Sie sind auf Seite 1von 7

I o T: P rotocol S tack ,

C ross -L ayer , and P ower C onsumption I ssues

Internet of Things Architecture:


Recent Advances, Taxonomy,
Requirements, and Open Challenges
Ibrar Yaqoob, Ejaz Ahmed, Ibrahim Abaker Targio Hashem, Abdelmuttlib
Ibrahim Abdalla Ahmed, Abdullah Gani, Muhammad Imran, and Mohsen Guizani

Abstract and identify objects and retrieve information [3].


Moreover, ubiquitous technologies like RFID and
Recent years have witnessed tremendous growth sensor networks will rise to address these emerging
in the number of smart devices, wireless technol- challenges, which center on embedding informa-
ogies, and sensors. In the foreseeable future, it is tion and communication systems within our envi-
expected that trillions of devices will be connect- ronment. Figure 1 illustrates the architecture of IoT.
ed to the Internet. Thus, to accommodate such a It also provides a blueprint for data abstraction and
voluminous number of devices, scalable, flexible, the quality of “quadruple” trust, which includes
interoperable, energy-efficient, and secure net- protection, security, privacy, and safety.” Further-
work architectures are required. This article aims to more, this standard provides a reference architec-
explore IoT architectures. In this context, first, we ture that builds upon the reference model.
investigate, highlight, and report premier research Although several studies on IoT [1, 4, 5] have
advances made in IoT architecture recently. Then been conducted, none of them is specifically focused
we categorize and classify IoT architectures and on architectural components of IoT. With the aim of
devise a taxonomy based on important parameters exploring IoT network architectures, this study is con-
such as applications, enabling technologies, busi- ducted. Thus, this work is motivated by the need for
ness objectives, architectural requirements, network network architectures, as will be required in the future
topologies, and IoT platform architecture types. We to accommodate trillions of devices. The contribu-
identify and outline the key requirements for future tions of the article are numerous:
IoT architecture. A few prominent case studies on • First, we investigate, highlight, and report pre-
IoT are discovered and presented. Finally, we enu- mier research advances made in IoT architec-
merate and outline future research challenges. ture recently.
• Then we categorize and classify IoT architec-
Introduction tures and devise a taxonomy.
In recent years, the Internet of Things (IoT) has • We identify and outline the key requirements
emerged as a new computing paradigm, in which for future IoT architecture.
a continuum of devices and objects are intercon- • A few prominent case studies on IoT are discov-
nected with a variety of communication solutions ered and presented.
such as Bluetooth, WiFi, ZigBee, and GSM, to • Finally, we enumerate and outline future
name a few. These communication technologies research challenges.
enable connectivity among heterogeneous IoT These contributions are given in separate sec-
Ibrar Yaqoob, Ejaz Ahmed, devices that can help improve the living standard tions, and the conclusion is then provided.
Ibrahim Abaker Targio Hash- of citizens. It is anticipated that more than 50 bil-
em, Abdelmuttlib Ibrahim
Abdalla Ahmed, and Abdullah
lion devices, ranging from smartphones, laptops, Motivation
Gani are with the Centre for sensors, and game consoles, will be connected to With the rapid adaptation of modern smart tech-
Mobile Cloud Computing the Internet through several heterogeneous access nologies, IoT has gained much attention from
Research, Faculty of Comput- network technologies such as RF identification industry and the IT community in terms of net-
er Science and Information
Technology, University of
(RFID) and wireless sensor networks. As identified working and communication aspects. IoT devices
Malaya. by [1], IoT can be recognized in three paradigms: depend completely on network connection, which
Internet-oriented, sensors, and knowledge. Normal- demands high speed, high reliability, and availabili-
Muhammad Imran is with ly, it can be realized that the implementation of IoT ty. However, existing networking architectures can-
King Saud University.
technology is very close to modern society, where not provide smooth connectivity to the voluminous
Mohsen Guizani is with the people and things are integrated virtually to infor- amount of devices, as in the IoT paradigm different
University of Idaho. mation systems via wireless sensors [2]. types of networks are involved that can cause seri-
The purpose of connecting devices and objects ous problems. The motivation for new IoT architec-
Digital Object Identifier: is to serve as the backbone for ubiquitous com- tures can be seen in [6], which presents how much
10.1109/MWC.2017.1600421 puting, enabling smart environments to recognize demand for new network architectures is in the

10 1536-1284/17/$25.00 © 2017 IEEE IEEE Wireless Communications • June 2017


market, as in the future, the existing architectures
will not be fully applicable to provide ideal services.
In the foreseeable future, the number of con-

