SlideShare a Scribd company logo
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016]
Infogain Publication (Infogainpublication.com) ISSN: 2454-1311
www.ijaems.com Page | 75
Analysis on IoT Challenges, Opportunities,
Applications and Communication Models
Narasimha Swamy S1
, Shantharam Nayak2
, Vijayalakshmi M N3
1,3
Department of Master of Computer Applications, R V College of Engineering, Bengaluru, India
2
Department of Information Science and Engineering, R V College of Engineering, Bengaluru, India
Abstract— Internet of Things (IoT) is a novel
communication standard and it is researcher’s preferred
topic, which integrates heterogeneous systems seamlessly.
Designing a universal architecture for IoT is a
challenging task due to the integration of wide variety of
the devices. The main objective of this paper is to provide
comprehensive knowledge on challenges, applications,
Security issues, and different communication models of
IoT. This paper also focuses on the marketing trends of
IoT with respect to variety of application with the end
users. This motivates the researchers to contribute more
productive work in this field by analyzing various
parameters.
Keywords— IoT, Security, Sensors Networks, Cloud
computing, RFID.
I. INTRODUCTION
The number of devices that are connecting to the internet
is increasing exponentially day by day. This leads to new
communication standard in internet know as Internet of
things (IoT). The typical idea behind IoT includes smart
devices like refrigerators, street lights, washing machine,
air conditioners, cars and etc., these are equipped with
sensors and Radio Frequency Identification (RFID) tags
[1].Cutting-edge communication practices like cloud
computing, Wi-Fi and Wimax are used as communication
medium between the IoT and smart devices [2][3].
IoT is an integration of wide variety of smart devices, and
influencing human routine towards, e-health, e-learning,
remote monitoring, surveillances. Similarly, IoT plays a
key role in industries such as automation and intelligent
industrial manufacturing, smart logistics, smart
transportation and many [4].
The public, industries and government are the important
stakeholders of IoT. At this stage, IoT requires
promotional policies to build a new network models. The
aim of IoT is ‘Value Up’ the data and ‘Cost Down’
models.
II. UNDERSTANDING IOT
It is easy to understand architecture of IoT. The figure1
illustrate the layered structure of an IoT. The Architecture of
the IoT comprises of three important layers perception layer,
network layer and application layer. The perception layer
allows recognizing and accumulating data from the smart
devices. The data broadcast from source to destination is
done by transport layer using the communication standards
like Wi-Fi, Wimax, GPRS and Zigbee technologies.
Application Layer
Transport/Network Layer
Perception Layer
Fig .1: Three Layered Architecture of IoT
The topmost layer in IoT is application layer, where large
number of applications runs. IoT includes three different
stages:
1. The device accumulates data from other devices. This
stage also includes identification of devices and
addressing the devices.
2. An IoT application accumulates data and analyses the
data for further consolidation.
3. Decision making technique may accomplish with the
help of analytical engines and big data. Once Decision
making technique is completed the data is
transmitted to the server.
III. PILLARS OF IOT
The Fig.2 illustrate the pillars of IoT
Fig. 2: Pillars of IoT
R&D and Innovation
R&D in IoT needs more fund to develop specific social
application through call for proposal. Identify core
members of IoT in R&D and start developing the open
source projects using cloud and collaborative R&D.
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016]
Infogain Publication (Infogainpublication.com) ISSN: 2454-1311
www.ijaems.com Page | 76
conduct the tests to integrate hardware to hardware (H to
H) and hardware to software (H to S).
Capacity building and Incubation
This includes implementing IoT test-bed suit for
homogeneous and heterogeneous devices. This enables
academic and research community to get benefit by doing
the experiments and to improve the knowledge of IoT
software and hardware infrastructure. This helps scientific
community to enhance their knowledge about IoT. This
encourages individual students to do research and to
enhance the IoT technology by conducting training and
workshops.
Exhibition centre
Demonstration centers are required to develop the domain
specific applications such as industrial monitoring, smart
cities, agriculture, healthcare, smart homes, forest and
wild life, natural disasters, automotive, safety and security
etc. This helps to get into the real time application from
theoretical concepts.
IV. CHALLENGES IN IOT
Architecture: The wide varieties of applications from
state full to stateless from resource constrained to
resource freedom and from simulation to real time
applications are the part of IoT. These may be infeasible
to have a standard architecture for IoT applications,
example, Sensor based identification architecture is
different from RFID based identification [5].
Routing: Routing of information plays very important
role in delivering the information to the destination
irrespective of the network.
1. Positioning of nodes in IoT is challenging task
because of changing topology, mobility, nodes may
be attach or detach to various networks [5].
2. Different Networking Standards are the major task
in routing of information in IoT. IoT uses different
communication standards such as Zigbee, Wimax
and Wi-Fi etc. The working principles of each and
every technology are different and they use diverse
protocol stacks [5].
3. Maintaining the Network Connectivity is a major
challenge because of limited battery power and
mobile nodes. Whenever node failure occurs and
mobile node detached from the network the
topology has to be reconstructed [5].
Fault Tolerance: The faults may occur due to
environmental factors, deployment mechanisms or energy
constraints devices. These may affect the overall
performance of the network. So there is a necessity of
some mechanism, which should be adopted in the routing
