Skip to main content
Erschienen in: Wireless Personal Communications 3/2022

19.01.2022

An Integrated Exploration on Internet of Things and Wireless Sensor Networks

verfasst von: Saurabh Sharma, Vinod Kumar Verma

Erschienen in: Wireless Personal Communications | Ausgabe 3/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The ability to access data from remote locations is meant possible with the help of computer networks. These networks may be wired or wireless. Modern improvements in wireless infrastructure brought wireless sensor networks (WSN) into existence. WSN is utilized to monitor, report, and supervise tasks or events occurring in the environment. The relaying of data in such systems takes place by utilizing different routing schemes. These routing schemes were proposed to augment the throughput of communication networks. In addition, perception regarding the Internet of Things (IoT) gained momentum via making it feasible for things to interact and act smartly. In this paper, a meticulous survey of solutions proposed in both the domains i.e. WSN and IoT is conferred. Later, comprehensive scrutiny of various solutions proposed in the WSN and IoT domain is deliberated regarding their features, pros, and cons. Moreover, this work compares various proposed solutions based on performance measures like heterogeneity, interoperability, mobility, reusability, flexibility, energy efficiency, scalability, delay, security as well as big data. This knowledge enables the network architect to pick the apt solution in support of a specific application. As the integration of WSN and IoT raised numerous open issues, this work deliberated the afore-mentioned performance measures as the key open issues of interest. Furthermore, novel exploration guidelines in the said domain have been elaborated. These guidelines are expected to act as a key component in the upcoming enhancements of communication networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Botta, A., Donato, W. D., Persico, V., & Pescape, A. (2016). Integration of Cloud computing and Internet of Things: A survey. Future Generation Computer Systems, 56, 684–700.CrossRef Botta, A., Donato, W. D., Persico, V., & Pescape, A. (2016). Integration of Cloud computing and Internet of Things: A survey. Future Generation Computer Systems, 56, 684–700.CrossRef
2.
Zurück zum Zitat Zhao, D., Yan, Z., Wang, M., Zhang, P., & Song, B. (2021). Is 5G handover secure and private? A survey. IEEE Internet of Things Journal, 8(16), 12855–12879.CrossRef Zhao, D., Yan, Z., Wang, M., Zhang, P., & Song, B. (2021). Is 5G handover secure and private? A survey. IEEE Internet of Things Journal, 8(16), 12855–12879.CrossRef
3.
Zurück zum Zitat Kocakulak, M., & Butun, I. (2017). An overview of wireless sensor networks towards Internet of Things. In IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), pp. 1–6. Kocakulak, M., & Butun, I. (2017). An overview of wireless sensor networks towards Internet of Things. In IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), pp. 1–6.
5.
Zurück zum Zitat Dai, H. N., Zheng, Z., & Zhang, Y. (2019). Blockchain for Internet of Things: A survey. IEEE Internet Of Things Journal, 6(5), 8076–8094.CrossRef Dai, H. N., Zheng, Z., & Zhang, Y. (2019). Blockchain for Internet of Things: A survey. IEEE Internet Of Things Journal, 6(5), 8076–8094.CrossRef
6.
Zurück zum Zitat Washizaki, H., Ogata, S., Hazeyama, A., Okubo, T., Fernandez, E. B., & Yoshioka, N. (2020). Landscape of architecture and design patterns for IoT systems. IEEE Internet of Things Journal, 7(10), 10091–10101.CrossRef Washizaki, H., Ogata, S., Hazeyama, A., Okubo, T., Fernandez, E. B., & Yoshioka, N. (2020). Landscape of architecture and design patterns for IoT systems. IEEE Internet of Things Journal, 7(10), 10091–10101.CrossRef
7.
Zurück zum Zitat Paniagua, C., & Delsing, J. (2021). Industrial frameworks for Internet of Things: A survey. IEEE Systems Journal, 15(1), 1149–1159.CrossRef Paniagua, C., & Delsing, J. (2021). Industrial frameworks for Internet of Things: A survey. IEEE Systems Journal, 15(1), 1149–1159.CrossRef
8.
Zurück zum Zitat Liu, D., Yan, Z., Ding, W., & Atiquzzaman, M. (2019). A survey on secure data analytics in edge computing. IEEE Internet of Things Journal, 6(3), 4946–4967.CrossRef Liu, D., Yan, Z., Ding, W., & Atiquzzaman, M. (2019). A survey on secure data analytics in edge computing. IEEE Internet of Things Journal, 6(3), 4946–4967.CrossRef
9.
Zurück zum Zitat Feng, X., Wei, T., Chen, Y., Ge, N., & Wang, C. X. (2021). 5G embraces satellites for 6G ubiquitous IoT: Basic models for integrated satellite terrestrial networks. IEEE Internet of Things Journal, 8(18), 14399–14417.CrossRef Feng, X., Wei, T., Chen, Y., Ge, N., & Wang, C. X. (2021). 5G embraces satellites for 6G ubiquitous IoT: Basic models for integrated satellite terrestrial networks. IEEE Internet of Things Journal, 8(18), 14399–14417.CrossRef
11.
