You are on page 1of 18

Journal Pre-proof

Internet of things: Conceptual network structure, main challenges and future


directions

Leonardo B. Furstenau, Yan Pablo Reckziegel Rodrigues, Michele Kremer Sott,


Pedro Leivas, Michael S. Dohan, José Ricardo López-Robles, Manuel J. Cobo, Nicola
Luigi Bragazzi, Kim-Kwang Raymond Choo
PII: S2352-8648(22)00082-7
DOI: https://doi.org/10.1016/j.dcan.2022.04.027
Reference: DCAN 416

To appear in: Digital Communications and Networks

Received Date: 31 March 2021


Revised Date: 26 April 2022
Accepted Date: 28 April 2022

Please cite this article as: L.B. Furstenau, Y.P.R. Rodrigues, M.K. Sott, P. Leivas, M.S. Dohan,
José.Ricardo. López-Robles, M.J. Cobo, N.L. Bragazzi, K.-K. Raymond Choo, Internet of things:
Conceptual network structure, main challenges and future directions, Digital Communications and
Networks (2022), doi: https://doi.org/10.1016/j.dcan.2022.04.027.

This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition
of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of
record. This version will undergo additional copyediting, typesetting and review before it is published
in its final form, but we are providing this version to give early visibility of the article. Please note that,
during the production process, errors may be discovered which could affect the content, and all legal
disclaimers that apply to the journal pertain.

© 2022 Chongqing University of Posts and Telecommunications. Production and hosting by Elsevier
B.V. on behalf of KeAi Communications Co. Ltd.
1

Internet of things: conceptual network structure, main challenges and


future directions
Leonardo B. Furstenaua, Yan Pablo Reckziegel Rodriguesb, Michele Kremer Sottc, Pedro
Leivasb, Michael S. Dohand, José Ricardo López-Roblese, Manuel J. Cobof, Nicola Luigi
Bragazzig,*, Kim-Kwang Raymond Chooh,*
ª Department of Industrial Engineering, Federal University of Rio Grande do Sul, Porto Alegre 90035-190, Brazil; leonardo.furstenau@ufrgs.br
b
University of Santa Cruz do Sul, Av. Independência 2293, Santa Cruz do Sul - RS, Brazil, E-mail: yanrodrigues@mx2.unisc.br,
pedrooliveiral@hotmail.com

of
c
Business School, Unisinos University, Av. Dr. Nilo Peçanha 1600, 91330-002, Porto Alegre, Brazil, E-mail: sott.mk@gmail.com
d
Lakehead University, ON P7B 5E1, Thunderbay, Canada, E-mail: msdohan@lakeheadu.ca
e
Autonomous University of Zacatecas, Av. Ramón López Velarde Col. Centro, Zacatecas, 98000, Mexico, E-mail: ricardolopezrobles@outlook.com

ro
f
Department of Computer Science and Engineering, University of Cadiz, Paseo de Carlos III, 28, 11003 Cadiz, Spain, E-mail: manueljesus.cobo@uca.es
g
York University, ON M3J 1P3, Canada, E-mail: robertobragazzi@gmail.com
h

-p
Department of Information Systems and Cyber Security, the University of Texas at San Antonio, San Antonio, TX 78249 USA, E-mail: raymond.choo@ful-
brightmail.org
re
Elsevier use only: Received date here; revised date here; accepted date here
lP

* Corresponding author.
na

ABSTRACT
ur

Internet of Things (IoT) is a key technology trend that supports our digitalized society in applications such as smart countries and smart
cities. In this study, we investigated the existing strategic themes, thematic evolution structure, key challenges, and potential research
opportunities associated with the IoT. For this study, we conducted a Bibliometric Performance and Network Analysis (BPNA),
Jo

supplemented by an exhaustive Systematic Literature Review (SLR). Specifically, in BPNA, the software SciMAT was used to analyze
14,385 documents and 30,381 keywords in the Web of Science (WoS) database, which was released between 2002 and 2019. The results
revealed that 31 clusters are classified according to their importance and development, and the conceptual structures of key clusters are
presented, along with their performance analysis and the relationship with other subthemes. The thematic evolution structure described the
important cluster(s) over time. For the SLR, 23 documents were analyzed. The SLR revealed key challenges and limitations associated with
the IoT. We expect the results will form the basis of future research and guide decision-making in the IoT and other supporting industries.

Keywords: Internet of things, Strategic intelligence, Industry 4.0, SciMAT, Bibliometric analysis, Science mapping

1. Introduction

Internet of Things (IoT) is one of the key technologies sup- by 2025 [9, 10]. The IoT can be used to improve industries
porting the fourth Industrial Revolution and the concept of such as healthcare [11], transportation [12], energy [13, 14],
Industry 4.0 [1]. The IoT allows large amounts of data to be supply chain [15], manufacturing [16] and other industries.
collected and stored for further processing using connected Despite the potential benefits of IoT, several challenges and
devices [2, 3]. Generally, the data is processed in cloud-based limitations remain to be addressed. Examples of such chal-
centralized servers [4] that are powered by the latest robust lenges and limitations include security and privacy [17-19],
techniques to ensure high performance, e.g., cellular network communication, hardware and software, IoT-related skillsets,
edge [4], mobile cloud computing [5], mobile edge compu- regulation, legislation and culture [20].
ting and energy harvesting [6]. The results can then be used To better understand the IoT, researchers are working to
for decision-making at different levels [7] and facilitate real- understand its applications, challenges, barriers and trends, as
time interaction among different sectors and supply chain evidenced by existing literature reviews and surveys [7, 26,
partners [8]. Financial estimations show that the economic 113-133] and bibliometric analyses [21-25]. However, to the
impact of IoT will increase from $3.9 trillion to $11.1 trillion best of our knowledge, no study has conducted a complete
2 DIGITAL COMMUNICATIONS AND NETWORKS

analysis of the entire academic publication of the IoT (2002- The existing bibliometric analysis of IoT in Web of Sci-
2019) (see Table 1 in section 2). The bibliometric analysis ence (WoS) is shown in Table 1, presenting five (5) types of
supported by Systematic Literature Review (SLR) is an ap- research. The coverage and focus show the differences be-
propriate method to produce an overview of the research field tween the bibliometric approaches, highlighting the novelty
and identify obstacles and challenges, and inform future re- of this work in the last line.
searchers. Therefore, in this study, we conduct a Bibliometric Table 1
Performance and Network Analysis (BPNA) and then an SLR Existing bibliometric analysis of IoT in literature.
to fully understand the literature of the IoT. Study Coverage Focus
As part of the study, we will provide new insights to sup- Identification of the most critical studies, re-
port the discovery of research opportunities and gaps in the [21] 2000 - 2015 search themes and authors related to visions
literature. To this end, we depicted the strategic themes, the- and applications of IoT
Applications of IoT and big data on the circu-
matic evolution structure, key challenges, and future research [22] 2006 - 2015
lar economy environment.
directions of IoT. As a result, 31 clusters were plotted in a Exploration of the applications of IoT in food
[23] 2011 - 2018
strategic diagram and classified according to their centrality safety contexts.
and density. According to findings in the literature, the most [24] 2010 - 2017
Investigation of IoT field in the Arab coun-
tries.
developed and important motor themes in these clusters were
Trends and innovations analysis of IoT pa-
discussed. The thematic evolution structure presented the [25] 2004 - 2017
tents.

of
most significant cluster over time in terms of centrality and Holistic understanding of the strategic themes,
This
density and an in-depth discussion was made regarding the paper
2002 - 2019 thematic evolution structure, main challenges

ro
and future directions.
IoT history from 2002 to 2019. The SLR revealed the main
challenges and difficulties from 23 review articles, which
were classified according to six factors specified by Uslu, 2.1 Bibliometric performance and network analysis
Eren, Gür and Özcan [26]. We also presented the number of
publications over time, the most productive and cited re-
-p While there are Google Scholar and many databases (e.g.,
re
searchers, the universities and journals related to IoT. Scopus), studies have shown that the Web of Science (WoS)
database generally indexes influential/higher quality aca-
demic journals [27]. Therefore, in this study, we used the WoS
lP

2. Methodology and dataset


database. One of the search terms was “Internet of Things”. A
To achieve our goal, we execute a BPNA supported by an filter was used to find documents containing any of the search
terms in the title, abstract and keywords. The document types
na

exhaustive SLR. For the BPNA, the software SciMAT was


used to analyze all documents related to IoT. For the SLR, the sought were articles, articles in press and reviews. Data were
PRISMA protocol was used to analyze documents whose ob- extracted on December 16, 2019, using the SciMAT (Science
Mapping Analysis Software Tool [28]).
ur

jectives were to identify the challenges of IoT. The steps and


criteria to perform the BPNA and SLR are described below. A search was conducted by Cobo, López‐Herrera, Herrera‐
For this study, we propose three (3) research questions: Viedma and Herrera [29] to analyze nine (9) existing biblio-
Jo

metric software applications. The results highlighted that


RQ1: What are the strategic themes of IoT? there was no existing software in the literature that can ana-
RQ2: How is the scientific thematic structure of IoT evolved? lyze all the key elements of a science mapping. This problem
RQ3: What are the main challenges and limitations of IoT? forced the researchers to use other software simultaneously to
perform a

