scispace - formally typeset
Open AccessJournal ArticleDOI

A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications

Reads0
Chats0
TLDR
The relationship between cyber-physical systems and IoT, both of which play important roles in realizing an intelligent cyber- physical world, are explored and existing architectures, enabling technologies, and security and privacy issues in IoT are presented to enhance the understanding of the state of the art IoT development.
Abstract
Fog/edge computing has been proposed to be integrated with Internet of Things (IoT) to enable computing services devices deployed at network edge, aiming to improve the user’s experience and resilience of the services in case of failures. With the advantage of distributed architecture and close to end-users, fog/edge computing can provide faster response and greater quality of service for IoT applications. Thus, fog/edge computing-based IoT becomes future infrastructure on IoT development. To develop fog/edge computing-based IoT infrastructure, the architecture, enabling techniques, and issues related to IoT should be investigated first, and then the integration of fog/edge computing and IoT should be explored. To this end, this paper conducts a comprehensive overview of IoT with respect to system architecture, enabling technologies, security and privacy issues, and present the integration of fog/edge computing and IoT, and applications. Particularly, this paper first explores the relationship between cyber-physical systems and IoT, both of which play important roles in realizing an intelligent cyber-physical world. Then, existing architectures, enabling technologies, and security and privacy issues in IoT are presented to enhance the understanding of the state of the art IoT development. To investigate the fog/edge computing-based IoT, this paper also investigate the relationship between IoT and fog/edge computing, and discuss issues in fog/edge computing-based IoT. Finally, several applications, including the smart grid, smart transportation, and smart cities, are presented to demonstrate how fog/edge computing-based IoT to be implemented in real-world applications.

read more

Citations
More filters
Journal ArticleDOI

A Survey on the Edge Computing for the Internet of Things

TL;DR: A comprehensive survey, analyzing how edge computing improves the performance of IoT networks and considers security issues in edge computing, evaluating the availability, integrity, and the confidentiality of security strategies of each group, and proposing a framework for security evaluation of IoT Networks with edge computing.
Journal ArticleDOI

A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems

TL;DR: This article provides a comprehensive review on emerging and enabling technologies related to the 5G system that enables IoT, such as 5G new radio, multiple-input–multiple-output antenna with the beamformation technology, mm-wave commutation technology, heterogeneous networks (HetNets), the role of augmented reality (AR) in IoT, which are discussed in detail.
Journal ArticleDOI

A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures

TL;DR: A detailed review of the security-related challenges and sources of threat in the IoT applications is presented and four different technologies, blockchain, fog computing, edge computing, and machine learning, to increase the level of security in IoT are discussed.
Journal ArticleDOI

Cyber-Physical Systems Security—A Survey

TL;DR: In this paper, the authors study and systematize existing research on CPS security under a unified framework, which consists of three orthogonal coordinates: 1) from the security perspective, they follow the well-known taxonomy of threats, vulnerabilities, attacks and controls; 2) from CPS components, they focus on cyber, physical, and cyber-physical components.
Journal ArticleDOI

Blockchain for Internet of Things: A Survey

TL;DR: An in-depth survey of BCoT is presented and the insights of this new paradigm are discussed and the open research directions in this promising area are outlined.
References
More filters
Proceedings ArticleDOI

Key Technologies and Applications of Internet of Things

TL;DR: The concept of IoT, the basic properties and characteristics of IoT were introduced, and the application of IoT was illustrated by its typical use in environment monitoring.
Proceedings ArticleDOI

On False Data Injection Attacks against Distributed Energy Routing in Smart Grid

TL;DR: The authors' evaluation data show that novel false data injection attacks against the energy routing process can effectively disrupt the effectiveness of energy distribution process, causing significant supplied energy loss, energy transmission cost and the number of outage users.
Proceedings ArticleDOI

The Deployment of a Smart Monitoring System Using Wireless Sensor and Actuator Networks

TL;DR: This paper explores the implementation of a smart monitoring system over a wireless sensor network with particular emphasis on the creation of a solid routing infrastructure through the Routing Protocol for Low- power and lossy networks (RPL), whose definition is currently being discussed within the IETF ROLL working group.
Proceedings ArticleDOI

Internet of Things Security Analysis

TL;DR: The paper focuses on the application of Internet of Things in the nation and even in the global in the future, analysing the existed security risks of the Internet of Thing 's network points, transmission and proposes some suggestive solutions due to these problems.
Proceedings ArticleDOI

Location-privacy-aware review publication mechanism for local business service systems

TL;DR: This paper formalizes the privacy preserving problem in local business service systems and proposes a novel location privacy preserving framework that can preserve users' location privacy in arbitrary local area and can maintain a good utility for both the system and every user.
Related Papers (5)