Annotated Bibliography on Emerging Technology and Innovations
VerifiedAdded on 2023/06/08
|14
|3320
|492
AI Summary
This annotated bibliography explores the existing literature on the Internet of Things (IoT) and emerging technology and innovations. It covers topics such as the integration of cloud computing and IoT, mobile M2M communication architectures, IoT security, and the potential benefits of IoT in smart cities and businesses. The sources cited provide valuable insights into the challenges and opportunities associated with IoT and offer suggestions for improving the technology.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: ANNOTATED BIBLIOGRAPHY 1
Annotated Bibliography on Emerging Technology and Innovations
Student
Tutor
Institutional Affiliation
Date
Annotated Bibliography on Emerging Technology and Innovations
Student
Tutor
Institutional Affiliation
Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ANNOTATED BIBLIOGRAPHY 2
TASK 1
Internet of Things (IoT)
Description of the technology
In spite of the much-advanced technology innovation in the world today, the dream of a
smart environment has been rarely fulfilled. Our environment, mainly home grounds are filled
with properties of different types that if they are all connected, they can be controlled from a
remote location. The innovation of the internet of things technology has become the best way of
configuring all the smart devices we have (Schaffers et al. 2011). Notwithstanding its potential
significance, the technology has not yet developed fully to change the living standard of people.
When a smart home is filled with the devices that are connected and controlled from one point,
life will be much more comfortable than it has been before. Through the internet of things, all
smart devices will get connected at homes thus reducing the work of operating the machines.
While the internet of things may have certain limitations such as connection failure the
technology domain is being developed and can be used in improving other activities (Xia, Yang,
Wang, & Vinel, 2012; Wei, 2014; Al-Fuqaha, Guizani, Mohammadi, Aledhari, & Ayyash,
2015). This article shall explore all these factors including reviews on the existing literature on
the Internet of things IoT in an annotated bibliography.
Literature review
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and
internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
TASK 1
Internet of Things (IoT)
Description of the technology
In spite of the much-advanced technology innovation in the world today, the dream of a
smart environment has been rarely fulfilled. Our environment, mainly home grounds are filled
with properties of different types that if they are all connected, they can be controlled from a
remote location. The innovation of the internet of things technology has become the best way of
configuring all the smart devices we have (Schaffers et al. 2011). Notwithstanding its potential
significance, the technology has not yet developed fully to change the living standard of people.
When a smart home is filled with the devices that are connected and controlled from one point,
life will be much more comfortable than it has been before. Through the internet of things, all
smart devices will get connected at homes thus reducing the work of operating the machines.
While the internet of things may have certain limitations such as connection failure the
technology domain is being developed and can be used in improving other activities (Xia, Yang,
Wang, & Vinel, 2012; Wei, 2014; Al-Fuqaha, Guizani, Mohammadi, Aledhari, & Ayyash,
2015). This article shall explore all these factors including reviews on the existing literature on
the Internet of things IoT in an annotated bibliography.
Literature review
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and
internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
ANNOTATED BIBLIOGRAPHY 3
Botta, De Donato, Persico, and Pescapé are renowned experts in the field of study. The
research team explores IoT and Cloud. These technologies have contributed a great deal
to the current state of technology. The utilization of these technologies has become more
universal today making them be part of the future technology. It can be foreseen that
emerging of the two techniques which are branded by the authors as a CloudIoT
paradigm will offer a significant number of potential application scenario in the future for
society.
According to the authors, various studies have examined Cloud and IoT separately yet
there is no detailed analysis concerning the CloudIoT paradigm that has gotten
conducted. This field of study is wealthy concerning the future technological needs. The
authors' further state that the integration of these two technologies show the next leap
ahead in the future technology. This will be opening up new exciting directions for
realizing the dreams on smart homes where smart devices are interconnected and
controlled from a remote location.
