A walkthrough of the emerging IoT paradigm: Visualizing inside functionalities, key features, and open issues

Abstract Internet of Things (IoT) is often envisioned as a paradigm shift from the traditional Internet to a scenario where all the “things” will be connected with the Internet. IoT forced the development of novel IoT standards to bring heterogeneous devices and protocols under one umbrella for the seamless interaction between them. To this end, a plethora of IoT standards and definitions have been proposed over the last decade. However, a common consensus over these standards and definitions is yet to be achieved. Another contemporary issue faced by IoT research community is the absence of a clear functional view of different IoT components working together in a cohesive manner to achieve the envisioned “connect everything” phenomena that serve the bigger objective of gathering the information and processing it for better decision making. Information gathering and processing bring the technologies such as “Cloud Computing” and “Big-Data” into the picture with IoT. In the line of energy efficient data processing, “Fog Computing” was introduced a few years back that is one of the key enablers of the contemporary industrial revolution often termed as “Industry 4.0”. However, there is still a need for a detailed study about how “Cloud computing”, “Big data”, and “Fog computing” fit together and act as building blocks of the much envisioned IoT. In this paper, we study the aforementioned issues in the following manner. First, we cover almost every IoT standard and definition available in the literature and propose an unbiased definition of IoT that takes into consideration the key objectives of various research groups. We also discuss the key components of IoT architecture and propose a functional view of IoT based on Weiser's model and information value loop that helps to specify a clear functionality of various IoT enablers. Following this, a detail discussion on information gathering and processing in IoT is supported by state-of-the-art and contemporary technologies such as Cloud computing and Fog computing respectively. We also propose a new perspective of IoT as social processes and a decentralized multi-agent system in order to address not so obvious future challenges that may arise as the research in IoT proceeds and new application domains are discovered. All in all, this survey provides a birds-eye view for the domain as well as introduce intricacies about the IoT functionality, enabling technologies, challenges, future research trends and directions. In the end, this paper discusses the state-of-the-art and contemporary simulations tools that can be used to implement the IoT based projects. All in all, this paper gives a much wider view of almost every technology related to IoT and its bigger objective of gathering more information and processing it according to the application requirement for better decision making.

[1]  Josep Paradells Aspas,et al.  Smart Cities as an Application of Internet of Things: Experiences and Lessons Learnt in Barcelona , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[2]  David E. Culler,et al.  TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.

[3]  David E. Culler,et al.  Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.

[4]  Thomas Kunz,et al.  Operating Systems for Wireless Sensor Networks: A Survey , 2011, Sensors.

[5]  Jonathan Larsson,et al.  CLIENT-SIDE EVALUATION OF QUALITY OF SERVICE IN CLOUD APPLICATIONS , 2017 .

[6]  Franco Zambonelli,et al.  Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence , 2012, Pervasive Mob. Comput..

[7]  Marimuthu Palaniswami,et al.  An Information Framework for Creating a Smart City Through Internet of Things , 2014, IEEE Internet of Things Journal.

[8]  Adam Dunkels,et al.  Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[9]  Subhas Chandra Mukhopadhyay,et al.  Internet of Things: Challenges and Opportunities , 2014 .

[10]  Hongming Cai,et al.  Fog Computing Approach for Music Cognition System Based on Machine Learning Algorithm , 2018, IEEE Transactions on Computational Social Systems.

[11]  Kris Steenhaut,et al.  Evaluation of constrained application protocol for wireless sensor networks , 2011, 2011 18th IEEE Workshop on Local & Metropolitan Area Networks (LANMAN).

[12]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[13]  Rüdiger Frank Jacob Fraden: Handbook of modern sensors: physics, designs, and applications , 2005 .

[14]  Andreas Pitsillides,et al.  Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures , 2014, IEEE Communications Surveys & Tutorials.

[15]  Jad El-khoury,et al.  Making interoperability visible: Data visualization of cyber-physical systems development tool chains , 2016, J. Ind. Inf. Integr..

[16]  H. Madsen,et al.  Reliability in the utility computing era: Towards reliable Fog computing , 2013, 2013 20th International Conference on Systems, Signals and Image Processing (IWSSIP).

[17]  François Carrez,et al.  Designing IoT architecture(s): A European perspective , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[18]  Fei Tao,et al.  Data and knowledge mining with big data towards smart production , 2017, J. Ind. Inf. Integr..

[19]  Hong Chen,et al.  Applications of Cyber-Physical System: A Literature Review , 2017 .

[20]  Kevin C. Desouza,et al.  Intelligent agents for competitive intelligence: Survey of applications , 2001 .

