Annotated Bibliography on Internet of Things
VerifiedAdded on 2023/06/08
|13
|3577
|227
AI Summary
This annotated bibliography provides an in-depth analysis of 12 articles on the Internet of Things (IoT) and its implementation in various fields. The articles cover topics such as the definition of IoT, its utilisation in smart cities, industries, social media, and logistics, challenges and opportunities, security and privacy, and future directions. The articles use secondary data collection methods and quantitative data analysis to provide a comprehensive understanding of IoT and its potential. The target audience of these articles is scholars and researchers of electronics and communication.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INTERNET OF THINGS
Internet of Things
Name of the Student
Name of the University
Author note
Internet of Things
Name of the Student
Name of the University
Author note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1INTERNET OF THINGS
Introduction:
The Internet of Things refers the set of hardware and software components and their
effective integration that allow the user to have a dynamic networking experience. Internet of
things is the most advanced technological intervention in this era. It has been claimed by
many critics, that IoT is going to be the next biggest revolution of modernised technology.
Therefore, analysing the opportunities, existing utilisations and limitation of Internet of
Things is essential. 12 articles will be chosen on this topic to develop a annotated
bibliography in the following section of this paper.
Article 1:
Wortmann, F., & Flüchter, K. (2015). Internet of things. Business & Information
Systems Engineering, 57(3), 221-224.
In this article Wortmann & Flüchter (2015), has describes how the Internet of Things
has added value in this era of advance technology. It has been found that currently Internet of
Things does not fall under any specific definition due to its divertive use. The authors also
added that IoT has already improved the IT based digital services in many ways. IoT is
described as a collection of interconnected hardware and software components in very precise
way. The IoT cloud, connectivity devices are expressed as the major part of IoT.
The above article followed secondary data collection method to execute a thematic
analysis on Internet of Things. The target audience of this article is the scholars and
researchers of electronics and communication. Several articles, journals on emerging
technologies have been chosen to evaluate this context. This paper is very valuable for
understanding of overall concept of IoT and its value in modern era. The paper examined
various utilisations of IoT while considering the limitation. However, the major limitation of
Introduction:
The Internet of Things refers the set of hardware and software components and their
effective integration that allow the user to have a dynamic networking experience. Internet of
things is the most advanced technological intervention in this era. It has been claimed by
many critics, that IoT is going to be the next biggest revolution of modernised technology.
Therefore, analysing the opportunities, existing utilisations and limitation of Internet of
Things is essential. 12 articles will be chosen on this topic to develop a annotated
bibliography in the following section of this paper.
Article 1:
Wortmann, F., & Flüchter, K. (2015). Internet of things. Business & Information
Systems Engineering, 57(3), 221-224.
In this article Wortmann & Flüchter (2015), has describes how the Internet of Things
has added value in this era of advance technology. It has been found that currently Internet of
Things does not fall under any specific definition due to its divertive use. The authors also
added that IoT has already improved the IT based digital services in many ways. IoT is
described as a collection of interconnected hardware and software components in very precise
way. The IoT cloud, connectivity devices are expressed as the major part of IoT.
The above article followed secondary data collection method to execute a thematic
analysis on Internet of Things. The target audience of this article is the scholars and
researchers of electronics and communication. Several articles, journals on emerging
technologies have been chosen to evaluate this context. This paper is very valuable for
understanding of overall concept of IoT and its value in modern era. The paper examined
various utilisations of IoT while considering the limitation. However, the major limitation of
2INTERNET OF THINGS
this article is it collected data only from secondary sources that caused a deficiency of more
practical and primary data analysis.
Article 2:
Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things
for smart cities. IEEE Internet of Things journal, 1(1), 22-32.
In this article Zanella et al. (2015), has describes how the Internet of Things can be
incorporated in a smart city and how it could be beneficial for all aspects of technological
advancement. The paper presented the IoT as an open access to selected subsets of data for
the development of a plethora of digital services. It is also mentioned that incorporating the
IoT as a general architecture of a smart city would be very complex task. IoT can evolve the
communication system, system administration and even emergency services for any smart
city.