Smart people
management
Smart waste
Smart

Smart grid
nected devices to the Internet will be huge in num- applications
bers. Cisco predicted that the number of connected
devices will rise to 50 billion by the end of 2020.1
IDC predicted that global spending on the IoT will
also rise to US$1.7 trillion by 2020.2 Telefonica esti-
mated that 90 percent of cars will be connected to
the Internet by 2020.3 Gartner estimated that by Management
and security
2020, a quarter billion vehicles will be connected
services
to the Internet with the aim of enabling new vehicle
services while having the capabilities of automat-
ed driving.4 As the statistics have revealed that the
voluminous number of devices will be connected
to the Internet, existing network architectures are Gateway and
no longer able to accommodate the IoT devices. network
Thus, scalable, flexible, interoperable, lightweight,
energy-aware, and secure network architectures will
be required in the future for IoT. The involvement of
heterogeneous devices that have multi-radio capa-
bilities can cause interference problems.The existing Sensors and
networking architectures were only designed to sup- connectivity
port a limited number of devices.
Figure 1. Architecture of the Internet of Things.
Recent Research Efforts
This section reviews recent research efforts direct-
ed at IoT network architecture.The aim of the sec- the other hand, several existing studies also reveal
tion is to critically investigate the existing solutions. that wireless SDN-based architecture can help to
meet the objectives of IoT in terms of better QoS,
General Architecture scalability, quick and easy deployment of resources,
A generic IoT architecture consists of three lay- and context-aware semantic information retrieval.
ers: application, transport, and sensing. The
application layer employs intelligent computing 3G-PLC
technologies (e.g., data mining, cloud comput- A new IoT architecture called 3G-PLC has been
ing) to extract valuable information from process- proposed in [9]. The architecture combines two
ing voluminous data and provides an interface sophisticated communication networks: power line
between users and IoT. The transport layer deals communication (PLC) and the third generation (3G)
with network operations, whereas the sensing network. The motivation behind using these two
layer is responsible for collecting the information. networks was the scalability factor. The objective
Despite advantages such as easier problem identi- of this work was to integrate the IoT framework lay-
fication and management and flexibility, the lack ers, such as the perception layer, aggregation layer,
of application layer security is a prime limitation. network layer, and application layer. Although the
A scalable and self-configuring peer-to-peer- proposed architecture offers notable merits such as
based architecture for a large-scale IoT network reduced cost of network construction and improved
has been proposed in [7]. The objective was to services compared to backhaul network competi-
provide automated services and resource discov- tors, the lack of incorporation of network heteroge-
ery mechanisms that demand no human inter- neity parameters is one of the prime limitations.
vention for their configuration. The solution
is based on local and global service discovery, MobilityFirst
which allows successful interaction and maintain- In [10], the authors showed that by using name-
ing mutual independence. The main importance based future Internet architecture (FIA) called
of this solution is that its experiments are conduct- MobilityFirst can help address many challenges
ed on real-world devices, which make the results associated with mobile phones when acting as
more trustworthy. However, the possibility of an spontaneous gateways of wireless sensor net- 1 http://www.fool.
error occurring is the main factor in needing a works (WSNs) in IoT systems. The capacity of the com/investing/gen-
more reliable solution in terms of IoT architecture. system is analyzed and compared to the sensor eral/2016/01/18/
data rate at a given hotspot. Although the pro- internet-of-things-in-2016-6-
Software-Defined posed work can provide many benefits such as stats-everyone-should.aspx.
Network-Based Architecture high security and ad hoc services, the lack of 2 http://www.mar-
Z. Qin et al. [8] designed a software-defined net- incentive mechanisms for mobile contributors to ketwatch.com/story/
work (SDN)-based architecture for the IoT with the the system is a disadvantage. internet-of-things-market-to-
objective of providing high-level quality of service reach-17-trillion-by-2020-
(QoS) to the different IoT tasks in heterogeneous CloudThings idc-2015-06-02-8103241.

wireless network environments. Although the pro- J. Zhou et al. [11] presented an IoT-enabled smart 3 http://telecoms.
posed architecture provides many benefits — flex- home scenario to analyze the IoT application require- com/272982/telefon-
ibility, effectiveness, and efficient management in ments. In this context, CloudThings architecture has ica-90-global-connect-
ed-car-penetration-by-2020/
terms of flow and task resources — the management been proposed based on the cloud-based IoT plat-
of the layer designed by the controller is difficult to form. The architecture accommodates CloudThings 4 http://www.gartner.com/
manage for heterogeneous IoT multinetworks. On platform as a service (PaaS), software as a service newsroom/id/2970017

IEEE Wireless Communications • June 2017 11


Internet of Things taxonomy

Enabling Business IoT platforms Network


Applications Architectural architecture
technologies objectives requirements Event topologies
types processing
Network size
Smart Marketing Event
Scalable Centralized notification Point-to-point
transportation Sigfox automation Mobility rate
Real-time
Heterogeneity analytics
Reduced Flexible Peer-to-peer Star
Smart home Neul business cost Number of events messaging
Decentralized
Distributed auditing
Smart Sale data Interoperable Decentralized Mesh
healthcare 6LowPAN access file sharing

Targeted
Smart grid customer Quality of service
LoRaWAN
services

Smart lighting Improve supply Secure


Cellular chain processes

Intelligent Software defined


building networks

Figure 2. Taxonomy of the Internet of Things.

