Skip to main content
Top
Published in: Wireless Personal Communications 3/2022

19-01-2022

An Integrated Exploration on Internet of Things and Wireless Sensor Networks

Authors: Saurabh Sharma, Vinod Kumar Verma

Published in: Wireless Personal Communications | Issue 3/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The ability to access data from remote locations is meant possible with the help of computer networks. These networks may be wired or wireless. Modern improvements in wireless infrastructure brought wireless sensor networks (WSN) into existence. WSN is utilized to monitor, report, and supervise tasks or events occurring in the environment. The relaying of data in such systems takes place by utilizing different routing schemes. These routing schemes were proposed to augment the throughput of communication networks. In addition, perception regarding the Internet of Things (IoT) gained momentum via making it feasible for things to interact and act smartly. In this paper, a meticulous survey of solutions proposed in both the domains i.e. WSN and IoT is conferred. Later, comprehensive scrutiny of various solutions proposed in the WSN and IoT domain is deliberated regarding their features, pros, and cons. Moreover, this work compares various proposed solutions based on performance measures like heterogeneity, interoperability, mobility, reusability, flexibility, energy efficiency, scalability, delay, security as well as big data. This knowledge enables the network architect to pick the apt solution in support of a specific application. As the integration of WSN and IoT raised numerous open issues, this work deliberated the afore-mentioned performance measures as the key open issues of interest. Furthermore, novel exploration guidelines in the said domain have been elaborated. These guidelines are expected to act as a key component in the upcoming enhancements of communication networks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Botta, A., Donato, W. D., Persico, V., & Pescape, A. (2016). Integration of Cloud computing and Internet of Things: A survey. Future Generation Computer Systems, 56, 684–700.CrossRef Botta, A., Donato, W. D., Persico, V., & Pescape, A. (2016). Integration of Cloud computing and Internet of Things: A survey. Future Generation Computer Systems, 56, 684–700.CrossRef
2.
go back to reference Zhao, D., Yan, Z., Wang, M., Zhang, P., & Song, B. (2021). Is 5G handover secure and private? A survey. IEEE Internet of Things Journal, 8(16), 12855–12879.CrossRef Zhao, D., Yan, Z., Wang, M., Zhang, P., & Song, B. (2021). Is 5G handover secure and private? A survey. IEEE Internet of Things Journal, 8(16), 12855–12879.CrossRef
3.
go back to reference Kocakulak, M., & Butun, I. (2017). An overview of wireless sensor networks towards Internet of Things. In IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), pp. 1–6. Kocakulak, M., & Butun, I. (2017). An overview of wireless sensor networks towards Internet of Things. In IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), pp. 1–6.
5.
go back to reference Dai, H. N., Zheng, Z., & Zhang, Y. (2019). Blockchain for Internet of Things: A survey. IEEE Internet Of Things Journal, 6(5), 8076–8094.CrossRef Dai, H. N., Zheng, Z., & Zhang, Y. (2019). Blockchain for Internet of Things: A survey. IEEE Internet Of Things Journal, 6(5), 8076–8094.CrossRef
6.
go back to reference Washizaki, H., Ogata, S., Hazeyama, A., Okubo, T., Fernandez, E. B., & Yoshioka, N. (2020). Landscape of architecture and design patterns for IoT systems. IEEE Internet of Things Journal, 7(10), 10091–10101.CrossRef Washizaki, H., Ogata, S., Hazeyama, A., Okubo, T., Fernandez, E. B., & Yoshioka, N. (2020). Landscape of architecture and design patterns for IoT systems. IEEE Internet of Things Journal, 7(10), 10091–10101.CrossRef
7.
go back to reference Paniagua, C., & Delsing, J. (2021). Industrial frameworks for Internet of Things: A survey. IEEE Systems Journal, 15(1), 1149–1159.CrossRef Paniagua, C., & Delsing, J. (2021). Industrial frameworks for Internet of Things: A survey. IEEE Systems Journal, 15(1), 1149–1159.CrossRef
8.
go back to reference Liu, D., Yan, Z., Ding, W., & Atiquzzaman, M. (2019). A survey on secure data analytics in edge computing. IEEE Internet of Things Journal, 6(3), 4946–4967.CrossRef Liu, D., Yan, Z., Ding, W., & Atiquzzaman, M. (2019). A survey on secure data analytics in edge computing. IEEE Internet of Things Journal, 6(3), 4946–4967.CrossRef
9.
go back to reference Feng, X., Wei, T., Chen, Y., Ge, N., & Wang, C. X. (2021). 5G embraces satellites for 6G ubiquitous IoT: Basic models for integrated satellite terrestrial networks. IEEE Internet of Things Journal, 8(18), 14399–14417.CrossRef Feng, X., Wei, T., Chen, Y., Ge, N., & Wang, C. X. (2021). 5G embraces satellites for 6G ubiquitous IoT: Basic models for integrated satellite terrestrial networks. IEEE Internet of Things Journal, 8(18), 14399–14417.CrossRef
11.