protocols to handle such unexpected events [5].
Security: The goals of the network and information
security are to achieve confidentiality, integrity and
availability of information. This can be achieved using
cryptographic algorithms but care should be taken while
implementing the cryptographic algorithms for IoT
because cryptographic algorithms include more
calculations, since IoT comprises of resource constraint
devices [5]. RFID tag information security, wireless
communications information security, network
transmission of information security, privacy, and
information processing security are the unknown dangers
in IoT [6].
V. APPLICATIONS OF IoT [1] [7] [8]
Committees for European Nano Electronics (CEN),
Committee for European Electro technical
Standardization (CENELEC), (ETSI) are the three
European bodies playing the vital role in developing the
standards for the IoT applications. The concept of IoT can
be easily adaptable. Some of the applications of the IoT
are:
Vehicle Traffic Control: In Traffic control application
vehicles like cars, bus, trains, roads and street lights are
equipped with the sensors and RFID tags to share traffic
information.
Smart homes and offices: IoT play a vibrant role in
smart homes and offices by controlling the room
temperature and room lightning by scheduling it
remotely.
Smart Cities: One can use the IoT in smart cities to
minimize the parking problems and monitoring the
physical condition of the building and bridges.
Health care: Health care sector is also a part of IoT. In
this application sensor monitors the condition of the
patient and forward the gathered information to the
concerned doctor.
Energy: IoT is used to monitor and manage usage of the
non-renewable resources like gas, coal, petrol and etc.
Environment: IoT also helps in managing the natural
disasters like earthquakes, floods, volcanic eruptions and
etc.
VI. MARKETING TRENDS
Unexpectedly, US National Intelligence Council (NIC)
included IoT in the list of six ‘‘Disruptive Civil
Technologies” by US national power [4] [9]. NIC
forecasts that “By 2025 daily use things like furniture,
food packages, important paper documents, and more are
equipped with the internodes”. It focuses on forthcoming
opportunities [4] [9].
IoT is the promising technology in future because it can
be adopted easily with the existing technologies. Markets
and Markets predicted that the size of the IoT in
International Journal of Advanced Engineering, Management and Science (IJAEMS)
Infogain Publication (Infogainpublication.com
www.ijaems.com
manufacturing field grows to USD 13.49 Billion by 2020
from USD 4.11 Billion in 2015, at a compound annual
growth rate (CAGR) of 26.9%. IoT is the solution for the
manufacturing and other industries because, which
increases the Functional efficiency of the industries. The
IoT becomes very popular and successful for, efficient
usage of sensors over enhanced automation
hardware and connecting devices are available for low
cost [4].
Recently TechSci released a study report called "India
Internet of Things (IoT) Market Opportunities &
Forecast, 2020", according to study report
India projected to progress at a CAGR more than 28%
during 2015 - 2020.
Real-time security, monitoring and analytics are part of
the IoT manufacturing industry which enhances the
operational effectiveness. The biggest share of IoT is
taken by the manufacturing industry to management
data during 2015 and it was predicted that IoT dominates
the market in future. Radio Frequency Identification
(RFID) leads the connectivity technology
manufacturing industry. This development is due to
reduction in the cost of connectivity devices and hardware
across North America, Europe and Asia-Pacific (APAC)
regions. Near Field Communication (NFC) is one of the
evolving technologies in wireless communication, which
can be used to communicate among the nodes in short
range.
Fig .3: Number of People connected using IoT
Communication Models in IoT [10]
Internet Architecture Board (IAB) in March 2015
released an architectural document for
includes four communication models used by IoT. The
key characteristics of the communication models details
are presented in below discussion.
Device to Device Communication
In this model two or more smart devices communicate
directly among one another, rather than communicating
through an intermediate application server. This
International Journal of Advanced Engineering, Management and Science (IJAEMS)
Infogainpublication.com)
grows to USD 13.49 Billion by 2020
, at a compound annual
growth rate (CAGR) of 26.9%. IoT is the solution for the
manufacturing and other industries because, which
increases the Functional efficiency of the industries. The
becomes very popular and successful for, efficient
automation and the
hardware and connecting devices are available for low
ort called "India
Opportunities &
report IoT market in
at a CAGR more than 28%
and analytics are part of
the IoT manufacturing industry which enhances the
The biggest share of IoT is
management the
during 2015 and it was predicted that IoT dominates
the market in future. Radio Frequency Identification
(RFID) leads the connectivity technology in IoT
manufacturing industry. This development is due to
reduction in the cost of connectivity devices and hardware
Pacific (APAC)
regions. Near Field Communication (NFC) is one of the
s communication, which
can be used to communicate among the nodes in short-
Number of People connected using IoT
in March 2015
released an architectural document for IoT, which
includes four communication models used by IoT. The
key characteristics of the communication models details
two or more smart devices communicate
another, rather than communicating
through an intermediate application server. This
communication model uses the Bluetooth, Z
Zigbee as communication media.
The applications like home automation systems and
health care systems uses the device to
communication model. The home automation
includes tiny data packets to communicate between
devices. Small IoT devices like tube lights, street lights,
washing machines, and air conditioners
exchange the smaller amount of informa
Device to device communication models are not