The article used both comprehensive survey based and secondary data collection
method. The target audience of this article is the scholars and researchers of electronics and
communication. This article provides a in depth guideline of implementing the IoT as a part
of Smart City vision. The main strength of this paper is its practicality and feasibility, which
allows the learner to connect the theoretical concept directly to the modern world situations.
However, low sample size for survey is a major weakness of this article.
this article is it collected data only from secondary sources that caused a deficiency of more
practical and primary data analysis.
Article 2:
Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things
for smart cities. IEEE Internet of Things journal, 1(1), 22-32.
In this article Zanella et al. (2015), has describes how the Internet of Things can be
incorporated in a smart city and how it could be beneficial for all aspects of technological
advancement. The paper presented the IoT as an open access to selected subsets of data for
the development of a plethora of digital services. It is also mentioned that incorporating the
IoT as a general architecture of a smart city would be very complex task. IoT can evolve the
communication system, system administration and even emergency services for any smart
city.
The article used both comprehensive survey based and secondary data collection
method. The target audience of this article is the scholars and researchers of electronics and
communication. This article provides a in depth guideline of implementing the IoT as a part
of Smart City vision. The main strength of this paper is its practicality and feasibility, which
allows the learner to connect the theoretical concept directly to the modern world situations.
However, low sample size for survey is a major weakness of this article.
3INTERNET OF THINGS
Article 3:
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT):
A vision, architectural elements, and future directions. Future generation
computer systems, 29(7), 1645-1660.
This article focus on the strategic implementation of modern Wireless Sensor
Network technology with Internet of things that can improve the quality of daily lifestyle of
any citizen. The Article expressed that this utilisation can offers the ability to measure, infer
and understand environmental indicators considering the delicate ecologies, natural resources
and other core components of urban environment. Radio Frequency Identification or RFID is
a major tool of developing Common Operating Picture (COP) with the foundation of
integrated IoT system. Implementing the cloud with IoT software and hardware technologies
can start a new era of secured wireless computing.
This article followed secondary data collection method to execute a thematic analysis
on Internet of Things. The target audience of this article is the scholars and researchers of
electronics and communication. This paper is very valuable to understand the wireless
implementation of IoT and its value in modern era. The paper also explores the required
networking system with detail. However, the major limitation of this article is it collected
data only from secondary sources that caused a shortage of more realistic and primary data
investigation.
Article 4:
Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things:
Vision, applications and research challenges. Ad hoc networks, 10(7), 1497-1516.
Article 3:
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT):
A vision, architectural elements, and future directions. Future generation
computer systems, 29(7), 1645-1660.
This article focus on the strategic implementation of modern Wireless Sensor
Network technology with Internet of things that can improve the quality of daily lifestyle of
any citizen. The Article expressed that this utilisation can offers the ability to measure, infer
and understand environmental indicators considering the delicate ecologies, natural resources
and other core components of urban environment. Radio Frequency Identification or RFID is
a major tool of developing Common Operating Picture (COP) with the foundation of
integrated IoT system. Implementing the cloud with IoT software and hardware technologies
can start a new era of secured wireless computing.
This article followed secondary data collection method to execute a thematic analysis
on Internet of Things. The target audience of this article is the scholars and researchers of
electronics and communication. This paper is very valuable to understand the wireless
implementation of IoT and its value in modern era. The paper also explores the required
networking system with detail. However, the major limitation of this article is it collected
data only from secondary sources that caused a shortage of more realistic and primary data
investigation.
Article 4:
Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things:
Vision, applications and research challenges. Ad hoc networks, 10(7), 1497-1516.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4INTERNET OF THINGS
In this article Miorandi et al. (2015), has describes the Vision, application and
research challenges of Internet of Things. The study showed that IoT is used as an umbrella
that covers various aspect of internet related systems and facilities. The purpose of this
research was to present the existing condition of usage of IoT and challenges. The study
showed that IoT has significant application in modern communication system and in social
media based operations. Utilising the cloud integrated IoT can be more valuable in terms of
efficiency and functionality improvement.