Mehmood, Y., Görg, C., Muehleisen, M., & Timm-Giel, A. (2015). Mobile M2M
communication architectures, upcoming challenges, applications, and future
directions. EURASIP Journal on Wireless Communications and Networking, 2015(1),
250.
These gentlemen draw a clear examination on the M2M and expound on the way that the
remote correspondence framework M2M is a vital perspective during coordination of the
IoT. M2M encourages omnipresent availability between different gadgets. The creators
express the essential segments of IoT with the incorporation of various necessities to
Botta, De Donato, Persico, and Pescapé are renowned experts in the field of study. The
research team explores IoT and Cloud. These technologies have contributed a great deal
to the current state of technology. The utilization of these technologies has become more
universal today making them be part of the future technology. It can be foreseen that
emerging of the two techniques which are branded by the authors as a CloudIoT
paradigm will offer a significant number of potential application scenario in the future for
society.
According to the authors, various studies have examined Cloud and IoT separately yet
there is no detailed analysis concerning the CloudIoT paradigm that has gotten
conducted. This field of study is wealthy concerning the future technological needs. The
authors' further state that the integration of these two technologies show the next leap
ahead in the future technology. This will be opening up new exciting directions for
realizing the dreams on smart homes where smart devices are interconnected and
controlled from a remote location.
Mehmood, Y., Görg, C., Muehleisen, M., & Timm-Giel, A. (2015). Mobile M2M
communication architectures, upcoming challenges, applications, and future
directions. EURASIP Journal on Wireless Communications and Networking, 2015(1),
250.
These gentlemen draw a clear examination on the M2M and expound on the way that the
remote correspondence framework M2M is a vital perspective during coordination of the
IoT. M2M encourages omnipresent availability between different gadgets. The creators
express the essential segments of IoT with the incorporation of various necessities to
ANNOTATED BIBLIOGRAPHY 4
enable the framework to detect, procure and process information, give the capacity to
offer different applications and administrations and additionally the ability to interface a
scope of various gadgets.
Further, protection and security are likewise taken as fundamental parts of the IoT. As a
duty in the exploration directed by the creators, the researchers moreover featured the
distinction between the M2M and Wireless framework.
The fundamental restriction of this examination is that the creators have not palatably
reacted to different critical concerns in regards to the sort of the basic engineering that
will be required by the CPS framework as they get incorporated with cloud innovation.
The creators did not clarify whether the current design will be a suitable choice or utilize
the new architecture. Be that as it may, as the article brings up, "The future framework
fashioners will be required to assess whether a transformative or progressive would be a
more compelling technique for incorporating the cloud-based M2M movement later on."
This piece offers a phenomenal outline of a few issues that are related to the coordination
of IoT gadgets and cloud foundation hence contributing helpful foundation data for my
research.
Sarma, S. (2016, March 11). The Internet of Things: Roadmap to a Connected World. MIT
Technology Review. Retrieved on 31st August 2018 from: <
https://www.technologyreview.com/s/601013/the-internet-of-things-roadmap-to-a-
connected-world/>
Sarma expound on evolution of IoT and discusses the potential downfall of the
technology. The author puts that the IoT will ultimately affect a lot of things soon both in
enable the framework to detect, procure and process information, give the capacity to
offer different applications and administrations and additionally the ability to interface a
scope of various gadgets.
Further, protection and security are likewise taken as fundamental parts of the IoT. As a
duty in the exploration directed by the creators, the researchers moreover featured the
distinction between the M2M and Wireless framework.
The fundamental restriction of this examination is that the creators have not palatably
reacted to different critical concerns in regards to the sort of the basic engineering that
will be required by the CPS framework as they get incorporated with cloud innovation.
The creators did not clarify whether the current design will be a suitable choice or utilize
the new architecture. Be that as it may, as the article brings up, "The future framework
fashioners will be required to assess whether a transformative or progressive would be a
more compelling technique for incorporating the cloud-based M2M movement later on."
