming determined into three items namely, i) there is no registry
ZHOU et al. sought to find an efficient algorithm more mechanism, the framework possesses database to overcome
suitable with large-scale and real time in IoT, they made a this challenge; ii) the heterogeneity and discovery, the
comparison between the three common algorithms are: proposed framework sought to overcome of this issue
Integrated Linear Programming (ILP), Genetic Algorithm through the semantic approach to deal with the
(GA), and Backtracking Algorithm (BA) to find a suitable heterogeneity by providing a standard language called
algorithm that can deal with this context by efficiently. The Sensor Model Language “SensorML”; and finally iii) the
authors chose BA as a more suitable algorithm to serve this interaction between event and service in the IoT
idea because it’s a suitable to cover the large- scale area in environment are absent, the framework uses the
IoT and gave the good results in real-time compared with Virtualization layer to deal with this challenge by efficient
the counterpart of algorithms. way. The future directions of this framework divided into
two points are: enhancing its performance in real-time
Table 2. Internet Services models domain and improving micro-formats for advertising on
IoT Delay Process/App. Interactivity social networks.
Models
3.8 Big Data
Open Not real Not mission Interactive Big Data is a new expression to describe massive data
service time critical whether structure or unstructured, which is difficult to deal
with traditional database methods and software techniques.
Supple Soft real Mission Application Simply, Big Data defined as a large volume of data [21].
service time critical dependent Dataset considered as a Big Data when it meets 4 V’s-
value, volume, velocity, and variety. Big Data attracts
Complete SRT/HRT Mission Not almost a new industrial field such as online social networks
service is critical interactive (Twitter, Facebook, and Instagram); the collection of data
depending through the social network is very huge, for example twitter
on app. in 2010 producing up 120 terabytes of data of the day [22].
IoT is considered as a good example of Big Data as the
3.6.Scalability amount of data which was collected from deploying sensors
Scalability is one of the most important challenges of IoT, through IoT environment was very large and
which means how to deal with the sustainable growth of the heterogeneous. The coupling between IoT and Big Data
Internet in an efficient manner. In the other words, was very strong [23].
“Scalability is the ability of a system or network to handle
the growing scale of any environment without an effect on In [22], Chang Liu et al. sought to introduce a software
performance”. Currently, the Internet comprises around 9 architecture addressed real-life based on the extraction from
billion devices with a next era of the Internet which known the SMARTCAMPUS project, this architecture supported
Web 0.3 or ubiquitous computing it is expected to reach 24 the concept of Big Data into the IoT environment to deal
billion devices, the increasing of this number have a broad with data collected from sensors. This class of architecture
impact on the performance of the network. tackled some of challenges such as data storage, avoiding
processed bottlenecks and high throughput.
In [5], J. Gubbi et al. sought to apply the cloud computing
technology represented in Aneka software with IoT 3.9 Cloud Computing
environment. Generally, cloud computing provides a set of Cloud Computing and IoT are the most popular example to
features such as high storage resources, scalability, represent the ubiquitous computing field; but IoT is not
visualization platform and client delivery; plus the cost of popular like Cloud Computing, both use the distributed
each service based on pay-per-use. Aneka cloud computing computing concept. Cloud computing is a way to access
software provides a utilize storage and computing resources large amount of computational resources and supports a
of both public and private cloud. large number of users in a reliable and decentralized
manner; it’s also provide software cheaply. Cloud
3.7. Virtualization Computing consists of the three main layers are:
Virtualization is known as the ability to share hardware Infrastructure as a Service (IaaS), Platform as a Service
resources among multiple operating systems. The (PaaS) and Service as a Service (SaaS) each one provide
virtualization technology allows for the multiple operating significant features through the cloud data center. Cloud
4
International Journal of Computer Applications (0975 –
8887)
computing is considered as a standard framework to represented the model of the proposed self-organized power
represent IoT, and both IoT and cloud computing possess a consumption approximation (SOPCA) algorithm. The
set of benefits and restrictions. IoT represents real world principle idea of this algorithm is the use of wireless
and small things, but it is limited storage in addition to connectivity between peer devices and servers, the devices
traditional problems in the network such as scalability and discover other devices to propagate energy sniffer agent
privacy; in other side, cloud computing has virtually (ESA).