Zurück zum Zitat Arvanitou, E. M., Ampatzoglou, A., Chatzigeorgiou, A., & Carver, J. C. (2021). Software engineering practices for scientific software development: A systematic mapping study. The Journal of Systems & Software, 172, 110848.CrossRef Arvanitou, E. M., Ampatzoglou, A., Chatzigeorgiou, A., & Carver, J. C. (2021). Software engineering practices for scientific software development: A systematic mapping study. The Journal of Systems & Software, 172, 110848.CrossRef
12.
Zurück zum Zitat Hustad, E., & Olsen, D. H. (2021). Creating a sustainable digital infrastructure: The role of service-oriented architecture. Procedia Computer Science, 181, 597–604.CrossRef Hustad, E., & Olsen, D. H. (2021). Creating a sustainable digital infrastructure: The role of service-oriented architecture. Procedia Computer Science, 181, 597–604.CrossRef
13.
Zurück zum Zitat Xu, L., Collier, R., & Hare, G. M. P. O. (2017). A survey of clustering techniques in WSNs and consideration of the challenges of applying such to 5G IoT scenarios. IEEE Internet of Things Journal, 4(5), 1229–1249.CrossRef Xu, L., Collier, R., & Hare, G. M. P. O. (2017). A survey of clustering techniques in WSNs and consideration of the challenges of applying such to 5G IoT scenarios. IEEE Internet of Things Journal, 4(5), 1229–1249.CrossRef
14.
Zurück zum Zitat Piao, Z., Peng, M., Liu, Y., & Daneshmand, M. (2019). Recent advances of edge cache in radio access networks for Internet of Things: Techniques, performances, and challenges. IEEE Internet of Things Journal, 6(1), 1010–1028.CrossRef Piao, Z., Peng, M., Liu, Y., & Daneshmand, M. (2019). Recent advances of edge cache in radio access networks for Internet of Things: Techniques, performances, and challenges. IEEE Internet of Things Journal, 6(1), 1010–1028.CrossRef
15.
Zurück zum Zitat Sodhro, A. H., Pirbhulal, S., Luo, Z., Muhammad, K., & Zahid, N. (2021). Toward 6G architecture for energy-efficient communication in IoT-enabled smart automation systems. IEEE Internet of Things Journal, 8(7), 5141–5148.CrossRef Sodhro, A. H., Pirbhulal, S., Luo, Z., Muhammad, K., & Zahid, N. (2021). Toward 6G architecture for energy-efficient communication in IoT-enabled smart automation systems. IEEE Internet of Things Journal, 8(7), 5141–5148.CrossRef
16.
Zurück zum Zitat Jin, F., Zhang, H., Ng, J. K. Y., Guo, S., Lee, V. C. S., & Son, S. H. (2020). Toward scalable and robust indoor tracking: Design, implementation, and evaluation. IEEE Internet of Things Journal, 7(2), 1192–1204.CrossRef Jin, F., Zhang, H., Ng, J. K. Y., Guo, S., Lee, V. C. S., & Son, S. H. (2020). Toward scalable and robust indoor tracking: Design, implementation, and evaluation. IEEE Internet of Things Journal, 7(2), 1192–1204.CrossRef
21.
Zurück zum Zitat Hu, M., Luo, X., Chen, J., Lee, Y. C., Zhou, Y., & Wu, D. (2021). Virtual reality: A survey of enabling technologies and its applications in IoT. Journal of Network and Computer Applications, 178, 102970.CrossRef Hu, M., Luo, X., Chen, J., Lee, Y. C., Zhou, Y., & Wu, D. (2021). Virtual reality: A survey of enabling technologies and its applications in IoT. Journal of Network and Computer Applications, 178, 102970.CrossRef
22.
Zurück zum Zitat Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.CrossRef Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.CrossRef
23.
Zurück zum Zitat Ghaleb, B., Al-Dubai, Y. A., Elias, E., Ayoub, A., Youssef, N., Mackenzie, L. M., & Azzedin, B. (2018). A survey of limitations and enhancements of the IPv6 routing protocol for low-power and Lossy networks: A focus on core operations. IEEE Communications Surveys & Tutorials, 21, 1607–1635.CrossRef Ghaleb, B., Al-Dubai, Y. A., Elias, E., Ayoub, A., Youssef, N., Mackenzie, L. M., & Azzedin, B. (2018). A survey of limitations and enhancements of the IPv6 routing protocol for low-power and Lossy networks: A focus on core operations. IEEE Communications Surveys & Tutorials, 21, 1607–1635.CrossRef
24.
Zurück zum Zitat Adat, V., & Gupta, B. B. (2018). Security in Internet of Things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67, 423–441.CrossRef Adat, V., & Gupta, B. B. (2018). Security in Internet of Things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67, 423–441.CrossRef
25.
Zurück zum Zitat Javed, F., Afzal, M. K., Sharif, M., & Kim, B. S. (2018). Internet of Things (IoTs) operating systems support, networking technologies, applications, and challenges: A comparative review. IEEE Communications Surveys & Tutorials, 20, 2062–2100.CrossRef Javed, F., Afzal, M. K., Sharif, M., & Kim, B. S. (2018). Internet of Things (IoTs) operating systems support, networking technologies, applications, and challenges: A comparative review. IEEE Communications Surveys & Tutorials, 20, 2062–2100.CrossRef
26.
