A Vision of the Internet of Things: A Review of Critical Challenges


  • Zahra Valadkhani Technical and Vocational University(TVU), Tehran, Iran
  • Farhad Lotfi Islamic Azad University, Tehran, Iran
  • Branka Rodić College of Health Sciences, Belgrade, Serbia




The Internet of Things, Challenges


Today, Information Communication Technology has brought many benefits to have a better life. Meanwhile, the concept of the Internet of Things (IoT), which has transformed the traditional lifestyle into a modern lifestyle and is growing rapidly, is of great importance. This research deals with the critical challenges of IoT. Although not much time has passed since the advent of the concept of the IoT, today the Internet of Things has faced a great deal of complexity in the industry, which requires in-depth studies to realise its potential and challenges. This study introduces and examines IoT challenges including security and privacy, scalability, interoperability, mobility, protocol & standardisation, and energy consumption. In this study, the relationship between these challenges has been clearly defined. Finally, based on the research, some main challenges or sub-challenges considered for these challenges.


M. I. Pramanik, R. Y. Lau, H. Demirkan, and M. A. K. J. E. S. w. A. Azad, "Smart health: Big data enabled health paradigm within smart cities," vol. 87, pp. 370-383, 2017.

J. Gَmez, J. F. Huete, O. Hoyos, L. Perez, and D. J. P. C. S. Grigori, "Interaction system based on internet of things as support for education," vol. 21, pp. 132-139, 2013.

Z. Jun, D. Simplot-Ryl, C. Bisdikian, and H. J. I. C. M. Mouftah, "The internet of things," vol. 49, no. 11, pp. 30-31, 2011.

D. Miorandi, S. Sicari, F. De Pellegrini, and I. J. A. h. n. Chlamtac, "Internet of things: Vision, applications and research challenges," vol. 10, no. 7, pp. 1497-1516, 2012.

J. J. P. Tsitsiklis, Massachusetts Institute of Technology, "Problems in decentralized decision making and computation (1984)."

A. U. J. W. H. O. R. Truth, "No health without a workforce," pp. 1-104, 2013.

B. Rodić-Trmčić, A. Labus, Z. Bogdanović, D. D. Babić, A. J. M. J. o. S. B. Dacić-Pilčević, and M. S. i. E. Economies, "Usability of m-Health services: a health professional’s perspective," vol. 21, no. 80, pp. 45-54, 2017.

B. Rodić‐Trmčić, A. Labus, D. Barać, S. Popović, and B. J. C. A. i. E. E. Radenković, "Designing a course for smart healthcare engineering education," vol. 26, no. 3, pp. 484-499, 2018.

https://www.smartcity.press/smart-healthcare-for-smart-cities, (August 5, 2017).

R. Pirmagomedov and Y. J. I. o. T. Koucheryavy, "IoT technologies for Augmented Human: A survey," p. 100120, 2019.

F.-Y. Lo, N. J. T. F. Campos, and S. Change, "Blending Internet-of-Things (IoT) solutions into relationship marketing strategies," vol. 137, pp. 10-18, 2018.

C. A. Tokognon, B. Gao, G. Y. Tian, and Y. J. I. I. o. T. J. Yan, "Structural health monitoring framework based on Internet of Things: A survey," vol. 4, no. 3, pp. 619-635, 2017.

G. Reggio, M. Leotta, M. Cerioli, R. Spalazzese, and F. J. I. o. T. Alkhabbas, "What Are IoT Systems for Real? An Experts’ Survey on Software Engineering Aspects," p. 100313, 2020.

M. Otoom, N. Otoum, M. A. Alzubaidi, Y. Etoom, R. J. B. S. P. Banihani, and Control, "An IoT-based framework for early identification and monitoring of COVID-19 cases," vol. 62, p. 102149, 2020.

F. Lotfi and A. Soleimani, "A Model to Stabilize E-Loyalty to Healthcare Services in the Context of the Internet of Things by using Fuzzy AHP Method," in 2020 International Conference on Computation, Automation and Knowledge Management (ICCAKM), 2020, pp. 8-13: IEEE.

V. R. Kebande, P. P. Mudau, R. A. Ikuesan, H. Venter, and K.-K. R. J. F. S. I. R. Choo, "Holistic digital forensic readiness framework for IoT-enabled organizations," vol. 2, p. 100117, 2020.

