IEEE 2013 Tencon - Spring 2013
DOI: 10.1109/tenconspring.2013.6584443
|View full text |Cite
|
Sign up to set email alerts
|

The Internet of Things: Vision & challenges

Abstract: The Internet of Things (IoT) was of a vision in which all physical objects are tagged and uniquely identified using RFID transponders or readers. Nowadays, research into the IoT has extended this vision to the connectivity of Things to anything, anyone, anywhere and at anytime. The IoT has grown into multiple dimensions, which encompasses various networks of applications, computers, devices, as well as physical and virtual objects, referred to as things or objects, that are interconnected together using commun… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 67 publications
(29 citation statements)
references
References 7 publications
0
24
0
Order By: Relevance
“…The main survey papers on which we have drawn for our list of technical research challenges are the following: Borgia [4], Jain [5], Stankovic [6], Mattern [7], Elkhodr [8], Gubbi [9], Chen [10], Muralidharan [11]and Al-Fuqaha [12]. Our consolidated list is shown in Table 1.…”
Section: Research Challenges For the Future Iotmentioning
confidence: 99%
“…The main survey papers on which we have drawn for our list of technical research challenges are the following: Borgia [4], Jain [5], Stankovic [6], Mattern [7], Elkhodr [8], Gubbi [9], Chen [10], Muralidharan [11]and Al-Fuqaha [12]. Our consolidated list is shown in Table 1.…”
Section: Research Challenges For the Future Iotmentioning
confidence: 99%
“…These challenges include:  User Privacy: Privacy is one of the most sensitive issues in the IoT system. This is because IoT devices collect various sensitive personal information like financial accounts, user habits, geolocations, physical condition and many others that can affect the user privacy that should be protected [1].  Large Scale: Many IoT devices are designed to be deployed at a massive scale that is beyond traditional Internet-connected devices.…”
Section: Iot Security Challengesmentioning
confidence: 99%
“…It extends the interaction between humans and applications through objects, which can be users or applications [1]. The IoT has the potential to add a new dimension by enabling communications with and among smart objects, thus leading to the vision of ''anytime, anywhere, anything" communications [2], [3].…”
Section: Introductionmentioning
confidence: 99%
“…These technologies are not completely protective in the case of IoT. Certain situations of IoT such as positioning do still present privacy problems [25]. Some malicious third party can in fact access a user's location information and use it for malicious activities.…”
Section: Third Party Attacksmentioning
confidence: 99%