Over the last decade, the Internet of Things (IoT) domain has grown dramatically, from ultra-low-power hardware design to cloud-based solutions, and now, with the rise of 5G technology, a new horizon for edge computing on IoT devices will be introduced. A wide range of communication technologies has steadily evolved in recent years, representing a diverse range of domain areas and communication specifications. Because of the heterogeneity of technology and interconnectivity, the true realisation of the IoT ecosystem is currently hampered by multiple dynamic integration challenges. In this context, several emerging IoT domains necessitate a complete re-modeling, design, and standardisation from the ground up in order to achieve seamless IoT ecosystem integration. The Internet of Nano-Things (IoNT), Internet of Space-Things (IoST), Internet of Underwater-Things (IoUT) and Social Internet of Things (SIoT) are investigated in this paper with a broad future scope based on their integration and ability to source other IoT domains by highlighting their application domains, state-of-the-art research, and open challenges. To the best of our knowledge, there is little or no information on the current state of these ecosystems, which is the motivating factor behind this article. Finally, the paper summarises the integration of these ecosystems with current IoT domains and suggests future directions for overcoming the challenges.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8409334 | PMC |
http://dx.doi.org/10.7717/peerj-cs.659 | DOI Listing |
Sensors (Basel)
January 2025
State Grid Zaozhuang Power Supply Company, Zaozhuang 277899, China.
Within the framework of 6G networks, the rapid proliferation of Internet of Things (IoT) devices, coupled with their decentralized and heterogeneous characteristics, presents substantial security challenges. Conventional centralized systems face significant challenges in effectively managing the diverse range of IoT devices, and they are inadequate in addressing the requirements for reduced latency and the efficient processing and analysis of large-scale data. To tackle these challenges, this paper introduces a zero-trust access control framework that integrates blockchain technology with inner-product encryption.
View Article and Find Full Text PDFMicromachines (Basel)
January 2025
Department of Mechanical Engineering, College of Engineering, King Khalid University, Abha 61421, Saudi Arabia.
In modern ICs, sub-threshold voltage management plays a significant role due to its perspective on energy efficiency and speed performance. Level shifters (LSs) play a critical role in signal exchange among multiple voltage domains by ensuring signal integrity and the reliable operation of ICs. In this article, a Pass-Transistor-Enabled Split Input Voltage Level Shifter (PVLS) is designed for area, delay, and power-efficient applications with a wide voltage conversion range.
View Article and Find Full Text PDFSci Rep
January 2025
Torrens University Australia, Fortitude Valley, QLD 4006, Leaders Institute, 76 Park Road, Woolloongabba, QLD 4102, Brisbane, Queensland, Australia.
Sensors (Basel)
December 2024
2nd Department of Radiology, Medical School, National and Kapodistrian University of Athens, 12462 Athens, Greece.
The widespread propagation of wireless communication devices, from smartphones and tablets to Internet of Things (IoT) systems, has become an integral part of modern life. However, the expansion of wireless technology has also raised public concern about the potential health risks associated with prolonged exposure to electromagnetic fields. Our objective is to determine the optimal machine learning model for constructing electric field strength maps across urban areas, enhancing the field of environmental monitoring with the aid of sensor-based data collection.
View Article and Find Full Text PDFSci Rep
January 2025
Department of Electrical and Electronics Engineering, Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education, Manipal, India.
The increasing prevalence of network connections is driving a continuous surge in the requirement for network security and safeguarding against cyberattacks. This has triggered the need to develop and implement intrusion detection systems (IDS), one of the key components of network perimeter aimed at thwarting and alleviating the issues presented by network invaders. Over time, intrusion detection systems have been instrumental in identifying network breaches and deviations.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!