SlideShare a Scribd company logo
1 of 6
Download to read offline
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3663-3668 (2018) ISSN: 0975-0290
3663
A Literature Survey on Internet of Things (IoT)
Krishan Kumar Goyal
Department of Computer Application, R. B. S. Management Technical Campus, Agra.
Email: kkgoyal@gmail.com
Amit Garg
Department of Computer Application, Meerut Institute of Engineering & Technology, Meerut
Email: foramitgarg@gmail.com
Ankur Rastogi
Department of Computer Application, Meerut Institute of Engineering & Technology, Meerut
Email: ankurrastogi88@gmail.com
Saurabh Singhal
Department of Computer Application, Meerut Institute of Engineering & Technology, Meerut
Email: saurabh.singhal09@gmail.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
Now a days we are living in an era of Information Technology where each and every person has to become IT
incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last
few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new
era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT).
Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each
object can perform some task while communicating with some other objects. The world with full of devices,
sensors and other objects which will communicate and make human life far better and easier than ever. This
paper provides an overview of current research work on IoT in terms of architecture, a technology used and
applications. It also highlights all the issues related to technologies used for IoT, after the literature review of
research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Keywords - Internet of Things.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: March 07, 2018 Date of Acceptance: March 24, 2018
--------------------------------------------------------------------------------------------------------------------------------------------------
1 INTRODUCTION
Internet of Things can be defined as the collection of two
terms: one is Internet, which is defined as networks of
networks which can connect billions of users with some
standard internet protocols[2]. Internet connect several
different sectors and department while using different
technologies. Several devices like mobile, personal
systems and business organizations are connected to
Internet. The second term is Thing, this term is basically
mean to these devices or objects which turn into intelligent
objects[17]. Moreover this it is also a part of all objects of
this real world. If we want to define IOT then we can not
define it precisely and concisely but Vermesan et al.
defined the Internet of Things as simply an interaction
between the physical and digital worlds. The digital world
interacts with the physical world using a plethora of
sensors and actuators [8].
IoT can also be defined as “An open and comprehensive
network of intelligent objects that have the capacity to
auto-organize, share information, data and resources,
reacting and acting in face of situations and changes in the
environment”[22].
2 HISTORY OF IOT
The IoT domain leads to world of technology and
communication to a new era where objects can
communicate, compute and transform the information as
per the requirements. This scenario of communication has
already been started but didn’t get recognition. The term
Internet of Things was coined by Kevin Auston, the
Executive Director of Auto-ID Labs in MIT in 1999. The
concept of IoT first became very popular through the
Auto-ID centre in 2003 and in related market analytics and
it’s publications[1]. When the concept of such
communication came into existence, different companies
focused on it and tried to recognize it’s significance and
began to identify its role and the correlated future aspects,
then these companies started investing in the domain of
IOT in different periods but at regular intervals of time[9].
PEOPLE
MOBILE PC
Fig. 1 – Basics of Internet of Things
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3663-3668 (2018) ISSN: 0975-0290
3664
Year Industrial Participation & Involvement
2000 LG announced its first Internet of refrigerator
plans
2003 RFID is deployed in US Dept of Defence
2005 UN’s International Telecommunications
Union (ITU) published its first report on the
Internet of Things
2008 Recognition by the EU and the First European
IoT conference is held. A group of companies
launched the IPSO Alliance to promote the use
of IP in networks of “Smart Objects” and to
enable the Internet of Things. The FCC voted
5-0 to approve opening the use of the ‘white
space’ spectrum
2009 The IoT was born according to Cisco’s
Business Solutions Group
2010 Chinese Premier Wen Jiabao calls the IoT a
key industry for China and has plans to make
major investments in Internet of Things
2011 IPv6 public launch-The new protocol allows
for 340, 282, 366, 920, 938, 463, 463, 374,
607, 431,768,211, 456 (2128
) addresses
Table – 1 History of Internet of Things
3 ARCHITECTURE
Implementation of IoT concept is basically depends on its
architecture. In the initial phase of research the 3 layer
architecture was introduced [8], which have three layers
the perception, network and application layers.
Fig. 2 - 3 Layer Architecture
1. Perception Layer - This layer also called as physical
layer, gathers data/information and recognises the physical
world. In this layer all the actuators work according to the
information which is collected by the sensors of different
object in order to perform specific operations by the
corresponding objects[18].
2. Network Layer - Network layer is the middle one, it
establishes an interface link between application layer and
perceptual layer. It is responsible for the initial processing
of data, broadcasting of data and connecting devices[8].
3. Application Layer - Application layer is the
implementation of IoT. The working of sensors and
actuators is achieved by application layer. We can
understand it as software which works on and for the
sensors other virtually intelligent objects.
This three layer architecture of Internet of Things is not a
sufficient for the today’s technology. So a new
architecture was designed to define the entire concept of
it’s working and development of IoT devices. The new
architecture involves 5 layers and is known as 5 Layer
architecture [29]. New architecture has perception,
transport, processing, application and business layers:
Fig. 3 - 5 Layer Architecture
1. Perception layer works in a similar manner as
previously described in the 3 layer architecture. It is used
to take information from the sensors and implement it.
2. Transport layer takes the data from the perception
layer and pass this data to the next layer which is
processing layer and vice versa. This will done with the
help of networks like LAN, wireless technology, 3G, 4G,
LTE, RFID etc[8].
3. Processing layer which is third layer has to perform the
major task because it will process all the information
gathered by the perception layer. There is a huge amount
of data which will be stored with the help of some
techniques like cloud computing or any DBMS. Then it
will analyse how to fetch data whenever required in order
to complete the desired task[23].
4. Application layer is next layer which implements the
working of IoT. For this an application is required with the
corresponding device in order to complete the desired task.
5. Business layer is the last layer of this architecture
which manages the working of entire system along with
many other features, one of them is privacy[1].
Both the architectures are defining the working of IoT
system of different types but they all are following the
same sort of working in order to achieve its goal.
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3663-3668 (2018) ISSN: 0975-0290
3665
4 TECHNOLOGIES
There are various technologies which are used to define
IOT, but the four main technologies are as follows[9]:
1. Radio Frequency Identification (RFID)
2. Near Field Communication (NFC)
3. Machine to Machine Communication (MtoM)
4. Vehicle to Vehicle Communication (VtoV)
4.1. Radio Frequency Identification (RFID)
RFID is a system in which there is a reader to
read many tags[4]. It uses the technology of radio waves to
send the information of an object in the form of serial
number which is attached to the tag. It uses the
electromagnetic fields to transfer the data on the tags so
that it can automatically identify and track the objects,
corresponding to a particular tag[1]. As we already
mention that RFID technology is based on reader and tags,
so in the initial phase of research RFID defines in three
configurations:-
 Active RFID
 Passive RFID
 Active Reader Active Tag
Active RFID - (Passive Reader Active Tag), the reader
receives the signal or information from the device which
runs on battery and this battery is operated by a device
called active tag. This information exchange will take
place in limited range of the active tags and the passive
readers which is from 1-2000 feet depending upon the
architecture[14].
Passive RFID - The second one is Passive RFID (Active
