IoT Application A Survey
IoT Application A Survey
IoT Application A Survey
net/publication/325116647
CITATIONS READS
9 1,604
2 authors:
All content following this page was uploaded by Harika Devi Kotha on 29 May 2018.
Research Paper
Abstract
Internet of Things ( IoT ) , where physical systems are connected over network to exchange information among themselves and with their
surroundings. IoT helps in developing most powerful industrial systems. It finds its various applications in house hold, agriculture, and
in various industrial systems. In an effort to understand the growth of IoT , this paper reviews current research trends of IoT , key
technologies, and its major applications, and identifies key challenges of IoT. This paper mainly summarizes the applications of IoT in
industries
Keywords: Internet of Things (IoT); Near field communication; Protocols; RFID; Wireless sensor Networks.
Research shows that there is tremendous growth in the area of 2. Background and Current Research of IoT
IoT. The industries are trying to work on more projects related to
IoT in the fields of health care, agriculture, aqua-forms, During initial days of IoT, RFID served as the foundation
transportation and others. Statistics shows that there will be technology, which allows user to send or receive information
around 22% growth in profit for the industries that are working on using radio - frequency signals. The connected device should be
IoT [3]. Not only industries are focusing on IoT, but in the recent attached with RFID tags, which contains reader and transmitter.
years it has been observed that number of publication on IoT are With the help of RFID reader , people can locate and monitor the
also increasing. devices [4]. Main application of RFID is transportation.
Copyright © 2018 Authors. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted
use, distribution, and reproduction in any medium, provided the original work is properly cited.
892 International Journal of Engineering & Technology
Later on wireless sensor networks (WSN) served as a building Project by investing INR 7060 crores [9] . The main aspects of
block for IoT. Here sensors / actuators will be attached to the this smart city project are : waste management , intelligent
devices with in the network. Sensors are used to sense the data transportation , smart urban lightening, tele-care and others .
and using actuators data will be transmitted. The main application Also India aims to develop IoT industry by investing USD 15
of WSN includes health-care. billion by 2020 [10] . Not only in India, countries like UK, china ,
Japan etc.. also working towards the development on IoT
With the advancement of RFID and WSN, there is a significant industry. UK government has launched £5m project to develop
growth in the development of IoT [2]. The working of IoT IoT [1]. Japan started two strategies called u- Japan and i -
connected devices is shown in the figure 2. IoT finds its main Japan for utilizing IoT in our daily routines [11].
applications in the fields of : tracking & monitoring , health -
care, home automation , environment monitoring , smart building
, agriculture , aqua - culture and others. With the advancement of 3. Architecture of IoT
smart phones, communication protocols, sensor networks
technologies; it is possible to connect more objects in a network.
Since IoT deals with heterogeneous devices there is no specific
architecture designed for IoT. Different architectures are proposed
for IoT. Depending on the type of application , a particular
architecture can be opted. In this paper, the basic 3 layer
architecture for IoT , cloud architecture , Fog based architecture ,
and finally service oriented architecture have been discussed
Figure. 2: Working of IoT • Application layer, being the top layer. It is responsible
for the transmitting the data to the required destination.
IoT application contains both hardware and software. IoT Figure 3 shows the 3 layer model of IoT.
hardware is broadly classified in to : 1) wearable devices, 2)
embedded system boards. Wearable devices will come with pre-
assembled hardware application [5]. The scope of wearable
devices is limited to a particular application. For example a smart
watch may be designed for call receiving and fitness monitoring
only. The advantage with wearable device is handy to use. The
examples of wearable devices are : Samsung gear , titan we
watch, google glass, cuir ally smart wallet , digit- sole smart shoe
and others.
On other hand embedded system boards are open for the user.
That is, a user can program these boards depending on the Figure. 3: 3-layer model of IoT
application he want . In present day market, there are so many
embedded system boards are available. Examples include The main disadvantage of this architecture is more tasks will be
Arduino boards, raspberry pi boards, Samsung artik board, scheduled to single layer, due to which updating single or
cloudbit, ESP8866 Wi-Fi module and others. After selecting a multiple layers is a tough task.
particular embedded system board, the user has to choose
application software. There are wide range of programming
languages like C, C++, python etc. 3.2. Cloud Based Architecture
IoT deals with connecting the devices to a network and sharing
As described in the figure 4, cloud based architecture of IoT
the information, in this point of view one has to ensure security,
contains mainly physical layer , process layer, gateway layer and
reliability. Also IoT deals with various kinds of devices, so in
order do the task properly standardization is required. cloud services.