unlimited capabilities and processing power [24]. The
integration of cloud computing with IoT became a very ESA locates devices and keeps estimating energy
important point of recent researches; to produce system able consumption. Source node also locates the other node by
to overcome the many challenges such as scalability, using GPS, ESA updates their internal variables based on
storage resource and virtualization; can be considered the the observation of local energy consumption then it moves
main objective of this integration is to leverage from cloud to another node. The mechanism of SOPCA algorithm
computing in processing power which need for sensors and avoids a re-routing between devices by using flags on the
other things [25]. individual devices. The authors used agent-based model
(ABM) to test the proposed algorithm over random
Recently, a lot of researches are mentioned integration network.
between cloud computing concept and IoT; for example not
as a limitation in [24], Alessio et al. sought to review the 3.11 Security and privacy
existing integration between IoT and cloud computing in The security rule aims to protect it from threats; these
the CloudIoT paradigm and illustrates the benefits from threats classify into two kinds are: the external threats such
them. First of all, the transparence which come with the as attacks on system form attackers and the internal threats
virtualization technology to hide the complexity of sensors represented in misuse of the system or information. There
from the end user; in addition to some of other features such are three main factors of security are: data confidentiality,
as the storage resources, the cloud computing concept privacy and truth. Data confidentiality guarantees only the
provides high capability to store large amount of data which authorized users to access and modify data, and it includes
collected from sensors; the big data considered as a new two aspects: first, access control mechanism and second, an
vision to restructure huge volumes of data through the IoT object authentication process [27]. Truth is guaranteed to
environment; the computational resources, one of the issues apply security rules into system and common example of
of IoT is limited processing resources Cloud Computing truth is digital certificates. Privacy is defined as a control
overcome this problem to improve scalability. access to personal data; and it allows keeping certain
The cloud computing also provides a lot of efficient information and data confidential; the features of privacy
solutions for the most issues of IoT and sought to offer the are secrecy, anonymity and solitude [28]. The most current
new visions for these issues such as providing ubiquitous researches seek to increase and develop privacy in the
access to sensor data through Sensing-as-a Service (SaaS); applications, the Privacy Enhancing Technologies (PET)
enabling automatic control logics implemented in the cloud can be oriented to the subject, the object, the transaction or
computing through Sensing and Actuation-as-a-Service the system; it is used to protect identity over the Internet
(SAaaS); dispatches messaging services triggered by sensor [28]. In the IoT environment the security and the privacy
events through Sensor Event-as-a-Service (SEaaS); are important to guarantee a reliable interaction between the
enabling ubiquitous management of remote sensors through physical world and the cyber world [28].
Sensor-as-a-Service (SenaaS); enabling ubiquitous database In [29], Biplob R. Ray et al. proposed a framework
management through DataBase-as-a-Service (DBaaS); dependent on group approach and collaborative approach
providing ubiquitous access to any kind of data through called “a hybrid approach”, and used security check handoff
Data-as-a-Service(DaaS); providing ubiquitous layer-2 (SCH) with RFID. The SCH is a bet flags (0,1) (on/off)
connectivity to remote devices through Ethernet-as-a- help to keep track of the security state of the tag; also the
Service(EaaS); enabling ubiquitous access to policy and SCH allows the tag to take a shortcut to clear the security
identity management functionalities through Identity and check or re-clearance tag. Notable, the most of the existing
Policy Management-as-a-Service(IPMaaS); providing protocols which deal with RFID suffer from threats and
ubiquitous access to recorded video and implementing vulnerabilities such as insecure, inefficient identification,
complex analyses in the Cloud through Video Surveillance- throughput and inadaptability. The proposed protocol
as-a-Service (VSaaS). provides customization to ensure the adaptability of the new
