IoT-enabled Sensor Networks: Architecture, Methodologies, Security, and Futuristic Applications -  - E-Book

IoT-enabled Sensor Networks: Architecture, Methodologies, Security, and Futuristic Applications E-Book

0,0
36,31 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

This volume explores IoT architectures, their configuration, and operability in wireless sensor networks.

The topics are spread across nine structured chapters covering fundamental and applied knowledge about wireless sensor networks using IoT devices. The book starts with an introduction to the subject, giving readers a quick overview of IoT enabled networks and bio-inspired approaches towards network design. This is followed by chapters explaining optimized routing protocols for accident detection, efficiency and performance analysis. The book concludes with four chapters dedicated to security applications of wireless networks, for homes, urban areas and businesses. Overall, the volume gives a balance of theoretical and practical information for readers.

The book is intended as a resource for graduate and postgraduate students for understanding network design for home and embedded applications, specifically using single board computing devices. It also serves as a guide for networking courses and assessments.

Readership
Graduate and post graduate students and faculty members in the field of networking and IoT.

Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:

EPUB
MOBI

Seitenzahl: 222

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents
BENTHAM SCIENCE PUBLISHERS LTD.
End User License Agreement (for non-institutional, personal use)
Usage Rules:
Disclaimer:
Limitation of Liability:
General:
PREFACE
List of Contributors
Internet-of-Things-Enabled Sensor Networks: Vision Challenges and Smart Applications
Abstract
1. Introduction
1.1. Major Issues Resolved by Internet of Things
2. Related Work
2.1. Smart City's Architecture
3. Intelligent or Smart City Platform
3.1. Internet-of-Things Application Requirements
3.2. Internet-of-Things-Integrated Smart City WSN Applications and Roles
3.2.1. Internet-of-Things in Healthcare
3.2.1.1. Challenges for Internet-of-Things in Healthcare Industry
3.2.2. Internet-of-Things in Industries
3.2.2.1. Challenges for Internet-of-Things in Industry
3.2.3. Internet of Things in Agriculture
3.2.3.1. Challenges for Internet of Things in Agriculture
3.2.4. Homes or Buildings Integrated with Internet-of-Things
3.2.4.1. Challenges for Internet-of-Things in Home and Building Structure
3.2.5. Intelligent Transport System
3.2.5.1. Challenges for Internet-of-Things in Smart Transport Systems
3.2.6. Efficient Energy Management Using Internet-of-Things
3.2.6.1. Challenges for Internet of Things in Effective Energy Management
3.2.7. Smart or Intelligent Water Management
3.2.7.1. Challenges for Internet-of-Things in Water Management
3.2.8. Monitoring of the Environment with Internet-of-Things
3.2.8.1. Challenges for Internet-of-Things in Environmental Monitoring
Conclusion
References
A Perspective View of Bio-Inspire Approaches Employing in Wireless Sensor Networks
Abstract
1. Introduction
2. Literature Survey
3. Taxonomy of Swarm Intelligence [14]
3.1. Ant Colony Optimization (ACO)
3.2. Fish Swarm Algorithm (FSA)
3.3. Particle Swarm Optimization (PSO)
3.4. Reactive Search Optimization (RSO)
3.5. Other Optimization Algorithms
Conclusion
References
Automatic Accident Detection and Alerting System using IoT
Abstract
1. Introduction
2. Related Work
3. Research Methodology
3.1. Process Flow of the System
4. Results and Discussions
4.1. Demonstration of System
5. Conclusion and Future Work
References
Optimal Election Unequal Clustering Routing Protocol with Improved Tradeoff Function for Wireless Sensor Networks
Abstract
1. Introduction
2. Related Works
3. System Model
4. Optimal Election Clustering Protocol
4.1. Setup Phase
4.2. CH Election Phase
4.3. Data Transmission Phase
5. Heterogeneous Optimal Election Unequal Clustering Routing Protocol
5.2. Cluster Setup Phase
5.2.1. Neighbor Node Information Collection Phase
5.2.2. CH Competition Phase
5.2.3. Cluster Formation
5.3. Data Transmission Phase
6. Simulation Results
Conclusion
References
Analysis and Performance Evaluation of Routing Protocols using Sink Mobility in IoT-enabled Wireless Sensor Networks
Abstract
1. Introduction
2. Related Work
3. System model
4. Proposed Method
5. Experiment Setup and Results Analysis
Conclusion
References
IoT Based Home Security System
Abstract
1. Introduction
2. Related Work
3. Proposed System Architecture
4. System Components
5. System Workflow
6. Face Detection
7. Face Recognition
8. Result and Discussion
Conclusion and Future Work
References
Cyber Security from a Business Perspective
Abstract
1. Introduction
2. Best practices for implementing Business resilience during a data breach
2.1. Practices for Implementing Business Resilience
2.2. Checklist for Implementing Business Resilience during Data Breach
3. Role of Cyber Security in Business Resilience
3.1. Reducing Cyber Risk
Conclusion and Future Work
References
Security and Privacy of Application of Smart Cities
Abstract
1. Introduction
2. Smart Cities Applications
2.1. Smart Government
2.2. Smart Transportation
2.3. Smart Environment
2.4. Smart Utilities
2.5. Smart Services
2.6. Smart Energy
2.7. Smart Building
2.8. Smart Mobility
2.9. Smart Education
2.10. Smart Health-Care
3. Security and Privacy Issues in Applications of Smart Cities
3.1. Botnet Activities in IoT-Based Applications
3.2. Threats of Driverless Cars in Smart Cities
3.3. Privacy Issues of Virtual Reality in Applications
3.4. Threats Posed by AI in Applications
4. Security Requirements of Applications
4.1. Secure Communication
4.2. Secure Booting
4.3. Security Monitoring, Analysis, and Response
4.4. System, Application, and Solution Lifecycle Management
4.5. Updating and Patching
4.6. Authentication, Identification, and Access Control
Conclusion
References
Security Metric for Information Network
Abstract
1. Introduction
2. Related Works
2.1. Gray Area Network
3. System Model
4. Simulation Results
Conclusion
References
Advances in Computing Communications and Informatics
(Volume 6)
IoT-enabled Sensor Networks: Architecture, Methodologies,
Security, and Futuristic Applications
Edited by
Samayveer Singh
Department of Computer Science and Engineering
Dr. B. R. Ambedkar National Institute of Technology
Jalandhar, Punjab, India
Manju
Department of Computer Science and Information Technology
Jaypee Institute of Information Technology
Noida, Uttar Pradesh, India
Aruna Malik
Department of Computer Science and Engineering
Dr. B. R. Ambedkar National Institute of Technology
Jalandhar, Punjab, India
&
Pradeep Kumar Singh
Jaypee University of Information Technology
Waknaghat, India

