Skip to main content
Top

2024 | OriginalPaper | Chapter

5. Exploring IoT Communication Technologies and Data-Driven Solutions

Authors : Poonam Maurya, Abhishek Hazra, Lalit Kumar Awasthi

Published in: Learning Techniques for the Internet of Things

Publisher: Springer Nature Switzerland

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Over the past decade, Internet of Things (IoT) networks have been the subject of active research due to their wide range of potential applications. The successful implementation and effective performance of IoT networks depend on the communication protocols used to connect spatially distributed devices or sensors. However, existing communication technologies face several challenges, including security, interoperability, scalability, and energy optimization. Therefore, researchers are currently exploring novel IoT communication protocols and embracing data-driven approaches along with other solutions to overcome these challenges. This chapter comprehensively explores emerging trends in IoT communication technologies and the integration of data-driven solutions. Additionally, we study the potential role of data-driven technologies, such as artificial intelligence (AI), machine learning (ML), and deep learning (DL), focusing on their integration with IoT technologies. We have also briefly discussed the benefits of using data-driven technologies in various IoT applications. Furthermore, we have outlined several potential challenges and how data-driven technologies can address them, emphasizing recent innovations.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference A survey on bluetooth multi-hop networks. 2019. In Ad Hoc Networks. A survey on bluetooth multi-hop networks. 2019. In Ad Hoc Networks.
go back to reference Ajorlou, Amir, and Aliazam Abbasfar. 2020. An optimized structure of state channel network to improve scalability of blockchain algorithms. In 2020 17th International ISC Conference on Information Security and Cryptology (IS- CISC), 73–76. IEEE. Ajorlou, Amir, and Aliazam Abbasfar. 2020. An optimized structure of state channel network to improve scalability of blockchain algorithms. In 2020 17th International ISC Conference on Information Security and Cryptology (IS- CISC), 73–76. IEEE.
go back to reference Ali, Zainab H., et al. 2015. Internet of Things (IoT): definitions, challenges and recent research directions. International Journal of Computer Applications 128 (1), 37–47.CrossRef Ali, Zainab H., et al. 2015. Internet of Things (IoT): definitions, challenges and recent research directions. International Journal of Computer Applications 128 (1), 37–47.CrossRef
go back to reference Alizadeh, Faezeh, and Amir Jalaly Bidgoly. 2023. Bit flipping attack detection in low power wide area networks using a deep learning approach. In Peer-to-Peer Networking and Applications, 1–11. Alizadeh, Faezeh, and Amir Jalaly Bidgoly. 2023. Bit flipping attack detection in low power wide area networks using a deep learning approach. In Peer-to-Peer Networking and Applications, 1–11.
go back to reference Aruna, K., and G. Pradeep. 2020. Performance and scalability improvement using IoT-based edge computing container technologies. SN Computer Science 1: 1–7.CrossRef Aruna, K., and G. Pradeep. 2020. Performance and scalability improvement using IoT-based edge computing container technologies. SN Computer Science 1: 1–7.CrossRef
go back to reference Barua, Arup, et al. 2022. Security and privacy threats for bluetooth low energy in IoT and wearable devices: a comprehensive survey. IEEE Open Journal of the Communications Society 3: 251–281.CrossRef Barua, Arup, et al. 2022. Security and privacy threats for bluetooth low energy in IoT and wearable devices: a comprehensive survey. IEEE Open Journal of the Communications Society 3: 251–281.CrossRef
go back to reference Chauhan, Chetan, and Manoj Kumar Ramaiya. 2022. Advanced model for improving iot security using blockchain technology. In 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), 83–89. IEEE. Chauhan, Chetan, and Manoj Kumar Ramaiya. 2022. Advanced model for improving iot security using blockchain technology. In 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), 83–89. IEEE.
go back to reference El Soussi, Mohieddine, et al. 2018. Evaluating the performance of eMTC and NB-IoT for smart city applications. In 2018 IEEE International Conference on Communications (ICC), 1–7. IEEE. El Soussi, Mohieddine, et al. 2018. Evaluating the performance of eMTC and NB-IoT for smart city applications. In 2018 IEEE International Conference on Communications (ICC), 1–7. IEEE.
go back to reference Fu, Hua, et al. 2023. Deep learning based RF fingerprint identification with channel effects mitigation. IEEE Open Journal of the Communications Society, 1668–1681. Fu, Hua, et al. 2023. Deep learning based RF fingerprint identification with channel effects mitigation. IEEE Open Journal of the Communications Society, 1668–1681.
