Skip to main content
Log in

Standards, Security and Business Models: Key Challenges for the IoT Scenario

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

The number of physical objects connected to the Internet constantly grows and a common thought says the IoT scenario will change the way we live and work. Since IoT technologies have the potential to be pervasive in almost every aspect of a human life, in this paper, we deeply analyze the IoT scenario. First, we describe IoT in simple terms and then we investigate what current technologies can achieve. Our analysis shows four major issues that may limit the use of IoT (i.e., interoperability, security, privacy, and business models) and it highlights possible solutions to solve these problems. Finally, we provide a simulation analysis that emphasizes issues and suggests practical research directions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2

Similar content being viewed by others

Notes

  1. https://www.gartner.com/doc/2625419/forecast-internet-things-worldwide- https://www.gartner.com/doc/2625419/forecast-internet-things-worldwide-

  2. https://adheretech.com/

  3. http://standards.ieee.org/innovate/iot/projects.html

References

  1. Federal Aviation Administration. Unmanned Aircraft Systems Registration, 2016

  2. European Parliament and Council. General Data Protection Regulation, 2016

  3. Islam SMR, Kwak D, Kabir MH, Hossain M, Kwak KS (2015) The Internet of Things for Health Care: A Comprehensive Survey. IEEE Access 3:678–708

    Article  Google Scholar 

  4. Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (Feb 2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22–32

  5. Roccetti M, Ferretti S, Palazzi CE, Salomoni P, Furini M (2008) Riding the Web Evolution From Egoism to Altruism In: Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC), pp 1123–1127

  6. Ferretti S, Furini M, Palazzi CE, Roccetti M, Salomoni P (2010) WWW recycling for a better world. Commun ACM 53(4):139–143

    Article  Google Scholar 

  7. Montangero M, Furini M (2015) TRank: Ranking Twitter Users According to Specific Topics. In: Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC), pp 767–772

  8. Furini M, Montangero M (2016) TSentiment: On gamifying Twitter sentiment analysis. In: Proceedings of the IEEE Symposium on Computers and Communication (ISCC), pp 91–96

  9. Bujari A, Furini M, Lainà N (Jan 2017) On using cashtags to predict companies stock trends. In: Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC)

  10. Palazzi CE, Bujari A, Bonetta S, Marfia G, Roccetti M, Amoroso A (2011) MDTN Mobile delay/disruption tolerant network. In: Proceedings of the International Conference on Computer Communications and Networks (ICCCN), pp 1–6

  11. Palazzi CE, Bujari A, Marfia G, Roccetti M (2014) An overview of opportunistic ad hoc communication in urban scenarios. In: Proceedings of the Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET), pp 146–149

  12. Mahmoud R, Yousuf T, Aloul F, Zualkernan I (2015) Internet of Things (IoT) Security: Current status, Challenges and Prospective Measures. In Proceedings of the International Conference for Internet Technology and Secured Transactions (ICITST), pp 336–341

  13. Bellavista P, Cardone G, Corradi A, Foschini L (2013) Convergence of MANET and WSN in IoT Urban Scenarios. IEEE Sens J 13(10):3558–3567

    Article  Google Scholar 

  14. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun Surv Tutorials 17(4):2347–2376. Fourthquarter

    Article  Google Scholar 

  15. Bononi L, Donatiello L, Furini M (June 2009) Real-time traffic in Ad-Hoc sensor networks. In: Proceedings of IEEE International Conference on Communications (ICC)

  16. Donatiello L, Furini M (2003) Networks: Ad Hoc A Protocol for Supporting QoS Applications. In: Proceedings of the IEEE International Parallel andamp; Distributed Processing Symposium (IPDPS)

  17. Davis R (2015) The internet of things. European Parliamentary Research

  18. Furini M, Mandreoli F, Martoglia R, Montangero M (2016) IoT: science fiction or real revolution?. In: Proceedings of the Conference on Smart Objects and Technologies for Social Good, GoodTechs

  19. Markets and Markets. Smart Home Market by Product, Security & Access Control, HVAC, Entertainment, Home Healthcare and Smart Kitchen, Software & Service and Geography - Global Forecast to 2022. Technical report, 2016

  20. Alam M, Reaz B, Ali M (2012) A Review of Smart Homes - Past, Present, and Future. IEEE Transactions on Systems, Man, and Cybernetics

  21. Markets and Markets. Internet of Things (IoT) in Smart Cities Market by Solutions Platform Application - Global Forecast to 2020. Technical report, 2016

  22. Carafoli L, Mandreoli F, Martoglia R, Penzo W (2016) A data management middleware for its services in smart cities. J UCS 22(2):228–246