(SaaS), and infrastructure as a service (IaaS) to accel- as Sigfox, Neul, low-power personal area network
erate IoT applications. The integration of cloud with (6LowPAN), low-range wireless area network
IoT offers a viable approach to facilitate application (LoRaWAN), cellular, and SDNs. Sigfox is a wide
development. The fundamental developments for range technology, as its coverage is between those
approaching CloudThings architecture are based on of Wifi and cellular. The objective of Sigfox is to
previously running IoT applications and composing support limited-power devices in terms of data
new ones. However, the system requires dealing with transfer. Neul is a new, weightless wide range wire-
the heterogeneity of the wireless network communi- less networking technology designed to support
cations embedded in the IoT. IoT. 6LowPAN is an IP-based network protocol
that defines new encapsulation and header com-
Taxonomy pression mechanisms. It can be used in multiple
Figure 2 depicts the taxonomy devised based communications platforms such as Wi-Fi, 802.15.4,
on parameters such as applications, enabling and sub-1GHz ISM. LoRaWAN is also designed
technologies, business objectives, architectural to target wide area networks. Moreover, it sup-
requirements, IoT platform architecture types, and ports low-cost mobile bidirectional communica-
network topologies. tion in IoT by strengthening security. To support
the long distance operations of IoT applications,
Applications cellular (GSM/3G/4G) communication capabil-
Some important IoT applications are smart trans- ities are used. It is considered as the most ideal
portation, smart home, smart healthcare, smart grid, for the sensor-based low-bandwidth-data projects.
smart lighting, and intelligent building, to name a Software-defined networking is an emerging tech-
few. These applications facilitate people in differ- nology that can help to intelligently route traffic,
ent aspects of life. The smart transportation system eliminate bottlenecks, and induce efficiencies to
helps reduce traffic congestion by providing an help the data generated by IoT to be processed
alternate route. Moreover, the predictive analysis of without placing a larger strain on the network.
smart transport data helps minimize road casualties
(e.g., accidents). Smart homes allow inhabitants to Business Objectives
remotely control appliances. Through smart health- IoT can provide many benefits to businesses. The
care applications, diseases can be diagnosed earlier, business objectives of IoT are as follows: market-
which leads to saving lives. In a smart grid environ- ing automation, reduced cost, sale data access,
ment, smart meters are used to measure energy targeted customer services, and improved supply
consumption levels, and readings are automatically chain processes. Smart IoT-enabled applications
sent to the grid. Through smart lighting, low-cost create knowledge about customers in terms of the
sensors and wireless connectivity can be integrat- history of a customer (e.g., buying patterns and
ed into lamps and luminaries. Intelligent building is preferences). This can allow businesses to find
another important IoT application where the build- out in real time what the needs of customers are
ing is empowered by information and communica- and in the future what products would be more
tion technologies (ICT). In short, IoT applications are demanded; in this way, marketing automation can
facilitating people’s daily lives. be enabled. Through online connectivity, anything
can be ordered online that can help save money
Enabling Technologies by reducing traveling costs. As IoT devices gen-
IoT devices cannot operate without network erate tremendous amounts of data, by analyzing
connectivity. To enable connectivity among het- this data, business people can easily know how,
erogeneous smart devices, different networking why, and where products are being used and pur-
and communication technologies are used such chased, which can lead toward making the best

