Search results

1 – 10 of over 1000
Article
Publication date: 17 June 2019

Niraj Kumar Vishwakarma, Rohit Kumar Singh and R.R.K. Sharma

The technology used by an organization is significantly influenced by the organization’s preferred competitive capabilities. The Internet of things (IoT) is an important…

Abstract

Purpose

The technology used by an organization is significantly influenced by the organization’s preferred competitive capabilities. The Internet of things (IoT) is an important technology, which is implemented by most prominent business organizations. The purpose of this paper is to investigate the relationship between an organization’s strategies and the IoT architectures implemented by the organization.

Design/methodology/approach

This study has been carried out on primary data collected with the help of a structured questionnaire. The data have been analyzed by statistical techniques like cluster analysis and discriminant analysis through SPSS.

Findings

The empirical investigation of data revealed that there is a relationship between organizational strategy and IoT architectures. The three-layered architecture of the IoT is most suitable for caretakers; the three-, four- or five- layered architectures are suitable for marketeers; whereas innovators find it more suitable to use five- or more-layered architecture of the IoT. This paper draws the conclusion based on maximum likelihood rather than using statistical analyses like ANOVA. The idea behind using the maximum likelihood estimate is that there are many subjective parameters in deciding the architectures of the IoT. These subjective parameters are difficult to quantify, so it is not possible to apply ANOVA on these parameters.

Research limitations/implications

This study considers three organizational strategies; the relationship between other organizational strategies and IoT architecture will be studied in future.

Practical implications

This study offers multiple opportunities to practitioners and consulting firms of the IoT to adopt a suitable IoT architecture according to the organizational strategy. This study equips IoT development engineers to select suitable technology for data capturing, data transmission, and data management and access for an IoT architecture.

Originality/value

Although a lot of work has already been done on the architecture of IoT for different industries and businesses, to the best of our knowledge, this is the first study that relates organizational strategies to IoT architectures. This study applies to all the major industry types.

Details

Business Process Management Journal, vol. 26 no. 1
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 9 October 2019

Elham Ali Shammar and Ammar Thabit Zahary

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by…

6483

Abstract

Purpose

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. To enable the vision of IoT, it utilizes technologies such as ubiquitous computing, context awareness, RFID, WSN, embedded devices, CPS, communication technologies, and internet protocols. IoT is considered to be the future internet, which is significantly different from the Internet we use today. The purpose of this paper is to provide up-to-date literature on trends of IoT research which is driven by the need for convergence of several interdisciplinary technologies and new applications.

Design/methodology/approach

A comprehensive IoT literature review has been performed in this paper as a survey. The survey starts by providing an overview of IoT concepts, visions and evolutions. IoT architectures are also explored. Then, the most important components of IoT are discussed including a thorough discussion of IoT operating systems such as Tiny OS, Contiki OS, FreeRTOS, and RIOT. A review of IoT applications is also presented in this paper and finally, IoT challenges that can be recently encountered by researchers are introduced.

Findings

Studies of IoT literature and projects show the disproportionate importance of technology in IoT projects, which are often driven by technological interventions rather than innovation in the business model. There are a number of serious concerns about the dangers of IoT growth, particularly in the areas of privacy and security; hence, industry and government began addressing these concerns. At the end, what makes IoT exciting is that we do not yet know the exact use cases which would have the ability to significantly influence our lives.

Originality/value

This survey provides a comprehensive literature review on IoT techniques, operating systems and trends.

Details

Library Hi Tech, vol. 38 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 28 May 2019

Omerah Yousuf and Roohie Naaz Mir

Internet of Things (IoT) is a challenging and promising system concept and requires new types of architectures and protocols compared to traditional networks. Security is an…

1825

Abstract

Purpose

Internet of Things (IoT) is a challenging and promising system concept and requires new types of architectures and protocols compared to traditional networks. Security is an extremely critical issue for IoT that needs to be addressed efficiently. Heterogeneity being an inherent characteristic of IoT gives rise to many security issues that need to be addressed from the perspective of new architectures such as software defined networking, cryptographic algorithms, federated cloud and edge computing.