The article conducted an exploratory research with secondary data collation and
quantitative data analysis. The target audience of this article is the scholars and researchers of
electronics and communication. The article is very informative about the security system and
the physical intervention of IoT. The layer of data privacy components can be understood
from the article. The article also described a in-depth analysis of utilising IoT in many
business operation namely environmental monitoring, inventory management and
surveillance system. However, article is unable to fully evaluate the network planning and
package monitoring system in an efficient IoT. It is the major weakness of this article.
Article 5:
Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE
Transactions on industrial informatics, 10(4), 2233-2243.
In this article, the utilisation of Internet of things in logistic operations has been
analysed. The study found that, the most operations of IoT in logistics implement Radio
Frequency Identification or RFID system. The study showed that RFID, wireless
connectivity, mobile, sensor device are the key enabling technologies. The Information and
In this article Miorandi et al. (2015), has describes the Vision, application and
research challenges of Internet of Things. The study showed that IoT is used as an umbrella
that covers various aspect of internet related systems and facilities. The purpose of this
research was to present the existing condition of usage of IoT and challenges. The study
showed that IoT has significant application in modern communication system and in social
media based operations. Utilising the cloud integrated IoT can be more valuable in terms of
efficiency and functionality improvement.
The article conducted an exploratory research with secondary data collation and
quantitative data analysis. The target audience of this article is the scholars and researchers of
electronics and communication. The article is very informative about the security system and
the physical intervention of IoT. The layer of data privacy components can be understood
from the article. The article also described a in-depth analysis of utilising IoT in many
business operation namely environmental monitoring, inventory management and
surveillance system. However, article is unable to fully evaluate the network planning and
package monitoring system in an efficient IoT. It is the major weakness of this article.
Article 5:
Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE
Transactions on industrial informatics, 10(4), 2233-2243.
In this article, the utilisation of Internet of things in logistic operations has been
analysed. The study found that, the most operations of IoT in logistics implement Radio
Frequency Identification or RFID system. The study showed that RFID, wireless
connectivity, mobile, sensor device are the key enabling technologies. The Information and
5INTERNET OF THINGS
Communication Technology or ICT and industrial information have found as the core field of
industrial utilisation of IoT. Big Data analysis and Warless Sensor Networks (WSN) are the
future of the industrial IoT operations.
The research conducted a survey on industrial professionals to gain more in depth
view of the topic. The target audience of this article is the scholars and researchers of
electronics and communication. This article provides a brief and precise description of IoT
and its industrial utilisation that enables the learner to gather knowledge about advanced
logistics and control system. However, the major weakness of the article is its analytical
process, which focused only on the theoretical aspect of the industrial information integrity.
The article lacks detailed information about universal RFID receptor, reusable electronic tag
and other aspect of this topic.
Article 6:
Mukhopadhyay, S. C., & Suryadevara, N. K. (2014). Internet of things: Challenges and
opportunities. In Internet of Things (pp. 1-17). Springer, Cham.
In this article, Mukhopadhyay & Suryadevara (2014), focused on the challenges and
opportunities in the advance utilisation of Internet of Things. The study showed that the IoT
has the potentiality to connect the several information technologies while increasing the
reliability, sustainability and efficiency. The accessibility on globalised information can be
also improved through strategic implementation of IoT system in public, private and
commercial environment. The study also found that it can reduce the operational cost of any
network based operation while considering the IPv6 over low power wireless area networks.
Communication Technology or ICT and industrial information have found as the core field of
industrial utilisation of IoT. Big Data analysis and Warless Sensor Networks (WSN) are the
future of the industrial IoT operations.
The research conducted a survey on industrial professionals to gain more in depth
view of the topic. The target audience of this article is the scholars and researchers of
electronics and communication. This article provides a brief and precise description of IoT
and its industrial utilisation that enables the learner to gather knowledge about advanced
logistics and control system. However, the major weakness of the article is its analytical
process, which focused only on the theoretical aspect of the industrial information integrity.
The article lacks detailed information about universal RFID receptor, reusable electronic tag
and other aspect of this topic.
