key: cord-1020597-hxgsvyr7 authors: Nagajayanthi, B. title: Decades of Internet of Things Towards Twenty-first Century: A Research-Based Introspective date: 2021-11-18 journal: Wirel Pers Commun DOI: 10.1007/s11277-021-09308-z sha: a46e343cde3c1789c94c97c690e516fb95319cef doc_id: 1020597 cord_uid: hxgsvyr7 Internet connects people to people, people to machine, and machine to machine for a life of serendipity through a Cloud. Internet of Things networks objects or people and integrates them with software to collect and exchange data. The Internet of things (IoT) influences our lives based on how we ruminate, respond, and anticipate. IoT 2021 heralds from the fringes to the data ecosystem and panaches a comfort zone. IoT is overwhelmingly embraced by businessmen and consumers due to increased productivity and convenience. Internet of Things facilitates intelligent device control with cloud vendors like Amazon and Google using artificial intelligence for data analytics, and with digital assistants like Alexa and Siri providing a voice user interface. Smart IoT is all about duplex connecting, processing, and implementing. Centralized IoT architecture is vulnerable to cyber-attacks. With Block Chain, it is possible to maintain transparency and security of the transaction's data. Robotic Process Automation (RPA) using bots has automated laborious tasks in 2019. Embedded Internet using Facial Recognition could reduce the coronavirus pandemic crisis by making a paradigm shift from fingerprint sensors to facial recognition. Security concerns are addressed with micro-segmentation approaches. IoT, an incredible vision of the future makes systems adaptive with customized features, responsive with increased efficiency, and procurable with optimized cost. This research delivers a comprehensive insight into the technical perspectives of IoT, focusing on interoperability, flexibility, scalability, mobility, security, transparency, standardization, and low energy. A smart classroom is implemented based on the concepts of IoT. Billions of things [155] are integrated over the Internet and are embedded with software to communicate seamlessly. Standardization of IoT devices is achievable with limited vendors based on Platform, Connectivity [45] , and Application. Initially Kevin Ashton [1] proposed IoT. Then later on, the Internet of Things (IoT) rooted in Massachusetts of Technology (MIT) and evolved around 2009 [60] . With IoT, homes become smarter [23] and smart cars [204] make our commute easier and safer. For smart homes to be customized, they need to be secured [255] . IoT visualizes distributed data networks with bilateral communication. In the first pre-internet phase, communication was through the telephone line and short message service (SMS). In the second phase, mobile and E-Mail took over in the Internet of content phase where information in the form of texts and images were exchanged. In the third Internet of Services phase, E-Commerce plunged in. In the fourth Internet of People phase, people communicated through social media such as Facebook, Skype, etc., In the enduring Era, devices connected and communicated through the Internet.Lately, interconnected devices [25] perform without human intervention based on Artificial Intelligence integration as depicted in Fig. 1 . With the sensational skyrocketed boom in IoT devices from million to 30 billion in 2020, the ecosystem [130] of IoT is becoming smarter [61] with pressing concerns on security and universal adaptability. When the devices talk to each other and to the person we get a customized environment. In the morning, when the alarm is connected to the heater, toaster, and internet we can get hot water from the heater, meal, and favorite music from the internet. Sensors embedded in every device continuously emit data and power the internet [181] . Devices collect information about the behavior and store it in the cloud. This facilitates machine learning without manual programming. QoS parameter based resource allocation [256] could be used for efficient management. End nodes like sensors collect data, process it using data analytics [233] , and sends it to the cloud [252] . How do the devices create data? How is this data collected? With a lot of devices talking to each other, how is this huge data customized? Where do these data go? How this data is processed [191] ? IoT provides a common repository for the devices to manage the data and a common language for these devices to communicate. Data analytics [44] is performed and valuable information is extracted as per requirement [142] . This data is shared securely with the devices for automation and efficiency. IoT is the synchronization of Human, Things, and the Internet as shown in Fig. 2 . Analogous to people communicating through their five senses, the internet senses and communicates, thereby interconnecting people and things. Electronic machines transfer data to cloud over TCP/IP [274] .Lost devices could be found using a mobile App. Public transportation, self-driving cars, connected apps, and real-time traffic information will revolutionize [196] the driving modalities. Based on its vision [75] , IoT extends to the Web-of-Things (WoT) if objects are integrated into the Web, Cloud-of-Things (CoT), and Internet of Nano-Things (IoNT) [254] . IoT builds a smart environment [111] based on how it is integrated into the societal, professional, and personal requirements [123] . If it is M2M [157] , it is directly between devices. This does not require an Internet Connection. Due to its limited potential, the future [169] of IoT is based on 5G, customized mobile App, software development, Artificial Intelligence, deployment, and cloud-based digital innovations. Due to its massive embracement, IoT is analyzed using simulations such as Omnet + + [95] . Tagra et al. [268] analyzed lightweight IoT using java framework. Forecasting could be done using Google Trends Tool [102] . The organizational structure of this review contributes towards: Overview, IoT Eco-system Functional Modules, Novel physiognomies of IoT, Significance of application-oriented IoT, Research Issues and Open Challenges [119] , Architectural Insights, Design Issues related to security and lightweight algorithms, Inferences and Future directions. An ecosystem comprises of the devices, people, data, and processes. • Devices Things should sense, actuate, and interact with other things so IoT applications utilize sensor, actuator, processing unit, power supply, network connectivity, and a unique ID for deployment [82] . Things collect data from the environment. Data could be temperature or live video. A smartphone [96] cannot sense these parameters. Devices (Things) should be IP-enabled, dynamic, heterogeneous [91] , interoperable, and scalable with a communication protocol such as Bluetooth or Wi-Fi to communicate with other things. Based on the data such as the image from a camera, the device moves an actuator or controls a motor. In yet another approach, multiple sensors gather information about humans. If a human approaches a robot, the human-machine interaction is made satisfactory by using chatbots along with Artificial Intelligence and Machine Learning Algorithms. [20] . • IoT has heterogeneous [63] devices running on different platforms [175] . IoT platform is an intelligent [131] layer that connects things to the network and facilitates communiqué, device management, and functionality of applications. So the devices should be interoperable [109] .Various scalable distributed architectures such as Distributed Internet-Like Architecture (DIAT) addresses heterogeneity and scalability issues in IoT [49] . FogBus offers platform-independent interfaces [253] . • Interoperability is based on: (i) Device interoperability which manages the exchange of data between different devices and permits the addition of new devices (ii) Network interoperability that operates on multi-service and multi-vendor networks. This also manages addressing, routing and security issues [177, 294] . Peer-to-peer routing was proposed using a Distributed Hash Table ( DHT) approach to guarantee scalability [90] . Multi-Technology interoperation reduces hardware resource usage but consumes more energy and reduces battery lifetime due to simultaneously active radio resources [9] . (iii) Data syntax format interoperability (iv) Platform interoperability (v) Semantic interoperability enables different services [174] . • Connectivity State of devices are expected to change dynamically. With an increase in the number of devices, data gets increased. It should be possible to extend the existing features of IoT. A huge amount of data is sent to the cloud using commu-nication media such as Mobile, Bluetooth, Wi-Fi networks etc., Devices should be network connectivity enabled. • Communication Protocols Devices and servers communicate through the protocols in the physical layer, network layer, and the application layer. • Data Processing and Associated Services Once the data is collected in the Cloud, it is processed by the respective software. Data processing varies from reading parameters to identifying objects. IoT provides services such as Device Discovery, Data Analytics, and Device Control. Data should be location or environment-specific. Data access should not be location-specific. Mobility is supported. Data is processed intelligently using data analytics techniques such as Artificial Intelligence and Machine Learning [78] for operational efficiency. Big data [32] collected is processed in the Cloud. Using analyzed intelligent data, the device is automated and could be remotely controlled. • User Interface The processed data is made available to the end-user either as a message or as a control element fed through an interface. For example in healthcare, real-time patient monitoring aids doctors in decision making. • Management This provides functions to manage an IoT system. IoT perspective is ecosystem-based. People generate and sustain IoT. As the network increase [35] with the number of devices, the amount of data to be handled is a massive challenge. Analyzing, processing, and delivering the data accurately at the right time is the success of real-time streaming IoT. • Security and Secrecy With online processing of