Information Security Technologies: IoT Security and Privacy Report
VerifiedAdded on 2023/03/23
|7
|3094
|74
Report
AI Summary
This report provides a comprehensive analysis of security and privacy issues in the Internet of Things (IoT). It begins with an overview of IoT technology and its applications, including smart homes, elder care, and healthcare. The report then delves into relevant technologies and highlights the challenges, such as security vulnerabilities, privacy concerns, and the lack of hardware security in IoT devices. It identifies gaps in the current literature, particularly concerning user awareness and the need for robust security measures. The report also discusses future research directions, emphasizing the evaluation of business value, the implementation of basic rules and regulations, and the need for expert handling of IoT systems. The analysis is supported by references to recent research articles, focusing on attacks like denial of service, phishing, and malware. The report recommends the adoption of firewalls, encryption, and authentication servers for secure communication within smart architecture systems.

IoT
ABSTRACT – The term IoT refers to the
internet of thing that connects physical devices with
each other by using internet connectivity. It has the
potential to connect two or more physical devices
with other networks in order to exchange data or
information. Smart architecture is one of the best
applications of the internet of thing that control and
monitor the equipment and components of
architecture systems. Security is one of the common
issues faced by the internet of thing technology
which impacts on the personal devices and networks
linked with internet connectivity (Yang, Wu, Yin,
Li, & Zhao, 2017). The objective of this research is
to analyse security and privacy issues occurred on
the internet of thing technology and recommend
several techniques for reducing security issues and
threats. It is observed that there are various kinds of
security challenges occurred in the field of IoT
technology, for example, denial of service attack,
phishing attack, malware, cyber-crimes, conflict-
related issues, DDOS attack and so on. Thisresearch
study focuses on the fundamental concept of IoT
technology and security related issues occurred in
IoT devices (Alrawais, Alhothaily, Hu, & Cheng,
2017). We have selected this topic for the research
because it is a very common topic for research and
numbers of research papers published in the last few
years which can help for a better understanding of
security issues. Moreover, it is very important to
identify the risk and threats linked with the internet
of thing and computer devices. Therefore, it is
recommended that consumers should adopt a
firewall, encryption and use authentic servers during
the communication process. This research study
shows the security risks and issues associated with
the internet of thing technology.
Keywords— IoT, security, privacy
INTRODUCTION
The following report is all about addressing the
security and privacy issues in Internet of things
(IoT). Internet of things (IoT) can be used for
connecting physical devices with each other by
making use of internet for establishing connectivity
among the given devices. It comes up with potential
of connecting various physical devices with the
associated network for making an exchange of
required data and information. Smart architecture
can be considered to be as one most suitable
application of Internet of Things (IoT) that can
ABSTRACT – The term IoT refers to the
internet of thing that connects physical devices with
each other by using internet connectivity. It has the
potential to connect two or more physical devices
with other networks in order to exchange data or
information. Smart architecture is one of the best
applications of the internet of thing that control and
monitor the equipment and components of
architecture systems. Security is one of the common
issues faced by the internet of thing technology
which impacts on the personal devices and networks
linked with internet connectivity (Yang, Wu, Yin,
Li, & Zhao, 2017). The objective of this research is
to analyse security and privacy issues occurred on
the internet of thing technology and recommend
several techniques for reducing security issues and
threats. It is observed that there are various kinds of
security challenges occurred in the field of IoT
technology, for example, denial of service attack,
phishing attack, malware, cyber-crimes, conflict-
related issues, DDOS attack and so on. Thisresearch
study focuses on the fundamental concept of IoT
technology and security related issues occurred in
IoT devices (Alrawais, Alhothaily, Hu, & Cheng,
2017). We have selected this topic for the research
because it is a very common topic for research and
numbers of research papers published in the last few
years which can help for a better understanding of
security issues. Moreover, it is very important to
identify the risk and threats linked with the internet
of thing and computer devices. Therefore, it is
recommended that consumers should adopt a
firewall, encryption and use authentic servers during
the communication process. This research study
shows the security risks and issues associated with
the internet of thing technology.