efficient techniques. The development of RFID security
3.10 Power Consumption protocol makes the IoT more robust distributed structure.
The power consumption issue is a critical point in wireless
networks. Typically, the efficiency of the work of sensors 4. THE HOT TOPICS AND RELATED
depends on the lifetime of the battery. Nowadays the most
of devices are equipped with sensors such as smart mobile CHALLENGES
phone, tablet and laptop to deal with the modern The IoT consists of a host of other elements, which are
applications. For instance, the application of weather considered as an extension for the general challenges of IoT
prediction that is relied mainly on GPS to determine or it can be called "unique challenges". The section seeks to
location; once the GPS application is turned on during the explain some of these elements in a nutshell.
whole sensing procedure the battery may be drained very
quickly.
4.1 Radio frequency Identification
(RFID)
In [26], K. Batool et al. have dealt with the power RFID is a breakthrough in embedded communication and
consumption issue by using sniffer agents. The paper was WSN, RFID is used to generate a unique ID for the object
autonomously presented on mobile energy consumption of in WSN. It consists of two parts are: passive RFID: which
networked consumer devices to determine the used to power of the reader’s interrogation signal to
approximation of the current power requirement. The paper communicate the ID to the RFID, and access control
4
International Journal of Computer Applications (0975 –
8887)
application as well. Active RFID: readers have their own According to [5] can be divided the IoT applications into
battery supply and instantiate the communication. RFID four categories can be summarized in the following: i)
uses Ultrawide Bandwidth (UWB) technology to enhance Personal and home uses WiFi as a backbone providing
RFID performance in a specific IoT application field. UWB higher bandwidth data transfer as well as higher sampling
is a technology allows the next generation of RFID to rate, the healthcare sector is considered as the most popular
overcome many of the current restrictions in current RFID example of this category, ii) Enterprise, the information in
such as low security, reduce area, and sensitivity to this category may be collected from the networks, the
interferences. The RFID contains three key elements are: environment monitoring such as video surveillance is a first
the RFID tag or transponder that carries object, the RFID common example of this category followed by smart home
tags reader or transceivers that read and write tags and and smart environment generally, iii) Mobile, the sensor
back-end database. information can be obtained from large scale WSN for
online monitoring of travel time the popular example of this
4.2 Wireless Sensor Networks (WSN) category is transportation; lastly, iv) Utilities, the
WSN is an important part of IoT, it’s considered as a core
information can be obtained from networks to achieve
to build the IoT block, it consists of a group of specialized
service optimization and power consumption,Typically, the
sensor data are shared among sensor nodes with
main target of companies which are using this type of
communication infrastructure for monitoring some of
applications is reducing cost and maximizing profit. The
events or states of objects such as temperature, sound,
best example of this kind is smart grid, smart metering and
pressure, etc. these sensor nodes work autonomously and
smart water and quality of drinking water. This section will
can be linked between them by self-organizing. Notable,
be reviewed the most popular examples of each type of
WSN support the distribution concept between sensor
these mentioned categories earlier, also table 5 summarizes
nodes, and each sensor network includes some of elements
the categories of the IoT applications.
such as radio transceiver with an internal antenna or
connection to an external antenna, a microcontroller, an Healthcare: the IoTCloud paradigm [33] has been widely
electronic circuit for interfacing with the sensors and an used in the healthcare sector to diagnosis, treatment and
energy source [30]. The section seek to show the tracking the status of the patients remotely. The paradigm
components that make up WSN in the following: must serve four pivots namely, i) tracking: is a function
aimed to identify the patient in motion, ii) identification and
WSN hardware contains a sensor interface, processing authentication: identification aimed to reduce mistakes in
units, transceiver units and power supply. diagnosis and authentication used to meet with security
WSN communication stack the nodes deployed in an requirements, iii) data collection: usually aims to reduce
ad-hoc manner for most applications. processing time and it is related to integrating RFID
technology with other health information, lastly iv) sensing:
WSN middleware is mechanism to combine cyber used to provide real time information about the patient [32].