go back to reference Arvanitou, E. M., Ampatzoglou, A., Chatzigeorgiou, A., & Carver, J. C. (2021). Software engineering practices for scientific software development: A systematic mapping study. The Journal of Systems & Software, 172, 110848.CrossRef Arvanitou, E. M., Ampatzoglou, A., Chatzigeorgiou, A., & Carver, J. C. (2021). Software engineering practices for scientific software development: A systematic mapping study. The Journal of Systems & Software, 172, 110848.CrossRef
12.
go back to reference Hustad, E., & Olsen, D. H. (2021). Creating a sustainable digital infrastructure: The role of service-oriented architecture. Procedia Computer Science, 181, 597–604.CrossRef Hustad, E., & Olsen, D. H. (2021). Creating a sustainable digital infrastructure: The role of service-oriented architecture. Procedia Computer Science, 181, 597–604.CrossRef
13.
go back to reference Xu, L., Collier, R., & Hare, G. M. P. O. (2017). A survey of clustering techniques in WSNs and consideration of the challenges of applying such to 5G IoT scenarios. IEEE Internet of Things Journal, 4(5), 1229–1249.CrossRef Xu, L., Collier, R., & Hare, G. M. P. O. (2017). A survey of clustering techniques in WSNs and consideration of the challenges of applying such to 5G IoT scenarios. IEEE Internet of Things Journal, 4(5), 1229–1249.CrossRef
14.
go back to reference Piao, Z., Peng, M., Liu, Y., & Daneshmand, M. (2019). Recent advances of edge cache in radio access networks for Internet of Things: Techniques, performances, and challenges. IEEE Internet of Things Journal, 6(1), 1010–1028.CrossRef Piao, Z., Peng, M., Liu, Y., & Daneshmand, M. (2019). Recent advances of edge cache in radio access networks for Internet of Things: Techniques, performances, and challenges. IEEE Internet of Things Journal, 6(1), 1010–1028.CrossRef
15.
go back to reference Sodhro, A. H., Pirbhulal, S., Luo, Z., Muhammad, K., & Zahid, N. (2021). Toward 6G architecture for energy-efficient communication in IoT-enabled smart automation systems. IEEE Internet of Things Journal, 8(7), 5141–5148.CrossRef Sodhro, A. H., Pirbhulal, S., Luo, Z., Muhammad, K., & Zahid, N. (2021). Toward 6G architecture for energy-efficient communication in IoT-enabled smart automation systems. IEEE Internet of Things Journal, 8(7), 5141–5148.CrossRef
16.
go back to reference Jin, F., Zhang, H., Ng, J. K. Y., Guo, S., Lee, V. C. S., & Son, S. H. (2020). Toward scalable and robust indoor tracking: Design, implementation, and evaluation. IEEE Internet of Things Journal, 7(2), 1192–1204.CrossRef Jin, F., Zhang, H., Ng, J. K. Y., Guo, S., Lee, V. C. S., & Son, S. H. (2020). Toward scalable and robust indoor tracking: Design, implementation, and evaluation. IEEE Internet of Things Journal, 7(2), 1192–1204.CrossRef
21.
go back to reference Hu, M., Luo, X., Chen, J., Lee, Y. C., Zhou, Y., & Wu, D. (2021). Virtual reality: A survey of enabling technologies and its applications in IoT. Journal of Network and Computer Applications, 178, 102970.CrossRef Hu, M., Luo, X., Chen, J., Lee, Y. C., Zhou, Y., & Wu, D. (2021). Virtual reality: A survey of enabling technologies and its applications in IoT. Journal of Network and Computer Applications, 178, 102970.CrossRef
22.
go back to reference Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.CrossRef Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.CrossRef
23.
go back to reference Ghaleb, B., Al-Dubai, Y. A., Elias, E., Ayoub, A., Youssef, N., Mackenzie, L. M., & Azzedin, B. (2018). A survey of limitations and enhancements of the IPv6 routing protocol for low-power and Lossy networks: A focus on core operations. IEEE Communications Surveys & Tutorials, 21, 1607–1635.CrossRef Ghaleb, B., Al-Dubai, Y. A., Elias, E., Ayoub, A., Youssef, N., Mackenzie, L. M., & Azzedin, B. (2018). A survey of limitations and enhancements of the IPv6 routing protocol for low-power and Lossy networks: A focus on core operations. IEEE Communications Surveys & Tutorials, 21, 1607–1635.CrossRef
24.
go back to reference Adat, V., & Gupta, B. B. (2018). Security in Internet of Things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67, 423–441.CrossRef Adat, V., & Gupta, B. B. (2018). Security in Internet of Things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67, 423–441.CrossRef
25.
go back to reference Javed, F., Afzal, M. K., Sharif, M., & Kim, B. S. (2018). Internet of Things (IoTs) operating systems support, networking technologies, applications, and challenges: A comparative review. IEEE Communications Surveys & Tutorials, 20, 2062–2100.CrossRef Javed, F., Afzal, M. K., Sharif, M., & Kim, B. S. (2018). Internet of Things (IoTs) operating systems support, networking technologies, applications, and challenges: A comparative review. IEEE Communications Surveys & Tutorials, 20, 2062–2100.CrossRef
26.