personal data, endpoints need to be secured. • Application IoT gains real-time insight into data assets. With this a production unit can be modeled based on accurate predictions. This provides modules to monitor, visualize, and predict futuristic prospects [228] . • IoT objects Machine, device, Users, or applications communicate through the Internet to consume, request or access digital information. Devices are connected to the Internet through a broadband modem provided by an ISP or through a wired /wireless connection using a router. A gateway connects the nodes to the Internet. A protocol is used to connect the devices and they are identified by an IP address. IoT unifies heterogeneous things with interoperability through an IP based architecture. Internet-of-things [213] integrates [265] sensing, networking, storage, and analytics based on the trending areas of health, transport, industrial automation, etc. IoT is still in the nascent stage of development. It meets its key artifacts through these design contributions and utilities [243] . IoT forms an extensive design space comprising of various dimensions that include: Accuracy Monotonous applications are less error-prone. Application-Specific Cloud service providers are application-specific. Automated Interoperability with Control IoT requires to be self-adaptive with intelligence [291] , autonomous for data collection, and dynamic to the ecosystem with minimal plug and play configuration pre-requisites [49] . IoT depends on the social, environmental, and business [113] perspectives in the future [193] . from scanning and disclosing when required, thereby protecting privacy [151] .Some of the major research challenges [58, 298] and obstacles faced by IoT are described below: Application Based on the application, hardware, software, and tools are integrated [71] . Clouds and mobile components [163] do not have sufficiently strong passwords. 80% have weak passwords. Complex Computing Architecture With differing heterogeneous Operating Systems and hardware, a complex computing [97] architecture is required. Architectural solutions vary from standard to commercial depending on the major requirements of interoperability and security [67] . Confidentiality When data is transferred over the Internet from different devices, it needs to be secured. Constraints Limitations [69] faced by IoT include: (i) Hardware Limitations: Miniaturized Hardware is battery powered and so precise cryptographic algorithms that consume a lot of power is perilous. RAM has memory constraints so Light Weight OS with less complex computational complexity is used. Conventional algorithms occupy space. Tamper resistant packages are required for IoT as they remain connected and unattended for a long time. (ii) Software Limitations: Software packages need to be fault-tolerant and thin. Dynamic reprogramming is not possible. (iii) Network Limitations: Mobility resilient algorithms are required. Security algorithms need to be scalable to accommodate the proliferating IoT devices. Unified security algorithm for dynamic topology, multifarious devices, multi-protocol networking, multi-vendor, and multi-medium is hard to design. Data integrity and QoS are disrupted. For data integrity, a random time hopping sequence is used to hide data. Device ports are exposed to the device level, interface level, and gateway level service providers. (iv) Security Constraints: Integrity, Anonymity, Authentication, Authorization, and Nonrepudiation [18] is to be warranted. Access level security should certify authentication, authorization, and access control. IoT devices should be resilient against attacks [283] . (v) Serviceable Constraints: Robust network should self-organize and sustain from hardware or software catastrophe. (vi) Attacks can be internal /external based on device location, active/passive depending on the level of attack, physical /logical based on the nature of the damage, usercredentials in hardware/software depending on the type of compromised host attack. Software requires updates for effective operability. Software updates are not encrypted mostly. Devices need to be online always and are unattended. This leads to vulnerable attacks. Devices are deprived of power. Cyber-Security IoT [125] is vulnerable to cyberattacks which poses daunting challenges [242] to digital forensic experts [16] . Blockchain builds trust in sharing information [15] . Bitcoin [207] is used to exchange value across Internet [17] . With embedded [270] technologies, the attack could be from the device or from the cloud or from the network [261] . IoT devices communicate through the application programming interface over the Internet and connect the cyber world to the physical world. IoT is vulnerable [79] to denial of service attacks [163] , virus attacks, and so on. Thwarting such attackers is a challenge. Cyber Physical Systems (CPS) compute, communicate, integrate, and control technologies for stability, reliability, and efficiency in the application domain. This involves Artificial Intelligence and knowledge integration [149] into the systems to develop solutions for complex problems. Cesar et al. [46] added smartness to IoT and CPS in his research using Decisional DNA to capture, store, and reuse data. Data Analysis Big data [94] should be interpreted and analyzed with fidelity. Big data can be structured, unstructured, or semi-structured. This finds use in e-health and m-health services [83] . Data-Centric Architecture Data storage varies. Currently, Redundant Array of independent Disk (RAID) architecture is insufficient. A centralized architecture is required for data storage. Many real-time applications model their communication pattern using a datacentric approach [64] . Data Volume A huge amount of data needs to be processed and handled. Storage needs to be reliable and secured. Dedicated and Limited spectrum With an increasing number of devices, bandwidth and spectrum will increase. But the electromagnetic spectrum is limited. [150] Encryption 70% of the devices fail to encrypt and transfers sensitive data over the network. Hardware, Software, and Firmware IoT is an integration of both hardware and software. There is a misconception that it is software oriented. Challenge associated with hardware is miniaturization and power consumption. 60% of the software are not encrypted during updates [117] . Heterogeneity IoT is a complex heterogeneous networking platform. A plethora of devices working on different platforms and protocols, need to collect, connect, and communicate information to form an IoT. This faces addressing and optimization issues. Identification Challenge is to identify and integrate suitable technologies for an application. Interoperability Establishing synchronization among different platforms is challenging. Different sensors collect diverse data [140] and have interoperability issues. IoT Forensics Big Data challenges faced by forensics [8] investigators include dynamically adaptive diverse data formats [3, 33] and insufficient real-time log statistical analysis. Threats caused due to viruses, mass surveillance etc., [157] lead to disruption in the IoT network. Tools available currently with the forensics team [15, 51] are not suitable for the IoT environment. [50] .Computer Aided Investigative Environment (CAINE) is an opensource interactive forensic tool. Intelligent Edge Fabric (IEF) scans forensics images, chat history, and forensic data [8, 251] . Huge data transfer in IoT opens the way to intruders and cybercrimes. Vulnerability issues are analyzed [182] from forensics viewpoint towards challenges involved in cloud security and privacy. Francesco et al. [89] analyses on the vulnerabilities in IoT and the methodologies in developing digital [277] traces to combat cybercrimes. Traces were developed from movement, location, network traffic, and so on. Forensic preparedness will protect smart cities from criminal threats [305] .An investigation of the crime scene would aid and minimize threats [51] . Light Weight IoT Integration of IoT with resource-constrained environments [62] , was envisaged using light application layer protocols such as, Constrained Application Protocol (CoAP) [250] and Message Queue Telemetry Protocol (MQTT). CoAP is a web transfer protocol which is used for low power lossy networks. This uses Representational State Transfer (REST) architecture and UDP protocol [70, 221] . In CoAP, resources are identified by URI [126] and deployed using HTTP (Hypertext transfer protocol). CoAP consumes less bandwidth and MQTT does not include resource discovery mechanisms [68] . A Light Weight security architecture HIMMO was proposed to warranty back-end authentication, key-agreement, and protection against Denial-of-Service (DoS) attacks [199] . A hybrid approach [114] was proposed for RFID tags [263] to ensure data confidentiality [227] . Low Power Constraints Tiny devices with low power-constrained [120] resource is required for IoT. Low power is required to operate sensors. Energy could be harvested from peripheral and vibrational movements for energy-efficient sensing. E.g., Advanced Metering Infrastructure is used for low energy in smart homes. Mobility Devices are in different locations. Users prefer data access from anywhere and at any time. Connectivity provides mobility. Multiple location and Networks Data should be communicated reliably over the network. When the user changes the location and uses different networks for connectivity, the investigation becomes complex. Network 2G for voice, 3G for voice and data. 4G for broadband internet and 5G provides transmission speed [88] up to 10Gbps; connects thousands of devices reliably [9, 37] . Network Optimization for IoT traffic improves routing, QoS, security, data rate, response time, and redundant data elimination [258] . 