[21]  Xinjun Qi,et al.  An Overview of Privacy Preserving Data Mining , 2012 .

[22]  Paul R. Jackson,et al.  Shifting paradigm to service-dominant logic via Internet-of-Things with applications in the elevators industry , 2017 .

[23]  Milutin Radonjic,et al.  The IoT Architectural Framework, Design Issues and Application Domains , 2017, Wirel. Pers. Commun..

[24]  Yang Lu,et al.  Cyber Physical System (CPS)-Based Industry 4.0: A Survey , 2017 .

[25]  Simon G. M. Koo,et al.  Internet of Things: Services and Applications Categorization , 2011, Adv. Internet Things.

[26]  Miao Wu,et al.  Research on the architecture of Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[27]  Yang Lu,et al.  Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics , 2019, IEEE Internet of Things Journal.

[28]  Munindar P. Singh,et al.  The Internet of Things and Multiagent Systems: Decentralized Intelligence in Distributed Computing , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[29]  Ken Sakamura,et al.  Ubiquitous ID: Standards for Ubiquitous Computing and the Internet of Things , 2010, IEEE Pervasive Computing.

[30]  Kevin Ashton,et al.  That ‘Internet of Things’ Thing , 1999 .

[31]  Benny Pinkas,et al.  Peer-to-Peer Secure Multi-party Numerical Computation , 2008, Peer-to-Peer Computing.

[32]  Qiaoyan Wen,et al.  An identity-based personal location system with protected privacy in IOT , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.

[33]  Hong Chen,et al.  Theoretical Foundations for Cyber-Physical Systems: A Literature Review , 2017 .

[34]  Gabriel Montenegro,et al.  IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.

[35]  Fadi Al-Turjman,et al.  5G-enabled devices and smart-spaces in social-IoT: An overview , 2017, Future Gener. Comput. Syst..

[36]  Basavaraj Patil,et al.  IPv6 over BLUETOOTH(R) Low Energy , 2015, RFC.

[37]  Wen Liu,et al.  A Protocol of Secure Multi-party Multi-data Ranking and Its Application in Privacy Preserving Sequential Pattern Mining , 2011, 2011 Fourth International Joint Conference on Computational Sciences and Optimization.

[38]  T. W. Chim,et al.  Weighted average problem revisited under hybrid and malicious model , 2012, 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT).

[39]  Michael Mealling,et al.  A Uniform Resource Name Namespace for the EPCglobal Electronic Product Code (EPC) and Related Standards , 2008, RFC.

[40]  Charalampos Doukas,et al.  Building Internet of Things with the Arduino , 2012 .

[41]  Meir Kalech,et al.  Sensor fault detection and diagnosis for autonomous systems , 2013, AAMAS.

[42]  Edward A. Lee,et al.  Introduction to Embedded Systems - A Cyber-Physical Systems Approach , 2013 .

[43]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[44]  Li D. Xu,et al.  QoS Recommendation in Cloud Services , 2017, IEEE Access.

[45]  Li Mingdong,et al.  Services and Key Technologies of the Internet of Things , 2020 .

[46]  Anurag Agarwal,et al.  The Internet of Things—A survey of topics and trends , 2014, Information Systems Frontiers.

[47]  Hongming Cai,et al.  Healthcare data analysis system for regional medical union in smart city , 2018, Journal of Management Analytics.

[48]  Luiz Affonso Guedes,et al.  A dependability evaluation for Internet of Things incorporating redundancy aspects , 2014, Proceedings of the 11th IEEE International Conference on Networking, Sensing and Control.

[49]  Alessandro Bassi,et al.  Enabling Things to Talk , 2013, Springer Berlin Heidelberg.

[50]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[51]  Tarek F. Abdelzaher,et al.  The LiteOS Operating System: Towards Unix-Like Abstractions for Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[52]  Mohammed Atiquzzaman,et al.  Interoperability in Internet of Things: Taxonomies and Open Challenges , 2018, Mobile Networks and Applications.

[53]  Hwaiyu Geng,et al.  Internet of Things and Data Analytics Handbook , 2017 .

[54]  Rong Zheng,et al.  Cyber-physical systems: Milestones and research challenges , 2012, Comput. Commun..

[55]  Michele Zorzi,et al.  Architecture and protocols for the Internet of Things: A case study , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[56]  Matti Siekkinen,et al.  How low energy is bluetooth low energy? Comparative measurements with ZigBee/802.15.4 , 2012, 2012 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).

