Skip to main content

Research Challenges in the Internet of Things (IoTs)

  • Chapter
  • First Online:
Recent Trends and Advances in Wireless and IoT-enabled Networks

Abstract

In the age of the technology and in the field of Computer Networking, devices integrated with the Internet of Things (IoT) resulted in a variety of popular E-Health, E-Commerce and E-Home. The Internet of Things will be next revolutionary term in the today internet. An important function of the IoT is to create various types of technologies, standards and then to integrate them. Today, the capacities of IoT are improving by establishing security for both small and large applications. To help and determine the direction of future research, IoT security challenges and privacy issues will be highlighted in this chapter. The chapter analyzes compares and consolidates the existing research, presents new findings and discusses innovations in the security of the IoT. The challenges in this chapter must be addressed, if the full potential of IoT is to be realized.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Archive.org. (2016). Full text of “International Journal of Science and Research (IJSR)”. [online] Retrieved December 26, 2016, from https://archive.org/stream/MTMwOTEzMDI/MTIwMTMzNg==_djvu.txt

  2. Dlodlo, N., & Kalezhi, J. (2015). The Internet of Things in agriculture for sustainable rural development. [online] Retrieved December 26, 2016, from https://www.researchgate.net/publication/277713549

  3. Garg, G., Goyal, D., Aggarwal, H., Baindail, K., & Verma, G. (2016). Controlling home appliances in IOT environment. International Journal of Smart Home, 10(8), 11–18.

    Article  Google Scholar 

  4. Hongyan, L. (2015). Design and realization of smart home terminal applications based on IOT technology. International Journal of Smart Home, 9(8), 123–132.

    Article  Google Scholar 

  5. http://citeseerx.ist.psu.edu/. (2016). Intelligent traffic information system based on integration of Internet of Things and agent technology. [online] Retrieved December 26, 2016, from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.695.2856&rep=rep1&type=pdf

  6. https://www.uio.no. (2016). RFID and IOT: An overview. [online] Retrieved December 26, 2016, from https://www.uio.no/studier/emner/matnat/ifi/INF5910CPS/h10/undervisningsmateriale/RFID-IoT.pdf

  7. Iot.ieee.org. (2016). Research challenges in the internet of mobile things - IEEE Internet of Things. [online] Retrieved December 26, 2016, from http://iot.ieee.org/newsletter/march-2016/research-challenges-in-the-internet-of-mobile-things.html

  8. Jain, D., & Krishna, P. (n.d.). A study on Internet of Things based applications. [online] Retrieved December 26, 2016, from https://arxiv.org/ftp/arxiv/papers/1206/1206.3891.pdf

  9. Journal, R. (2016). What would be the best way for a local supermarket to transition to RFID technology?. [online] Rfidjournal.com. Retrieved December 26, 2016, from http://www.rfidjournal.com/blogs/experts/entry?11504

  10. Kim, W. (2016). The business model of IoT information sharing open market for promoting IoT service. Journal of the Korea Society of IT Services, 15(3), 195–209.

    Article  Google Scholar 

  11. Lin, H., & Bergmann, N. (2016). IoT privacy and security challenges for smart home environments. Information, 7(3), 44.

    Article  Google Scholar 

  12. Mehta, A., & Patel, S. (2016). IoT based smart agriculture research opportunities and challenges. International Journal for Technological Research in Engineering ISSN (Online), 4(3), 2347–4718. [online] Retrieved December 26, 2016, from http://www.ijtre.com/images/scripts/2016040325.pdf.

    Google Scholar 

  13. Rahul, G., & Patel, S. (2016). A review of smart shopping systems. [online] https://www.irjet.net. Retrieved December 26, 2016, from https://www.irjet.net/archives/V3/i5/IRJET-V3I5441.pdf

  14. Shiryaev. (2016). RFID technology and Internet of Things. [online] Slideshare.net. Retrieved December 26, 2016, from http://www.slideshare.net/rushtek/rfid-and-internet-of-things

  15. Vujovic, V., & Maksimovic, M. (2015). The impact of the ‘Internet of Things’ on engineering education. University of East Sarajevo Lukavica, Bosnia and Herzegovina. [online] Retrieved December 26, 2016, from http://www.citethisforme.com/cite/journal

  16. Alam, M., Trapps, P., Mumtaz, S., & Rodriguez, J. (2016). Context-aware cooperative testbed for energy analysis in beyond 4G networks. Telecommunication Systems. https://doi.org/10.1007/s11235-016-0171-5

    Article  Google Scholar 

  17. Khan, F., Rahman, F., Khan, S., & Kamal, S. A. (2018). Performance analysis of transport protocols for multimedia traffic over mobile Wi-Max network under Nakagami fading. In Information technology-New generations (pp. 101–110). Cham: Springer.