Figure 1. Strategic diagram (a). Thematic network structure


(b). Thematic evolution map (c).
DIGITAL COMMUNICATIONS AND NETWORKS 3

complete bibliometric analysis. Considering this research


problem, the SciMAT was developed by the same authors Identification 14,388
[28], which enables researchers to perform a complete bibli- DD = 3
ometric process [30]. It uses procedures, algorithms and
measurements at all stages of science mapping, from prepro- Screening 14,385
cessing to result visualization, and can also be downloaded
for free [31-34]. Considering all benefits of SciMAT, a robust EX = 13,924
preprocessing module is the most important since data ex-
Eligibility 461
ported from databases requires a rigorous information prepro-
cessing step to ensure quality data [35]. SciMAT can also cre- VR = 438
ate strategic diagrams (Fig. 1a) to visually identify the most
important themes, the conceptual network structures (Fig. 1b) Inclusion 23
to understand the relationship between authors, keywords or
references as well as the thematic evolution structure (Fig. Figure 2. The flow of information through the SLR.
1c), which helps to understand how the field evolves over
time [36]. The results of SciMAT can be used to enhance de- 3. Bibliometric performance analysis of IoT
cision-making [37] and provide future trends, literature gaps

of
and future directions in any research field [38-46]. Keywords Fig. 3 shows the number of publications of IoT between
were the analyzed items and the frequency of co-occurrence 2002 and 2019. It can be observed that the first article was
published in 2002 [49]. Some important studies were carried

ro
of the keywords was extracted. We applied the equivalence
index to calculate similarity. The clustering algorithm used to out in the following years [50-53] and continued to increase
identify themes was the Simple Center algorithm. In the data thereafter. IoT is known as one of the pillars of industry 4.0
collection, 14,388 documents were exported and included in
bibliometric analysis, including 33,489 keywords.
-p
[1]; this phenomenon may be related to the “advanced manu-
facturing partnership” (AMP) plan launched by the US gov-
re
To discover the evolution of the research themes in the ernment in 2011 [54] and the “High-Tech Strategy 2020” for-
whole period, the thematic evolution structure was studied. mulated by the German government in early of 2012 [1, 55].
The citation performance shows an increasing trend, high-
lP

To create this thematic evolution map, the inclusion index was


used. Fig. 1c demonstrates a classic map. Lines 1 and 2 (solid lighting positive prospects in the IoT field.
lines) depict that linked clusters share the core themes, line 3
na

(dashed line) indicates the clusters share elements that are not
the core themes, and the non-existence of a line implies dis-
continuity (new cluster). The thickness of the lines is propor-
ur

tional to the inclusion index, and the size of the clusters is


proportional to the number of related documents [28]. The
thematic evolution was divided into four subperiods: 2002 –
Jo

2006; 2007 – 2011; 2012 – 2016 and 2017 – 2019.

2.2 Systematic literature review

The SLR of this work aims to identify the challenges and


obstacles in the field of IoT. This method is based on the Pre-
ferred Reporting Items for Systematic Reviews and Meta-An- Figure 3. The number of publications over time (2002 -
alyzes (PRISMA) [47, 48]. The PRISMA is divided into four 2019).
phases: identification, screening, eligibility, and inclusion.
Fig. 2 shows the flowchart. For this SLR, we used the same Table 2 lists the most productive/cited authors from 2002
criteria used in BPNA in terms of database, period, and doc- to 2019. JJPC Rodrigues is the most productive researcher in
uments type. From the 14,388 documents exported from WoS, the field of IoT, with 66 publications, followed by KKR Choo
we excluded three (3) Duplicate Documents (DD) using End- and L.T. Yang. L. Atzori is the most cited writer with 6,351
note. For the screening, documents with titles containing citations, followed by A. Iera and G. Morabito.
“challenges”, “limits”, “limitations”, “difficulties”, “obsta-
cles”, and “barriers” searched (461). Articles without these
words in the title were excluded (EX=13,924). In the eligibil-
ity step, the documents selected (461) were read and those
vaguely related (VR=438) were excluded. Finally, 23 docu-
ments were included for qualitative analysis.
4 DIGITAL COMMUNICATIONS AND NETWORKS

Table 2
Most productive/cited authors from 2002 to 2019 4. Bibliometric network analysis of IoT from 2002 to
Most cited authors Cit. Most productive authors Doc. 2019
Atzori, L 6,351 Rodrigues, JJPC 66
Iera, A 6,113 Choo, KKR 54 In this section, the bibliometric network analysis of IoT is
Morabito, G 5,888 Yang, LT 52 depicted in the strategic diagram (4.1), the thematic network
Xu, LD 5,158 Guizani, M 51
Buyya, R 3,791 Kumar, N 49 structure (4.2) and the thematic evolution structure (4.3). Sec-
Palaniswami, M 3,784 Zeadally, S 44 tion 2 describes each topic for better understanding.
Vasilakos, A 2,245 Park, JH 43
Guizani, M 2,219 Sangaiah, AK 39 4.1 Bibliometric performance and network analysis
Li, S 2,170 Wang, W 38
Zorzi, M 1,999 Wang, ZL 37
Fig. 4 shows 31 clusters, ten (10) of which are classified
Table 3 lists the journals and universities that publish re- as motor themes, six (6) as basic and transversal themes, nine
search related to IoT. IEEE Access ranks first, followed by (9) as emerging or declining themes, and six (6) as highly de-
IEEE Internet of Things Journal and Sensors. The most pro- veloped and isolated themes. The size of each cluster is pro-
ductive university is the Chinese Academy of Sciences, fol- portional to the number of core documents associated with the
lowed by the Beijing University of Posts Telecommunica- theme, followed by the total of citations (in brackets). Table 4

of
tions. shows the performance analysis of the research themes and
their respective core documents, sum citation and h-index.

ro
Table 3 Motor themes are regarded as the ten (10) motor themes
Journals and universities that publish studies on IoT that emerged from this analysis were “AUTHENTICA-
Journals
IEEE Access
Doc.
1,155
Universities
Chinese Ac. of Sciences
Doc.
459
-p
TION”, “6LOWPAN”, “INDUSTRY-4.0”, “SMART-CITY”,
“CLOUD-COMPUTING”,
“DISTRIBUTED-SYSTEM”,
“MACHINE-LEARNING”,
“INTEROPERABILITY”,
re
Beijing Univ. Posts Tele-
IEEE IoT Journal 1,077 282 “PLATFORMS”, and “SOA-(SERVICE-ORIENTED-AR-
com.
Sensors 974 Univ. of California Syst. 222 CHITECTURE”. A total of 1,258 core documents on these
lP

Int. J. of E science 334 King Saud University 205 motor theme have been cited 23,357 times.
Int. J. of Dist. Sensor Univ. of Elect. Sci. Tech.
269 200
Net. of China
IEEE Tran. on Ind. Inf. 190 Univ. System of Georgia 194
na

IEEE Com. Magazine 178 CNRS 169


Wireless Personal Com. 174 Tsinghua University 169
Computer Networks 150 Xidian University 166
Indian Inst. of Technol-
ur

IEEE Sensors Journal 149 150


ogy
Jo

Figure 4. Strategic diagram of IoT (2002 - 2019).


DIGITAL COMMUNICATIONS AND NETWORKS 5

Table 4 tributed computing, storage control and networking capabili-


Journals and universities that publish studies on IoT. ties closer to the user. Furthermore, “QUALITY-OF-SER-
VICE-(QOS)” and “HEALTHCARE” present a significant
Core Sum
co-occurrence since QoS is an essential factor in healthcare
Theme
documents
h-index
Citation systems, especially in cloud computing in the IoT environ-
AUTHENTICATION 289 34 6,090 ment [66]. The application of QoS with cloud computing im-
CLOUD-COMPUTING 252 30 4,891 proves IoT in healthcare through data exchange between de-
INDUSTRY-4.0 182 27 2,760 vices, security and privacy, data storage, data management,
6LOWPAN 142 25 3,863
SMARTCITY 115 17 1,005 and ubiquitous access.
MACHINE-LEARNING 116 13 683
PLATFORM 26 13 1,508 4.2.3 Industry 4.0 (c)
INTEROPERABILITY 58 13 864
DISTRIBUTED-SYSTEM 46 11 1,053
SOA 16 6 320 The cluster “INDUSTRY-4.0” (Fig. 5c) is a proposal de-
veloped by the German government (High-Tech Strategy
4.2 Thematic network structure of IoT 2020) to build a new economy based on high-tech technolo-
gies [1]. This concept accelerated the fourth industrial revo-
Fig. 5 shows the thematic network structure of the motor lution and is based on technologies such as cyber-physical

of
themes of IoT presented in Table 4. The co-occurrence among systems, IoT [67], big data and analytics [32], cloud compu-
keywords was deeply analyzed and depicted in order to pre- ting [68], sensors, machine learning, computer simulation, 3D

ro
sent hidden patterns. printing, artificial intelligence, augmented reality, real-time
monitoring and decision-making, cybersecurity, robotics,
among others [1, 31]. The most important subthemes within
4.2.1 Authentication (a)