70% of the devices use unencrypted network services. Performance, Investment, and Evaluation For evaluation, services need to be updated time-to-time on a regular basis. End users need better features at a lower cost. Proprietary IoT needs ownership to maintain and grow as per needs. With heterogeneous hardware and software from multiple vendors, proprietary is difficult to realize. Managing and maintaining the numerous resources is a challenging task. Reliability With system failure in hardware or threat induced in software, IoT faces a major setback. Applying a suitable communication technology to interconnect the heterogeneous devices to the Internet is a challenging task. To meet these issues, a Mobility First Architecture was proposed by Li et al. [168] Scalability and Network Supervision IoT connects and manages billions of devices to an existing infrastructure without affecting its existing functionalities and services [138] .IoT could be integrated with process awareness to support pervasive [162] computing environments [159] . Security and Privacy Big data requires stringent security measures. Devices collect personal information [139] . 80% of devices have privacy [36, 160] concerns. Secured IoT is achievable with tools to monitor endpoints. IoT devices are to be scanned before connectivity. A dedicated network secures IoT devices. For IoT, the devices are connected online wirelessly [247] and remain unattended. This compromises authentication and data integrity in IoT. It is prone to sleep deprivation attack as the battery constrained device remains 'ON' always. Collected data should be used only by authorized personnel [22] . When networks are large, erroneous data could be sent, the network could be made unavailable. IoT is resource-constrained, so public key encryption algorithms are hard to use. Lightweight cryptosystems [158] are required. IPv6 routing protocol is open to threats [106] so traditional encryption techniques do not apply. Security measures based on Confidentiality [28] , Authentication, Availability, and Integrity [21] is implemented. This gets complicated with automated configuration. Physical safety of the devices is required. IoT deployment and its widespread applicability is constrained due to its insufficient measures towards encryption, trust and data privacy [169, 235, 272] . This design faces scalability, processing, and data transfer issues. Powerful service description language, service discovery [219] methods are yet to be catered to the needs [282] . Signal processing This identifies data, collects the required data and processes it suitable for a particular application. Software-Defined Network (SDN) This controls network and nodes dynamically based on programming. SDN combined with a deterministic virtual network (DVN) and lightweight encryption facilitates ultra-low latencies and improved security suitable for Industrial IoT [269] . Standardization Yet there is no existing standardization [209] in connecting disparate networks [11] . IEEE has produced more than 80 standards [143] relating to IoT [223] . In 2013, universities and industries collaborated [135] and developed an architectural reference model [54] for IoT referred to as IoT-A, which is no longer active. IEEE standardization is required to preserve data flow across heterogeneous networks (HetNet) and provide design specifications for information exchange and processing. In smart home automation [84] , different devices are from different vendors. IoT faces connectivity issues [240] . Traffic Threats IoT device ports decide on the network traffic. These ports are susceptible to threats [110] . Uncontrolled Environment One model will not fit for all. Getting accurate and stabilized results for IoT in an uncontrolled environment is the challenge [153] . Unified Information Infrastructure Different devices occupy different bandwidths. A unified information infrastructure suitable for heterogeneous devices is required. Unique ID Due to limited IPv4 addresses, it is impossible to consign each device with a unique identifier. This is overcome using IPv6. Network plays a major role in IoT. IPv6 routing protocol (RPL) is used for resource-constrained low power lossy network (LLN). This improves network lifetime, throughput and QoS. Internet Protocol (IP) manages traffic load from multiple devices and provides seamless [99] connectivity [217] . RPL is used for realtime applications to transmit sensitive data [30] . It replaces an up-to-date route in case of dynamic network changes. Virtualization Lot of challenges exist in realizing, developing, and adopting a model to the existing scenario to meet the requirements [121] . Web Interface 60% of the devices raised concerns about insecure web interfacing such as cross-scripting and weak session management. Compatibility 5G is revolutionizing IoT with faster data rate [245] for future IoT applications [241] such as virtual reality, high definition video streaming, and augmented reality with 25 Mbps for optimized performance. 5G is in its budding stage and requires scalability, lowlatency for video games, upgraded handover efficiency, increased battery life-time, time constraints for real-time applications and smart service provider to provide services as per application and mobility [122] . Radio Access Technology (RAT) and antenna innovations serve the purpose. Modulation is implemented in the physical layer. Timely handling of multiple input data will produce errors. These issues need to be handled. Mutual shaping between 5G and IoT will improve business models [183] . IoT along with high efficiency video coding is used in smart city framework for media security [189] . IoT is an embedded internet technology encompassing the physical and digital components. IoT categories are based on its applications [133]: (i) Consumer IoT (C-IoT) for smart home automation proliferates the quality of people's life with saving in time and money. Smart Homes are automated and networked with electronics, sensors, and software to reduce energy wastage in devices and to improve safety [200] . Researchers analyze the revenue patterns targeted by the manufacturing companies [87] . Smart Homes use Arduino [47] as cyber physical systems for energy monitoring [167] . (ii) Commercial IoT Healthcare Automation and Transport Automation uses Vehicle to Vehicle Communication. In-home care, IoT devices such as wearable sensors are fused with IoT services [188] such as telemedicine [296] .With increasing chronic diseases, Clinic centric is focused on Patient-centric using a multi-layer e-Health Architecture [29] . Information and communication technologies (ICT) provide promising e-Health solutions [152] . An anti-counterfeit platform is used to check the creditability in online purchases [170] . (iii) Industrial IoT (IIoT) This integrates operational and informational technologies to design autonomic industrial plants, smart agriculture etc. [165] . With IIoT, [257] for intelligent transportation, a vehicle and its movement could be monitored. Based on the predictions, traffic could be anticipated resulting in shortest route discovery and time-saving [176] . (iv) Infrastructure IoT This connects smart cities with sensors and user-friendly apps. Big data is used to provide smart transportation, smart healthcare etc., in cities [124] . Fiware is an open platform for smart cities [85] . (v) Military IoT Robots are used for surveillance in disaster-prone areas. IoT design related to the applications of IoT include connectivity, cost, coverage, deployment, infrastructure, lifetime, mobility, modality, QoS, size and topology for cellular and non-cellular technologies [77] . Some of them are: (i) RFID Radio Frequency Identification has a tag and a reader [7] . This uses the radiofrequency electromagnetic field to transfer data associated with the object. Each RFID has a unique ID.This is of low cost [171] . It has a microchip along with an antenna as a package. RFID Tags could be self -powered active tags or signal powered passive tags. They monitor objects [146] in real-time without Line-of-Sight. Passive RFID tags are made duplex to remotely exchange data for communication [72] . (ii) Zensys Wave (Z-Wave) This is a low power wireless communication protocol used for home automation to connect devices within 30 m. (iii) Long Term Evolution (LTE) [76] This is a high-speed wireless communication protocol that transfers data between mobiles with high throughput and low latency. (iv) Long Range (LoRa) This is a digital wireless technology that is used to connect devices remotely over a long-range. (v) NearField Communication (NFC) This is a short-range, low power, radio communication wireless link enabled on mobile devices within close proximity of 20 cm, and operating at a licensed frequency range of 13.56 MHz to exchange data. Unlike Bluetooth, pairing is not required. Security is achieved using key agreement techniques [115, 214] . NFC [103] facilitates contactless communication [41] . IoT is conceptualized to reality by jumbling up different technologies. IoT Vision is to interconnect heterogeneous devices Anywhere, Anytime and with Any-media using IP, communicates and processes data using Cloud and embedded software. For example, to analyze multimedia traffic, media-aware traffic architecture is proposed for IoT. IoT is an interdisciplinary field that is oriented towards three prototypes: Things oriented (devices), Internet-oriented (middleware), and Semantic oriented (knowledge) [107] e.g., WoT. IoT expands human-human communication to human-things and things-things to exchange information between the physical world and the virtual world [124] . Architecture can be user-centric or cloud-centric. In user-centric, the user will be at the center and uses data and infrastructure depending on the applications. Economically cloud-centric is better. Al-Fuqaha et al. envisioned IoT [10] as a technology that enables physical objects to see, hear, think, share information, coordinate decisions, and perform jobs. IoT requires a power-optimized communication stack, reliable peer-to-peer communication stack, and an Internet empowered communication stack [184] . IoT architecture facilitates a systematic understanding of the tools, technologies [216] , and methodologies that are vital to a developer to connect the digital world and the physical world [72] and to build the infrastructure. IoT Architecture is framed, based on the application such as healthcare and its pre-requisites such as security [228] . Currently, RFID and healthcare are rated stringent. Data is created by the device. Data is sent to centralized service using HTTP/CoAP/MQTT. HTTP is not suitable for low bandwidth applications. MQTT-A