suited with the communication protocols; the
communicating devices should use the same type of the
protocols. For example, Bluetooth
are not natively compatible with the
devices [10]. The Fig. 4 gives the idea behind the device
to device communication model.
Fig. 4: Device to Device Communication Model
Device-to-Cloud Communication
In this communication paradigm the IoT smart devices
exchange the data and contr
directly connecting to the cloud. The concept behind the
device-to-cloud communication model is illustrated in the
Fig. 5.
Fig. 5: Device-to-Cloud Communication Model
Ethernet or Wi-Fi is the most common
communication standards used by
communication model in order to establish connection
between the cloud service and the smart device.
This technology was adopted by Samsung Smart TV’s.
The smart TV’s uses the internet technology in order to
send the user viewing interest information for analysis.
Device-to-Gateway Model (AGLM)
Device-to-gateway model is also
Device-to-application-layer gateway model. In this model
[Vol-2, Issue-4, April- 2016]
) ISSN: 2454-1311
Page | 77
communication model uses the Bluetooth, Z-Wave, or
Zigbee as communication media.
The applications like home automation systems and
health care systems uses the device to device
. The home automation application
includes tiny data packets to communicate between
devices. Small IoT devices like tube lights, street lights,
washing machines, and air conditioners normally
amount of information.
evice communication models are not well-
with the communication protocols; the
communicating devices should use the same type of the
Bluetooth family smart devices
not natively compatible with the Zigbee family of
The Fig. 4 gives the idea behind the device
to device communication model.
Device to Device Communication Model
Cloud Communication
In this communication paradigm the IoT smart devices
exchange the data and control the flow of traffic by
cloud. The concept behind the
ommunication model is illustrated in the
Cloud Communication Model
the most commonly used
used by the device-to-cloud
in order to establish connection
between the cloud service and the smart device.
This technology was adopted by Samsung Smart TV’s.
The smart TV’s uses the internet technology in order to
ser viewing interest information for analysis.
(AGLM) [10]
gateway model is also recognized as the
layer gateway model. In this model
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016]
Infogain Publication (Infogainpublication.com) ISSN: 2454-1311
www.ijaems.com Page | 78
a local gateway acts as an intermediate between smart
devices and the gateway is loaded with the application
software.
In this model a local gateway device runs application
software and it acts as an intermediate between the smart
device and cloud service. The local gateway device
provides the functionalities like security and data/
protocol translation. This model is used in the smart
cities, smart homes and etc. [10].The Fig. 6 gives the
more knowledge on device-to-gateway model.
Fig. 6: Device-to-Gateway Model
Back-End Data-Sharing Model [10]
This communication architecture enables users to transfer
and scrutinize smart device data from a cloud service in
grouping with data from additional sources. This
architecture enables “third parties to access the uploaded
sensor data”. Back-end data-sharing model was derived
from single device-to-cloud communication model, in this
model “The data can be uploaded by IoT smart devices to
a single application service provider’’. This model also
enables aggregation of data and analysis of data. The
Fig. 7 gives the knowledge on back-end data-sharing
model.
Fig. 7: Back-End Data-Sharing Model [10]
VII. CONCLUSION
Internet of Things has gained lots of impact in recent
trends; this impact may be due to the trends in wireless
communication and embedded devices connected over
internet. The review presented here focused on studying
the basic necessary aspects in IoT. This review may be
useful for researcher interested in contributing in the field
of IoT. This paper highlighted the architectural concepts,
challenges, and real time applications in IoT. A glimpse
of marketing trends of IoT and the most commonly used
communication models are also discussed in this review.
REFERENCES
[1] Samia Allaoua Chelloug, Energy- Efficient
Content-Based Routing in Internet of Things,
Networks and Communication Systems Department,
College of Computer and Information Sciences,
Princess Nourah Bint Abdul Rahman University,
Riyadh, KSA, Journal of Computer and
Communications, Dec-2015, 3, 9-20.
[2] Souza, A.M.C. and Amazonas, J.R.A. (2015) A New
Internet of Things Architecture with Cross -
Layer Communication. Proceedings of the
7th International Conference on Emerging
Networks and Systems Intelligence Emerging
2015, Nice, 19-24 July 2015, 1-6.
[3] Michael, M.P. (2007) Architectural Solutions for
Mobile RFID Services on Internet of Things.
[4] Atzori, L., Iera, A. and Morabito, G. (2010) The
Internet of Things: A Survey. Computer Networks,
54, 2787-
2805.http://dx.doi.org/10.1016/j.comnet.2010. 05.010
[5] Amol Dhumane and Dr. Rajesh Prasad, Routing
Challenges in Internet of Things, CSI
Communications, January 2015.
[6] Chen Qiang, Guangri Quan, Bai Yu and Liu Yang,
Research on Security Issues of the Internet of
Things, International Journal of Future Generation
Communication and Networking, Vol.6,
No.6(2013), pp.1-10,
http://dx.doi.org/10.14257/ijfgcn.2013.6.6.01.
[7] Jia, X., Feng, Q., Fan, T., and Lei, Q. (2012) RFID
Technology and Its Applications in Internet of
Things (IoT).2012 2nd International Conference on
Consumer Electronics, Communications and
Networks (CECNet), Yichang, 21-23 April 2012,
1282-1285.http://dx.doi.org/10.1109/CECNet.
2012.62015 08.
[8] Kopetz, H. (1997), Real-Time Systems: Design
Principles for Distributed Embedded Applications.
Real-Time Systems Series, Springer, New York.
[9] National Intelligence Council, Disruptive Civil
Technologies – Six Technologies with Potential
Impacts on US Interests Out to 2025 –
Conference Report CR 2008-07, April 2008,
http://www.dni.gov/nic/NIC_home.html.
[10]https://www.internetsociety.org/sites/default/files/IS
OC-IoT-Overview-20151014_0.pdf.

