2020
DOI: 10.1007/s10776-020-00483-7
|View full text |Cite
|
Sign up to set email alerts
|

IoT Ecosystem: A Survey on Devices, Gateways, Operating Systems, Middleware and Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
75
0
7

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 170 publications
(108 citation statements)
references
References 103 publications
0
75
0
7
Order By: Relevance
“…A typical IoT ecosystem consists of sensors, actuators, a processing unit with firmware that operates with constrained resources, and wireless communication infrastructure to receive the sensed data and send them to any location via the IoT gateway and the internet [60,62]. IoT devices are embedded into larger real-world applications that are emerging towards establishing a smart environment with a paramount emphasis on precision and intelligence [63,64].…”
Section: Security Requirements Of Iot Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…A typical IoT ecosystem consists of sensors, actuators, a processing unit with firmware that operates with constrained resources, and wireless communication infrastructure to receive the sensed data and send them to any location via the IoT gateway and the internet [60,62]. IoT devices are embedded into larger real-world applications that are emerging towards establishing a smart environment with a paramount emphasis on precision and intelligence [63,64].…”
Section: Security Requirements Of Iot Architecturementioning
confidence: 99%
“…It deals with the pre-processing of IoT data for different third-party applications. It makes use of machine learning and intelligent data mining, for facilitating automatic actions with real-time response requirements in critical environments, such as traffic or health care systems [62,63]. Hence, further data processing required in the Application Layer depends on the security and trust of the Middleware Layer for enforcing the integrity of IoT data [23].…”
Section: (C) Middleware or Service Layermentioning
confidence: 99%
“…In addition, benefited from the 5G network, the acquisition rate of sensing data is able to satisfy the requirements of big data analysis and higher forms of AI 43,44 . Besides, AIoT (AI + IoT) based on the collective integration of AI and IoT has also emerged and been considered as the state‐of‐the‐art technology to enable intelligent ecosystems in broad IoT applications 45‐48 . When combining wearable electronics/photonics with AI technology, the resultant wearable systems are able to perform a more complicated and comprehensive analysis on the acquired data sets (training sets) beyond the capability of conventional approaches 49,50 .…”
Section: Introductionmentioning
confidence: 99%
“…The IoT enables the connection of a very large-scale quantity of devices, users and their associated services and applications, enabling them to interact with one another. While this improves the users’ experience, it also poses multiple security issues [ 26 , 27 , 28 ]. Numerous proposals to address the security issues of the IoT have been advanced and address areas such as access control, privacy, trust, identity, etc.…”
Section: Introductionmentioning
confidence: 99%