Article 1: Value of Internet of Things
The Internet of Things refers the set of hardware and software components and their effective integration that allow the user to have a dynamic networking experience. Internet of things is the most advanced technological intervention in this era. It has been claimed by many critics, that IoT is going to be the next biggest revolution of modernised technology. Therefore, analysing the opportunities, existing utilisations and limitation of Internet of Things is essential. 12 articles will be chosen on this topic to develop a annotated bibliography in the following section of this paper.
In this article Wortmann & Flüchter (2015), has describes how the Internet of Things has added value in this era of advance technology. It has been found that currently Internet of Things does not fall under any specific definition due to its divertive use. The authors also added that IoT has already improved the IT based digital services in many ways. IoT is described as a collection of interconnected hardware and software components in very precise way. The IoT cloud, connectivity devices are expressed as the major part of IoT.
The above article followed secondary data collection method to execute a thematic analysis on Internet of Things. The target audience of this article is the scholars and researchers of electronics and communication. Several articles, journals on emerging technologies have been chosen to evaluate this context. This paper is very valuable for understanding of overall concept of IoT and its value in modern era. The paper examined various utilisations of IoT while considering the limitation. However, the major limitation of this article is it collected data only from secondary sources that caused a deficiency of more practical and primary data analysis.
In this article Zanella et al. (2015), has describes how the Internet of Things can be incorporated in a smart city and how it could be beneficial for all aspects of technological advancement. The paper presented the IoT as an open access to selected subsets of data for the development of a plethora of digital services. It is also mentioned that incorporating the IoT as a general architecture of a smart city would be very complex task. IoT can evolve the communication system, system administration and even emergency services for any smart city.
The article used both comprehensive survey based and secondary data collection method. The target audience of this article is the scholars and researchers of electronics and communication. This article provides a in depth guideline of implementing the IoT as a part of Smart City vision. The main strength of this paper is its practicality and feasibility, which allows the learner to connect the theoretical concept directly to the modern world situations. However, low sample size for survey is a major weakness of this article.
This article focus on the strategic implementation of modern Wireless Sensor Network technology with Internet of things that can improve the quality of daily lifestyle of any citizen. The Article expressed that this utilisation can offers the ability to measure, infer and understand environmental indicators considering the delicate ecologies, natural resources and other core components of urban environment. Radio Frequency Identification or RFID is a major tool of developing Common Operating Picture (COP) with the foundation of integrated IoT system. Implementing the cloud with IoT software and hardware technologies can start a new era of secured wireless computing.
Article 2: Incorporating IoT in Smart Cities
This article followed secondary data collection method to execute a thematic analysis on Internet of Things. The target audience of this article is the scholars and researchers of electronics and communication. This paper is very valuable to understand the wireless implementation of IoT and its value in modern era. The paper also explores the required networking system with detail. However, the major limitation of this article is it collected data only from secondary sources that caused a shortage of more realistic and primary data investigation.
In this article Miorandi et al. (2015), has describes the Vision, application and research challenges of Internet of Things. The study showed that IoT is used as an umbrella that covers various aspect of internet related systems and facilities. The purpose of this research was to present the existing condition of usage of IoT and challenges. The study showed that IoT has significant application in modern communication system and in social media based operations. Utilising the cloud integrated IoT can be more valuable in terms of efficiency and functionality improvement.
The article conducted an exploratory research with secondary data collation and quantitative data analysis. The target audience of this article is the scholars and researchers of electronics and communication. The article is very informative about the security system and the physical intervention of IoT. The layer of data privacy components can be understood from the article. The article also described a in-depth analysis of utilising IoT in many business operation namely environmental monitoring, inventory management and surveillance system. However, article is unable to fully evaluate the network planning and package monitoring system in an efficient IoT. It is the major weakness of this article.
In this article, the utilisation of Internet of things in logistic operations has been analysed. The study found that, the most operations of IoT in logistics implement Radio Frequency Identification or RFID system. The study showed that RFID, wireless connectivity, mobile, sensor device are the key enabling technologies. The Information and Communication Technology or ICT and industrial information have found as the core field of industrial utilisation of IoT. Big Data analysis and Warless Sensor Networks (WSN) are the future of the industrial IoT operations.
The research conducted a survey on industrial professionals to gain more in depth view of the topic. The target audience of this article is the scholars and researchers of electronics and communication. This article provides a brief and precise description of IoT and its industrial utilisation that enables the learner to gather knowledge about advanced logistics and control system. However, the major weakness of the article is its analytical process, which focused only on the theoretical aspect of the industrial information integrity. The article lacks detailed information about universal RFID receptor, reusable electronic tag and other aspect of this topic.
In this article, Mukhopadhyay & Suryadevara (2014), focused on the challenges and opportunities in the advance utilisation of Internet of Things. The study showed that the IoT has the potentiality to connect the several information technologies while increasing the reliability, sustainability and efficiency. The accessibility on globalised information can be also improved through strategic implementation of IoT system in public, private and commercial environment. The study also found that it can reduce the operational cost of any network based operation while considering the IPv6 over low power wireless area networks. Security issues, Energy waste, Scalability, low fault tolerance have been found as the major challenges of IoT.
Article 3: Wireless Sensor Network (WSN) and IoT
In this study the comparison has been done by collecting and analysing secondary information from valuable sources. The target audience of this article is the scholars and researchers of electronics and communication. This study displays a very well structured side by side comparison of opportunities and challenges of utilising IoT. However the major limitation is, the paper lacks recommendations to avoid the challenges. On the other hand, the study is not used any practical or primary data for its data analysis process.
