A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications

被引:1502
作者
Lin, Jie [1 ]
Yu, Wei [2 ]
Zhang, Nan [3 ]
Yang, Xinyu [1 ]
Zhang, Hanlin [4 ]
Zhao, Wei [5 ]
机构
[1] Xi An Jiao Tong Univ, Dept Comp Sci & Technol, Xian 710049, Shaanxi, Peoples R China
[2] Towson Univ, Dept Comp & Informat Sci, Towson, MD 21252 USA
[3] George Washington Univ, Dept Comp Sci, Washington, DC 20052 USA
[4] Qingdao Univ, Dept Comp Sci & Technol, Qingao 266061, Peoples R China
[5] Univ Macau, Dept Comp & Informat Sci, Macau, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2017年 / 4卷 / 05期
基金
美国国家科学基金会;
关键词
Applications; enabling technologies; fog/edge computing; Internet of Things (IoT); security and privacy; WIRELESS SENSOR NETWORKS; DATA-INJECTION ATTACKS; KEY MANAGEMENT; DATA AGGREGATION; SCHEME; SYSTEM; ATTESTATION; PROTOCOL; ENERGY;
D O I
10.1109/JIOT.2017.2683200
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog/edge computing has been proposed to be integrated with Internet of Things (IoT) to enable computing services devices deployed at network edge, aiming to improve the user's experience and resilience of the services in case of failures. With the advantage of distributed architecture and close to end-users, fog/edge computing can provide faster response and greater quality of service for IoT applications. Thus, fog/edge computing-based IoT becomes future infrastructure on IoT development. To develop fog/edge computing-based IoT infrastructure, the architecture, enabling techniques, and issues related to IoT should be investigated first, and then the integration of fog/edge computing and IoT should be explored. To this end, this paper conducts a comprehensive overview of IoT with respect to system architecture, enabling technologies, security and privacy issues, and present the integration of fog/edge computing and IoT, and applications. Particularly, this paper first explores the relationship between cyber-physical systems and IoT, both of which play important roles in realizing an intelligent cyber-physical world. Then, existing architectures, enabling technologies, and security and privacy issues in IoT are presented to enhance the understanding of the state of the art IoT development. To investigate the fog/edge computing-based IoT, this paper also investigate the relationship between IoT and fog/edge computing, and discuss issues in fog/edge computing-based IoT. Finally, several applications, including the smart grid, smart transportation, and smart cities, are presented to demonstrate how fog/edge computing-based IoT to be implemented in real-world applications.
引用
收藏
页码:1125 / 1142
页数:18
相关论文
共 163 条
[71]   Interacting with the SOA-Based Internet of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services [J].
Guinard, Dominique ;
Trifa, Vlad ;
Karnouskos, Stamatis ;
Spiess, Patrik ;
Savio, Domnic .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2010, 3 (03) :223-235
[72]  
Hadim G., 2006, IEEE DISTRIBUTED SYS, V7, P1
[73]   A cross-layer communication module for the Internet of Things [J].
Han, Chong ;
Jornet, Josep Miquel ;
Fadel, Etimad ;
Akyildiz, Ian F. .
COMPUTER NETWORKS, 2013, 57 (03) :622-633
[74]   PDA: Privacy-preserving data aggregation in wireless sensor networks [J].
He, Wenbo ;
Liu, Xue ;
Nguyen, Hoang ;
Nahrstedt, Klara ;
Abdelzaher, Tarek .
INFOCOM 2007, VOLS 1-5, 2007, :2045-+
[75]  
He XL, 2010, PROCEEDINGS OF THE ASME INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, VOL 1, PTS A AND B, P409, DOI 10.1109/WISM.2010.58
[76]  
Helps R.G., 2013, Proceedings of the 14th Annual ACM SIGITE Conference on Information Technology Education, SIGITE '13, page, P7
[77]  
Hui Suo, 2012, Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE 2012), P648, DOI 10.1109/ICCSEE.2012.373
[78]   A survey of applications and requirements of unique identification systems and RFID techniques [J].
Ilie-Zudor, Elisabeth ;
Kemeny, Zsolt ;
van Blommestein, Fred ;
Monostori, Laszlo ;
van der Meulen, Andre .
COMPUTERS IN INDUSTRY, 2011, 62 (03) :227-252
[79]   Social phishing [J].
Jagatic, Tom N. ;
Johnson, Nathaniel A. ;
Jakobsson, Markus ;
Menczer, Filippo .
COMMUNICATIONS OF THE ACM, 2007, 50 (10) :94-100
[80]  
Jara Antonio J., 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2012), P731, DOI 10.1109/IMIS.2012.200