Article 6:
Mukhopadhyay, S. C., & Suryadevara, N. K. (2014). Internet of things: Challenges and
opportunities. In Internet of Things (pp. 1-17). Springer, Cham.
In this article, Mukhopadhyay & Suryadevara (2014), focused on the challenges and
opportunities in the advance utilisation of Internet of Things. The study showed that the IoT
has the potentiality to connect the several information technologies while increasing the
reliability, sustainability and efficiency. The accessibility on globalised information can be
also improved through strategic implementation of IoT system in public, private and
commercial environment. The study also found that it can reduce the operational cost of any
network based operation while considering the IPv6 over low power wireless area networks.
6INTERNET OF THINGS
Security issues, Energy waste, Scalability, low fault tolerance have been found as the major
challenges of IoT.
In this study the comparison has been done by collecting and analysing secondary
information from valuable sources. The target audience of this article is the scholars and
researchers of electronics and communication. This study displays a very well structured side
by side comparison of opportunities and challenges of utilising IoT. However the major
limitation is, the paper lacks recommendations to avoid the challenges. On the other hand, the
study is not used any practical or primary data for its data analysis process.
Article 7:
Whitmore, A., Agarwal, A., & Da Xu, L. (2015). The Internet of Things—A survey of
topics and trends. Information Systems Frontiers, 17(2), 261-274.
This article examines the current trends of utilising Internet of Things in business and
industrial operations. The article found that the current utilisation of IoT in various services is
focused on adoptability. It decreases the speed of IoT advancement, however provides more
sustainable growth opportunity. The study also found that depending entirely in IoT can
cause several challenges as well. At the same time IoT is already being used in social media
based operation, supply chain and logistics, healthcare, smart infrastructure and in many
other fields.
The article followed a secondary data collection process, where 127 papers were
reviewed. The target audience of this article is the scholars and researchers of electronics and
communication. This paper is very valuable for understanding of overall utilisations of IoT
and its benefits in modern era. The paper also examined various utilisations of IoT while
Security issues, Energy waste, Scalability, low fault tolerance have been found as the major
challenges of IoT.
In this study the comparison has been done by collecting and analysing secondary
information from valuable sources. The target audience of this article is the scholars and
researchers of electronics and communication. This study displays a very well structured side
by side comparison of opportunities and challenges of utilising IoT. However the major
limitation is, the paper lacks recommendations to avoid the challenges. On the other hand, the
study is not used any practical or primary data for its data analysis process.
Article 7:
Whitmore, A., Agarwal, A., & Da Xu, L. (2015). The Internet of Things—A survey of
topics and trends. Information Systems Frontiers, 17(2), 261-274.
This article examines the current trends of utilising Internet of Things in business and
industrial operations. The article found that the current utilisation of IoT in various services is
focused on adoptability. It decreases the speed of IoT advancement, however provides more
sustainable growth opportunity. The study also found that depending entirely in IoT can
cause several challenges as well. At the same time IoT is already being used in social media
based operation, supply chain and logistics, healthcare, smart infrastructure and in many
other fields.
The article followed a secondary data collection process, where 127 papers were
reviewed. The target audience of this article is the scholars and researchers of electronics and
communication. This paper is very valuable for understanding of overall utilisations of IoT
and its benefits in modern era. The paper also examined various utilisations of IoT while
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7INTERNET OF THINGS
considering the limitation. The major limitation of his article is, it failed to analyse the
advance wireless networking related information with detailed evidences of outcomes.
Article 8:
Atzori, L., Iera, A., Morabito, G., & Nitti, M. (2012). The social internet of things (siot)–
when social networks meet the internet of things: Concept, architecture and
network characterization. Computer networks, 56(16), 3594-3608.
In this article the authors have described the implementation of Internet of Things in
social media and communication. The study found that the architectural efficiency of a
network system can increase the opportunity for incorporate IoT in it. The study showed that
the mobile devices like smart phones, laptops, tablets are the major components of social
media based IoT. The study described this concept as Social Internet of Things or SIoT. The
article also found that, in future, social media can be the most popular field of IoT
implementation. It will be also helpful for new Object Relationship Activity while
comprising the INS, GPS and SIoT server system.
