Open Access   Article Go Back

Major Domains of Internet of Things (IOTS) Based Applications and Associated Challenges

Dharmendra Patel11 , Pranav Vyas2 , Atul Patel3

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-6 , Page no. 810-818, Jun-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i6.810818

Online published on Jun 30, 2019

Copyright © Dharmendra Patel1, Pranav Vyas, Atul Patel . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Dharmendra Patel1, Pranav Vyas, Atul Patel, “Major Domains of Internet of Things (IOTS) Based Applications and Associated Challenges,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.810-818, 2019.

MLA Style Citation: Dharmendra Patel1, Pranav Vyas, Atul Patel "Major Domains of Internet of Things (IOTS) Based Applications and Associated Challenges." International Journal of Computer Sciences and Engineering 7.6 (2019): 810-818.

APA Style Citation: Dharmendra Patel1, Pranav Vyas, Atul Patel, (2019). Major Domains of Internet of Things (IOTS) Based Applications and Associated Challenges. International Journal of Computer Sciences and Engineering, 7(6), 810-818.

BibTex Style Citation:
@article{Patel1_2019,
author = {Dharmendra Patel1, Pranav Vyas, Atul Patel},
title = {Major Domains of Internet of Things (IOTS) Based Applications and Associated Challenges},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2019},
volume = {7},
Issue = {6},
month = {6},
year = {2019},
issn = {2347-2693},
pages = {810-818},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4635},
doi = {https://doi.org/10.26438/ijcse/v7i6.810818}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.810818}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4635
TI - Major Domains of Internet of Things (IOTS) Based Applications and Associated Challenges
T2 - International Journal of Computer Sciences and Engineering
AU - Dharmendra Patel1, Pranav Vyas, Atul Patel
PY - 2019
DA - 2019/06/30
PB - IJCSE, Indore, INDIA
SP - 810-818
IS - 6
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
292 180 downloads 108 downloads
  
  
           

Abstract

In recent years Internet of Things (IoTs) concept has expanded in massive impetus due to very good Internet infrastructure everywhere. IoT has the ability to creating a network of physical things that use embedded technologies in order to sense, converse, cooperate, and team up with other things. IoT sets up sophisticated connectivity among physical things in order to make automation in specific areas. Several applications have been developed in all domains, based on IoT concepts, to collaborate with other physical things in order to achieve atomization in that area. This paper will focus on major applications of Internet of Things (IoTs) on various application domains. Internet of Things (IoTs) process is very complex in order to team up with other physical objects and deals with many challenges. This paper will also discuss with challenges of IoTs in various application domains.

Key-Words / Index Term

Internet of Things (IoTs), Embedded Technologies, Data Analytics, Controllers, Connectivity

References

[1] Angelo P. Castellani,Nicola Bui,Paolo Casari,Michele Rossi, Zach Shelby, Michele Zorzi (2010), Architecture and Protocols for the Internet of Things: A Case Study, IEEE, pages-678-683.
[2] BRICKELL , E., C AMENISCH , J., AND C HEN , L.(2004), Direct anonymous attestation, In Proceedings of the 11th ACM conference on Computer and communications security, ACM, pp. 132–145.
[3] Carretero, J. & García, J. D.(2013), The Internet of Things: connecting the world. Personal Ubiquitous Computing .
[4] D. Uckelmann, M. Harrison, F. Michahelles (2011), An Architectural Approach Towards the Future Internet of Things, Architecting the Internet of Things, Springer-Verlag Berlin Heidelberg .
[5] Daniele Miorandi, , , Sabrina Sicari, , Francesco De Pellegrini, ,Imrich Chlamtac(2012), Internet of things: Vision, applications and research challenges, Ad Hoc Networks, Volume 10, Issue 7, Pages 1497–1516.
[6] Hasan Omar AlSakran (2015), Intelligent Traffic Information System Based on Integration of Internet of Things and Agent Technology, International Journal of Advanced Computer Science and Applications,Vol. 6, No.2.
[7] Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, M. Palaniswami(2013), Internet of Things (IoT) : A vision, architectural elements,and future directions, Elsevier, Future Generation Computer Systems 29, 1645-1660.
[8] Jeong-Yong Byun, Aziz Nasridinov (2014), Internet of Things for Smart Crime Detection, Contemporary Engineering Sciences, Vol. 7, no. 15, 749 – 754.
[9] Lei Li, Jing Chen (2011), System Security Solutions of RFID System of Internet of Things Sensing Layer. J. Net Security Technologies and Application, (6): 34-36.
[10]Liang Shen, Yan Zhang ,JianGu (2012),Development Trend of IPv6-based Information Security Products in Network Layer of IoT. C. In: 27th National Computer Security Academic Communication. (8) :38-40.
[11] Lianos, M. and Douglas, M. (2000), Dangerization and the End of Deviance: The Institutional Environment. British Journal of Criminology, 40, 261-278.
[12] Luigi Atzori, Antonio Iera,Giacomo Morabito(2010), The Internet of Things : A Survey, Elsevier, Computer Networks 54, 2787-2805.
[13] Matthew Gigli, Simon Koo(2011) , Internet of Things: Services and Applications Categorization,Scientific Research an academic publisher , Vol.1 No.2.
[14] Mingchuan Zhang,Haixia Zhao, Ruijuan Zheng, Qingtao Wu and Wangyang Wei, Cognitive Internet of Things:Concepts and Application Example, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 2012.
[15] Nan LIN,Weihang SHI (2014), The Research on Internet of Things Application Architecture Based on Web , IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA),pages-184-187.
[16] PFLEEGER, C. P., AND P FLEEGER , S. L (2002), Security in computing . Prentice Hall Professional Technical Reference.
[17] SADEGHI , A.-R., AND S TUBLE , C(2004), Property-based attestation for computing platforms: caring about properties, not mechanisms. In Proceedings of the 2004 workshop on New security paradigms, ACM, pp. 67–77.
[18] SESHADRI , A., P ERRIG , A., V AN D OORN , L., AND K HOSLA , P. Swatt(2004), Software-based attestation for embedded devices. In Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on , IEEE, pp. 272–282.
[19]S hancan g Li, Kewan g Zhan g (2008),Principle and application of wireless sensor network, China Machine Press .
[20] SIMMONDS , A., S ANDILANDS , P., AND V AN EKERT , L. (2004),An ontology for network security attacks.In Applied Computing . Springer, pp. 317–323.
[21] Vijayakannan Sermakani (2014), Transforming healthcare through Internet of Things, Project Management Practioner’s Conference.
[22] Yang Yang (2012), Research and Design of the teaching platform architecture based on IOT , IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.5, pages- 103-105.
[23] Zhao Xiaorong1, Fan Honghui1, Zhu Hongjin, Fu Zhongjun1,Fu Hanyu(2015), The Design of the Internet of ThingsSolution for Food Supply Chain, 5th International Conference on Education, Management, Information and Medicine
[24] Zhanlin Ji , Ivan Ganchev , Máirtín O’Droma , Li Zhao and Xueji Zhang(2014) , A Cloud-Based Car Parking Middleware for IoT-Based Smart Cities: Design and Implementation, Sensors 2014.
[25]ZHIBO PANG (2013), echnologies and Architectures of the Internet-of-Things (IoT) for Health and Well-being, Royal Institute of Technology, Doctoral Thesis in Electronic and Computer Systems, Stockholm, Sweden.