The cluster “AUTHENTICATION” (Fig. 5a) is the most


-p
this research theme are: “INDUSTRIAL-INTERNET-OF-
THINGS-(IIOT)” [69], “CYBER-PHYSICAL SYSTEMS-
re
important cluster in the strategic diagram due to its perfor- (CPS)” [70], and “BIG-DATA” [71]. This co-occurrence may
mance in terms of core documents, h-index, sum citation, and be trivial since big data, CPS and IoT represent the leading
lP

that it is identified as a motor theme. Authentication methods technologies that constitute the industry 4.0 concept. How-
can be seen as a series of adopted procedures to confirm an ever, IIoT highlights a more significant research effort in the
entity’s identity in a network [56, 57]. In the IoT environment, industrial sector, where higher robustness of technology is de-
na

security and privacy are the primary concerns. Since the manded in terms of complexity, legal regulations, hardware
equipment does not have many resources to protect, data leak- and infrastructure aspects, device compatibility, more signif-
age is hindered, which makes it very difficult to implement icant investments, data network and security, among others
ur

robust security systems. With this in mind, we can explain the


emergence of the most cited subthemes, “SECURITY” [58] 4.2.4 6LoWPAN (b)
Jo

and “PRIVACY” [59]. Furthermore, “RADIO-FRE-


QUENCY-IDENTIFICATION” [60] has attracted a lot of at- The cluster “6LOWPAN” (Fig. 5b) is Low-Power Personal
tention because RFID is one of the leading IoT technologies Area Network, which refers to devices with low energy con-
that help create efficient and reliable systems. However, there sumption, computer power consumption and memory. They
are challenges surrounding the development of low-cost en- communicate using low-power wireless standards, such as
cryption methods. IEEE 802.15.4 for IPv6 [72, 73]. The most important sub-
theme within this research theme is “WIRELESS-SENSOR-
4.2.2 Cloud computing (e) NETWORK-(WSN)” [74]. Co-occurrences among clusters,
such as “6LOWPAN”, “IEEE 802.15.4”, “IPV6”, can be ex-
The cluster “CLOUD-COMPUTING” (Fig. 5e) uses inter- plained because science has been using IEEE 802.15.4 stand-
net protocols as a model for consumption and delivery of ard and 6LoWPAN in the WSN context. WSN provides low
technology resources. This technology is characterized by on- power connectivity to the internet by wireless for IoT. In ad-
demand accessibility of systems, large data storage and high dition, the IEEE 802.15.4 standard provides lower power con-
computer capacity [61]. The most relevant subthemes within sumption for these systems. 6LoWPAN gives an IPv6 for
this research theme are “FOG-COMPUTING” [62], “EDGE- each device, which can be connected through the Internet.
COMPUTING” [63] and “QUALITY-OF-SERVICE-(QOS)” “COAP” aims to replace HTTP for lightweight and low-re-
[64]. Edge Computing refers to an approach in which storage source devices. It is a stateless protocol, and combines 6LoW-
and other resources are physically closer to data producers. PAN and COAP to provide a web-oriented protocol basis for
This method does not replace cloud computing, but rather embedded systems. The subthemes “RPL” and “SMART-OB-
complements it by providing communication efficiency and JECT” have a strong co-occurrence with 6LoWPAN as well.
additional scalability [65]. The co-occurrence of this concept In this perspective, 6LoWPAN helps connect these smart de-
with “FOG-COMPUTING” might be explained by the fact vices with an adaption layer to the Internet and RPL, a distant
that fog computing can be considered the highest evolution of vector protocol designed for IPV6 on IEEE 802.15.4 stand-
the principle of edge computing. Fog computing provides dis- ard. RPL manages data routing for devices with lower re-
sources and ensures bidirectional connectivity, robustness, re-
liability, flexibility, and scalability [75].
6 DIGITAL COMMUNICATIONS AND NETWORKS

of
ro
-p
re
lP
na
ur
Jo

Figure 5. Thematic network structure of IoT (2002 - 2019).


DIGITAL COMMUNICATIONS AND NETWORKS 7

4.2.5 Smart city (c) 4.2.8 Interoperability (h)

The cluster “SMART-CITY” (Fig. 5d) concept emerged in The cluster “INTEROPERABILITY” (Fig. 5h) is a property
2012 [76] and can be seen as using the IoT and others emerg- of a system that shares data and communicates with others
ing technologies to improve the functions of cities. IoT can be systems [89, 90]. The most important subthemes within this
applied in heterogeneous environments and is the best way to research theme are “SEMANTIC-WEB” [91], “BUILDING-
improve smart cities [77]. The most important subthemes INFORMATION-MODELLING” and “ONTOLOGY”. Aca-
within this research theme are “SENSOR” [78] and “SMART- demia have developed semantic web models using ontolo-
GRID” [79]. A large number of studies using these technolo- gies. Ontologies are used for semantic reasoning to provide
gies focus on building smart grid systems using wireless sen- interoperability in several aspects. The semantic web allows
sors to automatically collect and take action on the available bidirectional transfer between cloud modes, promoting users
information on the behavior of suppliers and consumers. The to switch between different clouds and controlling the author-
same situation occurs with “INTELLIGENT-TRANSPOR- ization to share manufacturing resources. In addition, it al-
TATION-SYSTEM”, in which applications mainly focuses lows organizations to integrate three service models after a
on vehicle safety, network communication and traffic man- Return on Investment (ROI) analysis to consider factors such
agement. as manufacturing capabilities, business strategy and security
issues. Therefore, it is crucial to consider the use of the se-

of
4.2.6 Machine Learning (f) mantic web in interoperability schemes.

ro
The cluster “MACHINE-LEARNING” (Fig. 5f) can be 4.2.9 Distributed system (g)
seen as the most representative algorithm of artificial intelli-
gence [80]. This algorithm is used to learn from data, make The cluster “DISTRIBUTED-SYSTEM” (Fig. 5g) is a
sense of data, and discover patterns that can be used to predict
what will happen in future situations [81]. Recently, the inter-
-p
group of autonomous computers presented to its users as a
single integrated system [92]. Important roles of the distrib-
re
est in using machine learning to improve IoT security is in- uted systems are storage, collaborative computing and secu-
creasing [82], which justifies the emergence of subthemes rity. These systems have become the basis for research in ar-
lP

such as “CYBER-SECURITY” and “INTRUSION DETEC- eas such as blockchain [93], multi-agents [94], smart home
TION”. Other important subthemes within this theme are [95], fog computing and cloud computing [96]. The most im-
“DEEP-LEARNING” [83], “DEEP-NEURAL-NET- portant subthemes within this research theme are “BLOCK-
na

WORK”, “ARTIFICIAL-INTELLIGENCE” etc. [84]. A log- CHAIN” [93], “SMART-CONTRACT” and “MULTI-
ical explanation for this co-occurrence pattern might be asso- AGENT-SYSTEM” [94]’. When “BLOCK-CHAIN” was
ciated with the large number of studies conducted to bench- created, specifically for Bitcoin, academic interest began to
ur

mark machine learning algorithms using other techniques to increase due to its strong security structure. Researchers then
evaluate performance in IoT environments (e.g., resource uti- started to implement the technology in different fields. The
lization, efficiency, accuracy, scalability). above co-occurrence was highly developed by researchers
Jo

since “SMART-CONTRACT” is a self-execution script that


4.2.7 Platforms (i) exists on the blockchain, allowing for a chain a chain with
general computational purposes. The same is true of
The cluster “PLATFORMS” (Fig. 5i) facilitates ex- “MULTI-AGENT-SYSTEM,” which makes it possible to en-
changes, reduces transactions cost, facilitates transactions be- hance autonomy, flexibility and higher integration of IoT sys-
tween companies and provide products and services [85]. IoT tems. Unfortunately, security vulnerabilities become a chal-
platforms integrate tasks into information and provides ser- lenge, yet blockchain seems to have been developed through
vices for IoT devices through cooperation with other plat- multi-agent systems to enhance security.
forms [86]. The most important subthemes within this re-
search theme are: “NETWORK” [87], “ARCHITECTURE”, 4.2.10 Service oriented architecture (g)
“CHALLANGE”, “TECHNOLOGY” and “APPLICATION”
[88]. Here, several applications of IoT platforms rely on in- The cluster “SOA-(SERVICE-ORIENTED-ARCHITEC-
terconnected wireless sensor networks. It is vital to have a ro- TURE)” (Fig. 5j) is a software architecture that allows the
bust IoT architecture for a proper connection between these connection of resources to get or give data on demand. It en-
sensors. In this sense, the central purpose of an IoT architec- ables interoperability between various IoT devices (SOA-
ture in a system is to provide users with necessary real-time based IoT systems) [97, 98]. The most important subthemes
information. In order for these data communications to be ac- within this research theme are “SERVICE-COMPOSITION”
curate and useful, anyone requesting the platform's applica- [97] and “MICROSERVICES” [99]. These describe virtual
tion must be properly authorized in advance. In addition, IoT entities that process, exchange, or store information. Compo-
platforms are becoming more and more complex, which puts site services are being used in supply chain, virtual enterprise,
forward higher technical requirements for organizations to accounting, finances, and e-science. They are a merging of
deploy these platforms. services that can be found in IoT applications. That happens
because users need more complex functions that only services
cannot perform. In this sense, microservices are a new way of
creating services. It makes an application be a collection of
8 DIGITAL COMMUNICATIONS AND NETWORKS

services. Also, SOA provides guidelines for heterogeneous [112].


web services, which can be integrated. From the third subperiod to the fourth subperiod (shown in
Fig. 6. above), 2,503 (39%) keywords were repeated, 3,908
4.3 Thematic evolution structure of IoT were lost and 18,794 new keywords were used, totalizing
21,297. Besides, 11,440 articles were published in the scien-
Fig. 6 shows the overlapping map and the thematic evolu- tific literature. Eleven (11) clusters represent this subperiod.
tion structure of IoT. In the first subperiod (2002 – 2006), These clusters will be used to provide an overview of trends
three (3) keywords were used by authors; five (5) articles and propose future directions of IoT. The cluster “SECU-
were published and the most significant cluster is “ANT- RITY” continues to prevail, presenting more associated doc-
COLONY-ALGORITHM”. This algorithm was used to estab- uments. We found that documents of this cluster are most re-
lish self-coordination as the dominant paradigm of operation lated to smart home, cloud computing, blockchain and au-
for ubiquitous computing [100]. However, this algorithm has thentication. The second most discussed cluster is “FOG-
the advantages of local improvements, overall performance COMPUTING”. Studies on this theme are related mainly to
search, parallel computing and can be used in combination concepts, such as the industrial internet of things and edge
with other optimization approaches [101]. The concept started computing. The cluster “MACHINE-LEARNING” is related
to gain momentum in the IoT environment years later when to big data and analytics, artificial intelligence, deep learning
researchers used the algorithm to find intelligent logistic and cybersecurity. The cluster “WIRELESS-SENSOR-NET-

of
paths in cyber-physical systems [102]; select the shortest path WORK” is mainly related to energy efficiency, energy har-
to obtain the global importance of nodes and the optimal path vesting and consumption. The cluster “SMART-CITY” is re-

ro
for sensors [103]; improve efficiency and picking distance in lated to smart grid, sensors, sustainability, interoperability,
a fishbone layout warehouse [104]; reduce the energy con- and intelligent transportation systems. The cluster “CYBER-
sumption [105]; or as a task scheduling strategy to maximize PHYSICAL-SYSTEM” is mainly related to the industry 4.0
the benefit of workers [53].
In the second subperiod (2007 – 2011), 333 new keywords
-p
context.
re
were used and three (3) were lost. In this subperiod, 108 arti- 5. Main challenges, limitations and difficulties of IoT
cles were published. The cluster “INTERNET” and “FU-
lP

