A Survey of Internet of Things

Anshita Dhoot,
Moscow Institute of Physics & Technology, Moscow, Russia,
A.N. Nazarov,
International Telecommunication Union, ITU, expert, Moscow, Russia,

DOI: 10.36724/2664-066X-2020-6-5-25-32

SYNCHROINFO JOURNAL. Volume 6, Number 5 (2020). P. 25-32.


The growing era of technology through the internet, Internet of Things (i.e. IoT) has a powerful and strong industrial system that provides an opportunity to grow and applications to use ubiquitously. Its applications use sensor, wireless, mobile and RFID technology devices. In recent years IoT applications are enhancing to being deployed as well as developed. The IoT promises to have a great future era of the Internet uses that involves machine-to-machine communication. It helps to enable the sensor network as well as technologies, even IoT got involved in our day-to-day routine such that it supports to control and to monitor a human being’s mundane by providing mobile access, remotely. Undoubtedly, remote access is the incredible feature of the IoT which has been given to this world. The main objective of IoT is to provide remotely accessible at low-cost that too by often visits through electronic devices. This paper presents the maximum possibilities of challenges, applications, security issues and techniques of IoT.

Keywords: Internet of Things, IoT devices, applications, Technologies.


  1. Khan, Minhaj Ahmad, and Khaled Salah. “IoT security: Review, blockchain solutions, and open challenges.” Future Generation Computer Systems 82 (2018), pp. 395-411.
  2. Atzori, Luigi, Antonio Iera, and Giacomo Morabito. “The internet of things: A survey.” Computer networks 54.15 (2010), pp. 2787-2805.
  3. Giusto, Daniel, et al., eds. The internet of things: 20th Tyrrhenian workshop on digital communications. Springer Science & Business Media, 2010.
  4. Heater, B. “Lenovo shows off a pair of Intel-powered smart shoes, 2016.” URL https://techcrunch. com/2016/06/09/lenovo-smart-shoes.
  5. Rouse, Margaret, et al. “Drone (unmanned aerial vehicle, UAV).” Internet of Things (IoT) news, blogs and analysis–IoTAgenda.com (2016).
  6. Khan, Athar Ali, Mubashir Husain Rehmani, and Abderrezak Rachedi. “Cognitive-radio-based internet of things: Applications, architectures, spectrum-related functionalities, and future research directions.” IEEE wireless communications 24.3 (2017), pp. 17-25.
  7. Akhtar, Fayaz, Mubashir Husain Rehmani, and Martin Reisslein. “White space: Definitional perspectives and their role in exploiting spectrum opportunities.” Telecommunications Policy 40.4 (2016), pp. 319-331.
  8. Alaba, Fadele Ayotunde, et al. “Internet of Things security: A survey.” Journal of Network and Computer Applications 88 (2017), pp. 10-28.
  9. Granjal, Jorge, Edmundo Monteiro, and Jorge Sá Silva. “Security for the internet of things: a survey of existing protocols and open research issues.” IEEE Communications Surveys & Tutorials 17.3 (2015): 1294-1312.
  10. Roman, Rodrigo, et al. “Key management systems for sensor networks in the context of the Internet of Things.” Computers & Electrical Engineering 37.2 (2011), pp. 147-159.
  11. Granjal, Jorge, et al. “Why is IPSec a viable option for wireless sensor networks.” 2008 5th IEEE international conference on mobile ad hoc and sensor systems. IEEE, 2008.
  12. Cirani, Simone, Gianluigi Ferrari, and Luca Veltri. “Enforcing security mechanisms in the IP-based Internet of things: An algorithmic overview.” Algorithms 6.2 (2013), pp. 197-226.
  13. Alrajeh, Nabil Ali, and Jaime Lloret. “Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks.” International Journal of Distributed Sensor Networks 9.10 (2013), pp. 351047.
  14. Abduvaliyev, Abror, et al. “On the vital areas of intrusion detection systems in wireless sensor networks.” IEEE Communications Surveys & Tutorials 15.3 (2013), pp. 1223-1237.
  15. Ning, Peng, and Dingbang Xu. “Learning attack strategies from intrusion alerts.” Proceedings of the 10th ACM conference on Computer and communications security. 2003.
  16. Yi, Shanhe, Zhengrui Qin, and Qun Li. “Security and privacy issues of fog computing: A survey.” International conference on wireless algorithms, systems, and applications. Springer, Cham, 2015.
  17. Wang, Yifan, Tetsutaro Uehara, and Ryoichi Sasaki. “Fog computing: Issues and challenges in security and forensics.” 2015 IEEE 39th Annual Computer Software and Applications Conference. Vol. 3. IEEE, 2015.
  18. Sicari, Sabrina, et al. “Security, privacy and trust in Internet of Things: The road ahead.” Computer networks 76 (2015), pp. 146-164.
  19. Roman, Rodrigo, Javier Lopez, and Masahiro Mambo. “Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges.” Future Generation Computer Systems 78 (2018), pp. 680-698.
  20. Oleshchuk, Vladimir. “Internet of things and privacy-preserving technologies.” 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology. IEEE, 2009.
  21. Esposito, Christian, et al. “Security and privacy for cloud-based data management in the health network service chain: a microservice approach.” IEEE Communications Magazine 55.9 (2017), pp. 102-108.