BENTHAM SCIENCE PUBLISHERS LTD.

End User License Agreement (for non-institutional, personal use)

This is an agreement between you and Bentham Science Publishers Ltd. Please read this License Agreement carefully before using the ebook/echapter/ejournal (“Work”). Your use of the Work constitutes your agreement to the terms and conditions set forth in this License Agreement. If you do not agree to these terms and conditions then you should not use the Work.

Bentham Science Publishers agrees to grant you a non-exclusive, non-transferable limited license to use the Work subject to and in accordance with the following terms and conditions. This License Agreement is for non-library, personal use only. For a library / institutional / multi user license in respect of the Work, please contact: [email protected].

Usage Rules:

All rights reserved: The Work is the subject of copyright and Bentham Science Publishers either owns the Work (and the copyright in it) or is licensed to distribute the Work. You shall not copy, reproduce, modify, remove, delete, augment, add to, publish, transmit, sell, resell, create derivative works from, or in any way exploit the Work or make the Work available for others to do any of the same, in any form or by any means, in whole or in part, in each case without the prior written permission of Bentham Science Publishers, unless stated otherwise in this License Agreement.You may download a copy of the Work on one occasion to one personal computer (including tablet, laptop, desktop, or other such devices). You may make one back-up copy of the Work to avoid losing it.The unauthorised use or distribution of copyrighted or other proprietary content is illegal and could subject you to liability for substantial money damages. You will be liable for any damage resulting from your misuse of the Work or any violation of this License Agreement, including any infringement by you of copyrights or proprietary rights.

Disclaimer:

Bentham Science Publishers does not guarantee that the information in the Work is error-free, or warrant that it will meet your requirements or that access to the Work will be uninterrupted or error-free. The Work is provided "as is" without warranty of any kind, either express or implied or statutory, including, without limitation, implied warranties of merchantability and fitness for a particular purpose. The entire risk as to the results and performance of the Work is assumed by you. No responsibility is assumed by Bentham Science Publishers, its staff, editors and/or authors for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products instruction, advertisements or ideas contained in the Work.