Design/methodology/approach

The paper analyzes the IoT security from three perspectives: three-layer security architecture, security issues at each layer and security countermeasures. The paper reviews the current state of the art, protocols and technologies used at each layer of security architecture. The paper focuses on various types of attacks that occur at each layer and provides the various approaches used to countermeasure such type of attacks.

Findings

The data exchanged between the different devices or applications in the IoT environment are quite sensitive; thus, the security aspect plays a key role and needs to be addressed efficiently. This indicates the urgent needs of developing general security policy and standards for IoT products. The efficient security architecture needs to be imposed but not at the cost of efficiency and scalability. The paper provides empirical insights about how the different security threats at each layer can be mitigated.

Originality/value

The paper fulfills the need of having an extensive and elaborated survey in the field of IoT security, along with suggesting the countermeasures to mitigate the threats occurring at each level of IoT protocol stack.

Details

Information & Computer Security, vol. 27 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 4 April 2016

Shancang Li, Theo Tryfonas and Honglei Li

The purpose of this paper is to provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various…

9951

Abstract

Purpose

The purpose of this paper is to provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technologies and implications to various applications.

Design/methodology/approach

Security requirements and solutions are analysed based on a four-layer framework of IoT on sensing layer, network layer, service layer, and application layer. The cross-layer threats are analysed followed by the security discussion for the enabling technologies including identification and tracking technologies, WSN and RFID, communication, networks, and service management.

Findings

IoT calls for new security infrastructure based on the new technical standards. As a consequence, new security design for IoT shall pay attention to these new standards. Security at both the physical devices and service-applications is critical to the operation of IoT, which is indispensable for the success of IoT. Open problems remain in a number of areas, such as security and privacy protection, network protocols, standardization, identity management, trusted architecture, etc.

Practical implications

The implications to various applications including supervisory control and data acquisition, enterprise systems, social IoT are discussed. The paper will serve as a starting point for future IoT security design and management. The security strategies for IoT should be carefully designed by managing the tradeoffs among security, privacy, and utility to provide security in multi-layer architecture of IoT.

Originality/value

The paper synthesizes the current security requirements for IoT and provides a clear framework of security infrastructure based on four layers. Accordingly, the security requirements and potential threats in the four-layer architecture are provided in terms of general devices security, communication security, network security, and application security.

Details

Internet Research, vol. 26 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 9 July 2021

Anish Banerjee and R. Ramesh Nayaka

The purpose of this paper is to investigate building information modelling (BIM) integrated Internet of Things (IoT) architectures extensively and provide comparative evaluation…

Abstract

Purpose

The purpose of this paper is to investigate building information modelling (BIM) integrated Internet of Things (IoT) architectures extensively and provide comparative evaluation of those against deciding parameters pertaining to their characteristics and subsequent applications in construction industry.

Design/methodology/approach

This paper identifies BIM-integrated cyber physical system frameworks, specific to project objectives, comprising of sensors working as physical assets and BIM-based virtual models acting as the cyber component , connected via wired or wireless protocols (e.g. WiFi, Zigbee, near-field communication, mobile-to-mobile, Zwave, 3 G, 4 G, long-term evolution, 5 G and low-power wide-area networks) and their potential applications in decision-making, visual management, logistics and supply chain management, smart building system management and structural performance assessment, etc. Such proposed architectures are evaluated against deciding parameters such as availability, reliability, mobility, performance, management, scalability, interoperability and security and privacy to evaluate their respective efficiencies.

Findings

This study finds that the underlying aim of planned IoT frameworks is to integrate systems and processes for a better information flow and to initiate shift from silo solutions to a smart ecosystem. The efficiencies of such frameworks are completely subjective to their respective project natures, objectives and requirements.

Originality/value

This study is unique in its nature to identify requirements of an efficient BIM-integrated IoT architecture and provide comprehensive insights about potential applications in construction industry.

Article
Publication date: 26 January 2022

Vineet Tambe, Gaurav Bansod, Soumya Khurana and Shardul Khandekar

The purpose of this study is to test the Internet of things (IoT) devices with respect to reliability and quality.

Abstract

Purpose

The purpose of this study is to test the Internet of things (IoT) devices with respect to reliability and quality.