go back to reference Costa, K. A. P. D., Papa, J. P., Lisboa, C. O., Munoz, R., & Albuquerque, V. H. C. D. (2019). Internet of Things: A survey on machine learning-based intrusion detection approaches. Computer Networks, 151, 147–157.CrossRef Costa, K. A. P. D., Papa, J. P., Lisboa, C. O., Munoz, R., & Albuquerque, V. H. C. D. (2019). Internet of Things: A survey on machine learning-based intrusion detection approaches. Computer Networks, 151, 147–157.CrossRef
27.
go back to reference Sengupta, J., Ruj, S., & Bit, S. D. (2019). A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. Journal of Network and Computer Applications, 149, 102481.CrossRef Sengupta, J., Ruj, S., & Bit, S. D. (2019). A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. Journal of Network and Computer Applications, 149, 102481.CrossRef
28.
go back to reference Verma, A., & Ranga, V. (2020). Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review. IEEE Sensors Journal, 10, 6472. Verma, A., & Ranga, V. (2020). Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review. IEEE Sensors Journal, 10, 6472.
30.
go back to reference Verma, V. K., Singh, S., & Pathak, N. P. (2016). Analytical event based investigations over Delphi random generator distributions for data dissemination routing protocols in highly dense wireless sensor networks. Wireless Personal Communications: An International Journal, 87(4), 1209–1222., ISSN: 0929-6212 (Print) 1572-834X (Online). Verma, V. K., Singh, S., & Pathak, N. P. (2016). Analytical event based investigations over Delphi random generator distributions for data dissemination routing protocols in highly dense wireless sensor networks. Wireless Personal Communications: An International Journal, 87(4), 1209–1222., ISSN: 0929-6212 (Print) 1572-834X (Online).
31.
go back to reference Avila, K., Jabba, D., & Gomez, J. (2020). Security aspects for Rpl-based protocols: A systematic review in IoT. Applied Sciences, 10(6472), 1–20. Avila, K., Jabba, D., & Gomez, J. (2020). Security aspects for Rpl-based protocols: A systematic review in IoT. Applied Sciences, 10(6472), 1–20.
32.
go back to reference Almusaylim, Z. A., Alhumam, A., & Jhanjhi, N. Z. (2020). Proposing a secure RPL based Internet of Things routing protocol: A review. Ad Hoc Networks, 101, 102096.CrossRef Almusaylim, Z. A., Alhumam, A., & Jhanjhi, N. Z. (2020). Proposing a secure RPL based Internet of Things routing protocol: A review. Ad Hoc Networks, 101, 102096.CrossRef
33.
go back to reference Simha, S. N. V., Mathew, R., Sahoo, S., & Biradar, R. C. (2020). A review of RPL protocol using Contiki operating system. In Proceedings of the Fourth International Conference on Trends in Electronics and Informatics (ICOEI 2020), pp. 259–264. Simha, S. N. V., Mathew, R., Sahoo, S., & Biradar, R. C. (2020). A review of RPL protocol using Contiki operating system. In Proceedings of the Fourth International Conference on Trends in Electronics and Informatics (ICOEI 2020), pp. 259–264.
36.
go back to reference Xu, L. D., Lu, Y., & Li, L. (2021). Embedding blockchain technology into IoT for security: A survey. IEEE Internet of Things Journal, 8(13), 10452–10473.CrossRef Xu, L. D., Lu, Y., & Li, L. (2021). Embedding blockchain technology into IoT for security: A survey. IEEE Internet of Things Journal, 8(13), 10452–10473.CrossRef
37.
go back to reference Aversano, L., Bernardi, M. L., Cimitile, M., & Picori, R. (2021). A systematic review on Deep Learning approaches for IoT security. Computer Science Review, 40, 100389.MathSciNetCrossRef Aversano, L., Bernardi, M. L., Cimitile, M., & Picori, R. (2021). A systematic review on Deep Learning approaches for IoT security. Computer Science Review, 40, 100389.MathSciNetCrossRef
39.
go back to reference Sezer, O. B., Dogdu, E., & Ozbayoglu, A. M. (2018). Context-aware computing, learning, and big data in Internet of Things: A survey. IEEE Internet of Things Journal, 5(1), 1–27.CrossRef Sezer, O. B., Dogdu, E., & Ozbayoglu, A. M. (2018). Context-aware computing, learning, and big data in Internet of Things: A survey. IEEE Internet of Things Journal, 5(1), 1–27.CrossRef
40.
go back to reference Nazir, S., Nawaz, M., & Adnan, A. (2019). Big data features, applications, and analytics in cardiology—A systematic literature review. IEEE Access, 7, 143742–143771.CrossRef Nazir, S., Nawaz, M., & Adnan, A. (2019). Big data features, applications, and analytics in cardiology—A systematic literature review. IEEE Access, 7, 143742–143771.CrossRef
41.
go back to reference Hajaji, Y., Boulila, W., Farah, I. R., Romdhani, I., & Hussain, A. (2021). Big data and IoT-based applications in smart environments: A systematic review. Computer Science Review, 39, 100318.CrossRef Hajaji, Y., Boulila, W., Farah, I. R., Romdhani, I., & Hussain, A. (2021). Big data and IoT-based applications in smart environments: A systematic review. Computer Science Review, 39, 100318.CrossRef
43.
