Professional Documents
Culture Documents
discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/295944316
CITATIONS READS
2 280
6 authors, including:
Vaclav Snasel
VŠB-Technical University of Ostrava
625 PUBLICATIONS 2,487 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Bio-inspired Optimization Algorithms and Variants for Several Applications View project
All content following this page was uploaded by Nour Oweis on 29 February 2016.
The user has requested enhancement of the downloaded file. All in-text references underlined in blue are added to the original document
and are linked to publications on ResearchGate, letting you access and read them immediately.
Internet of Things: Overview, sources, applications and
challenges
Nour E. Oweis1, Claudio Aracenay2, Waseem George1, Mona Oweis3, Hussein Soori1,
Vaclav Snasell
1Facultyof Electrical Engineering and Computer Science, Department of Computer Science
and IT4Innovations, VŠB-Technical University of Ostrava,17.Listopadu 15/2172, 708 33
Ostrava - Poruba, Czech Republic.
{nour.easa.oweis.st,waseem.george.oweis.st,sen.soori,
vaclav.snasel}@vsb.cz
2Department of Industrial Engineering, University of Chile Santiago, Chile
caracena@ing.uchile.cl
3Department of Computer Science, Middle East University, Amman, Jordan
mona_owais2006@yahoo.com
Keywords: Internet of Things; Big Data; smart devices; Internet of Things ap-
plications.
1 INTRODUCTION
Currently there are more than two billion users of smart technologies including smart
phones, home, city, business and entertainments applications [1, 3]. These smart object
facilities allow machines to communicate with or without user intermediary means
which leads to the term known as the IoT. However, all these modern techniques are
creating a huge amount of structured, semi-structure and unstructured data which even-
tually leads to the increase in data capacity, variety of storage and processing systems.
S. Haller et al. [2] define the term IoT as: "a world where physical objects are seam-
lessly integrated into the information network and where the physical objects can be-
come active participants in business process".
We divide this study into four main sections: the first section is review and short
history of IoT. The second section reviews the main concept of Big Data and its relation
to IoT. The third section involves IoT sources (hardware and software). The fourth sec-
tion review two main IoT challenges: data mining and security.
IoT is not new to computer science, yet it has taken a new paradigm that combines the
huge amount of smart objects - that are widely growing, their ability to be remotely
connected - and data sharing from several resources.
In 1990 the first things was born and known as the Internet Toaster by John Romkey
and Simon Hackett in their first connected Toaster device powered by the Internet. Af-
ter that in 1991, Interop added a small robotic to pick up a slice of bread into the toaster
to be a full automating machine [4].
Ten year later in 1999, the Internet Toaster was connected to the Internet. The name
of the IoT has been widely known when Kevin Ashton coined the term Internet of things
[5]. In the same year, Dr Andy Stanford-Clark of IBM, and Arlen Nipper of Arcom
(now Eurotech) introduced the first machine-to-machine protocol for connected devices
which is called (MQ Telemetry Transport (MQTT)) [6, 7].
One year later, LG Company announced plans for the first refrigerator connected to
the Internet known as LG Internet Refrigerator [8]. Nowadays, after more than 40 years
of Internet emergence, more than 20 years of the birth of Internet Toaster, and more
than ten years after the coinage of the term Internet of Things, 13 billion devices are
connected worldwide (2 devices per person) and by 2020, 50 billion devices are ex-
pected to be connected to the Internet (6 devices per person) [9]. In the next section Big
Data concept and characteristics are presented with their relation to the IoT.
Massive set of data that is so large and complex to be managed by traditional processing
applications lead to what is known as Big Data. The term Big Data includes a huge,
complex, and abundant structured, semi-structure and unstructured, as well as, hidden
data that are generated and gathered from several fields and resources. Gartner define
the term Big Data as, " high-volume, high-velocity and high-variety information assets
that demand cost-effective, innovative forms of information processing for enhanced
insight and decision making"[10]. Big Data can be categorized by its 6Vs characteris-
tics (Volume, Velocity, Variety, Veracity, Viability and Value) [11, 12, 13, 14].