F. Cauteruccio et al., "A framework for anomaly detection and classification in Multiple IoT scenarios," vol. 114, pp. 322-335, 2020.

M. Nobakht, C. Russell, W. Hu, and A. Seneviratne, "IoT-NetSec: policy-based IoT network security using OpenFlow," in 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2019, pp. 955-960: IEEE.

A. Triantafyllou, P. Sarigiannidis, T. D. J. W. c. Lagkas, and m. computing, "Network protocols, schemes, and mechanisms for internet of things (iot): Features, open challenges, and trends," vol. 2018, 2018.

H. Ning, H. Liu, and L. T. J. C. Yang, "Cyberentity security in the internet of things," vol. 46, no. 4, pp. 46-53, 2013.

S. Kumar, P. Tiwari, and M. J. J. o. B. D. Zymbler, "Internet of Things is a revolutionary approach for future technology enhancement: a review," vol. 6, no. 1, p. 111, 2019.

M. Noura, M. Atiquzzaman, M. J. M. N. Gaedke, and Applications, "Interoperability in internet of things: Taxonomies and open challenges," vol. 24, no. 3, pp. 796-809, 2019.

R. Mijumbi et al., "Network function virtualization: State-of-the-art and research challenges," vol. 18, no. 1, pp. 236-262, 2015.

S. Chen, H. Xu, D. Liu, B. Hu, and H. J. I. I. o. T. j. Wang, "A vision of IoT: Applications, challenges, and opportunities with china perspective," vol. 1, no. 4, pp. 349-359, 2014.

https://smarttampere.fi/en/network/smart-mobility/, 2020.

S. Sicari, A. Rizzardi, L. A. Grieco, and A. J. C. n. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead," vol. 76, pp. 146-164, 2015.

L. Bittencourt et al., "The internet of things, fog and cloud continuum: Integration and challenges," vol. 3, pp. 134-155, 2018.

M. Thibaud, H. Chi, W. Zhou, and S. J. D. S. S. Piramuthu, "Internet of Things (IoT) in high-risk Environment, Health and Safety (EHS) industries: A comprehensive review," vol. 108, pp. 79-95, 2018.

A. Gupta, R. Christie, and P. J. I. J. C. I. R. Manjula, "Scalability in internet of things: features, techniques and research challenges," vol. 13, no. 7, pp. 1617-1627, 2017.

S. A. Al-Qaseemi, H. A. Almulhim, M. F. Almulhim, and S. R. Chaudhry, "IoT architecture challenges and issues: Lack of standardization," in 2016 Future Technologies Conference (FTC), 2016, pp. 731-738: IEEE.


R. van Kranenburg and A. Bassi, "IoT Challenges," Communications in Mobile Computing, vol. 1, no. 1, p. 9, 2012/11/28 2012.

F. Lotfi, K. Fatehi, and N. Badie, "An Analysis of Key Factors to Mobile Health Adoption using Fuzzy AHP."

M. U. Farooq, M. Waseem, S. Mazhar, A. Khairi, and T. J. I. j. o. c. a. Kamal, "A review on internet of things (IoT)," vol. 113, no. 1, pp. 1-7, 2015.

Q. Wen, X. Dong, and R. Zhang, "Application of dynamic variable cipher security certificate in internet of things," in 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, 2012, vol. 3, pp. 1062-1066: IEEE.

Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. J. W. N. Qiu, "Security of the Internet of Things: perspectives and challenges," vol. 20, no. 8, pp. 2481-2501, 2014.

R. Roman, J. Zhou, and J. J. C. N. Lopez, "On the features and challenges of security and privacy in distributed internet of things," vol. 57, no. 10, pp. 2266-2279, 2013.

A. J. Jara, L. Ladid, and A. F. J. J. W. M. N. U. C. D. A. Gَmez-Skarmeta, "The Internet of Everything through IPv6: An Analysis of Challenges, Solutions and Opportunities," vol. 4, no. 3, pp. 97-118, 2013.

J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. J. I. I. o. T. J. Zhao, "A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications," vol. 4, no. 5, pp. 1125-1142, 2017.

