A Comprehensive Report: Advantages and Disadvantages of IoT Devices
VerifiedAdded on 2023/03/17
|14
|3681
|54
Report
AI Summary
This report examines the advantages and disadvantages of Internet of Things (IoT) devices, exploring both their benefits and limitations. The introduction highlights the dual nature of IoT, emphasizing the importance of understanding both the opportunities and challenges. The background study delves into existing research, identifying security concerns, such as data breaches and privacy issues, as significant disadvantages. It also explores the business inconsistencies and stakeholder issues. Conversely, the report highlights the advantages of IoT, including enhanced user safety, comfort, and optimized work schedules. The research plan outlines the methodology, including secondary data collection and a Gantt chart for project timelines. The publication plan details how the findings can be used for future research and dissemination through various channels. The conclusion summarizes the key findings, emphasizing the need for addressing security challenges and increasing the efficiency of IoT devices. The report aims to provide a comprehensive overview of the current state of IoT technology, helping readers understand its potential and the steps required to overcome its limitations.

Running head: ADVANTAGES AND DISADVANTAGES OF IOT
Advantages and disadvantages of IoT
Name of the Student
Name of the University
Author’s Note:
Advantages and disadvantages of IoT
Name of the Student
Name of the University
Author’s Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1ADVANTAGES AND DISADVANTAGES OF IOT
Table of Contents
Introduction................................................................................................................................2
Background Study......................................................................................................................2
Aims and Significance...............................................................................................................6
Research Plan.............................................................................................................................7
Publication Plan.....................................................................................................................7
Conclusion..................................................................................................................................8
References..................................................................................................................................9
Table of Contents
Introduction................................................................................................................................2
Background Study......................................................................................................................2
Aims and Significance...............................................................................................................6
Research Plan.............................................................................................................................7
Publication Plan.....................................................................................................................7
Conclusion..................................................................................................................................8
References..................................................................................................................................9

2ADVANTAGES AND DISADVANTAGES OF IOT
Introduction
The use of the IoT based devices have both limitations as well as benefits which will
be identified in this research proposal. Based on the investigative sources it can be said that
the privacy, as well as the security of the IoT based devices, is the most significant
disadvantage of the IoT based devices, at the same time it can be said that the optimisation of
the work schedules is the significant benefit of the IoT based devices.
What are the benefits of using the IoT based devices?
What are the most common limitations of the IoT based devices?
This research proposal will be considering the secondary data collection method,
opinions and statement of reputed scholars will be presented in the background study of the
proposal. The time frame of this proposal will be presented as a Gantt chart in the concluding
sections of the proposal. The subsequent segment of this research proposal will be
highlighting the foremost research questions of this proposal.
Background Study
As detailed by Alsaffar et al. (2016), most of the IoT based devices have security
issues coming from both the users as well as from social engineers. The researcher of this
resource stated about the impact of the hacking activities of the social engineers on the IoT
based devices which are increasingly used in our society such as the thermostats (Machado
and Shah 2016). The investigators of this resource stated that stolen identities is the other
significant security concern for the users of the IoT based devices (Chandy et al. 2017). The
paper successfully identified the use of the SQL injection by the social engineers in the
security attacks of the IoT based devices (Patel et al. 2017). The researcher of the paper also
Introduction
The use of the IoT based devices have both limitations as well as benefits which will
be identified in this research proposal. Based on the investigative sources it can be said that
the privacy, as well as the security of the IoT based devices, is the most significant
disadvantage of the IoT based devices, at the same time it can be said that the optimisation of
the work schedules is the significant benefit of the IoT based devices.
What are the benefits of using the IoT based devices?
What are the most common limitations of the IoT based devices?
This research proposal will be considering the secondary data collection method,
opinions and statement of reputed scholars will be presented in the background study of the
proposal. The time frame of this proposal will be presented as a Gantt chart in the concluding
sections of the proposal. The subsequent segment of this research proposal will be
highlighting the foremost research questions of this proposal.