Limitation of Liability:

In no event will Bentham Science Publishers, its staff, editors and/or authors, be liable for any damages, including, without limitation, special, incidental and/or consequential damages and/or damages for lost data and/or profits arising out of (whether directly or indirectly) the use or inability to use the Work. The entire liability of Bentham Science Publishers shall be limited to the amount actually paid by you for the Work.

General:

Any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims) will be governed by and construed in accordance with the laws of Singapore. Each party agrees that the courts of the state of Singapore shall have exclusive jurisdiction to settle any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims).Your rights under this License Agreement will automatically terminate without notice and without the need for a court order if at any point you breach any terms of this License Agreement. In no event will any delay or failure by Bentham Science Publishers in enforcing your compliance with this License Agreement constitute a waiver of any of its rights.You acknowledge that you have read this License Agreement, and agree to be bound by its terms and conditions. To the extent that any other terms and conditions presented on any website of Bentham Science Publishers conflict with, or are inconsistent with, the terms and conditions set out in this License Agreement, you acknowledge that the terms and conditions set out in this License Agreement shall prevail.

Bentham Science Publishers Pte. Ltd. 80 Robinson Road #02-00 Singapore 068898 Singapore Email: [email protected]

PREFACE

The Internet of Things (IoT) significantly broadens the use of information technology by fusing the physical and digital worlds. The third wave of the IT industry revolution is currently being led by futuristic device-based networking. When it comes to smart gadgets and embedded wireless technologies that use sensing devices, recent years have witnessed enormous growth. In the near future, it is expected that billions of devices need to be connected to the Internet directly or indirectly. The term “IoT”, which was first proposed by Kevin Ashton, a British technologist, in 1999, has the potential to impact everything in today's world, right from health care, smart cities, education, and industries.

As equipment becomes more digitalized and interconnected, networks between machines, people, and the Internet are formed. This results in the development of new ecosystems that allow for increased productivity, improved energy efficiency, and increased profitability. Sensors help to recognize the state of things, by which they gain the advantage of anticipating human needs based on the information collected per context. These sophisticated devices can make decisions on their own without human assistance in addition to gathering information from their surroundings.

We can turn on the lights in our homes from a desk in an office miles away. The built-in cameras and sensors embedded in our refrigerator let us easily keep tabs on what is present on the shelves, and when an item is close to expiration. When we get home, the thermostat has already adjusted the temperature so that it’s lukewarm or brisk, depending on our preference. These are merely a few of the millions of Internet of Things (IoT) frameworks in use these days. IoT has redefined the way we interact, communicate, and go about our daily work. From homes to maintenance to cities, the IoT ecosystem of devices is making our world smarter and more efficient. In this guide, we'll discuss everything you need to know about IoT, a world where more and more things are connected.

Chapters 1 and 2 of this book discuss in-depth the challenges, applications, and recent advances in the field of IoT. Chapters 3 to 5 have discussed various approaches to IoT implementation in different niches, along with an analysis of IoT-enabled wireless sensor networks. Chapters 6 and 9 provide information about recent technologies to mitigate security issues in IoT networks.

Samayveer Singh Department of Computer Science and Engineering Dr. B. R. Ambedkar National Institute of Technology Jalandhar, Punjab, IndiaManju Department of Computer Science and Information Technology Jaypee Institute of Information Technology Noida, Uttar Pradesh, IndiaAruna Malik Department of Computer Science and Engineering Dr. B. R. Ambedkar National Institute of Technology Jalandhar, Punjab, India &Pradeep Kumar Singh Jaypee University of Information Technology Waknaghat, India