Keywords— IoT, security, privacy
INTRODUCTION
The following report is all about addressing the
security and privacy issues in Internet of things
(IoT). Internet of things (IoT) can be used for
connecting physical devices with each other by
making use of internet for establishing connectivity
among the given devices. It comes up with potential
of connecting various physical devices with the
associated network for making an exchange of
required data and information. Smart architecture
can be considered to be as one most suitable
application of Internet of Things (IoT) that can
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

control and monitor the given equipment’s. It merely
tends to highlight the security components of the
given architecture. Security can be considered as one
of the biggest problem that is being encountered by
IoT technology which affect the personal devices
and network that is completely linked with internet
connectivity. The main notion of this research is all
about finding the security and privacy that occurred
on the internet platform. Apart from this, there are
some technologies which can be used for analysing
the given security and issues of privacy which take
place on the internet platform. At present, there are
large number of technologies. It is being
recommended for making use of various technique
for minimizing the overall threat and issues of
security.
In the coming pages of the report, an idea has
been provided respect to overview of the applied
technologies. After that, the relevant technology and
its overall involvement has been described in details.
Various kind of challenges has been discussed in
these area. An identification has been done with
respect to various gap in this technology.
Overview of involved technology
IoT may be said as a sprawling set of effective and
innovative technologies. This technology mainly
uses the structure of a network connected devices
that are embedded within the physical environment.
There are devices that uses IoT that they are
connected to the internet for gathering information
with the help of sensors or reach out t the world with
the help of actuators. This technology has evolved
regarding the convergence of technologies that are
wireless into the electronic devices (Lee & Lee,
2015). This also involves the connection of real time
analytics, wireless sensor network, control system
automation, embedded systems, commodity sensors
and many more. This technology may also be
defined as the extension of the internet connectivity
into other physical electronic devices. In the modern
day market the technoliogy of IoT pertains with
many of the other electronic devices such as smart
home, thermostats, security cameras and many more
that helps us in the daily work (Dlamini & Johnston,
2016).
Relevant technology and its Involvement
This technology is relevantly associated with many
devices as well as appliances. These are discussed
below:
Smart Home: IoT devices has helped the
home automation system to have an
extensive growth. This devices can perform
various works such as heating, lighting, air
conditioning as well as media and security
systems (Jalali et al., 2019). The long term
benefits while using the smart home IoT
tends to highlight the security components of the
given architecture. Security can be considered as one
of the biggest problem that is being encountered by
IoT technology which affect the personal devices
and network that is completely linked with internet
connectivity. The main notion of this research is all
about finding the security and privacy that occurred
on the internet platform. Apart from this, there are
some technologies which can be used for analysing
the given security and issues of privacy which take
place on the internet platform. At present, there are
large number of technologies. It is being
recommended for making use of various technique
for minimizing the overall threat and issues of
security.
In the coming pages of the report, an idea has
been provided respect to overview of the applied
technologies. After that, the relevant technology and
its overall involvement has been described in details.
Various kind of challenges has been discussed in
these area. An identification has been done with
respect to various gap in this technology.
Overview of involved technology
IoT may be said as a sprawling set of effective and
innovative technologies. This technology mainly
uses the structure of a network connected devices
that are embedded within the physical environment.
There are devices that uses IoT that they are
connected to the internet for gathering information
with the help of sensors or reach out t the world with
the help of actuators. This technology has evolved
regarding the convergence of technologies that are
wireless into the electronic devices (Lee & Lee,
2015). This also involves the connection of real time
analytics, wireless sensor network, control system
automation, embedded systems, commodity sensors
and many more. This technology may also be
defined as the extension of the internet connectivity
into other physical electronic devices. In the modern
day market the technoliogy of IoT pertains with
many of the other electronic devices such as smart
home, thermostats, security cameras and many more
that helps us in the daily work (Dlamini & Johnston,
2016).
Relevant technology and its Involvement
This technology is relevantly associated with many
devices as well as appliances. These are discussed
below:
Smart Home: IoT devices has helped the
home automation system to have an
extensive growth. This devices can perform
various works such as heating, lighting, air
conditioning as well as media and security
systems (Jalali et al., 2019). The long term
benefits while using the smart home IoT

devices may include the savings of energy
that is assured by the automatic turn off of
the li8ghts as well as the devices associated
with the home automation.
Elder care: One of the most important and
valuable uses of the IoT devices may be
explained as the fact that it provides an
enhanced and effective level of assistance to
the elder persons or to the persons with
disability. The IoT devices uses the assistive
technology within the devices that implicates
the connection of the devices with the
commands of the needful persons.
Medical and healthcare: The IoT devices are
very useful in the field of Medical Care. The
Smart Health Care devices helps the medical
sector to provide the effective services to the
customers (Lohan et al., 2018). The devices
that are identified within this sector are
remote health monitoring system as well as
emergency notification systems. Many of the
health care units have also started the
implementation of the smart beds that will
likely to be very useful to the patients in the
near future.
