ABSTRACT
Low power communication is becoming an increasingly critical factor in the design and implementation of large-scale Internet of Things (IoT) and Wireless Sensor Networks (WSN). Recently, new protocols have been introduced to help reduce such system's power can cost. This paper presents a survey of recent research on low power consumption networking for IoT and WSN systems, highlighting the move from battery life of hours or days to months and years Then the paper flags some Cyber Security vulnerabilities of specific IoT interest as well as identifying key areas for further work.
- Andersen, M. Trends in internet of things platforms. XRDS: Crossroads, The ACM Magazine for Students 22, 2 (2015), 40--43. Google ScholarDigital Library
- AsiaNews. United states: Samsung and legrand team up to deliver world's first thread-enabled iot light switch, 2016.Google Scholar
- Bharadia, D., Joshi, K., Kotaru, M., and Katti, S. Backfi: High throughput wifi backscatter. ACM SIGCOMM Computer Communication Review 45, 4 (2015), 283--296. Google ScholarDigital Library
- Cao, X., Shila, D. M., Cheng, Y., Yang, Z., Zhou, Y., and Chen, J. Ghost-in-zigbee: Energy depletion attack on zigbee-based wireless networks. IEEE Internet of Things Journal 3, 5 (2016), 816--829.Google ScholarCross Ref
- Filho, H. G. S., Filho, J. P., and Moreli, V. L. The adequacy of lorawan on smart grids: A comparison with rf mesh technology. IEEE, pp. 1--6.Google Scholar
- Fuller, J. D., and Ramsey, B. W. Rogue z-wave controllers: A persistent attack channel. 734--741. Google ScholarDigital Library
- Gomez, C., Oller, J., and Paradells, J. Overview and evaluation of bluetooth low energy: An emerging low-power wireless technology. Sensors 12, 9 (2012), 11734--11753.Google ScholarCross Ref
- Gummeson, J., Zhang, P., Ganesan, D., and Priyantha, N. Demo: Nfc-based sensor data caching. 501--502. Google ScholarDigital Library
- LoRaAlliance. Lorawan specification, v1.0.Google Scholar
- Margelis, G., Piechocki, R., Kaleshi, D., and Thomas, P. Low throughput networks for the iot: Lessons learned from industrial implementations. IEEE, pp. 181--186. Google ScholarDigital Library
- Nolan, K. E., Guibene, W., and Kelly, M. Y. An evaluation of low power wide area network technologies for the internet of things. 439--444.Google Scholar
- Pathak, S., Kumar, M., Kumar, B., and Mohan, A. Energy optimization of zigbee based wban for patient monitoring. Procedia Computer Science 70 (2015), 414--420.Google ScholarCross Ref
- Qin, H., and Zhang, W. Zigbee-assisted power saving for more efficient and sustainable ad hoc networks. IEEE Transactions on Wireless Communications 12, 12 (2013), 6180--6193.Google ScholarCross Ref
- Shi, W., Cao, J., Zhang, Q., Li, Y., and Xu, L. Edge computing: Vision and challenges. IEEE Internet of Things Journal 3, 5 (2016), 637--646.Google ScholarCross Ref
- Yerva, L., Bansal, A., Campbell, B., Dutta, P., and Schmid, T. Demo: An ieee 802.15.4-compatible, battery-free, energy-harvesting sensor node. 389--390. Google ScholarDigital Library
- Zheng, L. Zigbee wireless sensor network in industrial applications. IEEE, pp. 1067--1070.Google Scholar
Recommendations
Security threats and countermeasures on the internet of things
Internet of things (IoT) refers to intelligent technologies and services that connect all objects based on the internet to communicate information between people and things, things and systems. However, these IoT-based devices are exposed to many security ...
Cyberentity Security in the Internet of Things
A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security.
The internet of things: a survey
In recent year, the Internet of Things (IoT) has drawn significant research attention. IoT is considered as a part of the Internet of the future and will comprise billions of intelligent communicating `things'. The future of the Internet will consist of ...
Comments