go back to reference Hasan, Ayesha, and Bilal Muhammad Khan. 2023. Deep learning aided wireless interference identification for coexistence management in the ISM bands. Wireless Networks, 1–21. Hasan, Ayesha, and Bilal Muhammad Khan. 2023. Deep learning aided wireless interference identification for coexistence management in the ISM bands. Wireless Networks, 1–21.
go back to reference Hazra, Abhishek, Mainak Adhikari, et al. Nov. 2021a. A comprehensive survey on interoperability for IIoT: taxonomy, standards, and future directions. ACM Computing Surveys 55 (1). ISSN: 0360-0300. https://doi.org/10.1145/3485130. Hazra, Abhishek, Mainak Adhikari, et al. Nov. 2021a. A comprehensive survey on interoperability for IIoT: taxonomy, standards, and future directions. ACM Computing Surveys 55 (1). ISSN: 0360-0300. https://​doi.​org/​10.​1145/​3485130.
go back to reference Hazra, Abhishek, Prakash Choudhary, et al. 2021b. Recent advances in deep learning techniques and its applications: an overview. In Advances in Biomedical Engineering and Technology: Select Proceedings of ICBEST 2018, 103–122. Hazra, Abhishek, Prakash Choudhary, et al. 2021b. Recent advances in deep learning techniques and its applications: an overview. In Advances in Biomedical Engineering and Technology: Select Proceedings of ICBEST 2018, 103–122.
go back to reference Hazra, Abhishek, Pradeep Rana, et al. 2023. Fog computing for next-generation Internet of Things: Fundamental, state-of-the-art and research challenges. Computer Science Review 48: 100549.CrossRef Hazra, Abhishek, Pradeep Rana, et al. 2023. Fog computing for next-generation Internet of Things: Fundamental, state-of-the-art and research challenges. Computer Science Review 48: 100549.CrossRef
go back to reference Huang, Yiwei, and Kwan-Wu Chin. 2023b. A three-tier deep learning based channel access method for WiFi networks. IEEE Transactions on Machine Learning in Communications and Networking, 90–106. Huang, Yiwei, and Kwan-Wu Chin. 2023b. A three-tier deep learning based channel access method for WiFi networks. IEEE Transactions on Machine Learning in Communications and Networking, 90–106.
go back to reference Iannizzotto, Giancarlo, et al. 2023. Improving BLE-based passive human sensing with deep learning. Sensors 23 (5): 2581.CrossRef Iannizzotto, Giancarlo, et al. 2023. Improving BLE-based passive human sensing with deep learning. Sensors 23 (5): 2581.CrossRef
go back to reference Lee, Junhee, et al. 2018. A scheduling algorithm for improving scalability of LoRaWAN. In 2018 International Conference on Information and Communication Technology Convergence (ICTC), 1383–1388. IEEE. Lee, Junhee, et al. 2018. A scheduling algorithm for improving scalability of LoRaWAN. In 2018 International Conference on Information and Communication Technology Convergence (ICTC), 1383–1388. IEEE.
go back to reference Magaia, Naercio, et al. 2020. Industrial internet-of-things security enhanced with deep learning approaches for smart cities. IEEE Internet of Things Journal 8 (8): 6393–6405.CrossRef Magaia, Naercio, et al. 2020. Industrial internet-of-things security enhanced with deep learning approaches for smart cities. IEEE Internet of Things Journal 8 (8): 6393–6405.CrossRef
go back to reference Maurya, Poonam, Aatmjeet Singh, et al. 2022a. A review: spreading factor allocation schemes for LoRaWAN. Telecommunication Systems 80 (3): 449–468.CrossRef Maurya, Poonam, Aatmjeet Singh, et al. 2022a. A review: spreading factor allocation schemes for LoRaWAN. Telecommunication Systems 80 (3): 449–468.CrossRef
go back to reference Misra, Sudip, et al. 2021. Introduction to IoT. Cambridge: Cambridge University Press.CrossRef Misra, Sudip, et al. 2021. Introduction to IoT. Cambridge: Cambridge University Press.CrossRef
go back to reference Mohammed, Chand Pasha, and Shakti Raj Chopra. 2023. Blockchain security implementation using Python with NB-IoT deployment in food supply chain. In 2023 International Conference on Emerging Smart Computing and Informatics (ESCI), 1–5. IEEE. Mohammed, Chand Pasha, and Shakti Raj Chopra. 2023. Blockchain security implementation using Python with NB-IoT deployment in food supply chain. In 2023 International Conference on Emerging Smart Computing and Informatics (ESCI), 1–5. IEEE.
go back to reference Najm, Ihab Ahmed, et al. 2019. Machine learning prediction approach to enhance congestion control in 5G IoT environment. Electronics 8 (6): 607.CrossRef Najm, Ihab Ahmed, et al. 2019. Machine learning prediction approach to enhance congestion control in 5G IoT environment. Electronics 8 (6): 607.CrossRef
go back to reference Natarajan, Yuvaraj, et al. 2022. An IoT and machine learning-based routing protocol for reconfigurable engineering application. IET Communications 16 (5): 464–475.CrossRef Natarajan, Yuvaraj, et al. 2022. An IoT and machine learning-based routing protocol for reconfigurable engineering application. IET Communications 16 (5): 464–475.CrossRef