This piece offers a phenomenal outline of a few issues that are related to the coordination
of IoT gadgets and cloud foundation hence contributing helpful foundation data for my
research.
Sarma, S. (2016, March 11). The Internet of Things: Roadmap to a Connected World. MIT
Technology Review. Retrieved on 31st August 2018 from: <
https://www.technologyreview.com/s/601013/the-internet-of-things-roadmap-to-a-
connected-world/>
Sarma expound on evolution of IoT and discusses the potential downfall of the
technology. The author puts that the IoT will ultimately affect a lot of things soon both in
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ANNOTATED BIBLIOGRAPHY 5
the industrial or personal environment. The author further asserts that the potential
downfall of the technology involves the lack an explicit architecture for setting up a
connection.
This source is very resourceful since the author elaborate upon three suggestions that he
thinks would be helpful in controlling problems and as such. From this, I learned the
downfall potentials of IoT system, as such, the source is very resourceful and will
contribute to my paper in my research work.
Morgan, S., (2016, January 14). IoT Security: $1-per-Thing To Protect Connected Devices.
Retrieved on 31st August, 2018 from: < https://www.darkreading.com/vulnerabilities---
threats/iot-security-$1-per-thing-to-protect-connected-devices/a/d-id/1323921>
This website offers a comparison between the amounts of smart device that will get
connected by the year 2020 with the inclined IoT security industry. The article has
concluded that for the privacy and security of the devices; the cost will be one dollar for
every device.
The author the article points to FBI Public Service Announcement which points out that
the difficult task of fixing IoT gadgets has put personal data and safety at risk. I like the
source since it provides a comparison between the number of devices and the cost of
reinforcing security for the protection of the personal information in the system.
Porter, M. E., & Heppelmann, J. E. (2015). How smart, connected products are transforming
companies. Harvard Business Review, 93(10), 96-114.
the industrial or personal environment. The author further asserts that the potential
downfall of the technology involves the lack an explicit architecture for setting up a
connection.
This source is very resourceful since the author elaborate upon three suggestions that he
thinks would be helpful in controlling problems and as such. From this, I learned the
downfall potentials of IoT system, as such, the source is very resourceful and will
contribute to my paper in my research work.
Morgan, S., (2016, January 14). IoT Security: $1-per-Thing To Protect Connected Devices.
Retrieved on 31st August, 2018 from: < https://www.darkreading.com/vulnerabilities---
threats/iot-security-$1-per-thing-to-protect-connected-devices/a/d-id/1323921>
This website offers a comparison between the amounts of smart device that will get
connected by the year 2020 with the inclined IoT security industry. The article has
concluded that for the privacy and security of the devices; the cost will be one dollar for
every device.
The author the article points to FBI Public Service Announcement which points out that
the difficult task of fixing IoT gadgets has put personal data and safety at risk. I like the
source since it provides a comparison between the number of devices and the cost of
reinforcing security for the protection of the personal information in the system.
Porter, M. E., & Heppelmann, J. E. (2015). How smart, connected products are transforming
companies. Harvard Business Review, 93(10), 96-114.
ANNOTATED BIBLIOGRAPHY 6
IoT is not limited to smart homes; it can also serve multiple fields where a more
advanced technology would be required to facilitate business operations as agued by
Porter and Heppelmann in “How smart, connected products are transforming companies.”
The authors describe the Internet of Things as a “Third Wave” of invention revolution
because of the advanced information technology. The pervasive connection of the smart
devices is associated with two unique functionalities. The first function is to allow
wireless transmission of information outside the parties. The second function, however, is
to allow for the exit of the products outside the device.
As in the eyes of the authors, smart devices have various purpose including monitoring
the condition of the product, optimizing the item activity and use to upgrade the item and
in conclusion to control and customize client connection with the item. Putting these
three factors of a smart device together, a business organization will have an autonomous
product operation and enhancement, self-diagnosis, and personalization, thus increasing
the productivity of the business organization.