12 IEEE Wireless Communications • June 2017


strategic plans for companies. Furthermore, cus- Resource Control: The smart devices partici- The network topologies
tomers‚ services, and supply chain processes can pating in an IoT environment must be accessible
also be improved through analyzing the data gen- and configurable in a remote manner. In some sit- used in IoT can be clas-
erated by the IoT devices of each individual. In uations, when the administrators are not available sified into three catego-
short, IoT can help meet many business objectives. at their particular places, controlling the resources
from outside can help resolve the matter. More- ries: star, point-to-point
Architectural Requirements over, IoT systems must be able to balance the load
For the existing and emerging IoT applications, it is in case of redundant resource availability, which
and mesh. In point-to-
very well known that they have different architectur- can lead toward appropriate resource utilization. point network topology
al requirements such as scalability, flexibility, interop- Energy Awareness: The incorporation of ener-
erability, diverse QoS support, and security, to name gy awareness in the IoT paradigm, where most of a direct connection is
a few. The term scalable means managing the con- the devices are resource constrained, can help established between the
nectivity among a voluminous amount of network avoid unnecessary energy consumption. In some
devices without causing any performance degra- cases, when the load is not too heavy, devices nodes; whereas, in star
dation issues. Flexible means provisioning services should put themselves into sleep mode. More-
in such a way that a given system can be flexibly over, the formation of lightweight communica-
networks, all the devices
programmed to optimize the performance of cer- tion protocols can help save the energy of smart are connected to a
tain applications. Interoperability helps to enable the devices. Thus, the future IoT architecture must be
interoperations among heterogeneous networks. designed in such a way that it can minimize ener- central hub. However, in
Moreover, diverse QoS is one of the most important gy consumption. mesh network topology
architectural requirements for IoT, as different types Quality of Service: One of the requirements
of applications such as low data rate monitoring and of IoT architectures is that they shall be able to every node can be con-
delay-sensitive real-time applications in the smart provide quality services to users. QoS in IoT can
grid are involved. The IoT architecture must be intel- be ensured by prioritizing the services and retriev-
nected to each other.
ligent enough to handle the applications according al. Applications that require real-time processing
to its requirements. Security is one of the key con- must be given high priority to improve their per-
cerns in IoT because if someone’s data is compro- formance. Moreover, in response to a query, only
mised once, it may undermine the user’s trust in IoT. the required information should be retrieved. Incor-
Thus, security must be a top priority when designing poration of these suggestions in the the future IoT
the architecture for IoT. architecture can make it a huge success.
Interoperability: In the IoT paradigm, enabling
IoT Platform Architecture Types communication among devices from different
IoT platforms are of two types, centralized and vendors is a key requirement [12]. The future
decentralized. Most of the IoT platforms are linked IoT architecture must be able to support internet-
with the cloud architectures where a central hub working and seamless communication between
is used to provide a series of backend services to all kinds of applications such as business, desktop,
smart devices. In this type of architecture, smart and mobile applications. In addition, to enable the
devices act as consumers while a central hub serves communication between constrained and uncon-
as a centralized node. The key centralized capabili- strained devices of an IoT system, adaptation
ties of the IoT platform are event processing, event between networking protocols must be required.
notification, and real-time analytics, to name a few. Interference Management: IoT architecture
On the other hand, in some scenarios autonomous must be able to handle the interference problem. In
communication between smart devices is required the future, when trillions of smart devices that have
in the IoT paradigm without the need for a central multi-radio capabilities will be connected to the Inter-
hub. This type of architecture is a decentralized IoT net, interference will become a real problem. There-
platform. A few examples of decentralized IoT plat- fore, the future IoT architecture must be designed in
forms are peer-to-peer messaging, decentralized such a way that it can incorporate radio awareness.
auditing, and decentralized file sharing. Flawless connectivity can only be ensured by address-
ing the interference problem. In order to achieve reli-
Network Topologies able services in the IoT environment, interference-free
The network topologies used in IoT can be classi- solutions must be developed.
fied into three categories: star, point-to-point, and Security: Strengthening security in the IoT
mesh. In point-to-point network topology a direct environment has become an essential require-
connection is established between the nodes; ment [13]. The future IoT architecture must be
whereas in star networks, all the devices are con- secure enough to prevent devices being activated
nected to a central hub. However, in mesh net- by unauthorized means. In addition, the securi-
work topology all nodes can be connected to each ty mechanisms must be lightweight as most of
other. An IoT application developer must consider the devices are resource constrained. Moreover,
the six networking attributes while choosing a wire- ensuring the freshness of data is also very import-
less network: latency, throughput, fault resiliency, ant. The lack of strong security support in IoT can
scalability, the number of hops, and range. These undermine the trust of IoT users, which can lead
attributes can help in knowing the capabilities of to the failure of the technology.
the three IoT network topologies.
Case Studies
Requirements for This section briefly discusses the Microsoft Azure
IoT reference architecture and highlights of a few
Future IoT Architectures other IoT deployments that enabled the enterpris- 5 https://azure.microsoft.
This section outlines the key requirements for es to meet their business needs. Table 1 provides com/en-us/documentation/
future IoT architectures. These requirements are a summary of the case studies. articles/iot-suite-what-is-
elucidated in Fig. 3 and described next. Microsoft Azure:5 Microsoft Azure employs a azure-iot/

IEEE Wireless Communications • June 2017 13


The future IoT archi-
Prioritization of Retrieval of Unified Adaptation between
tecture must be secure services required interfaces networking protocols
information
enough to prevent the

accessible and

Prevention from
configurable
devices being activated

unauthorized
Remotely
Quality of

access
Interoperability
by unauthorized means. service

In addition, the security


mechanisms must be

Resource

Security
control
Key requirements of future
IoT architectures
lightweight as most of
the devices are resource Load balancing

