Professional Documents
Culture Documents
Please cite this article as: L.B. Furstenau, Y.P.R. Rodrigues, M.K. Sott, P. Leivas, M.S. Dohan,
José.Ricardo. López-Robles, M.J. Cobo, N.L. Bragazzi, K.-K. Raymond Choo, Internet of things:
Conceptual network structure, main challenges and future directions, Digital Communications and
Networks (2022), doi: https://doi.org/10.1016/j.dcan.2022.04.027.
This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition
of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of
record. This version will undergo additional copyediting, typesetting and review before it is published
in its final form, but we are providing this version to give early visibility of the article. Please note that,
during the production process, errors may be discovered which could affect the content, and all legal
disclaimers that apply to the journal pertain.
© 2022 Chongqing University of Posts and Telecommunications. Production and hosting by Elsevier
B.V. on behalf of KeAi Communications Co. Ltd.
1
of
c
Business School, Unisinos University, Av. Dr. Nilo Peçanha 1600, 91330-002, Porto Alegre, Brazil, E-mail: sott.mk@gmail.com
d
Lakehead University, ON P7B 5E1, Thunderbay, Canada, E-mail: msdohan@lakeheadu.ca
e
Autonomous University of Zacatecas, Av. Ramón López Velarde Col. Centro, Zacatecas, 98000, Mexico, E-mail: ricardolopezrobles@outlook.com
ro
f
Department of Computer Science and Engineering, University of Cadiz, Paseo de Carlos III, 28, 11003 Cadiz, Spain, E-mail: manueljesus.cobo@uca.es
g
York University, ON M3J 1P3, Canada, E-mail: robertobragazzi@gmail.com
h
-p
Department of Information Systems and Cyber Security, the University of Texas at San Antonio, San Antonio, TX 78249 USA, E-mail: raymond.choo@ful-
brightmail.org
re
Elsevier use only: Received date here; revised date here; accepted date here
lP
* Corresponding author.
na
ABSTRACT
ur
Internet of Things (IoT) is a key technology trend that supports our digitalized society in applications such as smart countries and smart
cities. In this study, we investigated the existing strategic themes, thematic evolution structure, key challenges, and potential research
opportunities associated with the IoT. For this study, we conducted a Bibliometric Performance and Network Analysis (BPNA),
Jo
supplemented by an exhaustive Systematic Literature Review (SLR). Specifically, in BPNA, the software SciMAT was used to analyze
14,385 documents and 30,381 keywords in the Web of Science (WoS) database, which was released between 2002 and 2019. The results
revealed that 31 clusters are classified according to their importance and development, and the conceptual structures of key clusters are
presented, along with their performance analysis and the relationship with other subthemes. The thematic evolution structure described the
important cluster(s) over time. For the SLR, 23 documents were analyzed. The SLR revealed key challenges and limitations associated with
the IoT. We expect the results will form the basis of future research and guide decision-making in the IoT and other supporting industries.
Keywords: Internet of things, Strategic intelligence, Industry 4.0, SciMAT, Bibliometric analysis, Science mapping
1. Introduction
Internet of Things (IoT) is one of the key technologies sup- by 2025 [9, 10]. The IoT can be used to improve industries
porting the fourth Industrial Revolution and the concept of such as healthcare [11], transportation [12], energy [13, 14],
Industry 4.0 [1]. The IoT allows large amounts of data to be supply chain [15], manufacturing [16] and other industries.
collected and stored for further processing using connected Despite the potential benefits of IoT, several challenges and
devices [2, 3]. Generally, the data is processed in cloud-based limitations remain to be addressed. Examples of such chal-
centralized servers [4] that are powered by the latest robust lenges and limitations include security and privacy [17-19],
techniques to ensure high performance, e.g., cellular network communication, hardware and software, IoT-related skillsets,
edge [4], mobile cloud computing [5], mobile edge compu- regulation, legislation and culture [20].
ting and energy harvesting [6]. The results can then be used To better understand the IoT, researchers are working to
for decision-making at different levels [7] and facilitate real- understand its applications, challenges, barriers and trends, as
time interaction among different sectors and supply chain evidenced by existing literature reviews and surveys [7, 26,
partners [8]. Financial estimations show that the economic 113-133] and bibliometric analyses [21-25]. However, to the
impact of IoT will increase from $3.9 trillion to $11.1 trillion best of our knowledge, no study has conducted a complete
2 DIGITAL COMMUNICATIONS AND NETWORKS
analysis of the entire academic publication of the IoT (2002- The existing bibliometric analysis of IoT in Web of Sci-
2019) (see Table 1 in section 2). The bibliometric analysis ence (WoS) is shown in Table 1, presenting five (5) types of
supported by Systematic Literature Review (SLR) is an ap- research. The coverage and focus show the differences be-
propriate method to produce an overview of the research field tween the bibliometric approaches, highlighting the novelty
and identify obstacles and challenges, and inform future re- of this work in the last line.
searchers. Therefore, in this study, we conduct a Bibliometric Table 1
Performance and Network Analysis (BPNA) and then an SLR Existing bibliometric analysis of IoT in literature.
to fully understand the literature of the IoT. Study Coverage Focus
As part of the study, we will provide new insights to sup- Identification of the most critical studies, re-
port the discovery of research opportunities and gaps in the [21] 2000 - 2015 search themes and authors related to visions
literature. To this end, we depicted the strategic themes, the- and applications of IoT
Applications of IoT and big data on the circu-
matic evolution structure, key challenges, and future research [22] 2006 - 2015
lar economy environment.
directions of IoT. As a result, 31 clusters were plotted in a Exploration of the applications of IoT in food
[23] 2011 - 2018
strategic diagram and classified according to their centrality safety contexts.
and density. According to findings in the literature, the most [24] 2010 - 2017
Investigation of IoT field in the Arab coun-
tries.
developed and important motor themes in these clusters were
Trends and innovations analysis of IoT pa-
discussed. The thematic evolution structure presented the [25] 2004 - 2017
tents.
of
most significant cluster over time in terms of centrality and Holistic understanding of the strategic themes,
This
density and an in-depth discussion was made regarding the paper
2002 - 2019 thematic evolution structure, main challenges
ro
and future directions.
IoT history from 2002 to 2019. The SLR revealed the main
challenges and difficulties from 23 review articles, which
were classified according to six factors specified by Uslu, 2.1 Bibliometric performance and network analysis
Eren, Gür and Özcan [26]. We also presented the number of
publications over time, the most productive and cited re-
-p While there are Google Scholar and many databases (e.g.,
re
searchers, the universities and journals related to IoT. Scopus), studies have shown that the Web of Science (WoS)
database generally indexes influential/higher quality aca-
demic journals [27]. Therefore, in this study, we used the WoS
lP
of
and future directions in any research field [38-46]. Keywords Fig. 3 shows the number of publications of IoT between
were the analyzed items and the frequency of co-occurrence 2002 and 2019. It can be observed that the first article was
published in 2002 [49]. Some important studies were carried
ro
of the keywords was extracted. We applied the equivalence
index to calculate similarity. The clustering algorithm used to out in the following years [50-53] and continued to increase
identify themes was the Simple Center algorithm. In the data thereafter. IoT is known as one of the pillars of industry 4.0
collection, 14,388 documents were exported and included in
bibliometric analysis, including 33,489 keywords.