TURE-INTERNET” highlights the discussion of the role of In this section, an exhaustive SLR of the main challenges
the internet in upcoming years and how IoT could use the in- and difficulties faced by IoT is presented. Twenty-three (23)
ternet and emerging technologies to turn daily objects into articles were selected for analysis. Table 5 presents the find-
na

smart objects with the ability to recognize and act in response ings regarding the challenges and difficulties classified ac-
to the environment [106]. The concept of the future internet cording to 6 factors mentioned by Uslu, Eren, Gür and Özcan
was founded by the European Commission [107] and was [26]: communication, technology, privacy and security, job,
ur

slowly evolved into IoT [108]. In this sense, technical and legal regulations, culture, and 26 related topics according to
non-technical challenges have attracted attention, prompting each factor.
the scientific community to put forward new architecture sug- Uslu, Eren, Gür and Özcan [26] investigated companies'
Jo

gestions to support topics such as security, mobility, perfor- IoT difficulties using multi-criteria decision-making methods.
mance reliability and social content [109]. At the end of this The results showed that challenges related to technologies
subperiod, IoT became one of the pillars of industry 4.0 [1], (e.g., architecture, design, hardware) are the main difficulties
partly due to the German government's strategic plan “High- faced by experts. The second most crucial difficulty was pri-
Tech Strategy 2020” [1]. vacy and security using multi, followed by communication,
From the second subperiod to the third subperiod (shown job, legal regulations and culture.
in Fig. 6. below), 146 (44%) keywords were repeated, 187 Hameed, Khan, and Hameed [113] provided an updated
were lost and 6.265 new keywords were used, totalizing overview of IoT challenges in terms of security and privacy.
6,411. Besides, 2,832 articles were published in the scientific The authors classified five (5) security requirements: confi-
literature. This subperiod is represented by five (5) such as dentiality, privacy, safe routing, robust and resilient manage-
“SECURITY”, “CLOUD-COMPUTING”, “SENSOR”, ment and damage detection. They also provided future direc-
“M2M” and “SEMANTIC-WEB”. This subperiod highlights tions for each challenge.
the use of IoT with others industry 4.0 technologies and con- Pereira and Pereira [114] explored the trends and chal-
cepts. In this sense, industry 4.0 initiated the significant lenges of IoT. The main challenges were 6LoWPANs (20),
growth of IoT by attracting the scientific community to de- data storage, software, cloud computing infrastructure and big
velop smart environments through Machine-to-Machine data (volume, velocity, variety and veracity).
Communication (M2M), a data transference among systems Čolaković and Hadžialić [115] conducted an exhaustive
and sensors in the cloud. When data transfer and management review to identify the challenges of IoT. The results show 13
increase, the need for security protocols becomes a challenge. research areas: standardization, system architecture, interop-
In this sense, the most representative cluster is “SECURITY”. erability and integration, availability and reliability, data stor-
If security is ignored, the development of IoT will be re- age and processing, scalability, management and self-config-
stricted, and personal and strategic information may be leaked uration, performance and QoS, identification and unique
[110, 111]. Therefore, to ensure a secure IoT network, prop-
erties such as availability, authenticity, confidentiality, integ-
rity and non-repudiation became attractive to researchers
DIGITAL COMMUNICATIONS AND NETWORKS 9

of
ro
-p
re
lP
na
ur
Jo

Figure 6. Thematic evolution structure of IoT (2002 - 2019). main challenges: cloud computing, social network, infrastruc-
ture, data management and computational intelligence.
identity, power and energy consumption, security and privacy, Miorandi, Sicari, De Pellegrini and Chlamtac [119] intro-
environmental issues. duced of applications, technologies and main challenges of
Raja, Rajkumar, and Raj [116] reviewed the challenges IoT. The results highlighted five (5) main challenges: compu-
and issues of IoT in literature. The main challenges high- ting, communication and identification technologies, distrib-
lighted the need to build smart platforms, middleware to inte- uted intelligence, security and privacy.
grate devices, fog computing, data storage, privacy and secu- Bujari, Furini, Mandreoli, Martoglia, Montangero and
rity. Ronzani [120] explored the limitations of using IoT and high-
Lee and Lee [117] explored the role of IoT, investments, lighted possible solutions. The authors pointed out four (4)
challenges and difficulties for companies. The results show main challenges: interoperability, lack of a visible business
five (5) main challenges: data management, data mining, pri- model, privacy and security.
vacy, security and chaos challenge. Hammoudi, Aliouat and Harous [121] highlighted the
Tsai, Lai and Vasilakos [118] explored the future IoT, its main challenges of IoT and possible solutions to overcome
main challenges and issues. The research describes five (5) these difficulties. This research identified 12 main challenges:
architecture, security, privacy, standardization, the quantity of
10 DIGITAL COMMUNICATIONS AND NETWORKS

data, high energy consumption, storage, availability, reliabil- proposed future directions and pointed out challenges. The re-
ity, management, interoperability and need for high technol- sults show seven (7) major challenges: monitoring, pro-
ogy cessing, analyzing and managing data, interoperability, pri-
Silva, Khan and Han [7] reviewed the challenges, architec- vacy, and security.
tures, emerging technologies in the IoT environment and pos-
sible solutions. The results show seven (7) main challenges: Table 5
availability, performance, security, reliability, scalability, in- Main challenges, limitations and difficulties of IoT.
teroperability, and mobility.
Miloslavskaya and Tolstoy [122] investigated the chal-
Factor Topics related Authors Sum
lenges and solutions of information security in the IoT envi-
[26], [113], [115], [116],
ronment. The results highlighted six (6) major challenges: a Data Privacy
[117], [119], [120],
large number of Internet-oriented IoT devices, the demand for Priv. Network Security
[121], [7], [122], [123],
and IoT Device Security 20
high technology, lack of standardization, data management, Sec. Software Security
[124], [125], [126],
privacy and security. [127], [128], [129],
Conflict of Interest
[131], [132], [133]
Kiani [123] investigated trends and challenges of manage- Architecture and Design [26], [114], [115], [116],
ment architecture for IoT. The authors highlighted eight (8) Heterogeneity of De- [119], [121], [7], [123],
challenges: Security, load balancing, energy consumption, Tech. vices [124], [125], [126], 19

of
QoS, the quantity of data, data management, mobility man- Hardware Structure [127], [129], [132],
Fault Tolerance [133]
agement and energy management. [26], [114], [115], [116],

ro
Balaji, Nathani and Santhakumar [124] explored the role Addressing [117], [118], [119],
of IoT in healthcare, smart city, industrial, agriculture, and the Com.
Data Management [120], [121], [7], [122],
19
main challenges and future directions related to IoT frame- Infrastructure [123], [124], [125],
works. This research highlighted eight (8) major challenges:
the vast number of devices, cost, maintenance, energy con-
-p Software

Business Model
[127], [128], [130],
[131], [132]
re
sumption, internet connections, interoperability, security, and Investing in Internet
privacy. Develop. of Objects [26], [115], [117],
Economic Development [120], [121], [7], [122],
lP

Harlamova, Kirikova and Sandkuhl [125] investigated the Job


Opportunities and Prob- [124], [126], [127],
12
challenges of semantic web in IoT environment. The authors lems [129], [133]
highlighted six (6) major challenges: scalability, standardiza- Customer Expect. And
na

tion, data processing, privacy, data quality and data interpre- Service Quality
Data Usage Rate
tation. Ownership
Xue, Li, Nazarian and Bogdan [126] developed a mathe- [26], [115], [121],
Legal Standardization
[122], [124], [125],
ur

9
matical modeling structure to identify IoT characteristics Reg. Global Cooperation of
[127], [130], [131]
from a macro approach. The authors highlighted six (6) major the Company
Obligation
challenges: efficient sensing, cost, robustness, energy effi-
Jo