List of Contributors

Aatif JamshedABES Engineering College, Ghaziabad, U.P., IndiaAjay K. SharmaDepartment of Computer Science and Engineering, National Institute of Technology Jalandhar, Jalandhar, Punjab, IndiaAman JatainDepartment of Computer Science and Engineering, Amity University, Haryana, IndiaAmit GargIIMT Engineering College, Meerut, Uttar Pradesh, India Department of Computer Science, Manipal University, Jaipur, IndiaAnshu Kumar DwivediBuddha Institute of Technology, Gorakhpur, U.P., IndiaAnkur RastogiJain University, Bengaluru, Karnataka, IndiaAnkurDepartment of Computer Science and Engineering, National Institute of Technology Jalandhar, Jalandhar, Punjab, IndiaAruna MalikDepartment of Computer Science and Engineering, Dr. B. R. Ambedkar National Institute of Technology, Jalandhar, Punjab, IndiaArvind DagurGalgotias University, Greater Noida, U.P., IndiaAshish KumarITS Engineering College, Greater Noida, Uttar Pradesh, IndiaDeepti SinghDepartment of Computer Science and Engineering, Netaji Subhas Institute of Technology (NSIT), Delhi, IndiaManjuDepartment of Computer Science and Information Technology, Jaypee Institute of Information Technology, Noida, Uttar Pradesh, IndiaPawan Singh MehraDelhi Technological University, New Delhi, IndiaPriyanshi PandeyDepartment of Computer Science and Information Technology, Jaypee Institute of Information Technology, Noida, Uttar Pradesh, IndiaSuman PandeyDepartment of Computer Science and Engineering, Kamla Nehru Institute of Technology (KNIT), Sultanpur, IndiaSarika ChaudharyManav Rachna International Institute of Research and Studies (MRIIRS), Faridabad, Mohali, IndiaSamayveer SinghDepartment of Computer Science and Engineering, Dr. B. R. Ambedkar National Institute of Technology, Jalandhar, Punjab, IndiaSaurabh SinghalDepartment of Computer Science and Engineering, Apex Institute of Technology, Chandigarh University, Chandigarh, IndiaVed PrakashDepartment of Computer Science and Engineering, Kamla Nehru Institute of Technology (KNIT), Sultanpur, IndiaVikas VermaiNurture, Teerthanker Mahaveer University, Moradabad, Uttar Pradesh, India

Internet-of-Things-Enabled Sensor Networks: Vision Challenges and Smart Applications

Aatif Jamshed1,Anshu Kumar Dwivedi2,Pawan Singh Mehra3,*,Arvind Dagur4
1 ABES Engineering College, Ghaziabad, U.P., India
2 Buddha Institute of Technology, Gorakhpur, U.P., India
3 Delhi Technological University, New Delhi, India
4 Galgotias University, Greater Noida, U.P., India

Abstract

Internet-of-Things is the future of connectivity that has turned the physical world into smart objects. The practical feature of Internet-of-Things is to combine all objects, rendering them dependent on a shared infrastructure, in such a manner that humans can regulate them as well as monitor their status. Internet-of-Things is a physical object network that is embedded with hardware, software, sensors, and networking to allow objects to share data with the connected devices. This chapter details the Internet of Things, vision challenges, and various intelligent applications in sensor-enabled networks. The wide-scale application of the Internet would significantly affect how computers and objects engage in real-life scenarios. This chapter aims to highlight the perspective of some novel technologies and innovative implementations for the protection, welfare, and privacy concerns due to the Internet of Things. Some critical sensor networks, which represent the most used sensor networks in many domains, such as Smart Applications, are included in this introduction section. A literature study on Internet-of-Things has been conducted for different aspects, such as infrastructure, implementation problems, etc. The authors offer several other applications that are significant. Future research directions for Internet-of-Things have been outlined in the study to equip novel researchers with the assessment of current status and to build upon them with creative ideas.

Keywords: Actuators, Internet-of-Things, Innovative homes, Sensors, Smart city, WSNs.
*Corresponding author Pawan Singh Mehra: Delhi Technological University, New Delhi, India; E-mail: [email protected]

1. Introduction

The Internet of Things (IoT) is a network of physical devices and products used daily and connected to the Internet. It is interlinked with a multitude of devices