-p
[1]; this phenomenon may be related to the “advanced manu-
facturing partnership” (AMP) plan launched by the US gov-
re
To discover the evolution of the research themes in the ernment in 2011 [54] and the “High-Tech Strategy 2020” for-
whole period, the thematic evolution structure was studied. mulated by the German government in early of 2012 [1, 55].
The citation performance shows an increasing trend, high-
lP
(dashed line) indicates the clusters share elements that are not
the core themes, and the non-existence of a line implies dis-
continuity (new cluster). The thickness of the lines is propor-
ur
Table 2
Most productive/cited authors from 2002 to 2019 4. Bibliometric network analysis of IoT from 2002 to
Most cited authors Cit. Most productive authors Doc. 2019
Atzori, L 6,351 Rodrigues, JJPC 66
Iera, A 6,113 Choo, KKR 54 In this section, the bibliometric network analysis of IoT is
Morabito, G 5,888 Yang, LT 52 depicted in the strategic diagram (4.1), the thematic network
Xu, LD 5,158 Guizani, M 51
Buyya, R 3,791 Kumar, N 49 structure (4.2) and the thematic evolution structure (4.3). Sec-
Palaniswami, M 3,784 Zeadally, S 44 tion 2 describes each topic for better understanding.
Vasilakos, A 2,245 Park, JH 43
Guizani, M 2,219 Sangaiah, AK 39 4.1 Bibliometric performance and network analysis
Li, S 2,170 Wang, W 38
Zorzi, M 1,999 Wang, ZL 37
Fig. 4 shows 31 clusters, ten (10) of which are classified
Table 3 lists the journals and universities that publish re- as motor themes, six (6) as basic and transversal themes, nine
search related to IoT. IEEE Access ranks first, followed by (9) as emerging or declining themes, and six (6) as highly de-
IEEE Internet of Things Journal and Sensors. The most pro- veloped and isolated themes. The size of each cluster is pro-
ductive university is the Chinese Academy of Sciences, fol- portional to the number of core documents associated with the
lowed by the Beijing University of Posts Telecommunica- theme, followed by the total of citations (in brackets). Table 4
of
tions. shows the performance analysis of the research themes and
their respective core documents, sum citation and h-index.
ro
Table 3 Motor themes are regarded as the ten (10) motor themes
Journals and universities that publish studies on IoT that emerged from this analysis were “AUTHENTICA-
Journals
IEEE Access
Doc.
1,155
Universities
Chinese Ac. of Sciences
Doc.
459
-p
TION”, “6LOWPAN”, “INDUSTRY-4.0”, “SMART-CITY”,
“CLOUD-COMPUTING”,
“DISTRIBUTED-SYSTEM”,
“MACHINE-LEARNING”,
“INTEROPERABILITY”,
re
Beijing Univ. Posts Tele-
IEEE IoT Journal 1,077 282 “PLATFORMS”, and “SOA-(SERVICE-ORIENTED-AR-
com.
Sensors 974 Univ. of California Syst. 222 CHITECTURE”. A total of 1,258 core documents on these
lP
Int. J. of E science 334 King Saud University 205 motor theme have been cited 23,357 times.
Int. J. of Dist. Sensor Univ. of Elect. Sci. Tech.
269 200
Net. of China
IEEE Tran. on Ind. Inf. 190 Univ. System of Georgia 194
na
of
themes of IoT presented in Table 4. The co-occurrence among systems, IoT [67], big data and analytics [32], cloud compu-
keywords was deeply analyzed and depicted in order to pre- ting [68], sensors, machine learning, computer simulation, 3D
ro
sent hidden patterns. printing, artificial intelligence, augmented reality, real-time
monitoring and decision-making, cybersecurity, robotics,
among others [1, 31]. The most important subthemes within
4.2.1 Authentication (a)
that it is identified as a motor theme. Authentication methods technologies that constitute the industry 4.0 concept. How-
can be seen as a series of adopted procedures to confirm an ever, IIoT highlights a more significant research effort in the
entity’s identity in a network [56, 57]. In the IoT environment, industrial sector, where higher robustness of technology is de-
na
security and privacy are the primary concerns. Since the manded in terms of complexity, legal regulations, hardware
equipment does not have many resources to protect, data leak- and infrastructure aspects, device compatibility, more signif-
age is hindered, which makes it very difficult to implement icant investments, data network and security, among others
ur
of
ro
-p
re
lP
na
ur
Jo
The cluster “SMART-CITY” (Fig. 5d) concept emerged in The cluster “INTEROPERABILITY” (Fig. 5h) is a property
2012 [76] and can be seen as using the IoT and others emerg- of a system that shares data and communicates with others
ing technologies to improve the functions of cities. IoT can be systems [89, 90]. The most important subthemes within this
applied in heterogeneous environments and is the best way to research theme are “SEMANTIC-WEB” [91], “BUILDING-
improve smart cities [77]. The most important subthemes INFORMATION-MODELLING” and “ONTOLOGY”. Aca-
within this research theme are “SENSOR” [78] and “SMART- demia have developed semantic web models using ontolo-
GRID” [79]. A large number of studies using these technolo- gies. Ontologies are used for semantic reasoning to provide
gies focus on building smart grid systems using wireless sen- interoperability in several aspects. The semantic web allows
sors to automatically collect and take action on the available bidirectional transfer between cloud modes, promoting users
information on the behavior of suppliers and consumers. The to switch between different clouds and controlling the author-
same situation occurs with “INTELLIGENT-TRANSPOR- ization to share manufacturing resources. In addition, it al-
TATION-SYSTEM”, in which applications mainly focuses lows organizations to integrate three service models after a
on vehicle safety, network communication and traffic man- Return on Investment (ROI) analysis to consider factors such