Background Study
As detailed by Alsaffar et al. (2016), most of the IoT based devices have security
issues coming from both the users as well as from social engineers. The researcher of this
resource stated about the impact of the hacking activities of the social engineers on the IoT
based devices which are increasingly used in our society such as the thermostats (Machado
and Shah 2016). The investigators of this resource stated that stolen identities is the other
significant security concern for the users of the IoT based devices (Chandy et al. 2017). The
paper successfully identified the use of the SQL injection by the social engineers in the
security attacks of the IoT based devices (Patel et al. 2017). The researcher of the paper also
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3ADVANTAGES AND DISADVANTAGES OF IOT
stated about the data security issues of the IoT based devices, which is one of the most
significant limitation of this technology.
However, Al-Turjman and Radwan (2017), stated that the business inconsistencies of
the IoT devices is the most significant disadvantage of IoT based devices. The investigators
of the resource mentioned that the business inconsistencies of the IoT based devices is due to
the manufacturing defects of the devices and the business protocols of the system where the
IoT based devices is incorporated. The paper also helps in identifying the stakeholder issue of
the IoT devices, which can have a significant impact on the users (Dasgupta et al. 2019). The
researcher of the paper stated that there are lots of complexities of the cloud servers which are
connected with most of the IoT devices which are increasingly used in the corporate
establishments (Patel and Champaneria 2016). The paper also focused on the importance of
the IT governance plan to deal with the complexities of IoT based devices (Ma et al. 2016).
This resource can be very much important for the readers of this proposal to have an idea
about the limitations of the IoT based devices. However, the research gap of these paper is
that none of the paper highlighted the ways to resolve the limitations of the IoT based
devices.
As mentioned by Ansari et al. (2015), safety and comfort of the users are the two
main advantages of the use of IoT based devices in our society. The investigators of this
resource stated that the advantages of the IoT based devices which are used in the corporate
establishments must be retained at any cost so that the efficiency of this technology is
enhanced (Park et al. 2018). The investigator of the resource also mentioned about the
usability of the IoT devices which are increasingly used in our society such as the Google
home voice controller and the August doorbell camera (El-Hajj et al. 2017). The usefulness
of the Kuri mobile robot was also identified from this resource. The resource can be very
stated about the data security issues of the IoT based devices, which is one of the most
significant limitation of this technology.
However, Al-Turjman and Radwan (2017), stated that the business inconsistencies of
the IoT devices is the most significant disadvantage of IoT based devices. The investigators
of the resource mentioned that the business inconsistencies of the IoT based devices is due to
the manufacturing defects of the devices and the business protocols of the system where the
IoT based devices is incorporated. The paper also helps in identifying the stakeholder issue of
the IoT devices, which can have a significant impact on the users (Dasgupta et al. 2019). The
researcher of the paper stated that there are lots of complexities of the cloud servers which are
connected with most of the IoT devices which are increasingly used in the corporate
establishments (Patel and Champaneria 2016). The paper also focused on the importance of
the IT governance plan to deal with the complexities of IoT based devices (Ma et al. 2016).
This resource can be very much important for the readers of this proposal to have an idea
about the limitations of the IoT based devices. However, the research gap of these paper is
that none of the paper highlighted the ways to resolve the limitations of the IoT based
devices.
As mentioned by Ansari et al. (2015), safety and comfort of the users are the two
main advantages of the use of IoT based devices in our society. The investigators of this
resource stated that the advantages of the IoT based devices which are used in the corporate
establishments must be retained at any cost so that the efficiency of this technology is
enhanced (Park et al. 2018). The investigator of the resource also mentioned about the
usability of the IoT devices which are increasingly used in our society such as the Google
home voice controller and the August doorbell camera (El-Hajj et al. 2017). The usefulness
of the Kuri mobile robot was also identified from this resource. The resource can be very
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4ADVANTAGES AND DISADVANTAGES OF IOT
much beneficial for the readers of this document to understand the effectiveness of wide
range of IoT devices which are used in our society such as Amazon Dash button and Footbot
Air Quality Monitor (Paethong, Sato and Namiki 2016). The researcher of the paper
successfully highlighted the usefulness of each of these IoT based devices. The paper also
explains the increasing use of the IoT based devices due to the extensive facilities and
specifications provided by the IoT based devices (Estrada-López et al. 2018). There are lots
of drawbacks in this resource, one of the foremost drawback of this paper is that it does not
discuss the limitations of the IoT based devise, however the security vulnerabilities and the
networking issues of the IoT based devices were not highlighted in this paper. However, the
paper explains the usability of the IoT based devices in a professional manner.
