2020
DOI: 10.3390/sym12101674
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things and Its Applications: A Comprehensive Survey

Abstract: With the evolution of the fifth-generation (5G) wireless network, the Internet of Things (IoT) has become a revolutionary technique that enables a diverse number of features and applications. It can able a diverse amount of devices to be connected in order to create a single communication architecture. As it has significantly expanded in recent years, it is fundamental to study this trending technology in detail and take a close look at its applications in the different domains. It represents an enabler of new… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
60
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
2
1

Relationship

3
6

Authors

Journals

citations
Cited by 159 publications
(61 citation statements)
references
References 143 publications
0
60
0
1
Order By: Relevance
“…In IoV channel communication, the Support Vector Machine (SVM) enables developing a lightweight authentication system to identify vehicles based on their pseudorandom arrival in the time domain or the frequency range via multiple sensors. provided a fast authentication mechanism for large-scale IoV that depends on the identical unique Pseudo-Random Binary Sequence (PRBS) for vehicle access time slots or access frequencies [83].…”
Section: Confidentiality Obligationmentioning
confidence: 99%
See 1 more Smart Citation
“…In IoV channel communication, the Support Vector Machine (SVM) enables developing a lightweight authentication system to identify vehicles based on their pseudorandom arrival in the time domain or the frequency range via multiple sensors. provided a fast authentication mechanism for large-scale IoV that depends on the identical unique Pseudo-Random Binary Sequence (PRBS) for vehicle access time slots or access frequencies [83].…”
Section: Confidentiality Obligationmentioning
confidence: 99%
“…e layer nodes correspond to the inner product between the input sample and support vector that enables the selection of the most suitable optimized communication mode [83].…”
Section: Confidentiality Obligationmentioning
confidence: 99%
“…In general, IoT applications and services are productive where updates are required on the cloud and perform indoor office or smart home surveillance, including things like an automatic door lock to garage gate opening on arrival. In this small-scale environment, IoT can be quickly and effectively deployed with lower end-to-end cost, less energy consumption, and greater scalability [180]. In comparison, IoT has many critical applications, for instance, industrial automation, smart vehicular system (autonomous vehicles), advanced traffic control system, the remote clinical system for monitoring and operation, massive aeronautical communication system updates, and so on required high reliability, security, safety, dedicated end to end connection with ultra-reliable lower latency for stringent setups and minimal vulnerability to end-users.…”
Section: Internet Of Thingsmentioning
confidence: 99%
“…SG aims to overcome one of the main limitations of the current electric grid, related to the lack of integration of novel information and communication technologies, allowing the use of heterogeneous devices capable of measuring, monitoring and exchanging information about grid components, in order to make it more connected and smarter. Among the novel information and communication technologies there are those based on the internet of things (IoT), which play a strategic role in the era of Industry 4.0 as shown by [ 4 , 5 , 6 , 7 , 8 ]. The current literature presents several studies about enabling enabling internet of things (IoT) in SG, typically referred as IoT-enabled SG [ 9 , 10 ].…”
Section: Introductionmentioning
confidence: 99%