Zurück zum Zitat Costa, K. A. P. D., Papa, J. P., Lisboa, C. O., Munoz, R., & Albuquerque, V. H. C. D. (2019). Internet of Things: A survey on machine learning-based intrusion detection approaches. Computer Networks, 151, 147–157.CrossRef Costa, K. A. P. D., Papa, J. P., Lisboa, C. O., Munoz, R., & Albuquerque, V. H. C. D. (2019). Internet of Things: A survey on machine learning-based intrusion detection approaches. Computer Networks, 151, 147–157.CrossRef
27.
Zurück zum Zitat Sengupta, J., Ruj, S., & Bit, S. D. (2019). A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. Journal of Network and Computer Applications, 149, 102481.CrossRef Sengupta, J., Ruj, S., & Bit, S. D. (2019). A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. Journal of Network and Computer Applications, 149, 102481.CrossRef
28.
Zurück zum Zitat Verma, A., & Ranga, V. (2020). Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review. IEEE Sensors Journal, 10, 6472. Verma, A., & Ranga, V. (2020). Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review. IEEE Sensors Journal, 10, 6472.
29.
30.
Zurück zum Zitat Verma, V. K., Singh, S., & Pathak, N. P. (2016). Analytical event based investigations over Delphi random generator distributions for data dissemination routing protocols in highly dense wireless sensor networks. Wireless Personal Communications: An International Journal, 87(4), 1209–1222., ISSN: 0929-6212 (Print) 1572-834X (Online). Verma, V. K., Singh, S., & Pathak, N. P. (2016). Analytical event based investigations over Delphi random generator distributions for data dissemination routing protocols in highly dense wireless sensor networks. Wireless Personal Communications: An International Journal, 87(4), 1209–1222., ISSN: 0929-6212 (Print) 1572-834X (Online).
31.
Zurück zum Zitat Avila, K., Jabba, D., & Gomez, J. (2020). Security aspects for Rpl-based protocols: A systematic review in IoT. Applied Sciences, 10(6472), 1–20. Avila, K., Jabba, D., & Gomez, J. (2020). Security aspects for Rpl-based protocols: A systematic review in IoT. Applied Sciences, 10(6472), 1–20.
32.
Zurück zum Zitat Almusaylim, Z. A., Alhumam, A., & Jhanjhi, N. Z. (2020). Proposing a secure RPL based Internet of Things routing protocol: A review. Ad Hoc Networks, 101, 102096.CrossRef Almusaylim, Z. A., Alhumam, A., & Jhanjhi, N. Z. (2020). Proposing a secure RPL based Internet of Things routing protocol: A review. Ad Hoc Networks, 101, 102096.CrossRef
33.
Zurück zum Zitat Simha, S. N. V., Mathew, R., Sahoo, S., & Biradar, R. C. (2020). A review of RPL protocol using Contiki operating system. In Proceedings of the Fourth International Conference on Trends in Electronics and Informatics (ICOEI 2020), pp. 259–264. Simha, S. N. V., Mathew, R., Sahoo, S., & Biradar, R. C. (2020). A review of RPL protocol using Contiki operating system. In Proceedings of the Fourth International Conference on Trends in Electronics and Informatics (ICOEI 2020), pp. 259–264.
36.
Zurück zum Zitat Xu, L. D., Lu, Y., & Li, L. (2021). Embedding blockchain technology into IoT for security: A survey. IEEE Internet of Things Journal, 8(13), 10452–10473.CrossRef Xu, L. D., Lu, Y., & Li, L. (2021). Embedding blockchain technology into IoT for security: A survey. IEEE Internet of Things Journal, 8(13), 10452–10473.CrossRef
37.
Zurück zum Zitat Aversano, L., Bernardi, M. L., Cimitile, M., & Picori, R. (2021). A systematic review on Deep Learning approaches for IoT security. Computer Science Review, 40, 100389.MathSciNetCrossRef Aversano, L., Bernardi, M. L., Cimitile, M., & Picori, R. (2021). A systematic review on Deep Learning approaches for IoT security. Computer Science Review, 40, 100389.MathSciNetCrossRef
39.
Zurück zum Zitat Sezer, O. B., Dogdu, E., & Ozbayoglu, A. M. (2018). Context-aware computing, learning, and big data in Internet of Things: A survey. IEEE Internet of Things Journal, 5(1), 1–27.CrossRef Sezer, O. B., Dogdu, E., & Ozbayoglu, A. M. (2018). Context-aware computing, learning, and big data in Internet of Things: A survey. IEEE Internet of Things Journal, 5(1), 1–27.CrossRef
40.
Zurück zum Zitat Nazir, S., Nawaz, M., & Adnan, A. (2019). Big data features, applications, and analytics in cardiology—A systematic literature review. IEEE Access, 7, 143742–143771.CrossRef Nazir, S., Nawaz, M., & Adnan, A. (2019). Big data features, applications, and analytics in cardiology—A systematic literature review. IEEE Access, 7, 143742–143771.CrossRef
41.
Zurück zum Zitat Hajaji, Y., Boulila, W., Farah, I. R., Romdhani, I., & Hussain, A. (2021). Big data and IoT-based applications in smart environments: A systematic review. Computer Science Review, 39, 100318.CrossRef Hajaji, Y., Boulila, W., Farah, I. R., Romdhani, I., & Hussain, A. (2021). Big data and IoT-based applications in smart environments: A systematic review. Computer Science Review, 39, 100318.CrossRef
43.