T. Savolainen, J. Soininen, and B. J. I. S. J. Silverajan, "IPv6 addressing strategies for IoT," vol. 13, no. 10, pp. 3511-3519, 2013.

M. Elkhodr, S. Shahrestani, and H. J. a. p. a. Cheung, "The internet of things: new interoperability, management and security challenges," 2016.

Q. Emad-ul-Haq et al., "Challenges and solutions for Internet of Things Driven by IPv6," vol. 9, no. 12, 2015.

T. Vresk and I. Čavrak, "Architecture of an interoperable IoT platform based on microservices," in 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2016, pp. 1196-1201: IEEE.

S. Gusmeroli, S. Piccione, and D. Rotondi, "A capability-based security approach to manage access control in the Internet of Things," Mathematical and Computer Modelling, vol. 58, no. 5, pp. 1189-1205, 2013/09/01/ 2013.

N. Djedjig, D. Tandjaoui, F. Medjek, and I. Romdhani, "Trust-aware and cooperative routing protocol for IoT security," Journal of Information Security and Applications, vol. 52, p. 102467, 2020/06/01/ 2020.

A. Tewari and B. B. Gupta, "Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework," Future Generation Computer Systems, vol. 108, pp. 909-920, 2020/07/01/ 2020.

Y. Xie and D. Wang, "An item-level access control framework for inter-system security in the internet of things," in Applied mechanics and materials, 2014, vol. 548, pp. 1430-1432: Trans Tech Publ.

R. Neisse, G. Steri, and G. Baldini, "Enforcement of security policy rules for the internet of things," in 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2014, pp. 165-172: IEEE.

M. Patton, E. Gross, R. Chinn, S. Forbis, L. Walker, and H. Chen, "Uninvited connections: a study of vulnerable devices on the internet of things (IoT)," in 2014 IEEE Joint Intelligence and Security Informatics Conference, 2014, pp. 232-235: IEEE.

R. H. J. C. l. Weber and s. review, "Internet of Things–New security and privacy challenges," vol. 26, no. 1, pp. 23-30, 2010.

P. Mahalle, S. Babar, N. R. Prasad, and R. Prasad, "Identity management framework towards internet of things (IoT): Roadmap and key challenges," in International Conference on Network Security and Applications, 2010, pp. 430-439: Springer.

H. Yi and Z. J. F. G. C. S. Nie, "Side-channel security analysis of UOV signature for cloud-based Internet of Things," vol. 86, pp. 704-708, 2018.

A. R. Sfar, Z. Chtourou, and Y. Challal, "A systemic and cognitive vision for IoT security: A case study of military live simulation and security challenges," in 2017 International Conference on Smart, Monitored and Controlled Cities (SM2C), 2017, pp. 101-105: IEEE.

K. Gatsis and G. J. Pappas, "Wireless control for the iot: Power, spectrum, and security challenges," in 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI), 2017, pp. 341-342: IEEE.

S. H. Shah and I. Yaqoob, "A survey: Internet of Things (IOT) technologies, applications and challenges," in 2016 IEEE Smart Energy Grid Engineering (SEGE), 2016, pp. 381-385: IEEE.

L. Farhan, S. T. Shukur, A. E. Alissa, M. Alrweg, U. Raza, and R. Kharel, "A survey on the challenges and opportunities of the Internet of Things (IoT)," in 2017 Eleventh International Conference on Sensing Technology (ICST), 2017, pp. 1-5: IEEE.

A. H. Ngu, M. Gutierrez, V. Metsis, S. Nepal, and Q. Z. J. I. I. o. T. J. Sheng, "IoT middleware: A survey on issues and enabling technologies," vol. 4, no. 1, pp. 1-20, 2016.

A. Mosenia and N. K. J. I. T. o. E. T. i. C. Jha, "A comprehensive study of security of internet-of-things," vol. 5, no. 4, pp. 586-602, 2016.

Y. Yang, L. Wu, G. Yin, L. Li, and H. J. I. I. o. T. J. Zhao, "A survey on security and privacy issues in Internet-of-Things," vol. 4, no. 5, pp. 1250-1258, 2017.

P. I. R. Grammatikis, P. G. Sarigiannidis, and I. D. J. I. o. T. Moscholios, "Securing the Internet of Things: Challenges, threats and solutions," vol. 5, pp. 41-70, 2019.