More Related Content

What's hot

Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
ijwmn
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
vishal dineshkumar soni
 
A Survey on the applications of IoT: an investigation into existing environme...
A Survey on the applications of IoT: an investigation into existing environme...A Survey on the applications of IoT: an investigation into existing environme...
A Survey on the applications of IoT: an investigation into existing environme...
TELKOMNIKA JOURNAL
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of Things
IRJET Journal
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
Eswar Publications
 
Challenges and Opportunities of Internet of Things in Healthcare
Challenges and Opportunities of Internet of Things in Healthcare  Challenges and Opportunities of Internet of Things in Healthcare
Challenges and Opportunities of Internet of Things in Healthcare
IJECEIAES
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
ijsrd.com
 
Different applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadDifferent applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin Akad
Jatin Akar
 
Iot presentation
Iot presentationIot presentation
Iot presentation
huma742446
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and Challenges
Ahmed Banafa
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
Nicholas Davis
 
New ITU Standard on Identity & Access Management
New ITU Standard on Identity & Access ManagementNew ITU Standard on Identity & Access Management
New ITU Standard on Identity & Access Management
ITU
 
Internet of Things IoT Based Smart Environment Integrating Various Business A...
Internet of Things IoT Based Smart Environment Integrating Various Business A...Internet of Things IoT Based Smart Environment Integrating Various Business A...
Internet of Things IoT Based Smart Environment Integrating Various Business A...
ijtsrd
 
RT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected thingsRT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected things
journalBEEI
 
Internet of things
Internet of thingsInternet of things
Internet of things
Hamdamboy (함담보이)
 
Wireless networks
Wireless networks Wireless networks
Wireless networks
Shellychoudhary1
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Anastasios Economides
 
IRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human LifeIRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human Life
IRJET Journal
 

What's hot (20)

Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
A Survey on the applications of IoT: an investigation into existing environme...
A Survey on the applications of IoT: an investigation into existing environme...A Survey on the applications of IoT: an investigation into existing environme...
A Survey on the applications of IoT: an investigation into existing environme...
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of Things
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
 
Challenges and Opportunities of Internet of Things in Healthcare
Challenges and Opportunities of Internet of Things in Healthcare  Challenges and Opportunities of Internet of Things in Healthcare
Challenges and Opportunities of Internet of Things in Healthcare
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Different applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadDifferent applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin Akad
 
Iot presentation
Iot presentationIot presentation
Iot presentation
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and Challenges
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
New ITU Standard on Identity & Access Management
New ITU Standard on Identity & Access ManagementNew ITU Standard on Identity & Access Management
New ITU Standard on Identity & Access Management
 
Internet of Things IoT Based Smart Environment Integrating Various Business A...
Internet of Things IoT Based Smart Environment Integrating Various Business A...Internet of Things IoT Based Smart Environment Integrating Various Business A...
Internet of Things IoT Based Smart Environment Integrating Various Business A...
 
RT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected thingsRT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Wireless networks
Wireless networks Wireless networks
Wireless networks
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_final
 
IRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human LifeIRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human Life
 

Viewers also liked

Ijaems apr-2016-5 Brakes Analysis of BAJA ATV
Ijaems apr-2016-5 Brakes Analysis of BAJA ATVIjaems apr-2016-5 Brakes Analysis of BAJA ATV
Ijaems apr-2016-5 Brakes Analysis of BAJA ATV
INFOGAIN PUBLICATION
 
Individuo y sociedad
Individuo y sociedadIndividuo y sociedad
Individuo y sociedad
maria laura suarez yusti
 
Ppt morphology
Ppt morphologyPpt morphology
Ppt morphology
yuliahariyani
 
México y la legalización de la cannabis
México y la legalización de la cannabisMéxico y la legalización de la cannabis
México y la legalización de la cannabis
Diana Laura Osorio
 
El aprendizaje 6
El aprendizaje 6El aprendizaje 6
El aprendizaje 6
Jean Pierre Buller
 
De la sucesion por causa de muerte
De la sucesion por causa de muerteDe la sucesion por causa de muerte
De la sucesion por causa de muerte
Pablo
 
La filosofía y el problema del hombre
La filosofía y el problema del hombreLa filosofía y el problema del hombre
La filosofía y el problema del hombre
Juan Carlos Rodriguez Sosa
 
Presentation1 morfologi nilam
Presentation1 morfologi nilamPresentation1 morfologi nilam
Presentation1 morfologi nilam
Nilam cahaya fitriyanti
 
Energy Storage Business Unit
Energy Storage Business UnitEnergy Storage Business Unit
Energy Storage Business UnitLeon Zhang
 
April 6, 2016
April 6, 2016April 6, 2016
April 6, 2016
khyps13
 
MACA Ecología y Medio Ambiente macr
MACA Ecología y Medio Ambiente macrMACA Ecología y Medio Ambiente macr
MACA Ecología y Medio Ambiente macr
INSTITUTO TECNOLÓGICO DE SONORA
 