agement. as manufacturing capabilities, business strategy and security
issues. Therefore, it is crucial to consider the use of the se-
of
4.2.6 Machine Learning (f) mantic web in interoperability schemes.
ro
The cluster “MACHINE-LEARNING” (Fig. 5f) can be 4.2.9 Distributed system (g)
seen as the most representative algorithm of artificial intelli-
gence [80]. This algorithm is used to learn from data, make The cluster “DISTRIBUTED-SYSTEM” (Fig. 5g) is a
sense of data, and discover patterns that can be used to predict
what will happen in future situations [81]. Recently, the inter-
-p
group of autonomous computers presented to its users as a
single integrated system [92]. Important roles of the distrib-
re
est in using machine learning to improve IoT security is in- uted systems are storage, collaborative computing and secu-
creasing [82], which justifies the emergence of subthemes rity. These systems have become the basis for research in ar-
lP
such as “CYBER-SECURITY” and “INTRUSION DETEC- eas such as blockchain [93], multi-agents [94], smart home
TION”. Other important subthemes within this theme are [95], fog computing and cloud computing [96]. The most im-
“DEEP-LEARNING” [83], “DEEP-NEURAL-NET- portant subthemes within this research theme are “BLOCK-
na
WORK”, “ARTIFICIAL-INTELLIGENCE” etc. [84]. A log- CHAIN” [93], “SMART-CONTRACT” and “MULTI-
ical explanation for this co-occurrence pattern might be asso- AGENT-SYSTEM” [94]’. When “BLOCK-CHAIN” was
ciated with the large number of studies conducted to bench- created, specifically for Bitcoin, academic interest began to
ur
mark machine learning algorithms using other techniques to increase due to its strong security structure. Researchers then
evaluate performance in IoT environments (e.g., resource uti- started to implement the technology in different fields. The
lization, efficiency, accuracy, scalability). above co-occurrence was highly developed by researchers
Jo
of
paths in cyber-physical systems [102]; select the shortest path WORK” is mainly related to energy efficiency, energy har-
to obtain the global importance of nodes and the optimal path vesting and consumption. The cluster “SMART-CITY” is re-
ro
for sensors [103]; improve efficiency and picking distance in lated to smart grid, sensors, sustainability, interoperability,
a fishbone layout warehouse [104]; reduce the energy con- and intelligent transportation systems. The cluster “CYBER-
sumption [105]; or as a task scheduling strategy to maximize PHYSICAL-SYSTEM” is mainly related to the industry 4.0
the benefit of workers [53].
In the second subperiod (2007 – 2011), 333 new keywords
-p
context.
re
were used and three (3) were lost. In this subperiod, 108 arti- 5. Main challenges, limitations and difficulties of IoT
cles were published. The cluster “INTERNET” and “FU-
lP
TURE-INTERNET” highlights the discussion of the role of In this section, an exhaustive SLR of the main challenges
the internet in upcoming years and how IoT could use the in- and difficulties faced by IoT is presented. Twenty-three (23)
ternet and emerging technologies to turn daily objects into articles were selected for analysis. Table 5 presents the find-
na
smart objects with the ability to recognize and act in response ings regarding the challenges and difficulties classified ac-
to the environment [106]. The concept of the future internet cording to 6 factors mentioned by Uslu, Eren, Gür and Özcan
was founded by the European Commission [107] and was [26]: communication, technology, privacy and security, job,
ur
slowly evolved into IoT [108]. In this sense, technical and legal regulations, culture, and 26 related topics according to
non-technical challenges have attracted attention, prompting each factor.
the scientific community to put forward new architecture sug- Uslu, Eren, Gür and Özcan [26] investigated companies'
Jo
gestions to support topics such as security, mobility, perfor- IoT difficulties using multi-criteria decision-making methods.
mance reliability and social content [109]. At the end of this The results showed that challenges related to technologies
subperiod, IoT became one of the pillars of industry 4.0 [1], (e.g., architecture, design, hardware) are the main difficulties
partly due to the German government's strategic plan “High- faced by experts. The second most crucial difficulty was pri-
Tech Strategy 2020” [1]. vacy and security using multi, followed by communication,
From the second subperiod to the third subperiod (shown job, legal regulations and culture.
in Fig. 6. below), 146 (44%) keywords were repeated, 187 Hameed, Khan, and Hameed [113] provided an updated
were lost and 6.265 new keywords were used, totalizing overview of IoT challenges in terms of security and privacy.
6,411. Besides, 2,832 articles were published in the scientific The authors classified five (5) security requirements: confi-
literature. This subperiod is represented by five (5) such as dentiality, privacy, safe routing, robust and resilient manage-
“SECURITY”, “CLOUD-COMPUTING”, “SENSOR”, ment and damage detection. They also provided future direc-
“M2M” and “SEMANTIC-WEB”. This subperiod highlights tions for each challenge.
the use of IoT with others industry 4.0 technologies and con- Pereira and Pereira [114] explored the trends and chal-
cepts. In this sense, industry 4.0 initiated the significant lenges of IoT. The main challenges were 6LoWPANs (20),
growth of IoT by attracting the scientific community to de- data storage, software, cloud computing infrastructure and big
velop smart environments through Machine-to-Machine data (volume, velocity, variety and veracity).
Communication (M2M), a data transference among systems Čolaković and Hadžialić [115] conducted an exhaustive
and sensors in the cloud. When data transfer and management review to identify the challenges of IoT. The results show 13
increase, the need for security protocols becomes a challenge. research areas: standardization, system architecture, interop-
In this sense, the most representative cluster is “SECURITY”. erability and integration, availability and reliability, data stor-
If security is ignored, the development of IoT will be re- age and processing, scalability, management and self-config-
stricted, and personal and strategic information may be leaked uration, performance and QoS, identification and unique
[110, 111]. Therefore, to ensure a secure IoT network, prop-
erties such as availability, authenticity, confidentiality, integ-
rity and non-repudiation became attractive to researchers
DIGITAL COMMUNICATIONS AND NETWORKS 9
of
ro
-p
re
lP
na
ur
Jo
Figure 6. Thematic evolution structure of IoT (2002 - 2019). main challenges: cloud computing, social network, infrastruc-
ture, data management and computational intelligence.
identity, power and energy consumption, security and privacy, Miorandi, Sicari, De Pellegrini and Chlamtac [119] intro-
environmental issues. duced of applications, technologies and main challenges of
Raja, Rajkumar, and Raj [116] reviewed the challenges IoT. The results highlighted five (5) main challenges: compu-
and issues of IoT in literature. The main challenges high- ting, communication and identification technologies, distrib-
lighted the need to build smart platforms, middleware to inte- uted intelligence, security and privacy.
grate devices, fog computing, data storage, privacy and secu- Bujari, Furini, Mandreoli, Martoglia, Montangero and
rity. Ronzani [120] explored the limitations of using IoT and high-
Lee and Lee [117] explored the role of IoT, investments, lighted possible solutions. The authors pointed out four (4)
challenges and difficulties for companies. The results show main challenges: interoperability, lack of a visible business
five (5) main challenges: data management, data mining, pri- model, privacy and security.
vacy, security and chaos challenge. Hammoudi, Aliouat and Harous [121] highlighted the
Tsai, Lai and Vasilakos [118] explored the future IoT, its main challenges of IoT and possible solutions to overcome
main challenges and issues. The research describes five (5) these difficulties. This research identified 12 main challenges:
architecture, security, privacy, standardization, the quantity of
10 DIGITAL COMMUNICATIONS AND NETWORKS
data, high energy consumption, storage, availability, reliabil- proposed future directions and pointed out challenges. The re-
ity, management, interoperability and need for high technol- sults show seven (7) major challenges: monitoring, pro-
ogy cessing, analyzing and managing data, interoperability, pri-
Silva, Khan and Han [7] reviewed the challenges, architec- vacy, and security.
tures, emerging technologies in the IoT environment and pos-
sible solutions. The results show seven (7) main challenges: Table 5
availability, performance, security, reliability, scalability, in- Main challenges, limitations and difficulties of IoT.
teroperability, and mobility.