Reader Passive Tag), most commonly used, such tag does
not have any battery or onboard power supplies, so it
requires energy to send the data and thus harvests the
energy from the RFID reader.
Active Reader Active Tag - The last one both the reader
and tags are active so it is an Active Reader Active Tag.
Although both the reader and the tags are active, but tags
will start sending information only when it is awoken by
the reader or when it comes in the proximity of the
reader[19]. So by this we can say that the main
components of this technology are tag, reader, power
supply, antenna, access controller, software and server.
Application - RFID has a very limited use only for
identification and tracking. As we know that it works on
frequency and within a limited range. So it can work for
such applications like smart grocery, smart cabinet, smart
fridge, smart appliances, smart currency etc[14]. In these
scenarios there is a tag on product and a reader to scan the
tag. In a grocery shop we put tags on the products and
when the product passes through that reader, the reader
will catch it. In this way it can be tracked that which
product is moving out of the shop and what inventory is
left for that corresponding product. In the same way if a
fridge can sense what is putting in it and what is taking out
from it, it can also be done by RFID. One another very
useful and common application of this technology is on
airport where the baggages are tagged and read at another
place.
Issues - There are several issues with RFID. It works on
specific range of frequencies; if these frequencies differ at
different places then it will create a problem in reading a
tag at different locations. It is also difficult to read more
than one tag simultaneously[15]. There are methods to
overcome this problem but very costly. Tags have to be
implemented on the product and all the tags are different
and unique, which includes some cost. The inclusion of
cost is not comfortable all the time when comparing and
concerning with the cost of product [4].
4.2 Near Field Communication (NFC)
Near Field Communication is somehow little bit
similar to RFID, it combines a RFID reader in a mobile
phone, which makes it better, reliable and efficient for the
users. Near Field Communication is a short-range wireless
technology with the frequency of 13.56 MHz, typically
work for very small distance up to 4 cm[3]. Allows
intuitive initialization of wireless networks and NFC is
complementary to Bluetooth and 802.11 with their long
distance capabilities at a distance circa up to 10 cm. It is
first developed by Philips and Sony companies. Data
exchange was approximately 424 kbps. Power
consumption during data reading in NFC is under
15ma[2]. There are two modes in NFC technology:
 Active
 Passive
Active Mode - In active mode both the devices are active
and communicate with each other by sending the signals.
Passive Mode - In passive mode one of the device sends
the signal rather other just receiving it[28].
NFC doesn’t need pairing, it cannot work from a long
distance and in this way this technology is secure and use
for mobile payments.
Application - NFC works in a very short range so the
devices must be kept nearby. It has several applications,
the most important one is Payment App. Today, we have
several applications (apps) by which one can pay without
using a card, in this scenario the device works as a virtual
card and the transaction will take place. One can exchange
their business card with the help of their devices. They just
touch their devices and their business cards will be
exchanged. If a information is required than use the device
with the smart poster and get all the information with a
single touch[21]. It can also work while travelling; a
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3663-3668 (2018) ISSN: 0975-0290
3666
person can book a travel ticket or a room in a hotel. While
booking keys are given to the person, when person touch
the device on the appropriate devices, the work is done
and the person will move in.
Issues - These devices will work on a very small range, so
this is one of the major issues. Two devices of two
different manufacturers can create some compatibility
issue in their communication. Due to this reason a
monopoly may exist in market[3].
4.3 Machine to Machine Communication (M2M)
Machine-to-Machine (M2M) refers to the
communications between computers, embedded
processors, smart sensors, actuators and mobile devices
(DYE, 2008). The use of M2M communication is
increasing in the scenario at a fast pace. For instance,
researchers predicted that, by 2014, there will be 1.5
billion wirelessly connected devices excluding mobile
phones[5]. Now a days, there are approx 2 billion
wirelessly connected devices which can gather
information from the sensors, analyse this data and send
the information to other devices to perform some task.
Machine receives the information and perform the
operation with the help of actuators, sensors, embedded
processors and application software[12].
Application - In industrial work, a machine can sense the
work efficiency of the machine and work accordingly for
maximum output. Smart homes where objects can
communicate with each other like when there is no one in
the home and unfortunately the owner forgot to lock the
home then smart home will sense that there is no motion in
the home and it will lock the home and send the unlock
key to the owner[13]. The same application is smart water
supply, if there is a leakage then the machine sensor will
sense this and send the information to the server. It will
help to stop the wastage of water[24].
Issues - The key issues in M2M are -
In M2M technology, devices or groups can use different
naming process. Devices can use different names for their
working or same name can be assigned different devices,
objects or groups. They can also use some temporary id,
names and URIs for their communication. IP addresses are
also used to make communication among the devices or
connected groups. These addresses may be of individual
device or multicast address for group of connected devices
or some other address schemes to make connectivity and
communication[26].
In this way we can say that M2M devices are unnamed
and have very less security. So it has several security
issues and threats like hacking, unauthorized access,
tampering etc. Some moving devices have problems of
monitoring and linking with their base stations,
geographical change may cause some effects on the
network and it may get disconnected for some time or for
a long time. It is a major security issue and some sort of
attack can be encountered. These devices also require
timely updates so that it will become aware from security
threats. M2M devices are moving or stationary, so there
are lots of devices which need to be operate and update but
some of them are wireless and some are not, so it has not
been easy to access each and every device manually. This
will lead more vulnerabilities to these devices.[5]
4.4 Vehicle to Vehicle Communication (V2V)
In this technology the objects are vehicles, which
can communicate with another vehicle or the sensors
around them. The main aspect of concern here is, there is
no proper method to define the protocols because the
object is moving and communicating with another moving
object or with the sensors on the roadside[6]. So we are
not able to define any routing protocol. This
communication can work for a long distance and make an
efficient communication among objects. This technology
was designed primarily with the aims of traffic control,
safety and accident avoidance.
Application - Smart cars are the application of M2M, a
car which is driverless or a car which have sensors and
sense the speed of the nearby car who is getting slow
uncertainly. So the car can also be slow down to avoid
accident[10].
Issues – The key issue in V2V are -
The main concern of V2V is the loss of connectivity when
any other object comes in between the communicating
devices. If they are not in a proper distance and proper line
of sight then they will not be able to continue in connected
state[10].
Moving vehicles will also create several difficulties during
establishment of communication. There may be change in
topology when there is a change in the network.
Sometimes device will not have the network or have little
range of network, so the data will not be send or receive
properly and device will not work accurately. This will
lead to great problem.[6]
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3663-3668 (2018) ISSN: 0975-0290
3667
Fig. 4 – Applications of IoT
5 CONCLUSION
Internet of Things depends on Internet, sensors technology
which makes the communication possible among devices
by implementing different protocols.
After doing the literature survey some major issues are
observed, like the interrupted connectivity among devices
effecting the communication. Also there is compatibility
issue in devices. Security of devices during
communication process and security of communication
channel or link is also a major issue. Lots of work is to be