Resource-constrained protocol uses publish /subscribe model. It has low overhead, lower bandwidth, but has no encryption procedures [211] . CoAP is suitable for low power and low bandwidth applications. A centralized server is risky in case of data loss without backup. IoT architecture [302] should satisfy scalability, interoperability, reliability, and Quality of Service. IoT requires real-time analytics, a platform to analyze the aggregated data, a cloud to collect the data, trigger remote action and send remote notifications. IoT enabling technologies in tandem comprises of the hardware, middleware, and application occupying the perceptive, network, and application layers respectively. The basic architecture of IoT is a three-layer architecture [124, 157, 215, 290] . It consists of the physical layer, network layer, and the application layer as shown in Fig. 3 . A clarified insight into the lifecycle of the processes involved in IoT leads to prediction in future developments. entities from the environment [303] . This specifies the path between adjacent nodes for data transfer. Hardware consists of wireless sensors [179] , Robotic cameras, Radio Frequency Identification Tags (RFID) etc., based on the application. Barcode facilitates automatic identification of anything. Wireless Sensor Networks [122] are cost-efficient and power-efficient. Physical devices and controllers referred to as 'Things' collect and transmit the data on receiving the command. Sensors collect data and share it with the centralized system for analytics. Sensors have transceivers, processing units, A/D converters, and recently they operate on one frequency range, making it less complex. Actuators [190] control the things using the electrical inputs. Simply put, for the smart room controller, a temperature sensor senses the heat, and sends the signal to the control center. The control center sends commands to the sprinkler. The sprinkler turns on and puts out the flame. Sensorpedia is a new integration platform that guides users regarding identifying and sharing of sensor data. Sensor data is processed on a Google map. Users can search and explore [299] published sensor data using an interface [104] . In some cases, data would be time-sensitive. In other cases, this data velocity creates an avalanche. For data that entails profound processing, it is sent to the cloud. Short-wave technologies like Bluetooth permits devices to communicate with each other. IPv6 connects sensors to the internet without additional processing. Technologies used in the physical layer like Bluetooth, Wi-Fi (devices are connected by radio), BLE (short distances), and 6LoWPAN (IPV6 and low power personal wireless personal area network) are suitable for IoT. 5G improves data rate and latency [224] . BLE uses Blue-voice [98] for providing Speech Streaming Services. (ii) IoT Network Layer This connects devices to servers and specifies the communication path over the network (IP Address). Data collected from the sensors are processed and analyzed intelligently for optimized decision making. Raw data collected from the sensors is converted into digital streams by Data Acquisition systems. Data acquisition samples the real-time physical entities and converts it into digital streams suitable for transmission using analog-to-digital conversion. The Internet gateway aggregates these digitized data and routes it to Wi-Fi or wired LAN for further processing. This layer inclusive of switches and routers is responsible for secured, Fig. 3 IoT Architecture reliable, and timely delivery of data. Data is stored and retrieved as per queries. Efficient net centric algorithm could be used to reconstruct the data efficiently [166] . Data analysis varies depending on the volume, velocity at which the data is generated, and the structure of the data. Data analysis is done using Machine Learning by fitting the data into the model. Based on the pattern generated from Machine Learning, a predictive analysis (of what would happen), prescriptive analysis (steps to be followed next), and adaptive analysis (to be in line with the changes) could be done. IoT includes real-time streaming data without delay using a real-time framework such as Apache Storm. If the size of the data is huge, then distributed data analytics is used to reduce the load on a single server such as Apache Hadoop Server. Data is distributed across several nodes and is processed using the MapReduce engine. Apart from Data Processing, storing a huge amount of data is not feasible using the traditional database approach. IBM Cloudant provides a solution. Amazon, Microsoft [192] , Google provide infrastructure, platform, and software as a service. Consumers save a lot of money and manpower. Based on consumption, charges are applicable. This provides application-specific services to the user. This specifies the interfaces and protocols used by IoT devices [40] .Once the data is aggregated, the information is either stored locally or in a centralized remote server for analysis. Then it is fed to new applications and services. IoT requires platforms, tools, and libraries to visualize the data. IBM's BlueMix is a platform that connects innumerable devices and sensors and provides API's for data visualization in formats specific to the device [266] . ThingSpeak supports sensor data along with MATLAB for visualization. Individual software work as per requirements on device control, visualization, and analytics. Data and conclusions are shared with other applications leading to innovative IoT. • Device Management: As devices increase, management [230] such as registration, updating of software complexity, and cost increases. With Cloud, based on usage, charges apply. • Resource Pooling: Based on demand, resources are integrated into the Cloud [108] . • Data Storage: Large scale data and Long term data is stored in the Cloud. • Access Control: There is access control authentication for Cloud. IoT employs protocols, networks, and applications [236] . IoT applications are based on monitoring, control, automation, and optimization [101] . Commonly used operating systems to enable the functionalities of the application domain are TinyOS [164] , Lit-eOS, Contiki etc. They require few kiloBytes of RAM and provide optimized low power Internet Communication. Software Development Kits (SDK) supports application programming using C, C++, and Java etc. Software connects IoT objects to the network using communication protocols. Table 1 . Displays the functionality and the types of devices associated with each layer. Due to the trending applications in IoT, different layers are proposed by practitioners. A five-layered approach includes Middleware Layer and Business Layer to the basic prototype [280] . (iv) Middle-Ware Layer: A middleware is a software that interconnects and manages these heterogeneous components. Smart Things is a Samsung cloud-based platform, which supports 300 plus devices for user control home automation. Web-of-Things and cloud is used as an interoperable platform for smart home [24] .This layer is between the application and technology layer to aid design workflow [147] , data management [2] , and interoperability [57] . Data Management combines multiple databases and unifies interfaces [33] . Centralized storage archives data and also integrates both structured and non-structured data [92] . HTML5, Web Socket, Canvas supports real-time applications. HTML5 and Adobe Flash are preferred for low latency [304] .Middleware manages the services offered by things, stores it, processes it, and analyses the data [172] . Middleware is specific to the application. For example, ASPIRE is specific for RFID. There is no generic middleware common for smart home, smart transport etc., Middleware delivers application layer interfaces (API) for physical layer communication and related services to the applications [31] . IoT-ICN architecture is included in the middle layer. Real-world deployment is yet to be implemented. Wang et al. [285] proposed a data platform (RESTful Web Service) as a middleware to access physical objects with a unique URI. (v) Business Layer provides business models and graphs along with the data. Fig. 4 has proposed a seven-layer reference model based on the functionality: The physical layer has things ranging from a small chip to a big machine. These devices convert the data from analog to digital and are being controlled by the net. The Connectivity (Network) layer connects the IP -Enabled devices. If they are not IP Enabled, they are connected via gateways. This layer associates the necessary switches, routers, and protocols required for connectivity. Security is associated with this layer. The Edge Computing [267] layer translates the data into a form that is suitable for storage [39] . Fog Computing [286] bridges the gap between data centers and IoT devices [13] . It is considered as a mini cloud which is close to the IoT devices [273] . For example, the sensor provides several samples per second in a day. The Data Accumulation Layer keeps the data. Certain applications cannot run the data at network speed. This layer has data filters and converts data into relational tables. The Data Abstraction Layer collects data from multiple sources and reconciles differences in terms of format etc. Information interpretation occurs in the Application Layer. This gives data at the right time for real-time applications. Collaboration and processes layer involves collaboration for business logic to meet people and people use applications as per requirement. Security is involved in each of the layers. Devices have an IPAddress and communicates with the services offered by the Cloud. Devices without an IPAddress use short-range communication protocol such as ZigBee [48] and connect with an IoT Gateway which communicates with the services offered by the cloud. In future, there is a likelihood that the number of base stations will upsurge than the number of mobile phones [145] . Figure 4 and Figure 5 relates the layers in the IoT architecture with their associated security. Operating system [212] design features [74] include low memory requirements, low cost, low power consumption, small size, low processing power [38] , heterogeneity, catering to multiple network