IoT is considered the most important source of Big Data, including the hardware
devices, and software application. The following section presents the IoT hardware and
software that cover the structure of the IoT.
4 IOT Sources (Hardware and Software)
Recently, there are many new IoT hardware devices and software applications that are
already deployed and widely spared, some of them will be mentioned in the following
subsections.
In today's digital world, there are huge amount of datacenters such as SAPs. This kind
of huge and organized datacenter comes with a high tech building, security measures
certificates, and cloud-solutions of Big Data [15].
Another example is WSN where there are multiple sensors interacting together for
collecting data stream and sending these data to the distributed or centralized system
for store, process, and analytics [16]. An example of WSN is a project in Chicago state
called the Array of Things Project where they spread the WSN nodes all over the city
parts. This makes the city healthier, more livable, and more efficient. Some additional
eight nodes will be deployed along Michigan Avenue in Spring 2015 [18].
RFID Tags is a short range communication technology within one way transmission
data with unpowered tags by using radio communication signal [19]. For example,
Electronic Fuel Delivery System (EFDS) in Hung Gong, powered by Empress TM2.4
GHz Active RFID. The EFDS was developed to help oil companies enhance energy
consumption efficiency. Another example of the RFID tags is the E-invoices which are
issued instead of paper invoices annually. The Ministry of Finance of Taiwan set out to
improve environmental conditions on the East Asia Island. According to Taiwan Fiscal
Information Agency, in 2013, the state was issuing more than 8 billion E-invoices in a
year which is equivalent to 80,000 trees and 3,200 tons of CO2 emissions. E-invoices
issued by the Ministry of Finance of Taiwan was awarded the RFID Green Award by
RFID Journal 2014 because it has demonstrated the best use of RFID technology to
improve the environment and increase recycling or enhance sustainability. Electronic
invoice applies RFID technology and multi devices to replace paper invoices, signifi-
cantly reducing unnecessary paper waste and carbon dioxide emissions and revealing
the key factor of winning the award [20].
NFC tags is a development technology of RFID Tags with a short range communi-
cation technology within two way transmission data in very short distances and unpow-
ered tags by using radio communication that are widely commonly used in several ap-
plications and smart devices such as smart phone, smart travel, smart home, smart se-
curity, smart door, smart posters, electronic payment, smart fitness keychains, business
and student cards, etc. [17].
Cloud computing is a highly feasible technology and attracts a large number of re-
searchers to develop it and try to apply it on Big Data problems. At present, there are a
huge number of cloud computing storage devices such as Google cloud and Drop box
[21, 22].
Smart city is one of the most researched areas based on the application of the IoT
data. The U.S. Miami-Dade County is one example. This project is a cooperation be-
tween Miami-Dade County in Florida and IBM company in which they closely connect
35 types of key county government departments and Miami City that reduce the water
consumption by 20% and intelligent policing helping police departments reduce the
time taken for officers to identify leads, investigate crimes and remove barriers to in-
formation sharing with other law enforcement agencies [14, 23].
Smart phones are cell phone hybrid with digital computing capabilities to allow users
to interact worldwide with latest technologies and techniques. Nowadays, mostly eve-
ryone has a touch screen smart phone/s that allow access to the Internet with all of its
facilities. It is predicted that by 2018, each smart phone is expected to generate 2 GB
of data monthly [24, 25].
After we described hardware and its extensive uses by smart and sensing device with
some examples, in the next subsection, we review the different aspects related with
software in the field of IoT.
Today, Internet technology allows the communication of almost every kind of devices,
such as sensors or even appliances. For supporting all these structures, we, generally
speaking, need operating systems, protocols, applications and platforms. This will be
briefly described in this section to satisfy the requirements needed for each specific
problem.
In this sub-section, we mention some of the main methods related to protocols for de-
veloping IoT technologies below.