done for the betterment and progress of this field; still
there is more work to do, more standardization of
technology, protocols and hardware are required to make
completely reliable and secure domain of Internet of
Thing. Some global guidelines should be used for this
purpose. The future is totally depends on Internet of
Thing, so lot of thing to do at implementation level. In
order to resolve security issues in IoT domain we propose
to implement the concept of Block Chain in IoT. We will
have deep discussion on principals and implementation of
Block Chain in our further works.
ACKNOWLEDGEMENTS
The authors are thankful for all the experts who contribute
to prepare this research paper directly or indirectly.
REFERENCES
[1] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M.
Aledhari, and M. Ayyash, "Internet of things: A
survey on enabling technologies, protocols, and
applications," IEEE Communications Surveys &
Tutorials, vol. 17, pp. 2347-2376, 2015.
[2] Somayya Madakam, R. Ramaswamy, Siddharth
Tripathi, “Internet of Things (IoT): A Literature
Review,” Journal of Computer and Communications,
2015, 3, 164-173
[3] Gerald, Josef,Christian and Josef Scharinger, “NFC
Devices: Security and Privacy”, ARES 08
proceedings of the 2008 Third International
Conference on Availability, Reliability and Security,
IEEE Computing Society, Washington, DC, USA,
2008
[4] Want, R. (2006) An Introduction to RFID
Technology. IEEE Pervasive Computing, 5, 25-33.
[5] H. C. Chen, M. A. A. Faruque and P. H. Chou,
"Security and privacy challenges in IoT-based
machine-to-machine collaborative scenarios," 2016
International Conference on Hardware/Software
Codesign and System Synthesis (CODES+ISSS),
Pittsburgh, PA, 2016, pp. 1-2.
[6] Y.Usha Devi, Dr. M.S.S.Rukmini, “IoT in Connected
Vehicles: Challenges andIssues- A Review,”
International conference on Signal Processing,
Communication, Power and Embedded System
(SCOPES)-2016.
[7] A. Juels, "RFID security and privacy: a research
survey," in IEEE Journal on Selected Areas in
Communications, vol. 24, no. 2, pp. 381-394, Feb.
2006.
[8] Miao W., Ting L., Fei L., ling S., Hui D., 2010.
Research on the architecture of Internet of things.
IEEE International Conference on Advanced
Computer Theory and Engineering (ICACTE),
Sichuan province, China, Pages: 484-487.
[9] Luigi A., Antonio I., Giacomo M. 2010.The Internet
of Things: A survey. Science Direct journal of
Computer Networks, Volume 54, Pages: 2787–2805.
[10] G. Burnham, J. Seo G. Bekey, A. Identification of
Human Driver Models in Car Following. IEEE
Transactions on Automatic Control 19, 6, 1974, pp.
911–915.
[11] J. Deng, R. Han, and S. Mishra, Secure Code
Distribution in Dynamically Programmable Wireless
Sensor Networks, Proc. of ACM/IEEE IPSN, 2006.
pp. 292-300.
[12] J. Stankovic, A Vision of a Smart City in the Future,
Smart Cities, Vol. 1, Issue 10, Oct. 2013.
[13] Anvari-Moghaddam, A., Monsef, H. and Rahimi-
Kian, A. (2015) Optima Smart Home Energy
Management Consi- dering Energy Saving and a
Comfortable Lifestyle. IEEE Transactions on Smart
Grid, 6, 324-332.
http://dx.doi.org/10.1109/TSG.2014.2349352.
[14] E. Welbourne, l. Battle, g. Cole, k. Gould, k. Rector,
s. Raymer, et ̘al., building the internet of things using
rfid the rfid ecosystem ̘experience, ieee internet
comput. 13 (2009) 48–55.
[15] A. Juels, rfid security and privacy: a research survey,
ieee j sel ̘areacomm. 24 (2006) 381–394.
[16] Ruchi Parashar, Abid Khan, Neha, “A SURVEY:
THE INTERNET OF THINGS,” International
Journal of Technical Research and Applications e-
ISSN: 2320-8163, Volume 4, Issue 3 (May-June,
2016).
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3663-3668 (2018) ISSN: 0975-0290
3668
[17] Shashank Agrawal, Dario Vieira, “A survey on
Internet of Things,” Abakós, Belo Horizonte,v. 1, n.
2, p. 78 – 95, maio 2013 – ISSN:2316–9451.
[18] Yinghui H., Guanyu L., 2010. Descriptive Models
for Internet of Things. IEEE International
Conference on Intelligent Control and Information
Processing, Dalian, China, Pages: 483- 486.
[19] Tongzhu Z., Xueping W., Jiangwei C., Xianghai L.,
Pengfei C., 2010 .Automotive recycling information
management based on the internet of things and
RFID technology. IEEE International Conference on
Advanced Management Science (ICAMS),
Changchun, China, page(s):620 – 622.
[20] Muriel D., Juan F., 2010. Expanding the learning
environment: combining physicality and virtuality
The Internet of Things for eLearning. IEEE
International Conference on Advanced Learning
Technologies (ICALT), Sousse, Tunisia, Pages: 730-
731.
[21] D. Giusto, A. Iera, G. Morabito, L. Atzori (Eds.), The
Internet of Things, Springer, 2010. ISBN: 978-1-
4419-1673-0.
[22] Ms.Neha Kamdar, Vinita Sharma, Sudhanshu Nayak,
“A Survey paper on RFID Technology, its
Applications and Classification of Security/Privacy
Attacks and Solutions,” IRACST - International
Journal of Computer Science and Information
Technology & Security (IJCSITS), ISSN: 2249-9555
Vol.6, No4, July-August 2016
[23] Pallavi Sethi and Smruti R. Sarangi, “ Internet of
Things: Architectures, Protocols, and Applications,”
Journal of Electrical and Computer Engineering
Volume 2017, Article ID 9324035, 25 pages
[24] Prajakta Pande and Anand R. Padwalkar, “Internet of
Things –A Future of Internet: A Survey”,
International Journal of Advance Research in
Computer Science and Management Studies
Research Article / Paper / Case Study Volume 2 ,
Issue 2 , February 2014 pg . 354 - 361
[25] Salonie Vyas, Umang Chaudhari, V. Chinmay
Nandini, Bhushan Thakare, “State of the Art
Literature Survey 2015 on RFID,” International
Journal of Computer Applications (0975 – 8887)
Volume 131 – No.8, December2015
[26] White Paper on “Machine-to-Machine
Communication (M2M)”
[27] S. Riazul Islam, D. Kwak, M. Humaun Kabir, M.
Hossain, and K.S. Kwak, "The internet of things for
health care: a comprehensive survey," IEEE Access,
vol. 3, pp. 678-708, 2015.
[28] Anusha Rahul, Gokul Krishnan G, Unni Krishnan H
and Sethuraman Rao, “NEAR FIELD
COMMUNICATION (NFC) TECHNOLOGY: A
SURVEY,” International Journal on Cybernetics &
Informatics (IJCI) Vol. 4, No. 2, April 2015
[29] Handong Zhang and Lin Zhu, "Internet of Things:
Key technology, architecture and challenging
problems," 2011 IEEE International Conference on
Computer Science and Automation Engineering,
Shanghai, 2011, pp. 507-512.
AUTHORS BIOGRAPHY
Dr. Krishan Kumar Goyal received
M.Tech in Computer science from U.P.
Technical University, Lucknow. He has
received Ph.D. in cryptography from Dr.
B. R. Ambedkar University, Agra. He has
also received master's degree in Computer
Application & Mathematics from Dr. B.R. Ambedkar
University, Agra. Presently, he is working as an Associate
Professor in the Department of Computer Application at
Raja Balwant Singh Management Technical Campus,
Agra. He has participated in several faculty development
programs, seminars and workshops. He has published
several research papers in leading journals of national and
international repute. Apart from this he has authored two
books Concept Of Computer and C Programming and
Trouble Free C. He is member of several societies such as
IEEE, Computer Society of India, Ramanujan
Mathematical Society of India, Cryptology Research
Society of India etc. He is also a reviewer and member of
editorial board of different national and international
journals. His area of interest includes programming
languages such as C, C++, Java, Data Structure, Design
and Analysis of Algorithms, Cryptography, Cloud
Computing, IoT and Data science.
Mr. Amit Garg is presently working a
Associate professor in department of
Computer Application at MIET Meerut
and having rich 16 year experience of
teaching P.G. & U.G. students. He
obtained B.Sc.(PCM) from CCS University Meerut,
M.C.A. from Agra University, M.Tech. in Computer
Science from UPTU Lucknow. Now he is perusing his
Ph.D. in Computer Science from IFTM University
Moradabad. He has life time membership of IAENG and
ISRD. He works in the field of Algorithms, MANET and
Internet of Things.
Mr. Saurabh Singhal is currently
working as Assistant Professor in
department of Computer Application at
MIET, Meerut. He is enriched with 9
year experience of teaching students of
UG and PG level. He has obtain BCA (CCS University
Meerut), MCA (UPTU, Lucknow) and M. Tech
(MBU,H.P.). Also publish papers in several national and
international journals. He is life time member of IAENG
and ISRD. His area of research includes Cyber Security,
Big Data, and Data Analytics & IoT.
Mr. Ankur Rastogi is presently working
as Assistant Professor in department of
computer application at MIET Meerut.
He has a vast teaching experience of 9
years. He has qualified UGC-NET exam
in 2016. He obtained B. Sc. (PCM) from CCS University,
MCA from UPTU Lucknow. He is well versed with latest
programming technology like Android, Python etc. He
believes in principle of just in time programming. He is
life time member of ISRD and IAENG. His research area
includes Data Analytics, IoT, and Security constraints in
IoT through Block chain.

