Abstract

Internet of things (IoT) is one of key pillars in fifth generation (5G) and beyond 5G (B5G) networks. It is estimated to have 42 billion IoT devices by the year 2025. Currently, carbon emissions and electronic waste (e-waste) are significant challenges in the information & communication technologies (ICT) sector. The aim of this article is to provide insights on green IoT (GIoT) applications, practices, awareness, and challenges to a generalist of wireless communications. We garner various efficient enablers, architectures, environmental impacts, technologies, energy models, and strategies, so that a reader can find a wider range of GIoT knowledge. In this article, various energy efficient hardware design principles, data-centers, and software based data traffic management techniques are discussed as enablers of GIoTs. Energy models of IoT devices are presented in terms of data communication, actuation process, static power dissipation and generated power by harvesting techniques for optimal power budgeting. In addition, this article presents various effective behavioral change models and strategies to create awareness about energy conservation among users and service providers of IoTs. Fog/Edge computing offers a platform that extends cloud services at the edge of network and hence reduces latency, alleviates power consumption, offers improved mobility, bandwidth, data privacy, and security. Therefore, we present the energy consumption model of a fog-based service under various scenarios. Problems related to ever increasing data in IoT networks can be solved by integrating artificial intelligence (AI) along with machine learning (ML) models in IoT networks. Therefore, this article provides insights on role of the ML in the GIoT. We also present how legislative policies support adoption of recycling process by various stakeholders. In addition, this article is presenting future research goals towards energy efficient hardware design principles and a need of coordination between policy makers, IoT devices manufacturers along with service providers.

Highlights

  • The fifth generation (5G) mobile network is backed up by advanced communication technologies that is going to play a significant role in wide spread of internet of things (IoT) based services in future generation [1], [2]. 5G network is conceived to support multiple Giga bits per seconds (Gbps) data speed at lower latency, network slicing to offer a distinct part of the network for an intended service

  • A possibility of data breach exists through a virtual machine (VM’s) to its neighboring virtual machines (VM) leading to security issues

  • Cloud data is prone to security threats and vulnerabilities such as man-in-the-middle attack, SQL injection, malware injection, and flooding attack [232]

Read more

Summary

Introduction

The fifth generation (5G) mobile network is backed up by advanced communication technologies that is going to play a significant role in wide spread of internet of things (IoT) based services in future generation [1], [2]. 5G network is conceived to support multiple Giga bits per seconds (Gbps) data speed at lower latency, network slicing to offer a distinct part of the network for an intended service. 5G network is conceived to support multiple Giga bits per seconds (Gbps) data speed at lower latency, network slicing to offer a distinct part of the network for an intended service. Fourth generation (4G) long term evolution (LTE) systems were intended to offer high speed mobile broadband services as compared to previous generation networks. 5G creates a platform to offer superior broadband services than its ancestors and supports real time critical services and fulfill the IoTs dream of connecting everyone, everything and everywhere. A mix of lower-band (under 1 GHz), mid-band (1 GHz to 6 GHz) and higher-band spectrum (millimeter wave (mmWave)) is used for the 5G network deployment to support high data speed, lower latency, and better spectrum utilization [3].

Objectives
Findings
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.