infrastructure with service oriented architecture (SOA). The issues in this area are defined as: control, security,
SOA is an architectural style that enables the heterogeneity, interoperability and streaming QoS.
composition of applications by using loosely coupled
and interoperable services. Smart environment (i.e. Smart city, smart home): The
key idea to gain the smart environment such as smart city or
Secure data aggregation; it is a very important to ensure smart home while maintaining the level of service without
reliable data collected from sensors. degradation has relied on the integration between both IoT
and cloud computing; over recent year’s escalation of
4.3 Addressing Schemas and attention toward this integration. Generally, The IoT suffers
Communication from a host of the thorniest issues, first of all, heterogeneity
of objects; there are many middleware technologies are
Protocols designed to deal with this type of issues, such as RFID
The Internet contains a large amount of objects which
middleware and WSN middleware. On the other hand,the
needing to determine their location to complete the
cloud computing provides scalability and hide complexity
communication process in an efficient manner, it’s
of sensors from end users by using the virtualization
considered as a main objective of addressing process.
technology. The most popular challenges in this type of
Generally, Internet Protocol (IP) used to identify objects
application are limited to security and real-time
through the Internet; there are two versions of IP, namely, i)
applications.Video surveillance: is an intelligent video to
IPv4, which uses 32-bit addresses ( addresses) to monitor the object behavior and activities, it has become an
identify hosts or objects through the Internet, this process important tool of security-related application and it can be
considered as limited to some extent; and ii) IPv6 is the considered as an alternative to self-contained management
latest version of the Internet protocols uses 128-bit ( systems, and the complex video analytics requires Cloud-
addresses), It covers a large area more than IPv4 [31]. The based solutions, and it can be used to satisfy the need to
RFID technology is a way to identify things into WSN and increase volume of storage capacity of media [32].
IoT, it generates unique ID to identify the smart objects. Automotive and smart mobility: the aim of this function
Also “IPv6 over Low-power wireless Personal Area concentrated on the improvement of transportation and
Network (6LoWPAN)” IEFT group aims to make IPv6 transport through increasing safety road, reducing
compatible with low capacity devices. congestion, and control traffic. Can be considered the
integration between Cloud Computing and IoT as a
5. APPLICATIONS promising opportunity to find effective solution is
Recently, the IoT technology has appeared as a one of the characterized by high performance, security and lowest
basics in our lives because it touches a lot of the important cost. The challenges in this type are: identification,
sides such healthcare, smart water, transportations, heterogeneity of sensors, scalability and dynamic behavior
surveillance and so on. Moreover, there are many of objects.
applications which have emerged to serve this concept.
4
International Journal of Computer Applications (0975 –
8887)
Smart energy and smart grid: the biggest problem in the physical worlds, cyber-world and social world. Lastly, in
sensors world is power consumption, the battery in sensors this section is pointed out to the differences between both
may drain very quickly, and both the IoT and Cloud IoT and the traditional network.Section II, reviewed the
Computing provide intelligent solutions to manage energy main general challenges which had a significant impact on
distribution and consumption in heterogeneous the performance of IoT such as communication,
environments. networking, Qos, scalability, virtualization, big data,
6. CONCLUSIONS AND heterogeneity and security; this section sought to illustrate
FUTURE DIRECTIONS and provide the recent solutions for each element of these
IoT is a one the main techniques that is used to express the challenges. Also, this section reviewed another kind of
ubiquitous computing approach, but it still not popular like challenges that are called "unique challenges" under subtitle
the cloud computing technology. This paper has sought to "The Hot Topics and Related Challenges"
highlight the IoT concept in general through the three which includes more related challenges to the IoT
sections namely; section I, reviewed an overview about the environment.Finally, section III, reviewed a set of the
IoT concept via highlighting its history and its inception popular applications which are offered by IoT and the
since 1999 at the hand of Kevin Ashton who considered as IoTcloud paradigm such as healthcare, smart city, smart
one of the pioneers who talked about IoT and even Cisco grid, smart transportations, etc.. Based on the above, can be
company now. Then it has reviewed the main idea to design considered the IoT environment as a rich search point, and
the IoT structure that relies on the integration between three flourishing area to the research in particular in the
dimensions are: information items, independent network integration topic with cloud computing, which provides the
and intelligent applications. Accordingly, the future of the new sceneries to handle the smart services and applications.