Zurück zum Zitat Ferreira, H. G. C., & Desousa, R. T. (2017). Security analysis of a proposed Internet of Things middleware. Cluster Computing, 20, 651–660.CrossRef Ferreira, H. G. C., & Desousa, R. T. (2017). Security analysis of a proposed Internet of Things middleware. Cluster Computing, 20, 651–660.CrossRef
44.
Zurück zum Zitat Niaraki, M. J., Niaraki, A. S., & Choi, S. M. (2018). Semantic interoperability of GIS and MCDA tools for environmental assessment and decision making. Environment Modelling and Software, 100, 104–122.CrossRef Niaraki, M. J., Niaraki, A. S., & Choi, S. M. (2018). Semantic interoperability of GIS and MCDA tools for environmental assessment and decision making. Environment Modelling and Software, 100, 104–122.CrossRef
48.
Zurück zum Zitat Fotouhi, H., Moreira, D., Alves, M., & Yomsi, P. M. (2017). mRPL+: A mobility management framework in RPL/6LoWPAN. Computer Communications, 104, 34–54.CrossRef Fotouhi, H., Moreira, D., Alves, M., & Yomsi, P. M. (2017). mRPL+: A mobility management framework in RPL/6LoWPAN. Computer Communications, 104, 34–54.CrossRef
49.
Zurück zum Zitat Yong, B., Xu, Z., Wang, X., Cheng, L., Li, X., Wu, X., & Zhou, Q. (2018). IoT-based intelligent fitness system. Journal of Parallel and Distributed Computing, 118, 14–21.CrossRef Yong, B., Xu, Z., Wang, X., Cheng, L., Li, X., Wu, X., & Zhou, Q. (2018). IoT-based intelligent fitness system. Journal of Parallel and Distributed Computing, 118, 14–21.CrossRef
50.
Zurück zum Zitat Alsaeedy, A. A. R., & Chong, E. K. P. (2019). Mobility management for 5G IoT devices: Improving power consumption with lightweight signaling overhead. IEEE Internet of Things Journal, 6(5), 8237–8247.CrossRef Alsaeedy, A. A. R., & Chong, E. K. P. (2019). Mobility management for 5G IoT devices: Improving power consumption with lightweight signaling overhead. IEEE Internet of Things Journal, 6(5), 8237–8247.CrossRef
51.
Zurück zum Zitat Pirbhulal, S., Wu, W., Muhammad, K., Mehmood, I., Li, G., & Albuquerque, V. H. C. (2020). Mobility-enabled security for optimizing IoT-based intelligent applications. Recent Advances in Security and Privacy for Future Intelligent Networks, 34(2), 72–77. Pirbhulal, S., Wu, W., Muhammad, K., Mehmood, I., Li, G., & Albuquerque, V. H. C. (2020). Mobility-enabled security for optimizing IoT-based intelligent applications. Recent Advances in Security and Privacy for Future Intelligent Networks, 34(2), 72–77.
53.
Zurück zum Zitat Li, W., & Kara, S. (2017). Methodology for monitoring manufacturing environment by using Wireless Sensor Networks (WSN) and the Internet of Things (IoT). In The 24th CIRP Conference on Life Cycle Engineering, Procedia CIRP, Vol. 61, pp. 323–328. Li, W., & Kara, S. (2017). Methodology for monitoring manufacturing environment by using Wireless Sensor Networks (WSN) and the Internet of Things (IoT). In The 24th CIRP Conference on Life Cycle Engineering, Procedia CIRP, Vol. 61, pp. 323–328.
56.
Zurück zum Zitat Bhandari, K. S., Ra, I. H., & Cho, G. (2020). Multi-topology based QoS-differentiation in RPL for Internet of Things applications. IEEE Access, 8, 96686–96705.CrossRef Bhandari, K. S., Ra, I. H., & Cho, G. (2020). Multi-topology based QoS-differentiation in RPL for Internet of Things applications. IEEE Access, 8, 96686–96705.CrossRef
57.
Zurück zum Zitat Rafique, W., Zhao, X., Yu, S., Yaqoob, I., Imran, M., & Dou, W. (2020). An application development framework for Internet-of-Things service orchestration. IEEE Internet of Things Journal, 7(5), 4543–4556.CrossRef Rafique, W., Zhao, X., Yu, S., Yaqoob, I., Imran, M., & Dou, W. (2020). An application development framework for Internet-of-Things service orchestration. IEEE Internet of Things Journal, 7(5), 4543–4556.CrossRef
58.
Zurück zum Zitat Smiari, P., Bibi, S., & Feitosa, D. (2020). Examining the reuse potentials of IoT application frameworks. The Journal of Systems & Software, 169, 110706.CrossRef Smiari, P., Bibi, S., & Feitosa, D. (2020). Examining the reuse potentials of IoT application frameworks. The Journal of Systems & Software, 169, 110706.CrossRef
59.
Zurück zum Zitat Pradeep, P., Krishnamoorthy, S., & Pathinarupothi, R. K. (2021). Leveraging context-awareness for Internet of Things ecosystem: Representation, organization, and management of context. Computer Communications, 177, 33–50.CrossRef Pradeep, P., Krishnamoorthy, S., & Pathinarupothi, R. K. (2021). Leveraging context-awareness for Internet of Things ecosystem: Representation, organization, and management of context. Computer Communications, 177, 33–50.CrossRef
60.