Standardization provides inter-operability, compatibility on a
global scale [6]. Many professional bodies are working on
creating standards for IoT. At present organizations like IEEE,
International Electro-technical Standardization, China Electronics
Standardization Institute, American National Standards Institute
are working on development of standards for IoT [7]. By
designing IoT applications on accepted standards one can achieve
reliability and interoperability, which in-turn will reduce
maintenance costs in long run [8].
• The main and important part of cloud based architecture This reference model is generally used in business applications.
is cloud services. It is responsible for executing the data
(collected from industries or user etc..) by using data
analytic algorithms. The main components of cloud
services are : 1) Broker and message queue , 2) Data
base, 3) Server and 4) Event managers.
• Broker and message queue, are responsible for
managing incoming messages. It streamlines the
messages from various clients and processes them . It
helps in increasing the scalability of the network (ie.,
number of devices can be increased.)
• Server helps in visualizing the data, reporting. It helps Figure. 7: SOA for IoT
user to understand data. It also provides
recommendations to the user. • Data acquisition layer is similar to perception layer. By
using IP address , it tries to senses the data and transfers
• Event managers, performs event handling. It executes to network layer. It is also responsible to process (by
high priority interrupts like fire alarm. In case of using data computing algorithms) the data.
emergency, it triggers certain actions [12].
• Network layer as discussed earlier it deals with
communication protocols. It can be a wired network or
wireless. Generally used protocols are Z - wave, Zig –
bee etc..
As the name indicates these type of technologies are used for Technologies of IoT
locating and monitoring purpose. The examples include RFID
,WSN , QR code, barcodes and Intelligent sensors etc. • RFID
• WSN
Identification
RFID connected devices contain a reader – to collect the • QR code
technologies
information, and a transmitter – to transmit the information. RFID • Barcode
tags are costly when compared to other technologies like WSN.
• Zigbee
• Z wave
3.6. Communication Technology • MQTT
Communication • Bluetooth
These will provide guidelines to be followed data transfer. technologies • LiFi
Examples include Zig bee, Z wave, MQTT , Bluetooth ,Li-fi , Wi- • WiFi
fi, Near Field Communication(NFC) , HaLow ,Power line area • NFC
network and others [14]. • Power line area network
3.10. Aqua-culture
Using IoT in medical field one can track patient health condition.
The medical sensors can be: 1) wearable and 2) sensors 3.12. Transportation and Logistics
implanted in the body. Using wearable sensors one can track
various parameters like pulse rate, body temperature, calories etc. IoT plays an important role in transportation and logistics [18].
The examples of wearable’s are fitbit, reflex. Other type is By attaching RFID tags or barcodes to the vehicle, the industries
sensors implanted inside the body. These are used when patients’ can monitor the real time information of the vehicles [19], like
health has to be monitored continuously. For example by using a location of the vehicle and others. Furthermore, by enhancing the
sensor which is implanted in the human body (as shown in figure IoT abilities in transportation field one can control the speed of
10) , the doctor can track and monitor the patient heartbeat, pulse the vehicle. In logistics by making use of barcodes companies can
rate etc. track inflow and outflow of the products.
By establishing proper standards of IoT, we can enhance IoT in
various others fields like mining, safety, traffic monitoring etc..
4. Challenges of IoT [5] . Kiran Jot Singh , "A Survey of IoT platforms. Create your own
Internet of Things," IEEE consumer electronics magazine,2017
[6] . D. Bandyopadhyay, and J. Sen, “Internet of things: applications
• Since IoT connects heterogeneous systems together, to and challenges in technology and standardization,” Wireless
have a proper communication among them we have to Personal Communications, vol.58, no.1, pp.49-69, 2011.
standardize the IoT. Standardization includes [7] . ITU NGN-GSI Rapporteur Group, “Requirements for support of
interoperability, security and privacy issues [20]. USN applications and services in NGN environment,” Geneva:
International Telecommunication Union (ITU), 2010.