Ensure data
freshness
constraint. Moreover, Energy
awareness
Interference
management
ensuring the freshness
of the data is also very
Lightwave Band
important. communication Sleep mode Radio awareness management
protocols

Figure 3. Requirement for future IoT architectures.

generic IoT solution architecture that mainly con- system. The company uses IBM services to launch
sists of four layers. In this architecture, the data car2go, an on-demand fleet of eco-friendly smart
collected by IoT devices is forwarded to a cloud cars that users can reserve from the mobile appli-
gateway, which makes it available for process- cation. Using IoT architecture that encompasses
ing by other back-end services. After processing, sensors and wireless communication allows the
data is delivered to other presentation devices or company to monitor the vehicle performance,
other line-of-business applications. The solution and provide an accessible network of vehicle and
is based on extensible preconfigured architec- analysis data to increase the efficiency of the car.
ture that addresses common IoT scenarios such as Lukoil:8 In Russia, the Timan-Pechora basin is
predictive maintenance and remote monitoring. home to the Varandey oil terminal. But it is locat-
It was developed with simulated devices such as ed at that place where the temperature is as low
the Azure IoT Hub, events, streams, and machine as –47 degrees Fahrenheit. The owner of the
learning to offer end-to-end solutions using spe- facility, Lukoil, wanted to increase the production
cific management consoles. The Azure IoT Hub of oil. Moreover, the owner wanted to export to
offers a reliable and secure bidirectional commu- some other countries. To achieve this goal, Lukoil
nications between devices and the cloud used in deployed IoT-based architecture called Emerson
the preconfigured solution architecture. PlantWeb and employed DeltaV digital automa-
Banco de Cordoba: 6 To train more than tion. The IoT-based solution helped them to pro-
3000 employees in an area that covered over tect the facility and improved the safety.
63,000 square miles with 243 branch locations,
Banco de Cordoba implemented an IoT-based Open Research Challenges
video solution. More than 2600 IP video camer- The section discusses the challenges remaining to
as, a new flexible network, and a cyber security be addressed for accommodating the trillion of
system were deployed in the service area. The IoT devices. The purpose of the section is to pro-
designed solution was not only single-objective; vide the research directions for the new research-
it also covers many aspects of the enterprise er in the domain.
such as security, marketing, and sales messages Interoperability: IoT has three main types
to customers. Banco de Cordoba claimed that of interoperability challenges, namely technical,
with this new IoT-based system, they got rid of semantic, and pragmatic. The technical challenges
a major issue: sending trainers in a specific field. have a concern with device capabilities, protocols,
Moreover, staff were also free of the extra bur- and relevant standards to coexist and interoperate
6 http://www.networkworld. den, which increased their productivity level in in the same computing paradigm, whereas seman-
com/article/2848714/ terms of electronic transactions that jumped by a tic have a concern with the capabilities of various
cisco-subnet/10-enter- factor of eight. In addition, the deployed system IoT components that are responsible for process-
prise-internet-of-things-de-
ployments-with-actual-results. also helped monitor the activities and ensured the ing and interpreting the exchanged data. Howev-
html security at each location of service. er, pragmatic have a concern with the capabilities
Daimler:7 IBM is one of the leading companies of the system components to observe the parties
7 http://www.cbron-
that offer implementation assistance to clients, intentions. Achievement of technical interoperabil-
line.com/news/inter-
net-of-things/m2m/ which has a huge impact in terms of increas- ity can be gained by offering agent-based media-
daimler-gets-iot-smart-by- ing operational efficiency, revolutionizing busi- tion between IoT devices and standards. Semantic
linking-cars-to-enterprise-sys- ness models, improving industry operations, and interoperability is a requirement to the machine
tems-4713572 recasting their customers’ experience. Although computable logic, knowledge discovery, and data
8 http://www.emerson. Daimler has faced challenges in terms of dealing federation between information systems. Pragmat-
com/neverbeendone/en-us/ with some of the internal operations using IoT ic interoperability can be achieved through the
Pages/LUKOIL.aspx technologies, these later became familiar to the creative design of predefined specifications of the

