Keywords

1 Introduction

The term Internet of Things (IoT) was coined by “Kevin Ashton” in 1999 at “Procter and Gamble” (P&G) while connecting the latest scheme of RFID in the supply chain of that company [1, 2]. A decade later, the IoT was launched as new technology [3]. Road map of IoT as per “SRI consulting business intelligence” is given in Fig. 1. It shows when the number of objects linked with the Internet would be exceeded the number of persons in the universe [4]. The road map also shows the increase in application areas of IoT with the duration of time. IoT had started from the retail supply chain and later on benefitted medical and health, transport, manufacturing, pharmaceuticals and safety and security application areas.

Fig. 1
figure 1

Road map of the Internet of Things [35]

The IoT has made possible to interact between Things to Human (T2H), Things to Things (T2T), Human to Human (H2H), Human to Things (H2T), at a virtual level in daily routine life [5]. The IoT has added the latest dimension to this procedure by allowing interactions within smart objects. The omnipresence of communication network connects the objects “anytime, anyplace, any medium (wired or wireless) and anything or human” [6]. Figure 2 represents the diversified connectivity of IoT.

Fig. 2
figure 2

Connectivity of IoT [36]

The IoT is a novel archetype which is hastily achieving height due to the recent advancement in wireless communications. The simple idea behind IoT is the prevalent existence of various objects or things with tags of Radio-Frequency Identification (RFID), different kinds of sensors, mobile phones, actuators, and so on as given in Fig. 3 [7].

Fig. 3
figure 3

Internet of Things

It is implemented by assigning the address to the objects or human using any addressing scheme [5]. Different available technologies can be used to implement IoT. The basic structure of the IoT is based on smart devices, i.e., objects built with communication capabilities of Machine-to-Machine (M2M) [8]. The object can be of any type. It is necessary to assign an IP address to every device/object to provide the ability to transfer or receive data over the network [9]. Huge availability of IPV6s addresses is the major factor in the development of IoT technology. These smart things are able to make communication among them as well as to interact with the surrounding environment by interchanging, information, and data sensed about the environment [10]. During responding independently to the events of the real world and affecting them by the running processes which excite operation and allocate services along with or without the straight human intervention [11]. Actually, the IoT is a network of uniquely addressable interlinked objects, which is worldwide established on the low-power communication protocols [12]. IoT paradigm is represented in Fig. 4. The process consists of a large number of heterogeneous objects [13]. Any wireless communication technology can be used to communicate within objects but it is very costly to provide each object with its personal id on the web [3]. The general IoT deployment architecture consists of four layers, but the underneath and intermediate technologies of each layer vary according to the application. IoT can be implemented with different technologies like Wireless Private Area Network (WPAN), RFID, IPV6, etc. and has diversified application areas.

Fig. 4
figure 4

Internet of Things paradigm [18]

This paper is divided into seven sections. The introduction of IoT was given in Sect. 1. Section 2 describes the architecture of IoT and Sect. 3 explores the technologies used in IoT. Sections 4 and 5 discuss the applications of IoT and quality of services, respectively. Section 6 concludes the paper and Sect. 7 leads to the future scope in the field of IoT.

2 Architecture of IoT

IoT works in the bottom to top approach. Sensors gather data using the smart devices, process this data using controllers to take decisions, and then communicate to the devices or persons for implementation [14]. User or applications are in the topmost layer and the technology, assigning addresses to smart objects, and communication media used are in the bottom layer. Smart objects, sensors, and software like microcontrollers used to process data are in the middle layer. The architecture of IoT consists of four layers as shown in Fig. 5. The functionalities of each layer have been briefly discussed below.

Fig. 5
figure 5

Layered architecture of IoT

2.1 Application Layer

It is the user interface in the top of the architecture which is responsible for delivering several applications to the different users or industries in IoT [5]. Increasing usage of RFID technology in numerous applications increases the scope of IoT [7]. This application can belong to different industry verticals such as logistics, manufacturing, public safety, environment, food and drug, health care, retail marketing chain, and so on [5]. Session generation for every user and designing of the user interface for each application is also the part of this layer.

2.2 Edge/Transport Layer

The edge/transport layer utilizes the interface between bottom hardware surface and top application surface [12]. It is responsible for critical function that is device management as well as information management. It has responsibilities of all the issues like filtering and preprocessing of data, access control, analyzing of semantic, discovery of information, i.e., Electronic Product Code (EPC), information facility data analytics, and Object Naming Service (ONS). Middleware surface works in bidirectional mode [15].

2.3 Network and Data Acquisition Layer

This layer is responsible for publishing, message routing, and subscribing, and based on the requirement it can perform the cross-platform communication. Data handling and conversion happen in the first stage of this layer [12]. Data measurement, aggregation, and control are the major functions of this layer.