Miloslavskaya and Tolstoy [122] investigated the chal-
Factor Topics related Authors Sum
lenges and solutions of information security in the IoT envi-
[26], [113], [115], [116],
ronment. The results highlighted six (6) major challenges: a Data Privacy
[117], [119], [120],
large number of Internet-oriented IoT devices, the demand for Priv. Network Security
[121], [7], [122], [123],
and IoT Device Security 20
high technology, lack of standardization, data management, Sec. Software Security
[124], [125], [126],
privacy and security. [127], [128], [129],
Conflict of Interest
[131], [132], [133]
Kiani [123] investigated trends and challenges of manage- Architecture and Design [26], [114], [115], [116],
ment architecture for IoT. The authors highlighted eight (8) Heterogeneity of De- [119], [121], [7], [123],
challenges: Security, load balancing, energy consumption, Tech. vices [124], [125], [126], 19
of
QoS, the quantity of data, data management, mobility man- Hardware Structure [127], [129], [132],
Fault Tolerance [133]
agement and energy management. [26], [114], [115], [116],
ro
Balaji, Nathani and Santhakumar [124] explored the role Addressing [117], [118], [119],
of IoT in healthcare, smart city, industrial, agriculture, and the Com.
Data Management [120], [121], [7], [122],
19
main challenges and future directions related to IoT frame- Infrastructure [123], [124], [125],
works. This research highlighted eight (8) major challenges:
the vast number of devices, cost, maintenance, energy con-
-p Software
Business Model
[127], [128], [130],
[131], [132]
re
sumption, internet connections, interoperability, security, and Investing in Internet
privacy. Develop. of Objects [26], [115], [117],
Economic Development [120], [121], [7], [122],
lP
tion, data processing, privacy, data quality and data interpre- Service Quality
Data Usage Rate
tation. Ownership
Xue, Li, Nazarian and Bogdan [126] developed a mathe- [26], [115], [121],
Legal Standardization
[122], [124], [125],
ur
9
matical modeling structure to identify IoT characteristics Reg. Global Cooperation of
[127], [130], [131]
from a macro approach. The authors highlighted six (6) major the Company
Obligation
challenges: efficient sensing, cost, robustness, energy effi-
Jo
Examples of recent cloud limitations are related to delay due better applicability of the algorithm due to advances in IoT
to physical distances. Then, in order to enhance data pro- technologies.
cessing in cloud-based centralized servers [4], it is necessary Table 5 highlighted that privacy and security are the main
to use more robust techniques to ensure high performance, challenges and difficulties of IoT as noted by researchers, fol-
e.g., cellular network edge [4], mobile cloud computing [5], lowed by technology, communication, job, legal regulations
mobile edge computing and energy harvesting [6]. and cultural aspects. These results reinforce the main chal-
Future works should pursue such issues in order to provide lenges faced by Uslu, Eren, Gür and Özcan [26]. In order to
in-depth investigations using BPNA and exhaustive SLRs. promote IoT security and privacy, we recommend future work
Although “AUTHENTICATION” is a highly central and related to patterns found in Fig 5a, which shows that research-
dense motor theme, discussions related to the user and device ers have been committed to methods such as “ELLIPTIC-
authentication techniques are still a significant challenge for CURVE CRYPTOGRAPHY”, “AVISPA” and “PHYSI-
smart organizations, especially regarding data security and CALLY-UNCLONABLE-FUNCTION”. The development of
privacy (Fig. 6 and Table 5). The authentication challenge is authentication based on Elliptical Curve Cryptography (ECC)
closely related to the cluster “SECURITY” (Fig. 5a), which is expanding since this is a low-cost method with smaller key
is one of the key themes in the fourth subperiod (Fig. 6). Be- size and less memory footprint. ECC is also used as the basis
sides, the most discussed themes in recent years (subperiod of the digital signature algorithm elliptic curve that provides
2017 – 2019) shows that even though many technologies, entity and data-origin authentication, non-repudiation ser-
of
such as machine learning, fog computing, cyber-physical sys- vices and integrity protection. The automated validation of in-
tems and embedded systems, seem to be of great significance ternet security protocols and applications (AVISPA) is a sim-
ro
to the technological transformation in organizations, the con- ulation tool that can simulate attacks to test the authenticated
cern is similarly critical when it comes to security and opti- protocols. Physically Unclonable Functions (PUFs) map an
mization. These themes highlight the need for future research entry to a unique exit and this kind of system offers a low cost
on IoT technologies and their integration. From this perspec-
tive, new frameworks will be required to optimize organiza-
-p
and addresses challenges like privacy and security.
The results presented here make evident future work needs
re
tional processes and technological implementation, as well as to address the most frequently mentioned challenges (technol-
security techniques. ogy, communication and security). In order to move forward
lP
Hence, we recommend that future research be related to exploiting the full potential of IoT’s benefits, efforts must fo-
security and authentication themes, as well as related to the cus on developing cultural challenges, especially appropriate
clusters in the fourth subperiod, because these themes are the education and training on IoT methods and concepts because
na
most representative in today's research field. The conceptual of the high complexity of using IoT properly, which requires
network structures (Fig. 5) can also be extended in future re- the efforts from universities, governments and companies.
search because they the interrelationships of the main clusters Our findings reveal several patterns related to security and
ur
related to IoT. More research on IoT applications can be car- privacy issues, data management, interoperability, energy ef-
ried out in different scenarios and sectors, such as smart cities, ficiency and consumption, QoS, IoT technologies, and infra-
healthcare, industry, supply chain, public security, agricul- structure. Therefore, is reasonable to suggest that more re-
Jo
ture, and education. In addition, the use of such technologies search related to these topics be carried out to support re-
should focus on developing approaches to reach perspectives search in the IoT field of research. We also suggest more em-
beyond productivity efficiency. Such efforts must able to act pirical studies to understand the challenges and difficulties in
for the interests of sustainable development and the satisfac- practice since only 1 document [26] of SLR presented reports
tion of enterprise stakeholders. from IoT practitioners.
This research allowed us to find hidden patterns in a large
amount of data to propose future works in the IoT field using 7. Conclusion
SciMAT and PRISMA protocols. For instance, the strategic
diagram in Fig. 4. helps understand in which topics are the This research aimed to conduct a BPNA supported by an
IoT scientific community putting the most effort and which SLR into the IoT field to investigate the strategic themes and
topics are the most important to advance the IoT field of re- its conceptual network structure, thematic evolution structure,
search. In this sense, future research related to motor themes and the main challenges and difficulties. Our findings pre-
(authentication, 6LoWPANs, industry 4.0, smart cities, cloud sented many publications over time, especially after the emer-
computing, among others) is particularly urgent and crucial. gence of the industry 4.0 concept. The most productive and
However, we also suggest future research work in emerging cited researchers and the universities and journals related to
or declining themes, such as 3D printing, M2M communica- IoT were also presented. Thirty-one (31) main clusters were
tion, etc., to support new subjects to gain momentum and mit- plotted in a strategic diagram and classified according to their
igate the decline of promising themes. centrality and density. The most developed and important of
The thematic evolution structure in Fig 6 showed how these are related to security and privacy, industry 4.0 technol-
themes are evolved over time and how the number of key- ogies, development of smart cities and software systems prop-
words is increases. As for future research, we propose to carry erties. The thematic evolution structure presented the signifi-
out research related to the last themes (fourth subperiod), such cant cluster over time in terms of centrality and density. The
as cyber-physical systems, fog computing, machine learning, SLR revealed the main challenges and difficulties of IoT.
etc. However, old themes such as ant colony (first subperiod) The limitations of this research also must be noted. Only
seem to gain momentum since the research emphasizes the the major themes and associated subthemes were examined.