[57]  Benjamin K. S. Khoo,et al.  RFID as an Enabler of the Internet of Things: Issues of Security and Privacy , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[58]  Utz Roedig,et al.  Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN , 2014, Secur. Commun. Networks.

[59]  Xiaojiang Chen,et al.  A QoS Architecture for IOT , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[60]  Nalini Venkatasubramanian,et al.  A Software Defined Networking architecture for the Internet-of-Things , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).

[61]  Mikhail J. Atallah,et al.  Private Information: To Reveal or not to Reveal , 2008, TSEC.

[62]  Kun Wang,et al.  Trust control in heterogeneous networks for Internet of Things , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[63]  Jakob Buron,et al.  Home Automation Routing Requirements in Low-Power and Lossy Networks , 2008, RFC.

[64]  Byung-Seo Kim,et al.  Trust Management Techniques for the Internet of Things: A Survey , 2019, IEEE Access.

[65]  Mehdi Dastani,et al.  Programming norm-aware agents , 2012, AAMAS.

[66]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[67]  Florian Kerschbaum,et al.  Privacy-preserving computation of benchmarks on item-level data using RFID , 2010, WiSec '10.

[68]  Anders Fongen,et al.  Identity Management and Integrity Protection in the Internet of Things , 2012, 2012 Third International Conference on Emerging Security Technologies.

[69]  Harmanjot Kaur A Literature Review on Internet of Things Application Layer Communication Protocols , 2019 .

[70]  Ricardo Simon Carbajo,et al.  Performance evaluation of the 6LoWPAN protocol on MICAz and TelosB motes , 2009, PM2HW2N '09.

[71]  Giovanni Emanuele Corazza,et al.  Introducing the QEST broker: Scaling the IoT by bridging MQTT and REST , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).

[72]  Abdelmadjid Bouabdallah,et al.  Reliability for Emergency Applications in Internet of Things , 2013, 2013 IEEE International Conference on Distributed Computing in Sensor Systems.

[73]  Antonio F. Gómez-Skarmeta,et al.  Mobility Modeling and Security Validation of a Mobility Management Scheme Based on ECC for IP-based Wireless Sensor Networks (6LoWPAN) , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[74]  Guido Boella,et al.  How to Program Organizations and Roles in the JADE Framework , 2008, MATES.

[75]  Opher Etzion,et al.  Event processing under uncertainty , 2012, DEBS.

[76]  Qian Zhu,et al.  IOT Gateway: BridgingWireless Sensor Networks into Internet of Things , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[77]  Heng Wang,et al.  A Lightweight XMPP Publish/Subscribe Scheme for Resource-Constrained IoT Devices , 2017, IEEE Access.

[78]  Thomas C. Schmidt,et al.  RIOT OS: Towards an OS for the Internet of Things , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[79]  Panagiotis G. Sarigiannidis,et al.  Securing the Internet of Things: Challenges, threats and solutions , 2019, Internet Things.

[80]  Arijit Mukherjee,et al.  ANGELS for distributed analytics in IoT , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[81]  H. Hashim,et al.  A lightweight and secure TFTP protocol for smart environment , 2012, 2012 International Symposium on Computer Applications and Industrial Electronics (ISCAIE).

[82]  Lida Xu,et al.  Cloud Service Negotiation in Internet of Things Environment: A Mixed Approach , 2014, IEEE Transactions on Industrial Informatics.

[83]  Hossein Hassani,et al.  Banking with blockchain-ed big data , 2018, Journal of Management Analytics.

[84]  J. V. Rauff,et al.  Multi-Agent Systems: An Introduction to Distributed Artificial Intelligence , 2005 .

[85]  Alexander Gluhak,et al.  A survey on facilities for experimental internet of things research , 2011, IEEE Communications Magazine.

[86]  Gianluca Reali,et al.  Comparison of two lightweight protocols for smartphone-based sensing , 2013, 2013 IEEE 20th Symposium on Communications and Vehicular Technology in the Benelux (SCVT).

[87]  Miika Komu,et al.  Techno-economic feasibility analysis of constrained application protocol , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[88]  Jia Guo,et al.  Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).

[89]  Gordan Jezic,et al.  Beyond the Internet of Things: The Social Networking of Machines , 2016, Int. J. Distributed Sens. Networks.

[90]  Anna Calveras Augé,et al.  TinyCoAP: A Novel Constrained Application Protocol (CoAP) Implementation for Embedding RESTful Web Services in Wireless Sensor Networks Based on TinyOS , 2013, J. Sens. Actuator Networks.