2.4 Physical/Device Layer

Physical layer consists of sensors/constrained devices (sensors/actuators). According to Internet Engineering Task Force (IETF) publication RFC7228 constrained devices can be classified into three classes and are shown in Table 1 [16].

Table 1 Constrained devices according to IETF (RFC7228)

Sensors can be wearable or implantable and can record continuous or discrete signals. Figure 6 shows the categorization of different types of physiological sensors. RFID tags and readers, sensor networks, embedded systems, or other sensors form device layer [10]. The layer is responsible for primary data generated by these sensors, things, or objects. RFID tags and sensor networks provide identification. Embedded systems are used to collect the information, to store information, processing of information, actuation, control, and communication [17].

Fig. 6
figure 6

Classification of sensors

3 Technologies Used in IoT

IoT can be implemented with the integration of several technologies. As the name reflects, IoT is the technology to make information or data available on the Internet to remotely control the real-time application [18]. The IoT syntactically consists of two terms; the first one depicts the vision of IoT, i.e., “network-oriented,” and the other focuses on the common “objects” to be merged into a regular structure [3]. The actual definition of IoT is obtained from a “Objects oriented” [8]. The underneath technologies used in IoT are given below.

3.1 Wireless Private Area Network (WPAN)

The WSN can be used to create wireless private area network. These can be RF modules, Zigbee modules [9]. WPAN follows the IEEE 802.15.4 standards. It works in three frequency bands 868, 915, and 2.4 GHz. The parameter details of these frequency bands are given in Table 2 [19, 20]. In WPAN, devices are denoted as nodes. It can sense surroundings and communicate data using wireless connections to and from the monitored field [21]. The WPAN can control the environment and makes it able to interact with computers or human beings/different nodes and the surrounding environment [22]. Possibly, multiple hops forward data to the controller functioning as a sink node which can use the data locally or it can be linked to the other networks [22]. The nodes might be mobile or immobile and can be heterogeneous or homogeneous [23].

Table 2 WPAN frequency bands

3.2 Radio-Frequency Identification (RFID)

RFID is a wireless mechanics that use identification code to scan or recognize any person, animal, substance, product, car, or any other object that contains a tag [24]. This technology is the combination of three articulates: tag, reader, and antenna. A tag is known as a transponder, which has a printed circuit board and/or semiconductor. A reader is further known as a transceiver, which decodes existing information by the transponder or tag. Usually, an antenna is established on the tag, which receives or transmits the power in the form of the radio frequency. The data is transmitted through antenna and reader receives the data [6]. RFIDs are available in different frequency ranges and are chosen according to the applications as shown in Fig. 7 [7, 22].

Fig. 7
figure 7

Working within “RFID” technology

\( \begin{array}{*{20}l} {{ \bullet }\quad {\text{Low-density up to}}\,30\,{\text{MHz}} \to {\text{up to}}\,0.01\,{\text{m for Close-joint}}} \hfill \\ {\left. \begin{aligned} &{ \bullet }\quad {\text{Lower}}\,{\text{than}}\,135\,{\text{KHz}} \to {\text{up}}\,{\text{to}}\,1\,{\text{m}}\,500\,{\text{cm}} \hfill \\& { \bullet }\quad 13.56\,{\text{MHz}}\left( {\text{closeness}} \right) \to 0.1\,{\text{m}} \hfill \\ &{ \bullet }\quad 13.56\,{\text{MHz}}\left( {\text{environs}} \right) \to 0.5{ - }3\,{\text{m}} \hfill \\ \end{aligned} \right\}{\text{Remote Joint}}} \hfill \\ {\left. \begin{aligned} &{ \bullet }\quad 433{,}868\,{\text{or}}\,915\,{\text{MHz}} \to 0.5{ - }50\,{\text{m}} \hfill \\& { \bullet }\quad 2.45\,{\text{GHz}} \to 10{ - }100\,{\text{m}} \hfill \\ &{ \bullet }\quad 5.8\,{\text{GHz}} \to 10{ - }1000\,{\text{m}} \hfill \\ &\quad \quad \left( {\text{Under expansion}} \right) \hfill \\ \end{aligned} \right\}{\text{Long Range}}} \hfill \\ \end{array} \)

3.3 Internet Protocol Version 6 (IPv6)

IPv6s huge increase in address space played a major role in the development and growth of IoT. According to the research community, the address space expansion means that every atom in the universe can be assigned an IPV6 address and still 100+ piles of earth addresses are left to assign [25]. Samsung Electronics, Silicon Labs, Nest Labs, Yale Security, Free scale Semiconductor Big Ass Fans, and ARM have joined hands together to form the “Thread Group” to enhance the application capabilities of “Internet of Things” connectivity [26]. The thread will avail the maximum outcome of the number of existing standards including 6LoWPAN (Little-capability wireless personal area networks), IETF IPv6, and IEEE 802.15.4 [26]. It is already used inside the nest-based devices, i.e., Wi-Fi makeable smoke detectors and thermostats made by Google [24, 27]. US National Power NIC predicts “by 2025; Internet nodes may reside in everything in daily life like vehicles, paper documents, furniture, food packages, medicines, and more” [2].