However, Atmoko et al. (2017), decision making concerning the use of IoT based
devices is the most important factor for the smooth functionality of IoT based devices. The
investigator of this resource stated that smart decision must be taken by the users of the IoT
based devices during the enactment of the IoT based smart devices (Pattar et al. 2018). The
investigator of the resources helps to identify the revenue generating feature of the IoT based
devices which can be very much beneficial for the users of the IoT as well (Han et al. 2017).
The researcher of the paper stated that healthcare implants as well as the smart buildings can
be significantly affected using the IoT based devices. The use of the IoT based wearable
technology also have significant issues such as the network security issues which can have
disastrous negative effects on the users of the IoT based devices (Newcombe et al. 2017).
The researcher of the paper stated that video surveillance facility of IoT devices which are
used in corporate establishment can have a negative financial impact on the growth and
productivity of commercial organizations (Huang et al. 2016). The investigator of the paper
stated that the privacy as well as the scalability concerns of the IoT based devices must be
resolved in the first place so that the efficiency of the IoT technology is maintained (Nasr,
much beneficial for the readers of this document to understand the effectiveness of wide
range of IoT devices which are used in our society such as Amazon Dash button and Footbot
Air Quality Monitor (Paethong, Sato and Namiki 2016). The researcher of the paper
successfully highlighted the usefulness of each of these IoT based devices. The paper also
explains the increasing use of the IoT based devices due to the extensive facilities and
specifications provided by the IoT based devices (Estrada-López et al. 2018). There are lots
of drawbacks in this resource, one of the foremost drawback of this paper is that it does not
discuss the limitations of the IoT based devise, however the security vulnerabilities and the
networking issues of the IoT based devices were not highlighted in this paper. However, the
paper explains the usability of the IoT based devices in a professional manner.
However, Atmoko et al. (2017), decision making concerning the use of IoT based
devices is the most important factor for the smooth functionality of IoT based devices. The
investigator of this resource stated that smart decision must be taken by the users of the IoT
based devices during the enactment of the IoT based smart devices (Pattar et al. 2018). The
investigator of the resources helps to identify the revenue generating feature of the IoT based
devices which can be very much beneficial for the users of the IoT as well (Han et al. 2017).
The researcher of the paper stated that healthcare implants as well as the smart buildings can
be significantly affected using the IoT based devices. The use of the IoT based wearable
technology also have significant issues such as the network security issues which can have
disastrous negative effects on the users of the IoT based devices (Newcombe et al. 2017).
The researcher of the paper stated that video surveillance facility of IoT devices which are
used in corporate establishment can have a negative financial impact on the growth and
productivity of commercial organizations (Huang et al. 2016). The investigator of the paper
stated that the privacy as well as the scalability concerns of the IoT based devices must be
resolved in the first place so that the efficiency of the IoT technology is maintained (Nasr,

5ADVANTAGES AND DISADVANTAGES OF IOT
Kfoury and Khoury 2016). This resource have both drawbacks as well as advantages, the
prime drawback of this resource is it does not helps in identifying most of the factors which
can play a significant role of the usability of the IoT based devices (Imani et al., 2018). Both
the researcher contradicted on their opinion about the advantages of the IoT based devices.
The research gap which can be identified from the paper is these paper have not provided any
detailed description of the different ways which can help the users to increase the
effectiveness of the IoT based devices.