stacks, security, and energy-efficiency [225] . OS is usually embedded. It collects and communicates data over the Internet. TinyOS is used for low power wireless devices with commands and tasks for inter-component communication and tasks for intra-component communication. Contiki OS [4] is an open-source lightweight portable OS with low power, low memory, low processing, and low bandwidth. RIOT OS is Ubuntu OS is suitable for IoT devices [275] .Instead of the conventional programming languages, IoT uses scripting languages like Bash Shell in platforms such as GNU/Linux [112] . The Interagency International Cyber Security Standardization Working Group has formed the IoT task group in 2017 to formulate the cybersecurity standards [53] for IoT [118] . LTE is preferred for better bandwidth, and spectral efficiency but IoT architecture suffers from threats [116] . Salman et.al. reviewed [238] on the existing standards and protocols for IoT. Common attacks in IoT include DoS attack, Man-in-the-Middle Attack. IoT security demands research on the privacy of data [218, 259, and 128] , prevention of loss of data from personalized devices, leading to impersonation attacks and prevention of malware via botnets which leads to Distributed Denial of Service Attacks (DDoS) [51] . For IoT devices to be secured, it requires to ensure authentication, integrity, confidentiality, availability, authorization, secrecy, and non-repudiation. To ensure these, cryptographic techniques [249] such as encryption at the wearable device level (AES and SHA algorithm), device level (Public Key Exchange (PKE)), network-level are implemented in an IoT Ecosystem. For a wider area of coverage and data stored in a Cloud, Internet Protocol Security (IPSec) and Secure Socket Layer (SSL)) are used. Symmetric (AES) algorithms, Asymmetric algorithms (RSA), Light Weight Algorithms, and Digital Signatures are used in IPSec for authentication [260] . IoT Botnets are massively attacked and controlled by Hackers [19] . For instance, Mirai cyberattack tool used brute force attack [194] and took over numerous IoT devices. This remains a mystery. Botnets IoT Security is based on the Application domain, Architectural Domain, Data domain, and Communication Channel. In the physical layer, the sensor nodes operate with stringent power and memory requirements. This makes frequency hopping spread spectrum and public-key encryption hard to realize. Sensors could be compromised by transmitters and antennas from a distance [178] . RFID Tags suffer due to security issues [156] in wireless technologies [28] . This requires mutual authentication [197] implementation in high frequency RFID tags [206] . A lightweight security algorithm with low power and area is achievable by using a combination of encryption algorithms [205] . Network Layer is prone to man-in-the-middle attacks. Authentication prevents unauthorized access. Data sharing at the application layer poses threats to access control and privacy, resulting in disclosure of data. The application layer across heterogeneous networks demands user privacy and authentication. Physical layer security (PLS) is used to avoid data leakage. Challenge is to provide reliable security with low power. Modulation techniques decide upon the data rate, bandwidth, spectral efficiency, and power of the hardware used. PLS also depends on modulation in wireless technologies. If data is less, narrowband is used. If the data is more, then wideband communication is used. With bulky directional antennas, secrecy is improved. By performing modulation after encryption, low power consumption and reduced hardware complexity is achieved [222] . Narrowband IoT supports features like deep coverage both indoors and outdoors, less complex multiple devices, and low power consumption. With low power, security is compromised [77] . 5G supports narrow-band IoT and increasing traffic [9] . IPv6 communication protocol is used for IoT in the physical layer. Datagram Transport Layer Security Protocol (DTLS) [154] is used in the network layer. Constrained Application Protocol (CoAP) is used in the Application layer and IPv6 is used for addressing in the proposed lightweight security architecture [232] . AMQP supports various communication patterns [3] . IoT protocol stack is not categorized as OSI or TCP/IP [246] protocol suite. IoT security protocols operate in multiple layers to provide security. The chosen type of protocol depends on the node as to whether it is constrained or not. A comparison of the some of the protocols used in conventional internet and IoT networks is detailed in Table 2 . There are many more protocols apart from those compared. Not all the protocols are used. For example, while loading a webpage from a domain, the web browser makes a Domain Name System (DNS) request using a HTTP request and sends it to the internet. These protocols are used in each layer. WLAN-IP-TCP-HTTP. If the webpage is served over HTTPS, then multiple protocols are used in the application layer. Each layer uses a different protocol. IoT Security framework depends on time constraints, power and energy consumption, lightweight constraints, reliability, robustness, and smart applicability. [284] Energy Efficiency is required for battery constrained IoT Devices. Zeeshan et al. has provided energy-optimized solutions [301] for wireless technologies operating with IoT. Towards 2025, IoT devices will reach 11 trillion [ISO/IEC].Almost every device will have an internet node, and devices need to sustain energy. Green IoT is proposed for energy conservation [52] . Energy consumed by the sensor nodes is reduced by: (i) Variable Duty Cycle The duty cycle is varied, based on the ON time and OFF time of the node. This is made automatically adjustable. (ii) Multilayer based approach Nodes are grouped as layers. Applying optimization techniques to these layers, power is reduced. (iii) Low power Protocols for sensor networks Vakulya et al. proposed two protocols namely queue response protocol and piggybacking protocol for low power [279] . This is achieved with an increase in latency. (iv) Frame size control Based on the MAC frame size, optimization is achieved. (v) Low latency IoT deals with real-time data applications where continuous data stream is required with low latency. This is achieved using parameter tuning, with frame synchronization and sleeping behavior. (vi) Priority-based By assigning pre-defined priority smartly to the nodes, nodes with the highest priority can access the media. This saves power. (vii) Variable back-off By varying Back-off exponent (BE) and Contention Window Length (CW) of MAC, throughput, packet delivery ratio, and low energy is achieved. (viii) Self -configuration Networks are configured with less overhead. Smart objects consume and process large volumes of data that need to be transferred securely. This requires universally accepted standardization of protocols for interoperability between devices and applications [134] . IoT is one of the context data for smart applications. IoT devices connect through the network through messaging and communication protocols at each layer. The protocol depends on the type of application and the range of communication. Based on the range extending from local to global [100, 287] , the corresponding standardization varies. 6LowPAN, BLE are such examples. Application layer protocols used are CoAP, MQTT. (i) Ultra-Short range Near-Field Communication (NFC) and RFID is used for healthcare based on the operating frequency range. The adaptability between RFID and NFC is analyzed by Bravo et al. [41] . NFC works for medium-range frequencies in the ISM band and RFID is used for high frequencies. (ii) Short Range Bluetooth uses IEEE 802.15.1 [105] . Among 4 versions each one has an added feature. Bluetooth Low Energy (BLE)-Single mode has one protocol and provides low energy [37] . BLE Dual-mode has low power and uses Gaussian Frequency shift keying for range extension [42] . For power optimization, low baud rate, less channel usage, FHSS mode is used. Bluetooth 5.0 [229] has inherent range, data rate extensions, advertising extension features [66] . Its broadcasting message ability makes it suitable for IoT applications. Bluetooth security is vital in IoT [214, 226] . Safety of the IoT application depends on the technologies used. (iii) Bluetooth, Zigbee [120] consumed low power but the area of coverage is less. Centenaro et al. used low power wide area network [45] to connect the node to the base station directly. Traditional security does not work with IoT Security. Recently in 2017, the data network of a well-known University was hacked. In healthcare, if IoMT devices were hacked [231] , this could endanger the lives of patients. Industrial Utilities that depend on IIoT are at risk. If IoT sensors are compromised, massive compliance and legal issues would crop in. Unsecured gateways in an organization provides a pathway for cybercriminals. IoT devices have less processing power and memory. So they are catastrophic and lack robust security protocols to protect themselves from threats. IoT devices are connected to the Internet. They are exposed to the hackers through webcams, mails, search engines, etc. It is not just devices, but also the protocols and networks that connect these devices to the Internet are exposed. There is no end-to-end encryption. There are no standards or procedures to ensure security in IoT. How often are the secret AES keys renewed in smart home automation [161] ? Data collected from the sensor is sent to different devices and networks owned by different service providers. A webcam could take personal footages and stream the footages if hacked. A single error in code, could malfunction an automated industry. A skilled hacker could control a smart car. IoT is a disruptive technology [208] with a lot of data. One sticking point in IoT is the insidious security risks. There are no serious security quality assurance checks in their product development cycle. IoT enabled Mirai Botnet was developed in 2016 to combat threats against insecure IoT devices. With 5G, huge data, energy conservation, wideband is achievable at the cost of inflated infrastructure, health hazards due to waves, and impermeability to solid obstacles. These challenges [73] are insurmountable. Hash-based techniques and firewalls are used to secure RFID Tags. Artificial Intelligence could be used to identify the usage patterns and alert the user about abnormalities. IoT must be secured from hardware, software, and OS. To prevent DoS (Denial-of-Service) Attack, DTLS and IPSec are used to verify the host address. These protocols are also used for authentication and encryption. Currently,existing routing protocols are insecure. Decentralized topology is preferred for mitigating threats. Applications, Management, and Data Analytics are decentralized using a distributed model referred to as Fog Computing [137, 173] . Object-based security with digital signatures is secured than peer-to-peer encryption [262] . The intrusion detection system (IDS) is required to prevent unauthorized access to IoT [153] . But these introduce challenges to power, bandwidth, and network. Legislations should be made mandatory as in Verizon for IoT [281] . Other issues of research are IoT mobility, Standardization, etc., with the integration of IoT in wearables. IoT is the thrust area vulnerable to cyber security threats in the near future. Artificial Intelligence is providing promising solutions in IoT. IoT Security could be improved by a combination of government regulations, privacy controls, standards and AI. With Covid-19, IoT is widely adopted in IT, in industries as IIoT, in healthcare as IoMT and in many more. With less workforce there are more security breaches. With Covid-19, there is an increase in the usage of IoT, thereby resulting in increased cyber-attacks. Vendors are working on specific security solutions. Devices need to be authenticated. Network needs to be protected. Data needs to be encrypted and secured using API and PKI. Public Key Infrastructure policies is an effective solution to encrypt data using symmetric and asymmetric encryption. SSL along with asymmetric cryptography comes handy in providing end to end [14] encryption. Cryptographic algorithms like ECC with shorter key could be preferred than RSA. Server certificate could be verified before the data is sent from the sensor. Communication could be secured using encryption, AES 256 or TLS. IoT Security Analytics could be used rather than just securing the gateways from harmful threats. IoT network is protected with anti-malware, anti-virus, firewall, and intrusion prevention etc. IoT devices need to be protected by authentication. As an IoT application, an economical smart classroom was implemented.Smart classroom is a pivotal innovative tool for teaching. A prototype is set using raspberry pi and a raspberry pi camera to record lectures of faculties. Recorded lectures uploaded into the website could be accessed with a given username and a password provided for each student. The quality of education [234] is a vital demand in today's competitive setting. Technology has affected us in each facet. Intuitive categories are a progressive approach of education. Attendance could be taken by uploading a picture using IoT. Students presence in online classes could be monitored using IoT. Quality and Systematic teaching is provided to the students. New teaching methodologies involve instructional material, 3D animated modules and videos. (i) Implementation The Raspberry Pi module along with a 5MP color camera module is used for recording the lecture. Using Raspivid, lectures were recorded.Once recorded, the recorded video is uploaded using Raspbian software in a google drive as shown in Fig. 6 . This is accessible by the student using a username and a password. The website is designed for the students using XAMPP and PHP software. A database was created with the help of MySQL. The apache software in XAMPP can be used to generate the request and response for the website. The login credentials is the request and the output received is the response. If the entered username and password matches with the credentials stored in the database, then the user is redirected to the link where the materials are available. This application is useful during coronavirus (Covid-19) pandemic crisis as the students are not able to attend the classes in person. These days everything is 'smart' starting from vehicles and homes to nanobots. The concept of IoT has played an important [132] role in our day to day life. Technology has immensely developed over a period of time and the real usage of this technology in academics is noticeable during the coronavirus (covid-19) pandemic situation. This eco-friendly concept would come in handy to students who miss their classes during unavoidable circumstances. The smart classroom is an enhanced sharing mode that improves teaching and learning opportunities by a group of students with limited resources. Information-centric network (ICN) [40] forms the future of IoT. IoT devices provide content. It targets content by name and not by location. It supports multicasting and mobility. It integrates network functionalities in the form of content rather than by location address [295] . Challenges faced by IoT are at the technology level, communication and networking level, and intelligence level. Smart objects integration is done at the technology level. At the communication and networking level, challenges are involved in the networking and ubiquitous service provisions. Data fusion and service detection is done at the intelligence level. IoT cannot be globally deployed without a precise architecture. IoT-A -Architecture -seamlessly integrates heterogeneous devices. Handling heterogeneous devices is a major task. Effective measures are required to handle the increasing number of IoT devices and Big Data [180] .Streaming is used for collecting the data from heterogeneous devices, process it, and make it available in real-time without latency [63, 203] . With proliferating wearable devices and mobiles, IoT is embarking towards personalized health care [152] . Intelligent algorithms are used for analyzing specific diseases. Mobile apps collect jogging activity, tracking [292] , and life-logging data. These aspects along with specific algorithms are used in IoT personalized healthcare solutions [202] . IoT serves as a tool for quality education. [150] . IoT supports teaching and promotes academic performance. 5G and IoT will form the mobile broadband [127] in the future and thrive the growth of IIoT [141] . This flourishes the economic growth of the country. Human 4.0 augments human with features that are integrated with the neural system [237] .This technology makes IoT fully autonomous with a foreseeable future. CloudIoT bridges Cloud and IoT and is gaining momentum [12] . Digitization improves economy, management control and provides hybrid solutions [86] . Forensic vigilance is required for smart cities. Digital Witness is collected with a privacy warranty [15] . Security depends on the data, location of data, tools [195] used to analyze data etc. Conjoining cloud forensics with client forensics, and logistical solutions are obtained for an Internet-of-Anything (IoA) Era, where swarms of resources are connected. Block Chain [239] provides viable de-centralized secured management solutions but hashing functions and the key could be compromised [193] . The Government is working towards standardization [271, 129, and 100] . Mohammad (2013) et al. [198] used usercentered tools such as Microsoft Gadgeteer to thrive interest in the user towards IoT. Future IoT would have recyclable materials, and power independent systems with embedded intelligence [136] . Future IoT architecture [293] should use narrowband and cater to hardware and software solutions [248] . IoT is deployed in e-Learning for virtual labs and the global library [34] to improve the teaching-learning process [185] . As a part of digital learning, M-Learning is in the earlier stage of research [297] . Internet of Medical Things (IoMT) is used to manage medical services [6] and healthcare workers by connecting medical devices and applications [80] . Information skills, communication skills, strategic skills [278] , and content creation skills are required besides for IoT operability [276] . Internet-of-Things is a proven technology in the field of automation connecting the virtual world of intelligent objects to the real world of things. It generates and processes data from a lot of implanted devices. With increased connectivity, quality of life, optimized energy, time, cost, and labor, IoT improves by preventing unplanned downtime. Automation improves efficiency, connectivity, and integration [289] . With data-rich resources, newer innovations will burgeon. With IoT, comfort, local-to-global connectivity, ecofriendly support, quality of life, and safety increases. Hazardous ecosystems could be remotely controlled and monitored. Organizations connect the physical world (hardware) to the digital world (software, data analytics) and build an organizational structure to meet the expectations. This article has a systematic insight into the contributions, pre-requisites, research challenges, and architectural design factors integrated into IoT for futuristic remedial measures. Companies need to shift from the traditional approach towards virtual IoT for satisfactory returns. We are heading towards a world where everything will be connected with IoT reaching escape velocity. IoT adds brain and provides the ability to communicate. IoT devices draw power from outlets or they are powered by batteries. This limitation could be thwarted by using IoT devices powering up from other sources of energy. To listen to a song, it is not necessary to have the song stored in the device. If the device is connected to a cloud and if we are able to play the desired song then it is a smart device. If we are planning for a flight travel and if the flight is cancelled, we might travel unnecessarily in worst environment conditions. But if we have an IoT device, if customized,we would get notification and we could avoid hurdles. After the coronavirus pandemic crisis, based on the virtual usage pattern and social distancing modes, prognostications reveal that IoT and Cloud usage in Education, Business, Healthcare, and Automation would cater to the need of the hour. Funding Not applicable. Ethics approval Not applicable. Consent