Bojic, I., Granjal, J., Monteiro, E., Katusic, D., Skocir, P., Kusek, M., & Jezic, G. (2014).
Communication and security in machine-to-machine systems. In Wireless Networking for
Moving Objects (pp. 255-281). Springer, Cham.
The team of researchers is information science experts whose works have gain
reputations in the subject domain. The authors examine the impacts that connected
devices like Wireless Machine-to-Machine M2M or Internet of Things will encounter and
that its implementers need to prepare and reinforce the security of this connection to
protect data that is stored within the system.
IoT is not limited to smart homes; it can also serve multiple fields where a more
advanced technology would be required to facilitate business operations as agued by
Porter and Heppelmann in “How smart, connected products are transforming companies.”
The authors describe the Internet of Things as a “Third Wave” of invention revolution
because of the advanced information technology. The pervasive connection of the smart
devices is associated with two unique functionalities. The first function is to allow
wireless transmission of information outside the parties. The second function, however, is
to allow for the exit of the products outside the device.
As in the eyes of the authors, smart devices have various purpose including monitoring
the condition of the product, optimizing the item activity and use to upgrade the item and
in conclusion to control and customize client connection with the item. Putting these
three factors of a smart device together, a business organization will have an autonomous
product operation and enhancement, self-diagnosis, and personalization, thus increasing
the productivity of the business organization.
Bojic, I., Granjal, J., Monteiro, E., Katusic, D., Skocir, P., Kusek, M., & Jezic, G. (2014).
Communication and security in machine-to-machine systems. In Wireless Networking for
Moving Objects (pp. 255-281). Springer, Cham.
The team of researchers is information science experts whose works have gain
reputations in the subject domain. The authors examine the impacts that connected
devices like Wireless Machine-to-Machine M2M or Internet of Things will encounter and
that its implementers need to prepare and reinforce the security of this connection to
protect data that is stored within the system.
ANNOTATED BIBLIOGRAPHY 7
The scholars classify security into three different domain including Devices, Networks
and lastly Services. This is meant to help its implementers to understand where they
should focus the security needs. The authors further categorize threats into three different
domains. The dangers within the device domain include stealing of sensitive information
and malware installation and stealing of confidential data. Risks within the network
domain, however, constitute identity spoofing and eavesdropping network traffic. Threats
within the service domain are stated as attacks that abuse the business logic.
For a point of fact, this source is a great one since it highlights the fact that safety is a
critical issue in the IoT connections. The article further classifies the types of threats that
exist in a system as well as classification of the dangers which is very important for this
research as we should know various kinds of challenges before we implement IoT.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and
challenges. Information sciences, 305, 357-383.
This source expounds various security challenges that are related deployment of the IoT
gadgets. The authors push that deployment of the IoT devices leads to multiple problems
to the new security landscape of the system. This piece further sightsees that various the
security available in the market today cannot be used in mitigating the ongoing risk that
is associated with the M2M/IoT. The scholars also mentioned ways by which the
components of the IoT can communicate with one another and provide scenarios by
which this process can be done securely.
The scholars classify security into three different domain including Devices, Networks
and lastly Services. This is meant to help its implementers to understand where they
should focus the security needs. The authors further categorize threats into three different
domains. The dangers within the device domain include stealing of sensitive information
and malware installation and stealing of confidential data. Risks within the network
domain, however, constitute identity spoofing and eavesdropping network traffic. Threats
within the service domain are stated as attacks that abuse the business logic.
For a point of fact, this source is a great one since it highlights the fact that safety is a
critical issue in the IoT connections. The article further classifies the types of threats that
exist in a system as well as classification of the dangers which is very important for this
research as we should know various kinds of challenges before we implement IoT.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and
challenges. Information sciences, 305, 357-383.