go back to reference Ferreira, H. G. C., & Desousa, R. T. (2017). Security analysis of a proposed Internet of Things middleware. Cluster Computing, 20, 651–660.CrossRef Ferreira, H. G. C., & Desousa, R. T. (2017). Security analysis of a proposed Internet of Things middleware. Cluster Computing, 20, 651–660.CrossRef
44.
go back to reference Niaraki, M. J., Niaraki, A. S., & Choi, S. M. (2018). Semantic interoperability of GIS and MCDA tools for environmental assessment and decision making. Environment Modelling and Software, 100, 104–122.CrossRef Niaraki, M. J., Niaraki, A. S., & Choi, S. M. (2018). Semantic interoperability of GIS and MCDA tools for environmental assessment and decision making. Environment Modelling and Software, 100, 104–122.CrossRef
48.
go back to reference Fotouhi, H., Moreira, D., Alves, M., & Yomsi, P. M. (2017). mRPL+: A mobility management framework in RPL/6LoWPAN. Computer Communications, 104, 34–54.CrossRef Fotouhi, H., Moreira, D., Alves, M., & Yomsi, P. M. (2017). mRPL+: A mobility management framework in RPL/6LoWPAN. Computer Communications, 104, 34–54.CrossRef
49.
go back to reference Yong, B., Xu, Z., Wang, X., Cheng, L., Li, X., Wu, X., & Zhou, Q. (2018). IoT-based intelligent fitness system. Journal of Parallel and Distributed Computing, 118, 14–21.CrossRef Yong, B., Xu, Z., Wang, X., Cheng, L., Li, X., Wu, X., & Zhou, Q. (2018). IoT-based intelligent fitness system. Journal of Parallel and Distributed Computing, 118, 14–21.CrossRef
50.
go back to reference Alsaeedy, A. A. R., & Chong, E. K. P. (2019). Mobility management for 5G IoT devices: Improving power consumption with lightweight signaling overhead. IEEE Internet of Things Journal, 6(5), 8237–8247.CrossRef Alsaeedy, A. A. R., & Chong, E. K. P. (2019). Mobility management for 5G IoT devices: Improving power consumption with lightweight signaling overhead. IEEE Internet of Things Journal, 6(5), 8237–8247.CrossRef
51.
go back to reference Pirbhulal, S., Wu, W., Muhammad, K., Mehmood, I., Li, G., & Albuquerque, V. H. C. (2020). Mobility-enabled security for optimizing IoT-based intelligent applications. Recent Advances in Security and Privacy for Future Intelligent Networks, 34(2), 72–77. Pirbhulal, S., Wu, W., Muhammad, K., Mehmood, I., Li, G., & Albuquerque, V. H. C. (2020). Mobility-enabled security for optimizing IoT-based intelligent applications. Recent Advances in Security and Privacy for Future Intelligent Networks, 34(2), 72–77.
53.
go back to reference Li, W., & Kara, S. (2017). Methodology for monitoring manufacturing environment by using Wireless Sensor Networks (WSN) and the Internet of Things (IoT). In The 24th CIRP Conference on Life Cycle Engineering, Procedia CIRP, Vol. 61, pp. 323–328. Li, W., & Kara, S. (2017). Methodology for monitoring manufacturing environment by using Wireless Sensor Networks (WSN) and the Internet of Things (IoT). In The 24th CIRP Conference on Life Cycle Engineering, Procedia CIRP, Vol. 61, pp. 323–328.
56.
go back to reference Bhandari, K. S., Ra, I. H., & Cho, G. (2020). Multi-topology based QoS-differentiation in RPL for Internet of Things applications. IEEE Access, 8, 96686–96705.CrossRef Bhandari, K. S., Ra, I. H., & Cho, G. (2020). Multi-topology based QoS-differentiation in RPL for Internet of Things applications. IEEE Access, 8, 96686–96705.CrossRef
57.
go back to reference Rafique, W., Zhao, X., Yu, S., Yaqoob, I., Imran, M., & Dou, W. (2020). An application development framework for Internet-of-Things service orchestration. IEEE Internet of Things Journal, 7(5), 4543–4556.CrossRef Rafique, W., Zhao, X., Yu, S., Yaqoob, I., Imran, M., & Dou, W. (2020). An application development framework for Internet-of-Things service orchestration. IEEE Internet of Things Journal, 7(5), 4543–4556.CrossRef
58.
go back to reference Smiari, P., Bibi, S., & Feitosa, D. (2020). Examining the reuse potentials of IoT application frameworks. The Journal of Systems & Software, 169, 110706.CrossRef Smiari, P., Bibi, S., & Feitosa, D. (2020). Examining the reuse potentials of IoT application frameworks. The Journal of Systems & Software, 169, 110706.CrossRef
59.