for publication Yes. Creative Commons License Data management for the internet of things: Design primitives and solution Advanced Message Queuing Protocol (AMQP) 1.0 approved as an International Standard Contiki-a lightweight and flexible operating system for Tiny networked sensors RFID security in the context of "internet of things Seclap: secure and lightweight RFID authentication protocol for medical IoT A survey on Internet of Things IoT forensics: Challenges for the IoA Era A survey on 5G networks for the internet of things: communication technologies and challenges Internet of things: A survey on enabling technologies, protocols, and applications Internet of Things (IoT): A Review of enabling technologies, challenges and open research issues Integration of cloud computing and internet of things: A Survey Fog computing for the internet of things: Security and privacy issues An Application layer approach to End-to-End Security for the Internet of Things IoT-forensics meets privacy: Towards cooperative digital investigations On blockchain and its integration with IoT Challenges and opportunities Mastering Bitcoin, Unlocking Digital Cryptocurrencies Disadvantages of Internet of Things A quick history of IoT botnets Innovative Internet of things -reinforced human recognition for humanmachine interaction purposes A comprehensive study of security of internet-of-things The internet of things: A survey An overview of home automation systems Interoperable internet-of-things platform for smart home system using web of-objects and cloud The Internet of Things and the Mythical Smart Fridge RIOT OS: Towards an OS for the internet of things. IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) An efficient mutual authentication scheme for internet of things Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare A comprehensive review on security attacks in dynamic wireless sensor networks based on RPL protocol Role of middleware for internet of things: A study Exploring big data clustering algorithms for internet of things applications Data management techniques for Internet of Things. Mechanical Systems and Signal Processing 138 IoT advantages on E-Learning in the smart cities Interference co-ordination for dense wireless networks Privacy preservation in the internet of things UN Predicts Internet of Things Fog computing and its role in the internet of things A survey of internet of things communication using ICN: A use case perspective Towards natural interaction by enabling technologies: a near field communication approach Overview and evaluation of bluetooth low energy: An emerging low-power wireless technology A taxonomy of scheduling in general-purpose distributed computing systems WO/2019/094721-Methods and systems for the industrial internet of things Long-range communications in unlicensed bands: The rising stars in the IoT and smart city scenarios Experience based knowledge representation for internet of things and cyber physical systems with case studies Building Internet of Things with the Arduino A comparison of the popular home automation technologies DIAT: a scalable distributed architecture for IoT Potential forensic analysis of IoT Data: An overview of the state-of-the-art and future possibilities Internet of things forensics: The need, process models, and open issues Green internet of things for smart world Guide to LTE security The internet of things reference model. White Paper Roundup of internet of things forecasts and market estimates Reconfigurable computing: a survey of systems and software SODA: Service oriented device architecture A survey of Internet-of-Things: Future Vision, Architecture, Challenges and Services How the Internet of Things is driving cost-saving efficiencies for manufacturers. Big data hardware solutions The Internet of Things: How the Next Evolution of the Internet is Changing Everything Architectural Considerations in Smart Object Networking IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things A stream processing architecture for heterogeneous data sources in the Internet of Things Version 1.4, Object Management Group (OMG) State-of-the-art, challenges, and open issues in the integration of internet of things and cloud computing Performance evaluation of the data transfer modes in Bluetooth 5 Internet of things reference architectures, security and interoperability: A survey Performance evaluation of MQTT and CoAP via a common middleware Disadvantages of internet of things In search of an Internet of things service architecture -REST or WS -A Developer's Perspective. Mobile and Ubiquitous Systems: Computing, Networking and Services The IoT business model builder. A White Paper of the Bosch IoT Lab in collaboration with Bosch Software Innovations GmbH How digital transformation affects large manufacturing companies organization The Internet of things: Opportunities, issues, and challenges Internet of Things: Six Key Characteristics Available The internet of things: vision and challenges A survey of traffic issues in machine-tomachine communications over LTE Narrowband internet of things: A comprehensive study Analysis of internet of things malware using image texture features and machine learning techniques Internet of things security: A survey IoMT-SAF: Internet of medical things security assessment framework Smart Grid-The New and Improved Power Grid: A Survey IoT Fundamentals: Definitions, Architectures, Challenges, and Promises From EDA to IoT eHealth: Promises, challenges, and solutions Security implications of permission models in smart-home application frameworks Business Models and the Internet of Things Revenue models and the internet of things? A Consumer IoT-based Investigation Very high-speed computing systems IoT forensic challenges and opportunities for digital traces A DHT-based discovery service for the Internet of Things A web-based platform for scavenger hunt games using the Internet of Things Internet of things security analysis Gartner Top 10 Technology Trends Big data for internet of things: A survey Simulation of Agent-oriented Internet of Things Systems Enabling IoT interoperability through opportunistic smartphone based mobile gateways RADAR: self-configuring and self-healing in resource management for enhancing quality of cloud services BlueVoice: Voice communications over bluetooth low energy in the internet of things scenario Device less edge computing: extending server less computing to the edge of the network Global Information Infrastructure, Internet protocol aspects and next-generation networks, Next Generation Networks-Frameworks and Functional Architecture Models: Overview of the Internet of Things A Survey on facilities for experimental Internet of Things research Google Trends Early infrastructure of an internet of things in spaces for learning Sensorpedia: Information sharing across incompatible sensor systems FP-MAC: A distributed MAC algorithm for 802.15. 4-like wireless sensor networks Securing the internet of things: Challenges, threats and solutions Internet of Things (IoT): a Vision, Architectural Elements, and Future directions . Future Generation Computer Systems A survey of 5G network: Architecture and emerging technologies Available The rise of traffic classification in IoT networks: A survey Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions ScriptIoT: A script framework for and internet-of-things applications The internet of things in an enterprise context VLSI based enhanced security algorithm for IoT Security in near field communication (NFC) LTE/LTE-A network security data collection and analysis for security measurement: A survey Internet of things research study NIST Interagency Report (NISTIR) 8200 Interagency Report on the status of international cybersecurity standardization for the Internet of Things (IoT) Internet of things: Objectives and scientific challenges A comprehensive analysis of low-power operation for beacon-enabled IEEE 802.15. 4 wireless networks 5G roadmap: 10 key enabling technologies Wireless sensor networks: A survey The role of big data in smart city Choices for interaction with things on Internet and underlying issues. Ad Hoc Networks Internet of things forensics: recent advances, taxonomy, requirements and open challenges The WebSocket protocol Framework and overall objectives of the future development of IMT for 2020 and beyond Information Matters data driven innovation news and analysis, Data driven innovation newsletter Information Processing Systems (1989). -Open Systems Interconnection -Basic Reference Model -Part 2: Security Architecture The Internet of Things for enterprises: An ecosystem, architecture, and IoT service business model The Internet of Things. Available at www. itu. int/ inter netof things/ 133. Internet of Things A Roadmap for the future. INFSO D.4 networked enterprise and RFID INFSO G.2 Micro & Nano systems, Co-operation with the RFID Working Group of the ETP EPOSS Version Fog computing conceptual model: Recommendations of the National Institute of Standards and Technology Internet-of-Things Architecture), Initial Architectural Reference Model for IoT 5G and IoT in 2018 and beyond: the mobile broadband future of IoT ISO/IEC JTC 1-'Internet of Things (IoT). -ISO/IEC JTC 1 Information Technology ITU-T: Global standards for the Internet of Things 5G: Continuous evolution leads to quantum shift Seven ways that HetNets are a cellular paradigm shift RFID technology and its applications in Internet of Things (IoT). In: 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet) A taxonomy of workflow management systems for grid computing Machine Learning for Wireless Communications in the Internet of Things: A Comprehensive Survey Research directions for the Internet of Things Interaction System Based on Internet of Things as Support for Education The blocker tag: selective blocking of RFID tags for consumer privacy Advanced internet of things for personalised healthcare systems: A survey A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT Securing the internet of things: A standardization perspective That 'Internet of Things RFID Security A Light Weight Paradigm Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges A Comparative study of hardware architectures for lightweight block ciphers Process-aware internet of things: a conceptual extension of the internet of things framework and architecture Hawk: The blockchain model of cryptography and privacy-preserving smart contracts Anonymous secure framework in connected smart home environments Internet of things (IoT): an overview. In: 3rd International Conference on Advances in Engineering Sciences and Applied Mathematics Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications TinyOS: An operating system for sensor networks Internet of things in industries: A survey Compressed sensing signal and data acquisition in wireless sensor networks and internet of things Implementing smart homes with open source solutions Enabling internet-of-things services in the mobility first future internet architecture A mobile phone based WSN infrastructure for IoT over future internet architecture Technology designed to combat fakes in the global supply chain Slap: Succinct and lightweight authentication protocol for low-cost RFID system Future internet: The Internet of Things. 