Abstract

Applications and technologies of the Internet of Things are in high demand with the increase of network devices. With the development of technologies such as 5G, machine learning, edge computing, and Industry 4.0, the Internet of Things has evolved. This survey article discusses the evolution of the Internet of Things and presents the vision for Internet of Things 2.0. The Internet of Things 2.0 development is discussed across seven major fields. These fields are machine learning intelligence, mission critical communication, scalability, energy harvesting-based energy sustainability, interoperability, user friendly IoT, and security. Other than these major fields, the architectural development of the Internet of Things and major types of applications are also reviewed. Finally, this article ends with the vision and current limitations of the Internet of Things in future network environments.

Highlights

  • The term ‘‘Internet of Things’’ (IoT) was first coined by Kevin Ashton in 1999 [1]

  • The definition of IoT remains unchanged since the birth of the concept

  • As we are on the brink of the 5G era, the concept of IoT should follow this evolution towards IoT 2.0

Read more

Summary

INTRODUCTION

The term ‘‘Internet of Things’’ (IoT) was first coined by Kevin Ashton in 1999 [1]. The International Telecommunication Union (ITU) has formally defined IoT as, ‘‘A global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies [2].’’ This definition can be viewed as the basis of IoT technologies. As edge computing enables low latency data transmission, real-time smart applications can be developed to provide high quality services [25]. This architecture can provide end users with flexible, low latency, and real-time services [31] Based on these major architectures, there are further enhancements in IoT networks improving energy efficiency [32], [33] and data reliability [34]. The most significant difference is the utilization of an edge/fog layer in the recent IoT architecture to provide real-time services, data analytics, and data processing functionalities near the end devices. As an architecture providing basic edge computing, the authors followed a three-layered design This design consists of the IoT end device layer, the fog/edge layer, and the cloud layer. Security is recognized as a concept applied to all layers to protect them against possible external attacks

MACHINE LEARNING INTELLIGENCE
MISSION CRITICAL COMMUNICATION
PHYSICAL LAYER Some of the noteworthy threats at physical layer include
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call