In addition to these the IoT has also
encouraged some important areas such as
Agriculture, Transportation, metropolitan
scale deployments and many more.
Highlight the challenges in the area
It is observed that there are various kinds of security
challenges occurred in the field of IoT technology,
for example, phishing attack, cyber-crimes, denial of
service attack, malware, conflict-related issues,
DDOS attack and many more. This research study
focuses on the fundamental concept of IoT
technology and security related issues occurred in
IoT devices (Alrawais, Alhothaily, Hu, & Cheng,
2017). We have selected this topic for the research
because it is a very common topic for research as
well as numbers of research papers that had been
published in the last few years which can help for a
better understanding of various security issues.
Moreover, it is very important to identify the risk
and threats linked with the internet of thing as well
as computer devices (Shang, Yu & Droms, 2016).
The challenges that are faced by this particular field
are as follows
Security: security is considered as one of the biggest
challenges in the field of IoT, increasing the total
number of devices would automatically increase the
opportunity to exploit various security vulnerabilities
(Yang, Wu & Yin, 2017). Devices that have been
designed poorly can result in exposing the user data
that is assured by the automatic turn off of
the li8ghts as well as the devices associated
with the home automation.
Elder care: One of the most important and
valuable uses of the IoT devices may be
explained as the fact that it provides an
enhanced and effective level of assistance to
the elder persons or to the persons with
disability. The IoT devices uses the assistive
technology within the devices that implicates
the connection of the devices with the
commands of the needful persons.
Medical and healthcare: The IoT devices are
very useful in the field of Medical Care. The
Smart Health Care devices helps the medical
sector to provide the effective services to the
customers (Lohan et al., 2018). The devices
that are identified within this sector are
remote health monitoring system as well as
emergency notification systems. Many of the
health care units have also started the
implementation of the smart beds that will
likely to be very useful to the patients in the
near future.
In addition to these the IoT has also
encouraged some important areas such as
Agriculture, Transportation, metropolitan
scale deployments and many more.
Highlight the challenges in the area
It is observed that there are various kinds of security
challenges occurred in the field of IoT technology,
for example, phishing attack, cyber-crimes, denial of
service attack, malware, conflict-related issues,
DDOS attack and many more. This research study
focuses on the fundamental concept of IoT
technology and security related issues occurred in
IoT devices (Alrawais, Alhothaily, Hu, & Cheng,
2017). We have selected this topic for the research
because it is a very common topic for research as
well as numbers of research papers that had been
published in the last few years which can help for a
better understanding of various security issues.
Moreover, it is very important to identify the risk
and threats linked with the internet of thing as well
as computer devices (Shang, Yu & Droms, 2016).
The challenges that are faced by this particular field
are as follows
Security: security is considered as one of the biggest
challenges in the field of IoT, increasing the total
number of devices would automatically increase the
opportunity to exploit various security vulnerabilities
(Yang, Wu & Yin, 2017). Devices that have been
designed poorly can result in exposing the user data
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

to theft and breaching because they leave various
data streams improperly protected and in various
cases people’s health and security could be at risk.
Privacy: implementation of IoT into various
industries provides unique challenges to the privacy.
This had become even more prevalent in various
devices used by customers, like tracking the devices
for cars and phones along with smart televisions
(Samuel, 2016). In the latter case, vision features and
voice recognition have been integrated which can
listen to various conversations and watch for activity
as well as selectivity transmit which includes a
particular third party (Alrawais, Alhothaily, Hu, &
Cheng, 2017). Collection of this particular data,
exposes legal as well as regulatory challenges which
faces privacy and data protection law.
Identification of gap
Along with various advantages, there are various
gaps that had been found in this technology. These
gaps include hardware system software, network and
application layer that runs custom code. The devices
where IoT had been implemented, are powered by
the microcontrollers, lack features of hardware
security when compared to other microprocessors
and are less powerful, besides this they tend to suit
well to various devices because the applications do
not actually need the capability of computing which
is acquired by microprocessors, they usually
consume much less amount of power and hence a
cost a fraction of the microprocessors. Various
researchers had carried out a particular empirical
security analysis of the Smart Things IoT platform,
they have obtained the result that system level access
control can be compromised in order to execute
evaluation of various privileges. Elevation of
privilege would enable a particular process to read as
well as write to the memory or a specific
communication port which would otherwise not be
allowed or a load malware code. Proper
implementation of access control would protect
against a particular exploit with the help of whistling
executable code along with unique permanent token.