go back to reference Pradeep, P., Krishnamoorthy, S., & Pathinarupothi, R. K. (2021). Leveraging context-awareness for Internet of Things ecosystem: Representation, organization, and management of context. Computer Communications, 177, 33–50.CrossRef Pradeep, P., Krishnamoorthy, S., & Pathinarupothi, R. K. (2021). Leveraging context-awareness for Internet of Things ecosystem: Representation, organization, and management of context. Computer Communications, 177, 33–50.CrossRef
60.
go back to reference Wang, J., Cao, Y., Li, B., Kim, H., & Lee, S. (2017). Particle swarm optimization based clustering algorithm with mobile sink for WSNs. Future Generation Computer Systems, 76, 452–457.CrossRef Wang, J., Cao, Y., Li, B., Kim, H., & Lee, S. (2017). Particle swarm optimization based clustering algorithm with mobile sink for WSNs. Future Generation Computer Systems, 76, 452–457.CrossRef
61.
go back to reference Al-Turjman, F., Radwan, A., Mumtaz, S., & Rodriguez, J. (2017). Mobile traffic modeling for wireless multimedia sensor networks in IoT. Computer Communications, 112, 109–115.CrossRef Al-Turjman, F., Radwan, A., Mumtaz, S., & Rodriguez, J. (2017). Mobile traffic modeling for wireless multimedia sensor networks in IoT. Computer Communications, 112, 109–115.CrossRef
62.
go back to reference Sadek, R. A. (2018). Hybrid energy-aware clustered protocol for IoT heterogeneous network. Future Computing and Informatics Journal, 37, 1–14. Sadek, R. A. (2018). Hybrid energy-aware clustered protocol for IoT heterogeneous network. Future Computing and Informatics Journal, 37, 1–14.
63.
go back to reference Farman, H., Jan, B., Javed, H., Ahmad, N., Iqbal, J., Arshad, M., & Ali, S. (2018). Multi-criteria based Zone Head Selection in Internet of Things based Wireless Sensor Networks. Future Generation Computer System, 4169, 1–21. Farman, H., Jan, B., Javed, H., Ahmad, N., Iqbal, J., Arshad, M., & Ali, S. (2018). Multi-criteria based Zone Head Selection in Internet of Things based Wireless Sensor Networks. Future Generation Computer System, 4169, 1–21.
64.
go back to reference Sheth, J., & Dezfouli, B. (2019). Enhancing the energy-efficiency and timeliness of IoT communication in WiFi networks. IEEE Internet of Things Journal, 6(5), 9085–9097.CrossRef Sheth, J., & Dezfouli, B. (2019). Enhancing the energy-efficiency and timeliness of IoT communication in WiFi networks. IEEE Internet of Things Journal, 6(5), 9085–9097.CrossRef
65.
go back to reference Song, K., Zhang, J., Ji, Z., Jiang, J., & Li, C. (2020). Energy-efficiency for IoT system with cache-enabled fixed-wing UAV relay. IEEE Access, 8, 117503–117512.CrossRef Song, K., Zhang, J., Ji, Z., Jiang, J., & Li, C. (2020). Energy-efficiency for IoT system with cache-enabled fixed-wing UAV relay. IEEE Access, 8, 117503–117512.CrossRef
67.
go back to reference Ren, J., Guo, H., Xu, C., & Zhang, Y. (2017). Serving at the edge: A scalable IoT architecture based on transparent computing. IEEE Network, 31(5), 96–105.CrossRef Ren, J., Guo, H., Xu, C., & Zhang, Y. (2017). Serving at the edge: A scalable IoT architecture based on transparent computing. IEEE Network, 31(5), 96–105.CrossRef
68.
go back to reference Verma, V. K., Ntalianis, K., Singh, S., & Pathak, N. P. (2018). Data proliferation based estimations over distribution factor in heterogeneous wireless sensor networks. Computer Communications, 124, 111–118.CrossRef Verma, V. K., Ntalianis, K., Singh, S., & Pathak, N. P. (2018). Data proliferation based estimations over distribution factor in heterogeneous wireless sensor networks. Computer Communications, 124, 111–118.CrossRef
69.
go back to reference Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2019). LSB : A Light weight Scalable Blockchain for IoT security and anonymity. Journal of Parallel and Distributed Computing, 134, 180–197.CrossRef Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2019). LSB : A Light weight Scalable Blockchain for IoT security and anonymity. Journal of Parallel and Distributed Computing, 134, 180–197.CrossRef
71.
go back to reference Ibrar, M., Wang, L., Muntean, G. M., Shah, N., Akbar, A., & Qureshi, K. I. (2021). SOSW: scalable and optimal nearsighted location selection for fog node deployment and routing in SDN-based wireless networks for IoT systems. Annals of Telecommunications, 76, 331–341.CrossRef Ibrar, M., Wang, L., Muntean, G. M., Shah, N., Akbar, A., & Qureshi, K. I. (2021). SOSW: scalable and optimal nearsighted location selection for fog node deployment and routing in SDN-based wireless networks for IoT systems. Annals of Telecommunications, 76, 331–341.CrossRef
72.