12 DIGITAL COMMUNICATIONS AND NETWORKS
The analysis was limited to papers and reviews in English, visibility and traceability using laser-scanners," Procedia
using only the WoS database. Hence, a potential research Manufacturing, vol. 10, pp. 1-14, 2017.
agenda is to extend this research to include publications in [9] J. Manyika et al., "Unlocking the Potential of the Internet of Things,"
other languages and use other databases. McKinsey Global Institute, 2015.
This research does not provide possible solutions to these [10] P. Fraga-Lamas, T. M. Fernández-Caramés, M. Suárez-Albela, L.
challenges and difficulties, nor does it discuss the perfor- Castedo, and M. González-López, "A review on internet of things for
mance of proposed solutions. Future work may provide a co- defense and public safety," Sensors, vol. 16, no. 10, p. 1644, 2016.
operative network among researchers, countries, and univer- [11] A. M. Rahmani et al., "Exploiting smart e-Health gateways at the
sities, which may help improve decision-making in IoT re- edge of healthcare Internet-of-Things: A fog computing approach,"
search. We used only SciMAT to perform this science map- Future Generation Computer Systems, vol. 78, pp. 641-658, 2018.
ping. Therefore, future studies can be carried out using other
[12] M. Babar and F. Arif, "Real-time data processing scheme using big
bibliometric software, such as VOSviewer, CiteSpace,
data analytics in internet of things based smart transportation
Sci2tool, etc., in order to find hidden patterns in databases and
environment," Journal of Ambient Intelligence and Humanized
give contrast with our results.
Computing, vol. 10, no. 10, pp. 4167-4177, 2019.
Lastly, future research may further explore the subthemes
[13] A. Perles et al., "An energy-efficient internet of things (IoT)
of the motor themes, as well as other themes (basic and trans-
versal, emerging or declining and highly developed and iso- architecture for preventive conservation of cultural heritage," Future
of
lated themes), its challenges and limitations, so as to support Generation Computer Systems, vol. 81, pp. 566-581, 2018.
future research in the context of the IoT. [14] J. Iqbal et al., "A generic Internet of Things architecture for
ro
controlling electrical energy consumption in smart homes,"
Acknowledgment Sustainable cities and society, vol. 43, pp. 443-450, 2018.
[15] M. Ben-Daya, E. Hassini, and Z. Bahroun, "Internet of things and
This study was financed in part by the Coordenação de Aper-
feiçoamento de Pessoal de Nível Superior - Brazil (CAPES) -
-p supply chain management: a literature review," International Journal
of Production Research, vol. 57, no. 15-16, pp. 4719-4742, 2019.
re
Finance Code 001 and the Spanish Ministry of Science and [16] Y. Lu and J. Cecil, "An Internet of Things (IoT)-based collaborative
Innovation under grants PID2019-105381GA-100 (iScience). framework for advanced manufacturing," The International Journal
lP
The authors thank to the Consejo Nacional de Ciencia y of Advanced Manufacturing Technology, vol. 84, no. 5-8, pp. 1141-
Tecnología (CONACYT) and Dirección General de Rela- 1152, 2016.
ciones Exteriores (DGRI), Mexico, for the support provided [17] R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of
na
to carry out this study. K.-K. R. Choo was supported in part security and privacy in distributed internet of things," Computer
by the Cloud Technology Endowed Professorship. Networks, vol. 57, no. 10, pp. 2266-2279, 2013.
[18] M. A. Khan and K. Salah, "IoT security: Review, blockchain
ur
[1] L. M. Kipper, L. B. Furstenau, D. Hoppe, R. Frozza, and S. Iepsen, [19] S. Banerjee et al., "A Provably Secure and Lightweight Anonymous
"Scopus scientific mapping production in industry 4.0 (2011–2018): User Authenticated Session Key Exchange Scheme for Internet of
a bibliometric analysis," International Journal of Production Things Deployment," IEEE Internet of Things Journal, vol. 6, no. 5,
Research, vol. 58, no. 6, pp. 1605-1627, 2020. pp. 8739-8752, 2019.
[2] D. Gil, A. Ferrández, H. Mora-Mora, and J. Peral, "Internet of things: [20] M. Abdel-Basset, N. A. Nabeeh, H. A. El-Ghareeb, and A.
A review of surveys based on context aware intelligent services," Aboelfetouh, "Utilising neutrosophic theory to solve transition
Sensors, vol. 16, no. 7, p. 1069, 2016. difficulties of IoT-based enterprises," Enterprise Information
[3] C. J. D’Orazio, K.-K. R. Choo, and L. T. Yang, "Data exfiltration Systems, pp. 1-21, 2019.
from Internet of Things devices: iOS devices as case studies," IEEE [21] D. Mishra, A. Gunasekaran, S. J. Childe, T. Papadopoulos, R. Dubey,
Internet of Things Journal, vol. 4, no. 2, pp. 524-535, 2016. and S. Wamba, "Vision, applications and future challenges of Internet
[4] Z. Chen, W. Liao, K. Hua, C. Lu, and W. Yu, "Towards asynchronous of Things," Industrial Management & Data Systems, vol. 116, no. 7,
federated learning for heterogeneous edge-powered internet of pp. 1331-1355, 2016.
things," Digital Communications and Networks, 2021. [22] G. C. Nobre and E. Tavares, "Scientific literature analysis on big data
[5] Y. Li, S. Xia, B. Cao, and Q. Liu, "Lyapunov optimization based and internet of things applications on circular economy: a
trade-off policy for mobile cloud offloading in heterogeneous bibliometric study," Scientometrics, vol. 111, no. 1, pp. 463-492,
wireless networks," IEEE Transactions on Cloud Computing, 2019. 2017.
[6] S. Xia, Z. Yao, Y. Li, and S. Mao, "Online Distributed Offloading and [23] Y. Bouzembrak, M. Klüche, A. Gavai, and H. J. Marvin, "Internet of
Computing Resource Management with Energy Harvesting for Things in food safety: Literature review and a bibliometric analysis,"
Heterogeneous MEC-enabled IoT," IEEE Transactions on Wireless Trends in Food Science & Technology, 2019.
Communications, 2021. [24] A. Kaba and C. K. Ramaiah, "Bibliometric Analysis of Research
[7] B. N. Silva, M. Khan, and K. Han, "Internet of things: A Output on the Internet of Things in the Arab World," DESIDOC
comprehensive review of enabling technologies, architecture, and Journal of Library & Information Technology, vol. 39, no. 5, 2019.
challenges," IETE Technical review, vol. 35, no. 2, pp. 205-220, [25] X. Li, C. Pak, and K. Bi, "Analysis of the development trends and
2018. innovation characteristics of Internet of Things technology–based on
[8] R. Y. Zhong, X. Xu, and L. Wang, "IoT-enabled smart factory patentometrics and bibliometrics," Technology Analysis & Strategic
DIGITAL COMMUNICATIONS AND NETWORKS 13
Management, vol. 32, no. 1, pp. 104-118, 2020. de biocompósitos nos processos de impressões 3D," Revista Ibero-
[26] B. Uslu, T. Eren, Ş. Gür, and E. Özcan, "Evaluation of the difficulties Americana de Ciências Ambientais, vol. 11, no. 1, pp. 236-250, 2020.
in the internet of things (IoT) with multi-criteria decision-making," [42] L. B. Furstenau et al., "Link between sustainability and industry 4.0:
Processes, vol. 7, no. 3, p. 164, 2019. trends, challenges and new perspectives," IEEE Access, vol. 8, pp.