More Related Content

What's hot

Iot ppt
Iot pptIot ppt
Iot pptpiyuu7
 
Home Automation using Iot
Home Automation using IotHome Automation using Iot
Home Automation using IotRabiya Mustafa
 
Home Automation System using iot
Home Automation System using iotHome Automation System using iot
Home Automation System using iotKowshik Deb
 
Smart home Environment using iot
Smart home Environment using iotSmart home Environment using iot
Smart home Environment using iotparvathy s m
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarRAJESHKUMARG12
 
IoT home automation project
IoT home automation projectIoT home automation project
IoT home automation projectShohin Aheleroff
 
Home Automation using IOT
Home Automation using IOTHome Automation using IOT
Home Automation using IOTNaveensing87
 
CONTROLLING HOME APPLIANCES WITH IOT,BLYNK APP & NODE MCU
CONTROLLING HOME APPLIANCES WITH IOT,BLYNK APP & NODE MCUCONTROLLING HOME APPLIANCES WITH IOT,BLYNK APP & NODE MCU
CONTROLLING HOME APPLIANCES WITH IOT,BLYNK APP & NODE MCUVINAY KUMAR GUDELA
 
Internet of things - challenges scopes and solutions
Internet of things - challenges scopes and solutionsInternet of things - challenges scopes and solutions
Internet of things - challenges scopes and solutionsShivam Kumar
 
Home automation using IoT literature review ppt
Home automation using IoT literature review pptHome automation using IoT literature review ppt
Home automation using IoT literature review pptTanujkumar101
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Internet of things
Internet of thingsInternet of things
Internet of thingsPalak Sood
 
Internet of things startup basic
Internet of things  startup basicInternet of things  startup basic
Internet of things startup basicMathan kumar
 
Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Brundha Sholaganga
 
Internet of Things (IoT) and its applications
Internet of Things (IoT) and its applicationsInternet of Things (IoT) and its applications
Internet of Things (IoT) and its applicationsSarwan Singh
 
Smart Home Automation using Voice Assistant
Smart Home Automation using Voice AssistantSmart Home Automation using Voice Assistant
Smart Home Automation using Voice AssistantTezpur University
 

What's hot (20)

Iot ppt
Iot pptIot ppt
Iot ppt
 
Home Automation using Iot
Home Automation using IotHome Automation using Iot
Home Automation using Iot
 
Home Automation System using iot
Home Automation System using iotHome Automation System using iot
Home Automation System using iot
 
Smart home Environment using iot
Smart home Environment using iotSmart home Environment using iot
Smart home Environment using iot
 
IOT DATA AND BIG DATA
IOT DATA AND BIG DATAIOT DATA AND BIG DATA
IOT DATA AND BIG DATA
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
 
IoT home automation project
IoT home automation projectIoT home automation project
IoT home automation project
 
Home Automation using IOT
Home Automation using IOTHome Automation using IOT
Home Automation using IOT
 
CONTROLLING HOME APPLIANCES WITH IOT,BLYNK APP & NODE MCU
CONTROLLING HOME APPLIANCES WITH IOT,BLYNK APP & NODE MCUCONTROLLING HOME APPLIANCES WITH IOT,BLYNK APP & NODE MCU
CONTROLLING HOME APPLIANCES WITH IOT,BLYNK APP & NODE MCU
 
Internet of things - challenges scopes and solutions
Internet of things - challenges scopes and solutionsInternet of things - challenges scopes and solutions
Internet of things - challenges scopes and solutions
 
Home automation using IoT literature review ppt
Home automation using IoT literature review pptHome automation using IoT literature review ppt
Home automation using IoT literature review ppt
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IOT report
IOT reportIOT report
IOT report
 
Internet of things startup basic
Internet of things  startup basicInternet of things  startup basic
Internet of things startup basic
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...
 