Issues in the area
There are several issues in the usage of the IoT in
maintaining the security and the privacy of the smart
a chance for the architecture. The main issue
regarding this is the security issue. With the use of
IoT in the system there is a chance for breaching of
the data in the organization. In most of the cases, it
has been found out that the intruders are using the
Internet of Things for getting access to the system
(Gaur et al., 2015). The main reason for using the
internet of Things for getting access to the system by
the intruders is that the nature of the functioning of
IoT. The architecture of the ioT allows the
data streams improperly protected and in various
cases people’s health and security could be at risk.
Privacy: implementation of IoT into various
industries provides unique challenges to the privacy.
This had become even more prevalent in various
devices used by customers, like tracking the devices
for cars and phones along with smart televisions
(Samuel, 2016). In the latter case, vision features and
voice recognition have been integrated which can
listen to various conversations and watch for activity
as well as selectivity transmit which includes a
particular third party (Alrawais, Alhothaily, Hu, &
Cheng, 2017). Collection of this particular data,
exposes legal as well as regulatory challenges which
faces privacy and data protection law.
Identification of gap
Along with various advantages, there are various
gaps that had been found in this technology. These
gaps include hardware system software, network and
application layer that runs custom code. The devices
where IoT had been implemented, are powered by
the microcontrollers, lack features of hardware
security when compared to other microprocessors
and are less powerful, besides this they tend to suit
well to various devices because the applications do
not actually need the capability of computing which
is acquired by microprocessors, they usually
consume much less amount of power and hence a
cost a fraction of the microprocessors. Various
researchers had carried out a particular empirical
security analysis of the Smart Things IoT platform,
they have obtained the result that system level access
control can be compromised in order to execute
evaluation of various privileges. Elevation of
privilege would enable a particular process to read as
well as write to the memory or a specific
communication port which would otherwise not be
allowed or a load malware code. Proper
implementation of access control would protect
against a particular exploit with the help of whistling
executable code along with unique permanent token.
Issues in the area
There are several issues in the usage of the IoT in
maintaining the security and the privacy of the smart
a chance for the architecture. The main issue
regarding this is the security issue. With the use of
IoT in the system there is a chance for breaching of
the data in the organization. In most of the cases, it
has been found out that the intruders are using the
Internet of Things for getting access to the system
(Gaur et al., 2015). The main reason for using the
internet of Things for getting access to the system by
the intruders is that the nature of the functioning of
IoT. The architecture of the ioT allows the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

interconnection between the different devices. In this
situation getting access to one of the devices will
allow the access of the other devices.
Another issues regarding this is the maintaining and
handling of the IoT driven system. IoT is an
emerging technology that needs expert handling for
the proper usage. Many organizations are facing
problems as they do not have the proper number of
efficient technical experts for the implementation
and maintenance of the IoT driven system. The lack
of technical experts in the organization will lead to a
situation where the implementation may not generate
the right outcome.
Issues not addressed in the area
There are several issues those are not addressed in
this section. One of those issues is the user
awareness regarding the use of IoT driven system.
At present days most of the users and the people are
using the IoT driven services without even knowing
it. In this situation, they are not following the proper
rules and regulations needed to avail the service
(Yaqoob et al., 2017). This makes the security gap in
the system that is making the IoT driven system
vulnerable to the threats. Apart from that there is a
lack of laws and regulation related to the security
threats to the IoT driven system. This leads the
situation where people get confused regarding the
right steps needed to be taken after the breaching of
data or any kind of other type of security threats
from the IoT driven system.
Apart from that another issue that has not been
addressed is the issue regarding the innovation of the
IoT. It can be said that innovations are not up to the
mark in case of IoT for the further development of
the technology (Nitti et al., 2017). There is a need
for the relevance of the invented system in terms of
technology. Apart from that the business value of the
IoT is needed to be evaluated in a proper way.
Future research based on the gaps
Further research can be conducted in order to bridge
the gap discussed in the paper. In this context, the
business value for the implementation of the IoT
driven services are needed to be evaluated in a
proper way (Robles et al., 2015). Apart from that
there is a need for maintaining the basic rules and
regulations for enhancing the user experience of
using IoT driven services. Apart from that the
security of the IoT is needed to be implemented in a
proper way so that the mitigation of the possibility
for the breaching of data can be achieved.
CONCLUSION
situation getting access to one of the devices will
allow the access of the other devices.