    Chapter  Google Scholar 

  18. Alam, M., Albano, M., Radwan, A., & Rodriguez, J. (2013). CANDi: Context-aware node discovery for short-range cooperation. Transactions on Emerging Telecommunications Technologies, 26(5), 861–875. https://doi.org/10.1002/ett.2763

    Article  Google Scholar 

  19. Khan, F., & Nakagawa, K. (2013). Comparative study of spectrum sensing techniques in cognitive radio networks. In 2013 World Congress on Computer and Information Technology (WCCIT) (pp. 1–8). IEEE.

    Google Scholar 

  20. Zebra Technology. (n.d.). How the Internet of Things is transforming education. [online] Retrieved December 26, 2016, from https://www.zebra.com/ap/en.html

    Google Scholar 

  21. Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2014). PASCCC: Priority-based application-specific congestion control clustering protocol. Computer Networks, 74, 92–102.

    Article  Google Scholar 

  22. Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2015, August). A Sybil attack detection scheme for a centralized clustering-based hierarchical network. In 2015 IEEE Trustcom/BigDataSE/ISPA (Vol. 1, pp. 318–325). IEEE.

    Google Scholar 

  23. Khan, F. (2014, May). Fairness and throughput improvement in multihop wireless ad hoc networks. In 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE) (pp. 1–6). IEEE.

    Google Scholar 

  24. Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014, September). A robust authentication scheme for observing resources in the internet of things environment. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 205–211). IEEE.

    Google Scholar 

  25. Jan, M., Nanda, P., Usman, M., & He, X. (2017). PAWN: A payload-based mutual authentication scheme for wireless sensor networks. Concurrency and Computation: Practice and Experience, 29(17).

    Article  Google Scholar 

  26. Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2013, November). Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network. In 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC) (pp.1400–1407). IEEE.

    Google Scholar 

  27. Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2018). A Sybil attack detection scheme for a forest wildfire monitoring application. Future Generation Computer Systems, 80, 613–626.

    Article  Google Scholar 

  28. Jan, M. A., Nanda, P., & He, X. (2013, June). Energy evaluation model for an improved centralized clustering hierarchical algorithm in WSN. In International Conference on Wired/Wireless Internet Communication (pp. 154–167). Berlin, Heidelberg: Springer.

    Chapter  Google Scholar 

  29. Usman, M., Jan, M. A., & He, X. (2017). Cryptography-based secure data storage and sharing using HEVC and public clouds. Information Sciences, 387, 90–102.

    Article  Google Scholar 

  30. Usman, M., Jan, M. A., He, X., & Nanda, P. (2016, August). Data sharing in secure multimedia wireless sensor networks. In 2016 IEEE Trustcom/BigDataSE/ISPA (pp. 590–597). IEEE.

    Google Scholar 

  31. Jan, M. A., Usman, M., He, X., & Rehman, A. U. (2018). SAMS: A seamless and authorized multimedia streaming framework for WMSN-based IoMT. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2018.2848284

  32. Jan, M. A., Jan, S. R., Usman, M., & Alam, M. (2018). State-of-the-art congestion control protocols in WSN: A survey. IoT EAI. https://doi.org/10.4108/eai.26-3-2018.154379

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Syed Bilal Hussain Shah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Begum, S., Nianmin, Y., Shah, S.B.H., Khan, I.U., Anamalamudi, S. (2019). Research Challenges in the Internet of Things (IoTs). In: Jan, M., Khan, F., Alam, M. (eds) Recent Trends and Advances in Wireless and IoT-enabled Networks. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-99966-1_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-99966-1_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-99965-4

  • Online ISBN: 978-3-319-99966-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics