P. M. Rao, Saraswathi Pedada, Srinivas Jangirala, Ashok Kumar Das, Joel J. P. C. Rodrigues
{"title":"Role of IoT in the Ages of Digital to Smart Cities: Security Challenges and Countermeasures","authors":"P. M. Rao, Saraswathi Pedada, Srinivas Jangirala, Ashok Kumar Das, Joel J. P. C. Rodrigues","doi":"10.1109/IOTM.001.2300124","DOIUrl":"https://doi.org/10.1109/IOTM.001.2300124","url":null,"abstract":"Digital intelligence through information has contributed to the evolution of smart cities particularly in energy usage, human wellness, knowledge transfer, and urban development. Modern industrial, residential, transit, and commercial operations demand sustainable resource management and seamless communication. The sustainable environment has a network architecture to gather, store, and analyze the real-time data for effective decision-making. The Internet of Things (IoT) enables smart and sustainable environments by incorporating cutting-edge technologies to create smart, people-centric cities and industries. However, various security challenges and issues have raised from the ages of digital to smart cities. In this article, we present a systematic approach to depict the role of IoT in the ages. Various security challenges, real-time incidents, and countermeasures are discussed in this study to address the major difficulties of sustainable environments to highlight the potential visions of smart cities/industries.","PeriodicalId":235472,"journal":{"name":"IEEE Internet of Things Magazine","volume":"125 10","pages":"56-64"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139453336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human-Sensing Platforms and Ethical Considerations Throughout Their Data Life-Cycles","authors":"Sung Une Lee, Hye-Young Paik, S. Kanhere","doi":"10.1109/IOTM.001.2300148","DOIUrl":"https://doi.org/10.1109/IOTM.001.2300148","url":null,"abstract":"Human-sensing platforms, encompassing digitized biometrics, activity sensing, and virtual human modeling, play a pivotal role in leveraging human-related data within the digital realm. With the swift progress of AI techniques, the promising opportunities brought about by these platforms are counterbalanced by the ethical challenges they pose. In considering these challenges, it is necessary to comprehend the characteristics of these platforms from data-centric viewpoints to understand their data management practices throughout their life-cycles. In this study, we first provide a comprehensive overview of various human-sensing platforms, highlighting the range of techniques utilized and the corresponding issues at each stage of the data lifecycle. Based on existing and emerging standards and frameworks on ethics in AI, we show the ethical issues and challenges in each phase in these data life-cycles. By providing this holistic perspective, our research contributes to the ongoing dialogue surrounding responsible data practices in the realm of human-sensing platforms.","PeriodicalId":235472,"journal":{"name":"IEEE Internet of Things Magazine","volume":"127 25","pages":"66-73"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139453526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"When LoRaWAN Meets CSMA: Trends, Challenges, and Opportunities","authors":"Chenglong Shao, Osamu Muta","doi":"10.1109/IOTM.001.2300026","DOIUrl":"https://doi.org/10.1109/IOTM.001.2300026","url":null,"abstract":"Long-Range Wide-Area Network (LoRaWAN) has been increasingly deployed to serve as the wireless networking platforms for various Internet-of-Things applications. However, an inherent drawback of LoRaWAN is that the signal transmissions of LoRaWAN end devices frequently collide with each other, which leads to data decoding failure. This is because LoRaWAN enables wireless channel access mainly based on the naive ALOHA protocol where each end device is allowed to transmit regardless of others' ongoing transmissions. In this context, the past few years have witnessed the prosperity of enhanced channel access protocol design for LoRaWAN. Particularly, carrier-sense multiple access (CSMA) has gained more attention recently since it enables channel access in a distributed manner without additional signaling overhead between LoRaWAN end devices and gateways. More importantly, implementing CSMA in LoRaWAN is a challenging and interesting problem since signals in LoRaWAN can traverse below the noise floor, making traditional carrier-sensing techniques fail to detect ongoing transmissions. By considering the necessity and importance of this topic, this article aims to provide a comprehensive and timely review of CSMA-based LoRaWAN for the first time. We start by analyzing the trends of existing LoRaWAN-oriented CSMA studies. As the key possible technique to enable CSMA in practical LoRaWAN, Channel Activity Detection (CAD) and its associated challenges are then deeply investigated with a real-world measurement study. Based on the limitations of CAD, we finally provide several research insights for CAD-based CSMA in LoRaWAN.","PeriodicalId":235472,"journal":{"name":"IEEE Internet of Things Magazine","volume":"94 24","pages":"90-96"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139454296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Jadav, Anuja R. Nair, Rajesh Gupta, S. Tanwar, Abdulatif Alabdulatif, Ravi Sharma
{"title":"Blockchain-Envisioned Onion Routing Framework for Internet of Vehicles Communication toward 6G","authors":"N. Jadav, Anuja R. Nair, Rajesh Gupta, S. Tanwar, Abdulatif Alabdulatif, Ravi Sharma","doi":"10.1109/IOTM.001.2300156","DOIUrl":"https://doi.org/10.1109/IOTM.001.2300156","url":null,"abstract":"The advent of the Internet of things (IoT) guided the rapid transformation of traditional vehicle ad-hoc networks (VANETs) into the Internet of vehicles (IoVs). It started with a sharp rise in the number of vehicles, leading to mass data exchange between vehicles and infrastructure and computational tasks on these vehicles. Emergent issues such as active road safety, traffic monitoring, and efficiency are significant concerns in IoV. Hence, achieving anonymity and the security and privacy of the vehicles involved in IoV is still under work. A vital issue is the issue of latency and reliability in IoV for exchanging a mass amount of sensitive information. Given this background, we proposed ToR-IoV, a blockchain and onion routing-based secure IoV communication framework underlying the 6G network. Our proposed framework permits the IoV hashed data to get encapsulated in multiple layers of encryption, and a verifying token (VT) and time to live (TTL) has been assigned to each IoV to authenticate and validate the network attacks on OR. Also, the interplanetary file system (IPFS) constructs the ToR-IoV system cost-effective. Finally, we have demonstrated performance evaluation of ToR-IoV on different parameters such as encryption-decryption time, scalability with IPFS, and latency with 6G.","PeriodicalId":235472,"journal":{"name":"IEEE Internet of Things Magazine","volume":"89 12","pages":"82-88"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139454427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. F. M. Shahen Shah, Muhammet Ali Karabulut, Khaled Rabie
{"title":"Multiple Access Schemes for 6G Enabled NTN-Assisted IoT Technologies: Recent Developments, Prospects and Challenges","authors":"A. F. M. Shahen Shah, Muhammet Ali Karabulut, Khaled Rabie","doi":"10.1109/IOTM.001.2300234","DOIUrl":"https://doi.org/10.1109/IOTM.001.2300234","url":null,"abstract":"The transition from 5G to 6G will result in an explosion of Internet of Things (IoT) devices that provide pervasive and constant connection across all spheres of human activities. In this regard, non-terrestrial networks (NTNs) will play a crucial role in supporting and supplementing terrestrial systems in order to cope with such a vast number of IoT devices and to fulfill the massive capacity needs of the most sophisticated of them. This study investigates the implication of several multiple access techniques for 6G enabled NTN-assisted IoT technologies. First, general architecture of NTN, NTN-assisted IoT technologies, and key features and challenges of NTNs are presented. Then, different types of multiple access schemes are discussed and compared in the context of NTN-assisted IoT systems. Simulation results are presented and important performance parameters such as energy efficiency and spectrum efficiency are examined for the discussed multiple access schemes. Furthermore, challenges and future research directions are discussed.","PeriodicalId":235472,"journal":{"name":"IEEE Internet of Things Magazine","volume":"77 3","pages":"48-54"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139458314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Eliyan, S. N. K. Marwat, Junaid Qadir, Ala I. Al-Fuqaha
{"title":"Informed Consent in IoT Environments: Challenges and a Futuristic Incentives-Based Model","authors":"A. Eliyan, S. N. K. Marwat, Junaid Qadir, Ala I. Al-Fuqaha","doi":"10.1109/IOTM.001.2300060","DOIUrl":"https://doi.org/10.1109/IOTM.001.2300060","url":null,"abstract":"The ubiquitous deployment of IoT devices has enabled the collection of large amounts of data, which can be used to infer intimate information about user behavior and preferences. However, this potential for data collection raises concerns about user privacy. Obtaining informed consent from users can build trust and enable data gathering for socially beneficial purposes, leading to the development of new services and capabilities for research in various fields, including those involving human subjects. However, this promise cannot be realized as long as apprehensions regarding the discretion of confidential data are satisfied among the masses. In an attempt to secure the confidence of users, the notion of informed consent is taken to new echelons in this article. A model for incentivizing the notion of informed consent in the context of IoT is presented in this work, where the aspiration is to persuade users into accepting the disclosure of information in return for tangible as well as intangible incentives. This results in developing a trust-based relationship with users and can prove to be the next step towards revealing the full spectrum of the IoT wonders.","PeriodicalId":235472,"journal":{"name":"IEEE Internet of Things Magazine","volume":"7 7","pages":"112-119"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139455515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cover 4","authors":"","doi":"10.1109/miot.2024.10397593","DOIUrl":"https://doi.org/10.1109/miot.2024.10397593","url":null,"abstract":"","PeriodicalId":235472,"journal":{"name":"IEEE Internet of Things Magazine","volume":"12 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139540691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comsoc Training","authors":"","doi":"10.1109/miot.2024.10397591","DOIUrl":"https://doi.org/10.1109/miot.2024.10397591","url":null,"abstract":"","PeriodicalId":235472,"journal":{"name":"IEEE Internet of Things Magazine","volume":"117 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139453756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nordine Quadar, Mohamed Rahouti, Moussa Ayyash, S. Jagatheesaperumal, Abdellah Chehri
{"title":"IoT-AI/Machine Learning Experimental Testbeds: The Missing Piece","authors":"Nordine Quadar, Mohamed Rahouti, Moussa Ayyash, S. Jagatheesaperumal, Abdellah Chehri","doi":"10.1109/IOTM.001.2300139","DOIUrl":"https://doi.org/10.1109/IOTM.001.2300139","url":null,"abstract":"The Internet of Things (IoT) has emerged as an Internet-based extension and considerably changed our daily life. The integration of artificial intelligence (AI) and machine learning (ML) into IoT networks has the potential to enable automated responses and improved decision-making capabilities. Nonetheless, administering large IoT networks for experimental purposes is essential for addressing the practical and research implications of diverse AI/ML applications. One of the significant challenges researchers face is the scarcity of testbeds that support IoT and AI/ML. Although there are many testbeds for either IoT or AI/ML, few incorporate both technologies. This creates a significant gap in the research community, as there is a strong need for a testbed that can mimic real-world IoT scenarios while also having ML algorithms capabilities. In order to tackle this challenge, we put forth a comprehensive testbed architecture that combines the IoT and AI/ML. This architecture facilitates the simulation of authentic IoT scenarios, empowering researchers to leverage the ML capability to develop and enhance novel algorithms and applications.","PeriodicalId":235472,"journal":{"name":"IEEE Internet of Things Magazine","volume":"87 6","pages":"136-143"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139454519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Saad, M. Tariq, Muhammad Toaha Raza Khan, Dongkyun Kim
{"title":"Non-Terrestrial Networks: An Overview of 3GPP Release 17 & 18","authors":"M. Saad, M. Tariq, Muhammad Toaha Raza Khan, Dongkyun Kim","doi":"10.1109/IOTM.001.2300154","DOIUrl":"https://doi.org/10.1109/IOTM.001.2300154","url":null,"abstract":"This article provides an overview of technological advancements in Non-Terrestrial Networks (NTN) from the perspective of the 3rd Generation Partnership Project (3GPP). With the introduction of 3GPP Release 17 & 18, there has been a significant emphasis on integrating satellite access networks into terrestrial networks. This integration necessitates a holistic design approach that spans multiple areas, including the Radio Access Network (RAN) to services and system aspects to core, and terminals. The article provides insights and implications of incorporating satellite access networks as a new 3GPP RAN and as a backhaul solution. We explore the impact of this integration on network architecture and performance, considering factors such as coverage, capacity, and latency. The article also highlights the key issues in 3GPP Release 18 and outlines the prospective potential solutions in the context of NTN to support 5G and beyond integrated architecture. Additionally, the article discusses the enhancements made in 3GPP Release 18 to support 5G and beyond in the context of Uncrewed Aerial Vehicles (UAVs).","PeriodicalId":235472,"journal":{"name":"IEEE Internet of Things Magazine","volume":"21 19","pages":"20-26"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139457241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}