This source expounds various security challenges that are related deployment of the IoT
gadgets. The authors push that deployment of the IoT devices leads to multiple problems
to the new security landscape of the system. This piece further sightsees that various the
security available in the market today cannot be used in mitigating the ongoing risk that
is associated with the M2M/IoT. The scholars also mentioned ways by which the
components of the IoT can communicate with one another and provide scenarios by
which this process can be done securely.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
ANNOTATED BIBLIOGRAPHY 8
Overall, the paper is handy and will be used as one my source of reference in my research
since it offers an excellent overview of the essential requirements for integrating the
wireless internet M2M/IoT with cloud-based application in a secure manner.
John, & C., Elfrink, W. (2014, October 31). The future of Cities. Foreign affairs. Retrieved on
31st August, 2018 from: < https://www.foreignaffairs.com/articles/2014-10-31/future-
cities>
John and Elfrink affirm that the joining of the remote IoT in our day by day life named as
"into city foundation" including streets, structures, and waste administration framework
will enormously diminish the cost and yield billions of dollars. The authors of the article
list various cities including Spain and Barcelona, South Korea and Songdo as smart
towns having multiple wireless IoT devices as well as projects that reduced emissions
and cut costs, saving energy and dollars.
This source is handy since it has clearly stated the evidence of the benefits of integrating
the IoT system which was very resourceful in my research. Basing on the shreds of
evidence, it can be noted that combining the internet of things is of worth value to the
society and should be implemented.
David, D. (2018, December 29). The Internet of Things is Everywhere, But it doesn’t Rule Yet.
Wired Magazine. Retrieved on 31st August, 2018 from: <
https://www.wired.com/2015/12/this-year-was-almost-the-year-of-the-internet-of-things/
>
Overall, the paper is handy and will be used as one my source of reference in my research
since it offers an excellent overview of the essential requirements for integrating the
wireless internet M2M/IoT with cloud-based application in a secure manner.
John, & C., Elfrink, W. (2014, October 31). The future of Cities. Foreign affairs. Retrieved on
31st August, 2018 from: < https://www.foreignaffairs.com/articles/2014-10-31/future-
cities>
John and Elfrink affirm that the joining of the remote IoT in our day by day life named as
"into city foundation" including streets, structures, and waste administration framework
will enormously diminish the cost and yield billions of dollars. The authors of the article
list various cities including Spain and Barcelona, South Korea and Songdo as smart
towns having multiple wireless IoT devices as well as projects that reduced emissions
and cut costs, saving energy and dollars.
This source is handy since it has clearly stated the evidence of the benefits of integrating
the IoT system which was very resourceful in my research. Basing on the shreds of
evidence, it can be noted that combining the internet of things is of worth value to the
society and should be implemented.
David, D. (2018, December 29). The Internet of Things is Everywhere, But it doesn’t Rule Yet.
Wired Magazine. Retrieved on 31st August, 2018 from: <
https://www.wired.com/2015/12/this-year-was-almost-the-year-of-the-internet-of-things/
>
ANNOTATED BIBLIOGRAPHY 9
This source cites that IoT is just about to show up in the market, but there is hope that the
system will expand in future. The article further points out that the internet of things IoT
technology must improve and find a way of centralizing a multitude of smart device that
will be used in the years to come.
This article contributed a lot to my study and can be of great benefit to the community as
a whole since the author advises the public and the leaders of leaders IoT industry to
launch a dialog for discussing the way private information will get managed to ensure
transparency while exchanging information.
Chen, M., Wan, J., Li, & F. (2012). Machine-to-Machine Communication: Architectures,
Standards and Applications. KSII Transaction on Internet and Information Systems.
Retrieved on 31st August, 2018 from: <
http://www.itiis.org/digital-library/manuscript/299>
Chen and his team expound in this article that Cyber Physical Security CPS is one of
evolutions of the M2M/IoT since it allows the system to introduce more intelligent as
well as the interactive operation using the cloud computing service. Like distributed real-
time control, cloud-based services as well as the advanced network technique are
advanced, the authors assert.