S. A. Kumar, T. Vealey, and H. Srivastava, "Security in internet of things: Challenges, solutions and future directions," in 2016 49th Hawaii International Conference on System Sciences (HICSS), 2016, pp. 5772-5781: IEEE.

W. Shi, J. Cao, Q. Zhang, Y. Li, and L. J. I. i. o. t. j. Xu, "Edge computing: Vision and challenges," vol. 3, no. 5, pp. 637-646, 2016.

X. Liu, Y. Yang, K.-K. R. Choo, H. J. W. C. Wang, and M. Computing, "Security and privacy challenges for Internet-of-Things and fog computing," vol. 2018, 2018.

Z.-K. Zhang, M. C. Y. Cho, C.-W. Wang, C.-W. Hsu, C.-K. Chen, and S. Shieh, "IoT security: ongoing challenges and research opportunities," in 2014 IEEE 7th international conference on service-oriented computing and applications, 2014, pp. 230-234: IEEE.

A. K. Mohammadzadeh, S. Ghafoori, A. Mohammadian, R. Mohammadkazemi, B. Mahbanooei, and R. J. T. i. S. Ghasemi, "A Fuzzy Analytic Network Process (FANP) approach for prioritizing internet of things challenges in Iran," vol. 53, pp. 124-134, 2018.

M. B. Mollah, M. A. K. Azad, A. J. J. o. N. Vasilakos, and C. Applications, "Security and privacy challenges in mobile cloud computing: Survey and way ahead," vol. 84, pp. 38-54, 2017.

F. A. Alaba, M. Othman, I. A. T. Hashem, F. J. J. o. N. Alotaibi, and C. Applications, "Internet of Things security: A survey," vol. 88, pp. 10-28, 2017.

P. Schaumont, "Security in the Internet of Things: A challenge of scale," in Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, 2017, pp. 674-679: IEEE.

I. Andrea, C. Chrysostomou, and G. Hadjichristofi, "Internet of Things: Security vulnerabilities and challenges," in 2015 IEEE Symposium on Computers and Communication (ISCC), 2015, pp. 180-187: IEEE.

A. Ouaddah, H. Mousannif, A. Abou Elkalam, and A. A. J. C. N. Ouahman, "Access control in the Internet of Things: Big challenges and new opportunities," vol. 112, pp. 237-262, 2017.

M. Sain, Y. J. Kang, and H. J. Lee, "Survey on security in Internet of Things: State of the art and challenges," in 2017 19th International conference on advanced communication technology (ICACT), 2017, pp. 699-704: IEEE.

R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, "Internet of things (IoT) security: Current status, challenges and prospective measures," in 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), 2015, pp. 336-341: IEEE.

X. Xiaohui, "Study on security problems and key technologies of the internet of things," in 2013 International conference on computational and information sciences, 2013, pp. 407-410: IEEE.

L. M. Dang, M. Piran, D. Han, K. Min, and H. J. E. Moon, "A survey on internet of things and cloud computing for healthcare," vol. 8, no. 7, p. 768, 2019.

A. R. Sfar, E. Natalizio, Y. Challal, Z. J. D. C. Chtourou, and Networks, "A roadmap for security challenges in the Internet of Things," vol. 4, no. 2, pp. 118-137, 2018.

S. Sciancalepore, A. Capossele, G. Piro, G. Boggia, and G. Bianchi, "Key management protocol with implicit certificates for IoT systems," in Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, 2015, pp. 37-42.

A. K. Das, S. Zeadally, and D. J. F. G. C. S. He, "Taxonomy and analysis of security protocols for Internet of Things," vol. 89, pp. 110-125, 2018.

B. Di Martino, M. Rak, M. Ficco, A. Esposito, S. A. Maisto, and S. J. I. o. T. Nacchia, "Internet of things reference architectures, security and interoperability: A survey," vol. 1, pp. 99-112, 2018.

V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. J. I. A. Sikdar, "A survey on IoT security: application areas, security threats, and solution architectures," vol. 7, pp. 82721-82743, 2019.

R. K. Kodali, V. Jain, S. Bose, and L. Boppana, "IoT based smart security and home automation system," in 2016 international conference on computing, communication and automation (ICCCA), 2016, pp. 1286-1289: IEEE.

