Classification and Analysis of Internet-of-Things Architecture Based on Scalability, Security and Energy Efficiency

Classification and Analysis of Internet-of-Things Architecture Based on Scalability, Security and Energy Efficiency

Author Details

1. Dr. Shalini Aggarwal, Associate Professor, Institute of Professional Excellence & Management, Ghaziabad, India
2. Mr. Karan Singh Bisht, Student, Graphic Era Hill University, Dehradun, India

Internet of Things (IOT) comprises things that have unique identities and are connected to the internet. IOT is a new revolution in the capabilities of the devices that are connected via the internet, and is being driven by the advancement in capabilities (cost effective) in sensor networks, mobile devices, wireless communications, networking and cloud technologies with minimum or no human intervention. The scope of IOT is not limited only to connecting devices to the internet but also allows communication and exchange of data among them The Internet of Things (IOT) represents a significant evolution in internet technology, enabling the connection and communication of billions of devices worldwide. This paper aims to provide a comprehensive review and classification of IOT architectures. We examine the various layers, models, and frameworks proposed in the literature, identifying common themes and differences. By analyzing these architectures, we aim to offer insights into their design principles, strengths, and weaknesses. Our review highlights the critical role of architecture in IOT deployment and suggests directions for future research to address current challenges and enhance IOT system efficiency and security. This paper presents a review and classification on architecture of IOT based on the challenges in application of IOT. It provides an overview of the classification of the architecture based on scalability, security and energy efficiency. This paper evaluates various contributions of researchers in different areas of IOT architecture. It will give good comprehension for the new researchers, who want to do research in this field of Internet of Things.

Keywords

Internet of Things (IOT), Three-layer architecture, Scalability, Security, Energy-efficiency.

  1. Vermesan, P. Friess, P. Guillemin et al., “Internet of things strategic research road map,” in Internet of Things: Global Technological and Societal Trends, vol. 1, pp. 9–52, 2011.
  2. Pena-Lopez, ´ Itu Internet Report 2005: The Internet of Things, 2005
  3. Sethi P. Sarangi S. R. (2017). “Internet of Things: Architectures, Protocols, and Applications”, Journal of Electrical and Computer Engineering, 2017, pp. 1–25. Advance online publication. 10.1155/2017/9324035
  4. Abdmeziem M.R., Tandjaoui D., Romdhani I. (2016) “Architecting the Internet of Things: State of the Art”. In: Koubaa A., Shakshuki E. (eds) Robots and Sensor Clouds. Studies in Systems, Decision and Control, Springer, Cham. pp. 55-75 vol 36.
  5. Yousefpour, G. Ishigaki, R. Gour and J. Jue, “On Reducing IOT Service Delay via Fog Offloading,” IEEE Internet of Things Journal , vol. 5, no. 1, 2018.
  6. Said and M. Masud, “Towards internet of things: survey and future vision,” International Journal of Computer Networks, vol. 5, no. 1, pp. 1–17, 2013.
  7. Wafa’a Kassab and Khalid A. Darabkh, “A-Z Survey of Internet of Things: Architectures, Protocols, Applications, Recent Advances, Future Directions and Recommendations,” Journal of Network and Computer Applications, Elsevier, vol. 163, 102663, August 2020.
  8. Cirani et al., “A Scalable and Self-Configuring Architecture for Service Discovery in the Internet of Things,” IEEE Internet of Things Journal, vol. 1, no. 5, pp. 508-521, Oct. 2014,
  9. Sarkar, A. U. Nambi S. N., R. V. Prasad, A. Rahim, R. Neisse and G. Baldini, “DIAT: A Scalable Distributed Architecture for IOT,” IEEE Internet of Things Journal, vol. 2, no. 3, pp. 230-239, June 2015,
  10. Hui Guo, Ju Ren, Deyu Zhang, Yaoxue Zhang, Junying Hu, “A scalable and manageable IOT architecture based on transparent computing”, Journal of Parallel and Distributed Computing, Volume 118, Part 1, pp. 5-13, 2018.
  11. Javed, A. Malhi, T. Kinnunen and K. Främling, “Scalable IOT Platform for Heterogeneous Devices in Smart Environments,” IEEE Access, vol. 8, pp. 211973 211985, 2020.
  12. Qian, H. Xu and P. Li, “A Novel Secure Architecture for the Internet of Things,” in 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS), 2016, pp. 398-401.
  13. Feldhofer M., Dominikus S., and Wolkerstorfer J. (2004) Strong Authentication for RFID Systems Using the AES Algorithm In: Joye M., Quisquater JJ. (eds) Cryptographic Hardware and Embedded Systems – CHES 2004. Lecture Notes in Computer Science, vol 3156. Springer, Berlin, Heidelberg.
  14. Calmels, S. Canard, M. Girault, and H. Sibert, “Low-Cost Cryptography for Privacy in RFID Systems,” in Smart Card Research and Advanced Applications, vol. 3928, J. Domingo-Ferrer, J. Posegga, and D. Schreckling, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006, pp. 237–251
  15. Maheshwari and H. Dagale, “Secure communication and firewall architecture for IOT applications,” in Proc. 10th Inter. Conf. on Communication Systems & Networks (COMSNETS), pp. 328-335, 2018, doi: 10.1109/COMSNETS. 2018.8328215.
  16. Liang, J. Chen, H. Cheng and Y. Tseng, “An Energy-Efficient Sleep Scheduling with QoS Consideration in 3GPP LTE-Advanced Networks for Internet of Things,” in IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 3, no. 1, pp. 13-22, March 2013, doi: 10.1109/JETCAS.2013. 2243631.
  17. Kaur and S. K. Sood, “An Energy-Efficient Architecture for the Internet of Things (IOT),” IEEE Syst. J., vol. 11, no. 2, pp. 796–805, Jun. 2017.
  18. Akgul, B. Canberk, “Self-Organized Things (SoT): An Energy Efficient Next Generation Network Management,” Computer Communications (Elsevier), vol. 74, pp. 52-62, January 2016.
  19. Tang, Jine, ZhangBing Zhou, Jianwei Niu, and Qun Wang. “An energy efficient hierarchical clustering index tree for facilitating time-correlated region queries in the Internet of Things,” Journal of Network and Computer Applications, vol. 40, pp. 1 11, 2014.
  20. Shelby, K. Hartke, and C. Bormann. (Jun. 2013). Constrained Application Protocol (CoAP). RFC 7252 (Proposed Standard), Internet Engineering Task Force. Accessed: July 2, 2021.
  21. Wehrle, S. G otz, and S. Rieche, “Distributed hash tables,” Peer-to-Peer Systems and Applications, vol. 3485. Springer, 2005, pp. 79–93

S. Aggarwal and K. S. Bisht, “Classification and Analysis of Internet-of-Things Architecture Based on Scalability, Security and Energy Efficiency,” IPEM Journal of Computer Application & Research, vol. 9, pp. 09–16, Dec. 2024. DOI: