Internet of Things (IoT): A Literature Review

Abstract

One of the buzzwords in the Information Technology is Internet of Things (IoT). The future is Internet of Things, which will transform the real world objects into intelligent virtual objects. The IoT aims to unify everything in our world under a common infrastructure, giving us not only control of things around us, but also keeping us informed of the state of the things. In Light of this, present study addresses IoT concepts through systematic review of scholarly research papers, corporate white papers, professional discussions with experts and online databases. Moreover this research article focuses on definitions, geneses, basic requirements, characteristics and aliases of Internet of Things. The main objective of this paper is to provide an overview of Internet of Things, architectures, and vital technologies and their usages in our daily life. However, this manuscript will give good comprehension for the new researchers, who want to do research in this field of Internet of Things (Technological GOD) and facilitate knowledge accumulation in efficiently.

Share and Cite:

Madakam, S. , Ramaswamy, R. and Tripathi, S. (2015) Internet of Things (IoT): A Literature Review. Journal of Computer and Communications, 3, 164-173. doi: 10.4236/jcc.2015.35021.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Lianos, M. and Douglas, M. (2000) Dangerization and the End of Deviance: The Institutional Environment. British Journal of Criminology, 40, 261-278. http://dx.doi.org/10.1093/bjc/40.2.261
[2] Ferguson, T. (2002) Have Your Objects Call My Object. Harvard Business Review, June, 1-7.
[3] Nunberg, G. (2012) The Advent of the Internet: 12th April, Courses.
[4] Kosmatos, E.A., Tselikas, N.D. and Boucouvalas, A.C. (2011) Integrating RFIDs and Smart Ob-jects into a Unified Internet of Things Architecture. Advances in Internet of Things: Scientific Research, 1, 5-12. http://dx.doi.org/10.4236/ait.2011.11002
[5] Aggarwal, R. and Lal Das, M. (2012) RFID Security in the Context of “Internet of Things”. First International Conference on Security of Internet of Things, Kerala, 17-19 August 2012, 51-56. http://dx.doi.org/10.1145/2490428.2490435
[6] Biddlecombe, E. (2009) UN Predicts “Internet of Things”. Retrieved July 6.
[7] Butler, D. (2020) Computing: Everything, Everywhere. Nature, 440, 402-405. http://dx.doi.org/10.1038/440402a
[8] Dodson, S. (2008) The Net Shapes up to Get Physical. Guardian.
[9] Gershenfeld, N., Krikorian, R. and Cohen, D. (2004) The Internet of Things. Scientific American, 291, 76-81. http://dx.doi.org/10.1038/scientificamerican1004-76
[10] Lombreglia, R. (2010) The Internet of Things, Boston Globe. Retrieved October.
[11] Reinhardt, A. (2004) A Machine-to-Machine Internet of Things.
[12] Graham, M. and Haarstad, H. (2011) Transparency and Development: Ethical Consumption through Web 2.0 and the Internet of Things. Research Article, 7.
[13] Jayavardhana, G., Rajkumar, B., Marusic, S. and Palaniswami, M. (2013) Internet of Things: A Vision, Architectural Elements, and Future Directions. Future Generation.
[14] Gigli, M. and Koo, S. (2011) Internet of Things, Services and Applications Categorization. Advances in Internet of Things, 1, 27-31. http://dx.doi.org/10.4236/ait.2011.12004
[15] (2005) ITU Internet Reports, International Telecommunication Union. The Internet of Things: 7th Edition. www.itu.int/internetofthings/on
[16] Want, R. (2006) An Introduction to RFID Technology. IEEE Pervasive Compu-ting, 5, 25-33.
[17] Li, B.A. and Yu, J.J. (2011) Research and Application on the Smart Home Based on Component Technologies and Internet of Things. Procedia Engineering, 15, 2087-2092. http://dx.doi.org/10.1016/j.proeng.2011.08.390
[18] Razzak, F. (2012) Spamming the Internet of Things: A Possibility and its probable Solution. Procedia Computer Science, 10, 658-665. http://dx.doi.org/10.1016/j.procs.2012.06.084
[19] Shao, W. and Li, L. (2009) Analysis of the Development Route of IoT in China. Perking: China Science and Technology Information, 24, 330-331.
[20] Sun, C. (2012) Application of RFID Technology for Logistics on Internet of Things.
[21] Moeinfar, D., Shamsi, H. and Nafar, F. (2012) Design and Implementation of a Low-Power Active RFID for Container Tracking @ 2.4 GHz Frequency: Scientific Research.
[22] Bicknell, IPv6 Internet Broken, Verizon Route Prefix Length Policy, 2009.
[23] Grieco A., Occhipinti, E. and Colombini, D. (1989) Work Postures and Musculo-Skeletal Disorder in VDT Operators. Bollettino de Oculistica, Suppl. 7, 99-111.
[24] Pahlavan, K., Krishnamurthy, P., Hatami, A., Ylianttila, M., Makela, J.P., Pichna, R. and Vallstron, J. (2007) Handoff in Hybrid Mobile Data Networks. Mobile and Wireless Communication Summit, 7, 43-47.
[25] Chen, X.-Y. and Jin, Z.-G. (2012) Research on Key Technology and Applications for the Internet of Things. Physics Procedia, 33,561-566. http://dx.doi.org/10.1016/j.phpro.2012.05.104
[26] Arampatzis, T., et al. (2005) A Survey of Security Issues in Wireless Sensors Networks, in Intelligent Control. Proceeding of the IEEE International Symposium on, Mediterrean Conference on Control and Automation, 719-724.
[27] Chorost, M. (2008) The Networked Pill, MIT Technology Review, March.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.