One limiting factor of this article is that the authors have not provided the technical
solution to the concerns they have with privacy and security risks associated with the
problem. The authors, however, introduce education as a critical way of responding to the
issues. In that capacity, this article will be resourceful in my exploration; it empowers me
This source cites that IoT is just about to show up in the market, but there is hope that the
system will expand in future. The article further points out that the internet of things IoT
technology must improve and find a way of centralizing a multitude of smart device that
will be used in the years to come.
This article contributed a lot to my study and can be of great benefit to the community as
a whole since the author advises the public and the leaders of leaders IoT industry to
launch a dialog for discussing the way private information will get managed to ensure
transparency while exchanging information.
Chen, M., Wan, J., Li, & F. (2012). Machine-to-Machine Communication: Architectures,
Standards and Applications. KSII Transaction on Internet and Information Systems.
Retrieved on 31st August, 2018 from: <
http://www.itiis.org/digital-library/manuscript/299>
Chen and his team expound in this article that Cyber Physical Security CPS is one of
evolutions of the M2M/IoT since it allows the system to introduce more intelligent as
well as the interactive operation using the cloud computing service. Like distributed real-
time control, cloud-based services as well as the advanced network technique are
advanced, the authors assert.
One limiting factor of this article is that the authors have not provided the technical
solution to the concerns they have with privacy and security risks associated with the
problem. The authors, however, introduce education as a critical way of responding to the
issues. In that capacity, this article will be resourceful in my exploration; it empowers me
ANNOTATED BIBLIOGRAPHY 10
to see better the privacy and security concerns associated with M2M correspondence and
how they can be reduced through education education.
Osawa, T., (2011, October). Practice of M2M Connecting Real-World Things with Cloud
Computing. Retrieved on 31st August, 2018 from: <
http://www.fujitsu.com/global/documents/about/resources/publications/fstj/archives/
vol47-4/paper05.pdf>
Osawa’s article cites that when the M2M devices are integrated with cloud computing,
the system will need additional requirements to facilitate its operations. The conditions,
as stated by the author may consist of wide varieties of machines than the devices used
before as well as the providing an environment for gathering information by assimilating
the networks.
The piece is well presented and I will utilized it as a reference in my research. This is
because the paper offers various concepts on how M2M devices can be securely
integrated with computing infrastructures for cloud computing.
POSCO Looks to Internet of Things (IoT) for a Safer Workplace. (2016, May 27). Retrieved on
31st August from: <http://globalblog.posco.com/posco-looks-to-internet-of-things-iot-for-
a-safer-workplace/>
The article was published by POSCO, a renowned multimedia steel manufacturing
industry whose headquarters is located in South Korea. The organization is seeking to
implement the IoT to create a safer environment for workers. According to the article, the
organization has already installed sensors in its smart devices to detect dangerous gases.
to see better the privacy and security concerns associated with M2M correspondence and
how they can be reduced through education education.
Osawa, T., (2011, October). Practice of M2M Connecting Real-World Things with Cloud
Computing. Retrieved on 31st August, 2018 from: <
http://www.fujitsu.com/global/documents/about/resources/publications/fstj/archives/
vol47-4/paper05.pdf>
Osawa’s article cites that when the M2M devices are integrated with cloud computing,
the system will need additional requirements to facilitate its operations. The conditions,
as stated by the author may consist of wide varieties of machines than the devices used
before as well as the providing an environment for gathering information by assimilating
the networks.
The piece is well presented and I will utilized it as a reference in my research. This is
because the paper offers various concepts on how M2M devices can be securely
integrated with computing infrastructures for cloud computing.
