Standards, Security and Business Models: Key Challenges for the IoT Scenario

The number of physical objects connected to the Internet constantly grows and a common thought says the IoT scenario will change the way we live and work. Since IoT technologies have the potential to be pervasive in almost every aspect of a human life, in this paper, we deeply analyze the IoT scenario. First, we describe IoT in simple terms and then we investigate what current technologies can achieve. Our analysis shows four major issues that may limit the use of IoT (i.e., interoperability, security, privacy, and business models) and it highlights possible solutions to solve these problems. Finally, we provide a simulation analysis that emphasizes issues and suggests practical research directions.

[1]  Marcel Bogers,et al.  on Intelligent Manufacturing and Automation , 2013 The Smart Factory : Exploring Adaptive and Flexible Manufacturing Solutions , 2014 .

[2]  Marco Roccetti,et al.  WWW recycling for a better world , 2010, CACM.

[3]  Federica Mandreoli,et al.  A Framework for ITS Data Management in a Smart City Scenario , 2013, SMARTGREENS.

[4]  Marco Furini,et al.  IoT: Science Fiction or Real Revolution? , 2016, GOODTECHS.

[5]  Honghui Fan,et al.  The Design of the Internet of Things Solution for Food Supply Chain , 2015 .

[6]  David Maier,et al.  A first tutorial on dataspaces , 2008, Proc. VLDB Endow..

[7]  Marco Furini,et al.  Location privacy and public metadata in social media platforms: attitudes, behaviors and opinions , 2014, Multimedia Tools and Applications.

[8]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[9]  Marco Furini,et al.  TSentiment: On gamifying Twitter sentiment analysis , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).

[10]  Marco Furini,et al.  Understanding the City to Make It Smart , 2015, IoT 360.

[11]  Federica Mandreoli,et al.  RPDM: A system for RFID probabilistic data management , 2014, J. Ambient Intell. Smart Environ..

[12]  Marco Roccetti,et al.  MDTN: Mobile Delay/Disruption Tolerant Network , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).

[13]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[14]  Jaroslav Opatrny,et al.  Randomized 3D Position-based Routing Algorithms for Ad-hoc Networks , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.

[15]  Jan Markendahl,et al.  WHO IS INVESTING IN MACHINE-TO-MACHINE COMMUNICATIONS? , 2013 .

[16]  J. Manyika,et al.  Disruptive technologies: Advances that will transform life, business, and the global economy , 2013 .

[17]  Lorenzo Donatiello,et al.  Ad hoc networks: a protocol for supporting QoS applications , 2003, Proceedings International Parallel and Distributed Processing Symposium.

[18]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[19]  Marco Furini,et al.  On using cashtags to predict companies stock trends , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[20]  M. Roccetti,et al.  Riding the Web Evolution: From Egoism to Altruism , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.

[21]  Federica Mandreoli,et al.  A Data Management Middleware for ITS Services in Smart Cities , 2016, J. Univers. Comput. Sci..

[22]  Sneha A. Dalvi,et al.  Internet of Things for Smart Cities , 2017 .

[23]  Ivan Stojmenovic,et al.  Routing with Guaranteed Delivery in Ad Hoc Wireless Networks , 1999, DIALM '99.

[24]  Marco Furini,et al.  Smart Cart: When Food Enters the IoT Scenario , 2015, IoT 360.

[25]  Marco Roccetti,et al.  An overview of opportunistic ad hoc communication in urban scenarios , 2014, 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET).

[26]  J. Opatrny,et al.  3-D Localized Position-Based Routing with Nearly Certain Delivery in Mobile Ad Hoc Networks , 2007, 2007 2nd International Symposium on Wireless Pervasive Computing.

[27]  Laura M. Haas,et al.  Information integration in the enterprise , 2008, CACM.

[28]  Roger Wattenhofer,et al.  Randomized 3D Geographic Routing , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[29]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[30]  Paolo Bellavista,et al.  Convergence of MANET and WSN in IoT Urban Scenarios , 2013, IEEE Sensors Journal.

[31]  Luciano Bononi,et al.  Real-Time Traffic in Ad-Hoc Sensor Networks , 2009, 2009 IEEE International Conference on Communications.

[32]  Marco Furini Users Behavior in Location-Aware Services: Digital Natives versus Digital Immigrants , 2014, Adv. Hum. Comput. Interact..

[33]  Mamun Bin Ibne Reaz,et al.  A Review of Smart Homes—Past, Present, and Future , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[34]  Mika Westerlund,et al.  Designing Business Models for the Internet of Things , 2014 .

[35]  Kyung-Sup Kwak,et al.  The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.

[36]  James P. G. Sterbenz,et al.  Destination-sequenced distance vector (DSDV) routing protocol implementation in ns-3 , 2011, SimuTools.

[37]  Marco Furini,et al.  TRank: Ranking Twitter users according to specific topics , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).