KontikiMillennialGuide3
KontikiMillennialGuide3KontikiMillennialGuide3
KontikiMillennialGuide3Christine Kent
 
PBS STPM 2016
PBS STPM 2016PBS STPM 2016
PBS STPM 2016
anafarzana30
 
Cuadernillo de preguntas saber 11 2014
Cuadernillo de preguntas saber 11 2014 Cuadernillo de preguntas saber 11 2014
Cuadernillo de preguntas saber 11 2014
Milton H. Urbano
 
Asas asas umum pemerintahan yang baik
Asas asas umum pemerintahan yang baikAsas asas umum pemerintahan yang baik
Asas asas umum pemerintahan yang baik
FKP2B Cikarang
 

Viewers also liked (17)

Ijaems apr-2016-5 Brakes Analysis of BAJA ATV
Ijaems apr-2016-5 Brakes Analysis of BAJA ATVIjaems apr-2016-5 Brakes Analysis of BAJA ATV
Ijaems apr-2016-5 Brakes Analysis of BAJA ATV
 
Individuo y sociedad
Individuo y sociedadIndividuo y sociedad
Individuo y sociedad
 
Ppt morphology
Ppt morphologyPpt morphology
Ppt morphology
 
México y la legalización de la cannabis
México y la legalización de la cannabisMéxico y la legalización de la cannabis
México y la legalización de la cannabis
 
El aprendizaje 6
El aprendizaje 6El aprendizaje 6
El aprendizaje 6
 
De la sucesion por causa de muerte
De la sucesion por causa de muerteDe la sucesion por causa de muerte
De la sucesion por causa de muerte
 
La filosofía y el problema del hombre
La filosofía y el problema del hombreLa filosofía y el problema del hombre
La filosofía y el problema del hombre
 
Presentation1 morfologi nilam
Presentation1 morfologi nilamPresentation1 morfologi nilam
Presentation1 morfologi nilam
 
full
fullfull
full
 
C u r r i c u l u m V i t a e.doc1
C u r r i c u l u m V i t a e.doc1C u r r i c u l u m V i t a e.doc1
C u r r i c u l u m V i t a e.doc1
 
Energy Storage Business Unit
Energy Storage Business UnitEnergy Storage Business Unit
Energy Storage Business Unit
 
April 6, 2016
April 6, 2016April 6, 2016
April 6, 2016
 
MACA Ecología y Medio Ambiente macr
MACA Ecología y Medio Ambiente macrMACA Ecología y Medio Ambiente macr
MACA Ecología y Medio Ambiente macr
 
KontikiMillennialGuide3
KontikiMillennialGuide3KontikiMillennialGuide3
KontikiMillennialGuide3
 
PBS STPM 2016
PBS STPM 2016PBS STPM 2016
PBS STPM 2016
 
Cuadernillo de preguntas saber 11 2014
Cuadernillo de preguntas saber 11 2014 Cuadernillo de preguntas saber 11 2014
Cuadernillo de preguntas saber 11 2014
 
Asas asas umum pemerintahan yang baik
Asas asas umum pemerintahan yang baikAsas asas umum pemerintahan yang baik
Asas asas umum pemerintahan yang baik
 

Similar to Analysis on IoT Challenges, Opportunities, Applications and Communication Models

lee2015.pdf
lee2015.pdflee2015.pdf
lee2015.pdf
BabarHameed6
 
Applications of IoT in Manufacturing
Applications of IoT in ManufacturingApplications of IoT in Manufacturing
Applications of IoT in Manufacturing
ijtsrd
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
IJNSA Journal
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
IJNSA Journal
 
E-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudE-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure Cloud
IRJET Journal
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
IRJET Journal
 
Internet of things: review, architecture and applications
Internet of things: review, architecture and applicationsInternet of things: review, architecture and applications
Internet of things: review, architecture and applications
CSITiaesprime
 
76 s201918
76 s20191876 s201918
76 s201918
IJRAT
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
ijtsrd
 
Insight into IoT Applications and Common Practice Challenges
Insight into IoT Applications and Common Practice ChallengesInsight into IoT Applications and Common Practice Challenges
Insight into IoT Applications and Common Practice Challenges
ijtsrd
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...
IJCNCJournal
 
Internet of Things -Overview
Internet of Things -OverviewInternet of Things -Overview
Internet of Things -Overview
IJRST Journal
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
DESMOND YUEN
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTA STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
Daniel Wachtel
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
Shyam Goyal
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
ijcsit
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
AIRCC Publishing Corporation
 
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET Journal
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT Infrastructure
IJAEMSJORNAL
 
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
BRNSSPublicationHubI
 

Similar to Analysis on IoT Challenges, Opportunities, Applications and Communication Models (20)

lee2015.pdf
lee2015.pdflee2015.pdf
lee2015.pdf
 
Applications of IoT in Manufacturing
Applications of IoT in ManufacturingApplications of IoT in Manufacturing
Applications of IoT in Manufacturing
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
E-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudE-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure Cloud
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
 
Internet of things: review, architecture and applications
Internet of things: review, architecture and applicationsInternet of things: review, architecture and applications
Internet of things: review, architecture and applications
 
76 s201918
76 s20191876 s201918
76 s201918
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
 
Insight into IoT Applications and Common Practice Challenges
Insight into IoT Applications and Common Practice ChallengesInsight into IoT Applications and Common Practice Challenges
Insight into IoT Applications and Common Practice Challenges
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...
 
