INTERNET OF THINGS (IOT) AS AN EMERGING
TECHNOLOGY AND ITS USE CASES
1Dr.D.Veerabhadra Babu, 2Dr.D.William Albert, 3Abdul Mannan Mohd
1Associate Professor-IT, KL University, Vijayawada, iNurture Education Solutions Private
Limited, Bangalore. [email protected]
2Professor in CSE Department, Bharath College of engg & Tech for Women Kadapa,
3Senior-Faculty – IT, KL University iNurture Education Solutions Private Limited,
Bangalore. [email protected]
Abstract
Internet has been around for many years to help connectivity among people for instant
communications and sharing information and resources. However, Internet of Things (IoT) is
the new emerging technology which enables integration between physical and digital world.
With RFID technology it enables identification of things and let them participate in
computing realizing the technology and its use cases. With IoT, the world will witness drastic
changes and get impacted by it. In other words every human on this earth will have impact of
this amalgamation of technologies. Therefore, in this paper we provide IoT, its evolution, its
applications, enabling technologies and its projected growth in future. It also provides the
role played by RFID in the process of enabling businesses to achieve their goals. Industries
like healthcare will have high impact of IoT.
Keywords – Internet of Things (IoT), IoT use cases, IoT architecture, RFID, IoT evolution
1. INTRODUCTION AND EVOLUTION OF IOT
The Internet of Things (IoT) is generally thought of as connecting things to the Internet and
using that connection to provide some kind of useful remote monitoring or control of those
things. This definition of IoT is limited, and references only part of the IoT evolution. It is
basically a rebranding of the existing Machine to Machine (M2M) market of today. In the
International Journal of Research
Volume 7, Issue XII, December/2018
ISSN NO:2236-6124
Page No:2473
1990s, Internet connectivity began to proliferate in enterprise and consumer markets, but was
still limited in its use because of the low performance of the network interconnects. In the
2000s Internet connectivity became the norm for many applications and today is expected as
part of many enterprise, industrial and consumer products to provide access to information.
However, these devices are still primarily things on the Internet that require more human
interaction and monitoring through apps and interfaces.
Figure 1: Evolution of IoT
As shown in Figure 1, the evolution of IoT can be read back to Pre-Internet age to the present
state of the art. The true promise of the IoT is just starting to be realized when invisible
technology operates behind the scenes dynamically responding to how we want “things” to
act. To date, the world has deployed about 5 billion “smart” connected things. Predictions say
there will be 50 billion connected devices by 2020 and in our lifetime we will experience life
with a trillion-node network. Those are really big numbers. How things are fundamentally
deployed today is a barrier to realizing those numbers. The industry will only achieve the
reality of 50 billion connected devices by simplifying how things connect and communicate
today.
International Journal of Research
Volume 7, Issue XII, December/2018
ISSN NO:2236-6124
Page No:2474
2. ARCHITECTURE OF IOT
Stage 1 of IoT architecture consists of your networked things, typically wireless sensors and
actuators. Stage 2 includes sensor data aggregation systems and analog-to-digital data
conversion. In Stage 3, edge IT systems perform pre-processing of the data before it moves
on to the data centre or cloud. Finally, in Stage 4, the data is analyzed managed, and stored on
traditional back-end data centre systems. Clearly, the sensor/actuator state is the province of
operations technology (OT) professionals. So is Stage 2. Stages 3 and 4 are typically
controlled by IT, although the location of edge IT processing may be at a remote site or
nearer to the data centre. The dashed vertical line labelled "the edge" is the traditional
demarcation between OT and IT responsibilities, although this is blurring.