    Google Scholar 

  23. Carafoli L, Mandreoli F, Martoglia R, Penzo W (2013) A framework for ITS data management in a smart city scenario. In: Proceedings of the International Conference on Smart Grids and Green IT Systems, pp 215–221

  24. De Michele R, Furini M (2016) Understanding the City to make it Smart. In: Internet of Things, vol 169. Springer International Publishing, , pp 239–244

  25. Navigant Research. Urban Mobility in Smart Cities. Technical report, 2015

  26. Deloitte. Transport in the Digital Age - Disruptive Trends for Smart Mobility. Technical report, 2015

  27. Manyika J, Chui M, Bughin J, Dobbs R, Bisson P, Marrs A (2013) Disruptive Technologies: Advances that will transform life, business, and the global economy. Technical report

  28. Inc. Grand View Research. Gypsum Board Market Analysis By Product (Wallboard, Ceiling Board, Pre-Decorated Board), By Application (Residential, Corporate, Commercial, Institutional) And Segment Forecasts To 2022. Technical report, 2016

  29. Xiaorong Zh, Honghui F, Hongjin Zh, Zhongjun F, Hanyu F (2015) The Design of the Internet of Things Solution for Food Supply Chain. In: Proceedings of EMIM

  30. Haider Razia, Mandreoli Federica, Riccardo Martoglia (2014) RPDM A system for RFID probabilistic data management. JAISE 6(6):707–722

    Google Scholar 

  31. Furini M, Pitzalis C (2016) Smart cart: when food enters the IoT scenario. In: Internet of Things, vol 169. Springer International Publishing, , pp 284–289

  32. marketsandmarkets.com. Smart Factory Market by Technology (PLM, MES, PLC, SCADA, ERP, DCS, HMI), Component (Sensors & Actuators, Communication Technologies, Industrial Robotics, Machine Vision), Industry (Process, Discrete), and Geography - Global Forecast to 2022 . Technical report, 2016

  33. Katalinic B, Radziwon A, Bilberg A, Bogers M, Madsen ES (2014) The Smart Factory: Exploring Adaptive and Flexible Manufacturing Solutions. Proced Eng 69:1184–1190

    Article  Google Scholar 

  34. Bernstein PA, Haas LM (2008) Information Integration in Ehe enterprise. Commun ACM 51(9):72–79

    Article  Google Scholar 

  35. Franklin MJ, Halevy AY, Maier D (2008) A first tutorial on dataspaces. PVLDB 1(2):1516–1517

    Google Scholar 

  36. Furini M, Tamanini V (2015) Location privacy and public metadata in social media platforms: Attitudes, Behaviors and opinions. Multimed Tools Appl 74(21):9795–9825

    Article  Google Scholar 

  37. Furini M (2014) Users behavior in location-aware services: digital natives vs digital immigrants. Advances in Human-Computer Interaction, pp 2014

  38. Laya A, Bratu V, Markendahl J (2013) Who is investing in machine-to-machine communications?. In: Proceedings of ITS

  39. Westerlund M, Leminen S, Rajahonka M (Jun 2014) Designing Business Models for the Internet of Things. Technol Innov Manag Rev 4:5–14

  40. Perkins C, Belding-Royer E, Das S (2003) Ad hoc on-demand distance vector (AODV) routing

  41. Narra H, Cheng Y, Çetinkaya EK, Rohrer JP, Sterbenz JPG (2011) Destination-sequenced distance vector (dsdv) routing protocol implementation in ns-3. In: Proceedings of the ICST Conference on Simulation Tools and Techniques, pp 439–446

  42. Bose P, Morin P, Stojmenovic I (1999) Routing with guaranteed delivery in Ad hoc wireless networks. Proceedings of ACM DIAL-M/Mobicom Workshop

  43. Flury R, Wattenhofer R (2008) Randomized 3D geographic routing. Proceedings of INFOCOM

  44. Abdallah AE, Fevens T, Opatrny J (2006) Randomized 3D position-based routing algorithms for Ad hoc networks. Proceedings of MOBIQUITOUS, pp 1–8

  45. Kao G, Fevens T, Opatrny J (2007) 3D localized position-based routing with nearly certain delivery in mobile Ad hoc networks. Proceedings of the International Symposium on Wireless Pervasive Computing (ISWPC)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marco Furini.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bujari, A., Furini, M., Mandreoli, F. et al. Standards, Security and Business Models: Key Challenges for the IoT Scenario. Mobile Netw Appl 23, 147–154 (2018). https://doi.org/10.1007/s11036-017-0835-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-017-0835-8

Keywords

Navigation