14 IEEE Wireless Communications • June 2017


Companies IoT-based Tiny devices are the
Case study Business needs Assessment Country
involved architecture backbone of IoT.
Lukoil Process automation of oil facility Emerson Success ü Russia However, these devices
Banco de Groupo Galmes, have limited processing
Video collaboration and protection project Success ü Argentina
Cordoba Cisco
capabilities, memory
Daimler Driving enterprise transformation IBM Success ü Germany and battery power. Con-
Microsoft To address the common IoT scenarios such as
Microsoft Success ü USA
sequently, compute-in-
Azure predictive maintenance and remote monitoring
tensive applications and
Table 1. Summary of the case studies.
routing processes cannot
components’ behavior. In the future, cross-lay- linking to a new region of a network. Second, the
run on IoT devices, as
er interoperability solutions are required. signaling and control messages require to be incor- these devices are very
Scalability: IoT are expected to face many chal- porated in such a way that it can help in knowing
lenges related to the potential unbounded number nodes’ locations in a network. Movement detec- lightweight.
of interacting entities and substantial differences in tion can be achieved through frequent scans, via
the interaction patterns and behaviors. The existing either passive messages from participating proto-
IoT architectures need to be scaled up to accommo- cols or a beacon from the mobility protocol. Mobil-
date the trillion of smart devices. IoT systems scal- ity management is one of the key issues in the IoT
ability management can be summarized into two paradigm. Consequently, it must be considered in
points. First, the rapid growth has been witnessed the future IoT architecture.
in the IoT devices. However, current management Security: The diversity of IoT applications and
protocols do not scale well to accommodate the heterogeneity of IoT communication infrastructures
requirements of IoT devices due to their limited results in an equally numerous variety of security
capabilities. Second, social relationships between challenges [14, 15]. In IoT, security can be provided
the owners of the devices need to be considered, in bottom-up fashion. In a bottom-up way, the sys-
where some of IoT system entities are human por- tem must follow a secure booting process, access
table devices. In the future, scalability management control rules, device authentication procedures,
protocols are expected to track social relationships and firewalling, and must be able to accept updates
between devices in order to enable ad hoc based and patches of security software in a non-disrup-
computing services by providing some incentives. tive way. Since the security is a key concern in IoT,
Flexibility: Since there are numerous applica- suitable security mechanisms must be applied at
tions of IoT, service provisioning to the different both the device and network levels (physically and
IoT applications according to their demands has non-physically). IoT devices must have some sort of
become very challenging. IoT users usually need intelligence to recognize and counteract potential
dynamically configured, customized, value-add- threats. Fortunately, this does not require a revolu-
ed, and autonomous on-the-move services. More- tionary approach; rather, an evolution of measures
over, personalized, customized, autonomous, and that have proven successful in other networks must
dynamic services can be supported by construct- be adapted in the IoT paradigm by considering the
ing and utilizing the adaptive, context-aware, and processing capabilities of smart devices.
reconfigurable multiple service network architec-
ture. In the future, models of service declarative Conclusion
specifications are required for the construction of With the rapid rate of increase in smart devices, the
future network service architectures. need for future IoT network architecture has arisen.
Energy Efficiency: Tiny devices are the back- The existing network architectures cannot accom-
bone of IoT. However, these devices have limit- modate the voluminous number of smart devices
ed processing capabilities, memory, and battery expected in the future. With the focus on the IoT
power. Consequently, compute-intensive appli- architectures, we have conducted this study. First,
cations and routing processes cannot run on IoT we have investigated, highlighted, and reported pre-
devices, as these devices are very lightweight. Con- mier research advances made in IoT architecture
sideration of energy awareness in routing protocols recently. Then we have categorized and classified
is still lacking. Although some protocol supports IoT architectures and devised a taxonomy. The key
low-power communication, these protocols are in requirements for future IoT architecture have been
an early stage of development. In the future, ener- identified and outlined. A few credible case stud-
gy harvesting techniques can be promising solu- ies have also been presented. Furthermore, several
tions to fulfill the energy requirements in IoT. open research challenges have been discussed as
Mobility Management: Node mobility can cre- future research directions. Finally, we conclude that
ate various challenges in terms of IoT network and in the foreseeable future, scalable, flexible, ener-
protocol efficiency. The current mobility protocols gy-efficient, interoperable, and secure network archi-
of vehicular ad hoc networks (VANETs), mobile tectures will be required, as the existing ones can
ad hoc networks (MANETs), and sensor networks only support a limited number of devices.
cannot deal well with typical IoT devices due to
severe energy and processing constraints. Mobility Acknowledgments
management is a crucial task, and has two stages. This work is funded by the Bright Sparks Program
First, movement detection is needed in order to and the Research Grant from the University of
be aware of the device movement, which requires Malaya under references BSP/APP/1689/2013,

IEEE Wireless Communications • June 2017 15


Wiley Transactions on Emerging Telecommunications Technolo-
IoT devices must have RP012C-13AFR, and UM.C/625/1/HIR/MOE/
gies. His areas of interest include mobile cloud computing, mobile
FCSIT/03. Imran’s work is supported by the Dean- edge computing, the Internet of Things, cognitive radio networks,
some sort of intelligence ship of Scientific Research at King Saud University and smart cities. He has successfully published his research work
to recognize and coun- through Research Group No. RG # 1435-051. in more than 30 international journals and conferences.