Figure 2: Architectural overview of IoT
Sensors collect data from the environment or object under measurement and turn it into
useful data. Think of the specialized structures in your cell phone that detect the directional
pull of gravity—and the phone's relative position to the “thing” we call the earth—and
convert it into data that your phone can use to orient the device. Actuators can also intervene
to change the physical conditions that generate the data. An actuator might, for example, shut
off a power supply, adjust an air flow valve, or move a robotic gripper in an assembly
process. The sensing/actuating stage covers everything from legacy industrial devices to
International Journal of Research
Volume 7, Issue XII, December/2018
ISSN NO:2236-6124
Page No:2475
robotic camera systems, water-level detectors, air quality sensors, accelerometers, and heart
rate monitors. And the scope of the IoT is expanding rapidly, thanks in part to low-power
wireless sensor network technologies and Power over Ethernet, which enable devices on a
wired LAN to operate without the need for an A/C power source [14]. It also takes care of
security as explored in [15].
3. BUILDING BLOCKS OF IOT
IoT technology has many building blocks for different purposes. Figure 3 shows details of the
same. The bottom layer of IoT architecture comprises the device layer. It is key to choose the
right hardware and peripherals, along with necessary sensors to meet your business need.
Devices can be of various types, but to qualify as an IoT device, it must have some
communications functionality built in that directly or indirectly connects to the Internet. Its
main job is to collect or disseminate data (or do both) [13].
Figure 3: Building blocks of IoT
Some devices need no operating systems such as health and fitness monitoring sensors. That
said, devices from watches to industrial machines may run on a 32 or 64 bit computing
platforms. Local Services can be considered the brain at the “edge” of the IoT system and
give intelligence to the data before it’s transmitted. Their main function is to process the data
captured by the sensors. Processors mostly work on a real-time basis and can be easily
International Journal of Research
Volume 7, Issue XII, December/2018
ISSN NO:2236-6124
Page No:2476
controlled by applications. Processors also perform encryption on processors and decryption
of data to maintain security of communication.
Connectivity is essential in any networked system. There are a whole host of options, both
wired or wireless, depending on the application requirements. For instance, ZigBee and
LoRaWAN require very low power though have limited bandwidth; while 3G has good
coverage and high bandwidth but is relatively expensive both in terms of hardware and usage.
The power/bandwidth ratio comes down to physics but it needs to be addressed when
considering the battery life of your device. Several chipsets are now available which enable
you to switch between radio technologies. This is useful if long life is important in the field.
Where there’s a need for high bandwidth, in a factory for instance, with a large number of
connected sensors and actuators scattered over a wide area, wired technology would be the
best fit [3].
4. ROLE OF RFID TECHNOLOGY IN IOT APPLICATIONS
Radio Frequency Identification (RFID) plays vital role in IoT applications in terms of identity
and tracking of objects. Figure 4 shows its usage in different areas like transportation and
logistics, healthcare, smart environment, personal and social and futuristic.
International Journal of Research
Volume 7, Issue XII, December/2018
ISSN NO:2236-6124
Page No:2477
Figure 4: Utility of RFID in different applications
One of the most important ideas driving the take up of RFID technology in business
applications is the concept of the so-called “Internet of Things”. Because RFID allows things
to be identified by computer systems, it enables applications to become “thing aware”. As a
result, RFID is one of the key technologies that the Internet of Things depends on. Adding
RFID tags to part assembled goods, pallets and still ages, or finished items can speed
manufacturing, logistics and service operations. Applications tracking assets can make a wide
range of business activities more efficient. RFID tags can be used to tell applications what
things are, where things are, if things have moved, who moved them or used them [11]. It
also brings its security challenges [12]. More on RFID technology usage can be found in
[17]-[30].
5. USE CASES OF IOT
There are plenty of use cases of IoT like healthcare, robotics, agriculture, transportation,
smart house, smart city and so on [1], [2], [4]-[10], [16]. Here are some important use cases
provided in this section.
Transportation
and logistics Healthcare Smart
environments
Personal and
social
Futuristic
Logistics
Assisted
driving
Mobile
ticketing
Augmented
maps
Data collection
Sensing Environment
monitoring
Comfortable
homes/offices
Identification,
authentication
Tracking Social
networking
Smart
museum and
gym
Industrial
Plants
Thefts
Losses
City
information
model
Enhanced
game room
City
information
model
Robot taxi
International Journal of Research
Volume 7, Issue XII, December/2018
ISSN NO:2236-6124
Page No:2478
5.1 IoT in Healthcare
The IoT technology is going to change various industries. Healthcare is one of the industries
that will have higher impact by the technology as it helps humans to live lives in a better way.