Internet of Things (IoT) and its applications
Internet of Things (IoT) and its applicationsInternet of Things (IoT) and its applications
Internet of Things (IoT) and its applications
 
Smart Home Automation using Voice Assistant
Smart Home Automation using Voice AssistantSmart Home Automation using Voice Assistant
Smart Home Automation using Voice Assistant
 
Internet of Things presentation
Internet of Things presentationInternet of Things presentation
Internet of Things presentation
 

Similar to A Literature Survey on Internet of Things (IoT)

A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of ThingsIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of ThingsIRJET Journal
 
A Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoTA Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoTIRJET Journal
 
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...
Implementation of IoT in Agriculture: A Scientific  Approach for Smart Irriga...Implementation of IoT in Agriculture: A Scientific  Approach for Smart Irriga...
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...Springer
 
IRJET- Farmer’s friend: Utilization of IoT and Web Application in Agricul...
IRJET-  	  Farmer’s friend: Utilization of IoT and Web Application in Agricul...IRJET-  	  Farmer’s friend: Utilization of IoT and Web Application in Agricul...
IRJET- Farmer’s friend: Utilization of IoT and Web Application in Agricul...IRJET Journal
 
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONSA REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONSIRJET Journal
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET Journal
 
Towards Internet of Things: Survey and Future Vision
Towards Internet of Things: Survey and Future VisionTowards Internet of Things: Survey and Future Vision
Towards Internet of Things: Survey and Future VisionCSCJournals
 
IRJET- IoT and Bigdata Analytics Approach using Smart Home Energy Managem...
IRJET-  	  IoT and Bigdata Analytics Approach using Smart Home Energy Managem...IRJET-  	  IoT and Bigdata Analytics Approach using Smart Home Energy Managem...
IRJET- IoT and Bigdata Analytics Approach using Smart Home Energy Managem...IRJET Journal
 
Internet of Things – Technical landscape (1).pptx
Internet of Things – Technical landscape (1).pptxInternet of Things – Technical landscape (1).pptx
Internet of Things – Technical landscape (1).pptxEhabRushdy1
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
IRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of ThingsIRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of ThingsIRJET Journal
 
IRJET- High Responsive Smart Parking System using IoT
IRJET- High Responsive Smart Parking System using IoTIRJET- High Responsive Smart Parking System using IoT
IRJET- High Responsive Smart Parking System using IoTIRJET Journal
 
A Review on Internet of Things (IoT) in Agriculture: Benefits, Challenges and...
A Review on Internet of Things (IoT) in Agriculture: Benefits, Challenges and...A Review on Internet of Things (IoT) in Agriculture: Benefits, Challenges and...
A Review on Internet of Things (IoT) in Agriculture: Benefits, Challenges and...IRJET Journal
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfKanagarajanSwamiappa
 

Similar to A Literature Survey on Internet of Things (IoT) (20)

A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of Things
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of Things
 
A Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoTA Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoT
 
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...
Implementation of IoT in Agriculture: A Scientific  Approach for Smart Irriga...Implementation of IoT in Agriculture: A Scientific  Approach for Smart Irriga...
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...
 
IRJET- Farmer’s friend: Utilization of IoT and Web Application in Agricul...
IRJET-  	  Farmer’s friend: Utilization of IoT and Web Application in Agricul...IRJET-  	  Farmer’s friend: Utilization of IoT and Web Application in Agricul...
IRJET- Farmer’s friend: Utilization of IoT and Web Application in Agricul...
 
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONSA REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 
Towards Internet of Things: Survey and Future Vision
Towards Internet of Things: Survey and Future VisionTowards Internet of Things: Survey and Future Vision
Towards Internet of Things: Survey and Future Vision
 
IRJET- IoT and Bigdata Analytics Approach using Smart Home Energy Managem...
IRJET-  	  IoT and Bigdata Analytics Approach using Smart Home Energy Managem...IRJET-  	  IoT and Bigdata Analytics Approach using Smart Home Energy Managem...
IRJET- IoT and Bigdata Analytics Approach using Smart Home Energy Managem...
 
Internet of Things – Technical landscape (1).pptx
Internet of Things – Technical landscape (1).pptxInternet of Things – Technical landscape (1).pptx
Internet of Things – Technical landscape (1).pptx
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
IRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of ThingsIRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of Things
 
IRJET- High Responsive Smart Parking System using IoT
IRJET- High Responsive Smart Parking System using IoTIRJET- High Responsive Smart Parking System using IoT
IRJET- High Responsive Smart Parking System using IoT
 
A Review on Internet of Things (IoT) in Agriculture: Benefits, Challenges and...
A Review on Internet of Things (IoT) in Agriculture: Benefits, Challenges and...A Review on Internet of Things (IoT) in Agriculture: Benefits, Challenges and...
A Review on Internet of Things (IoT) in Agriculture: Benefits, Challenges and...
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 
Bandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASH
Bandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASHBandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASH
Bandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASHEswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 
Bandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASH
Bandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASHBandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASH
Bandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASH
 

Recently uploaded

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 

Recently uploaded (20)

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

A Literature Survey on Internet of Things (IoT)