[27] A. Aghaei Chadegani et al., "A comparison between two main 140079-140096, 2020.
academic literature collections: Web of Science and Scopus [43] M. K. Sott et al., "Precision Techniques and Agriculture 4.0
databases," Asian Social Science, vol. 9, no. 5, pp. 18-26, 2013. Technologies to Promote Sustainability in the Coffee Sector: State of
[28] M. J. Cobo, A. G. López‐Herrera, E. Herrera‐Viedma, and F. Herrera, the Art, Challenges and Future Trends," IEEE Access, vol. 8, pp.
"SciMAT: A new science mapping analysis software tool," Journal of 149854-149867, 2020.
the American Society for Information Science and Technology, vol. [44] M. K. Sott, M. S. Bender, L. B. Furstenau, L. M. Machado, M. J.
63, no. 8, pp. 1609-1630, 2012. Cobo, and N. L. Bragazzi, "100 years of scientific evolution of work
[29] M. J. Cobo, A. G. López‐Herrera, E. Herrera‐Viedma, and F. Herrera, and organizational psychology: a bibliometric network analysis from
"Science mapping software tools: Review, analysis, and cooperative 1919 to 2019," Frontiers in Psychology, vol. 11, 2020.
study among tools," Journal of the American Society for Information [45] L. B. Furstenau et al., "An overview of 42 years of lean production:
Science and Technology, vol. 62, no. 7, pp. 1382-1402, 2011. applying bibliometric analysis to investigate strategic themes and
[30] M. L. Kolling et al., "Data Mining in Healthcare: Applying Strategic scientific evolution structure," Technology Analysis & Strategic
of
Intelligence Techniques to Depict 25 Years of Research Management, pp. 1-20, 2021.
Development," International Journal of Environmental Research and [46] L. B. Furstenau et al., "A Bibliometric Network Analysis of
ro
Public Health, vol. 18, no. 6, p. 3099, 2021. Coronavirus during the First Eight Months of COVID-19 in 2020,"
[31] L. B. Furstenau et al., "20 Years of Scientific Evolution of Cyber International Journal of Environmental Research and Public Health,
Security: a Science Mapping." vol. 18, no. 3, p. 952, 2021.
[32] J.-R. López-Robles, J. R. Otegi-Olaso, I. P. Gomez, N.-K. Gamboa-
Rosales, H. Gamboa-Rosales, and H. Robles-Berumen,
-p
[47] A. Liberati et al., "The PRISMA statement for reporting systematic
reviews and meta-analyses of studies that evaluate health care
re
"Bibliometric network analysis to identify the intellectual structure interventions: explanation and elaboration," Annals of internal
and evolution of the big data research field," in International medicine, vol. 151, no. 4, pp. W-65-W-94, 2009.
lP
Conference on Intelligent Data Engineering and Automated [48] D. Moher, A. Liberati, J. Tetzlaff, and D. G. Altman, "Preferred
Learning, 2018: Springer, pp. 113-120. reporting items for systematic reviews and meta-analyses: the
[33] J.-R. López-Robles, J.-R. Otegi-Olaso, I. P. Gómez, and M.-J. Cobo, PRISMA statement," Annals of internal medicine, vol. 151, no. 4, pp.
na
[34] J.-R. López-Robles, J. Guallar, J.-R. Otegi-Olaso, and N.-K. [50] M. Tuters and K. Varnelis, "Beyond locative media: Giving shape to
Gamboa-Rosales, "El profesional de la información (EPI): the internet of things," Leonardo, vol. 39, no. 4, pp. 357-363, 2006.
Jo
bibliometric and thematic analysis (2006-2017)," El profesional de la [51] J. Cooper and A. James, "Challenges for database management in the
información, vol. 28, no. 4, p. e280417, 2019. internet of things," IETE Technical Review, vol. 26, no. 5, pp. 320-
[35] M. K. Sott et al., "Agriculture 4.0 and Smart Sensors. The Scientific 329, 2009.
Evolution of Digital Agriculture: Challenges and Opportunities," [52] E. Welbourne et al., "Building the internet of things using RFID: the
2021. RFID ecosystem experience," IEEE Internet computing, vol. 13, no.
[36] P. P. Severo, L. B. Furstenau, M. K. Sott, D. Cossul, M. S. Bender, 3, pp. 48-55, 2009.
and N. L. Bragazzi, "Thirty Years of Human Rights Study in the Web [53] M. Zorzi, A. Gluhak, S. Lange, and A. Bassi, "From today's intranet
of Science Database (1990–2020)," International Journal of of things to a future internet of things: a wireless-and mobility-related
Environmental Research and Public Health, vol. 18, no. 4, p. 2131, view," IEEE Wireless communications, vol. 17, no. 6, pp. 44-51,
2021. 2010.
[37] M. K. Sott et al., "Process modeling for smart factories: using science [54] R. Rafael, A. Shirley, and A. Liveris, "Report to the president
mapping to understand the strategic themes, main challenges and accelerating US advanced manufacturing. Report, US," ed:
future trends," Business Process Management Journal, 2021. Washington DC: Report, 2014.
[38] J. López-Robles et al., "The relationship between Project [55] H. Kagermann, J. Helbig, A. Hellinger, and W. Wahlster,
Management and Industry 4.0: Bibliometric analysis of main Recommendations for implementing the strategic initiative
research areas through Scopus," Research and Education in Project INDUSTRIE 4.0: Securing the future of German manufacturing
Management (Bilbao, 2020), p. 56. industry; final report of the Industrie 4.0 Working Group.
[39] L. M. Kipper et al., "Scientific mapping to identify competencies Forschungsunion, 2013.
required by industry 4.0," Technology in Society, vol. 64, p. 101454. [56] X. Li, J. Niu, S. Kumari, F. Wu, A. K. Sangaiah, and K.-K. R. Choo,
[40] L. B. Furstenau, L. M. Kipper, R. Frozza, and D. Hoppe, "Proposta "A three-factor anonymous authentication scheme for wireless sensor
de aplicação do software Quality Function Deployment em ambiente networks in internet of things environments," Journal of Network and
computacional," Revista Jovens Pesquisadores, vol. 9, no. 2, pp. 57- Computer Applications, vol. 103, pp. 194-204, 2018.