3 rd International Conference on Advanced Computer Theory and Engineering (ICACTE) Reliability in the utility computing era: towards reliable fog computing Interoperability in internet of things: Taxonomies and open challenges An exploration of IoT platform development. Information Systems A Review on Internet of Things (loT), Internet of Everything (IoE) and Internet of Nano Things (IoNT). Internet Technologies and Applications (ITA) The internet of things: New interoperability, management and security challenges Towards an Analysis of security issues, challenges, and open problems in the Internet of Things Evolution of wireless sensor networks towards the internet of things: a survey State-of-the-art, challenges, and open issues in the integration of internet of things and cloud computing Sensors empower the Internet of Things A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches and Open Issues Internet of Things in the 5G Era: Enablers, Architecture and Business models Standardized protocol stack for the internet of (Important) things IoT In Education: Integration of objects with virtual academic communities Enabling the IoT machine age with 5G: machine-type multicast services for innovative real-time applications Self-adaptive RFID authentication for Internet of Things Internet of things standards: Who stands out from the crowd? IEEE Communications Magazine An Efficient Algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework The Internet of Things Education and the Internet of Everything IoT security: Review, blockchain solutions, and open challenges. Future generation computer systems Mirai botnet adds three new attacks to target IoT devices Current research on internet of things (IoT) security: A survey The internet of things: The next technological revolution Classification of major security attacks against RFID systems Towards the internet of things A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO A Review of smart home applications based on internet of things Challenges of the Internet of Things: IPv6 and network management Healthcare IoT-A Multilayer security mechanism using linear programmable pre-coded matrix decomposition method Secured Seamless Broadcasting Using Bluetooth Enabled IoT Cloud Energy Efficacious IoT Based Nifty Parking Information System Energy efficient light weight security algorithm for low power IoT devices Security enhancements of a mutual authentication protocol used in a HF full-fledged RFID tag National Intelligence Council, Disruptive Civil Technologies -Six Technologies with Potential Impacts on US Interests Out to 2025 IPv6 over Bluetooth Low Energy. RFC 7668 Operating systems for low-end devices in the Internet of things: A Survey January (Online) Guide to Bluetooth Security. NIST Special Publication 800-121 Revision 2 Internet of things: Architectures, protocols and applications A survey: The internet of things Survey on RPL enhancements: A focus on topology, security and mobility A Review and an Empirical analysis of privacy policy and notices for consumer Internet of Things The Internet of Things: Enabling Technologies, Platforms, and Use Cases Accepting the internet-of-things in our homes: The role of user skills User datagram protocol Communication technologies and security challenges for internet of things: A comprehensive review Internet of Things -Challenges, Advances and Applications Millimeter wave mobile communications for 5g cellular: It will work! ADCA: Adaptive duty cycle algorithm for energy efficient IEEE 802.15. 4 beacon-enabled wireless sensor networks Security considerations for bluetooth smart devices Hybrid approach to ensure data confidentiality and tampered data recovery for RFID tag A survey on internet of things architectures Bluetooth 5 and internet of things: Potential and architecture Internet of Things-From Hype to Reality-The road to Digitization Exploiting smart e-Health gateways at the edge of healthcare internet-of-things: A fog computing approach Secure Communication for Smart IoT Objects: Protocol Stacks, Use Cases and Practical Examples. World of Wireless A Taxonomy and survey of cloud computing systems The Implications of the Internet of Things for Education Securing the internet of things Roundup of Internet of Things Forecasts IoT technologies for Augmented Human: A survey A Survey of protocols and standards for Internet of Things Blockchain as a service for IoT A Review of connectivity challenges in IoT-smart home Technology convergence in the internet of things (IoT) startup ecosystem: A network analysis Challenges and research directions for internet of things Development of IoT invasive architecture for complying with health of home M2M technologies: enablers for a pervasive internet of things 5G internet of things: A survey Challenges in IoT Networking via TCP/IP Architecture IEEE 802.11 Medium Access Control (MAC) Profile for Control and Provisioning of Wireless Access Points (CAPWAP). RFC 7494 A vision of IoT: Applications, challenges, and opportunities with china perspective Cryptographic technologies and protocol standards for Internet of Things The Constrained Application Protocol (CoAP). IETF RFC 7252 A security protocol for route optimization in DMM -based smart home IoT networks The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective FogBus: A blockchain-based lightweight framework for edge and fog computing Beyond the smart things: Towards the definition and the performance assessment of a secure architecture for the internet of nano-things SH-SecNet: An enhanced secure network architecture for the diagnosis of security threats in a smart home Q-Aware: Quality of service based cloud resource provisioning Industrial internet of things: Challenges, opportunities, and directions Network optimizations in the internet of things: A review. Engineering Science and Technology Anonymous lightweight chaotic mapbased authenticated key agreement protocol for industrial internet of things Cryptography and Network Security: Principles and Practice Digital forensics: The missing piece of the internet of things promise Network Security Issues in Internet of Things (IoT). Queen's University Belfast Energy efficient tag identification algorithms for RFID: survey, motivation and new design Transformative effects of IoT, Blockchain and Artificial Intelligence on cloud computing: Evolution, vision, trends and open challenges Overview of internet of things Evaluation of IoT data visualization tools and techniques Blockchain based distributed control system for edge computing Technique for preventing DoS attacks on RFID systems Security and privacy for a green internet of things The Next Generation of IoT Combating the counterfeits with web portal technology. Enterprise Information Systems What is a Fog Node a Tutorial on Current Concepts towards a Common Definition Anything for anyone? A new digital divide in Internet-of-things skills The compoundness and sequentiality of digital inequality Development and validation of the internet skills scale (ISS) Low-power communication protocol for low duty cycle data acquisition applications A Perspective on the Future of middleware-based Software Engineering State of the Market: The Internet of Things Internet of things strategic research roadmap. The Cluster of European Research Projects Security in internet of things: issues, challenges, taxonomy, and architecture A critical analysis on the security architectures of internet of things: The road ahead Implementation Of Internet of Things Oriented Data Sharing Platform Based On Restful Web Service Fog computing: Issues and challenges in security and forensics Internet of Things Building the internet of things using RFID: the RFID ecosystem experience The internet of things -A survey of topics and trends Research on the architecture of internet of things The Design of artifacts for augmenting intellect One more tag enables fine-grained RFID localization and tracking A survey on the security of blockchain systems Research on the Basic Characteristics, the Key Technologies, the Network Architecture and Security Problems of the Internet of Things A survey of information-centric networking A health-IoT platform based on the integration of intelligent packaging, unobtrusive Bio-Sensor and intelligent medicine box M-learning mode research based on internet of things Internet of things (IoT): Challenges and future directions The exploration in the education of professionals in applied Internet of Things engineering 6LoWPAN: The wireless embedded Internet A survey on energy conserving mechanisms for the internet of things: Wireless networking aspects Architecture of internet of things and its key technology integration based-on RFID Research prospect of Internet of Things geography Web performance evaluation for internet of things applications Future challenges for smart cities: Cybersecurity and digital forensics Publisher's Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.Dr. B Nagajayanthi is an Associate Professor in Vellore Institute of Technology, Chennai Campus. She is expertized in the field of Wireless Networking, Cryptography, Internet of Things and Network Security. She has ardent interest and real time experience in working with projects.