Zurück zum Zitat Wang, J., Cao, Y., Li, B., Kim, H., & Lee, S. (2017). Particle swarm optimization based clustering algorithm with mobile sink for WSNs. Future Generation Computer Systems, 76, 452–457.CrossRef Wang, J., Cao, Y., Li, B., Kim, H., & Lee, S. (2017). Particle swarm optimization based clustering algorithm with mobile sink for WSNs. Future Generation Computer Systems, 76, 452–457.CrossRef
61.
Zurück zum Zitat Al-Turjman, F., Radwan, A., Mumtaz, S., & Rodriguez, J. (2017). Mobile traffic modeling for wireless multimedia sensor networks in IoT. Computer Communications, 112, 109–115.CrossRef Al-Turjman, F., Radwan, A., Mumtaz, S., & Rodriguez, J. (2017). Mobile traffic modeling for wireless multimedia sensor networks in IoT. Computer Communications, 112, 109–115.CrossRef
62.
Zurück zum Zitat Sadek, R. A. (2018). Hybrid energy-aware clustered protocol for IoT heterogeneous network. Future Computing and Informatics Journal, 37, 1–14. Sadek, R. A. (2018). Hybrid energy-aware clustered protocol for IoT heterogeneous network. Future Computing and Informatics Journal, 37, 1–14.
63.
Zurück zum Zitat Farman, H., Jan, B., Javed, H., Ahmad, N., Iqbal, J., Arshad, M., & Ali, S. (2018). Multi-criteria based Zone Head Selection in Internet of Things based Wireless Sensor Networks. Future Generation Computer System, 4169, 1–21. Farman, H., Jan, B., Javed, H., Ahmad, N., Iqbal, J., Arshad, M., & Ali, S. (2018). Multi-criteria based Zone Head Selection in Internet of Things based Wireless Sensor Networks. Future Generation Computer System, 4169, 1–21.
64.
Zurück zum Zitat Sheth, J., & Dezfouli, B. (2019). Enhancing the energy-efficiency and timeliness of IoT communication in WiFi networks. IEEE Internet of Things Journal, 6(5), 9085–9097.CrossRef Sheth, J., & Dezfouli, B. (2019). Enhancing the energy-efficiency and timeliness of IoT communication in WiFi networks. IEEE Internet of Things Journal, 6(5), 9085–9097.CrossRef
65.
Zurück zum Zitat Song, K., Zhang, J., Ji, Z., Jiang, J., & Li, C. (2020). Energy-efficiency for IoT system with cache-enabled fixed-wing UAV relay. IEEE Access, 8, 117503–117512.CrossRef Song, K., Zhang, J., Ji, Z., Jiang, J., & Li, C. (2020). Energy-efficiency for IoT system with cache-enabled fixed-wing UAV relay. IEEE Access, 8, 117503–117512.CrossRef
67.
Zurück zum Zitat Ren, J., Guo, H., Xu, C., & Zhang, Y. (2017). Serving at the edge: A scalable IoT architecture based on transparent computing. IEEE Network, 31(5), 96–105.CrossRef Ren, J., Guo, H., Xu, C., & Zhang, Y. (2017). Serving at the edge: A scalable IoT architecture based on transparent computing. IEEE Network, 31(5), 96–105.CrossRef
68.
Zurück zum Zitat Verma, V. K., Ntalianis, K., Singh, S., & Pathak, N. P. (2018). Data proliferation based estimations over distribution factor in heterogeneous wireless sensor networks. Computer Communications, 124, 111–118.CrossRef Verma, V. K., Ntalianis, K., Singh, S., & Pathak, N. P. (2018). Data proliferation based estimations over distribution factor in heterogeneous wireless sensor networks. Computer Communications, 124, 111–118.CrossRef
69.
Zurück zum Zitat Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2019). LSB : A Light weight Scalable Blockchain for IoT security and anonymity. Journal of Parallel and Distributed Computing, 134, 180–197.CrossRef Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2019). LSB : A Light weight Scalable Blockchain for IoT security and anonymity. Journal of Parallel and Distributed Computing, 134, 180–197.CrossRef
71.
Zurück zum Zitat Ibrar, M., Wang, L., Muntean, G. M., Shah, N., Akbar, A., & Qureshi, K. I. (2021). SOSW: scalable and optimal nearsighted location selection for fog node deployment and routing in SDN-based wireless networks for IoT systems. Annals of Telecommunications, 76, 331–341.CrossRef Ibrar, M., Wang, L., Muntean, G. M., Shah, N., Akbar, A., & Qureshi, K. I. (2021). SOSW: scalable and optimal nearsighted location selection for fog node deployment and routing in SDN-based wireless networks for IoT systems. Annals of Telecommunications, 76, 331–341.CrossRef
72.