[91]  Jaydip Sen,et al.  Embedded security for Internet of Things , 2011, 2011 2nd National Conference on Emerging Trends and Applications in Computer Science.

[92]  Radha Poovendran,et al.  Cyber-Physical Systems: Close Encounters Between Two Parallel Worlds [Point of View] , 2010, Proc. IEEE.

[93]  Xiaofei Wang,et al.  A multiple communication standards compatible IoT system for medical usage , 2013, 2013 IEEE Faible Tension Faible Consommation.

[94]  Yu Yang,et al.  Study and application on the architecture and key technologies for IOT , 2011, 2011 International Conference on Multimedia Technology.

[95]  Nathan Chenette,et al.  Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..

[96]  Carsten Bormann,et al.  The Constrained Application Protocol (CoAP) , 2014, RFC.

[97]  Hoeteck Wee,et al.  Black-Box, Round-Efficient Secure Computation via Non-malleability Amplification , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.

[98]  Qing Wang,et al.  Wireless IoT Platform Based on SDR Technology , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[99]  Roberto Riggio,et al.  DARE: evaluating Data Accuracy using node REputation , 2013, Comput. Networks.

[100]  Laurence T. Yang,et al.  Data Mining for Internet of Things: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[101]  Zhao Haitao,et al.  Cross-layer framework for fine-grained channel access in next generation high-density WiFi networks , 2016 .

[102]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[103]  Hiroaki Harai,et al.  A Resource Mobility Scheme for Service-Continuity in the Internet of Things , 2012, 2012 IEEE International Conference on Green Computing and Communications.

[104]  Arjun Sharma,et al.  Park-A-Lot: An Automated Parking Management System , 2013 .

[105]  Muli Ben-Yehuda,et al.  The Reservoir model and architecture for open federated cloud computing , 2009, IBM J. Res. Dev..

[106]  Ing-Ray Chen,et al.  Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[107]  Richard Grayson,et al.  An internet of things , 2015 .

[108]  Li Da Xu,et al.  Industry 4.0: state of the art and future trends , 2018, Int. J. Prod. Res..

[109]  Sheng Huang,et al.  TSAaaS: Time Series Analytics as a Service on IoT , 2014, 2014 IEEE International Conference on Web Services.

[110]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[111]  Pasi Tyrväinen,et al.  A framework for evaluating Internet-of-Things platforms: Application provider viewpoint , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[112]  David Evans,et al.  Efficient Data Tagging for Managing Privacy in the Internet of Things , 2012, 2012 IEEE International Conference on Green Computing and Communications.

[113]  Sourabh Bharti,et al.  Gravitational outlier detection for wireless sensor networks , 2016, Int. J. Commun. Syst..

[114]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[115]  George F. Riley,et al.  The ns-3 Network Simulator , 2010, Modeling and Tools for Network Simulation.

[116]  Rafael H. Bordini,et al.  BDI Agent Programming in AgentSpeak Using Jason (Tutorial Paper) , 2005, CLIMA.

[117]  L. A. Grieco,et al.  Performance analysis of the RPL Routing Protocol , 2011, 2011 IEEE International Conference on Mechatronics.

[118]  Mads Haahr,et al.  Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.

[119]  Hong Linh Truong,et al.  MQTT-S — A publish/subscribe protocol for Wireless Sensor Networks , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).

[120]  Kerry L. Taylor,et al.  Semantics for the Internet of Things: Early Progress and Back to the Future , 2019 .

[121]  Sudip Misra,et al.  Bio-inspired group mobility model for mobile ad hoc networks based on bird-flocking behavior , 2011, Soft Computing.

[122]  Lida Xu,et al.  CLOUDQUAL: A Quality Model for Cloud Services , 2014, IEEE Transactions on Industrial Informatics.

[123]  S. Singh,et al.  Routing Protocols in Wireless Sensor Networks - A Survey , 2010 .

[124]  John A. Stankovic,et al.  Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.

[125]  Rajkumar Buyya,et al.  iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments , 2016, Softw. Pract. Exp..

[126]  Mehedi Hasan,et al.  Domicile - An IoT Based Smart Home Automation System , 2019, 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST).

[127]  Sarmad Ullah Khan,et al.  Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.

[128]  Carsten Bormann,et al.  CoAP: An Application Protocol for Billions of Tiny Internet Nodes , 2012, IEEE Internet Computing.

[129]  B. B. P. Rao,et al.  Cloud computing for Internet of Things & sensing based applications , 2012, 2012 Sixth International Conference on Sensing Technology (ICST).

