Site Loader
Rock Street, San Francisco

Internet of things (IoT) is a collection of objects, services and devices which are connected via a network and can communicate and share information to achieve a common goal in different areas and applications. {4} In other words it is a technological revolution which represents the future of computing, communications and its development in upcoming days depends on the innovation of dynamic technology from wireless sensor to nanotechnology. {15} The architecture of IoT mainly based on two things. One is data communication tools and another one is radio frequency identification (RFID). {15} IoT can be implemented in different field such as agriculture, healthcare, distribution etc. The purpose of IoT is to perform daily tasks and responsibilities by using intelligent devices for changing humans’ usual lifestyle. {4} Devices used in IoT are arranged with sensors and processing power which qualify them that to be fitted in many environments. {1} Fig.1 is a representation of some common applications of IoT in different environments such as smart healthcare, wearable technology, smart home, smart transport etc. Services provided by IoT applications is a blessing of modern technology as it provides great benefit for humans’ life. As every advantage have some disadvantage like that those benefits have some security and privacy concern. {1} In recent years IoT applications have a huge expansion due to the rapid development of technology especially in Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN). {4} The RFID enables the tagging or labeling of every single device. On the other hand, due to WSN people, devices, objects etc. becomes a wireless recognizable object and can communicate with each other in the physical, cyber and virtual world. {4} The rest of this paper is organized as follows. Section II describes the architecture of IoT. In section III, the security and issues of different security principles and IoT devices are presented. The section also contains the security issues that are associated with each layer of IoT. Section IV discusses the application of IoT in different sectors. Section V gives the big picture of comparison and criticism of existing research work of IoT. Finally, the paper is concluded in Section VI.

Different researcher gives different opinion regarding the number of layers in IoT. However, majority number of researcher declared that IoT mainly has three layers. They are: Perception layer, Network layer and Application layers.  These layers are isolated by their functions and the devices that are used with them. Each layer has some security issues associated with it. Fig. 2 shows the general architecture of IoT. {4}Perception layer also referred as a “Device layer” in IoT. It contains the physical objects and sensor devices such as RFID, camera, Bluetooth etc. mainly based on object detection method. This layer detects, collects and process information and transmits it to the network layer. The transmitted information may vary due to the different type of sensor. It can be about location, temperature, motion etc. {8} The main purpose of the network layer is to transmit the information due to that we can call it “Transmission Layer”. It securely transfers the information from sensors to different IoT hubs or devices over the internet. The transmission medium can be wired or wireless. Internet gateways, routing devices etc. perform the transmission by using the modern technology such as WIFI, 3G, LTE etc. depending on the sensor. {8 + 4} The application layer provides the security that means authenticity, integrity, and confidentiality of the data. In this layer, the main purpose of IoT which is the establishment of a smart environment is achieved. {4} Except those three commonly used architecture, some researcher declared that in IoT architecture some other layer also exists. Such as, M. Wu et al. defined two more layers in IoT architecture one is Middleware layer and another one is business layer 15. The function of middleware layer is to receive information from network layer and store them in the database. Correspondingly, the business layer has the responsibility for the whole IoT system including application and services. Hui Suo et al. describes one extra layer Support layer with the three general layers. Support layer work as a support platform for the application layer. Here all kind of computing power is organized through network grid and cloud computing. It combines the application layer upward and network layer downward.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Post Author: admin


I'm Eric!

Would you like to get a custom essay? How about receiving a customized one?

Check it out