Another issues regarding this is the maintaining and
handling of the IoT driven system. IoT is an
emerging technology that needs expert handling for
the proper usage. Many organizations are facing
problems as they do not have the proper number of
efficient technical experts for the implementation
and maintenance of the IoT driven system. The lack
of technical experts in the organization will lead to a
situation where the implementation may not generate
the right outcome.
Issues not addressed in the area
There are several issues those are not addressed in
this section. One of those issues is the user
awareness regarding the use of IoT driven system.
At present days most of the users and the people are
using the IoT driven services without even knowing
it. In this situation, they are not following the proper
rules and regulations needed to avail the service
(Yaqoob et al., 2017). This makes the security gap in
the system that is making the IoT driven system
vulnerable to the threats. Apart from that there is a
lack of laws and regulation related to the security
threats to the IoT driven system. This leads the
situation where people get confused regarding the
right steps needed to be taken after the breaching of
data or any kind of other type of security threats
from the IoT driven system.
Apart from that another issue that has not been
addressed is the issue regarding the innovation of the
IoT. It can be said that innovations are not up to the
mark in case of IoT for the further development of
the technology (Nitti et al., 2017). There is a need
for the relevance of the invented system in terms of
technology. Apart from that the business value of the
IoT is needed to be evaluated in a proper way.
Future research based on the gaps
Further research can be conducted in order to bridge
the gap discussed in the paper. In this context, the
business value for the implementation of the IoT
driven services are needed to be evaluated in a
proper way (Robles et al., 2015). Apart from that
there is a need for maintaining the basic rules and
regulations for enhancing the user experience of
using IoT driven services. Apart from that the
security of the IoT is needed to be implemented in a
proper way so that the mitigation of the possibility
for the breaching of data can be achieved.
CONCLUSION

The above pages help us in concluding the fact
that this report is all about IoT technology that
connects various physical devices with each other.
Internet of technology (IoT) can be considered to be
well known technology which is needed for
connecting various entities. The main purpose of this
particular technology is all about connecting various
things. The main notion is all about providing
effective and efficient solution. It merely tends to
highlight the overall security of the devices that is
being connected due to ad-hoc nature of the system.
The biggest challenge that is being encountered is
the security and privacy of the devices. In the above
pages of the report a list of challenges has been
addressed with respect to technology and
architecture that is being used. The main focus of
this particular paper is all about understanding IoT
intrinsic vulnerabilities along with the security
challenges in different layers of the security. The
main principles of security issues are confidentiality
of data, availability and integrity. It is expected that
the ongoing work on IoT will result in significant
amount of work that is needed for embedding the
various computer devices. In the last few years, there
has been significant amount of technologies and
scientific publication that been encountered in the
last few years. Due to public security breaches in the
last few years, the overall vector point of IoT
devices and overall number of devices tend to grow
a lot.
REFERENCES
Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X.
(2017). Fog computing for the internet of
things: Security and privacy issues. IEEE
Internet Computing, 21(2), 34-42.
Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H.
(2017).A survey on security and privacy
issues in Internet-of-Things. IEEE Internet of
Things Journal, 4(5), 1250-1258.
Shang, W., Yu, Y., Droms, R., & Zhang, L. (2016).
Challenges in IoT networking via TCP/IP
architecture. NDN, Technical Report NDN-
0038.
Samuel, S. S. I. (2016, March). A review of
connectivity challenges in IoT-smart home.
In 2016 3rd MEC International Conference
on Big Data and Smart City (ICBDSC) (pp.
1-4). IEEE.
Lee, I., & Lee, K. (2015). The Internet of Things
(IoT): Applications, investments, and
challenges for enterprises. Business
Horizons, 58(4), 431-440.
Jalali, M. S., Kaiser, J. P., Siegel, M., & Madnick, S.
(2019). The Internet of Things Promises New
that this report is all about IoT technology that
connects various physical devices with each other.
Internet of technology (IoT) can be considered to be
well known technology which is needed for
connecting various entities. The main purpose of this
particular technology is all about connecting various
things. The main notion is all about providing
effective and efficient solution. It merely tends to
highlight the overall security of the devices that is
being connected due to ad-hoc nature of the system.
The biggest challenge that is being encountered is
the security and privacy of the devices. In the above
pages of the report a list of challenges has been
addressed with respect to technology and
architecture that is being used. The main focus of
this particular paper is all about understanding IoT
intrinsic vulnerabilities along with the security
challenges in different layers of the security. The
main principles of security issues are confidentiality
of data, availability and integrity. It is expected that
the ongoing work on IoT will result in significant
amount of work that is needed for embedding the
various computer devices. In the last few years, there
has been significant amount of technologies and
scientific publication that been encountered in the
last few years. Due to public security breaches in the
last few years, the overall vector point of IoT
devices and overall number of devices tend to grow
a lot.