Service Oriented Architecture (SOA) is a loosely-coupled architecture designed to
meet the business needs of organizations. A SOA does not necessarily require the use
of Web Services, but these are, for most organizations, the simplest approach for im-
plementing a loosely coupled architecture [33], in particular for sensor and device func-
tionality. SOA were primarily for connecting complex and static enterprise services
because web service developing has not always been a straightforward task. Since sen-
sors and devices have limited resources like computing such as communication and
storage capabilities, this architecture require simplification, adaptation and optimiza-
tion for a suitable performance [34]. In [35], authors propose an information-centric
session mechanism to describe service behavior working upon distributed events called,
event session. Another study [36] shows a SOA-based real-time service bus model
which can be used to support constructing web.
Over the last decades, the Internet Protocol version 4 (IPv4) has emerged as the
mainstream protocol for networking layer. However, this protocol was not designed for
the IoT capabilities because it is inherently limited to about 4 Billion addresses. With
the emergence of Internet Protocol version 6 (IPv6), it has scaled up the Internet to an
almost unlimited number of globally reachable addresses. IPv6 provides 2128 unique
Internet addresses, or 3.4*1038 addresses, which corresponds to over 6.67*1017 unique
addresses per square millimeters of Earth surface [38]. In [39] the authors analyze the
suitability of different IPv6 addressing strategies for nodes, gateways, and various net-
work access deployment scenarios in the IoT.
The IoT have changed the direction of the global Internet [59]. In this section, we will
briefly discuss the two main challenges of IoT in two parts: IoT Big Data mining and
IoT security.
IoT Data mining tools have become one of the most demanding necessities during
the recent and future research challenges in terms of extracting valuable and useful data
from the set of IoT and Big Data sources [59, 60].
Traditional data processing tools and its applications are not capable of managing
such revolutionized amount of data. Nowadays, there are a few applications and plat-
forms used to manage, extract, and execute IoT Big Data mining [61, 62]. Some of the
latest software developed to manage both the IoT and Big Data are: NoSQL, which is
used to manage Big Databases, MapReduce, which is used for data mining techniques,
and Hadoop software used for processing, development, and execution of Big Data ap-
plications.
IoT security is one of the most critical areas needed for the development of different
components and tasks. For example, device and process identification and tracking,
sensing and actuation, communication, computational sensing, semantic knowledge
processing, coordinated and distributed control, and user modeling. In addition, there
are many constraints for IoT like cost, energy, lifetime and power. Nevertheless, one of
the most important challenges is security, since the Internet is always a target of mali-
cious attacks and intrusions. Usually these intrusions are fast and widely diffused [63].
Another aspect is trust and governance [64]. To create effective services, transmitted
data have to be trustable. In other words, devices have to trust the data that other devices
generated. Related with governance, some restricting policies can be applied. A classic
example is limiting countries that can have access to the data.
In this paper we presented some of the most recent advances in IoT field. We divided
the study into four main parts: short history, Big Data concept, IoT sources (hardware
and software), and finally some challenges and future expectations. The objective of
the study is to give the reader an updated description of the IoT and its impact on Big
Data. IoT is an area with a high potential of improving people’s lives. However, this
depends on how far we can reach to the challenge of the rapid growth in the day to day
development in cell phones and WWW technologies. If predictions are true, it may ease
human lives enabling us to enjoy the benefits of this technology by 2025. This is de-
pending on the research and development that enterprises and governments will do in
the coming years. We hope that this study will be helpful for researchers, students work-
ing in area of Big Data and IoT. Web of Thing (WoT) is another important part that we
have not presented yet, but will be writing about in our future papers.
ACKNOWLEDGMENT
This work was supported by the IT4Innovations Centre of Excellence project
(CZ.1.05/1.1.00/02.0070), funded by the European Regional Development Fund and
the national budget of the Czech Republic via the Research and Development for Inno-
vations Operational Programme and by Project SP2015/146 “Parallel processing of Big
data 2” of the Student Grand System, VŠB – Technical University of Ostrava.