X. C. Yin, Z. G. Liu, L. Nkenyereye, and B. J. S. Ndibanje, "Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach," vol. 19, no. 22, p. 4952, 2019.

B. Xu et al., "A security design for the detecting of buffer overflow attacks in iot device," vol. 6, pp. 72862-72869, 2018.

I. Kotenko, I. Saenko, and A. J. I. A. Branitskiy, "Framework for mobile Internet of Things security monitoring based on big data processing and machine learning," vol. 6, pp. 72714-72723, 2018.

E. Hossain, I. Khan, F. Un-Noor, S. S. Sikander, and M. S. H. J. I. A. Sunny, "Application of big data and machine learning in smart grid, and associated security concerns: A review," vol. 7, pp. 13960-13988, 2019.

T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar, and K. J. W. P. C. Wehrle, "Security Challenges in the IP-based Internet of Things," vol. 61, no. 3, pp. 527-542, 2011.

P. Ray, "A survey on internet of things architectures. J King of Saud Univ Comput Inf Sci," ed: Elsevier, 2018.

N. Chaabouni, M. Mosbah, A. Zemmari, C. Sauvignac, P. J. I. C. S. Faruki, and Tutorials, "Network intrusion detection for IoT security based on learning techniques," vol. 21, no. 3, pp. 2671-2701, 2019.

E. Anthi, L. Williams, M. Słowińska, G. Theodorakopoulos, and P. J. I. I. o. T. J. Burnap, "A supervised intrusion detection system for smart home IoT devices," vol. 6, no. 5, pp. 9042-9053, 2019.

N. Wang, T. Jiang, S. Lv, and L. J. I. C. L. Xiao, "Physical-layer authentication based on extreme learning machine," vol. 21, no. 7, pp. 1557-1560, 2017.

L. Wei, W. Luo, J. Weng, Y. Zhong, X. Zhang, and Z. J. I. A. Yan, "Machine learning-based malicious application detection of android," vol. 5, pp. 25591-25601, 2017.

D. Mocrii, Y. Chen, and P. J. I. o. T. Musilek, "IoT-based smart homes: A review of system architecture, software, communications, privacy and security," vol. 1, pp. 81-98, 2018.

H. Suo, J. Wan, C. Zou, and J. Liu, "Security in the internet of things: a review," in 2012 international conference on computer science and electronics engineering, 2012, vol. 3, pp. 648-651: IEEE.

H. Sundmaeker, P. Guillemin, P. Friess, and S. J. C. o. E. R. P. o. t. I. o. T. Woelfflé, European Commision, "Vision and challenges for realising the Internet of Things," vol. 3, no. 3, pp. 34-36, 2010.

A. A. G.-E. Ahmed, "Benefits and Challenges of Internet of Things for Telecommunication Networks," in Telecommunication Networks-Trends and Developments: IntechOpen, 2019.

T. Salman and R. J. a. p. a. Jain, "A survey of protocols and standards for internet of things," 2019.

H. Lee, "The internet of things and assistive technologies for people with disabilities: Applications, trends, and issues," in Internet of things and advanced application in healthcare: IGI Global, 2017, pp. 32-65.

H. Madsen, B. Burtschy, G. Albeanu, and F. Popentiu-Vladicescu, "Reliability in the utility computing era: Towards reliable fog computing," in 2013 20th International Conference on Systems, Signals and Image Processing (IWSSIP), 2013, pp. 43-46: IEEE.

M. Chiang and T. J. I. I. o. T. J. Zhang, "Fog and IoT: An overview of research opportunities," vol. 3, no. 6, pp. 854-864, 2016.

S. S. Gill et al., "Transformative effects of IoT, Blockchain and Artificial Intelligence on cloud computing: Evolution, vision, trends and open challenges," vol. 8, p. 100118, 2019.

D. S. Kim, T.-H. Shin, B. Lee, and J. S. Park, "Access control and authorization for security of RFID multi-domain using SAML and XACML," in International Conference on Computational and Information Science, 2006, pp. 887-893: Springer.

A. Dehghantanha and K. Franke, "Privacy-respecting digital investigation," in 2014 Twelfth Annual International Conference on Privacy, Security and Trust, 2014, pp. 129-138: IEEE.