Ethics of Education and


ciency and security and decentralized computation. Teaching
Ryan and Watson [127] investigated the role of Opera- Cult. Ethics [26], [115], [125] 3
tional Research (OR) and how OR can support overcoming Confidence
IoT challenges. This research described 13 major challenges: Vandalism
business model, performance, cloud computing, data manage- Yao, Wang, Sheng, Dustdar and Zhang [133] proposed di-
ment, availability, reliability, energy efficiency, scalability, in- rections, challenges, and recommendations for the IoT field.
teroperability, architecture, mobility, security and privacy. The author pointed out five major challenges: dynamic con-
Ma, Liu, Zhou and Zhao [128] explored the main problems text awareness, the requirement of multiple types of IoT re-
of IoT from the perspective of networks. The challenges high- sources, security, privacy and interface.
lighted include: internet, sensor networks, mobile support,
network security, and network imbalance. 6. Prospect of future research in IoT
Chen, Xu, Liu, Hu and Wang [129] investigated the role
and status of IoT in China. The main challenges are architec- The growing number of connected machines and devices
ture, complex technologies, cost, energy consumption, stand- requires new levels of security and privacy, network routing
ardization, privacy and security. and interconnection between equipment and management
Ma [130] reviewed the role of IoT technologies and scien- systems [134]. This multiplicity of authentications and data
tific challenges. The authors highlighted three (3) major chal- traffic transcends the levels of data management usually used
lenges: data exchange, integration and service adaptation. by organizations. This reinforces the importance of ongoing
Bandyopadhyay and Sen [131] explored the state-of-the- research to support the development of management tools and
art of the IoT, key technologies, possible applications, future methods that can manage the diversity of devices and data in
research and challenges. This research points out nine (9) real time. Technologies, such as cloud computing, distributed
challenges: mobility, availability, manageability, scalability, systems and machine learning, are also trend themes (Fig. 4)
security, privacy, management and a large number of devices that can be used to address several IoT-related challenges.
and applications. However, such technologies also present their implementa-
Hussein [132] explored the IoT technologies development, tion, integration and management challenges and limitations.
DIGITAL COMMUNICATIONS AND NETWORKS 11

Examples of recent cloud limitations are related to delay due better applicability of the algorithm due to advances in IoT
to physical distances. Then, in order to enhance data pro- technologies.
cessing in cloud-based centralized servers [4], it is necessary Table 5 highlighted that privacy and security are the main
to use more robust techniques to ensure high performance, challenges and difficulties of IoT as noted by researchers, fol-
e.g., cellular network edge [4], mobile cloud computing [5], lowed by technology, communication, job, legal regulations
mobile edge computing and energy harvesting [6]. and cultural aspects. These results reinforce the main chal-
Future works should pursue such issues in order to provide lenges faced by Uslu, Eren, Gür and Özcan [26]. In order to
in-depth investigations using BPNA and exhaustive SLRs. promote IoT security and privacy, we recommend future work
Although “AUTHENTICATION” is a highly central and related to patterns found in Fig 5a, which shows that research-
dense motor theme, discussions related to the user and device ers have been committed to methods such as “ELLIPTIC-
authentication techniques are still a significant challenge for CURVE CRYPTOGRAPHY”, “AVISPA” and “PHYSI-
smart organizations, especially regarding data security and CALLY-UNCLONABLE-FUNCTION”. The development of
privacy (Fig. 6 and Table 5). The authentication challenge is authentication based on Elliptical Curve Cryptography (ECC)
closely related to the cluster “SECURITY” (Fig. 5a), which is expanding since this is a low-cost method with smaller key
is one of the key themes in the fourth subperiod (Fig. 6). Be- size and less memory footprint. ECC is also used as the basis
sides, the most discussed themes in recent years (subperiod of the digital signature algorithm elliptic curve that provides
2017 – 2019) shows that even though many technologies, entity and data-origin authentication, non-repudiation ser-

of
such as machine learning, fog computing, cyber-physical sys- vices and integrity protection. The automated validation of in-
tems and embedded systems, seem to be of great significance ternet security protocols and applications (AVISPA) is a sim-

ro
to the technological transformation in organizations, the con- ulation tool that can simulate attacks to test the authenticated
cern is similarly critical when it comes to security and opti- protocols. Physically Unclonable Functions (PUFs) map an
mization. These themes highlight the need for future research entry to a unique exit and this kind of system offers a low cost
on IoT technologies and their integration. From this perspec-
tive, new frameworks will be required to optimize organiza-
-p
and addresses challenges like privacy and security.
The results presented here make evident future work needs
re
tional processes and technological implementation, as well as to address the most frequently mentioned challenges (technol-
security techniques. ogy, communication and security). In order to move forward
lP

Hence, we recommend that future research be related to exploiting the full potential of IoT’s benefits, efforts must fo-
security and authentication themes, as well as related to the cus on developing cultural challenges, especially appropriate
clusters in the fourth subperiod, because these themes are the education and training on IoT methods and concepts because
na

most representative in today's research field. The conceptual of the high complexity of using IoT properly, which requires
network structures (Fig. 5) can also be extended in future re- the efforts from universities, governments and companies.
search because they the interrelationships of the main clusters Our findings reveal several patterns related to security and
ur

related to IoT. More research on IoT applications can be car- privacy issues, data management, interoperability, energy ef-
ried out in different scenarios and sectors, such as smart cities, ficiency and consumption, QoS, IoT technologies, and infra-
healthcare, industry, supply chain, public security, agricul- structure. Therefore, is reasonable to suggest that more re-
Jo

ture, and education. In addition, the use of such technologies search related to these topics be carried out to support re-
should focus on developing approaches to reach perspectives search in the IoT field of research. We also suggest more em-
beyond productivity efficiency. Such efforts must able to act pirical studies to understand the challenges and difficulties in
for the interests of sustainable development and the satisfac- practice since only 1 document [26] of SLR presented reports
tion of enterprise stakeholders. from IoT practitioners.
This research allowed us to find hidden patterns in a large
amount of data to propose future works in the IoT field using 7. Conclusion
SciMAT and PRISMA protocols. For instance, the strategic
diagram in Fig. 4. helps understand in which topics are the This research aimed to conduct a BPNA supported by an
IoT scientific community putting the most effort and which SLR into the IoT field to investigate the strategic themes and
topics are the most important to advance the IoT field of re- its conceptual network structure, thematic evolution structure,
search. In this sense, future research related to motor themes and the main challenges and difficulties. Our findings pre-
(authentication, 6LoWPANs, industry 4.0, smart cities, cloud sented many publications over time, especially after the emer-
computing, among others) is particularly urgent and crucial. gence of the industry 4.0 concept. The most productive and
However, we also suggest future research work in emerging cited researchers and the universities and journals related to
or declining themes, such as 3D printing, M2M communica- IoT were also presented. Thirty-one (31) main clusters were
tion, etc., to support new subjects to gain momentum and mit- plotted in a strategic diagram and classified according to their
igate the decline of promising themes. centrality and density. The most developed and important of
The thematic evolution structure in Fig 6 showed how these are related to security and privacy, industry 4.0 technol-
themes are evolved over time and how the number of key- ogies, development of smart cities and software systems prop-
words is increases. As for future research, we propose to carry erties. The thematic evolution structure presented the signifi-
out research related to the last themes (fourth subperiod), such cant cluster over time in terms of centrality and density. The
as cyber-physical systems, fog computing, machine learning, SLR revealed the main challenges and difficulties of IoT.
etc. However, old themes such as ant colony (first subperiod) The limitations of this research also must be noted. Only
seem to gain momentum since the research emphasizes the the major themes and associated subthemes were examined.
12 DIGITAL COMMUNICATIONS AND NETWORKS

The analysis was limited to papers and reviews in English, visibility and traceability using laser-scanners," Procedia
using only the WoS database. Hence, a potential research Manufacturing, vol. 10, pp. 1-14, 2017.
agenda is to extend this research to include publications in [9] J. Manyika et al., "Unlocking the Potential of the Internet of Things,"
other languages and use other databases. McKinsey Global Institute, 2015.
This research does not provide possible solutions to these [10] P. Fraga-Lamas, T. M. Fernández-Caramés, M. Suárez-Albela, L.
challenges and difficulties, nor does it discuss the perfor- Castedo, and M. González-López, "A review on internet of things for
mance of proposed solutions. Future work may provide a co- defense and public safety," Sensors, vol. 16, no. 10, p. 1644, 2016.
operative network among researchers, countries, and univer- [11] A. M. Rahmani et al., "Exploiting smart e-Health gateways at the
sities, which may help improve decision-making in IoT re- edge of healthcare Internet-of-Things: A fog computing approach,"
search. We used only SciMAT to perform this science map- Future Generation Computer Systems, vol. 78, pp. 641-658, 2018.
ping. Therefore, future studies can be carried out using other
[12] M. Babar and F. Arif, "Real-time data processing scheme using big
bibliometric software, such as VOSviewer, CiteSpace,
data analytics in internet of things based smart transportation
Sci2tool, etc., in order to find hidden patterns in databases and
environment," Journal of Ambient Intelligence and Humanized
give contrast with our results.
Computing, vol. 10, no. 10, pp. 4167-4177, 2019.
Lastly, future research may further explore the subthemes
[13] A. Perles et al., "An energy-efficient internet of things (IoT)
of the motor themes, as well as other themes (basic and trans-
versal, emerging or declining and highly developed and iso- architecture for preventive conservation of cultural heritage," Future

of
lated themes), its challenges and limitations, so as to support Generation Computer Systems, vol. 81, pp. 566-581, 2018.
future research in the context of the IoT. [14] J. Iqbal et al., "A generic Internet of Things architecture for

ro
controlling electrical energy consumption in smart homes,"
Acknowledgment Sustainable cities and society, vol. 43, pp. 443-450, 2018.
[15] M. Ben-Daya, E. Hassini, and Z. Bahroun, "Internet of things and
This study was financed in part by the Coordenação de Aper-
feiçoamento de Pessoal de Nível Superior - Brazil (CAPES) -
-p supply chain management: a literature review," International Journal
of Production Research, vol. 57, no. 15-16, pp. 4719-4742, 2019.
re
Finance Code 001 and the Spanish Ministry of Science and [16] Y. Lu and J. Cecil, "An Internet of Things (IoT)-based collaborative
Innovation under grants PID2019-105381GA-100 (iScience). framework for advanced manufacturing," The International Journal
lP