REFERENCES
1. D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things: Vision, appli-
cations and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, 2012.
2. S. Haller, S. Karnouskos, and C. Schroth, “The internet of things in an enterprise context,”
in Future Internet FIS, 2009, vol. 5468, pp. 14–28.
3. J. Rivera and R. van der Meulen, “Gartner’s 2014 hype cycle for emerging technologies
maps the journey to digital business,” URL: http://www.gartner.com/newsroom/id/2819918,
2014, seen on 03-12-2014.
4. L. Internet, “The internet toaster,” URL: http://www.livinginternet.com/i/ia myths toast.htm,
2000, seen on 03-12-2014.
5. F. Mattern and C. Floerkemeier, “From active data management to event-based systems and
more” Springer, 2010
6. M. Collina, G. Corazza, and A. Vanelli-Coralli, “Introducing the qest broker: Scaling the iot
by bridging mqtt and rest” 2012, pp. 36–41.
7. “Mqtt organization,” URL: http://mqtt.org/faq, 2015, seen on 13-01-2015.
8. C. Raduescu, “Towards an ethnographic study of information appliances: The case of LG
internet refrigerator,” ”Annals. Computer Science Series” Journal, vol. 2, no. 1, 2004.
9. D. Evans, “The internet of things: How the next evolution of the internet is changing every-
thing,” CISCO white paper, vol. 1, 2011.
10. Gartner, “Gartner it glossary,” URL: http://www.gartner.com/it-glossary/big-data/, 2014,
seen on 05-01-2015.
11. M. Schroeck, R. Shockley, J. Smart, D. Romero-Morales, and P. Tufano, “Analytics: The
real-world use of Big Data,” 2012.
12. E. Knilans, “The 5 vs of Big Data,” URL: http://blogging.avnet.com/ts/ad-
vantage/2014/07/the-5-vs-of-big-data/, 2014, seen on 05-01-2015.
13. G. Ding, Q. Wu, J. Wang, and Y.-D. Yao, “Big spectrum data: The new resource for cogni-
tive wireless networking,” arXiv preprint arXiv:1404.6508, 2014.
14. M. Chen, S. Mao, Y. Zhang, and V. C. Leung, “Big Data applications,” in Big Data.
Springer, 2014, pp. 59–79.
15. S. D. Center, “How a data center works,” URL: http://www.sapdatacenter.com/article/data
center functionality/, 2014, seen on 24-11-2014.
16. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things (iot): A vision,
architectural elements, and future directions,” vol. 29, no. 7, pp. 1645–1660, Sep. 2013.
17. A. Whitmore, A. Agarwal, and L. Da Xu, “The internet of things a survey of topics and
trends,” Information Systems Frontiers, pp. 1–14, 2014.
18. “The array of things project in Chicago state,” URL: https://arrayofthings.github.io/, 2014,
seen on 24-11-2014.
19. M. C. Domingo, “Review: An overview of the internet of things for people with disabilities,”
J. Netw. Comput. Appl., vol. 35, no. 2, pp. 584–596, Mar. 2012.
20. “RFID journal,” URL: https://www.rfidjournal.com, 2014, seen on 26-11-2014.
21. P. Mell and T. Grance, “The nist (national institute of standards and technology) definition
of cloud computing,” NIST Special Publication, no. 800-145, 2011.
22. L. Liu, “Computing infrastructure for Big Data processing,” Frontiers of Computer Science,
vol. 7, no. 2, pp. 165–170, 2013.
23. L. Enbysk, “Big Data to the rescue in miami-dade county, florida,” URL:
http://smartcitiescouncil.com/article/big-data-rescue-miami-dade-county-florida, 2014,
seen on 05-01-2015.
24. Ericsson, “Ericsson mobility report,” http://www.ericsson.com/res/docs/2013/ericsson-mo-
bility-report-june-2013.pdf. seen on 05-01-2015
25. G. Broll, E. Rukzio, M. Paolucci, M. Wagner, A. Schmidt, and H. Huss-mann, “Perci: Per-
vasive service interaction with the internet of things,” Internet Computing, IEEE, vol. 13,
no. 6, pp. 74–81, Nov 2009.
