logo

Comparative Analysis of Two Research Papers on Internet of Things

   

Added on  2022-10-02

6 Pages2168 Words219 Views
 | 
 | 
 | 
Internet of Things
Introduction
This paper will identify main characteristics of two research papers which have same
philosophical idea but different approaches. The paper with highlight the differences in the title
choices and suitability to the content, methodology used, the discussion of findings, advantages
and limitation of each paper, conclusion of the papers and future improvement of the two papers.
The two papers focused on the development of the new technology called Internet of things.
The first research piece discussed in this paper is called “Tracking the Evolution of the
Internet of Things Concept Across Different Application Domains”, published in mdpi.com
in 2017 and was authored by Jorge E. Ibarra-Esquer 1, Felix F. Gonzalez-Navarro, Brenda L.
Flores-Rios, Larysa Burtseva and MarIa A. Astorga-Vargas. In this paper the researchers, talks
about the advancement of the IoT, its different definitions from different scholars, and a portion
of its major application areas. The authors give a sequence of activities that IoT have undergone
from the conception stage, setting a base of data science and the development of things. The
paper further gives the details of kind of things that can be pieces of IoT and their specific
characteristics, the process of communication, sensing, tracking, identity and location of these
things. The paper also exploits the Security and protection concerns and difficulties that lie ahead
with regards to the development of IoT and by large its applications. The paper concluded by
restating the thesis and consensus of its definition from various sources, its application and
direction evolution of the definition of IoT.
The second paper named “Security and privacy in the internet of things” written by Professor
Carsten Maple and published on 2017 at tandfonline.com, introduces the progressions that the
IoT has embraced since its conception and research on how mechanical advances have molded it
and cultivated the emerging of inferred names for every specific area. The scholar in this paper
gives definition of the concept from different research, identifies the relationship between
internet of things and machine to machine connection, explains a detailed literature of its
application and the benefits it has in running day to day activities of human being. Carsten
unravels the privacy and security challenges in the IoT using the various major applications that
uses IoT. The paper in this section, starts highlighting the applications of IoT and the different
categories of uses from previous literature. It describes the different application ranging from
Comparative Analysis of Two Research Papers on Internet of Things_1

energy, housing, agriculture, supply chain, health, transport, entertainment, media, retail, social
and manufacturing. Carsten introduces communication security issues on IoT application. The
effect of the IoT on privacy and security issues are then talked about with concluding statements
and suggestions on the key issues highlighted on the paper. The research paper can be used by
the IoT community to design correct framework that can minimize privacy and security
challenges.
Methodology
The two papers used a similar methodology of empirical-analytical with a small difference.
While the first paper explored the methodology of five steps of systematic content analyses [1],
the second paper didn’t use the five steps rather it used content analysis without following a
define style where the author mined necessary information from a diverse literature on the same
topic.
The first paper formulation of two research questions; “How has the definition of the Internet of
Things evolved? What are the names given to the IoT and how is it understood across different?
application domains?” the questions formed basis for the research. The first questions orient on
the explanation of what IoT is and how its definition have changed over time. The second
question was created so as to initially distinguish names used to denote IoT and after that the
manner in which the IoT is alluded and comprehended in every application area. The second
paper focused on content analysis of literature available in google scholar to identify security
issues raised by other scholars. The author first uses google scholar using search strings to get
applications of IoT in various sectors and analyzed the findings by selected specific content from
the journals.
The first paper used a systematic method to do the research, the authors form research questions,
selected source of information, identified specific search strings, then used the search strings to
get document and finally pick 75 study revisions that either contain the terminology or the
definition or the evolution of IoT definition. The second paper used search terms such as IoT,
privacy, security and identified 125 research items that were analyzed and relevant content were
compile to form one fine research document [13].
Comparison of the results reported in those two papers with each other.
Comparative Analysis of Two Research Papers on Internet of Things_2

On the results of discussion of the two reports, each paper was able to give substantive research
according to the objective of the paper. The first paper did a thorough search and was able to
give a gist on how the name Internet of things started, complementing names for Internet of
things and the future possible names. From the research the authors uncovered several definitions
of internet of things although they all focused on networks, communication, data, “things” and
services. These components gave birth to the name “internet of things” because of the different
entities being connected to one system. The authors further listed other names that are used to
mean IoT and are used interchangeably in some circumstance as explained by other scholars.
The names include; Web of Things(WoT) [7] Social Internet of Things (SIoT) [10], Wisdom
Web of Things (WWoT) [8], Cognitive Internet of Things(CIoT) [9], Future Internet of Things
(FIoT) [4], Internet of People () IoT, Agents of Things (AoT) [5] and Humanized Internet of
Things (HIoT) [6]. The researchers also noted that the names keep on changing because the
community try to customize depending on the name of innovation e.g. health internet of things,
agriculture internet of things etc.
The second paper focused on the security issues of the internet of things. The researchers were
able find out the loopholes that IoT systems has in terms of securing users’ information against
attack by hackers and other malicious risks. The major challenges that were evident during the
research is identity, authentication, access control and authorization of the system [11]. It was
discovered that all the areas of application of IoT faced similar security challenges and thus if a
solution is realized, it can be utilized in all the sectors. The author suggested that standardization
of the IoT systems should be emphasized and that when developing this systems, it should be
made in such a way that it can automatically detect an attack, solve and recover without much
intervention [12].
Your comments on the advantages/disadvantages/superiority of those two papers.
The first research paper was able to get the deep meaning of IoT and that this could help future
researchers when doing their papers on IoT. Although, there are few scholarly papers on IoT, the
researchers were able to gather relevant and meaning results. However, the paper used 79 papers
as references for the study while the second paper used 123 research papers. This means the
second could be depended on more because it covered more content analysis compared to the
second paper.
Comparative Analysis of Two Research Papers on Internet of Things_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Overview of Network Security in Internet of Things
|4
|2832
|54

IoT Security and Privacy Challenges in All Domains of IoT
|5
|2558
|129

Security Risks and Issues in IoT Technology
|7
|3094
|74

IoT Threats to Database Security
|20
|1383
|296

(PDF) Security and Privacy Issues with IoT in Healthcare
|17
|3666
|40

IoT and Cloud Privacy: Security Challenges of IoT-Cloud Based SCADA Systems
|12
|2510
|318