Internet of Things -Overview
Internet of Things -OverviewInternet of Things -Overview
Internet of Things -Overview
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTA STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
 
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT Infrastructure
 
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
 

Recently uploaded

TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 

Recently uploaded (20)

TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 

Analysis on IoT Challenges, Opportunities, Applications and Communication Models

  • 1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016] Infogain Publication (Infogainpublication.com) ISSN: 2454-1311 www.ijaems.com Page | 75 Analysis on IoT Challenges, Opportunities, Applications and Communication Models Narasimha Swamy S1 , Shantharam Nayak2 , Vijayalakshmi M N3 1,3 Department of Master of Computer Applications, R V College of Engineering, Bengaluru, India 2 Department of Information Science and Engineering, R V College of Engineering, Bengaluru, India Abstract— Internet of Things (IoT) is a novel communication standard and it is researcher’s preferred topic, which integrates heterogeneous systems seamlessly. Designing a universal architecture for IoT is a challenging task due to the integration of wide variety of the devices. The main objective of this paper is to provide comprehensive knowledge on challenges, applications, Security issues, and different communication models of IoT. This paper also focuses on the marketing trends of IoT with respect to variety of application with the end users. This motivates the researchers to contribute more productive work in this field by analyzing various parameters. Keywords— IoT, Security, Sensors Networks, Cloud computing, RFID. I. INTRODUCTION The number of devices that are connecting to the internet is increasing exponentially day by day. This leads to new communication standard in internet know as Internet of things (IoT). The typical idea behind IoT includes smart devices like refrigerators, street lights, washing machine, air conditioners, cars and etc., these are equipped with sensors and Radio Frequency Identification (RFID) tags [1].Cutting-edge communication practices like cloud computing, Wi-Fi and Wimax are used as communication medium between the IoT and smart devices [2][3]. IoT is an integration of wide variety of smart devices, and influencing human routine towards, e-health, e-learning, remote monitoring, surveillances. Similarly, IoT plays a key role in industries such as automation and intelligent industrial manufacturing, smart logistics, smart transportation and many [4]. The public, industries and government are the important stakeholders of IoT. At this stage, IoT requires promotional policies to build a new network models. The aim of IoT is ‘Value Up’ the data and ‘Cost Down’ models. II. UNDERSTANDING IOT It is easy to understand architecture of IoT. The figure1 illustrate the layered structure of an IoT. The Architecture of the IoT comprises of three important layers perception layer, network layer and application layer. The perception layer allows recognizing and accumulating data from the smart devices. The data broadcast from source to destination is done by transport layer using the communication standards like Wi-Fi, Wimax, GPRS and Zigbee technologies. Application Layer Transport/Network Layer Perception Layer Fig .1: Three Layered Architecture of IoT The topmost layer in IoT is application layer, where large number of applications runs. IoT includes three different stages: 1. The device accumulates data from other devices. This stage also includes identification of devices and addressing the devices. 2. An IoT application accumulates data and analyses the data for further consolidation. 3. Decision making technique may accomplish with the help of analytical engines and big data. Once Decision making technique is completed the data is transmitted to the server. III. PILLARS OF IOT The Fig.2 illustrate the pillars of IoT Fig. 2: Pillars of IoT R&D and Innovation R&D in IoT needs more fund to develop specific social application through call for proposal. Identify core members of IoT in R&D and start developing the open source projects using cloud and collaborative R&D.
  • 2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016] Infogain Publication (Infogainpublication.com) ISSN: 2454-1311 www.ijaems.com Page | 76 conduct the tests to integrate hardware to hardware (H to H) and hardware to software (H to S). Capacity building and Incubation This includes implementing IoT test-bed suit for homogeneous and heterogeneous devices. This enables academic and research community to get benefit by doing the experiments and to improve the knowledge of IoT software and hardware infrastructure. This helps scientific community to enhance their knowledge about IoT. This encourages individual students to do research and to enhance the IoT technology by conducting training and workshops. Exhibition centre Demonstration centers are required to develop the domain specific applications such as industrial monitoring, smart cities, agriculture, healthcare, smart homes, forest and wild life, natural disasters, automotive, safety and security etc. This helps to get into the real time application from theoretical concepts. IV. CHALLENGES IN IOT Architecture: The wide varieties of applications from state full to stateless from resource constrained to resource freedom and from simulation to real time applications are the part of IoT. These may be infeasible to have a standard architecture for IoT applications, example, Sensor based identification architecture is different from RFID based identification [5]. Routing: Routing of information plays very important role in delivering the information to the destination irrespective of the network. 1. Positioning of nodes in IoT is challenging task because of changing topology, mobility, nodes may be attach or detach to various networks [5]. 2. Different Networking Standards are the major task in routing of information in IoT. IoT uses different communication standards such as Zigbee, Wimax and Wi-Fi etc. The working principles of each and every technology are different and they use diverse protocol stacks [5]. 