W. Wei, A. T. Yang, W. Shi, and K. Sha, "Security in internet of things: Opportunities and challenges," in 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI), 2016, pp. 512-518: IEEE.

A. Al-Fuqaha, A. Khreishah, M. Guizani, A. Rayes, and M. J. I. C. M. Mohammadi, "Toward better horizontal integration among IoT services," vol. 53, no. 9, pp. 72-79, 2015.

D. Chasaki, C. J. I. J. o. S.-B. Mansour, and S. Computing, "Security challenges in the internet of things," vol. 5, no. 3, pp. 141-149, 2015.

J. M. McGinthy, L. J. Wong, and A. J. J. I. I. o. T. J. Michaels, "Groundwork for neural network-based specific emitter identification authentication for IoT," vol. 6, no. 4, pp. 6429-6440, 2019.

N. M. Kumar and P. K. J. P. C. S. Mallick, "Blockchain technology for security issues and challenges in IoT," vol. 132, pp. 1815-1823, 2018.

K. M. Sadique, R. Rahmani, and P. J. P. C. S. Johannesson, "Towards security on internet of things: applications and challenges in technology," vol. 141, pp. 199-206, 2018.

K. Zhu, Z. Chen, W. Yan, and L. J. I. I. o. T. J. Zhang, "Security attacks in named data networking of things and a blockchain solution," vol. 6, no. 3, pp. 4733-4741, 2018.

G. Gan, Z. Lu, and J. Jiang, "Internet of things security analysis," in 2011 international conference on internet technology and applications, 2011, pp. 1-4: IEEE.

K. Zhao and L. Ge, "A survey on the internet of things security," in 2013 Ninth international conference on computational intelligence and security, 2013, pp. 663-667: IEEE.

B. K. Mohanta, U. Satapathy, S. S. Panda, and D. Jena, "A Novel Approach to Solve Security and Privacy Issues for IoT Applications Using Blockchain," in 2019 International Conference on Information Technology (ICIT), 2019, pp. 394-399: IEEE.

B. K. Mohanta, D. Jena, U. Satapathy, and S. J. I. o. T. Patnaik, "Survey on IoT Security: Challenges and Solution using Machine Learning, Artificial Intelligence and Blockchain Technology," p. 100227, 2020.

A. Dorri, C. Roulin, R. Jurdak, and S. S. Kanhere, "On the activity privacy of blockchain for IoT," in 2019 IEEE 44th Conference on Local Computer Networks (LCN), 2019, pp. 258-261: IEEE.

J. Huang, L. Kong, G. Chen, M.-Y. Wu, X. Liu, and P. J. I. T. o. I. I. Zeng, "Towards secure industrial IoT: Blockchain system with credit-based consensus mechanism," vol. 15, no. 6, pp. 3680-3689, 2019.

A. Čolaković and M. J. C. N. Hadžialić, "Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues," vol. 144, pp. 17-39, 2018.

E. J. J. o. C. Leloglu and Communications, "A review of security concerns in Internet of Things," vol. 5, no. 1, pp. 121-136, 2016.

J. Granjal, E. Monteiro, J. S. J. I. C. S. Silva, and Tutorials, "Security for the internet of things: a survey of existing protocols and open research issues," vol. 17, no. 3, pp. 1294-1312, 2015.

M. B. Line, I. A. Tّndel, and M. G. Jaatun, "Cyber security challenges in Smart Grids," in 2011 2nd IEEE PES international conference and exhibition on innovative smart grid technologies, 2011, pp. 1-8: IEEE.

B. Afzal, M. Umair, G. A. Shah, and E. J. F. G. C. S. Ahmed, "Enabling IoT platforms for social IoT applications: vision, feature mapping, and challenges," vol. 92, pp. 718-731, 2019.

K. J. I. J. o. E. S. Patel and Computing, "K. & Patel, S., M. 2016. Internet of Things-IOT: Definition, Characteristics, Architecture, Enabling Technologies, Application & Future Challenges," vol. 6, no. 5.

I. Lee and K. J. B. H. Lee, "The Internet of Things (IoT): Applications, investments, and challenges for enterprises," vol. 58, no. 4, pp. 431-440, 2015.

H. HaddadPajouh, A. Dehghantanha, R. M. Parizi, M. Aledhari, and H. J. I. o. T. Karimipour, "A survey on internet of things security: Requirements, challenges, and solutions," p. 100129, 2019.

