Internet of Things (IoT): An Overview of Applications and Security Issues Regarding Implementation

The Internet of Things (IoT) is a powerful paradigm that has made progress in the almost every field of human life. This paper gives an overview of IoT, its enabling technologies, applications and security issues in the wireless technologies. IoT is enabled by a number of different technologies such as Radio Frequency Identifiers (RFID), and Wireless Sensor Networks (WSN). There are huge number of applications of IoT in almost every aspect of life i.e. healthcare, logistics and supply chain management, smart environment and social application etc. only a few of these applications are discussed in this paper. Security is an important concern of wireless networks and so it is one of the main issues in IoT. This paper gives an overview of the few of many security concerns in an IoT system and methods to prevent those issues.

[1]  Xingzhi Lin Logistic geographical information detecting unified information system based on Internet of Things , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[2]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[3]  Dimosthenis Kyriazis,et al.  Sustainable smart city IoT applications: Heat and electricity management & Eco-conscious cruise control for public transportation , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[4]  Gaetano Marrocco,et al.  NIGHT-Care: A Passive RFID System for Remote Monitoring and Control of Overnight Living Environment , 2014, ANT/SEIT.

[5]  Luigi Atzori,et al.  Implementation of an Experimental Platform for the Social Internet of Things , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[6]  Harshal D. Misalkar,et al.  Review of Internet of Things in development of smart cities with data management & privacy , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.

[7]  Michele Zorzi,et al.  Health care applications: a solution based on the internet of things , 2011, ISABEL '11.

[8]  Kevin Ashton,et al.  That ‘Internet of Things’ Thing , 1999 .

[9]  Vlad Trifa,et al.  SOA-Based Integration of the Internet of Things in Enterprise Services , 2009, 2009 IEEE International Conference on Web Services.

[10]  Vladimir Oleshchuk,et al.  Internet of things and privacy preserving technologies , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.

[11]  Gurudatt Kulkarni,et al.  “RFID security issues & challenges” , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).

[12]  T. Wark,et al.  Wireless localisation network for patient tracking , 2008, 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[13]  Chuan Zhang,et al.  A Reconfigurable Smart Sensor Interface for Industrial WSN in IoT Environment , 2014, IEEE Transactions on Industrial Informatics.

[14]  Wilhelm Stork,et al.  Empirical Analysis and Ranging Using Environment and Mobility Adaptive RSSI Filter for Patient Localization during Disaster Management , 2009, 2009 Fifth International Conference on Networking and Services.

[15]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[16]  Kevin Kelly,et al.  SODA: Service Oriented Device Architecture , 2006, IEEE Pervasive Computing.

[17]  Wei Li,et al.  An Immune Theory Based Health Monitoring and Risk Evaluation of Earthen Sites with Internet of Things , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[18]  Julien Bourgeois,et al.  ALMA, A Logistic Mobile Application Based on Internet of Things , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[19]  Zhigao Du,et al.  Design and Implementation of Safety Management System for Oil Depot Based on Internet of Things , 2012, GreenCom.

[20]  Yu Zhang,et al.  The Application of Internet of Things in Social Network , 2014, 2014 IEEE 38th International Computer Software and Applications Conference Workshops.

[21]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[22]  Frédéric Thiesse,et al.  Sensor Applications in the Supply Chain: The Example of Quality-Based Issuing of Perishables , 2008, IOT.

[23]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[24]  Ross A. Knepper,et al.  RF-compass: robot object manipulation using RFIDs , 2013, MobiCom.

[25]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[26]  Srijith Krishnan Nair,et al.  Self Managed Security Cell, a Security Model for the Internet of Things and Services , 2009, 2009 First International Conference on Advances in Future Internet.

[27]  Gurpreet Singh Matharu,et al.  The Internet of Things: Challenges & security issues , 2014, 2014 International Conference on Emerging Technologies (ICET).

[28]  James Pasley,et al.  How BPEL and SOA Are Changing Web Services Development , 2005, IEEE Internet Comput..

[29]  Atul Negi,et al.  Principle application and vision in Internet of Things (IoT) , 2015, International Conference on Computing, Communication & Automation.

[30]  Avishai Wool,et al.  Picking Virtual Pockets using Relay Attacks on Contactless Smartcard , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[31]  Abdulsalam Yassine,et al.  Equipment Location in Hospitals Using RFID-Based Positioning System , 2012, IEEE Transactions on Information Technology in Biomedicine.

[32]  Luming Tan,et al.  Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[33]  Dominique Guinard,et al.  Building a Smart Hospital using RFID Technologies , 2006, ECEH.

[34]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[35]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[36]  Renwang Li,et al.  Based on the Internet of things the supermarket chain management information system development and safety stock research , 2010, 2010 2nd International Conference on Education Technology and Computer.

[37]  Luis Alonso,et al.  WSN4QoL: A WSN-Oriented Healthcare System Architecture , 2014, Int. J. Distributed Sens. Networks.

[38]  Tein-Yaw Chung,et al.  MUL-SWoT: A Social Web of Things Platform for Internet of Things Application Development , 2014, 2014 IEEE International Conference on Internet of Things(iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom).

[39]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[40]  Benjamin K. S. Khoo,et al.  RFID as an Enabler of the Internet of Things: Issues of Security and Privacy , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[41]  Rosli Salleh,et al.  Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.

[42]  Alois Knoll,et al.  Services to the Field: An Approach for Resource Constrained Sensor/Actor Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.