teract against the poten- References I brahim A baker T argio H ashem (targio@siswa.um.edu.my)
is currently a Ph.D. degree candidate in the Department of
[1] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: Computer Systems and Technology, University of Malaya. He
tial threats. Fortunately, A Survey,” Computer Networks, vol. 54, no. 15, 2010, pp. received his M.S. degree in computing in 2012 at the same uni-
2787–2805. versity and his B.E. degree in computer science in 2007, Sudan.
this does not require a [2] C.-W. Tsai, C.-F. Lai, and A. V. Vasilakos, “Future Internet of He obtained professional certificates from Cisco (CCNP, CCNA,
Things: Open Issues and Challenges,” Wireless Networks, and CCNA Security) and the APMG Group (PRINCE2 Founda-
revolutionary approach; vol. 20, no. 8, 2014, pp. 2201–17. tion, ITIL v3 Foundation, and OBASHI Foundation). He worked
[3] J. A. Guerrero-ibanez, S. Zeadally, and J. Contreras-Castillo, as a tutor at Cisco Academy, University of Malaya. His main
rather an evolution of “Integration Challenges of Intelligent Transportation Systems research interests include big data, cloud computing, distributed
with Connected Vehicle, Cloud Computing, and Internet of computing, and networking.
measures that have Things Technologies,” IEEE Wireless Commun., vol. 22, no. 6,
Dec. 2015, pp. 122–28. A bdelmuttlib I brahim A bdalla A hmed (abdelmuttlib@siswa.
proven successful in [4] A. Al-Fuqaha et al., “Internet of Things: A Survey on Enabling um.edu.my) received his B.Sc. degree in computer science from
Technologies, Protocols, and Applications,” IEEE Commun. OIU, Sudan, and his M.S. degree in computer science from
other networks must be Surveys & Tutorials, vol. 17, no. 4, 2015, pp. 2347–76. IIUI, Pakistan. He is currently pursuing a Ph.D. degree at the
[5] C. Perera et al., “Context Aware Computing for the Internet University of Malaya. His research Interest areas include trust
adapted in the IoT para- of Things: A Survey,” IEEE Commun. Surveys & Tutorials, vol. and reputation systems, security and digital forensics, Internet
16, no. 1, 2014, pp. 414–54. of Things, mobile and cloud computing, and vehicular networks.
digm by considering the [6] J. Gubbi et al., “Internet of Things (IoT): A Vision, Architec-
tural Elements, and Future Directions,” Future Generation Abdullah Gani [M’01, SM’12] (abdullahgani@ieee.org) is a full
processing capabilities of Computer Systems, vol. 29, no. 7, 2013, pp. 1645–60. professor in the Department of Computer System and Technol-
[7] S. Cirani et al., “A Scalable and Self-Configuring Architecture ogy, University of Malaya. He received hiis Bachelor’s and Mas-
smart devices. for Service Discovery in the Internet of Things,” IEEE Internet ter’s degrees from the University of Hull, United Kingdom, and
of Things J., vol. 1, no. 5, 2014, pp. 508–21. his Ph.D from the University of Sheffield, United Kingdom. He
[8] Z. Qin et al., “A Software Defined Networking Architecture has vast teaching experience due to having worked in various
for the Internet-of-Things,” 2014 IEEE Network Operations educational institutions locally and abroad: schools, teaching
and Management Symp., May 2014, pp. 1–9. college, the Ministry of Education, and universities. His interest
[9] H.-C. Hsieh and C.-H. Lai, “Internet of Things Architecture in research started in 1983, when he was chosen to attend a
Based on Integrated PLC and 3G Communication Net- Scientific Research course in RECSAM by the Ministry of Edu-
works,” 2011 IEEE 17th Int’l. Conf. Parallel and Distrib. Sys- cation, Malaysia. More than 150 academic papers have been
tems, 2011, pp. 853–56. published in conferences and respectable journals. He active-
[10] J. Li et al., “A Mobile Phone Based WSN Infrastructure for ly supervises many students at all levels of study — Bachelor,
iot Over Future Internet Architecture,” Green Computing Master, and Ph.D.. His research interests include self-organized
and Commun., 2013 IEEE and Internet of Things, and IEEE systems, reinforcement learning, and wireless-related networks.
Int’l. Conf. Cyber, Physical and Social Computing, 2013, pp. He worked on mobile cloud computing with a High Impact
426–33. Research Grant for the period of 2011–2016.
[11] J. Zhou et al., “Cloudthings: A Common Architecture for
Integrating the Internet of Things with Cloud Computing,” Muhammad Imran (cimran@ksu.edu.sa) is an assistant professor
2013 IEEE 17th Int’l. Conf. Computer Supported Cooperative in the College of Computer and Information Science, King Saud
Work in Design, 2013, pp. 651–657. University. His research interests include mobile ad hoc and sen-