E. G. Petrakis, S. Sotiriadis, T. Soultanopoulos, P. T. Renta, R. Buyya, and N. J. I. o. T. Bessis, "Internet of Things as a Service (iTaaS): Challenges and Solutions for Management of Sensor Data on the Cloud and the Fog," vol. 3, pp. 156-174, 2018.

M. Tavana, V. Hajipour, and S. J. I. o. T. Oveisi, "IoT-based Enterprise Resource Planning: Challenges, Open Issues, Applications, Architecture, and Future Research Directions," p. 100262, 2020.

S. Floriano, "Market challenges of incumbent telecom companies entering Internet-of-Things (IoT) ecosystems and organizational implications: A case study," ed, 2018.

C. Esposito, A. Castiglione, C.-A. Tudorica, and F. J. I. C. M. Pop, "Security and privacy for cloud-based data management in the health network service chain: a microservice approach," vol. 55, no. 9, pp. 102-108, 2017.

S. Leminen, M. Rajahonka, R. Wendelin, and M. Westerlund, "Industrial internet of things business models in the machine-to-machine context," Industrial Marketing Management, vol. 84, pp. 298-311, 2020/01/01/ 2020.

M. Palmaccio, G. Dicuonzo, and Z. S. Belyaeva, "The internet of things and corporate business models: A systematic literature review," Journal of Business Research, 2020/10/10/ 2020.

A. Sestino, M. I. Prete, L. Piper, and G. Guido, "Internet of Things and Big Data as enablers for business digitalization strategies," Technovation, vol. 98, p. 102173, 2020/12/01/ 2020.

D. J. Langley, J. van Doorn, I. C. L. Ng, S. Stieglitz, A. Lazovik, and A. Boonstra, "The Internet of Everything: Smart things and their impact on business models," Journal of Business Research, vol. 122, pp. 853-863, 2021/01/01/ 2021.

G. Reggio, M. Leotta, M. Cerioli, R. Spalazzese, and F. Alkhabbas, "What are IoT systems for real? An experts’ survey on software engineering aspects," Internet of Things, vol. 12, p. 100313, 2020/12/01/ 2020.

W. Niu, X. Zhang, X. Du, L. Zhao, R. Cao, and M. Guizani, "A deep learning based static taint analysis approach for IoT software vulnerability location," Measurement, vol. 152, p. 107139, 2020/02/01/ 2020.

S. Traboulsi and S. Knauth, "Towards implementation of an IoT analysis system for buildings environmental data and workplace well-being with an IoT open software," Procedia Computer Science, vol. 170, pp. 341-346, 2020/01/01/ 2020.

M. Suresh and M. Neema, "Hardware Implementation of Blowfish Algorithm for the Secure Data Transmission in Internet of Things," Procedia Technology, vol. 25, pp. 248-255, 2016/01/01/ 2016.

A. Burger, C. Cichiwskyj, S. Schmeiكer, and G. Schiele, "The Elastic Internet of Things - A platform for self-integrating and self-adaptive IoT-systems with support for embedded adaptive hardware," Future Generation Computer Systems, vol. 113, pp. 607-619, 2020/12/01/ 2020.

T. Jung, N. Jazdi, S. Krauك, C. Kِllner, and M. Weyrich, "Hardware-in-the-Loop Simulation for a Dynamic Co-Simulation of Internet-of-Things-Components," Procedia CIRP, vol. 93, pp. 1334-1339, 2020/01/01/ 2020.

Q. Guo and Q. Xu, "nThe Economic Benefits of Agglomeration of The Internet of Things Industry Based on 5G Network and Markov Chain," Microprocessors and Microsystems, p. 103438, 2020/11/09/ 2020.

K. Zhan, "Sports and health big data system based on 5G network and Internet of Things system," Microprocessors and Microsystems, p. 103363, 2020/11/01/ 2020.

K. Cheng, "Smart Rural Financial Innovation based on 5G Network and Internet of Things," Microprocessors and Microsystems, p. 103500, 2020/11/18/ 2020.

M. Wang and Q. Yang, "Green building design based on 5G network and Internet of Things system," Microprocessors and Microsystems, p. 103386, 2020/11/06/ 2020.