go back to reference Omar, Hassan Aboubakr, et al. 2016. A survey on high efficiency wireless local area networks: Next generation WiFi. IEEE Communications Surveys & Tutorials 18 (4): 2315–2344.MathSciNetCrossRef Omar, Hassan Aboubakr, et al. 2016. A survey on high efficiency wireless local area networks: Next generation WiFi. IEEE Communications Surveys & Tutorials 18 (4): 2315–2344.MathSciNetCrossRef
go back to reference Praveen Kumar, Donta, et al. 2023. Exploring the potential of distributed computing continuum systems. Computers 12: 198. Praveen Kumar, Donta, et al. 2023. Exploring the potential of distributed computing continuum systems. Computers 12: 198.
go back to reference Rajab, Husam, et al. 2021. Reducing power requirement of LPWA networks via machine learning. Pollack Periodica 16 (2): 86–91.CrossRef Rajab, Husam, et al. 2021. Reducing power requirement of LPWA networks via machine learning. Pollack Periodica 16 (2): 86–91.CrossRef
go back to reference Rajawat, Anand Singh, et al. 2021. Blockchain-based model for expanding IoT device data security. In Advances in Applications of Data-Driven Computing, 61–71. Rajawat, Anand Singh, et al. 2021. Blockchain-based model for expanding IoT device data security. In Advances in Applications of Data-Driven Computing, 61–71.
go back to reference Ramezanpour, Keyvan, et al. 2023. Security and privacy vulnerabilities of 5G/6G and WiFi 6: Survey and research directions from a coexistence perspective. Computer Networks 221: 109515.CrossRef Ramezanpour, Keyvan, et al. 2023. Security and privacy vulnerabilities of 5G/6G and WiFi 6: Survey and research directions from a coexistence perspective. Computer Networks 221: 109515.CrossRef
go back to reference Rana, Bharti, et al. 2021. A systematic survey on internet of things: Energy efficiency and interoperability perspective. Transactions on Emerging Telecommunications Technologies 32 (8): e4166.CrossRef Rana, Bharti, et al. 2021. A systematic survey on internet of things: Energy efficiency and interoperability perspective. Transactions on Emerging Telecommunications Technologies 32 (8): e4166.CrossRef
go back to reference Ren, Rong, et al. 2023. Deep reinforcement learning for connection density maximization in NOMA-based NB-IoT networks. In 2023 8th International Conference on Computer and Communication Systems (ICCCS), 357–361. IEEE. Ren, Rong, et al. 2023. Deep reinforcement learning for connection density maximization in NOMA-based NB-IoT networks. In 2023 8th International Conference on Computer and Communication Systems (ICCCS), 357–361. IEEE.
go back to reference Self-evolving intelligent algorithms for facilitating data interoperability in IoT environments (2018). Future Generation Computer Systems 86: 421–432. ISSN: 0167-739X. Self-evolving intelligent algorithms for facilitating data interoperability in IoT environments (2018). Future Generation Computer Systems 86: 421–432. ISSN: 0167-739X.
go back to reference Sivaganesan, Dr. D. 2021. A data driven trust mechanism based on blockchain in IoT sensor networks for detection and mitigation of attacks. Journal of Trends in Computer Science and Smart Technology 3 (1): 59–69.CrossRef Sivaganesan, Dr. D. 2021. A data driven trust mechanism based on blockchain in IoT sensor networks for detection and mitigation of attacks. Journal of Trends in Computer Science and Smart Technology 3 (1): 59–69.CrossRef
go back to reference Wheelus, Charles, and Xingquan Zhu. 2020. IoT network security: Threats, risks, and a data-driven defense framework. IoT 1.2, 259–285.CrossRef Wheelus, Charles, and Xingquan Zhu. 2020. IoT network security: Threats, risks, and a data-driven defense framework. IoT 1.2, 259–285.CrossRef
go back to reference Zeadally, Sherali, and Michail Tsikerdekis. 2020. Securing Internet of Things (IoT) with machine learning. International Journal of Communication Systems 33 (1): e4169.CrossRef Zeadally, Sherali, and Michail Tsikerdekis. 2020. Securing Internet of Things (IoT) with machine learning. International Journal of Communication Systems 33 (1): e4169.CrossRef
go back to reference Zhang, Jiansheng, et al. 2023. Secure blockchain-enabled internet of vehicles scheme with privacy protection. Computers, Materials & Continua 75 (3). Zhang, Jiansheng, et al. 2023. Secure blockchain-enabled internet of vehicles scheme with privacy protection. Computers, Materials & Continua 75 (3).
go back to reference Zohourian, Alireza, et al. 2023. IoT Zigbee device security: A comprehensive review. Internet of Things, 100791. Zohourian, Alireza, et al. 2023. IoT Zigbee device security: A comprehensive review. Internet of Things, 100791.
Metadata
Title
Exploring IoT Communication Technologies and Data-Driven Solutions
Authors
Poonam Maurya
Abhishek Hazra
Lalit Kumar Awasthi
Copyright Year
2024
DOI
https://doi.org/10.1007/978-3-031-50514-0_5

Premium Partner