  • 1. Int. J. Advanced Networking and Applications Volume: 09 Issue: 06 Pages: 3663-3668 (2018) ISSN: 0975-0290 3663 A Literature Survey on Internet of Things (IoT) Krishan Kumar Goyal Department of Computer Application, R. B. S. Management Technical Campus, Agra. Email: kkgoyal@gmail.com Amit Garg Department of Computer Application, Meerut Institute of Engineering & Technology, Meerut Email: foramitgarg@gmail.com Ankur Rastogi Department of Computer Application, Meerut Institute of Engineering & Technology, Meerut Email: ankurrastogi88@gmail.com Saurabh Singhal Department of Computer Application, Meerut Institute of Engineering & Technology, Meerut Email: saurabh.singhal09@gmail.com -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding trends and details in the field of IoT in systematic manner. It will be helpful for further research. Keywords - Internet of Things. -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: March 07, 2018 Date of Acceptance: March 24, 2018 -------------------------------------------------------------------------------------------------------------------------------------------------- 1 INTRODUCTION Internet of Things can be defined as the collection of two terms: one is Internet, which is defined as networks of networks which can connect billions of users with some standard internet protocols[2]. Internet connect several different sectors and department while using different technologies. Several devices like mobile, personal systems and business organizations are connected to Internet. The second term is Thing, this term is basically mean to these devices or objects which turn into intelligent objects[17]. Moreover this it is also a part of all objects of this real world. If we want to define IOT then we can not define it precisely and concisely but Vermesan et al. defined the Internet of Things as simply an interaction between the physical and digital worlds. The digital world interacts with the physical world using a plethora of sensors and actuators [8]. IoT can also be defined as “An open and comprehensive network of intelligent objects that have the capacity to auto-organize, share information, data and resources, reacting and acting in face of situations and changes in the environment”[22]. 2 HISTORY OF IOT The IoT domain leads to world of technology and communication to a new era where objects can communicate, compute and transform the information as per the requirements. This scenario of communication has already been started but didn’t get recognition. The term Internet of Things was coined by Kevin Auston, the Executive Director of Auto-ID Labs in MIT in 1999. The concept of IoT first became very popular through the Auto-ID centre in 2003 and in related market analytics and it’s publications[1]. When the concept of such communication came into existence, different companies focused on it and tried to recognize it’s significance and began to identify its role and the correlated future aspects, then these companies started investing in the domain of IOT in different periods but at regular intervals of time[9]. PEOPLE MOBILE PC Fig. 1 – Basics of Internet of Things
  • 2. Int. J. Advanced Networking and Applications Volume: 09 Issue: 06 Pages: 3663-3668 (2018) ISSN: 0975-0290 3664 Year Industrial Participation & Involvement 2000 LG announced its first Internet of refrigerator plans 2003 RFID is deployed in US Dept of Defence 2005 UN’s International Telecommunications Union (ITU) published its first report on the Internet of Things 2008 Recognition by the EU and the First European IoT conference is held. A group of companies launched the IPSO Alliance to promote the use of IP in networks of “Smart Objects” and to enable the Internet of Things. The FCC voted 5-0 to approve opening the use of the ‘white space’ spectrum 2009 The IoT was born according to Cisco’s Business Solutions Group 2010 Chinese Premier Wen Jiabao calls the IoT a key industry for China and has plans to make major investments in Internet of Things 2011 IPv6 public launch-The new protocol allows for 340, 282, 366, 920, 938, 463, 463, 374, 607, 431,768,211, 456 (2128 ) addresses Table – 1 History of Internet of Things 3 ARCHITECTURE Implementation of IoT concept is basically depends on its architecture. In the initial phase of research the 3 layer architecture was introduced [8], which have three layers the perception, network and application layers. Fig. 2 - 3 Layer Architecture 1. Perception Layer - This layer also called as physical layer, gathers data/information and recognises the physical world. In this layer all the actuators work according to the information which is collected by the sensors of different object in order to perform specific operations by the corresponding objects[18]. 2. Network Layer - Network layer is the middle one, it establishes an interface link between application layer and perceptual layer. It is responsible for the initial processing of data, broadcasting of data and connecting devices[8]. 3. Application Layer - Application layer is the implementation of IoT. The working of sensors and actuators is achieved by application layer. We can understand it as software which works on and for the sensors other virtually intelligent objects. This three layer architecture of Internet of Things is not a sufficient for the today’s technology. So a new architecture was designed to define the entire concept of it’s working and development of IoT devices. The new architecture involves 5 layers and is known as 5 Layer architecture [29]. New architecture has perception, transport, processing, application and business layers: Fig. 3 - 5 Layer Architecture 1. Perception layer works in a similar manner as previously described in the 3 layer architecture. It is used to take information from the sensors and implement it. 2. Transport layer takes the data from the perception layer and pass this data to the next layer which is processing layer and vice versa. This will done with the help of networks like LAN, wireless technology, 3G, 4G, LTE, RFID etc[8]. 3. Processing layer which is third layer has to perform the major task because it will process all the information gathered by the perception layer. There is a huge amount of data which will be stored with the help of some techniques like cloud computing or any DBMS. Then it will analyse how to fetch data whenever required in order to complete the desired task[23]. 4. Application layer is next layer which implements the working of IoT. For this an application is required with the corresponding device in order to complete the desired task. 5. Business layer is the last layer of this architecture which manages the working of entire system along with many other features, one of them is privacy[1]. Both the architectures are defining the working of IoT system of different types but they all are following the same sort of working in order to achieve its goal.
  • 3. Int. J. Advanced Networking and Applications Volume: 09 Issue: 06 Pages: 3663-3668 (2018) ISSN: 0975-0290 3665 4 TECHNOLOGIES There are various technologies which are used to define IOT, but the four main technologies are as follows[9]: 1. Radio Frequency Identification (RFID) 2. Near Field Communication (NFC) 3. Machine to Machine Communication (MtoM) 4. Vehicle to Vehicle Communication (VtoV) 4.1. Radio Frequency Identification (RFID) RFID is a system in which there is a reader to read many tags[4]. It uses the technology of radio waves to send the information of an object in the form of serial number which is attached to the tag. It uses the electromagnetic fields to transfer the data on the tags so that it can automatically identify and track the objects, corresponding to a particular tag[1]. As we already mention that RFID technology is based on reader and tags, so in the initial phase of research RFID defines in three configurations:-  Active RFID  Passive RFID  Active Reader Active Tag Active RFID - (Passive Reader Active Tag), the reader receives the signal or information from the device which runs on battery and this battery is operated by a device called active tag. This information exchange will take place in limited range of the active tags and the passive readers which is from 1-2000 feet depending upon the architecture[14]. Passive RFID - The second one is Passive RFID (Active Reader Passive Tag), most commonly used, such tag does not have any battery or onboard power supplies, so it requires energy to send the data and thus harvests the energy from the RFID reader. Active Reader Active Tag - The last one both the reader and tags are active so it is an Active Reader Active Tag. Although both the reader and the tags are active, but tags will start sending information only when it is awoken by the reader or