76, 2019. [57] X. Li, J. Peng, J. Niu, F. Wu, J. Liao, and K.-K. R. Choo, "A robust
[41] A. L. E. Silva, J. A. R. Moraes, L. B. Benitez, E. A. Kaufmann, and and energy efficient authentication protocol for industrial internet of
L. B. Furstenau, "Mapeamento da produção científica acerca do uso things," IEEE Internet of Things Journal, vol. 5, no. 3, pp. 1606-1615,
14 DIGITAL COMMUNICATIONS AND NETWORKS
of
[63] W. Z. Khan, E. Ahmed, S. Hakak, I. Yaqoob, and A. Ahmed, "Edge [81] H. Assem, L. Xu, T. S. Buda, and D. O’Sullivan, "Machine learning
computing: A survey," Future Generation Computer Systems, vol. 97, as a service for enabling Internet of Things and People," Personal and
ro
pp. 219-235, 2019. Ubiquitous Computing, vol. 20, no. 6, pp. 899-914, 2016.
[64] S. Heidari and R. Buyya, "Quality of Service (QoS)-driven resource [82] S. Zeadally and M. Tsikerdekis, "Securing Internet of Things (IoT)
provisioning for large-scale graph processing in cloud computing with machine learning," International Journal of Communication
environments: Graph Processing-as-a-Service (GPaaS)," Future
Generation Computer Systems, vol. 96, pp. 490-501, 2019.
-p
[83]
Systems, vol. 33, no. 1, p. e4169, 2020.
J. Chen and X. Ran, "Deep learning with edge computing: A review,"
re
[65] Y. Li, H. Ma, L. Wang, S. Mao, and G. Wang, "Optimized Content Proceedings of the IEEE, vol. 107, no. 8, pp. 1655-1674, 2019.
Caching and User Association for Edge Computing in Densely [84] L. Zhang, Y.-C. Liang, and D. Niyato, "6G Visions: Mobile ultra-
lP
Deployed Heterogeneous Networks," IEEE Transactions on Mobile broadband, super internet-of-things, and artificial intelligence,"
Computing, 2020. China Communications, vol. 16, no. 8, pp. 1-14, 2019.
[66] R. Khamisy-Farah, L. B. Furstenau, J. D. Kong, J. Wu, and N. L. [85] F. Fraile, R. Sanchis, R. Poler, and A. Ortiz, "Reference Models for
na
Bragazzi, "Gynecology meets big data in the disruptive innovation Digital Manufacturing Platforms," Applied Sciences, vol. 9, no. 20,
medical era: State-of-art and future prospects," International Journal p. 4433, 2019.
of Environmental Research and Public Health, vol. 18, no. 10, p. [86] M. Kim, N. Y. Lee, and J. H. Park, "A Security Generic Service
ur
4.0," Sage Open, vol. 6, no. 2, p. 2158244016653987, 2016. [87] J. D. C. Silva, J. J. P. Rodrigues, K. Saleem, S. A. Kozlov, and R. A.
[68] J. H. Park and J. H. Park, "Blockchain security in cloud computing: Rabêlo, "M4DN. IoT-A Networks and Devices Management
Use cases, challenges, and solutions," Symmetry, vol. 9, no. 8, p. 164, Platform for Internet of Things," IEEE Access, vol. 7, pp. 53305-
2017. 53313, 2019.
[69] H. Boyes, B. Hallaq, J. Cunningham, and T. Watson, "The industrial [88] G. Marques, R. Pitarma, N. M Garcia, and N. Pombo, "Internet of
internet of things (IIoT): An analysis framework," Computers in Things Architectures, Technologies, Applications, Challenges, and
Industry, vol. 101, pp. 1-12, 2018. Future Directions for Enhanced Living Environments and Healthcare
[70] Y. Lu, "Cyber physical system (CPS)-based industry 4.0: a survey," Systems: A Review," Electronics, vol. 8, no. 10, p. 1081, 2019.
Journal of Industrial Integration and Management, vol. 2, no. 03, p. [89] R. C. Motta, K. M. de Oliveira, and G. H. Travassos, "A conceptual
1750014, 2017. perspective on interoperability in context-aware software systems,"
[71] S. Gierej, "Big data in the industry-overview of selected issues," Information and Software Technology, vol. 114, pp. 231-257, 2019.
Management Systems in production engineering, vol. 25, no. 4, pp. [90] M. Noura, M. Atiquzzaman, and M. Gaedke, "Interoperability in
251-254, 2017. internet of things: Taxonomies and open challenges," Mobile
[72] A. Le, J. Loo, A. Lasebae, M. Aiash, and Y. Luo, "6LoWPAN: a study Networks and Applications, vol. 24, no. 3, pp. 796-809, 2019.
on QoS security threats and countermeasures using intrusion [91] A. J. Jara, A. C. Olivieri, Y. Bocchi, M. Jung, W. Kastner, and A. F.
detection system approach," International Journal of Communication Skarmeta, "Semantic web of things: an analysis of the application
Systems, vol. 25, no. 9, pp. 1189-1212, 2012. semantics for the iot moving towards the iot convergence,"
[73] C. Hennebert and J. Dos Santos, "Security protocols and privacy International Journal of Web and Grid Services, vol. 10, no. 2-3, pp.
issues into 6LoWPAN stack: A synthesis," IEEE Internet of Things 244-272, 2014.
Journal, vol. 1, no. 5, pp. 384-398, 2014. [92] A. S. Tanenbaum and M. Van Steen, Distributed systems: principles
[74] J. Granjal, E. Monteiro, and J. S. Silva, "Security in the integration and paradigms. Prentice-Hall, 2007.
of low-power Wireless Sensor Networks with the Internet: A survey," [93] W. Viriyasitavat, L. Da Xu, Z. Bi, and A. Sapsomboon, "New
Ad Hoc Networks, vol. 24, pp. 264-287, 2015. Blockchain-Based Architecture for Service Interoperations in
[75] P. O. Kamgueu, E. Nataf, and T. D. Ndie, "Survey on RPL Internet of Things," IEEE Transactions on Computational Social
enhancements: a focus on topology, security and mobility," Systems, vol. 6, no. 4, pp. 739-748, 2019.
DIGITAL COMMUNICATIONS AND NETWORKS 15
[94] L. Feng, H. Zhang, Y. Chen, and L. Lou, "Scalable dynamic multi- vol. 66, pp. 198-213, 2016.
agent practical byzantine fault-tolerant consensus in permissioned [113] S. Hameed, F. I. Khan, and B. Hameed, "Understanding security
blockchain," Applied Sciences, vol. 8, no. 10, p. 1919, 2018. requirements and challenges in Internet of Things (IoT): A review,"
[95] S. Hu, C. Tang, F. Liu, and X. Wang, "A distributed and efficient Journal of Computer Networks and Communications, vol. 2019,
system architecture for smart home," International Journal of Sensor 2019.
Networks, vol. 20, no. 2, pp. 119-130, 2016. [114] R. Pereira and E. G. Pereira, "Future internet: trends and challenges,"
[96] V. B. Souza et al., "Towards a proper service placement in combined International Journal of Space-Based and Situated Computing, vol.
Fog-to-Cloud (F2C) architectures," Future Generation Computer 5, no. 3, pp. 159-167, 2015.