POSCO Looks to Internet of Things (IoT) for a Safer Workplace. (2016, May 27). Retrieved on
31st August from: <http://globalblog.posco.com/posco-looks-to-internet-of-things-iot-for-
a-safer-workplace/>
The article was published by POSCO, a renowned multimedia steel manufacturing
industry whose headquarters is located in South Korea. The organization is seeking to
implement the IoT to create a safer environment for workers. According to the article, the
organization has already installed sensors in its smart devices to detect dangerous gases.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ANNOTATED BIBLIOGRAPHY 11
The organization still needs to connect the sensors to its employees’ smartwatches to
enhance the speed of the efficiency and speed of the safety networks. This source is of
great significance to the society as it explores it evaluates the effectiveness of the IoT that
is dreamed to be implemented in the community in future, and as such, it will provide
very original background information for my research work.
The organization still needs to connect the sensors to its employees’ smartwatches to
enhance the speed of the efficiency and speed of the safety networks. This source is of
great significance to the society as it explores it evaluates the effectiveness of the IoT that
is dreamed to be implemented in the community in future, and as such, it will provide
very original background information for my research work.
ANNOTATED BIBLIOGRAPHY 12
References
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of
things: A survey on enabling technologies, protocols, and applications. IEEE
Communications Surveys & Tutorials, 17(4), 2347-2376.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and
challenges. Information sciences, 305, 357-383.
Bojic, I., Granjal, J., Monteiro, E., Katusic, D., Skocir, P., Kusek, M., & Jezic, G. (2014).
Communication and security in machine-to-machine systems. In Wireless Networking for
Moving Objects (pp. 255-281). Springer, Cham.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and
internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Chen, M., Wan, J., Li, & F. (2012). Machine-to-Machine Communication: Architectures,
Standards and Applications. KSII Transaction on Internet and Information Systems.
Retrieved on 31st August, 2018 from: <
http://www.itiis.org/digital-library/manuscript/299>
David, D. (2018, December 29). The Internet of Things is Everywhere, But it doesn’t Rule Yet.
Wired Magazine. Retrieved on 31st August, 2018 from: <
References
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of
things: A survey on enabling technologies, protocols, and applications. IEEE
Communications Surveys & Tutorials, 17(4), 2347-2376.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and
challenges. Information sciences, 305, 357-383.
Bojic, I., Granjal, J., Monteiro, E., Katusic, D., Skocir, P., Kusek, M., & Jezic, G. (2014).
Communication and security in machine-to-machine systems. In Wireless Networking for
Moving Objects (pp. 255-281). Springer, Cham.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and
internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Chen, M., Wan, J., Li, & F. (2012). Machine-to-Machine Communication: Architectures,
Standards and Applications. KSII Transaction on Internet and Information Systems.
Retrieved on 31st August, 2018 from: <
http://www.itiis.org/digital-library/manuscript/299>
David, D. (2018, December 29). The Internet of Things is Everywhere, But it doesn’t Rule Yet.
Wired Magazine. Retrieved on 31st August, 2018 from: <
ANNOTATED BIBLIOGRAPHY 13
https://www.wired.com/2015/12/this-year-was-almost-the-year-of-the-internet-of-things/
>
John, & C., Elfrink, W. (2014, October 31). The future of Cities. Foreign affairs. Retrieved on
31st August, 2018 from: < https://www.foreignaffairs.com/articles/2014-10-31/future-
cities>
Mehmood, Y., Görg, C., Muehleisen, M., & Timm-Giel, A. (2015). Mobile M2M
communication architectures, upcoming challenges, applications, and future
directions. EURASIP Journal on Wireless Communications and Networking, 2015(1),
250.
Morgan, S., (2016, January 14). IoT Security: $1-per-Thing To Protect Connected Devices.