[130]  Durgesh Kumar Mishra,et al.  Secure Multi-Party Computation for statistical computations using virtual parties on a Token Ring Network , 2010, 2010 Seventh International Conference on Wireless and Optical Communications Networks - (WOCN).

[131]  Huiqun Yu,et al.  Modeling and analyzing web application with aspect-oriented hierarchical Coloured Petri Nets , 2016, China Communications.

[132]  Eleonora Borgia,et al.  The Internet of Things vision: Key features, applications and open issues , 2014, Comput. Commun..

[133]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[134]  Xavier Masip-Bruin,et al.  A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration , 2018, ACM Comput. Surv..

[135]  Nik Bessis,et al.  Towards Simulating the Internet of Things , 2014, 2014 28th International Conference on Advanced Information Networking and Applications Workshops.

[136]  Shusen Yang,et al.  A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.

[137]  Radu Sion,et al.  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality , 2011, IEEE Transactions on Knowledge and Data Engineering.

[138]  Edward A. Lee Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[139]  Mikhail J. Atallah,et al.  Hidden access control policies with hidden credentials , 2004, WPES '04.

[140]  Garth V. Crosby,et al.  Wireless sensor networks and LTE-A network convergence , 2013, 38th Annual IEEE Conference on Local Computer Networks.

[141]  Nader Mohamed,et al.  Challenges in middleware solutions for the internet of things , 2012, 2012 International Conference on Collaboration Technologies and Systems (CTS).

[142]  Wei Jiang,et al.  Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.

[143]  Zuo Chao,et al.  Design and Implementation of a Smart IoT Gateway , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[144]  Patrick Crowley,et al.  Named data networking , 2014, CCRV.

[145]  Lida Xu,et al.  Big data for cyber physical systems in industry 4.0: a survey , 2019, Enterp. Inf. Syst..

[146]  Bo Hu,et al.  A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective , 2014, IEEE Internet of Things Journal.

[147]  Geoffrey Fox,et al.  Architecture and measured characteristics of a cloud based internet of things , 2012, 2012 International Conference on Collaboration Technologies and Systems (CTS).

[148]  Uwe Hansmann,et al.  Pervasive Computing , 2003 .

[149]  Samik Basu,et al.  Deciding choreography realizability , 2012, POPL '12.

[150]  Lihui Wang,et al.  Current status and advancement of cyber-physical systems in manufacturing , 2015 .

[151]  Klaus Moessner,et al.  Service Continuity for Subscribers of the Mobile Real World Internet , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).

[152]  Munindar P. Singh,et al.  Generalized Commitment Alignment , 2015, AAMAS.

[153]  Munindar P. Singh,et al.  Interaction protocols as design abstractions for business processes , 2005, IEEE Transactions on Software Engineering.

[154]  Xiaoping Ma,et al.  Performance evaluation of MQTT and CoAP via a common middleware , 2014, 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[155]  D.K. Mishra,et al.  A zero-hacking protocol for secure multiparty computation using multiple TTP , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.

[156]  Tilman Wolf,et al.  Automated Sensor Verification Using Outlier Detection in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[157]  Dieter Uckelmann,et al.  Performance Measurement and Cost Benefit Analysis for RFID and Internet of Things Implementations in Logistics , 2012 .

[158]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[159]  Paulo F. Pires,et al.  The Resource Management Challenge in IoT , 2017 .

[160]  R. Kshetrimayum,et al.  An introduction to UWB communication systems , 2009, IEEE Potentials.

[161]  Michael Winikoff Designing Commitment-Based Agent Interactions , 2006, 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology.

[162]  Chia-Peng Lee,et al.  Group Mobility Management for Large-Scale Machine-to-Machine Mobile Networking , 2014, IEEE Transactions on Vehicular Technology.

[163]  Sateesh Addepalli,et al.  Fog computing and its role in the internet of things , 2012, MCC '12.

[164]  Roy Want,et al.  Near field communication , 2011, IEEE Pervasive Computing.

[165]  Mehdi Dastani,et al.  2APL: a practical agent programming language , 2008, Autonomous Agents and Multi-Agent Systems.

[166]  Jacob Fraden,et al.  Handbook of modern sensors , 1997 .

[167]  Chao Yang,et al.  Intelligent Edge Computing for IoT-Based Energy Management in Smart Cities , 2019, IEEE Network.

[168]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[169]  Thomas H. Clausen,et al.  A critical evaluation of the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[170]  Dongxi Liu,et al.  Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies , 2019, IEEE Network.

[171]  Diane J. Cook,et al.  CASAS: A Smart Home in a Box , 2013, Computer.