26. G. Duncan, “Windows developer program for iot now rolling out,” URL: http://chan-
nel9.msdn.com/coding4fun/blog/Windows-Developer-Program-for-IoT-now-rolling-out,
2014, seen on 20-12-2014.
27. Windows, “Windows developer program for iot,” URL: http://dev.windows.com/en-us/fea-
tured/windows-developer-program-for-iot, 2014, seen on 20-12-2014.
28. Contiki, “Contiki: The open source os for the internet of things,” URL: http://www.contiki-
os.org/, 2014, seen on 20-12-2014.
29. M. Kovatsch, S. Duquennoy, and A. Dunkels, “A low-power coap for contiki,” in Mobile
Adhoc and Sensor Systems (MASS), 2011 IEEE 8th International Conference on. IEEE,
2011, pp. 855–860.
30. E. Baccelli, O. Hahm, M. Gunes,¨ M. Wahlisch,¨ T. Schmidt et al., “Riot os: Towards an os
for the internet of things” 2013.
31. P. Hambarde, R. Varma, and S. Jha, “The survey of real time operating system: Rtos” 2014,
pp. 34–39.
32. Intel, “The critical features and characteristics for an embedded oper-ating system,” URL:
http://www.intel.com/content/www/us/en/internet-of-things/white-papers/real-time-operat-
ing-system-for-iot.html, 2014, seen on 20-12-2014.
33. M. Library, “Chapter 1: Service oriented architecture (soa),” URL: http://msdn.mi-
crosoft.com/en-us/library/bb833022.aspx, 2014, seen on 01-12-2014.
34. D. Guinard, V. Trifa, S. Karnouskos, P. Spiess, and D. Savio, “Interact-ing with the soa-
based internet of things: Discovery, query, selection, and on-demand provisioning of web
services,” Services Computing, IEEE Transactions on, vol. 3, no. 3, pp. 223–235, July 2010
35. Y. Zhang, L. Duan, and J. L. Chen, “Event-driven soa for iot services” in Services Compu-
ting (SCC), 2014 IEEE International Conference on, June 2014, pp. 629–636.
36. L. Du, C. Duan, S. Liu, and W. He, “Research on service bus for distributed real-time control
systems, vol. 1, Aug 2011, pp. 401–405
37. R. T. Fielding and R. N. Taylor, “Principled design of the modern web architecture,” ACM
Trans. Internet Technol., vol. 2, no. 2, pp. 115–150, May 2002.
38. S. Ziegler, C. Crettaz, L. Ladid, S. Krco, B. Pokric, A. Skarmeta, Jara, W. Kastner, and M.
Jung, “Iot6 moving to an ipv6-based future iot,”, 2013, vol. 7858, pp. 161–172.
39. T. Savolainen, J. Soininen, and B. Silverajan, “Ipv6 addressing strategies for iot,” Sensors
Journal, IEEE, vol. 13, no. 10, pp. 3511–3519, Oct 2013.
40. B. Ostermaier, K. Romer, F. Mattern, M. Fahrmair, and W. Kellerer, “A real-time search
engine for the web of things,” in Internet of Things (IoT), 2010, Nov 2010, pp. 1–8.
41. X. Jin, D. Zhang, Q. Zou, G. Ji, and X. Qian, “Where searching will go in internet of things?”
in Wireless Days (WD), 2011 IFIP, Oct 2011, pp. 1–3.
42. S. T. Inc., “Sphinx: Open source search server,” URL: http://sphinxsearch.com/, 2014, seen
on 02-12-2014.
43. Z. Ding, Z. Chen, and Q. Yang, “Iot-svksearch: a real-time multimodal search engine mech-
anism for the internet of things” International Journal of Communication Systems, vol. 27,
no. 6, pp. 871–897, 2014.