Retrieved on 31st August, 2018 from: < https://www.darkreading.com/vulnerabilities---
threats/iot-security-$1-per-thing-to-protect-connected-devices/a/d-id/1323921>
Osawa, T., (2011, October). Practice of M2M Connecting Real-World Things with Cloud
Computing. Retrieved on 31st August, 2018 from: <
http://www.fujitsu.com/global/documents/about/resources/publications/fstj/archives/
vol47-4/paper05.pdf>
Porter, M. E., & Heppelmann, J. E. (2015). How smart, connected products are transforming
companies. Harvard Business Review, 93(10), 96-114.
https://www.wired.com/2015/12/this-year-was-almost-the-year-of-the-internet-of-things/
>
John, & C., Elfrink, W. (2014, October 31). The future of Cities. Foreign affairs. Retrieved on
31st August, 2018 from: < https://www.foreignaffairs.com/articles/2014-10-31/future-
cities>
Mehmood, Y., Görg, C., Muehleisen, M., & Timm-Giel, A. (2015). Mobile M2M
communication architectures, upcoming challenges, applications, and future
directions. EURASIP Journal on Wireless Communications and Networking, 2015(1),
250.
Morgan, S., (2016, January 14). IoT Security: $1-per-Thing To Protect Connected Devices.
Retrieved on 31st August, 2018 from: < https://www.darkreading.com/vulnerabilities---
threats/iot-security-$1-per-thing-to-protect-connected-devices/a/d-id/1323921>
Osawa, T., (2011, October). Practice of M2M Connecting Real-World Things with Cloud
Computing. Retrieved on 31st August, 2018 from: <
http://www.fujitsu.com/global/documents/about/resources/publications/fstj/archives/
vol47-4/paper05.pdf>
Porter, M. E., & Heppelmann, J. E. (2015). How smart, connected products are transforming
companies. Harvard Business Review, 93(10), 96-114.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
ANNOTATED BIBLIOGRAPHY 14
POSCO Looks to Internet of Things (IoT) for a Safer Workplace. (2016, May 27). Retrieved on
31st August from: <http://globalblog.posco.com/posco-looks-to-internet-of-things-iot-for-
a-safer-workplace/>
Sarma, S. (2016, March 11). The Internet of Things: Roadmap to a Connected World. MIT
Technology Review. Retrieved on 31st August 2018 from: <
https://www.technologyreview.com/s/601013/the-internet-of-things-roadmap-to-a-
connected-world/>
Schaffers, H., Komninos, N., Pallot, M., Trousse, B., Nilsson, M., & Oliveira, A. (2011, May).
Smart cities and the future internet: Towards cooperation frameworks for open
innovation. In The future internet assembly (pp. 431-446). Springer, Berlin, Heidelberg.
Wei, J. (2014). How Wearables Intersect with the Cloud and the Internet of Things:
Considerations for the developers of wearables. IEEE Consumer Electronics
Magazine, 3(3), 53-56.
Xia, F., Yang, L. T., Wang, L., & Vinel, A. (2012). Internet of things. International Journal of
Communication Systems, 25(9), 1101-1102.
POSCO Looks to Internet of Things (IoT) for a Safer Workplace. (2016, May 27). Retrieved on
31st August from: <http://globalblog.posco.com/posco-looks-to-internet-of-things-iot-for-
a-safer-workplace/>
Sarma, S. (2016, March 11). The Internet of Things: Roadmap to a Connected World. MIT
Technology Review. Retrieved on 31st August 2018 from: <
https://www.technologyreview.com/s/601013/the-internet-of-things-roadmap-to-a-
connected-world/>
Schaffers, H., Komninos, N., Pallot, M., Trousse, B., Nilsson, M., & Oliveira, A. (2011, May).
Smart cities and the future internet: Towards cooperation frameworks for open
innovation. In The future internet assembly (pp. 431-446). Springer, Berlin, Heidelberg.
Wei, J. (2014). How Wearables Intersect with the Cloud and the Internet of Things:
Considerations for the developers of wearables. IEEE Consumer Electronics
Magazine, 3(3), 53-56.
Xia, F., Yang, L. T., Wang, L., & Vinel, A. (2012). Internet of things. International Journal of
Communication Systems, 25(9), 1101-1102.
1 out of 14
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.