IoT structure relies on the integration among real or
Table 3. Summary for the recent research directions of IoT
Research area Techniques Solutions Open area
Networking [11] MANET The authors have used the MANET as a Improving Ad-Hoc network.
way to maintain connection between Network technologies.
things. RFID.
Communication protocols.
Learning automates The authors proposed a protocol called Improving the proposed
Routing [12] (LA) & Cross-layer. “fault-tolerant routing” protocol to serve algorithm to cover the wide
the IoT environment. range of the application
domains
The authors have been sought to improve Domain Specific language and
Heterogeneity [13] Midgar Software the interaction between objects or things graphic editor to generate
via the graphic editor that generates model smart objects.
defined by a Domain Specific Language. Insertion of boxes in the
graphic editor with support for
data analysis and fuzzy logic.
Scalability of IoT platform.
Security and privacy.
Semantic The authors have been sought to build the The architecture needs tools
Interoperability [16] Interoperability semantic interoperability architecture to that support development and
Architecture access the information easily, also the deployment of devices and
paper used the monitoring and updating applications into the future IoT
events of physical world in real time. systems.
QoS [19] BT, IP & GA The authors have been reviewed Decreasing steps of BT
comparison between three algorithms to algorithm for calculating QoS.
determine Qos metrics for composes
service. BT algorithm is the most
appropriate to IoT environment more than
ILP & GA, because it suitable to serve
both high scale of service and real-time
application.
Aneka Hybrid cloud The authors have used cloud computing Cloud computing.
Scalability [5] computing (private technology with IoT environment to Energy efficient sensing.
cloud + public cloud) improve scalability and provide storage Architecture of IoT.
resources. Data mining.
Secure reprogrammable
networks and privacy.
IoT Virtualization The authors have created a new The development of IoT
Virtualization [3] Framework based on framework based on SenaaS notion named framework services micro-
SenaaS technology. it “IoT Virtualization Framework”, the formats for advertising on
main objective of this frame is reusability social networks.
of the sensor information via web browser. Improving the performance of
an IoT framework at real time.
The authors have sought to improve the Cloud Computing.
software architecture named "real-life" Scalability/elasticity.
Big Data [22] SMARTCAMPUS. based on extracted from the Computation time.
SMARTCAMPUS project to handle Big Security.
4
International Journal of Computer Applications (0975 –
8887)
Security The aim of security is protecting data Security for cloud computing.
from unauthorized users. Generally, the Security for semantic web.
security issue contains three levels are: Improving encryption methods.
confidentiality, trust, integrity Privacy policies and trust.
4
International Journal of Computer Applications (0975 –
8887)
4
International Journal of Computer Applications (0975 –
8887)
[26] [26] Komal Batool, Muaz A. Niazi, 2015 Self-Orgnized [30] Wirelesssensornetwork,2014http://en.wikipedia.org/wiki/
Power Consumption Approximation in the Internet of Wireless_sensor_network.
Things, 2015 IEEE International Conference on [31] IP address, 2014 http://en.wikipedia.org/wiki/IP_address.
Consumer Electronics (ICCE).
[32] Xiang Sheng, Jian Tang , Xuejie Xiao ,Guoliang Xue,
[27] Rolf H. Weber, Romana Weber, 2010 Internet of Things, 2013 Sensing as a Service: Challenges, Solutions and
Springer, 41-68. Future Directions, IEEE Sensors Journal, 3733 – 3741.
[28] Huansheng Ning, 2013 Unit and Ubiquitous Internet of [33] OpenSourceIoTCloud,2015https://www.sites.google.com
Things, CRC Press.
/site/opensourceiotcloud/installation-guide,.
IJCATM : 4
View publication