The healthcare industry is in a state of great despair. Healthcare services are costlier than
ever, global population is aging and the number of chronic diseases is on a rise. What we are
approaching is a world where basic healthcare would become out of reach to most people, a
large section of society would go unproductive owing to old age and people would be more
prone to chronic disease. While technology can’t stop the population from ageing or eradicate
chronic diseases at once, it can at least make healthcare easier on a pocket and in term of
accessibility.
Figure 5: Illustrates IoT usage in healthcare unit
Medical diagnostic consumes a large part of hospital bills. Technology can move the routines
of medical checks from a hospital (hospital-centric) to the patient’s home (home-centric). The
right diagnosis will also lessen the need of hospitalization. A new paradigm, known as the
Internet of Things (IoT), has an extensive applicability in numerous areas, including
healthcare. The full application of this paradigm in healthcare area is a mutual hope because
International Journal of Research
Volume 7, Issue XII, December/2018
ISSN NO:2236-6124
Page No:2479
it allows medical centres to function more competently and patients to obtain better
treatment. Real-time monitoring via connected devices can save lives in event of a medical
emergency like heart failure, diabetes, asthma attacks, etc.
With real-time monitoring of the condition in place by means of a smart medical device
connected to a Smartphone app, connected devices can collect medical and other required
health data and use the data connection of the Smartphone to transfer collected information to
a physician. The IoT device collects and transfers health data: blood pressure, oxygen and
blood sugar levels, weight, and ECGs. These data are stored in the cloud and can be shared
with an authorized person, who could be a physician, your insurance company, a participating
health firm or an external consultant, to allow them to look at the collected data regardless of
their place, time, or device.
5.2 IoT in Precision Agriculture
Precision agriculture (PA), satellite farming or site specific crop management (SSCM) is a
farming management concept based on observing, measuring and responding to inter and
intra-field variability in crops. With precision farming, farmers generate data via sensors and
analyze the information to evaluate current practices and make improvements for greater
efficiency and effectiveness. There are a variety of smart farming applications including crop
observation, vehicle tracking, irrigation management, livestock management, and storage
monitoring.
International Journal of Research
Volume 7, Issue XII, December/2018
ISSN NO:2236-6124
Page No:2480
Figure 6: Illustrates IoT usage in agriculture
As shown in Figure 6, IoT can be used in precision agriculture. Monitor and control irrigation
management to maximize efficiency, reduce waste, and cut down on operational costs. Use
precision agriculture to measure and respond to inter and intra-field variability in crops.
Track data, trends, and conditions to determine which seeds to plant and when to harvest.
Control pests and utilize organic farming techniques such as pheromone delivery to disrupt
mating patterns. IoT solutions for precision farming allow for real-time monitoring to collect
valuable data that can have a significant impact on operational efficiency. This has a range of
diverse applications for farming systems: Monitor and analyze soil conditions and other
changing parameters to optimize crop yields. Develop tracking solutions that allow farmers to
monitor livestock, vehicles, and other farming resources in remote areas. Use connected
devices to detect water and nutrient deficits for timely interventions.
International Journal of Research
Volume 7, Issue XII, December/2018
ISSN NO:2236-6124
Page No:2481
6. PROJECTED MARKET SHAR OF IOT BY 2025
It is estimated that IoT will have huge impact on different industries across the globe. The
growth of it will be there in future beyond 205 as well as the projections visualized in Figure
7.
Figure 7: By 2025 IoT market share projected
As presented in Figure 7, the healthcare industry will have more impact by IoT technology.
After that manufacturing industry has more impact. There are many other industries that are
influenced by IoT in terms of businesses and advantages to people in the real world.
7. CONCLUSION AND FUTURE WORK
In this paper we have provided the IoT technology, its evolution, its architecture, real world
uses cases and its business share in future. It throws light into various aspects of IoT utility in
the world. Especially it has provided use cases like healthcare and agriculture to mention few.