The article conducted an exploratory research with secondary data collation and
quantitative data analysis. The target audience of this article is the scholars and researchers of
electronics and communication. The article is very informative about the Social Media based
IoT. The phases of SIoT components can be understood elaborately from this article.
However, article is unable to fully evaluate the security system of network planning and
package monitoring system. It is the major limitation of the article.
Article 9:
considering the limitation. The major limitation of his article is, it failed to analyse the
advance wireless networking related information with detailed evidences of outcomes.
Article 8:
Atzori, L., Iera, A., Morabito, G., & Nitti, M. (2012). The social internet of things (siot)–
when social networks meet the internet of things: Concept, architecture and
network characterization. Computer networks, 56(16), 3594-3608.
In this article the authors have described the implementation of Internet of Things in
social media and communication. The study found that the architectural efficiency of a
network system can increase the opportunity for incorporate IoT in it. The study showed that
the mobile devices like smart phones, laptops, tablets are the major components of social
media based IoT. The study described this concept as Social Internet of Things or SIoT. The
article also found that, in future, social media can be the most popular field of IoT
implementation. It will be also helpful for new Object Relationship Activity while
comprising the INS, GPS and SIoT server system.
The article conducted an exploratory research with secondary data collation and
quantitative data analysis. The target audience of this article is the scholars and researchers of
electronics and communication. The article is very informative about the Social Media based
IoT. The phases of SIoT components can be understood elaborately from this article.
However, article is unable to fully evaluate the security system of network planning and
package monitoring system. It is the major limitation of the article.
Article 9:
8INTERNET OF THINGS
Suo, H., Wan, J., Zou, C., & Liu, J. (2012, March). Security in the internet of things: a
review. In Computer Science and Electronics Engineering (ICCSEE), 2012
international conference on (Vol. 3, pp. 648-651). IEEE.
In this article the privacy and security system required for Internet of Things in a
accusable network were analysed and discussed considering the opportunities and current
challenges. The study found that the security of the IoT should be the major concern for any
network system that can ensure the sustainability and growth. At the same time, several
multithreaded operations are integrated in Cyber Transportation System (STS) that can
influence the security measure of a IoT based network management. Perceptual layer,
Network layer, Support layer and Application layer are the major layers of the network
security system.
The article followed a secondary data collection process, where multiple papers on
computer engineering and network management were reviewed. The target audience of this
article is the scholars and researchers of electronics and communication. This paper is very
valuable for understanding of privacy and security systems of IoT and its benefits in any
advanced communication. The paper also successfully examined encryption process of data
security in IoT while considering all the possible threats. The major limitation of his article
is, it based on only secondary data that reduced its practicality.
Article 10:
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and
trust in Internet of Things: The road ahead. Computer networks, 76, 146-164.
In this article, Internet of Things or IoT was characterised by heterogeneous
technologies, which harmonize to the provisioning of ground-breaking services in various
Suo, H., Wan, J., Zou, C., & Liu, J. (2012, March). Security in the internet of things: a
review. In Computer Science and Electronics Engineering (ICCSEE), 2012
international conference on (Vol. 3, pp. 648-651). IEEE.
In this article the privacy and security system required for Internet of Things in a
accusable network were analysed and discussed considering the opportunities and current
challenges. The study found that the security of the IoT should be the major concern for any
network system that can ensure the sustainability and growth. At the same time, several
multithreaded operations are integrated in Cyber Transportation System (STS) that can
influence the security measure of a IoT based network management. Perceptual layer,
Network layer, Support layer and Application layer are the major layers of the network
security system.
The article followed a secondary data collection process, where multiple papers on
computer engineering and network management were reviewed. The target audience of this
article is the scholars and researchers of electronics and communication. This paper is very
valuable for understanding of privacy and security systems of IoT and its benefits in any
advanced communication. The paper also successfully examined encryption process of data
security in IoT while considering all the possible threats. The major limitation of his article
is, it based on only secondary data that reduced its practicality.
Article 10:
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and
trust in Internet of Things: The road ahead. Computer networks, 76, 146-164.