The authors thank to the Consejo Nacional de Ciencia y of Advanced Manufacturing Technology, vol. 84, no. 5-8, pp. 1141-
Tecnología (CONACYT) and Dirección General de Rela- 1152, 2016.
ciones Exteriores (DGRI), Mexico, for the support provided [17] R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of
na

to carry out this study. K.-K. R. Choo was supported in part security and privacy in distributed internet of things," Computer
by the Cloud Technology Endowed Professorship. Networks, vol. 57, no. 10, pp. 2266-2279, 2013.
[18] M. A. Khan and K. Salah, "IoT security: Review, blockchain
ur

References solutions, and open challenges," Future Generation Computer


Systems, vol. 82, pp. 395-411, 2018.
Jo

[1] L. M. Kipper, L. B. Furstenau, D. Hoppe, R. Frozza, and S. Iepsen, [19] S. Banerjee et al., "A Provably Secure and Lightweight Anonymous
"Scopus scientific mapping production in industry 4.0 (2011–2018): User Authenticated Session Key Exchange Scheme for Internet of
a bibliometric analysis," International Journal of Production Things Deployment," IEEE Internet of Things Journal, vol. 6, no. 5,
Research, vol. 58, no. 6, pp. 1605-1627, 2020. pp. 8739-8752, 2019.
[2] D. Gil, A. Ferrández, H. Mora-Mora, and J. Peral, "Internet of things: [20] M. Abdel-Basset, N. A. Nabeeh, H. A. El-Ghareeb, and A.
A review of surveys based on context aware intelligent services," Aboelfetouh, "Utilising neutrosophic theory to solve transition
Sensors, vol. 16, no. 7, p. 1069, 2016. difficulties of IoT-based enterprises," Enterprise Information
[3] C. J. D’Orazio, K.-K. R. Choo, and L. T. Yang, "Data exfiltration Systems, pp. 1-21, 2019.
from Internet of Things devices: iOS devices as case studies," IEEE [21] D. Mishra, A. Gunasekaran, S. J. Childe, T. Papadopoulos, R. Dubey,
Internet of Things Journal, vol. 4, no. 2, pp. 524-535, 2016. and S. Wamba, "Vision, applications and future challenges of Internet
[4] Z. Chen, W. Liao, K. Hua, C. Lu, and W. Yu, "Towards asynchronous of Things," Industrial Management & Data Systems, vol. 116, no. 7,
federated learning for heterogeneous edge-powered internet of pp. 1331-1355, 2016.
things," Digital Communications and Networks, 2021. [22] G. C. Nobre and E. Tavares, "Scientific literature analysis on big data
[5] Y. Li, S. Xia, B. Cao, and Q. Liu, "Lyapunov optimization based and internet of things applications on circular economy: a
trade-off policy for mobile cloud offloading in heterogeneous bibliometric study," Scientometrics, vol. 111, no. 1, pp. 463-492,
wireless networks," IEEE Transactions on Cloud Computing, 2019. 2017.
[6] S. Xia, Z. Yao, Y. Li, and S. Mao, "Online Distributed Offloading and [23] Y. Bouzembrak, M. Klüche, A. Gavai, and H. J. Marvin, "Internet of
Computing Resource Management with Energy Harvesting for Things in food safety: Literature review and a bibliometric analysis,"
Heterogeneous MEC-enabled IoT," IEEE Transactions on Wireless Trends in Food Science & Technology, 2019.
Communications, 2021. [24] A. Kaba and C. K. Ramaiah, "Bibliometric Analysis of Research
[7] B. N. Silva, M. Khan, and K. Han, "Internet of things: A Output on the Internet of Things in the Arab World," DESIDOC
comprehensive review of enabling technologies, architecture, and Journal of Library & Information Technology, vol. 39, no. 5, 2019.
challenges," IETE Technical review, vol. 35, no. 2, pp. 205-220, [25] X. Li, C. Pak, and K. Bi, "Analysis of the development trends and
2018. innovation characteristics of Internet of Things technology–based on
[8] R. Y. Zhong, X. Xu, and L. Wang, "IoT-enabled smart factory patentometrics and bibliometrics," Technology Analysis & Strategic
DIGITAL COMMUNICATIONS AND NETWORKS 13

Management, vol. 32, no. 1, pp. 104-118, 2020. de biocompósitos nos processos de impressões 3D," Revista Ibero-
[26] B. Uslu, T. Eren, Ş. Gür, and E. Özcan, "Evaluation of the difficulties Americana de Ciências Ambientais, vol. 11, no. 1, pp. 236-250, 2020.
in the internet of things (IoT) with multi-criteria decision-making," [42] L. B. Furstenau et al., "Link between sustainability and industry 4.0:
Processes, vol. 7, no. 3, p. 164, 2019. trends, challenges and new perspectives," IEEE Access, vol. 8, pp.
[27] A. Aghaei Chadegani et al., "A comparison between two main 140079-140096, 2020.
academic literature collections: Web of Science and Scopus [43] M. K. Sott et al., "Precision Techniques and Agriculture 4.0
databases," Asian Social Science, vol. 9, no. 5, pp. 18-26, 2013. Technologies to Promote Sustainability in the Coffee Sector: State of
[28] M. J. Cobo, A. G. López‐Herrera, E. Herrera‐Viedma, and F. Herrera, the Art, Challenges and Future Trends," IEEE Access, vol. 8, pp.
"SciMAT: A new science mapping analysis software tool," Journal of 149854-149867, 2020.
the American Society for Information Science and Technology, vol. [44] M. K. Sott, M. S. Bender, L. B. Furstenau, L. M. Machado, M. J.
63, no. 8, pp. 1609-1630, 2012. Cobo, and N. L. Bragazzi, "100 years of scientific evolution of work
[29] M. J. Cobo, A. G. López‐Herrera, E. Herrera‐Viedma, and F. Herrera, and organizational psychology: a bibliometric network analysis from
"Science mapping software tools: Review, analysis, and cooperative 1919 to 2019," Frontiers in Psychology, vol. 11, 2020.
study among tools," Journal of the American Society for Information [45] L. B. Furstenau et al., "An overview of 42 years of lean production:
Science and Technology, vol. 62, no. 7, pp. 1382-1402, 2011. applying bibliometric analysis to investigate strategic themes and
[30] M. L. Kolling et al., "Data Mining in Healthcare: Applying Strategic scientific evolution structure," Technology Analysis & Strategic

of
Intelligence Techniques to Depict 25 Years of Research Management, pp. 1-20, 2021.
Development," International Journal of Environmental Research and [46] L. B. Furstenau et al., "A Bibliometric Network Analysis of

ro
Public Health, vol. 18, no. 6, p. 3099, 2021. Coronavirus during the First Eight Months of COVID-19 in 2020,"
[31] L. B. Furstenau et al., "20 Years of Scientific Evolution of Cyber International Journal of Environmental Research and Public Health,
Security: a Science Mapping." vol. 18, no. 3, p. 952, 2021.
[32] J.-R. López-Robles, J. R. Otegi-Olaso, I. P. Gomez, N.-K. Gamboa-
Rosales, H. Gamboa-Rosales, and H. Robles-Berumen,
-p
[47] A. Liberati et al., "The PRISMA statement for reporting systematic
reviews and meta-analyses of studies that evaluate health care
re
"Bibliometric network analysis to identify the intellectual structure interventions: explanation and elaboration," Annals of internal
and evolution of the big data research field," in International medicine, vol. 151, no. 4, pp. W-65-W-94, 2009.
lP

Conference on Intelligent Data Engineering and Automated [48] D. Moher, A. Liberati, J. Tetzlaff, and D. G. Altman, "Preferred
Learning, 2018: Springer, pp. 113-120. reporting items for systematic reviews and meta-analyses: the
[33] J.-R. López-Robles, J.-R. Otegi-Olaso, I. P. Gómez, and M.-J. Cobo, PRISMA statement," Annals of internal medicine, vol. 151, no. 4, pp.
na

"30 years of intelligence models in management and business: A 264-269, 2009.


bibliometric review," International journal of information [49] C. R. Schoenberger and B. Upbin, "The internet of things," Forbes
management, vol. 48, pp. 22-38, 2019. Magazine, vol. 169, no. 6, pp. 155-160, 2002.
ur