Design/methodology/approach

In this paper, the authors have presented the analysis on design metrics such as perception, communication and computation layers for a constrained environment. In this paper, based on their literature survey, the authors have also presented a study that shows multipath routing is more efficient than single-path, and the retransmission mechanism is not preferable in an IoT environment.

Findings

This paper discusses the reliability of various layers of IoT subject methodologies used in those layers. The authors ran performance tests on Arduino nano and raspberry pi using the AES-128 algorithm. It was empirically determined that the time required to process a message increases exponentially and is more than what benchmark time estimates as the message size is increased. From these results, the authors can accurately determine the optimal size of the message that can be processed by an IoT system employing controllers, which are running 8-bit or 64-bit architectures.

Originality/value

The authors have tested the performance of standard security algorithms on different computational architectures and discuss the implications of the results. Empirical results demonstrate that encryption and decryption times increase nonlinearly rather than linearly as message size increases.

Details

International Journal of Quality & Reliability Management, vol. 39 no. 7
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 2 August 2021

Mazen El-Masri and Eiman Mutwali Abdelmageed Hussain

Blockchain is evolving to become a platform for securing Internet of things (IoT) ecosystems. Still, challenges remain. The purpose of this literature review is to highlight the…

831

Abstract

Purpose

Blockchain is evolving to become a platform for securing Internet of things (IoT) ecosystems. Still, challenges remain. The purpose of this literature review is to highlight the applicability of blockchain as a medium to secure IoT ecosystems. A two-dimensional framework anchored on (1) IoT layers and (2) security goals is used to organize the existent IoT security threats and their corresponding countermeasures identified in the reviewed literature. The framework helped in mapping the IoT security threats with the inherent features of blockchain and accentuate their prominence to IoT security.

Design/methodology/approach

An approach integrating computerized natural language processing (NLP) with a systematic literature review methodology was adopted. A large corpus of 2,303 titles and abstracts of blockchain articles was programmatically analyzed in order to identify the relevant literature. The identified literature was subjected to a systematic review guided by a well-established method in IS research.

Findings

The literature evidently highlights the prominence of blockchain as a mean to IoT security due to the distinctive features it encompasses. The authors’ investigation revealed that numerous existent threats are better addressed with blockchain than conventional mechanisms. Nevertheless, blockchain consumes resources such as electricity, time, bandwidth and disk space at a rate that is not yet easily accessible to common IoT ecosystems.

Research limitations/implications

Results suggest that a configurational approach that aligns IoT security requirements with the resource requirements of different blockchain features is necessary in order to realize the proper balance between security, efficiency and feasibility.

Practical implications

Practitioners can make use of the classified lists of convention security mechanisms and the IoT threats they address. The framework can help underline the countermeasures that best achieve their security goals. Practitioners can also use the framework to identify the most important features to seek for in a blockchain technology that can help them achieve their security goals.

Originality/value

This study proposes a novel framework that can help classify IoT threats based on the IoT layer impacted and the security goal at risk. Moreover, it applies a combined man-machine approach to systematically analyze the literature.

Details

Journal of Enterprise Information Management, vol. 34 no. 5
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 6 April 2021

Ifadhila Affia and Ammar Aamer

Real-time visibility and traceability in warehousing could be accomplished by implementing the internet-of-things (IoT) technology. The purpose of this paper is to develop a…

1673

Abstract

Purpose

Real-time visibility and traceability in warehousing could be accomplished by implementing the internet-of-things (IoT) technology. The purpose of this paper is to develop a roadmap for designing an IoT-based smart warehouse infrastructure and, respectively, design and apply the IoT-based smart warehouse infrastructure using a developed roadmap. More specifically, this study first identifies critical components to design an IoT-based smart warehouse infrastructure. Second, the study at hand identifies essential factors that contribute to the successful implementation of IoT-based smart warehouse infrastructure.

Design/methodology/approach

A qualitative-descriptive method, through a comprehensive review of the relevant studies, was used in this study to develop a roadmap. A prototype system was then designed to simulate a case company’s actual warehouse operations in one of the manufacturing companies in Indonesia.