Healthcare industry will have ore benefits with IoT. This paper also talks about RFID and its
role in many IoT applications. As IoT brings about many benefits in different industries, it
also may bring issues related to security. Therefore we continue our research on the security
issues of IoT and provide possible solutions to overcome them.
International Journal of Research
Volume 7, Issue XII, December/2018
ISSN NO:2236-6124
Page No:2482
References
[1] Muhammad Raisul Alam,M. B. I. Reaz,and M. A. Mohd Ali. (2012). A Review of Smart
Homes – Past, Present, and Future. IEEE, p1-12.
[2] José L. Hernández , M. Victoria Moreno , Antonio J. Jara and Antonio F. Skarmeta.
(2014). A soft computing based location-aware access control for smart buildings. Springer,
p1-16.
[3] M. Kuzlu,M. Pipattanasomporn and S. Rahman. (2015). Review of communication
technologies for smart homes/building applications. IEEE, p1-6.
[4] Khushal Shingala and Jignesh Patel. (2017). Automatic Home Appliances and Security of
Smart Home with RFID, SMS, Email and Real Time Algorithm Based on IOT. International
Research Journal of Engineering and Technology. 04 (04), p1-6.
[5] José L. Hernández-Ramos, M. Victoria Moreno, Jorge Bernal Bernabé, Dan García
Carrillo and Antonio F. Skarmeta. (2014). SAFIR: Secure access framework for IoT-enabled
services on smart buildings. Preprint submitted to Journal of Computer and System Sciences,
p1-15.
[6] Rajeev Piyare and Seong Ro Lee. (2013). Smart Home-Control and Monitoring System
Using Smart Phone. SERSC, p1-6.
[7] Thoraya Obaid, Haliemah Rashed, Ali Abu El Nour, Muhammad Rehan, Mussab
Muhammad Saleh, and Mohammed Tarique. (2014). ZIGBEE BASED VOICE
CONTROLLED WIRELESS SMART HOME SYSTEM. International Journal of Wireless
& Mobile Networks. 6 (1), p1-13.
[8] Joseph Bugeja, Andreas Jacobsson, and Paul Davidsson. (2016). On Privacy and Security
Challenges in Smart Connected Homes. IEEE, p1-4.
[9] B.A.D.J.C.K Basnayake,Y.W.R. Amarasinghe, R.A. Attalage,T.D.I Udayanga and
A.G.B.P.Jayasekara. (2015). Artificial Intelligence Based Smart Building Automation
Controller for Energy Efficiency Improvements in Existing Buildings. International Journal
of Advanced Information Science and Technology. 40 (40), p1-8.
International Journal of Research
Volume 7, Issue XII, December/2018
ISSN NO:2236-6124
Page No:2483
[10] IOANNIS KOUNELIS, GIANMARCO BALDINI, RICARDO NEISSE, GARY STERI,
MARIACHIARA TALLACCHINI, AND ÂNGELA GUIMARÃES PEREIRA. (2014).
Building Trust in the Human– Internet of Things Relationship. IEEE, p1-9.
[11] Prosanta Gope , Ruhul Amin , S.K. Hafizul Islam , Neeraj Kumar and Vinod Kumar
Bhalla. (2017). Lightweight and privacy-preserving RFID authentication scheme for
distributed IoT infrastructure with secure localization services for smart city
environment. Future Generation Computer Systems, p1-10.
[12] Kuan Zhang, Jianbing Ni, Kan Yang, Xiaohui Liang, Ju Ren, and Xuemin (Sherman)
Shen. (2017). Security and Privacy in Smart City Applications: Challenges and
Solutions. IEEE, p1-8.
[13] M. Kuzlu, M. Pipattanasomporn, and S. Rahman. (2015). Review of Communication
Technologies for Smart Homes/Building Applications. IEEE , p1-6.
[14] Litun Patra and Udai Pratap Rao. (2016). Internet of Things – Architecture,
Applications, Security and other Major Challenges. IEEE, p1-6.