when it comes in the proximity of the reader[19]. So by this we can say that the main components of this technology are tag, reader, power supply, antenna, access controller, software and server. Application - RFID has a very limited use only for identification and tracking. As we know that it works on frequency and within a limited range. So it can work for such applications like smart grocery, smart cabinet, smart fridge, smart appliances, smart currency etc[14]. In these scenarios there is a tag on product and a reader to scan the tag. In a grocery shop we put tags on the products and when the product passes through that reader, the reader will catch it. In this way it can be tracked that which product is moving out of the shop and what inventory is left for that corresponding product. In the same way if a fridge can sense what is putting in it and what is taking out from it, it can also be done by RFID. One another very useful and common application of this technology is on airport where the baggages are tagged and read at another place. Issues - There are several issues with RFID. It works on specific range of frequencies; if these frequencies differ at different places then it will create a problem in reading a tag at different locations. It is also difficult to read more than one tag simultaneously[15]. There are methods to overcome this problem but very costly. Tags have to be implemented on the product and all the tags are different and unique, which includes some cost. The inclusion of cost is not comfortable all the time when comparing and concerning with the cost of product [4]. 4.2 Near Field Communication (NFC) Near Field Communication is somehow little bit similar to RFID, it combines a RFID reader in a mobile phone, which makes it better, reliable and efficient for the users. Near Field Communication is a short-range wireless technology with the frequency of 13.56 MHz, typically work for very small distance up to 4 cm[3]. Allows intuitive initialization of wireless networks and NFC is complementary to Bluetooth and 802.11 with their long distance capabilities at a distance circa up to 10 cm. It is first developed by Philips and Sony companies. Data exchange was approximately 424 kbps. Power consumption during data reading in NFC is under 15ma[2]. There are two modes in NFC technology:  Active  Passive Active Mode - In active mode both the devices are active and communicate with each other by sending the signals. Passive Mode - In passive mode one of the device sends the signal rather other just receiving it[28]. NFC doesn’t need pairing, it cannot work from a long distance and in this way this technology is secure and use for mobile payments. Application - NFC works in a very short range so the devices must be kept nearby. It has several applications, the most important one is Payment App. Today, we have several applications (apps) by which one can pay without using a card, in this scenario the device works as a virtual card and the transaction will take place. One can exchange their business card with the help of their devices. They just touch their devices and their business cards will be exchanged. If a information is required than use the device with the smart poster and get all the information with a single touch[21]. It can also work while travelling; a
  • 4. Int. J. Advanced Networking and Applications Volume: 09 Issue: 06 Pages: 3663-3668 (2018) ISSN: 0975-0290 3666 person can book a travel ticket or a room in a hotel. While booking keys are given to the person, when person touch the device on the appropriate devices, the work is done and the person will move in. Issues - These devices will work on a very small range, so this is one of the major issues. Two devices of two different manufacturers can create some compatibility issue in their communication. Due to this reason a monopoly may exist in market[3]. 4.3 Machine to Machine Communication (M2M) Machine-to-Machine (M2M) refers to the communications between computers, embedded processors, smart sensors, actuators and mobile devices (DYE, 2008). The use of M2M communication is increasing in the scenario at a fast pace. For instance, researchers predicted that, by 2014, there will be 1.5 billion wirelessly connected devices excluding mobile phones[5]. Now a days, there are approx 2 billion wirelessly connected devices which can gather information from the sensors, analyse this data and send the information to other devices to perform some task. Machine receives the information and perform the operation with the help of actuators, sensors, embedded processors and application software[12]. Application - In industrial work, a machine can sense the work efficiency of the machine and work accordingly for maximum output. Smart homes where objects can communicate with each other like when there is no one in the home and unfortunately the owner forgot to lock the home then smart home will sense that there is no motion in the home and it will lock the home and send the unlock key to the owner[13]. The same application is smart water supply, if there is a leakage then the machine sensor will sense this and send the information to the server. It will help to stop the wastage of water[24]. Issues - The key issues in M2M are - In M2M technology, devices or groups can use different naming process. Devices can use different names for their working or same name can be assigned different devices, objects or groups. They can also use some temporary id, names and URIs for their communication. IP addresses are also used to make communication among the devices or connected groups. These addresses may be of individual device or multicast address for group of connected devices or some other address schemes to make connectivity and communication[26]. In this way we can say that M2M devices are unnamed and have very less security. So it has several security issues and threats like hacking, unauthorized access, tampering etc. Some moving devices have problems of monitoring and linking with their base stations, geographical change may cause some effects on the network and it may get disconnected for some time or for a long time. It is a major security issue and some sort of attack can be encountered. These devices also require timely updates so that it will become aware from security threats. M2M devices are moving or stationary, so there are lots of devices which need to be operate and update but some of them are wireless and some are not, so it has not been easy to access each and every device manually. This will lead more vulnerabilities to these devices.[5] 4.4 Vehicle to Vehicle Communication (V2V) In this technology the objects are vehicles, which can communicate with another vehicle or the sensors around them. The main aspect of concern here is, there is no proper method to define the protocols because the object is moving and communicating with another moving object or with the sensors on the roadside[6]. So we are not able to define any routing protocol. This communication can work for a long distance and make an efficient communication among objects. This technology was designed primarily with the aims of traffic control, safety and accident avoidance. Application - Smart cars are the application of M2M, a car which is driverless or a car which have sensors and sense the speed of the nearby car who is getting slow uncertainly. So the car can also be slow down to avoid accident[10]. Issues – The key issue in V2V are - The main concern of V2V is the loss of connectivity when any other object comes in between the communicating devices. If they are not in a proper distance and proper line of sight then they will not be able to continue in connected state[10]. Moving vehicles will also create several difficulties during establishment of communication. There may be change in topology when there is a change in the network. Sometimes device will not have the network or have little range of network, so the data will not be send or receive properly and device will not work accurately. This will lead to great problem.[6]