Zurück zum Zitat Mubeen, S., Nikolaidis, P., Didic, A., Breivold, H. P., Sandstrom, K., & Behnam, M. (2017). Delay mitigation in offloaded cloud controllers in industrial IoT. IEEE Access, 5, 4418–4430.CrossRef Mubeen, S., Nikolaidis, P., Didic, A., Breivold, H. P., Sandstrom, K., & Behnam, M. (2017). Delay mitigation in offloaded cloud controllers in industrial IoT. IEEE Access, 5, 4418–4430.CrossRef
73.
Zurück zum Zitat Yousefpour, A., Ishigaki, G., Gour, R., & Jue, J. P. (2018). On reducing IoT service delay via fog offloading. IEEE Internet of Things Journal, 5(2), 998–1010.CrossRef Yousefpour, A., Ishigaki, G., Gour, R., & Jue, J. P. (2018). On reducing IoT service delay via fog offloading. IEEE Internet of Things Journal, 5(2), 998–1010.CrossRef
74.
Zurück zum Zitat Motlagh, N. H., Bagaa, M., & Taleb, T. (2019). Energy and delay aware task assignment mechanism for UAV-based IoT platform. IEEE Internet of Things Journal, 6(4), 6523–6536.CrossRef Motlagh, N. H., Bagaa, M., & Taleb, T. (2019). Energy and delay aware task assignment mechanism for UAV-based IoT platform. IEEE Internet of Things Journal, 6(4), 6523–6536.CrossRef
75.
Zurück zum Zitat Shahryari, O. K., Pedram, H., Khajehvand, V., & TakhtFooladi, M. D. (2020). Energy-Efficient and delay-guaranteed computation offloading for fog-based IoT networks. Computer Networks, 182, 107511.CrossRef Shahryari, O. K., Pedram, H., Khajehvand, V., & TakhtFooladi, M. D. (2020). Energy-Efficient and delay-guaranteed computation offloading for fog-based IoT networks. Computer Networks, 182, 107511.CrossRef
77.
Zurück zum Zitat Verma, V. K. (2017). Pheromone and path length factor-based trustworthiness estimations in heterogeneous wireless sensor networks. IEEE Sensors Journal, 17, 215–220.CrossRef Verma, V. K. (2017). Pheromone and path length factor-based trustworthiness estimations in heterogeneous wireless sensor networks. IEEE Sensors Journal, 17, 215–220.CrossRef
78.
Zurück zum Zitat Verma, V. K., Singh, S., & Pathak, N. P. (2015). Optimized battery models estimation for static, distance vector and on-demand based routing protocols over 802.11 enabled wireless sensor networks. Wireless Personal Communications: An International Journal, 81(2), 503–517. ISSN: 0929-6212 (Print) 1572-834X (Online). Verma, V. K., Singh, S., & Pathak, N. P. (2015). Optimized battery models estimation for static, distance vector and on-demand based routing protocols over 802.11 enabled wireless sensor networks. Wireless Personal Communications: An International Journal, 81(2), 503–517. ISSN: 0929-6212 (Print) 1572-834X (Online).
79.
Zurück zum Zitat Verma, V.K., Singh, S., Pathak, N. P. (2014). Comprehensive event based estimation of sensor node distribution strategies using classical flooding routing protocol in wireless sensor networks. Wireless Networks: The Journal of Mobile Communication, Computation and Information, 20(8), 2349–2357. ISSN: 1022-0038 (Print) 1572-8196 (Online). Verma, V.K., Singh, S., Pathak, N. P. (2014). Comprehensive event based estimation of sensor node distribution strategies using classical flooding routing protocol in wireless sensor networks. Wireless Networks: The Journal of Mobile Communication, Computation and Information, 20(8), 2349–2357. ISSN: 1022-0038 (Print) 1572-8196 (Online).
80.
Zurück zum Zitat Verma, V. K., Singh, S., Pathak, N. P. (2014). Collusion based realization of trust and reputation models in extreme fraudulent environment over static and dynamic wireless sensor networks. International Journal of Distributed Sensor Networks, 2014, Article ID 672968, 1–9. Verma, V. K., Singh, S., Pathak, N. P. (2014). Collusion based realization of trust and reputation models in extreme fraudulent environment over static and dynamic wireless sensor networks. International Journal of Distributed Sensor Networks, 2014, Article ID 672968, 1–9.
81.
Zurück zum Zitat Verma, V. K., Singh, S., & Pathak, N. P. (2016). Impact of malicious servers over trust and reputation models in wireless sensor networks. International Journal of Electronics, 103(3), 530–540. Print ISSN: 0020-7217 Online ISSN: 1362-3060. Verma, V. K., Singh, S., & Pathak, N. P. (2016). Impact of malicious servers over trust and reputation models in wireless sensor networks. International Journal of Electronics, 103(3), 530–540. Print ISSN: 0020-7217 Online ISSN: 1362-3060.
82.
Zurück zum Zitat Verma, V. K., Singh, S., & Pathak, N. P. (2014). Analysis of scalability for AODV routing protocol in wireless sensor networks. Optik - International Journal for Light and Electron Optics, 125(2), 748–750. ISSN: 0030-4026. Verma, V. K., Singh, S., & Pathak, N. P. (2014). Analysis of scalability for AODV routing protocol in wireless sensor networks. Optik - International Journal for Light and Electron Optics, 125(2), 748–750. ISSN: 0030-4026.
83.