According to Begum and Dixit (2016), the IoT based devise which are used for
communication purpose in most of the global corporations have numerous security issues.
The investigator of the paper mentioned that the privacy concerns of the IoT devices has to be
managed in the first place using IT experts. At the same time, the paper successfully
identifies the other limitation of IoT such as the over-dependency if the users of the IoT
devices (Iraji et al. 2017). The investigators of this resource compared most of the limitations
of the IoT based devices such as the over-dependency of the IoT devices, privacy concerns in
terms of the cybersecurity issues such as the side channel attacks, phishing emails and
ransomware (Liu et al. 2017). The investigator of this resources address the complexity
issues of the IoT based devices which is a significant concern for most of the users of this
technology who have no idea who to deal with the issues of this technology. The investigator
of the paper stated that most of the security issues of the IoT based devices comes from the
threats coming social engineers who are using new techniques in each of the recent
cybersecurity issues (Jenson 2017). The researcher of this resource stated that the security
issues of the IoT devices has to be resolved in the first place using the risk management
procedures (Minoli, Sohraby and Kouns 2017). This resource have lots of limitations as well
as benefits, the main benefit of this resource is it helps in the identifying the security concerns
of the IoT based devices such as the phishing emails, ransomware and the side channel
Kfoury and Khoury 2016). This resource have both drawbacks as well as advantages, the
prime drawback of this resource is it does not helps in identifying most of the factors which
can play a significant role of the usability of the IoT based devices (Imani et al., 2018). Both
the researcher contradicted on their opinion about the advantages of the IoT based devices.
The research gap which can be identified from the paper is these paper have not provided any
detailed description of the different ways which can help the users to increase the
effectiveness of the IoT based devices.
According to Begum and Dixit (2016), the IoT based devise which are used for
communication purpose in most of the global corporations have numerous security issues.
The investigator of the paper mentioned that the privacy concerns of the IoT devices has to be
managed in the first place using IT experts. At the same time, the paper successfully
identifies the other limitation of IoT such as the over-dependency if the users of the IoT
devices (Iraji et al. 2017). The investigators of this resource compared most of the limitations
of the IoT based devices such as the over-dependency of the IoT devices, privacy concerns in
terms of the cybersecurity issues such as the side channel attacks, phishing emails and
ransomware (Liu et al. 2017). The investigator of this resources address the complexity
issues of the IoT based devices which is a significant concern for most of the users of this
technology who have no idea who to deal with the issues of this technology. The investigator
of the paper stated that most of the security issues of the IoT based devices comes from the
threats coming social engineers who are using new techniques in each of the recent
cybersecurity issues (Jenson 2017). The researcher of this resource stated that the security
issues of the IoT devices has to be resolved in the first place using the risk management
procedures (Minoli, Sohraby and Kouns 2017). This resource have lots of limitations as well
as benefits, the main benefit of this resource is it helps in the identifying the security concerns
of the IoT based devices such as the phishing emails, ransomware and the side channel
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6ADVANTAGES AND DISADVANTAGES OF IOT
attacks. However, the prime limitation of the paper is it does not discuss the risk mitigation
steps of each discussed cybersecurity issues.
However, as declared by Bhayani, Patel and Bhatt (2016), meeting the expectation of
the IoT devices is one of the challenges of IoT. The investigator of this resource mentioned
that the IoT devices must be regularly updated so that the security loopholes of the IoT
devices are minimized (Lim et al. 2017). The paper successfully identifies the connectivity
issues of the IoT based devices, at the same time, it can also be said that there are lots of
stringent government regulations with the use of the IoT based devices. The investigator of
the resource also helped in the identification of the over dependency on the IoT devices
(Kocakulak and Butun 2017). The paper also highlighted the financial impact of the IoT
based devices, the researcher briefed that the use of the automated IoT based technologies has
resulted in huge loss of jobs and over-reliance of the technology. This paper have numerous
benefits in terms of the detailed description of the challenges of IoT based devices such as the
cloud attacks, botnet concerns and the AI-based security issues (Krasniqi and Hajrizi 2016).