  22. Zhang, Zhi-Kai, et al. “IoT security: ongoing challenges and research opportunities.” 2014 IEEE 7th international conference on service-oriented computing and applications. IEEE, 2014.
  23. De Loof, Jourik, et al. “Internet of Things–Architecture IoT-A Deliverable D1. 5–Final architectural reference model for the IoT v3.0.”
  24. OWASP, Top IoT Vulnerabilities. “URL https://www. owasp. org/index. PHP.” (2016).
  25. Madakam, Somayya, et al. “Internet of Things (IoT): A literature review. “Journal of Computer and Communications 3.05 (2015). P. 164.
  26. Evangelos A, Kosmatos, Tselikas Nikolaos D, and Boucouvalas Anthony C. “Integrating RFIDs and smart objects into a UnifiedInternet of Things architecture.” Advances in Internet of Things 2011 (2011).
  27. Aggarwal, Renu, and Manik Lal Das. “RFID security in the context of” internet of things”.” Proceedings of the First International Conference on Security of Internet of Things. 2012.
  28. Khan, Minhaj Ahmad, and Khaled Salah. “IoT security: Review, blockchain solutions, and open challenges.” Future Generation Computer Systems 82 (2018), pp. 395-411.
  29. Sawicki, Artur. “The Internet of things.” World Scientific News 48 (2016), pp. 89-96.
  30. Hauben, Ronda. “From the ARPANET to the Internet. “TCP Digest (UUCP) (2001).
  31. An, Jian, Xiao-Lin Gui, and Xin He. “Study on the architecture and key technologies for the internet of things.” Advances in Biomedical Engineering 11 (2012). P. 329.
  32. Li, Lan. “Study on the security architecture of the Internet of Things.” Proceedings of 2012 international conference on measurement, information and control. Vol. 1. IEEE, 2012.
  33. Srivastava, Lara, and T. Kelly. “The internet of things.” International Telecommunication Union, Tech. Rep 7 (2005).
  34. Chen, Wang. “An IBE-based security scheme on the internet of things.” 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems. Vol. 3. IEEE, 2012.
  35. Suo, Hui, et al. “Security in the internet of things: a review.” 2012 international conference on computer science and electronics engineering. Vol. 3. IEEE, 2012.
  36. Wu, Miao, et al. “Research on the architecture of Internet of Things.” 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE). Vol. 5. IEEE, 2010.
  37. Zhang, Minghui, Fuqun Sun, and Xu Cheng. “Architecture of internet of things and its key technology integration based-on RFID.” 2012 Fifth International Symposium on Computational Intelligence and Design. Vol. 1. IEEE, 2012.
  38. Bandyopadhyay, Debasis, and Jaydip Sen. “Internet of things: Applications and challenges in technology and standardization.” Wireless personal communications 58.1 (2011): 49-69.
  39. Zhang, Ying. “Technology framework of the Internet of Things and its application.” 2011 International Conference on Electrical and Control Engineering. IEEE, 2011.
  40. Shen, Guicheng, and Bingwu Liu. “The visions, technologies, applications and security issues of Internet of Things.” 2011 International Conference on E-Business and E-Government (ICEE). IEEE, 2011.
  41. Khan, Rafiullah, et al. “Future internet: the internet of things architecture, possible applications and key challenges.” 2012 10th international conference on frontiers of information technology. IEEE, 2012.
  42. Madakam, Somayya, et al. “Internet of Things (IoT): A literature review.” Journal of Computer and Communications 3.05 (2015). P. 164.
  43. Want, Roy. “An introduction to RFID technology.” IEEE pervasive computing 5.1 (2006), pp. 25-33.
  44. Li, Baoan, and Jianjun Yu. “Research and application on the smart home based on component technologies and the Internet of Things.” Procedia Engineering 15 (2011): 2087-2092.
  45. Razzak, Faisal. “Spamming the Internet of Things: A Possibility and its probable Solution.” Procedia computer science 10 (2012), pp. 658-665.
  46. Shao, Wei, and Li Li. “Analysis of the development route of IoT in China.” Perking: China Science and Technology Information 24 (2009), pp. 330-331.
  47. Sun, Chunling. “Application of RFID technology for logistics on internet of things.” AASRI Procedia 1 (2012), pp. 106-111.
  48. Dawood, Moeinfar, Shamsi Hossein, and Nafar Fatemeh. “Design and implementation of a low-power active RFID for container tracking at 2.4 GHz frequency.” Advances in Internet of Things 2012 (2012).
  49. Grieco, A., E. Occhipinti, and D. Colombini. “Work postures and musculo-skeletal disorder in VDT operators.” Bollettino de Oculistica suppl. 7 (1989): 99-111.
  50. Pahlavan, Kaveh, et al. “Handoff in hybrid mobile data networks.” IEEE Personal Communications 7.2 (2000), pp. 34-47.
  51. Chen, Xian-Yi, and Zhi-Gang Jin. “Research on key technology and applications for internet of things.”Physics Procedia 33 (2012), pp. 561-566.
  52. Arampatzis, Th, John Lygeros, and Stamatis Manesis. “A survey of applications of wireless sensors and wireless sensor networks.” Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005. IEEE, 2005.

Information about the authors:
Anshita Dhoot, Department of Radio Engineering & Computer Technology, Moscow Institute of Physics & Technology, Moscow, Russia;
School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi, India
A.N. Nazarov, Prof., International Telecommunication Union, ITU, expertMoscow, Russia
ResearcherID: G-3154-2013. Scopus Author ID: 7201780424