[15] SRAVANI CHALLA, MOHAMMAD WAZID, ASHOK KUMAR DAS, NEERAJ
KUMAR, ALAVALAPATI GOUTHAM REDDY, EUN-JUN YOON AND KEE-YOUNG
YOO. (2017). Secure Signature-Based Authenticated Key Establishment Scheme for Future
IoT Applications. IEEE, p1-16.
[16] Magesh Kumar K, Vetripriya M, Brigetta A, Akila A, Keerthana D. (2016). Analysis on
Internet of Things and Its Application. IJSRSET. 2 (2), p1-8.
[17] Nellipudi.Siva Rama Krishna Prasad and Arepalli Rajesh. (2012). RFID-Based Hospital
Real Time Patient Management System. International Journal of Computer Trends and
Technology. 3 (3), p1-9.
[18] Samuel Fosso Wamba, Abhijith Ananda and Lemuria Carterc. (2013). A literature
review of RFID-enabled healthcare applications and issues. Elsevier, p875– 891.
International Journal of Research
Volume 7, Issue XII, December/2018
ISSN NO:2236-6124
Page No:2484
[19] Nyoman Adhiarnaa, Yoon Min Hwang, Min Jae Park and Jae Jeung Rho. (2013). An
integrated framework for RFID adoption and diffusion with a stage-scale-scope cubicle
model: A case of Indonesia. Elsevier, p378– 389.
[20] Arifusalam Shaikh, Reem K. Al-Maymouni, Layla H. Al-Hamed and Aya Dardas.
(2014). The Role of RFID in Supply Chain Management Macro Processes. International
Journal of Innovation, Management and Technology. 5 (5), p388-393.
[21] Alan D. Smith. (2014). Case Studies of RFID Practices for Competitive Inventory
Management Systems. IGI Global, p1-3.
[22] Suhaiza Zailani, Mohammad Iranmanesh & Davoud Nikbin and Jameson Khoo Cheong
Beng. (2015). Determinants of RFID Adoption in Malaysia’s Healthcare Industry
Occupational Level as a Moderator. sprienger, p1-11.
[23] Muhammed Ali Bing¨ ol, Fatih Birinci, S¨ uleyman Kardas and Mehmet Sabır Kiraz.
(2012). Anonymous RFID Authentication for Cloud Services. INTERNATIONAL JOURNAL
OF INFORMATION SECURITY SCIENCE. 1 (2), p1-12.
[24] Geraldo Ferrer, Nicholas Dew and Uday Apte. (2010). When is RFID right for your
service. Elsevier, p414–425.
[25] Mark O. Lewis. (2014). RFID-ENABLED CAPABILITIES AND THEIR IMPACT ON
HEALTHCARE PROCESS PERFORMANCE. International Conference on Information
Systems, p1-21.
[26] Abdul Samad, Prashant Murdeshwar and Zohaib Hameed. (2010). High-credibility
RFID-based animal data recording system suitable for small-holding rural dairy
farmers. Elsevier, p213–218.
[27] Martin Feldhofer, Manfred Aigner, Thomas Baier, Michael Hutter, Thomas Plos and
Erich Wenger. (2010). Semi-Passive RFID Development Platform for Implementing and
Attacking Security Tags, p1-6.
International Journal of Research
Volume 7, Issue XII, December/2018
ISSN NO:2236-6124
Page No:2485
[28] Qingkuan Dong, Jiaqing Tong and Yuan Chen. (2015). Cloud-Based RFID Mutual
Authentication Protocol without Leaking Location Privacy to the Cloud. International
Journal of Distributed Sensor Networks, p1-10.
[29] Wei Xie, Lei Xie, Chen Zhang, Quan Zhang and Chaojing Tang. (2013). Cloud-based
RFID Authentication. IEEE International Conference on RFID, p1-8.
[30] Biplob R. Ray, Jemal Abawajy and Morshed Chowdhury. (2014). Scalable RFID
Security Framework and Protocol Supporting Internet of Things, p1-24.
International Journal of Research
Volume 7, Issue XII, December/2018
ISSN NO:2236-6124
Page No:2486