3. Maintaining the Network Connectivity is a major challenge because of limited battery power and mobile nodes. Whenever node failure occurs and mobile node detached from the network the topology has to be reconstructed [5]. Fault Tolerance: The faults may occur due to environmental factors, deployment mechanisms or energy constraints devices. These may affect the overall performance of the network. So there is a necessity of some mechanism, which should be adopted in the routing protocols to handle such unexpected events [5]. Security: The goals of the network and information security are to achieve confidentiality, integrity and availability of information. This can be achieved using cryptographic algorithms but care should be taken while implementing the cryptographic algorithms for IoT because cryptographic algorithms include more calculations, since IoT comprises of resource constraint devices [5]. RFID tag information security, wireless communications information security, network transmission of information security, privacy, and information processing security are the unknown dangers in IoT [6]. V. APPLICATIONS OF IoT [1] [7] [8] Committees for European Nano Electronics (CEN), Committee for European Electro technical Standardization (CENELEC), (ETSI) are the three European bodies playing the vital role in developing the standards for the IoT applications. The concept of IoT can be easily adaptable. Some of the applications of the IoT are: Vehicle Traffic Control: In Traffic control application vehicles like cars, bus, trains, roads and street lights are equipped with the sensors and RFID tags to share traffic information. Smart homes and offices: IoT play a vibrant role in smart homes and offices by controlling the room temperature and room lightning by scheduling it remotely. Smart Cities: One can use the IoT in smart cities to minimize the parking problems and monitoring the physical condition of the building and bridges. Health care: Health care sector is also a part of IoT. In this application sensor monitors the condition of the patient and forward the gathered information to the concerned doctor. Energy: IoT is used to monitor and manage usage of the non-renewable resources like gas, coal, petrol and etc. Environment: IoT also helps in managing the natural disasters like earthquakes, floods, volcanic eruptions and etc. VI. MARKETING TRENDS Unexpectedly, US National Intelligence Council (NIC) included IoT in the list of six ‘‘Disruptive Civil Technologies” by US national power [4] [9]. NIC forecasts that “By 2025 daily use things like furniture, food packages, important paper documents, and more are equipped with the internodes”. It focuses on forthcoming opportunities [4] [9]. IoT is the promising technology in future because it can be adopted easily with the existing technologies. Markets and Markets predicted that the size of the IoT in
  • 3. International Journal of Advanced Engineering, Management and Science (IJAEMS) Infogain Publication (Infogainpublication.com www.ijaems.com manufacturing field grows to USD 13.49 Billion by 2020 from USD 4.11 Billion in 2015, at a compound annual growth rate (CAGR) of 26.9%. IoT is the solution for the manufacturing and other industries because, which increases the Functional efficiency of the industries. The IoT becomes very popular and successful for, efficient usage of sensors over enhanced automation hardware and connecting devices are available for low cost [4]. Recently TechSci released a study report called "India Internet of Things (IoT) Market Opportunities & Forecast, 2020", according to study report India projected to progress at a CAGR more than 28% during 2015 - 2020. Real-time security, monitoring and analytics are part of the IoT manufacturing industry which enhances the operational effectiveness. The biggest share of IoT is taken by the manufacturing industry to management data during 2015 and it was predicted that IoT dominates the market in future. Radio Frequency Identification (RFID) leads the connectivity technology manufacturing industry. This development is due to reduction in the cost of connectivity devices and hardware across North America, Europe and Asia-Pacific (APAC) regions. Near Field Communication (NFC) is one of the evolving technologies in wireless communication, which can be used to communicate among the nodes in short range. Fig .3: Number of People connected using IoT Communication Models in IoT [10] Internet Architecture Board (IAB) in March 2015 released an architectural document for includes four communication models used by IoT. The key characteristics of the communication models details are presented in below discussion. Device to Device Communication In this model two or more smart devices communicate directly among one another, rather than communicating through an intermediate application server. This International Journal of Advanced Engineering, Management and Science (IJAEMS) Infogainpublication.com) grows to USD 13.49 Billion by 2020 , at a compound annual growth rate (CAGR) of 26.9%. IoT is the solution for the manufacturing and other industries because, which increases the Functional efficiency of the industries. The becomes very popular and successful for, efficient automation and the hardware and connecting devices are available for low ort called "India Opportunities & report IoT market in at a CAGR more than 28% and analytics are part of the IoT manufacturing industry which enhances the The biggest share of IoT is management the during 2015 and it was predicted that IoT dominates the market in future. Radio Frequency Identification (RFID) leads the connectivity technology in IoT manufacturing industry. This development is due to reduction in the cost of connectivity devices and hardware Pacific (APAC) regions. Near Field Communication (NFC) is one of the s communication, which can be used to communicate among the nodes in short- Number of People connected using IoT in March 2015 released an architectural document for IoT, which includes four communication models used by IoT. The key characteristics of the communication models details two or more smart devices communicate another, rather than communicating through an intermediate application server. This communication model uses the Bluetooth, Z Zigbee as communication media. The applications like home automation systems and health care systems uses the device to communication model. The home automation includes tiny data