H. Bai and Q. Zhang, "English smart classroom teaching system based on 5 network and internet of things," Microprocessors and Microsystems, p. 103421, 2020/11/08/ 2020.

A. Khanna and S. Kaur, "Internet of Things (IoT), Applications and Challenges: A Comprehensive Review."

H. Vahdat-Nejad, Z. Mazhar-Farimani, and A. Tavakolifar, "Social Internet of Things and New Generation Computing—A Survey," in Toward Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications: Springer, 2020, pp. 139-149.

R. Van Kranenburg and A. J. C. i. M. C. Bassi, "IoT challenges," vol. 1, no. 1, p. 9, 2012.

D. Xue, Y. Cheng, and P. Gope, "2 - An efficient ambient intelligent–assisted people searching for Internet of Things–based health-care system," in Assistive Technology for the Elderly, N. K. Suryadevara and S. C. Mukhopadhyay, Eds.: Academic Press, 2020, pp. 45-58.

J. Hua and K. Sakurai, "Botnet command and control based on Short Message Service and human mobility," Computer Networks, vol. 57, no. 2, pp. 579-597, 2013/02/04/ 2013.

M. Bouaziz, A. Rachedi, and A. Belghith, "EKF-MRPL: Advanced mobility support routing protocol for internet of mobile things: Movement prediction approach," Future Generation Computer Systems, vol. 93, pp. 822-832, 2019/04/01/ 2019.

H. Yuan, Y. Qian, R. Yang, and M. Ren, "Human mobility discovering and movement intention detection with GPS trajectories," Decision Support Systems, vol. 63, pp. 39-51, 2014/07/01/ 2014.

A. Roy and N. Sarma, "A synchronous duty-cycled reservation based MAC protocol for underwater wireless sensor networks," Digital Communications and Networks, 2020/09/28/ 2020.

W. Kubick, "Chapter 21 - Re-Engineering Clinical Research with Data Standards," in Re-Engineering Clinical Trials, P. Schüler and B. Buckley, Eds. Boston: Academic Press, 2015, pp. 227-243.

P. Choudhary, L. Bhargava, V. Singh, M. Choudhary, and A. k. Suhag, "A survey – Energy harvesting sources and techniques for internet of things devices," Materials Today: Proceedings, vol. 30, pp. 52-56, 2020/01/01/ 2020.

S. Zeadally, F. K. Shaikh, A. Talpur, and Q. Z. Sheng, "Design architectures for energy harvesting in the Internet of Things," Renewable and Sustainable Energy Reviews, vol. 128, p. 109901, 2020/08/01/ 2020.

T. Tan et al., "Renewable energy harvesting and absorbing via multi-scale metamaterial systems for Internet of things," Applied Energy, vol. 254, p. 113717, 2019/11/15/ 2019.

S. Sadowski and P. Spachos, "Wireless technologies for smart agricultural monitoring using internet of things devices with energy harvesting capabilities," Computers and Electronics in Agriculture, vol. 172, p. 105338, 2020/05/01/ 2020.

A. Perles et al., "An energy-efficient internet of things (IoT) architecture for preventive conservation of cultural heritage," Future Generation Computer Systems, vol. 81, pp. 566-581, 2018/04/01/ 2018.

H. N. Rafsanjani and A. Ghahramani, "Towards utilizing internet of things (IoT) devices for understanding individual occupants' energy usage of personal and shared appliances in office buildings," Journal of Building Engineering, vol. 27, p. 100948, 2020/01/01/ 2020.

P. K. Khatua, V. K. Ramachandaramurthy, P. Kasinathan, J. Y. Yong, J. Pasupuleti, and A. Rajagopalan, "Application and assessment of internet of things toward the sustainability of energy systems: Challenges and issues," Sustainable Cities and Society, vol. 53, p. 101957, 2020/02/01/ 2020.

V. Chellappan and K. Sivalingam, "Security and privacy in the Internet of Things," in Internet of Things: Elsevier, 2016, pp. 183-200.




How to Cite

Valadkhani, Z., Lotfi, F., & Rodić, B. (2021). A Vision of the Internet of Things: A Review of Critical Challenges. International Journal of Computer and Information Technology(2279-0764), 10(4). https://doi.org/10.24203/ijcit.v10i4.121