[34] J.-R. López-Robles, J. Guallar, J.-R. Otegi-Olaso, and N.-K. [50] M. Tuters and K. Varnelis, "Beyond locative media: Giving shape to
Gamboa-Rosales, "El profesional de la información (EPI): the internet of things," Leonardo, vol. 39, no. 4, pp. 357-363, 2006.
Jo

bibliometric and thematic analysis (2006-2017)," El profesional de la [51] J. Cooper and A. James, "Challenges for database management in the
información, vol. 28, no. 4, p. e280417, 2019. internet of things," IETE Technical Review, vol. 26, no. 5, pp. 320-
[35] M. K. Sott et al., "Agriculture 4.0 and Smart Sensors. The Scientific 329, 2009.
Evolution of Digital Agriculture: Challenges and Opportunities," [52] E. Welbourne et al., "Building the internet of things using RFID: the
2021. RFID ecosystem experience," IEEE Internet computing, vol. 13, no.
[36] P. P. Severo, L. B. Furstenau, M. K. Sott, D. Cossul, M. S. Bender, 3, pp. 48-55, 2009.
and N. L. Bragazzi, "Thirty Years of Human Rights Study in the Web [53] M. Zorzi, A. Gluhak, S. Lange, and A. Bassi, "From today's intranet
of Science Database (1990–2020)," International Journal of of things to a future internet of things: a wireless-and mobility-related
Environmental Research and Public Health, vol. 18, no. 4, p. 2131, view," IEEE Wireless communications, vol. 17, no. 6, pp. 44-51,
2021. 2010.
[37] M. K. Sott et al., "Process modeling for smart factories: using science [54] R. Rafael, A. Shirley, and A. Liveris, "Report to the president
mapping to understand the strategic themes, main challenges and accelerating US advanced manufacturing. Report, US," ed:
future trends," Business Process Management Journal, 2021. Washington DC: Report, 2014.
[38] J. López-Robles et al., "The relationship between Project [55] H. Kagermann, J. Helbig, A. Hellinger, and W. Wahlster,
Management and Industry 4.0: Bibliometric analysis of main Recommendations for implementing the strategic initiative
research areas through Scopus," Research and Education in Project INDUSTRIE 4.0: Securing the future of German manufacturing
Management (Bilbao, 2020), p. 56. industry; final report of the Industrie 4.0 Working Group.
[39] L. M. Kipper et al., "Scientific mapping to identify competencies Forschungsunion, 2013.
required by industry 4.0," Technology in Society, vol. 64, p. 101454. [56] X. Li, J. Niu, S. Kumari, F. Wu, A. K. Sangaiah, and K.-K. R. Choo,
[40] L. B. Furstenau, L. M. Kipper, R. Frozza, and D. Hoppe, "Proposta "A three-factor anonymous authentication scheme for wireless sensor
de aplicação do software Quality Function Deployment em ambiente networks in internet of things environments," Journal of Network and
computacional," Revista Jovens Pesquisadores, vol. 9, no. 2, pp. 57- Computer Applications, vol. 103, pp. 194-204, 2018.
76, 2019. [57] X. Li, J. Peng, J. Niu, F. Wu, J. Liao, and K.-K. R. Choo, "A robust
[41] A. L. E. Silva, J. A. R. Moraes, L. B. Benitez, E. A. Kaufmann, and and energy efficient authentication protocol for industrial internet of
L. B. Furstenau, "Mapeamento da produção científica acerca do uso things," IEEE Internet of Things Journal, vol. 5, no. 3, pp. 1606-1615,
14 DIGITAL COMMUNICATIONS AND NETWORKS

2017. Computer Communications, vol. 120, pp. 10-21, 2018.


[58] E. L. Macedo et al., "On the security aspects of Internet of Things: A [76] M. Batty et al., "Smart cities of the future," The European Physical
systematic literature review," Journal of Communications and Journal Special Topics, vol. 214, no. 1, pp. 481-518, 2012.
Networks, vol. 21, no. 5, pp. 444-457, 2019. [77] B. Hammi, R. Khatoun, S. Zeadally, A. Fayad, and L. Khoukhi, "IoT
[59] F. Zhu, W. Wu, Y. Zhang, and X. Chen, "Privacy-preserving technologies for smart cities," IET Networks, vol. 7, no. 1, pp. 1-13,
authentication for general directed graphs in industrial IoT," 2017.
Information Sciences, vol. 502, pp. 218-228, 2019. [78] B. P. L. Lau, N. Wijerathne, B. K. K. Ng, and C. Yuen, "Sensor fusion
[60] R. Baashirah and A. Abuzneid, "Survey on prominent RFID for public space utilization monitoring in a smart city," IEEE Internet
authentication protocols for passive tags," Sensors, vol. 18, no. 10, p. of Things Journal, vol. 5, no. 2, pp. 473-481, 2017.
3584, 2018. [79] N. K. Suryadevara and G. R. Biswal, "Smart Plugs: Paradigms and
[61] Z. Maamar, T. Baker, M. Sellami, M. Asim, E. Ugljanin, and N. Faci, Applications in the Smart City-and-Smart Grid," Energies, vol. 12,
"Cloud vs edge: Who serves the Internet‐of‐Things better?," Internet no. 10, p. 1957, 2019.
Technology Letters, vol. 1, no. 5, p. e66, 2018. [80] L. Cui, S. Yang, F. Chen, Z. Ming, N. Lu, and J. Qin, "A survey on
[62] C. Puliafito, E. Mingozzi, F. Longo, A. Puliafito, and O. Rana, "Fog application of machine learning for Internet of Things," International
computing for the internet of things: A Survey," ACM Transactions Journal of Machine Learning and Cybernetics, vol. 9, no. 8, pp. 1399-
on Internet Technology (TOIT), vol. 19, no. 2, pp. 1-41, 2019. 1417, 2018.

of
[63] W. Z. Khan, E. Ahmed, S. Hakak, I. Yaqoob, and A. Ahmed, "Edge [81] H. Assem, L. Xu, T. S. Buda, and D. O’Sullivan, "Machine learning
computing: A survey," Future Generation Computer Systems, vol. 97, as a service for enabling Internet of Things and People," Personal and

ro
pp. 219-235, 2019. Ubiquitous Computing, vol. 20, no. 6, pp. 899-914, 2016.
[64] S. Heidari and R. Buyya, "Quality of Service (QoS)-driven resource [82] S. Zeadally and M. Tsikerdekis, "Securing Internet of Things (IoT)
provisioning for large-scale graph processing in cloud computing with machine learning," International Journal of Communication
environments: Graph Processing-as-a-Service (GPaaS)," Future
Generation Computer Systems, vol. 96, pp. 490-501, 2019.
-p
[83]
Systems, vol. 33, no. 1, p. e4169, 2020.
J. Chen and X. Ran, "Deep learning with edge computing: A review,"
re
[65] Y. Li, H. Ma, L. Wang, S. Mao, and G. Wang, "Optimized Content Proceedings of the IEEE, vol. 107, no. 8, pp. 1655-1674, 2019.
Caching and User Association for Edge Computing in Densely [84] L. Zhang, Y.-C. Liang, and D. Niyato, "6G Visions: Mobile ultra-
lP

Deployed Heterogeneous Networks," IEEE Transactions on Mobile broadband, super internet-of-things, and artificial intelligence,"
Computing, 2020. China Communications, vol. 16, no. 8, pp. 1-14, 2019.
[66] R. Khamisy-Farah, L. B. Furstenau, J. D. Kong, J. Wu, and N. L. [85] F. Fraile, R. Sanchis, R. Poler, and A. Ortiz, "Reference Models for
na

Bragazzi, "Gynecology meets big data in the disruptive innovation Digital Manufacturing Platforms," Applied Sciences, vol. 9, no. 20,
medical era: State-of-art and future prospects," International Journal p. 4433, 2019.
of Environmental Research and Public Health, vol. 18, no. 10, p. [86] M. Kim, N. Y. Lee, and J. H. Park, "A Security Generic Service
ur

5058, 2021. Interface of Internet of Things (IoT) Platforms," Symmetry, vol. 9,


[67] V. Roblek, M. Meško, and A. Krapež, "A complex view of industry no. 9, p. 171, 2017.
Jo

4.0," Sage Open, vol. 6, no. 2, p. 2158244016653987, 2016. [87] J. D. C. Silva, J. J. P. Rodrigues, K. Saleem, S. A. Kozlov, and R. A.
[68] J. H. Park and J. H. Park, "Blockchain security in cloud computing: Rabêlo, "M4DN. IoT-A Networks and Devices Management
Use cases, challenges, and solutions," Symmetry, vol. 9, no. 8, p. 164, Platform for Internet of Things," IEEE Access, vol. 7, pp. 53305-
2017. 53313, 2019.
[69] H. Boyes, B. Hallaq, J. Cunningham, and T. Watson, "The industrial [88] G. Marques, R. Pitarma, N. M Garcia, and N. Pombo, "Internet of
internet of things (IIoT): An analysis framework," Computers in Things Architectures, Technologies, Applications, Challenges, and
Industry, vol. 101, pp. 1-12, 2018. Future Directions for Enhanced Living Environments and Healthcare
[70] Y. Lu, "Cyber physical system (CPS)-based industry 4.0: a survey," Systems: A Review," Electronics, vol. 8, no. 10, p. 1081, 2019.
Journal of Industrial Integration and Management, vol. 2, no. 03, p. [89] R. C. Motta, K. M. de Oliveira, and G. H. Travassos, "A conceptual
1750014, 2017. perspective on interoperability in context-aware software systems,"
[71] S. Gierej, "Big data in the industry-overview of selected issues," Information and Software Technology, vol. 114, pp. 231-257, 2019.
Management Systems in production engineering, vol. 25, no. 4, pp. [90] M. Noura, M. Atiquzzaman, and M. Gaedke, "Interoperability in
251-254, 2017. internet of things: Taxonomies and open challenges," Mobile
[72] A. Le, J. Loo, A. Lasebae, M. Aiash, and Y. Luo, "6LoWPAN: a study Networks and Applications, vol. 24, no. 3, pp. 796-809, 2019.
on QoS security threats and countermeasures using intrusion [91] A. J. Jara, A. C. Olivieri, Y. Bocchi, M. Jung, W. Kastner, and A. F.
detection system approach," International Journal of Communication Skarmeta, "Semantic web of things: an analysis of the application
Systems, vol. 25, no. 9, pp. 1189-1212, 2012. semantics for the iot moving towards the iot convergence,"
[73] C. Hennebert and J. Dos Santos, "Security protocols and privacy International Journal of Web and Grid Services, vol. 10, no. 2-3, pp.
issues into 6LoWPAN stack: A synthesis," IEEE Internet of Things 244-272, 2014.
Journal, vol. 1, no. 5, pp. 384-398, 2014. [92] A. S. Tanenbaum and M. Van Steen, Distributed systems: principles
[74] J. Granjal, E. Monteiro, and J. S. Silva, "Security in the integration and paradigms. Prentice-Hall, 2007.
of low-power Wireless Sensor Networks with the Internet: A survey," [93] W. Viriyasitavat, L. Da Xu, Z. Bi, and A. Sapsomboon, "New
Ad Hoc Networks, vol. 24, pp. 264-287, 2015. Blockchain-Based Architecture for Service Interoperations in
[75] P. O. Kamgueu, E. Nataf, and T. D. Ndie, "Survey on RPL Internet of Things," IEEE Transactions on Computational Social
enhancements: a focus on topology, security and mobility," Systems, vol. 6, no. 4, pp. 739-748, 2019.
DIGITAL COMMUNICATIONS AND NETWORKS 15

