The Internet of Things: A survey

This paper addresses the Internet of Things. Main enabling factor of this promising paradigm is the integration of several technologies and communications solutions. Identification and tracking technologies, wired and wireless sensor and actuator networks, enhanced communication protocols (shared with the Next Generation Internet), and distributed intelligence for smart objects are just the most relevant. As one can easily imagine, any serious contribution to the advance of the Internet of Things must necessarily be the result of synergetic activities conducted in different fields of knowledge, such as telecommunications, informatics, electronics and social science. In such a complex scenario, this survey is directed to those who want to approach this complex discipline and contribute to its development. Different visions of this Internet of Things paradigm are reported and enabling technologies reviewed. What emerges is that still major issues shall be faced by the research community. The most relevant among them are addressed in details.

[1]  Vinton G. Cerf,et al.  Specification of Internet Transmission Control Program , 1974, RFC.

[2]  T. V. Lakshman,et al.  The performance of TCP/IP for networks with high bandwidth-delay products and random loss , 1997, TNET.

[3]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[4]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[5]  Lorrie Faith Cranor,et al.  The platform for privacy preferences , 1999, CACM.

[6]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[7]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[8]  Charles E. Perkins,et al.  IP Mobility Support for IPv4 , 2002, RFC.

[9]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[10]  Pramod K. Varshney,et al.  QoS Support in Wireless Sensor Networks: A Survey , 2004, International Conference on Wireless Networks.

[11]  N. Gershenfeld,et al.  The Internet of Things , 2016 .

[12]  Ian F. Akyildiz,et al.  A survey of mobility management in next-generation all-IP-based wireless systems , 2004, IEEE Wirel. Commun..

[13]  Nalini Venkatasubramanian,et al.  Privacy protecting data collection in media spaces , 2004, MULTIMEDIA '04.

[14]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[15]  James Pasley,et al.  How BPEL and SOA Are Changing Web Services Development , 2005, IEEE Internet Comput..

[16]  Kori Inkpen Quinn,et al.  Just point and click?: using handhelds to interact with paper maps , 2005, Mobile HCI.

[17]  Hakan Deliç,et al.  Wireless sensor networks for intrusion detection: packet traffic modeling , 2006, IEEE Communications Letters.

[18]  Sébastien Canard,et al.  Low-Cost Cryptography for Privacy in RFID Systems , 2006, CARDIS.

[19]  Kevin Kelly,et al.  SODA: Service Oriented Device Architecture , 2006, IEEE Pervasive Computing.

[20]  Ken Sakamura,et al.  Challenges in the age of ubiquitous computing: a case study of T-Engine, an open development platform for embedded systems , 2006, ICSE.

[21]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[22]  Bernard Eydt,et al.  Guidelines for Securing Radio Frequency Identification (RFID) Systems | NIST , 2007 .

[23]  Jacques Reverdy,et al.  RFID Noisy Reader How to Prevent from Eavesdropping on the Communication? , 2007, CHES.

[24]  Scott Shenker,et al.  A data-oriented (and beyond) network architecture , 2007, SIGCOMM 2007.

[25]  Daeyoung Kim,et al.  The EPC Sensor Network for RFID and WSN Integration Infrastructure , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[26]  D.I. Kaklamani,et al.  A Proxy for Privacy: the Discreet Box , 2007, EUROCON 2007 - The International Conference on "Computer as a Tool".

[27]  Eddie Kohler,et al.  Harbor: software-based memory protection for sensor nodes , 2007, IPSN '07.

[28]  Christian Floerkemeier,et al.  RFID Application Development With the Accada Middleware Platform , 2007, IEEE Systems Journal.

[29]  Gabriel Montenegro,et al.  IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.

[30]  Artem Katasonov,et al.  Smart Semantic Middleware for the Internet of Things , 2008, ICINCO-ICSO.

[31]  Rathanakar Acharya,et al.  Data integrity and intrusion detection in Wireless Sensor Networks , 2008, 2008 16th IEEE International Conference on Networks.

[32]  Frédéric Thiesse,et al.  Sensor Applications in the Supply Chain: The Example of Quality-Based Issuing of Perishables , 2008, IOT.

[33]  E Xample A Pplications Revisiting Smart Dust with RFID Sensor Networks , 2008 .

[34]  Vlad Trifa,et al.  SOA-Based Integration of the Internet of Things in Enterprise Services , 2009, 2009 IEEE International Conference on Web Services.

[35]  Elgar Fleisch,et al.  Using Sensor Information to Reduce the Carbon Footprint of Perishable Goods , 2009, IEEE Pervasive Computing.

[36]  E. Fleisch,et al.  Mobile Sales Assistant - An NFC-Based Product Information System for Retailers , 2009, 2009 First International Workshop on Near Field Communication.

[37]  Dusit Niyato,et al.  Remote patient monitoring service using heterogeneous wireless access networks: architecture and optimization , 2009, IEEE Journal on Selected Areas in Communications.

[38]  Albrecht Schmidt,et al.  Perci: Pervasive Service Interaction with the Internet of Things , 2009, IEEE Internet Computing.

[39]  Alois Knoll,et al.  Services to the Field: An Approach for Resource Constrained Sensor/Actor Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.

[40]  Gilles Grimaud,et al.  The Web of Things: Interconnecting Devices with High Usability and Performance , 2009, 2009 International Conference on Embedded Software and Systems.

[41]  Jonathan W. Hui,et al.  Internet Protocol for Smart Objects (ipso) Alliance , 2009 .

[42]  Vlad Trifa,et al.  Towards the Web of Things: Web Mashups for Embedded Devices , 2009 .

[43]  Leilani Battle,et al.  Building the Internet of Things Using RFID: The RFID Ecosystem Experience , 2009, IEEE Internet Computing.

[44]  Francesco Amato,et al.  Sensor-Oriented Passive RFID , 2010 .

[45]  Carlo Maria Medaglia,et al.  An Overview of Privacy and Security Issues in the Internet of Things , 2010 .

[46]  Olivier Savry,et al.  Security and Privacy Protection of Contactless Devices , 2010 .

[47]  Mikko Tapani Karaiste Delete: The virtue of forgetting in the digital age , 2010 .

[48]  George Bilgere Anywhere , 2011 .