The internet of things: a survey
Citations
9,593 citations
6,131 citations
Cites background from "The internet of things: a survey"
...[2] covers the main communication enabling technologies, wired and wireless and the elements of wireless sensor networks (WSNs)....
[...]
...research attempts [2], [3], [15]–[20]....
[...]
...In the recent literature, however, some other models have been proposed that add more abstraction to the IoT architecture [2], [3], [17]–[20]....
[...]
4,335 citations
Cites background from "The internet of things: a survey"
...I. INTRODUCTION T HE Internet of Things (IoT) is a recent communicationparadigm that envisions a near future, in which the objects of everyday life will be equipped with microcontrollers, transceivers for digital communication, and suitable protocol stacks that will make them able to communicate…...
[...]
4,145 citations
Cites background or methods from "The internet of things: a survey"
...The services on the service layer run directly on limited network infrastructures in order to effectively find new services for an application, as they connect to the network....
[...]
...RFID has been widely used in logistics, pharmaceutical production, retailing, and supply chain management, since 1980s [7], [8]....
[...]
...However, the recent research results on SOA-IoT reported [41] that service provisioning process (SPP) can also effectively provide interaction between applications and services....
[...]
...…layer in IoT, designers need to address issues such as network management technologies for heterogonous networks (such as fixed, wireless, mobile, etc.), energy efficiency in networks, QoS requirements, service discovery and retrieval, data and signal processing, security, and privacy [38]....
[...]
...Jia et al. [6] and Domingo [33] propose to divide the IoT system architecture into three major layers: perception layer, network layer, and service layer (or application layer)....
[...]
2,542 citations
Cites background from "The internet of things: a survey"
...The application domain can be mainly divided in to three categories based on their focus [23], [4]: industry, environment,...
[...]
...The main reasons behind this interest are the capabilities that the IoT [22], [23] will offer....
[...]
References
3,172 citations
"The internet of things: a survey" refers background in this paper
...Evolutions of these technologies bring new technologies to IoT (Deng et al. 2010; Kranenburg and Anzelmo 2011; Li et al. 2012a, b; Malatras et al. 2008; Miorandi et al. 2012; Pautasso and Wilde 2009; Peris-Lopez et al. 2006; Vermesan 2013; Wang 2012)....
[...]
...Examples of RFID integrated sensors are On/Off-board locating sensor, sensor tags, independent tag and sensor devices, and RFID reading systems (Pretz 2013; Miorandi et al. 2012)....
[...]
...Since 2010 (Kranenburg and Anzelmo 2011; Malatras et al. 2008; Miorandi et al. 2012), with the advances in intelligent sensors, low energy wireless communication, and sensor network technologies, a large number of ‘things’ can be networked as an IoT (Li and Liu 2012; Welbourne et al. 2009)....
[...]
...The emerging wearable body sensor networks (WBSNs) were developed to monitor patient activities or medical parameters continuously (Miorandi et al. 2012)....
[...]
...Since 2010 (Kranenburg and Anzelmo 2011; Malatras et al. 2008; Miorandi et al. 2012), with the advances in intelligent sensors, low energy wireless communication, and sensor network technologies, a large number of ‘things’ can be networked as an IoT (Li and Liu 2012; Welbourne et al....
[...]
1,994 citations
"The internet of things: a survey" refers background or methods in this paper
...Objects in an IoT must be able to communicate and exchange data with each other autonomously (Juels 2006; Mitrokotsa et al. 2013)....
[...]
...For example, Juels proposed the method of “block tag’ to prevent the unauthorized tracing (Juels 2006)....
[...]
1,581 citations
"The internet of things: a survey" refers background or methods in this paper
...For example, the stage of use authentication involves the developments of access control and trust management (Fielding and Taylor 2002; Frenken et al. 2008; Hepp et al. 2007)....
[...]
...The homophily (Fielding and Taylor 2002) method is proposed to establish higher levels of trust; it can be helpful to optimize relationships among things (EPCglobal 2013; Li et al. 2012a, b)....
[...]
...Fielding and Taylor (2002) investigated the potential of SIoT to support novel applications and networking services....
[...]
...People could track the usage of the things and monitor any variables or objects; the collected data can be utilized to reduce wastes and costs (Fielding and Taylor 2002)....
[...]
...The IoT is initiated by the use of RFID technology, which is increasingly used in logistics, pharmaceutical production, retail, and diverse industries (Fielding and Taylor 2002; Guinard et al. 2010; Guinard et al. 2009; Xu 2011b)....
[...]
1,493 citations
649 citations
"The internet of things: a survey" refers background in this paper
...Meanwhile, the European Telecommunications Standards Institute (ETSI) is responsible to make the policies related to IoT (Floerkemeier et al. 2007; Gama et al. 2012; Welbourne et al. 2009)....
[...]
...Marry (2013) and Welbourne et al. (2009) discussed the combination of social relationships into the future Internet....
[...]
...Since 2010 (Kranenburg and Anzelmo 2011; Malatras et al. 2008; Miorandi et al. 2012), with the advances in intelligent sensors, low energy wireless communication, and sensor network technologies, a large number of ‘things’ can be networked as an IoT (Li and Liu 2012; Welbourne et al. 2009)....
[...]