44. Z. Ding, J. Dai, X. Gao, and Q. Yang, “A hybrid search engine framework for the internet
of things” Nov 2012, pp. 57–60.
45. Z. Ding, X. Gao, L. Guo, and Q. Yang, “A hybrid search engine framework for the internet
of things based on spatial-temporal, value-based, and keyword-based conditions” 2012, pp.
17–25.
46. B. Guo, Z. Yu, X. Zhou, and D. Zhang, “Opportunistic iot: Exploring the social side of the
internet of things” 2012, pp. 925–929.
47. L. Atzori, A. Iera, and G. Morabito, “Siot: Giving a social structure to the internet of things”
Communications Letters, IEEE, vol. 15, no. 11, pp. 1193–1195, November 2011.
48. L. Atzori, A. Iera, G. Morabito, and M. Nitti, “The social internet of things (siot) when social
networks meet the internet of things: Concept, architecture and network characterization”
Computer Networks, vol. 56, no. 16, pp. 3594 – 3608, 2012.
49. N. Bui and M. Zorzi, “Health care applications: A solution based on the internet of things”
2011, pp. 131:1–131:5.
50. A. Ghose, C. Bhaumik, D. Das, and A. K. Agrawal, “Mobile healthcare infrastructure for
home and small clinic, 2012, pp. 15–20.
51. B. Xu, L. D. Xu, H. Cai, C. Xie, J. Hu, and F. Bu, “Ubiquitous data ac-cessing method in
iot-based information system for emergency medical services,” Industrial Informatics, IEEE
Transactions on, vol. 10, no. 2, pp. 1578–1586, May 2014.
52. G. Shen and B. Liu, “Research on application of internet of things in electronic commerce,”
in Electronic Commerce and Security (ISECS), 2010, pp. 13–16.
53. W. Han, Y. Gu, W. Wang, Y. Zhang, Y. Yin, J. Wang, and L.-R. Zheng, “The design of an
electronic pedigree system for food safety,” Information Systems Frontiers, pp. 1–13, 2012.
54. L. Li, “Technology designed to combat fakes in the global supply chain,” Business Hori-
zons, vol. 56, no. 2, pp. 167 – 177, 2013.
55. M. Lee, J. Hwang, and H. Yoe, “Agricultural production system based on iot,” in Computa-
tional Science and Engineering (CSE), 2013, pp. 833–837.
56. P. Pyykonen, J. Laitinen, J. Viitanen, P. Eloranta, and T. Korhonen, “Iot for intelligent traffic
system” 2013, pp. 175–179.
57. IBM, “The internet of things,” URL: http://www-01.ibm.com/software/info/internet-of-
things/, 2014, seen on 28-11-2014.
58. Intel, “The internet of things (iot),” URL: http://www.intel.com/content/www/us/en/inter-
net-of-things/overview.html, 2014, seen on 28-11-2014.
59. S. Bin, L. Yuan, and W. Xiaoyi, “Research on data mining models for the internet of things”
2010, pp. 127–132.
60. C.-W. Tsai, C.-F. Lai, M.-C. Chiang, and L. Yang, “Data mining for internet of things: A
survey,” Communications Surveys Tutorials, IEEE, vol. 16, no. 1, pp. 77–97, First 2014.
61. X. Wu, X. Zhu, G.-Q. Wu, and W. Ding, “Data mining with Big Data” Knowledge and Data
Engineering, IEEE Transactions on, vol. 26, no. 1, pp. 97–107, Jan 2014.
62. E. Barbierato, M. Gribaudo, and M. Iacono, “Performance evaluation of NOSQL big-data
applications using multi-formalism models,” 2014, vol. 37, no. 0, pp. 345 – 353.
63. T. Xu, J. B. Wendt, and M. Potkonjak, “Security of iot systems: Design challenges and op-
portunities,” USA: IEEE Press, 2014, pp. 417–423.
64. R. Roman, P. Najera, and J. Lopez, “Securing the internet of things,” Computer, vol. 44, no.
9, pp. 51–58, Sept. 2011.