The prime limitation of the paper is it fails to identify the ways to deal with the challenges of
this technology (Machaka and Nelwamondo 2016). The gap in literature states that no of the
paper helps in identifying the ways to deal with the security challenges of the IoT based
devices, it only discussed the reasons behind and the impact of the security challenges.
Aims and Significance
The overall objective of tis research proposal is to identify the disadvantages as well
as the benefits of using the IoT based devices in corporate establishments as well as in our
society.
attacks. However, the prime limitation of the paper is it does not discuss the risk mitigation
steps of each discussed cybersecurity issues.
However, as declared by Bhayani, Patel and Bhatt (2016), meeting the expectation of
the IoT devices is one of the challenges of IoT. The investigator of this resource mentioned
that the IoT devices must be regularly updated so that the security loopholes of the IoT
devices are minimized (Lim et al. 2017). The paper successfully identifies the connectivity
issues of the IoT based devices, at the same time, it can also be said that there are lots of
stringent government regulations with the use of the IoT based devices. The investigator of
the resource also helped in the identification of the over dependency on the IoT devices
(Kocakulak and Butun 2017). The paper also highlighted the financial impact of the IoT
based devices, the researcher briefed that the use of the automated IoT based technologies has
resulted in huge loss of jobs and over-reliance of the technology. This paper have numerous
benefits in terms of the detailed description of the challenges of IoT based devices such as the
cloud attacks, botnet concerns and the AI-based security issues (Krasniqi and Hajrizi 2016).
The prime limitation of the paper is it fails to identify the ways to deal with the challenges of
this technology (Machaka and Nelwamondo 2016). The gap in literature states that no of the
paper helps in identifying the ways to deal with the security challenges of the IoT based
devices, it only discussed the reasons behind and the impact of the security challenges.
Aims and Significance
The overall objective of tis research proposal is to identify the disadvantages as well
as the benefits of using the IoT based devices in corporate establishments as well as in our
society.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7ADVANTAGES AND DISADVANTAGES OF IOT
Research Plan
Each of the activities of this research proposal considering the task plan and the
publication plan will be presented in the following Gantt chart table
Activities 1-6th
month
6th-
12th
month
12th
-18th
month
18th
to 24th
Week
24th
to 30th
Week
31nd
to 34th
Week
35th to
36th Week
Identify
topic of the
proposal
Select data
sources
Make a
research layout
Research
plan
Literature
review
Data
analysis
Form the
structure of the
proposal
Publication
plan
Proposal
submission
Table 1: Timeframe of the proposal
(Source: Created by the author)
Publication Plan
All the data of this proposal can be used for future research purposes as data has been
collected from peer-reviewed journals. The data of this paper can be used in journals,
conferences as well as in exhibitions.
The open queries which can be identified from this proposal are as follows:
What are ways to address the security challenges of IoT based devices?
Research Plan
Each of the activities of this research proposal considering the task plan and the
publication plan will be presented in the following Gantt chart table
Activities 1-6th
month
6th-
12th
month
12th
-18th
month
18th
to 24th
Week
24th
to 30th
Week
31nd
to 34th
Week
35th to
36th Week
Identify
topic of the
proposal
Select data
sources
Make a
research layout
Research
plan
Literature
review
Data
analysis
Form the
structure of the
proposal
Publication
plan
Proposal
submission
Table 1: Timeframe of the proposal
(Source: Created by the author)
Publication Plan
All the data of this proposal can be used for future research purposes as data has been
collected from peer-reviewed journals. The data of this paper can be used in journals,
conferences as well as in exhibitions.
The open queries which can be identified from this proposal are as follows:
What are ways to address the security challenges of IoT based devices?

8ADVANTAGES AND DISADVANTAGES OF IOT
How to increase the efficiency of IoT based devices?