[94] L. Feng, H. Zhang, Y. Chen, and L. Lou, "Scalable dynamic multi- vol. 66, pp. 198-213, 2016.
agent practical byzantine fault-tolerant consensus in permissioned [113] S. Hameed, F. I. Khan, and B. Hameed, "Understanding security
blockchain," Applied Sciences, vol. 8, no. 10, p. 1919, 2018. requirements and challenges in Internet of Things (IoT): A review,"
[95] S. Hu, C. Tang, F. Liu, and X. Wang, "A distributed and efficient Journal of Computer Networks and Communications, vol. 2019,
system architecture for smart home," International Journal of Sensor 2019.
Networks, vol. 20, no. 2, pp. 119-130, 2016. [114] R. Pereira and E. G. Pereira, "Future internet: trends and challenges,"
[96] V. B. Souza et al., "Towards a proper service placement in combined International Journal of Space-Based and Situated Computing, vol.
Fog-to-Cloud (F2C) architectures," Future Generation Computer 5, no. 3, pp. 159-167, 2015.
Systems, vol. 87, pp. 1-15, 2018. [115] A. Čolaković and M. Hadžialić, "Internet of Things (IoT): A review
[97] R. Chen, J. Guo, and F. Bao, "Trust management for SOA-based IoT of enabling technologies, challenges, and open research issues,"
and its application to service composition," IEEE Transactions on Computer Networks, vol. 144, pp. 17-39, 2018.
Services Computing, vol. 9, no. 3, pp. 482-495, 2014. [116] S. Raja, T. D. Rajkumar, and V. P. Raj, "Internet of things:
[98] F. Wang, L. Hu, J. Zhou, and K. Zhao, "A data processing middleware Challenges, issues and applications," Journal of Circuits, Systems
based on SOA for the internet of things," Journal of Sensors, vol. and Computers, vol. 27, no. 12, p. 1830007, 2018.
2015, 2015. [117] I. Lee and K. Lee, "The Internet of Things (IoT): Applications,
[99] T. Cerny, "Aspect-oriented challenges in system integration with investments, and challenges for enterprises," Business Horizons, vol.

of
microservices, SOA and IoT," Enterprise Information Systems, vol. 58, no. 4, pp. 431-440, 2015.
13, no. 4, pp. 467-489, 2019. [118] C.-W. Tsai, C.-F. Lai, and A. V. Vasilakos, "Future Internet of Things:

ro
[100] F. J. Rammig, "Towards self-coordinating ubiquitous computing open issues and challenges," Wireless Networks, vol. 20, no. 8, pp.
environments," in International Conference on Embedded and 2201-2217, 2014.
Ubiquitous Computing, 2006: Springer, pp. 2-13. [119] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, "Internet of
[101] Y. Zhang, Y. Yu, S. Zhang, Y. Luo, and L. Zhang, "Ant colony
optimization for Cuckoo Search algorithm for permutation flow shop
-p things: Vision, applications and research challenges," Ad hoc
networks, vol. 10, no. 7, pp. 1497-1516, 2012.
re
scheduling problem," Systems Science & Control Engineering, vol. [120] A. Bujari, M. Furini, F. Mandreoli, R. Martoglia, M. Montangero,
7, no. 1, pp. 20-27, 2019. and D. Ronzani, "Standards, security and business models: key
lP

[102] N. Zhang, "Smart Logistics Path for Cyber-Physical Systems With challenges for the IoT scenario," Mobile Networks and Applications,
Internet of Things," IEEE Access, vol. 6, pp. 70808-70819, 2018. vol. 23, no. 1, pp. 147-154, 2018.
[103] T. Qiu, B. Li, W. Qu, E. Ahmed, and X. Wang, "TOSG: A topology [121] S. Hammoudi, Z. Aliouat, and S. Harous, "Challenges and research
na

optimization scheme with global small world for industrial directions for Internet of Things," Telecommunication Systems, vol.
heterogeneous Internet of Things," IEEE Transactions on Industrial 67, no. 2, pp. 367-385, 2018.
Informatics, vol. 15, no. 6, pp. 3174-3184, 2018. [122] N. Miloslavskaya and A. Tolstoy, "Internet of Things: information
ur

[104] L. Zhou, Z. Li, N. Shi, S. Liu, and K. Xiong, "Performance Analysis security challenges and solutions," Cluster Computing, vol. 22, no.
of Three Intelligent Algorithms on Route Selection of Fishbone 1, pp. 103-119, 2019.
Jo

Layout," Sustainability, vol. 11, no. 4, p. 1148, 2019. [123] F. Kiani, "A Survey on Management Frameworks and Open
[105] J. Xu, Z. Hao, R. Zhang, and X. Sun, "A method based on the Challenges in IoT," Wireless Communications and Mobile
combination of laxity and ant colony system for cloud-fog task Computing, vol. 2018, 2018.
scheduling," IEEE Access, vol. 7, pp. 116218-116226, 2019. [124] S. Balaji, K. Nathani, and R. Santhakumar, "IoT technology,
[106] G. Kortuem, F. Kawsar, V. Sundramoorthy, and D. Fitton, "Smart applications and challenges: a contemporary survey," Wireless
objects as building blocks for the internet of things," IEEE Internet personal communications, vol. 108, no. 1, pp. 363-388, 2019.
Computing, vol. 14, no. 1, pp. 44-51, 2009. [125] M. Harlamova, M. Kirikova, and K. Sandkuhl, "A survey on
[107] H. Ning and Z. Wang, "Future internet of things architecture: like challenges of semantics application in the internet of things domain,"
mankind neural system or social organization framework?," IEEE Applied Computer Systems, vol. 21, no. 1, pp. 13-21, 2017.
Communications Letters, vol. 15, no. 4, pp. 461-463, 2011. [126] Y. Xue, J. Li, S. Nazarian, and P. Bogdan, "Fundamental challenges
[108] Q. Z. Sheng, S. Zeadally, Z. Luo, J.-Y. Chung, and Z. Maamar, toward making the iot a reachable reality: A model-centric
"Ubiquitous RFID: Where are we?," Information Systems Frontiers, investigation," ACM Transactions on Design Automation of
vol. 12, no. 5, pp. 485-490, 2010. Electronic Systems (TODAES), vol. 22, no. 3, pp. 1-25, 2017.
[109] J. Pan, S. Paul, and R. Jain, "A survey of the research on future [127] P. J. Ryan and R. B. Watson, "Research challenges for the Internet of
internet architectures," IEEE Communications Magazine, vol. 49, no. Things: what role can OR play?," Systems, vol. 5, no. 1, p. 24, 2017.
7, pp. 26-36, 2011. [128] H. Ma, L. Liu, A. Zhou, and D. Zhao, "On networking of Internet of
[110] Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, "Security of the Things: Explorations and challenges," IEEE Internet of Things
Internet of Things: perspectives and challenges," Wireless Networks, Journal, vol. 3, no. 4, pp. 441-452, 2015.
vol. 20, no. 8, pp. 2481-2501, 2014. [129] S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, "A vision of IoT:
[111] N. Moustafa, B. Turnbull, and K.-K. R. Choo, "An ensemble Applications, challenges, and opportunities with china perspective,"
intrusion detection technique based on proposed statistical flow IEEE Internet of Things journal, vol. 1, no. 4, pp. 349-359, 2014.
features for protecting network traffic of internet of things," IEEE [130] H.-D. Ma, "Internet of things: Objectives and scientific challenges,"
Internet of Things Journal, vol. 6, no. 3, pp. 4815-4830, 2018. Journal of Computer science and Technology, vol. 26, no. 6, pp. 919-
[112] D. Airehrour, J. Gutierrez, and S. K. Ray, "Secure routing for internet 924, 2011.
of things: A survey," Journal of Network and Computer Applications, [131] D. Bandyopadhyay and J. Sen, "Internet of things: Applications and
16 DIGITAL COMMUNICATIONS AND NETWORKS

challenges in technology and standardization," Wireless personal


communications, vol. 58, no. 1, pp. 49-69, 2011.
[132] A. Hussein, "Internet of Things (IOT): Research Challenges and
Future Applications," IJACSA) International Journal of Advanced
Computer Science and Applications, vol. 10, no. 6, pp. 77-82, 2019.
[133] L. Yao, X. Wang, Q. Z. Sheng, S. Dustdar, and S. Zhang,
"Recommendations on the Internet of Things: Requirements,
Challenges, and Directions," IEEE Internet Computing, vol. 23, no.
3, pp. 46-54, 2019.
[134] K. Gai, K.-K. R. Choo, M. Qiu, and L. Zhu, "Privacy-preserving
content-oriented wireless communication in internet-of-things,"
IEEE Internet of Things Journal, vol. 5, no. 4, pp. 3059-3067, 2018.

of
ro
-p
re
lP
na
ur
Jo
Declaration of interests

☒ The authors declare that they have no known competing financial interests or personal relationships
that could have appeared to influence the work reported in this paper.

☐The authors declare the following financial interests/personal relationships which may be considered
as potential competing interests:

of
ro
-p
re
lP
na
ur
Jo

You might also like