REFERENCES
Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X.
(2017). Fog computing for the internet of
things: Security and privacy issues. IEEE
Internet Computing, 21(2), 34-42.
Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H.
(2017).A survey on security and privacy
issues in Internet-of-Things. IEEE Internet of
Things Journal, 4(5), 1250-1258.
Shang, W., Yu, Y., Droms, R., & Zhang, L. (2016).
Challenges in IoT networking via TCP/IP
architecture. NDN, Technical Report NDN-
0038.
Samuel, S. S. I. (2016, March). A review of
connectivity challenges in IoT-smart home.
In 2016 3rd MEC International Conference
on Big Data and Smart City (ICBDSC) (pp.
1-4). IEEE.
Lee, I., & Lee, K. (2015). The Internet of Things
(IoT): Applications, investments, and
challenges for enterprises. Business
Horizons, 58(4), 431-440.
Jalali, M. S., Kaiser, J. P., Siegel, M., & Madnick, S.
(2019). The Internet of Things Promises New
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Benefits and Risks: A Systematic Analysis of
Adoption Dynamics of IoT Products. IEEE
Security & Privacy, 17(2), 39-48.
Lohan, E. S., Koivisto, M., Galinina, O., Andreev,
S., Tolli, A., Destino, G., ... & Valkama, M.
(2018). Benefits of positioning-aided
communication technology in high-frequency
industrial IoT. IEEE Communications
Magazine, 56(12), 142-148.
Dlamini, N. N., & Johnston, K. (2016,
November). The use, benefits and challenges
of using the Internet of Things (IoT) in retail
businesses: A literature review. In 2016
International Conference on Advances in
Computing and Communication Engineering
(ICACCE) (pp. 430-436). IEEE.
Gaur, A., Scotney, B., Parr, G., & McClean, S.
(2015). Smart city architecture and its
applications based on IoT. Procedia
computer science, 52, 1089-1094.
Robles, T., Alcarria, R., de Andrés, D. M., de la
Cruz, M. N., Calero, R., Iglesias, S., &
López, M. (2015). An IoT based reference
architecture for smart water management
processes. JoWUA, 6(1), 4-23.
Yaqoob, I., Ahmed, E., Hashem, I. A. T., Ahmed,
A. I. A., Gani, A., Imran, M., & Guizani, M.
(2017). Internet of things architecture:
Recent advances, taxonomy, requirements,
and open challenges. IEEE wireless
communications, 24(3), 10-16.
Nitti, M., Pilloni, V., Giusto, D., & Popescu, V.
(2017). Iot architecture for a sustainable
tourism application in a smart city
environment. Mobile Information
Systems, 2017.
Adoption Dynamics of IoT Products. IEEE
Security & Privacy, 17(2), 39-48.
Lohan, E. S., Koivisto, M., Galinina, O., Andreev,
S., Tolli, A., Destino, G., ... & Valkama, M.
(2018). Benefits of positioning-aided
communication technology in high-frequency
industrial IoT. IEEE Communications
Magazine, 56(12), 142-148.
Dlamini, N. N., & Johnston, K. (2016,
November). The use, benefits and challenges
of using the Internet of Things (IoT) in retail
businesses: A literature review. In 2016
International Conference on Advances in
Computing and Communication Engineering
(ICACCE) (pp. 430-436). IEEE.
Gaur, A., Scotney, B., Parr, G., & McClean, S.
(2015). Smart city architecture and its
applications based on IoT. Procedia
computer science, 52, 1089-1094.
Robles, T., Alcarria, R., de Andrés, D. M., de la
Cruz, M. N., Calero, R., Iglesias, S., &
López, M. (2015). An IoT based reference
architecture for smart water management
processes. JoWUA, 6(1), 4-23.
Yaqoob, I., Ahmed, E., Hashem, I. A. T., Ahmed,
A. I. A., Gani, A., Imran, M., & Guizani, M.
(2017). Internet of things architecture:
Recent advances, taxonomy, requirements,
and open challenges. IEEE wireless
communications, 24(3), 10-16.
Nitti, M., Pilloni, V., Giusto, D., & Popescu, V.
(2017). Iot architecture for a sustainable
tourism application in a smart city
environment. Mobile Information
Systems, 2017.
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.