Findings

A framework was proposed which is viable for designing an IoT-based smart warehouse infrastructure. Based on the data collected from a case company, the proposed smart warehouse infrastructure design successfully implemented real-time visibility and traceability and improved overall warehouse efficiency.

Research limitations/implications

While the framework in this research was carried out in one of the developing counties, the study could be used as the basis for future research in a smart warehouse, IoT and related topics.

Originality/value

This research enhances the limited knowledge to establish the IoT infrastructure for a smart warehouse to enable real-time visibility and traceability. This study is also the first to specifically propose a framework for designing an IoT-based smart warehouse infrastructure. The proposed framework can motivate companies in developing countries to deploy efficient and effective smart warehouses using IoT to drive the countries’ economic growth.

Details

Journal of Science and Technology Policy Management, vol. 13 no. 1
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 18 October 2021

Asad Ullah Khan, Zhiqiang Zhang, Sohail Raza Chohan and Wajid Rafique

In the modern era, libraries confront significant service challenges. Some challenges are linked to information resource management which includes direct availability of…

Abstract

Purpose

In the modern era, libraries confront significant service challenges. Some challenges are linked to information resource management which includes direct availability of information for immediate decision making. The Internet of Things (IoT) is a recent technological shift that library personnel should be aware of because it has the potential to enhance information resource management. The purpose of the research is to highlight the willingness to adopt IoT technology in libraries.

Design/methodology/approach

This study uses a quantitative research design in which a survey of public sector universities in Nanjing, China, is conducted to investigate the determinants of IoT adoption intention in libraries. A total of 389 responses were captured from experienced library personnel. The literature on technology adoption is then used to formulate quantitative theories. For data analysis, partial least squares structural equation modeling using SmartPLS.

Findings

The research highlights the various success factors which support the IoT service adoption process. It is concluded that IoT augmented services in academic libraries must be supported through robust management practices and effective utilization of technological resources. Many libraries have made substantial modifications to their structure in terms of technology and design to satisfy the demands of patrons.

Originality/value

This is an empirical paper that looks at IoT adoption intention in libraries using a quantitative approach through surveying library personnel. The library personnel can aid in the understanding of the motivations behind technology adoption in libraries, particularly of IoT services that may bring about advances in the libraries' capability to provide information access services.

Details

Library Hi Tech, vol. 40 no. 6
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 25 October 2019

Alessandro Ancarani, Carmela Di Mauro, Hervé Legenvre and Marco Stefano Cardella

The internet of things (IoT) is one of the pillars of Industry 4.0. Prior OM research has conceptualized IoT, and analyzed potential applications and risks and challenges…

1723

Abstract

Purpose

The internet of things (IoT) is one of the pillars of Industry 4.0. Prior OM research has conceptualized IoT, and analyzed potential applications and risks and challenges associated with its adoption. However, little empirical evidence exists on the main types of IoT projects undertaken by organizations and on their impacts. The purpose of this paper is to close this gap by searching for a taxonomy of IoT projects that may be associated to different IoT readiness levels. The dynamic capability lens is used as the theoretical background for the analysis.

Design/methodology/approach

A database of secondary IoT case studies is used to identify an IoT project taxonomy through two-step cluster analysis. The taxonomy obtained allows classifying projects into homogenous groups by technological novelty, IoT capabilities and functional areas of application. ANOVA is then used to test for the association between cluster membership and alternative operational impacts. Finally, the analysis of selected case studies from the database allows throwing light on the nature of the projects typical of each cluster.

Findings

Five clusters of projects have been identified and positioned along varying degrees of capabilities, novelty and scope. The taxonomy is consistent with a three layer IoT technological readiness model. In turn, the three IoT readiness levels correspond to three managerial capabilities: monitoring, control and optimization. Combining cluster results with detailed case analysis suggests that IoT technological readiness can be interpreted as a dynamic capability enabling knowledge creation that can support competitive advantage.

Originality/value

This is a first attempt to describe projects firms undertake when adopting IoT. Building on cluster analysis, the study suggests that different IoT readiness levels are needed to reach different impacts.

Details

International Journal of Operations & Production Management, vol. 40 no. 6
Type: Research Article
ISSN: 0144-3577

Keywords

1 – 10 of over 1000