4 Applications of IoT

Potentiality of applying the IoT in different domains like industry, domestic, retailing, defense, health, education, and other various fields is very high; rather in some domains it is already in use and research is going on. Few industrial and domestic applications that come under the umbrella of IoT are given below.

4.1 Retail Supply Chain

The retail supply chain is managed well with the help of RFID identification of goods and the smart-shelf concept is very useful in placing and picking up the things in retail stores [3]. The owner is always aware of stock status and sales and can easily maintain the purchase orders for goods.

4.2 Medical and Health

Wearable sensors can be used to locate, in the hospital, both doctors and nurses along with the patients at any point in time [26]. Some vital functions of the human body, i.e., cholesterol levels, sugar level, blood pressure, temperature, and the heartbeat rate can be monitored through the IoT system. In case of a heart attack, stimulate the heart muscle through the combination of the sensors implantation. Data can be recorded wirelessly using IoT technology [28].

4.3 Aid for Aged and Physically Disabled Persons

IoT is very beneficial for an aged and physically disabled person using wearable smart identity sensors. These wireless sensors transmit the health status of a person and can also alarm for help in case of an emergency condition [29].

4.4 Transport

RFID technology is already in use in vehicles production units and traffic control systems. Luxury vehicle, i.e., buses, cars, trains, and airplanes are equipped with actuators with increased processing powers and advanced sensors which help in reporting pressure in tires, the location of a vehicle. Deployment of IoT increases quality control, improves logistics, and improves customer services [15].

4.5 Manufacturing

In manufacturing units, IoT is used to remotely optimize production processes and keep the record of manufactured items on the daily, monthly, or yearly basis to calculate the turnover of a company using unique identity for each product. Ingredient ratio in a product can also be tracked through sensors [3].

4.6 Safety, Security

The home safety and security are must in today’s life. There are lots of wirelesses sensors which are integrated with the IoT to provide safety by providing information on the Internet through a mesh network. One can remotely control the power system, locking system, and can also be aware of the water status of own home [30].

4.7 Automation

Internet of Things is playing a major role in the embedded industry. Smart homes, smart cities, and industry 4.0 are the main application areas of automation [17]. Low-power and cost-effective embedded devices are developed with the help of smart sensors which create the mesh network and transmit data on the Internet [31].

4.8 Pharmaceutical

In pharmaceutical companies, it is the time of demand to make customer’s life risk free. It can be possible by IoT smart labeling technique. By providing smart labels to drugs it will be helpful to keep track of its quality, quantity, and also aware the patient about its storage and dosages details [32].

Few IoT applications along with their IoT properties are given in Table 3.

Table 3 IoT applications and their properties

5 Quality of Services (QoS)

The IoT has an excess of applications, resources, and the network of components which inherently consist of a complex and shared system. Lots of devices in it are dynamic and heterogeneous in terms of energy, communication, and computation. Due to this, many IoT applications are critical in nature. This motivates to provide QoS across multiple dimensions [21]. Network and resource providers of IoT application connect them carefully so that multiple computing applications can coexist in it. The environmental attributes like temperature and location, the characteristics of the network like latency, bandwidth, power, and battery life play a vital role in application’s QoS. IoT applications need responsiveness and precision smart objects are active members of IoT to collaborate and to communicate with each other by interchanging information of sensed data and act as a self-ruling to the physical world. It creates the services with or without interacting with any person [21]. Different QoS models are required for different IoT applications to limit obligatory factors to satisfy the needs of those services.

WSN is a major component of the IoT, QoS provided by optimizing the resource utilization by joining multiple sensor nodes with the global Internet. This protocol provides the best quality of control in the applications of IoT [33].

6 Conclusion

This paper concludes that “IoT” is an emerging technology. The integration of embedded systems and the Internet paved the researchers in new directions and the technology was developed. Use of wireless sensors to create the mesh of network and send data or information over the Internet enhances the utility of IoT in every field. The general architecture of IoT is given in this paper and can vary from application to application. To enhance the interoperability between human, thing, and machine still lots of work are needed to be done on its quality of services, communication protocols, and standardized architecture of “Internet of Things.”

7 Future Scope

The architecture of IoT is still application dependent and, similarly, protocols of communication are medium specific [5]. Both areas still have lots of research scope for development in future. Another area is to develop the technologies to revocable pseudonymity. Anonymity addresses the global identity schemes, encryption/encoding, and repository authority with the help of recognition, authentication of parties, authentication, and addressing plan as well as building the discovery services and global directory lookup services. In the field of robotics, IoT should be used to design collaborative robots [34].