Can a private network address the security issues if the IoT based devices?
How to prevent cyber security attacks on IoT devices?
What are the recent security concerns of the IoT devices?
Conclusion
The proposal helps in identifying both the add gains as well as the hindrances use of
the IoT based devices in corporate establishments as well as in our society.
How to increase the efficiency of IoT based devices?
Can a private network address the security issues if the IoT based devices?
How to prevent cyber security attacks on IoT devices?
What are the recent security concerns of the IoT devices?
Conclusion
The proposal helps in identifying both the add gains as well as the hindrances use of
the IoT based devices in corporate establishments as well as in our society.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9ADVANTAGES AND DISADVANTAGES OF IOT
References
Alsaffar, A.A., Pham, H.P., Hong, C.S., Huh, E.N. and Aazam, M., 2016. An architecture of
iot service delegation and resource allocation based on collaboration between fog and cloud
computing. Mobile Information Systems, 2016.
Al-Turjman, F. and Radwan, A., 2017. Data delivery in wireless multimedia sensor networks:
Challenging and defying in the IoT era. IEEE Wireless Communications, 24(5), pp.126-131.
Ansari, A.N., Sedky, M., Sharma, N. and Tyagi, A., 2015, January. An Internet of things
approach for motion detection using Raspberry Pi. In Proceedings of 2015 International
Conference on Intelligent Computing and Internet of Things (pp. 131-134). IEEE.
Atmoko, R.A., Riantini, R. and Hasin, M.K., 2017, May. IoT real time data acquisition using
MQTT protocol. In Journal of Physics: Conference Series (Vol. 853, No. 1, p. 012003). IOP
Publishing.
Begum, K. and Dixit, S., 2016, March. Industrial WSN using IoT: A survey. In 2016
International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)
(pp. 499-504). IEEE.
Bhayani, M., Patel, M. and Bhatt, C., 2016. Internet of Things (IoT): In a way of smart world.
In Proceedings of the international congress on information and communication technology
(pp. 343-350). Springer, Singapore.
Chandy, J.A., Fahrny, J., Haque, A., Wortman, P.A., Karimian, N. and Tehranipoor, F., 2017.
Exploring Methods of Authentication for the Internet of Things. In Internet of Things (pp. 71-
90). Chapman and Hall/CRC.
References
Alsaffar, A.A., Pham, H.P., Hong, C.S., Huh, E.N. and Aazam, M., 2016. An architecture of
iot service delegation and resource allocation based on collaboration between fog and cloud
computing. Mobile Information Systems, 2016.
Al-Turjman, F. and Radwan, A., 2017. Data delivery in wireless multimedia sensor networks:
Challenging and defying in the IoT era. IEEE Wireless Communications, 24(5), pp.126-131.
Ansari, A.N., Sedky, M., Sharma, N. and Tyagi, A., 2015, January. An Internet of things
approach for motion detection using Raspberry Pi. In Proceedings of 2015 International
Conference on Intelligent Computing and Internet of Things (pp. 131-134). IEEE.
Atmoko, R.A., Riantini, R. and Hasin, M.K., 2017, May. IoT real time data acquisition using
MQTT protocol. In Journal of Physics: Conference Series (Vol. 853, No. 1, p. 012003). IOP
Publishing.
Begum, K. and Dixit, S., 2016, March. Industrial WSN using IoT: A survey. In 2016
International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)
(pp. 499-504). IEEE.
Bhayani, M., Patel, M. and Bhatt, C., 2016. Internet of Things (IoT): In a way of smart world.
In Proceedings of the international congress on information and communication technology
(pp. 343-350). Springer, Singapore.
Chandy, J.A., Fahrny, J., Haque, A., Wortman, P.A., Karimian, N. and Tehranipoor, F., 2017.