In this article, Internet of Things or IoT was characterised by heterogeneous
technologies, which harmonize to the provisioning of ground-breaking services in various
9INTERNET OF THINGS
application domains. This study has found that the success level IoT implementation depends
on the trust level of the users. Better security system, data privacy, enclosed data transmission
can generate enough user trust to utilise the IoT with its potential accuracy. The article found
that to expand and modernise the usage of IoT the developer has to consider all the dynamic
environmental impact of user experiences and expectations.
The study conducted a survey and aligned the survey report to find out the viability of
the general assumption of system security and user experience along with its impact on IoT
usability. The paper contributed in IoT based studies in many ways while prioritising the
socio-psychological factors of the users as well. However, the study lacks in depth analysis of
peer to peer data enclosure and data governance system and its implementation in IoT
security management.
Article 11:
Feki, M. A., Kawsar, F., Boussard, M., & Trappeniers, L. (2013). The internet of things:
the next technological revolution. Computer, 46(2), 24-25.
This article briefly discussed how the Internet of Things is becoming the next
technological revolution of modern era. The study found that after the intervention of
advance networking system and Web 2.0 the growth internet of things has been increased
rapidly. The study also reviled that IoT should ensure the encrypted accessibility of
document. The user-friendly platform and software hardware optimisation are the major
concerns in this scenario. Considering all the small and valuable component of IoT the study
named this networking facility as Internet of Nano Things.
The study followed a descriptive method by utilising secondary data collection and
quantitative data analysis. The target audience of this article is the scholars and researchers of
application domains. This study has found that the success level IoT implementation depends
on the trust level of the users. Better security system, data privacy, enclosed data transmission
can generate enough user trust to utilise the IoT with its potential accuracy. The article found
that to expand and modernise the usage of IoT the developer has to consider all the dynamic
environmental impact of user experiences and expectations.
The study conducted a survey and aligned the survey report to find out the viability of
the general assumption of system security and user experience along with its impact on IoT
usability. The paper contributed in IoT based studies in many ways while prioritising the
socio-psychological factors of the users as well. However, the study lacks in depth analysis of
peer to peer data enclosure and data governance system and its implementation in IoT
security management.
Article 11:
Feki, M. A., Kawsar, F., Boussard, M., & Trappeniers, L. (2013). The internet of things:
the next technological revolution. Computer, 46(2), 24-25.
This article briefly discussed how the Internet of Things is becoming the next
technological revolution of modern era. The study found that after the intervention of
advance networking system and Web 2.0 the growth internet of things has been increased
rapidly. The study also reviled that IoT should ensure the encrypted accessibility of
document. The user-friendly platform and software hardware optimisation are the major
concerns in this scenario. Considering all the small and valuable component of IoT the study
named this networking facility as Internet of Nano Things.
The study followed a descriptive method by utilising secondary data collection and
quantitative data analysis. The target audience of this article is the scholars and researchers of
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10INTERNET OF THINGS
electronics and communication. The strength of this article is, the paper showed a very brief
and precise analysis of all the crucial components of internet of things. However, the major
limitation of this paper is the discussion of this paper is too brief to analyse all the essential
components of IoT and their significance.
Article 12:
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud
computing and internet of things: a survey. Future Generation Computer
Systems, 56, 684-700.
In this article Botta et al., described cloud-computing technology as the major
implementation system of IoT. The study found that cloud computing and IoT can be
integrated to increase the operational efficiency as well as security. It also increases the data
flexibility. The study explained the integrated cloud computing and Internet of things as a
hybrid information system. The layered architecture of IoT allows the Cloud network system
to efficiently exchange the information with IoT.
In this study the comparison of opportunities and challenges of integrating cloud
computing and IoT have been done by collecting and analysing secondary information from
valuable sources. The target audience of this article is the scholars and researchers of
electronics and communication. This study displays a very well structured architecture of
utilising cloud in IoT. However the major limitation is, the study is not used any practical or
primary data for its data analysis process.
electronics and communication. The strength of this article is, the paper showed a very brief
and precise analysis of all the crucial components of internet of things. However, the major
limitation of this paper is the discussion of this paper is too brief to analyse all the essential
components of IoT and their significance.
