2019 IEEE/ACM 1st International Workshop on Software Engineering Research &Amp; Practices for the Internet of Things (SERP4IoT) 2019
DOI: 10.1109/serp4iot.2019.00009
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Mapping Study on Internet of Things Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 76 publications
0
7
0
Order By: Relevance
“…For example, Ahmed et al [10] conducted an extensive SMS on most quality aspects covered by the ISO/IEC 25000 standard that are applicable to IoT applications. Lepekhin et al [11] also addressed several quality aspects in their systematic mapping study on IoT challenges. Venceslau et al [12] conducted a systematic mapping study on IoT semantic interoperability, which is a specific aspect of quality.…”
Section: Fig 2 Systematic Literature Study Stagesmentioning
confidence: 99%
“…For example, Ahmed et al [10] conducted an extensive SMS on most quality aspects covered by the ISO/IEC 25000 standard that are applicable to IoT applications. Lepekhin et al [11] also addressed several quality aspects in their systematic mapping study on IoT challenges. Venceslau et al [12] conducted a systematic mapping study on IoT semantic interoperability, which is a specific aspect of quality.…”
Section: Fig 2 Systematic Literature Study Stagesmentioning
confidence: 99%
“…Firstly, the CPU in IoT devices is minimal and cannot compute complex algorithms [8][9][10][11][12]. Secondly, the power consumption of the security algorithm should be low since the majority of IoT devices work with a battery [9,[11][12][13][14][15]. Thirdly, simple sensors are connected to cover large physical network [14].…”
Section: Introductionmentioning
confidence: 99%
“…Secondly, the power consumption of the security algorithm should be low since the majority of IoT devices work with a battery [9,[11][12][13][14][15]. Thirdly, simple sensors are connected to cover large physical network [14]. Finally, the cost of implementing the security algorithm should be little to deploy as many devices as possible [1,10,16,17].…”
Section: Introductionmentioning
confidence: 99%
“…An important part when applying IIoT-based solutions is the IoT platform. This platform connects the data collected from sensors with user applications on mobile devices and SaaS applications [17].…”
mentioning
confidence: 99%