go back to reference Mubeen, S., Nikolaidis, P., Didic, A., Breivold, H. P., Sandstrom, K., & Behnam, M. (2017). Delay mitigation in offloaded cloud controllers in industrial IoT. IEEE Access, 5, 4418–4430.CrossRef Mubeen, S., Nikolaidis, P., Didic, A., Breivold, H. P., Sandstrom, K., & Behnam, M. (2017). Delay mitigation in offloaded cloud controllers in industrial IoT. IEEE Access, 5, 4418–4430.CrossRef
73.
go back to reference Yousefpour, A., Ishigaki, G., Gour, R., & Jue, J. P. (2018). On reducing IoT service delay via fog offloading. IEEE Internet of Things Journal, 5(2), 998–1010.CrossRef Yousefpour, A., Ishigaki, G., Gour, R., & Jue, J. P. (2018). On reducing IoT service delay via fog offloading. IEEE Internet of Things Journal, 5(2), 998–1010.CrossRef
74.
go back to reference Motlagh, N. H., Bagaa, M., & Taleb, T. (2019). Energy and delay aware task assignment mechanism for UAV-based IoT platform. IEEE Internet of Things Journal, 6(4), 6523–6536.CrossRef Motlagh, N. H., Bagaa, M., & Taleb, T. (2019). Energy and delay aware task assignment mechanism for UAV-based IoT platform. IEEE Internet of Things Journal, 6(4), 6523–6536.CrossRef
75.
go back to reference Shahryari, O. K., Pedram, H., Khajehvand, V., & TakhtFooladi, M. D. (2020). Energy-Efficient and delay-guaranteed computation offloading for fog-based IoT networks. Computer Networks, 182, 107511.CrossRef Shahryari, O. K., Pedram, H., Khajehvand, V., & TakhtFooladi, M. D. (2020). Energy-Efficient and delay-guaranteed computation offloading for fog-based IoT networks. Computer Networks, 182, 107511.CrossRef
77.
go back to reference Verma, V. K. (2017). Pheromone and path length factor-based trustworthiness estimations in heterogeneous wireless sensor networks. IEEE Sensors Journal, 17, 215–220.CrossRef Verma, V. K. (2017). Pheromone and path length factor-based trustworthiness estimations in heterogeneous wireless sensor networks. IEEE Sensors Journal, 17, 215–220.CrossRef
78.
go back to reference Verma, V. K., Singh, S., & Pathak, N. P. (2015). Optimized battery models estimation for static, distance vector and on-demand based routing protocols over 802.11 enabled wireless sensor networks. Wireless Personal Communications: An International Journal, 81(2), 503–517. ISSN: 0929-6212 (Print) 1572-834X (Online). Verma, V. K., Singh, S., & Pathak, N. P. (2015). Optimized battery models estimation for static, distance vector and on-demand based routing protocols over 802.11 enabled wireless sensor networks. Wireless Personal Communications: An International Journal, 81(2), 503–517. ISSN: 0929-6212 (Print) 1572-834X (Online).
79.
go back to reference Verma, V.K., Singh, S., Pathak, N. P. (2014). Comprehensive event based estimation of sensor node distribution strategies using classical flooding routing protocol in wireless sensor networks. Wireless Networks: The Journal of Mobile Communication, Computation and Information, 20(8), 2349–2357. ISSN: 1022-0038 (Print) 1572-8196 (Online). Verma, V.K., Singh, S., Pathak, N. P. (2014). Comprehensive event based estimation of sensor node distribution strategies using classical flooding routing protocol in wireless sensor networks. Wireless Networks: The Journal of Mobile Communication, Computation and Information, 20(8), 2349–2357. ISSN: 1022-0038 (Print) 1572-8196 (Online).
80.
go back to reference Verma, V. K., Singh, S., Pathak, N. P. (2014). Collusion based realization of trust and reputation models in extreme fraudulent environment over static and dynamic wireless sensor networks. International Journal of Distributed Sensor Networks, 2014, Article ID 672968, 1–9. Verma, V. K., Singh, S., Pathak, N. P. (2014). Collusion based realization of trust and reputation models in extreme fraudulent environment over static and dynamic wireless sensor networks. International Journal of Distributed Sensor Networks, 2014, Article ID 672968, 1–9.
81.
go back to reference Verma, V. K., Singh, S., & Pathak, N. P. (2016). Impact of malicious servers over trust and reputation models in wireless sensor networks. International Journal of Electronics, 103(3), 530–540. Print ISSN: 0020-7217 Online ISSN: 1362-3060. Verma, V. K., Singh, S., & Pathak, N. P. (2016). Impact of malicious servers over trust and reputation models in wireless sensor networks. International Journal of Electronics, 103(3), 530–540. Print ISSN: 0020-7217 Online ISSN: 1362-3060.
82.
go back to reference Verma, V. K., Singh, S., & Pathak, N. P. (2014). Analysis of scalability for AODV routing protocol in wireless sensor networks. Optik - International Journal for Light and Electron Optics, 125(2), 748–750. ISSN: 0030-4026. Verma, V. K., Singh, S., & Pathak, N. P. (2014). Analysis of scalability for AODV routing protocol in wireless sensor networks. Optik - International Journal for Light and Electron Optics, 125(2), 748–750. ISSN: 0030-4026.