  • 5. Int. J. Advanced Networking and Applications Volume: 09 Issue: 06 Pages: 3663-3668 (2018) ISSN: 0975-0290 3667 Fig. 4 – Applications of IoT 5 CONCLUSION Internet of Things depends on Internet, sensors technology which makes the communication possible among devices by implementing different protocols. After doing the literature survey some major issues are observed, like the interrupted connectivity among devices effecting the communication. Also there is compatibility issue in devices. Security of devices during communication process and security of communication channel or link is also a major issue. Lots of work is to be done for the betterment and progress of this field; still there is more work to do, more standardization of technology, protocols and hardware are required to make completely reliable and secure domain of Internet of Thing. Some global guidelines should be used for this purpose. The future is totally depends on Internet of Thing, so lot of thing to do at implementation level. In order to resolve security issues in IoT domain we propose to implement the concept of Block Chain in IoT. We will have deep discussion on principals and implementation of Block Chain in our further works. ACKNOWLEDGEMENTS The authors are thankful for all the experts who contribute to prepare this research paper directly or indirectly. REFERENCES [1] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of things: A survey on enabling technologies, protocols, and applications," IEEE Communications Surveys & Tutorials, vol. 17, pp. 2347-2376, 2015. [2] Somayya Madakam, R. Ramaswamy, Siddharth Tripathi, “Internet of Things (IoT): A Literature Review,” Journal of Computer and Communications, 2015, 3, 164-173 [3] Gerald, Josef,Christian and Josef Scharinger, “NFC Devices: Security and Privacy”, ARES 08 proceedings of the 2008 Third International Conference on Availability, Reliability and Security, IEEE Computing Society, Washington, DC, USA, 2008 [4] Want, R. (2006) An Introduction to RFID Technology. IEEE Pervasive Computing, 5, 25-33. [5] H. C. Chen, M. A. A. Faruque and P. H. Chou, "Security and privacy challenges in IoT-based machine-to-machine collaborative scenarios," 2016 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS), Pittsburgh, PA, 2016, pp. 1-2. [6] Y.Usha Devi, Dr. M.S.S.Rukmini, “IoT in Connected Vehicles: Challenges andIssues- A Review,” International conference on Signal Processing, Communication, Power and Embedded System (SCOPES)-2016. [7] A. Juels, "RFID security and privacy: a research survey," in IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, Feb. 2006. [8] Miao W., Ting L., Fei L., ling S., Hui D., 2010. Research on the architecture of Internet of things. IEEE International Conference on Advanced Computer Theory and Engineering (ICACTE), Sichuan province, China, Pages: 484-487. [9] Luigi A., Antonio I., Giacomo M. 2010.The Internet of Things: A survey. Science Direct journal of Computer Networks, Volume 54, Pages: 2787–2805. [10] G. Burnham, J. Seo G. Bekey, A. Identification of Human Driver Models in Car Following. IEEE Transactions on Automatic Control 19, 6, 1974, pp. 911–915. [11] J. Deng, R. Han, and S. Mishra, Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks, Proc. of ACM/IEEE IPSN, 2006. pp. 292-300. [12] J. Stankovic, A Vision of a Smart City in the Future, Smart Cities, Vol. 1, Issue 10, Oct. 2013. [13] Anvari-Moghaddam, A., Monsef, H. and Rahimi- Kian, A. (2015) Optima Smart Home Energy Management Consi- dering Energy Saving and a Comfortable Lifestyle. IEEE Transactions on Smart Grid, 6, 324-332. http://dx.doi.org/10.1109/TSG.2014.2349352. [14] E. Welbourne, l. Battle, g. Cole, k. Gould, k. Rector, s. Raymer, et ̘al., building the internet of things using rfid the rfid ecosystem ̘experience, ieee internet comput. 13 (2009) 48–55. [15] A. Juels, rfid security and privacy: a research survey, ieee j sel ̘areacomm. 24 (2006) 381–394. [16] Ruchi Parashar, Abid Khan, Neha, “A SURVEY: THE INTERNET OF THINGS,” International Journal of Technical Research and Applications e- ISSN: 2320-8163, Volume 4, Issue 3 (May-June, 2016).
  • 6. Int. J. Advanced Networking and Applications Volume: 09 Issue: 06 Pages: 3663-3668 (2018) ISSN: 0975-0290 3668 [17] Shashank Agrawal, Dario Vieira, “A survey on Internet of Things,” Abakós, Belo Horizonte,v. 1, n. 2, p. 78 – 95, maio 2013 – ISSN:2316–9451. [18] Yinghui H., Guanyu L., 2010. Descriptive Models for Internet of Things. IEEE International Conference on Intelligent Control and Information Processing, Dalian, China, Pages: 483- 486. [19] Tongzhu Z., Xueping W., Jiangwei C., Xianghai L., Pengfei C., 2010 .Automotive recycling information management based on the internet of things and RFID technology. IEEE International Conference on Advanced Management Science (ICAMS), Changchun, China, page(s):620 – 622. [20] Muriel D., Juan F., 2010. Expanding the learning environment: combining physicality and virtuality The Internet of Things for eLearning. IEEE International Conference on Advanced Learning Technologies (ICALT), Sousse, Tunisia, Pages: 730- 731. [21] D. Giusto, A. Iera, G. Morabito, L. Atzori (Eds.), The Internet of Things, Springer, 2010. ISBN: 978-1- 4419-1673-0. [22] Ms.Neha Kamdar, Vinita Sharma, Sudhanshu Nayak, “A Survey paper on RFID Technology, its Applications and Classification of Security/Privacy Attacks and Solutions,” IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555 Vol.6, No4, July-August 2016 [23] Pallavi Sethi and Smruti R. Sarangi, “ Internet of Things: Architectures, Protocols, and Applications,” Journal of Electrical and Computer Engineering Volume 2017, Article ID 9324035, 25 pages [24] Prajakta Pande and Anand R. Padwalkar, “Internet of Things –A Future of Internet: A Survey”, International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Volume 2 , Issue 2 , February 2014 pg . 354 - 361 [25] Salonie Vyas, Umang Chaudhari, V. Chinmay Nandini, Bhushan Thakare, “State of the Art Literature Survey 2015 on RFID,” International Journal of Computer Applications (0975 – 8887) Volume 131 – No.8, December2015 [26] White Paper on “Machine-to-Machine Communication (M2M)” [27] S. Riazul Islam, D. Kwak, M. Humaun Kabir, M. Hossain, and K.S. Kwak, "The internet of things for health care: a comprehensive survey," IEEE Access, vol. 3, pp. 678-708, 2015. [28] Anusha Rahul, Gokul Krishnan G, Unni Krishnan H and Sethuraman Rao, “NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY,” International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015 [29] Handong Zhang and Lin Zhu, "Internet of Things: Key technology, architecture and challenging problems," 2011 IEEE International Conference on Computer Science and Automation Engineering, Shanghai, 2011, pp. 507-512. AUTHORS BIOGRAPHY Dr. Krishan Kumar Goyal received M.Tech in Computer science from U.P. Technical University, Lucknow. He has received Ph.D. in cryptography from Dr. B. R. Ambedkar University, Agra. He has also received master's degree in Computer Application & Mathematics from Dr. B.R. Ambedkar University, Agra. Presently, he is working as an Associate Professor in the Department of Computer Application at Raja Balwant Singh Management Technical Campus, Agra. He has participated in several faculty development programs, seminars and workshops. He has published several research papers in leading journals of national and international repute. Apart from this he has authored two books Concept Of Computer and C Programming and Trouble Free C. He is member of several societies such as IEEE, Computer Society of India, Ramanujan Mathematical Society of India, Cryptology Research Society of India etc. He is also a reviewer and member of editorial board of different national and international journals. His area of interest includes programming languages such as C, C++, Java, Data Structure, Design and Analysis of Algorithms, Cryptography, Cloud Computing, IoT and Data science. Mr. Amit Garg is presently working a Associate professor in department of Computer Application at MIET Meerut and having rich 16 year experience of teaching P.G. & U.G. students. He obtained B.Sc.(PCM) from CCS University Meerut, M.C.A. from Agra University, M.Tech. in Computer Science from UPTU Lucknow. Now he is perusing his Ph.D. in Computer Science from IFTM University Moradabad. He has life time membership of IAENG and ISRD. He works in the field of Algorithms, MANET and Internet of Things. Mr. Saurabh Singhal is currently working as Assistant Professor in department of Computer Application at MIET, Meerut. He is enriched with 9 year experience of teaching students of UG and PG level. He has obtain BCA (CCS University Meerut), MCA (UPTU, Lucknow) and M. Tech (MBU,H.P.). Also publish papers in several national and international journals. He is life time member of IAENG and ISRD. His area of research includes Cyber Security, Big Data, and Data Analytics & IoT. Mr. Ankur Rastogi is presently working as Assistant Professor in department of computer application at MIET Meerut. He has a vast teaching experience of 9 years. He has qualified UGC-NET exam in 2016. He obtained B. Sc. (PCM) from CCS University, MCA from UPTU Lucknow. He is well versed with latest programming technology like Android, Python etc. He believes in principle of just in time programming. He is life time member of ISRD and IAENG. His research area includes Data Analytics, IoT, and Security constraints in IoT through Block chain.