Systems, vol. 87, pp. 1-15, 2018. [115] A. Čolaković and M. Hadžialić, "Internet of Things (IoT): A review
[97] R. Chen, J. Guo, and F. Bao, "Trust management for SOA-based IoT of enabling technologies, challenges, and open research issues,"
and its application to service composition," IEEE Transactions on Computer Networks, vol. 144, pp. 17-39, 2018.
Services Computing, vol. 9, no. 3, pp. 482-495, 2014. [116] S. Raja, T. D. Rajkumar, and V. P. Raj, "Internet of things:
[98] F. Wang, L. Hu, J. Zhou, and K. Zhao, "A data processing middleware Challenges, issues and applications," Journal of Circuits, Systems
based on SOA for the internet of things," Journal of Sensors, vol. and Computers, vol. 27, no. 12, p. 1830007, 2018.
2015, 2015. [117] I. Lee and K. Lee, "The Internet of Things (IoT): Applications,
[99] T. Cerny, "Aspect-oriented challenges in system integration with investments, and challenges for enterprises," Business Horizons, vol.
of
microservices, SOA and IoT," Enterprise Information Systems, vol. 58, no. 4, pp. 431-440, 2015.
13, no. 4, pp. 467-489, 2019. [118] C.-W. Tsai, C.-F. Lai, and A. V. Vasilakos, "Future Internet of Things:
ro
[100] F. J. Rammig, "Towards self-coordinating ubiquitous computing open issues and challenges," Wireless Networks, vol. 20, no. 8, pp.
environments," in International Conference on Embedded and 2201-2217, 2014.
Ubiquitous Computing, 2006: Springer, pp. 2-13. [119] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, "Internet of
[101] Y. Zhang, Y. Yu, S. Zhang, Y. Luo, and L. Zhang, "Ant colony
optimization for Cuckoo Search algorithm for permutation flow shop
-p things: Vision, applications and research challenges," Ad hoc
networks, vol. 10, no. 7, pp. 1497-1516, 2012.
re
scheduling problem," Systems Science & Control Engineering, vol. [120] A. Bujari, M. Furini, F. Mandreoli, R. Martoglia, M. Montangero,
7, no. 1, pp. 20-27, 2019. and D. Ronzani, "Standards, security and business models: key
lP
[102] N. Zhang, "Smart Logistics Path for Cyber-Physical Systems With challenges for the IoT scenario," Mobile Networks and Applications,
Internet of Things," IEEE Access, vol. 6, pp. 70808-70819, 2018. vol. 23, no. 1, pp. 147-154, 2018.
[103] T. Qiu, B. Li, W. Qu, E. Ahmed, and X. Wang, "TOSG: A topology [121] S. Hammoudi, Z. Aliouat, and S. Harous, "Challenges and research
na
optimization scheme with global small world for industrial directions for Internet of Things," Telecommunication Systems, vol.
heterogeneous Internet of Things," IEEE Transactions on Industrial 67, no. 2, pp. 367-385, 2018.
Informatics, vol. 15, no. 6, pp. 3174-3184, 2018. [122] N. Miloslavskaya and A. Tolstoy, "Internet of Things: information
ur
[104] L. Zhou, Z. Li, N. Shi, S. Liu, and K. Xiong, "Performance Analysis security challenges and solutions," Cluster Computing, vol. 22, no.
of Three Intelligent Algorithms on Route Selection of Fishbone 1, pp. 103-119, 2019.
Jo
Layout," Sustainability, vol. 11, no. 4, p. 1148, 2019. [123] F. Kiani, "A Survey on Management Frameworks and Open
[105] J. Xu, Z. Hao, R. Zhang, and X. Sun, "A method based on the Challenges in IoT," Wireless Communications and Mobile
combination of laxity and ant colony system for cloud-fog task Computing, vol. 2018, 2018.
scheduling," IEEE Access, vol. 7, pp. 116218-116226, 2019. [124] S. Balaji, K. Nathani, and R. Santhakumar, "IoT technology,
[106] G. Kortuem, F. Kawsar, V. Sundramoorthy, and D. Fitton, "Smart applications and challenges: a contemporary survey," Wireless
objects as building blocks for the internet of things," IEEE Internet personal communications, vol. 108, no. 1, pp. 363-388, 2019.
Computing, vol. 14, no. 1, pp. 44-51, 2009. [125] M. Harlamova, M. Kirikova, and K. Sandkuhl, "A survey on
[107] H. Ning and Z. Wang, "Future internet of things architecture: like challenges of semantics application in the internet of things domain,"
mankind neural system or social organization framework?," IEEE Applied Computer Systems, vol. 21, no. 1, pp. 13-21, 2017.
Communications Letters, vol. 15, no. 4, pp. 461-463, 2011. [126] Y. Xue, J. Li, S. Nazarian, and P. Bogdan, "Fundamental challenges
[108] Q. Z. Sheng, S. Zeadally, Z. Luo, J.-Y. Chung, and Z. Maamar, toward making the iot a reachable reality: A model-centric
"Ubiquitous RFID: Where are we?," Information Systems Frontiers, investigation," ACM Transactions on Design Automation of
vol. 12, no. 5, pp. 485-490, 2010. Electronic Systems (TODAES), vol. 22, no. 3, pp. 1-25, 2017.
[109] J. Pan, S. Paul, and R. Jain, "A survey of the research on future [127] P. J. Ryan and R. B. Watson, "Research challenges for the Internet of
internet architectures," IEEE Communications Magazine, vol. 49, no. Things: what role can OR play?," Systems, vol. 5, no. 1, p. 24, 2017.
7, pp. 26-36, 2011. [128] H. Ma, L. Liu, A. Zhou, and D. Zhao, "On networking of Internet of
[110] Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, "Security of the Things: Explorations and challenges," IEEE Internet of Things
Internet of Things: perspectives and challenges," Wireless Networks, Journal, vol. 3, no. 4, pp. 441-452, 2015.
vol. 20, no. 8, pp. 2481-2501, 2014. [129] S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, "A vision of IoT:
[111] N. Moustafa, B. Turnbull, and K.-K. R. Choo, "An ensemble Applications, challenges, and opportunities with china perspective,"
intrusion detection technique based on proposed statistical flow IEEE Internet of Things journal, vol. 1, no. 4, pp. 349-359, 2014.
features for protecting network traffic of internet of things," IEEE [130] H.-D. Ma, "Internet of things: Objectives and scientific challenges,"
Internet of Things Journal, vol. 6, no. 3, pp. 4815-4830, 2018. Journal of Computer science and Technology, vol. 26, no. 6, pp. 919-
[112] D. Airehrour, J. Gutierrez, and S. K. Ray, "Secure routing for internet 924, 2011.
of things: A survey," Journal of Network and Computer Applications, [131] D. Bandyopadhyay and J. Sen, "Internet of things: Applications and
16 DIGITAL COMMUNICATIONS AND NETWORKS
of
ro
-p
re
lP
na
ur
Jo
Declaration of interests
☒ The authors declare that they have no known competing financial interests or personal relationships
that could have appeared to influence the work reported in this paper.
☐The authors declare the following financial interests/personal relationships which may be considered
as potential competing interests:
of
ro
-p
re
lP
na
ur
Jo