that communicate with one another through the use of sensors, actuators, and processors, among other means. The Internet of Things aims to reach high levels of intelligence with the least amount of human contact possible [1, 2]. Many elements of life are made more pleasant by the Internet of Things (IoT), which adds automation and intelligence to many parts of existence. In this context, things are made self-aware and capable of making intelligent decisions on their own, making them more pleasant. There are a large number of heterogeneous devices in the Internet of Things that are all linked over a network. The Internet of Things (IoT) now covers a wide variety of applications, with services accessible in various industries, including manufacturing, healthcare, transport, farming, and smart home. A smart city encompasses all societal areas that rely on information and communication technology (ICTs) [3]. It also encompasses many applications, making city services and surveillance more aware, interactive, and effective. The backbone of Internet-of-Things [3] is the wireless sensor network (WSN), without which the notion of a smart city cannot be achieved. The devices interacting with the physical environment and imposing changes are known as sensors and actuators. Many devices are networked together via sensors in a heterogeneous environment, generating a vast and enormous volume. This data is saved and evaluated to extract knowledge and help decision-making [4]. A smart city comprises a diverse range of gadgets, including a mart and basic essentials. Due to the enormous number of sensors linked to the items, a great sign of data is collected. In the case of an intelligent city, the Internet-of-Things network must be scalable since it may be necessary to add new devices and delete old ones at any time and from any location. Incorporating WSNs is difficult due to the wide range of applications and technological differences across devices [5]. The fundamental a basic problem with the Internet: We must develop cities that are private and secure; which are adaptive, independent, reliable; and which are responsive and dependable. The complex is growing in developing cities due to intelligence in smart infrastructure, and these include issues like a lack of interoperability, context sensitivity, scalability, and managing enormous amounts of informatics pics as well as issues such as security, privacy, and integrity, as well as dynamic adaptation, dependability, and latency. To do this, the city takes care of every facet of society, using a diverse array of applications. As shown smart city's main components are comprised, the city is made up of different sectors of society. A smart city is a city that has several essential and interdependent healthcare, industry, transportation, agriculture, and home automation. The intelligent smart uses many factors like intelligent TechnoMarine governance. It also includes a range of facilities and technologies to make people easier in several applications. Internet-of-Things is transforming the education industry as smart city security requirements [6]. The Internet of Things (IoT) will transform the Internet in such a way that machine-to-machine (M2M) learning will become a reality [7]. As a solid backbone, the Internet infrastructure will exist. The reconfiguration will occur by making physical equipment ‘smart,' allowing them to accomplish things on their own, giving rise to the ‘Internet of Things.' The Internet of Items (Internet-of-Things) promises to make smart technologies more accessible by linking things at any time and in any location. The Internet of Things (IoT) idea was created in 1998, and Kevin Ashton coined the phrase in 1999 [8, 9]. Internet-of-Things essentially enables the interaction of real-world objects to be autonomous but secure [10]. The Internet of Things (IoT) decreases physical labor by automating routine tasks [11]. The number of items linked to the Internet is continuously increasing. Smartphones have a variety of sensors and actuators that collect data, execute computations on it, and then send the important data acquired through the Internet [11]. The authors will be able to construct many fresh applications that will lead to persuasive benefits by employing such a network with various devices containing the sensors [12]. Internet-of-Things smart things may be uniquely recognized. Radio-Frequency Identification (RFID) tags or barcodes are used on these devices, which are detected by sensor devices [13, 14]. The sensors send the collected data to the processing unit through the Internet for processing. The results of the processing are conveyed to the decision-making and action-invoking system, which then takes the required action.

1.1. Major Issues Resolved by Internet of Things

One of the main ideas behind the Internet of Things is to bring information from different devices together. However, this can only be done perfectly if the right information is given at the right time. This can be done with the help of Augmented Reality, which lets you use a headset or mobile device to see relevant and actionable data over your environment whenever you need to. Microsoft, NASA, Volvo, Autodesk, and Caterpillar are just a few of the big companies that have put a lot of money into AR. Autodesk and NASA have tried out different ways to use Microsoft's Hololens.

To explain this further, the following are the real world problems that IoT could help solve.

IoT and AI can be used to find out what went wrong with a machine and how to fix it. This can be shown with the help of a centrifugal pump as an example. Real-time sensors will keep an eye on how the machine is working and pick up on any problems. When they do, real-time CFD analysis will be used to find out what went wrong. With AR, a real-time image or CAD diagram can be shown on top of the pump to show exactly what needs to be done to fix it.Technical documents assembly “A picture is worth 1,000 words”. This saying is especially true when it comes to putting things together. User manuals and technical documents can make simple tasks harder than they need to be, like putting together industrial equipment in the same way over and over again. They can also be used to show videos of real assembly steps that were taken before, either by the person putting it together or by another worker.Smartphones and health equipment work together to instantly diagnose medical issues. You can get diagnostics and capture pictures to share with medical professionals all across the world. They enable the cost-effective collecting and distribution of data; enable inventors to consider application cases; create a digital power grid; play around with the delivery of energy. You will receive an energy profile from each device in your home. The digitalization of equipment will help businesses and enable the subsequent wave of digitization.It has the ability to keep an eye on substation security, track current electrical usage data, and report any anomalies promptly; the capacity to solve issues outside of one's silo in a utility where IT, Operations, and Security don't communicate; encourages communication regarding crucial topics.

