A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
Reads0
Chats0
TLDR
The relationship between cyber-physical systems and IoT, both of which play important roles in realizing an intelligent cyber- physical world, are explored and existing architectures, enabling technologies, and security and privacy issues in IoT are presented to enhance the understanding of the state of the art IoT development.Abstract:
Fog/edge computing has been proposed to be integrated with Internet of Things (IoT) to enable computing services devices deployed at network edge, aiming to improve the user’s experience and resilience of the services in case of failures. With the advantage of distributed architecture and close to end-users, fog/edge computing can provide faster response and greater quality of service for IoT applications. Thus, fog/edge computing-based IoT becomes future infrastructure on IoT development. To develop fog/edge computing-based IoT infrastructure, the architecture, enabling techniques, and issues related to IoT should be investigated first, and then the integration of fog/edge computing and IoT should be explored. To this end, this paper conducts a comprehensive overview of IoT with respect to system architecture, enabling technologies, security and privacy issues, and present the integration of fog/edge computing and IoT, and applications. Particularly, this paper first explores the relationship between cyber-physical systems and IoT, both of which play important roles in realizing an intelligent cyber-physical world. Then, existing architectures, enabling technologies, and security and privacy issues in IoT are presented to enhance the understanding of the state of the art IoT development. To investigate the fog/edge computing-based IoT, this paper also investigate the relationship between IoT and fog/edge computing, and discuss issues in fog/edge computing-based IoT. Finally, several applications, including the smart grid, smart transportation, and smart cities, are presented to demonstrate how fog/edge computing-based IoT to be implemented in real-world applications.read more
Citations
More filters
Journal ArticleDOI
A Survey on the Edge Computing for the Internet of Things
TL;DR: A comprehensive survey, analyzing how edge computing improves the performance of IoT networks and considers security issues in edge computing, evaluating the availability, integrity, and the confidentiality of security strategies of each group, and proposing a framework for security evaluation of IoT Networks with edge computing.
Journal ArticleDOI
A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems
Lalit Chettri,Rabindranath Bera +1 more
TL;DR: This article provides a comprehensive review on emerging and enabling technologies related to the 5G system that enables IoT, such as 5G new radio, multiple-input–multiple-output antenna with the beamformation technology, mm-wave commutation technology, heterogeneous networks (HetNets), the role of augmented reality (AR) in IoT, which are discussed in detail.
Journal ArticleDOI
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
TL;DR: A detailed review of the security-related challenges and sources of threat in the IoT applications is presented and four different technologies, blockchain, fog computing, edge computing, and machine learning, to increase the level of security in IoT are discussed.
Journal ArticleDOI
Cyber-Physical Systems Security—A Survey
TL;DR: In this paper, the authors study and systematize existing research on CPS security under a unified framework, which consists of three orthogonal coordinates: 1) from the security perspective, they follow the well-known taxonomy of threats, vulnerabilities, attacks and controls; 2) from CPS components, they focus on cyber, physical, and cyber-physical components.
Journal ArticleDOI
Blockchain for Internet of Things: A Survey
TL;DR: An in-depth survey of BCoT is presented and the insights of this new paradigm are discussed and the open research directions in this promising area are outlined.
References
More filters
Proceedings ArticleDOI
Key Technologies and Applications of Internet of Things
Yuxi Liu,Guohui Zhou +1 more
TL;DR: The concept of IoT, the basic properties and characteristics of IoT were introduced, and the application of IoT was illustrated by its typical use in environment monitoring.
Proceedings ArticleDOI
On False Data Injection Attacks against Distributed Energy Routing in Smart Grid
TL;DR: The authors' evaluation data show that novel false data injection attacks against the energy routing process can effectively disrupt the effectiveness of energy distribution process, causing significant supplied energy loss, energy transmission cost and the number of outage users.
Proceedings ArticleDOI
The Deployment of a Smart Monitoring System Using Wireless Sensor and Actuator Networks
TL;DR: This paper explores the implementation of a smart monitoring system over a wireless sensor network with particular emphasis on the creation of a solid routing infrastructure through the Routing Protocol for Low- power and lossy networks (RPL), whose definition is currently being discussed within the IETF ROLL working group.
Proceedings ArticleDOI
Internet of Things Security Analysis
Gang Gan,Zeyong Lu,Jun Jiang +2 more
TL;DR: The paper focuses on the application of Internet of Things in the nation and even in the global in the future, analysing the existed security risks of the Internet of Thing 's network points, transmission and proposes some suggestive solutions due to these problems.
Proceedings ArticleDOI
Location-privacy-aware review publication mechanism for local business service systems
TL;DR: This paper formalizes the privacy preserving problem in local business service systems and proposes a novel location privacy preserving framework that can preserve users' location privacy in arbitrary local area and can maintain a good utility for both the system and every user.