Zurück zum Zitat Verma, V. K., Singh, S., & Pathak, N. P. (2017). Towards comparative evaluation of trust and reputation models over static, dynamic and oscillating wireless sensor networks. Wireless Networks, 23, 335–343.CrossRef Verma, V. K., Singh, S., & Pathak, N. P. (2017). Towards comparative evaluation of trust and reputation models over static, dynamic and oscillating wireless sensor networks. Wireless Networks, 23, 335–343.CrossRef
84.
Zurück zum Zitat Johnson, M. O., Siddiqui, A., & Karami, A. (2017). A wormhole attack detection and prevention technique in wireless sensor networks. International Journal of Computer Applications, 174, 1–8.CrossRef Johnson, M. O., Siddiqui, A., & Karami, A. (2017). A wormhole attack detection and prevention technique in wireless sensor networks. International Journal of Computer Applications, 174, 1–8.CrossRef
85.
Zurück zum Zitat Jarrah, O. Y. A., Hammdi, Y. A., Yoo, P. D., Muhaidat, S., & Qutayri, M. A. (2017). Semi-supervised multi-layered clustering model for intrusion detection. Digital Communications and Networks, 109, 1–12. Jarrah, O. Y. A., Hammdi, Y. A., Yoo, P. D., Muhaidat, S., & Qutayri, M. A. (2017). Semi-supervised multi-layered clustering model for intrusion detection. Digital Communications and Networks, 109, 1–12.
86.
Zurück zum Zitat Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761–768.CrossRef Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761–768.CrossRef
87.
Zurück zum Zitat Airehrour, D., Gutierrez, J. A., & Ray, S. K. (2018). SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Generation Computer Systems, 4033, 1–29. Airehrour, D., Gutierrez, J. A., & Ray, S. K. (2018). SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Generation Computer Systems, 4033, 1–29.
88.
Zurück zum Zitat Jyothisree, M. V. R., & Sreekanth, S. (2019). Attacks in RPL and detection technique used for Internet of Things. International Journal of Recent Technology and Engineering (IJRTE), 1876–1879. ISSN: 2277-3878. Jyothisree, M. V. R., & Sreekanth, S. (2019). Attacks in RPL and detection technique used for Internet of Things. International Journal of Recent Technology and Engineering (IJRTE), 1876–1879. ISSN: 2277-3878.
89.
Zurück zum Zitat Anitha, A. A. & Arockiam, L. (2019). ANNIDS: Artificial neural network based intrusion detection system for Internet of Things. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(11), 2583–2588. ISSN: 2278–3075. Anitha, A. A. & Arockiam, L. (2019). ANNIDS: Artificial neural network based intrusion detection system for Internet of Things. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(11), 2583–2588. ISSN: 2278–3075.
90.
Zurück zum Zitat Sharma, M., Elmiligi, H., Gebali, F., & Verma, A. (2019). Simulating attacks for RPL and generating multi-class dataset for supervised machine learning. In: IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON-2019), pp. 20–26. Sharma, M., Elmiligi, H., Gebali, F., & Verma, A. (2019). Simulating attacks for RPL and generating multi-class dataset for supervised machine learning. In: IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON-2019), pp. 20–26.
91.
Zurück zum Zitat Qureshi, K. N., Rana, S. S., Ahmed, A., & Jeon, G. (2020). A novel and secure attacks detection framework for Smart Cities Industrial Internet of Things. Sustainable Cities and Society, 102343, 1–33. Qureshi, K. N., Rana, S. S., Ahmed, A., & Jeon, G. (2020). A novel and secure attacks detection framework for Smart Cities Industrial Internet of Things. Sustainable Cities and Society, 102343, 1–33.
92.
Zurück zum Zitat Ahutu, O. R., & El-Ocla, H. (2020). Centralized routing protocol for detecting wormhole attacks in wireless sensor networks. IEEE Access, 8, 63270–63282.CrossRef Ahutu, O. R., & El-Ocla, H. (2020). Centralized routing protocol for detecting wormhole attacks in wireless sensor networks. IEEE Access, 8, 63270–63282.CrossRef
93.
Zurück zum Zitat Sahay, R., Geethakumari, G., Mitra, B., & Sahoo, I. (2020). Efficient framework for detection of version number attack in Internet of Things. In A. Abraham, A. Cherukuri, P. Melin, & N. Gandhi (Eds.), Intelligent Systems Design and Applications (ISDA 2018). Advances in Intelligent Systems and Computing (AISC 941) (pp. 480–492). Springer. Sahay, R., Geethakumari, G., Mitra, B., & Sahoo, I. (2020). Efficient framework for detection of version number attack in Internet of Things. In A. Abraham, A. Cherukuri, P. Melin, & N. Gandhi (Eds.), Intelligent Systems Design and Applications (ISDA 2018). Advances in Intelligent Systems and Computing (AISC 941) (pp. 480–492). Springer.
94.
Zurück zum Zitat Pu, C. (2020). Sybil attack in RPL-based Internet of Things: analysis and defenses. IEEE Internet of Things Journal, 7, 4937–4949.CrossRef Pu, C. (2020). Sybil attack in RPL-based Internet of Things: analysis and defenses. IEEE Internet of Things Journal, 7, 4937–4949.CrossRef
95.