83.
go back to reference Verma, V. K., Singh, S., & Pathak, N. P. (2017). Towards comparative evaluation of trust and reputation models over static, dynamic and oscillating wireless sensor networks. Wireless Networks, 23, 335–343.CrossRef Verma, V. K., Singh, S., & Pathak, N. P. (2017). Towards comparative evaluation of trust and reputation models over static, dynamic and oscillating wireless sensor networks. Wireless Networks, 23, 335–343.CrossRef
84.
go back to reference Johnson, M. O., Siddiqui, A., & Karami, A. (2017). A wormhole attack detection and prevention technique in wireless sensor networks. International Journal of Computer Applications, 174, 1–8.CrossRef Johnson, M. O., Siddiqui, A., & Karami, A. (2017). A wormhole attack detection and prevention technique in wireless sensor networks. International Journal of Computer Applications, 174, 1–8.CrossRef
85.
go back to reference Jarrah, O. Y. A., Hammdi, Y. A., Yoo, P. D., Muhaidat, S., & Qutayri, M. A. (2017). Semi-supervised multi-layered clustering model for intrusion detection. Digital Communications and Networks, 109, 1–12. Jarrah, O. Y. A., Hammdi, Y. A., Yoo, P. D., Muhaidat, S., & Qutayri, M. A. (2017). Semi-supervised multi-layered clustering model for intrusion detection. Digital Communications and Networks, 109, 1–12.
86.
go back to reference Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761–768.CrossRef Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761–768.CrossRef
87.
go back to reference Airehrour, D., Gutierrez, J. A., & Ray, S. K. (2018). SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Generation Computer Systems, 4033, 1–29. Airehrour, D., Gutierrez, J. A., & Ray, S. K. (2018). SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Generation Computer Systems, 4033, 1–29.
88.
go back to reference Jyothisree, M. V. R., & Sreekanth, S. (2019). Attacks in RPL and detection technique used for Internet of Things. International Journal of Recent Technology and Engineering (IJRTE), 1876–1879. ISSN: 2277-3878. Jyothisree, M. V. R., & Sreekanth, S. (2019). Attacks in RPL and detection technique used for Internet of Things. International Journal of Recent Technology and Engineering (IJRTE), 1876–1879. ISSN: 2277-3878.
89.
go back to reference Anitha, A. A. & Arockiam, L. (2019). ANNIDS: Artificial neural network based intrusion detection system for Internet of Things. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(11), 2583–2588. ISSN: 2278–3075. Anitha, A. A. & Arockiam, L. (2019). ANNIDS: Artificial neural network based intrusion detection system for Internet of Things. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(11), 2583–2588. ISSN: 2278–3075.
90.
go back to reference Sharma, M., Elmiligi, H., Gebali, F., & Verma, A. (2019). Simulating attacks for RPL and generating multi-class dataset for supervised machine learning. In: IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON-2019), pp. 20–26. Sharma, M., Elmiligi, H., Gebali, F., & Verma, A. (2019). Simulating attacks for RPL and generating multi-class dataset for supervised machine learning. In: IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON-2019), pp. 20–26.
91.
go back to reference Qureshi, K. N., Rana, S. S., Ahmed, A., & Jeon, G. (2020). A novel and secure attacks detection framework for Smart Cities Industrial Internet of Things. Sustainable Cities and Society, 102343, 1–33. Qureshi, K. N., Rana, S. S., Ahmed, A., & Jeon, G. (2020). A novel and secure attacks detection framework for Smart Cities Industrial Internet of Things. Sustainable Cities and Society, 102343, 1–33.
92.
go back to reference Ahutu, O. R., & El-Ocla, H. (2020). Centralized routing protocol for detecting wormhole attacks in wireless sensor networks. IEEE Access, 8, 63270–63282.CrossRef Ahutu, O. R., & El-Ocla, H. (2020). Centralized routing protocol for detecting wormhole attacks in wireless sensor networks. IEEE Access, 8, 63270–63282.CrossRef
93.
go back to reference Sahay, R., Geethakumari, G., Mitra, B., & Sahoo, I. (2020). Efficient framework for detection of version number attack in Internet of Things. In A. Abraham, A. Cherukuri, P. Melin, & N. Gandhi (Eds.), Intelligent Systems Design and Applications (ISDA 2018). Advances in Intelligent Systems and Computing (AISC 941) (pp. 480–492). Springer. Sahay, R., Geethakumari, G., Mitra, B., & Sahoo, I. (2020). Efficient framework for detection of version number attack in Internet of Things. In A. Abraham, A. Cherukuri, P. Melin, & N. Gandhi (Eds.), Intelligent Systems Design and Applications (ISDA 2018). Advances in Intelligent Systems and Computing (AISC 941) (pp. 480–492). Springer.