[8] . D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac,
• Another challenge of IoT is with respect to technical “Internet of things: vision, applications and research
issues. For example proper analysis of delay has to done challenges,” Ad Hoc Networks, vol.10, no.7, pp.1497-1516,
before the data transfer, such that efficiency of the 2012.
network increases. [9] . Richa Bhatia , " Top 5 Internet of Things (IoT) initiatives by
Government of India," [online] source :
• Other aspect is with respect to information security and https://www.iotindiamag.com/2016/12/top-5-internet-things-
privacy. Since so many IoT deals with tacking the initiatives-government-india/ , 2016
[10] . Ministry of electronics and information technology, " [online],
information of other devices, protecting the privacy of a source : http://meity.gov.in/content/internet-things.
user from attacker is a key issue to be addressed [11] . S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things:
properly [21]. vision, applications and research challenges,” Ad Hoc Networks,
vol.10, no.7, pp.1497-1516, 2012.
5. Conclusion [12] . Ademir F. da Silva, Ricardo L. Ohta, Marcelo N. dos Santos,
Alecio P.D. Binotto, "A Cloud-based Architecture for the
Internet of Things targeting Industrial Devices Remote
IoT combines various sensing devices , pattern recognition Monitoring and Control," IFAC-PapersOnLine, Volume 49,
algorithms, communication models and networking together for Issue 30, 2016, Pages 108-113.
proper communication . Presently IoT is in developing stage . As [13] . Pallavi Sethi," Review Article : Internet of Things:
there is enhancement in the capabilities of sensors, one can Architectures, Protocols, and Applications ," Journal of
Electrical and Computer Engineering , vol 2017
develop a good IoT model and hence after a decade or so [14] . Wikipedia contributors , " Internet of things ," Wikipedia, The
complete automation is possible with the help of IoT. In this Free Encyclopedia,[online] source :
paper we firstly discussed about history and current state - of - art https://en.wikipedia.org/w/index.php?title=Internet_of_things&
of IoT, then we move on to various architectures of IoT, then oldid=827547910, 2018.
discussed about communication technologies in IoT and finally [15] . N. Bhattacharyya and R. Bandhopadhyay , “Electronic nose and
discussed about various applications of IoT. electronic tongue,” in Nondestructive Evaluation of Food
Quality, Springer, Berlin, Germany, 2010 , pp. 73–100.
[16] . Wikipedia contributors, "Home-automation," Wikipedia, The
References Free Encyclopedia, [online]source :
https://en.wikipedia.org/w/index.php?title=Home_automation&
[1] . S Mandal , "Internet of Things (part 1)," Introduction ,[Online], oldid=827257639 , 2018.
source : http://www.c- [17] . Christopher Brewster, Ioanna Roussaki, Nikos Kalatzis, Kevin
sharpcorner.com/uploadfile/f88748/internet-of-things-iot-an- Doolin, and Keith Ellis , " IoT in Agriculture: Designing a
introduction/ , 2015 Europe-Wide Large-Scale Pilot ", IEEE communications
[2] . Da Xu, Li & He, Wu & Li, Shancang., " Internet of Things in magazine , 2017 pp 26-33.
Industries: A Survey," IEEE Transactions on Industrial [18] . L. Atzori, A. Iera, and G. Morabito, “The Internet of things: a
Informatics, Vol 10, 2014, pp 2233-2243. survey,” Computer Networks, vol.54, no.15, pp.2787-2805,
[3] . S Mandal , "Internet of Things (part 3)," devices and 2010.
technologies , [online],source : http://www.c- [19] . B. Karakostas, “A DNS architecture for the Internet of Things: a
sharpcorner.com/UploadFile/f88748/internet-of-things-iot-part- case study in transport logistics,” Procedia Computer Science,
3/ , 2015 vol.19, 2013 , pp.594-601.
[4] . X. Jia, O. Feng, T. Fan, and Q. Lei, “RFID technology and its [20] . F. Wang, B. Ge, L. Zhang, Y. Chen, Y. Xin, X. Li, “A system
applications in Internet of Things (IoT),” in Proceedings of the framework of security management in enterprise systems,”
2nd IEEE International Conference on Consumer Electronics, Systems Research and Behavioral Science, vol.30, no.3, 2013,
Communications and Networks (CECNet), April 21-23, pp. 287-299.
pp.1282-1285, 2012. [21] . R. Roman, P. Najera, and J. Lopez, “Securing the Internet of
Things,” Computer, vol.44, no.9, 2011, pp.51-58