Exploring Methods of Authentication for the Internet of Things. In Internet of Things (pp. 71-
90). Chapman and Hall/CRC.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10ADVANTAGES AND DISADVANTAGES OF IOT
Dasgupta, A., Daruka, A., Pandey, A., Bose, A., Mukherjee, S. and Saha, S., 2019. Smart
Irrigation: IOT-Based Irrigation Monitoring System. In Proceedings of International Ethical
Hacking Conference 2018 (pp. 395-403). Springer, Singapore.
El-Hajj, M., Chamoun, M., Fadlallah, A. and Serhrouchni, A., 2017, October. Analysis of
authentication techniques in Internet of Things (IoT). In 2017 1st Cyber Security in
Networking Conference (CSNet) (pp. 1-3). IEEE.
Estrada-López, J., Abuellil, A., Zeng, Z. and Sánchez-Sinencio, E., 2018. Multiple Input
Energy Harvesting Systems for Autonomous IoT End-Nodes. Journal of Low Power
Electronics and Applications, 8(1), p.6.
Han, S., Zhang, J., Zhu, M., Wu, J., Shen, C. and Kong, F., 2017, September. Analysis of the
frontier technology of agricultural IoT and its predication research. In IOP Conference
Series: Materials Science and Engineering (Vol. 231, No. 1, p. 012072). IOP Publishing.
Huang, H., Zhou, J., Li, W., Zhang, J., Zhang, X. and Hou, G., 2016. Wearable indoor
localisation approach in Internet of Things. IET Networks, 5(5), pp.122-126.
Imani, M., Moghadam, A.Q., Zarif, N., Noshiri, O., Faramarzi, K., Arabnia, H. and Joudaki,
M., 2018. A comprehensive survey on addressing methods in the Internet of Things. arXiv
preprint arXiv:1807.02173.
Iraji, S., Mogensen, P. and Ratasuk, R., 2017. Recent advances in M2M communications and
Internet of Things (IoT). International Journal of Wireless Information Networks, 24(3),
pp.240-242.
Jenson, S., 2017, September. The UX of IoT: unpacking the Internet of Things. In
Proceedings of the 19th International Conference on Human-Computer Interaction with
Mobile Devices and Services (p. 76). ACM.
Dasgupta, A., Daruka, A., Pandey, A., Bose, A., Mukherjee, S. and Saha, S., 2019. Smart
Irrigation: IOT-Based Irrigation Monitoring System. In Proceedings of International Ethical
Hacking Conference 2018 (pp. 395-403). Springer, Singapore.
El-Hajj, M., Chamoun, M., Fadlallah, A. and Serhrouchni, A., 2017, October. Analysis of
authentication techniques in Internet of Things (IoT). In 2017 1st Cyber Security in
Networking Conference (CSNet) (pp. 1-3). IEEE.
Estrada-López, J., Abuellil, A., Zeng, Z. and Sánchez-Sinencio, E., 2018. Multiple Input
Energy Harvesting Systems for Autonomous IoT End-Nodes. Journal of Low Power
Electronics and Applications, 8(1), p.6.
Han, S., Zhang, J., Zhu, M., Wu, J., Shen, C. and Kong, F., 2017, September. Analysis of the
frontier technology of agricultural IoT and its predication research. In IOP Conference
Series: Materials Science and Engineering (Vol. 231, No. 1, p. 012072). IOP Publishing.
Huang, H., Zhou, J., Li, W., Zhang, J., Zhang, X. and Hou, G., 2016. Wearable indoor
localisation approach in Internet of Things. IET Networks, 5(5), pp.122-126.
Imani, M., Moghadam, A.Q., Zarif, N., Noshiri, O., Faramarzi, K., Arabnia, H. and Joudaki,
M., 2018. A comprehensive survey on addressing methods in the Internet of Things. arXiv
preprint arXiv:1807.02173.
Iraji, S., Mogensen, P. and Ratasuk, R., 2017. Recent advances in M2M communications and
Internet of Things (IoT). International Journal of Wireless Information Networks, 24(3),
pp.240-242.