Zurück zum Zitat Sharma, S., & Verma, V. K. (2021). AIEMLA: Artificial intelligence enabled machine learning approach for routing attacks on internet of things. The Journal of Supercomputing, 77, 13757–13787.CrossRef Sharma, S., & Verma, V. K. (2021). AIEMLA: Artificial intelligence enabled machine learning approach for routing attacks on internet of things. The Journal of Supercomputing, 77, 13757–13787.CrossRef
96.
Zurück zum Zitat Rambabu, K., & Venkatram, N. (2021). Ensemble classification using traffic flow metrics to predict distributed denial of service scope in the Internet of Things (IoT) networks. Computers and Electrical Engineering, 96, 107444.CrossRef Rambabu, K., & Venkatram, N. (2021). Ensemble classification using traffic flow metrics to predict distributed denial of service scope in the Internet of Things (IoT) networks. Computers and Electrical Engineering, 96, 107444.CrossRef
97.
Zurück zum Zitat Guo, L., Dong, M., Ota, K., Li, Q., Ye, T., Wu, J., & Li, J. (2017). A secure mechanism for big data collection in large scale Internet of vehicle. IEEE Internet of Things Journal, 4(2), 601–610.CrossRef Guo, L., Dong, M., Ota, K., Li, Q., Ye, T., Wu, J., & Li, J. (2017). A secure mechanism for big data collection in large scale Internet of vehicle. IEEE Internet of Things Journal, 4(2), 601–610.CrossRef
98.
Zurück zum Zitat Jindal, A., Dua, A., Kumar, N., Das, A. K., Vasilakos, A. V., & Rodrigues, J. J. P. C. (2018). Providing healthcare-as-a-service using fuzzy rule based big data analytics in cloud computing. IEEE Journal of Biomedical And Health Informatics, 22(5), 1605–1618.CrossRef Jindal, A., Dua, A., Kumar, N., Das, A. K., Vasilakos, A. V., & Rodrigues, J. J. P. C. (2018). Providing healthcare-as-a-service using fuzzy rule based big data analytics in cloud computing. IEEE Journal of Biomedical And Health Informatics, 22(5), 1605–1618.CrossRef
99.
Zurück zum Zitat Mehmood, I., Ullah, A., Muhammad, K., Deng, D. J., Meng, W., Turjman, F. A., Sajjad, M., & Albuquerque, V. H. C. D. (2019). Efficient image recognition and retrieval on IoT-assisted energy-constrained platforms from big data repositories. IEEE Internet of Things Journal, 6(6), 9246–9255.CrossRef Mehmood, I., Ullah, A., Muhammad, K., Deng, D. J., Meng, W., Turjman, F. A., Sajjad, M., & Albuquerque, V. H. C. D. (2019). Efficient image recognition and retrieval on IoT-assisted energy-constrained platforms from big data repositories. IEEE Internet of Things Journal, 6(6), 9246–9255.CrossRef
100.
Zurück zum Zitat Li, F., Xie, R., Wang, Z., Guo, L., Ye, J., Ma, P., & Song, W. (2020). Online distributed IoT security monitoring with multidimensional streaming big data. IEEE Internet of Things Journal, 7(5), 4387–4394.CrossRef Li, F., Xie, R., Wang, Z., Guo, L., Ye, J., Ma, P., & Song, W. (2020). Online distributed IoT security monitoring with multidimensional streaming big data. IEEE Internet of Things Journal, 7(5), 4387–4394.CrossRef
101.
Zurück zum Zitat Wan, S., Lu, J., Fan, P., & Lataief, K. B. (2020). Toward big data processing in IoT: Path planning and resource management of UAV base stations in mobile-edge computing system. IEEE Internet of Things Journal, 7(7), 5995–6009.CrossRef Wan, S., Lu, J., Fan, P., & Lataief, K. B. (2020). Toward big data processing in IoT: Path planning and resource management of UAV base stations in mobile-edge computing system. IEEE Internet of Things Journal, 7(7), 5995–6009.CrossRef
102.
Zurück zum Zitat Lv, Z., Lou, R., Li, J., Singh, A. K., & Song, H. (2021). Big data analytics for 6G-enabled massive Internet of Things. IEEE Internet of Things Journal, 8(7), 5350–5359.CrossRef Lv, Z., Lou, R., Li, J., Singh, A. K., & Song, H. (2021). Big data analytics for 6G-enabled massive Internet of Things. IEEE Internet of Things Journal, 8(7), 5350–5359.CrossRef
103.
Zurück zum Zitat Yu, W., Liu, Y., Dillon, T., Rahayu, W., & Mostafa, F. (2021). An integrated framework for health state monitoring in a smart factory employing IoT and big data techniques. IEEE Internet of Things Journal, X(X), 1–12. Yu, W., Liu, Y., Dillon, T., Rahayu, W., & Mostafa, F. (2021). An integrated framework for health state monitoring in a smart factory employing IoT and big data techniques. IEEE Internet of Things Journal, X(X), 1–12.
Metadaten
Titel
An Integrated Exploration on Internet of Things and Wireless Sensor Networks
verfasst von
Saurabh Sharma
Vinod Kumar Verma
Publikationsdatum
19.01.2022
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2022
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-09487-3

Weitere Artikel der Ausgabe 3/2022

Wireless Personal Communications 3/2022 Zur Ausgabe

Neuer Inhalt