Article 12:
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud
computing and internet of things: a survey. Future Generation Computer
Systems, 56, 684-700.
In this article Botta et al., described cloud-computing technology as the major
implementation system of IoT. The study found that cloud computing and IoT can be
integrated to increase the operational efficiency as well as security. It also increases the data
flexibility. The study explained the integrated cloud computing and Internet of things as a
hybrid information system. The layered architecture of IoT allows the Cloud network system
to efficiently exchange the information with IoT.
In this study the comparison of opportunities and challenges of integrating cloud
computing and IoT have been done by collecting and analysing secondary information from
valuable sources. The target audience of this article is the scholars and researchers of
electronics and communication. This study displays a very well structured architecture of
utilising cloud in IoT. However the major limitation is, the study is not used any practical or
primary data for its data analysis process.
11INTERNET OF THINGS
Reference:
Atzori, L., Iera, A., Morabito, G., & Nitti, M. (2012). The social internet of things (siot)–
when social networks meet the internet of things: Concept, architecture and network
characterization. Computer networks, 56(16), 3594-3608.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing
and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE
Transactions on industrial informatics, 10(4), 2233-2243.
Feki, M. A., Kawsar, F., Boussard, M., & Trappeniers, L. (2013). The internet of things: the
next technological revolution. Computer, 46(2), 24-25.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A
vision, architectural elements, and future directions. Future generation computer
systems, 29(7), 1645-1660.
Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision,
applications and research challenges. Ad hoc networks, 10(7), 1497-1516.
Mukhopadhyay, S. C., & Suryadevara, N. K. (2014). Internet of things: Challenges and
opportunities. In Internet of Things (pp. 1-17). Springer, Cham.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust
in Internet of Things: The road ahead. Computer networks, 76, 146-164.
Suo, H., Wan, J., Zou, C., & Liu, J. (2012, March). Security in the internet of things: a
review. In Computer Science and Electronics Engineering (ICCSEE), 2012
international conference on (Vol. 3, pp. 648-651). IEEE.
Reference:
Atzori, L., Iera, A., Morabito, G., & Nitti, M. (2012). The social internet of things (siot)–
when social networks meet the internet of things: Concept, architecture and network
characterization. Computer networks, 56(16), 3594-3608.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing
and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE
Transactions on industrial informatics, 10(4), 2233-2243.
Feki, M. A., Kawsar, F., Boussard, M., & Trappeniers, L. (2013). The internet of things: the
next technological revolution. Computer, 46(2), 24-25.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A
vision, architectural elements, and future directions. Future generation computer
systems, 29(7), 1645-1660.
Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision,
applications and research challenges. Ad hoc networks, 10(7), 1497-1516.
Mukhopadhyay, S. C., & Suryadevara, N. K. (2014). Internet of things: Challenges and
opportunities. In Internet of Things (pp. 1-17). Springer, Cham.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust
in Internet of Things: The road ahead. Computer networks, 76, 146-164.
Suo, H., Wan, J., Zou, C., & Liu, J. (2012, March). Security in the internet of things: a
review. In Computer Science and Electronics Engineering (ICCSEE), 2012
international conference on (Vol. 3, pp. 648-651). IEEE.
12INTERNET OF THINGS
Whitmore, A., Agarwal, A., & Da Xu, L. (2015). The Internet of Things—A survey of topics
and trends. Information Systems Frontiers, 17(2), 261-274.
Wortmann, F., & Flüchter, K. (2015). Internet of things. Business & Information Systems
Engineering, 57(3), 221-224.
Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for
smart cities. IEEE Internet of Things journal, 1(1), 22-32.
Whitmore, A., Agarwal, A., & Da Xu, L. (2015). The Internet of Things—A survey of topics
and trends. Information Systems Frontiers, 17(2), 261-274.
Wortmann, F., & Flüchter, K. (2015). Internet of things. Business & Information Systems
Engineering, 57(3), 221-224.
Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for
smart cities. IEEE Internet of Things journal, 1(1), 22-32.
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.