[12] J. Kim et al., “Standard-Based IoT Platforms Interworking: sor networks, WBANs, IoT, M2M, multihop wireless networks, and
Implementation, Experiences, and Lessons Learned,” IEEE fault-tolerant computing. He has published a number of research
Commun. Mag., vol. 54, no. 7, July 2016, pp. 48–54. papers in peer reviewed international journals and conferences. His
[13] J. L. Hernandez-Ramos, J. B. Bernabe, and A. Skarmeta, research is financially supported by several grants. He is serving as a
“Army: Architecture for a Secure and Privacy-Aware Life Co-Editor-in-Chief for EAI Transactions on Pervasive Health and Tech-
Cycle of Smart Objects in the Internet of My Things,” IEEE nology. He also serves as an Associate Editor for the Wireless Com-
Commun. Mag., vol. 54, no. 9, Sept. 2016, pp. 28–35. munication and Mobile Computing Journal (Wiley), the Inderscience
[14] X. Du and H.-H. Chen, “Security in Wireless Sensor Networks,” International Journal of Autonomous and Adaptive Communications
IEEE Wireless Commun., vol. 15, no. 4, 2008, pp. 60–66. Systems, Wireless Sensor Systems (IET), and the International Journal
[15] X. Du et al., “Defending DOS Attacks on Broadcast Authen- of Information Technology and Electrical Engineering. He has served/
tication in Wireless Sensor Networks,” IEEE ICC, 2008, pp. serves as a Guest Editor for IEEE Communications Magazine, IJAACS,
1653–57. and the International Journal of Distributed Sensor Networks. He has
been involved in a number of conferences and workshops in various
Biographies capacities such as a Program Co-Chair, Track Chair/Co-Chair, and
Ibrar Yaqoob (ibraryaqoob@siswa.um.edu.my) received his B.S. Technical Program Committee member. These include IEEE GLO-
(Hons.) degree in information technology from the University of the BECOM, ICC, AINA, LCN, IWCMC, IFIP WWIC, and BWCCA. He
Punjab, Gujranwala campus, Pakistan, in 2012. Currently, he has has received a number of awards such as an Asia Pacific Advanced
been pursuing his Ph.D. degree in computer science at the University Network fellowship.
of Malaya, Malaysia, since November 2013. He won a scholarship
for his Ph.D. and also works as a Bright Spark Program research Mohsen Guizani [S’85, M’89, SM’99, F’09] (mguizani@ieee.org)
assistant. He has published a number of research articles in refereed received all of his degrees from Syracuse University, New York,
international journals and magazines . His numerous research articles in 1984, 1986, 1987, and 1990, respectively. He is currently a
are very famous and among the most downloaded in top journals. professor and the Electrical and Communications Engineering
His research interests include big data, mobile cloud, the Internet of Department Chair at the University of Idaho. He has served in a
Things, cloud computing, and wireless networks. number of academic positions in the United States. His research
interests include wireless communications, mobile computing,
Ejaz Ahmed [S’13] (ejazahmed@ieee.org) is a senior researcher computer networks, cloud computing, loT, security, and smart
in the High Impact Research project at Centre for Mobile Cloud grid. He currently serves on the Editorial Boards of several inter-
Computing Research (C4MCCR), University of Malaya. Before national technical journals, and is the founder and Editor-in-Chief
that, he worked as a research associate in the Cognitive Radio of Wireless Communications and Mobile Computing (Wiley). He
Network (CogNet) Research Lab SEECS, NUST Islamabad from is the author of nine books and more than 400 publications in
December 2009 to September 2012, and in Center of Research refereed journals and conferences. He has been a Guest Editor
in Networks and Telecom (CoReNet), MAJU, Islamabad, from of a number of Special Issues in IEEE journals and magazines. He
January 2008 to December 2009. His research experience spans has also served as a TPC member, Chair, and General Chair of a
over more than nine years. He is an Associate Editor of IEEE Com- number of international conferences. He was selected as the Best
munication Magazine, IEEE Access, and Wiley Wireless Commu- Teaching Assistant for two consecutive years at Syracuse Univer-
nications and Mobile Computing. He has also served as a Lead sity. He was the Chair of the IEEE Communications Society Wire-
Guest Editor/Guest Editor of Elsevier Future Generation Computer less Technical Committee and the TAOS Technical Committee.
Systems, Elsevier Computers & Electrical Engineering, IEEE Commu- He served as an IEEE Computer Society Distinguished Speaker
nications Magazine, IEEE Access, Elsevier Information Systems, and from 2003 to 2005. He is a Senior Member of ACM.

16 IEEE Wireless Communications • June 2017

Das könnte Ihnen auch gefallen