packets to communicate between devices. Small IoT devices like tube lights, street lights, washing machines, and air conditioners exchange the smaller amount of informa Device to device communication models are not suited with the communication protocols; the communicating devices should use the same type of the protocols. For example, Bluetooth are not natively compatible with the devices [10]. The Fig. 4 gives the idea behind the device to device communication model. Fig. 4: Device to Device Communication Model Device-to-Cloud Communication In this communication paradigm the IoT smart devices exchange the data and contr directly connecting to the cloud. The concept behind the device-to-cloud communication model is illustrated in the Fig. 5. Fig. 5: Device-to-Cloud Communication Model Ethernet or Wi-Fi is the most common communication standards used by communication model in order to establish connection between the cloud service and the smart device. This technology was adopted by Samsung Smart TV’s. The smart TV’s uses the internet technology in order to send the user viewing interest information for analysis. Device-to-Gateway Model (AGLM) Device-to-gateway model is also Device-to-application-layer gateway model. In this model [Vol-2, Issue-4, April- 2016] ) ISSN: 2454-1311 Page | 77 communication model uses the Bluetooth, Z-Wave, or Zigbee as communication media. The applications like home automation systems and health care systems uses the device to device . The home automation application includes tiny data packets to communicate between devices. Small IoT devices like tube lights, street lights, washing machines, and air conditioners normally amount of information. evice communication models are not well- with the communication protocols; the communicating devices should use the same type of the Bluetooth family smart devices not natively compatible with the Zigbee family of The Fig. 4 gives the idea behind the device to device communication model. Device to Device Communication Model Cloud Communication In this communication paradigm the IoT smart devices exchange the data and control the flow of traffic by cloud. The concept behind the ommunication model is illustrated in the Cloud Communication Model the most commonly used used by the device-to-cloud in order to establish connection between the cloud service and the smart device. This technology was adopted by Samsung Smart TV’s. The smart TV’s uses the internet technology in order to ser viewing interest information for analysis. (AGLM) [10] gateway model is also recognized as the layer gateway model. In this model
  • 4. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016] Infogain Publication (Infogainpublication.com) ISSN: 2454-1311 www.ijaems.com Page | 78 a local gateway acts as an intermediate between smart devices and the gateway is loaded with the application software. In this model a local gateway device runs application software and it acts as an intermediate between the smart device and cloud service. The local gateway device provides the functionalities like security and data/ protocol translation. This model is used in the smart cities, smart homes and etc. [10].The Fig. 6 gives the more knowledge on device-to-gateway model. Fig. 6: Device-to-Gateway Model Back-End Data-Sharing Model [10] This communication architecture enables users to transfer and scrutinize smart device data from a cloud service in grouping with data from additional sources. This architecture enables “third parties to access the uploaded sensor data”. Back-end data-sharing model was derived from single device-to-cloud communication model, in this model “The data can be uploaded by IoT smart devices to a single application service provider’’. This model also enables aggregation of data and analysis of data. The Fig. 7 gives the knowledge on back-end data-sharing model. Fig. 7: Back-End Data-Sharing Model [10] VII. CONCLUSION Internet of Things has gained lots of impact in recent trends; this impact may be due to the trends in wireless communication and embedded devices connected over internet. The review presented here focused on studying the basic necessary aspects in IoT. This review may be useful for researcher interested in contributing in the field of IoT. This paper highlighted the architectural concepts, challenges, and real time applications in IoT. A glimpse of marketing trends of IoT and the most commonly used communication models are also discussed in this review. REFERENCES [1] Samia Allaoua Chelloug, Energy- Efficient Content-Based Routing in Internet of Things, Networks and Communication Systems Department, College of Computer and Information Sciences, Princess Nourah Bint Abdul Rahman University, Riyadh, KSA, Journal of Computer and Communications, Dec-2015, 3, 9-20. [2] Souza, A.M.C. and Amazonas, J.R.A. (2015) A New Internet of Things Architecture with Cross - Layer Communication. Proceedings of the 7th International Conference on Emerging Networks and Systems Intelligence Emerging 2015, Nice, 19-24 July 2015, 1-6. [3] Michael, M.P. (2007) Architectural Solutions for Mobile RFID Services on Internet of Things. [4] Atzori, L., Iera, A. and Morabito, G. (2010) The Internet of Things: A Survey. Computer Networks, 54, 2787- 2805.http://dx.doi.org/10.1016/j.comnet.2010. 05.010 [5] Amol Dhumane and Dr. Rajesh Prasad, Routing Challenges in Internet of Things, CSI Communications, January 2015. [6] Chen Qiang, Guangri Quan, Bai Yu and Liu Yang, Research on Security Issues of the Internet of Things, International Journal of Future Generation Communication and Networking, Vol.6, No.6(2013), pp.1-10, http://dx.doi.org/10.14257/ijfgcn.2013.6.6.01. [7] Jia, X., Feng, Q., Fan, T., and Lei, Q. (2012) RFID Technology and Its Applications in Internet of Things (IoT).2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), Yichang, 21-23 April 2012, 1282-1285.http://dx.doi.org/10.1109/CECNet. 2012.62015 08. [8] Kopetz, H. (1997), Real-Time Systems: Design Principles for Distributed Embedded Applications. Real-Time Systems Series, Springer, New York. [9] National Intelligence Council, Disruptive Civil Technologies – Six Technologies with Potential Impacts on US Interests Out to 2025 – Conference Report CR 2008-07, April 2008, http://www.dni.gov/nic/NIC_home.html. [10]https://www.internetsociety.org/sites/default/files/IS OC-IoT-Overview-20151014_0.pdf.