2. Related Work

The Internet of Things (Internet-of-Things) can be thought of as a large network structure made up of numerous linked real-world items that rely on sensory, communication, networking, and information-processing technologies. RFID is the foundation for Internet-of-Things, as it allows microchips to send identifying data to a reader through a wireless channel. Anyone may use RFID to analyze, track, and monitor items that have RFID tags attached to them [15]. Wireless Sensor Networks (WSNs) [16], another key technology, focus on intelligent sensors for sensing and monitoring. Since the 1980s, RFID has been used in the transit of products to customers, the manufacture of pharmaceutical items, and retail [17, 18], while WSN has been used in traffic, healthcare, and industrial monitoring [19, 20]. The expansion of Internet-of-Things is accelerated by advancements in both technologies. Other technologies and gadgets, including barcodes, location-based services, service-oriented architecture, near-field communication, Wimax, ZigBee, cloud computing, and so on, are being utilized to build a complete network to enable Internet-of-Things [21] (Fig. 1).

2.1. Smart City's Architecture

Architecture is required to allow and resolve the key problems encountered by the Internet in the Internet-of-Things fields of services and their operations. The Internet of Things(Internet-of-Things) provides a level of abstraction, giving

Fig. (1)) Technologies empowering Internet-of-Things [19].

users access to physical devices and services while also allowing for device interoperability. An impressive number of things, ranging from refrigerators to light bulbs, may be connected to the Internet of Things (Internet-of-Things) with several purposes, capacities, features, and Internet protocols. A complex system of connected devices is implemented in an intelligent city Internet-of-Things framework. The device we are developing has a variety of sensors, which include different levels of both hardware and software heterogeneity. Thus, we want a flexible design that can accommodate both hardware and software variability. To illustrate this, imagine an intelligent urban Internet-of-Things system where information is exchanged not just amongst social applications but also with the government and management sectors as well. Cross-application services are essential for intelligent cities as they must, at any point in time, regardless of their size, be able to expand to various devices utilizing a range of technologies. The authors [22] argue that some domains in smart cities need to react promptly in real-time to well-structured resource planning, helping to effectively utilize available resources. Data management, communication issues due to the existence of many protocols, real-time processing of data, data protection, and privacy [23], as well as expansion of existing applications because of advancements in technology and greater use, all referred to as scalability [24] are necessary for standardized architectures to address common issues. Due to the diversity of devices, the dynamic nature of the network, and the requirement for scalability, security in all Internet-of-Things applications is one of the most demanding problems, especially in smart cities, where intercourse exists across numerous applications. Existing Internet-of-Things solutions do not fully fulfill the security requirements. Certain techniques are quite energy-intensive and hence expensive [22]. This type of architecture, seen in Fig. (2), is an open design that may handle a wide range of uses. It also shows that separate sectors are equipped with sensors and connected to one gateway to communicate information across different sectors, therefore assisting one another. In addition, the processing needs of the architecture to support Internet-of-Things problems, such as data processing, will be done on the edges of the device itself to serve essential applications like the healthcare system. Certain data, often known as fog computing, cannot be handled at the end of this software [25]. The conclusion drawn from the examination of architectural issues and the knowledge of the requirements for architecture in smart cities is that a smart city requires an open, flexible architecture that allows for scalability and extensibility.

Fig. (2)) The overall Internet-of-Things-based architecture of a smart city.

In other words, an additional large number of devices can be added to the system at any time. One must also take into consideration the scalability and diversity of the gadgets. An architectural framework is provided that is constructed on edge, with several direct and indirect ways of data connectivity for real-time data processing, as well as latency concerns that may be handled.

3. Intelligent or Smart City Platform

As a vast amount of data is created by sensors, the smart city employs new technologies such as WSN: wireless sensor networks, and big data analytics to minimize resource use and provide intelligence to applications. Because data accumulates at a quick rate, and edge devices must manage comparable high computational and processing requirements, effective data storage is also necessary [26, 27].

3.1. Internet-of-Things Application Requirements

It is necessary to construct applications to apply Internet-of-Things solutions. However, the application implementation necessitates the following essential requirements:

1. One of the most important requirements of the Internet of Things is scalability. The platform should allow for the addition of any number of devices at any moment without affecting the application.