This article examines the current trends of utilising Internet of Things in business and industrial operations. The article found that the current utilisation of IoT in various services is focused on adoptability. It decreases the speed of IoT advancement, however provides more sustainable growth opportunity. The study also found that depending entirely in IoT can cause several challenges as well. At the same time IoT is already being used in social media based operation, supply chain and logistics, healthcare, smart infrastructure and in many other fields.
The article followed a secondary data collection process, where 127 papers were reviewed. The target audience of this article is the scholars and researchers of electronics and communication. This paper is very valuable for understanding of overall utilisations of IoT and its benefits in modern era. The paper also examined various utilisations of IoT while considering the limitation. The major limitation of his article is, it failed to analyse the advance wireless networking related information with detailed evidences of outcomes.
In this article the authors have described the implementation of Internet of Things in social media and communication. The study found that the architectural efficiency of a network system can increase the opportunity for incorporate IoT in it. The study showed that the mobile devices like smart phones, laptops, tablets are the major components of social media based IoT. The study described this concept as Social Internet of Things or SIoT. The article also found that, in future, social media can be the most popular field of IoT implementation. It will be also helpful for new Object Relationship Activity while comprising the INS, GPS and SIoT server system.
The article conducted an exploratory research with secondary data collation and quantitative data analysis. The target audience of this article is the scholars and researchers of electronics and communication. The article is very informative about the Social Media based IoT. The phases of SIoT components can be understood elaborately from this article. However, article is unable to fully evaluate the security system of network planning and package monitoring system. It is the major limitation of the article.
In this article the privacy and security system required for Internet of Things in a accusable network were analysed and discussed considering the opportunities and current challenges. The study found that the security of the IoT should be the major concern for any network system that can ensure the sustainability and growth. At the same time, several multithreaded operations are integrated in Cyber Transportation System (STS) that can influence the security measure of a IoT based network management. Perceptual layer, Network layer, Support layer and Application layer are the major layers of the network security system.
Article 4: Vision, Application, and Research Challenges of IoT
The article followed a secondary data collection process, where multiple papers on computer engineering and network management were reviewed. The target audience of this article is the scholars and researchers of electronics and communication. This paper is very valuable for understanding of privacy and security systems of IoT and its benefits in any advanced communication. The paper also successfully examined encryption process of data security in IoT while considering all the possible threats. The major limitation of his article is, it based on only secondary data that reduced its practicality.
In this article, Internet of Things or IoT was characterised by heterogeneous technologies, which harmonize to the provisioning of ground-breaking services in various application domains. This study has found that the success level IoT implementation depends on the trust level of the users. Better security system, data privacy, enclosed data transmission can generate enough user trust to utilise the IoT with its potential accuracy. The article found that to expand and modernise the usage of IoT the developer has to consider all the dynamic environmental impact of user experiences and expectations.
The study conducted a survey and aligned the survey report to find out the viability of the general assumption of system security and user experience along with its impact on IoT usability. The paper contributed in IoT based studies in many ways while prioritising the socio-psychological factors of the users as well. However, the study lacks in depth analysis of peer to peer data enclosure and data governance system and its implementation in IoT security management.
This article briefly discussed how the Internet of Things is becoming the next technological revolution of modern era. The study found that after the intervention of advance networking system and Web 2.0 the growth internet of things has been increased rapidly. The study also reviled that IoT should ensure the encrypted accessibility of document. The user-friendly platform and software hardware optimisation are the major concerns in this scenario. Considering all the small and valuable component of IoT the study named this networking facility as Internet of Nano Things.
The study followed a descriptive method by utilising secondary data collection and quantitative data analysis. The target audience of this article is the scholars and researchers of electronics and communication. The strength of this article is, the paper showed a very brief and precise analysis of all the crucial components of internet of things. However, the major limitation of this paper is the discussion of this paper is too brief to analyse all the essential components of IoT and their significance.
In this article Botta et al., described cloud-computing technology as the major implementation system of IoT. The study found that cloud computing and IoT can be integrated to increase the operational efficiency as well as security. It also increases the data flexibility. The study explained the integrated cloud computing and Internet of things as a hybrid information system. The layered architecture of IoT allows the Cloud network system to efficiently exchange the information with IoT.
In this study the comparison of opportunities and challenges of integrating cloud computing and IoT have been done by collecting and analysing secondary information from valuable sources. The target audience of this article is the scholars and researchers of electronics and communication. This study displays a very well structured architecture of utilising cloud in IoT. However the major limitation is, the study is not used any practical or primary data for its data analysis process.
Reference:
Atzori, L., Iera, A., Morabito, G., & Nitti, M. (2012). The social internet of things (siot)–when social networks meet the internet of things: Concept, architecture and network characterization. Computer networks, 56(16), 3594-3608.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on industrial informatics, 10(4), 2233-2243.
Feki, M. A., Kawsar, F., Boussard, M., & Trappeniers, L. (2013). The internet of things: the next technological revolution. Computer, 46(2), 24-25.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660.
Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad hoc networks, 10(7), 1497-1516.
Mukhopadhyay, S. C., & Suryadevara, N. K. (2014). Internet of things: Challenges and opportunities. In Internet of Things (pp. 1-17). Springer, Cham.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer networks, 76, 146-164.
Suo, H., Wan, J., Zou, C., & Liu, J. (2012, March). Security in the internet of things: a review. In Computer Science and Electronics Engineering (ICCSEE), 2012 international conference on (Vol. 3, pp. 648-651). IEEE.
Whitmore, A., Agarwal, A., & Da Xu, L. (2015). The Internet of Things—A survey of topics and trends. Information Systems Frontiers, 17(2), 261-274.
Wortmann, F., & Flüchter, K. (2015). Internet of things. Business & Information Systems Engineering, 57(3), 221-224.
Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for smart cities. IEEE Internet of Things journal, 1(1), 22-32.