94.
go back to reference Pu, C. (2020). Sybil attack in RPL-based Internet of Things: analysis and defenses. IEEE Internet of Things Journal, 7, 4937–4949.CrossRef Pu, C. (2020). Sybil attack in RPL-based Internet of Things: analysis and defenses. IEEE Internet of Things Journal, 7, 4937–4949.CrossRef
95.
go back to reference Sharma, S., & Verma, V. K. (2021). AIEMLA: Artificial intelligence enabled machine learning approach for routing attacks on internet of things. The Journal of Supercomputing, 77, 13757–13787.CrossRef Sharma, S., & Verma, V. K. (2021). AIEMLA: Artificial intelligence enabled machine learning approach for routing attacks on internet of things. The Journal of Supercomputing, 77, 13757–13787.CrossRef
96.
go back to reference Rambabu, K., & Venkatram, N. (2021). Ensemble classification using traffic flow metrics to predict distributed denial of service scope in the Internet of Things (IoT) networks. Computers and Electrical Engineering, 96, 107444.CrossRef Rambabu, K., & Venkatram, N. (2021). Ensemble classification using traffic flow metrics to predict distributed denial of service scope in the Internet of Things (IoT) networks. Computers and Electrical Engineering, 96, 107444.CrossRef
97.
go back to reference Guo, L., Dong, M., Ota, K., Li, Q., Ye, T., Wu, J., & Li, J. (2017). A secure mechanism for big data collection in large scale Internet of vehicle. IEEE Internet of Things Journal, 4(2), 601–610.CrossRef Guo, L., Dong, M., Ota, K., Li, Q., Ye, T., Wu, J., & Li, J. (2017). A secure mechanism for big data collection in large scale Internet of vehicle. IEEE Internet of Things Journal, 4(2), 601–610.CrossRef
98.
go back to reference Jindal, A., Dua, A., Kumar, N., Das, A. K., Vasilakos, A. V., & Rodrigues, J. J. P. C. (2018). Providing healthcare-as-a-service using fuzzy rule based big data analytics in cloud computing. IEEE Journal of Biomedical And Health Informatics, 22(5), 1605–1618.CrossRef Jindal, A., Dua, A., Kumar, N., Das, A. K., Vasilakos, A. V., & Rodrigues, J. J. P. C. (2018). Providing healthcare-as-a-service using fuzzy rule based big data analytics in cloud computing. IEEE Journal of Biomedical And Health Informatics, 22(5), 1605–1618.CrossRef
99.
go back to reference Mehmood, I., Ullah, A., Muhammad, K., Deng, D. J., Meng, W., Turjman, F. A., Sajjad, M., & Albuquerque, V. H. C. D. (2019). Efficient image recognition and retrieval on IoT-assisted energy-constrained platforms from big data repositories. IEEE Internet of Things Journal, 6(6), 9246–9255.CrossRef Mehmood, I., Ullah, A., Muhammad, K., Deng, D. J., Meng, W., Turjman, F. A., Sajjad, M., & Albuquerque, V. H. C. D. (2019). Efficient image recognition and retrieval on IoT-assisted energy-constrained platforms from big data repositories. IEEE Internet of Things Journal, 6(6), 9246–9255.CrossRef
100.
go back to reference Li, F., Xie, R., Wang, Z., Guo, L., Ye, J., Ma, P., & Song, W. (2020). Online distributed IoT security monitoring with multidimensional streaming big data. IEEE Internet of Things Journal, 7(5), 4387–4394.CrossRef Li, F., Xie, R., Wang, Z., Guo, L., Ye, J., Ma, P., & Song, W. (2020). Online distributed IoT security monitoring with multidimensional streaming big data. IEEE Internet of Things Journal, 7(5), 4387–4394.CrossRef
101.
go back to reference Wan, S., Lu, J., Fan, P., & Lataief, K. B. (2020). Toward big data processing in IoT: Path planning and resource management of UAV base stations in mobile-edge computing system. IEEE Internet of Things Journal, 7(7), 5995–6009.CrossRef Wan, S., Lu, J., Fan, P., & Lataief, K. B. (2020). Toward big data processing in IoT: Path planning and resource management of UAV base stations in mobile-edge computing system. IEEE Internet of Things Journal, 7(7), 5995–6009.CrossRef
102.
go back to reference Lv, Z., Lou, R., Li, J., Singh, A. K., & Song, H. (2021). Big data analytics for 6G-enabled massive Internet of Things. IEEE Internet of Things Journal, 8(7), 5350–5359.CrossRef Lv, Z., Lou, R., Li, J., Singh, A. K., & Song, H. (2021). Big data analytics for 6G-enabled massive Internet of Things. IEEE Internet of Things Journal, 8(7), 5350–5359.CrossRef
103.
go back to reference Yu, W., Liu, Y., Dillon, T., Rahayu, W., & Mostafa, F. (2021). An integrated framework for health state monitoring in a smart factory employing IoT and big data techniques. IEEE Internet of Things Journal, X(X), 1–12. Yu, W., Liu, Y., Dillon, T., Rahayu, W., & Mostafa, F. (2021). An integrated framework for health state monitoring in a smart factory employing IoT and big data techniques. IEEE Internet of Things Journal, X(X), 1–12.
Metadata
Title
An Integrated Exploration on Internet of Things and Wireless Sensor Networks
Authors
Saurabh Sharma
Vinod Kumar Verma
Publication date
19-01-2022
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2022
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-09487-3

Other articles of this Issue 3/2022

Wireless Personal Communications 3/2022 Go to the issue