Jenson, S., 2017, September. The UX of IoT: unpacking the Internet of Things. In
Proceedings of the 19th International Conference on Human-Computer Interaction with
Mobile Devices and Services (p. 76). ACM.

11ADVANTAGES AND DISADVANTAGES OF IOT
Kocakulak, M. and Butun, I., 2017, January. An overview of Wireless Sensor Networks
towards internet of things. In 2017 IEEE 7th Annual Computing and Communication
Workshop and Conference (CCWC) (pp. 1-6). IEEE.
Krasniqi, X. and Hajrizi, E., 2016. Use of IoT technology to drive the automotive industry
from connected to full autonomous vehicles. IFAC-PapersOnLine, 49(29), pp.269-274.
Lim, L.J., Sambas, H., MarcusGoh, N.C., Kawada, T. and JosephNg, P.S., 2017. ScareDuino:
Smart-Farming with IoT. International Journal of Scientific Engineering and Technology,
6(6), pp.207-210.
Liu, Y., Tong, K.F., Qiu, X., Liu, Y. and Ding, X., 2017, May. Wireless mesh networks in
IoT networks. In 2017 International Workshop on Electromagnetics: Applications and
Student Innovation Competition (pp. 183-185). IEEE.
Ma, Y.W., Chen, J.L., Lee, Y.S. and Chang, H.Y., 2016. GreenIoT architecture for Internet of
Things applications. KSII Transactions on Internet and Information Systems (TIIS), 10(2),
pp.444-461.
Machado, H. and Shah, K., 2016. Internet of Things (IoT) impacts on Supply Chain. APICS
Houst. Student Chapter, 77007(402).
Machaka, P. and Nelwamondo, F., 2016. Data mining techniques for distributed denial of
service attacks detection in the internet of things: A research survey. In Data Mining Trends
and Applications in Criminal Science and Investigations (pp. 275-334). IGI Global.
Minoli, D., Sohraby, K. and Kouns, J., 2017, January. IoT security (IoTSec) considerations,
requirements, and architectures. In 2017 14th IEEE Annual Consumer Communications &
Networking Conference (CCNC) (pp. 1006-1007). IEEE.
Kocakulak, M. and Butun, I., 2017, January. An overview of Wireless Sensor Networks
towards internet of things. In 2017 IEEE 7th Annual Computing and Communication
Workshop and Conference (CCWC) (pp. 1-6). IEEE.
Krasniqi, X. and Hajrizi, E., 2016. Use of IoT technology to drive the automotive industry
from connected to full autonomous vehicles. IFAC-PapersOnLine, 49(29), pp.269-274.
Lim, L.J., Sambas, H., MarcusGoh, N.C., Kawada, T. and JosephNg, P.S., 2017. ScareDuino:
Smart-Farming with IoT. International Journal of Scientific Engineering and Technology,
6(6), pp.207-210.
Liu, Y., Tong, K.F., Qiu, X., Liu, Y. and Ding, X., 2017, May. Wireless mesh networks in
IoT networks. In 2017 International Workshop on Electromagnetics: Applications and
Student Innovation Competition (pp. 183-185). IEEE.
Ma, Y.W., Chen, J.L., Lee, Y.S. and Chang, H.Y., 2016. GreenIoT architecture for Internet of
Things applications. KSII Transactions on Internet and Information Systems (TIIS), 10(2),
pp.444-461.
Machado, H. and Shah, K., 2016. Internet of Things (IoT) impacts on Supply Chain. APICS
Houst. Student Chapter, 77007(402).
Machaka, P. and Nelwamondo, F., 2016. Data mining techniques for distributed denial of
service attacks detection in the internet of things: A research survey. In Data Mining Trends
and Applications in Criminal Science and Investigations (pp. 275-334). IGI Global.
Minoli, D., Sohraby, K. and Kouns, J., 2017, January. IoT security (IoTSec) considerations,
requirements, and architectures. In 2017 14th IEEE Annual Consumer Communications &
Networking Conference (CCNC) (pp. 1006-1007). IEEE.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 14
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.