Review the role of IoT in computer science(RICS)
Mithal Hadi Jebur , University of Babylon, Babylon, Iraq Nawras Yahya Hussein Al-Khafaji , University of Babylon, Babylon, IraqAbstract
The rise of the Internet of Things has significantly impacted the field of computer science, revolutionizing the way we interact with and utilize technology. IoT has enabled the integration of physical devices with the digital world, allowing for the collection and exchange of vast amounts of data that can be used to enhance our understanding of the world around us.One of the primary applications of IoT in computer science is in the realm of big data and cloud computing. IoT devices generate massive amounts of data that can be leveraged to uncover valuable insights and inform decision-making processes.Analytics and machine learning techniques are being employed to extract meaningful information from this data, leading to the development of innovative applications and services across a wide range of domains, including healthcare, smart cities, and industrial automation ,However, the proliferation of IoT devices also brings about significant security challenges. IoT devices are inherently vulnerable to cyber attacks, as they are often connected to the internet and may lack robust security measures. Malicious actors can exploit these vulnerabilities to gain unauthorized access to sensitive data or disrupt critical systems.
Keywords
IoT applications, IoT vision
References
Alsharif, M. H., Kelechi, A. H., Yahya, K., & Chaudhry, S. A. (2020). Machine Learning Algorithms for Smart Data Analysis in Internet of Things Environment: Taxonomies and Research Trends. In M. H. Alsharif, A. H. Kelechi, K. Yahya, & S. A. Chaudhry, Symmetry (Vol. 12, Issue 1, p. 88). Multidisciplinary Digital Publishing Institute. https://doi.org/10.3390/sym12010088
Bellini, P., Nesi, P., & Pantaleo, G. (2022). IoT-Enabled Smart Cities: A Review of Concepts, Frameworks and Key Technologies [Review of IoT-Enabled Smart Cities: A Review of Concepts, Frameworks and Key Technologies]. Applied Sciences, 12(3), 1607. Multidisciplinary Digital Publishing Institute. https://doi.org/10.3390/app12031607
Benson, K., Bouloukakis, G., Grant, C., Issarny, V., Mehrotra, S., Moscholios, I. D., & Venkatasubramanian, N. (2018). FireDeX (p. 279). https://doi.org/10.1145/3274808.3274830
Bhatia, M., Sood, S. K., & Kaur, S. (2019). Quantum-based predictive fog scheduler for IoT applications. In M. Bhatia, S. K. Sood, & S. Kaur, Computers in Industry (Vol. 111, p. 51). Elsevier BV. https://doi.org/10.1016/j.compind.2019.06.002
Bittencourt, L. F., Immich, R., Sakellariou, R., Fonseca, N. L. S. da, Madeira, E. R. M., Curado, M., Villas, L. A., DaSilva, L. A., Lee, C. A., & Rana, O. (2018). The Internet of Things, Fog and Cloud continuum: Integration and challenges. In L. F. Bittencourt, R. Immich, R. Sakellariou, N. L. S. da Fonseca, E. R. M. Madeira, M. Curado, L. A. Villas, L. A. DaSilva, C. A. Lee, & O. Rana, Internet of Things (Vol. 3, p. 134). Elsevier BV. https://doi.org/10.1016/j.iot.2018.09.005
Chang, C.-W., & Hung, W.-H. (2021). Strengthening Existing Internet of Things System Security: Case Study of Improved Security Structure in Smart Health. In C.-W. Chang & W.-H. Hung, Sensors and Materials (Vol. 33, Issue 4, p. 1257). MYU K.K. https://doi.org/10.18494/sam.2021.3163
Chen, T., Barbarossa, S., Wang, X., Giannakis, G. B., & Zhang, Z.-L. (2019). Learning and Management for Internet of Things: Accounting for Adaptivity and Scalability. In T. Chen, S. Barbarossa, X. Wang, G. B. Giannakis, & Z.-L. Zhang, Proceedings of the IEEE (Vol. 107, Issue 4, p. 778). Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/jproc.2019.2896243
Elgazzar, K., Khalil, H., Alghamdi, T., Badr, A. O., Abdelkader, G., Elewah, A., & Buyya, R. (2022). Revisiting the internet of things: New trends, opportunities and grand challenges. In K. Elgazzar, H. Khalil, T. Alghamdi, A. O. Badr, G. Abdelkader, A. Elewah, & R. Buyya, Frontiers in the Internet of Things (Vol. 1). Frontiers Media. https://doi.org/10.3389/friot.2022.1073780
Elhadad, A., Alanazi, F., Taloba, A. I., & Abozeid, A. (2022). Fog Computing Service in the Healthcare Monitoring System for Managing the Real-Time Notification. In A. Elhadad, F. Alanazi, A. I. Taloba, & A. Abozeid, Journal of Healthcare Engineering (Vol. 2022, p. 1). Hindawi Publishing Corporation. https://doi.org/10.1155/2022/5337733
Gharaibeh, A., Salahuddin, M. A., Hussini, S. J., Khreishah, A., Khalil, I., Guizani, M., & Al‐Fuqaha, A. (2017). Smart Cities: A Survey on Data Management, Security, and Enabling Technologies. In A. Gharaibeh, M. A. Salahuddin, S. J. Hussini, A. Khreishah, I. Khalil, M. Guizani, & A. Al‐Fuqaha, IEEE Communications Surveys & Tutorials (Vol. 19, Issue 4, p. 2456). Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/comst.2017.2736886
Ghosh, U., Chatterjee, P., Shetty, S., & Datta, R. (2020). An SDN-IoT-based Framework for Future Smart Cities: Addressing Perspective. In U. Ghosh, P. Chatterjee, S. Shetty, & R. Datta, arXiv (Cornell University). Cornell University. https://doi.org/10.48550/arxiv.2007.11536
Grigoriev, D., & Shpilrain, V. (2020). RSA and redactable blockchains. In D. Grigoriev & V. Shpilrain, International Journal of Computer Mathematics Computer Systems Theory (Vol. 6, Issue 1, p. 1). Taylor & Francis. https://doi.org/10.1080/23799927.2020.1842808
Hussain, F., Hussain, R., Hassan, S. A., & Hossain, E. (2020). Machine Learning in IoT Security: Current Solutions and Future Challenges. In F. Hussain, R. Hussain, S. A. Hassan, & E. Hossain, IEEE Communications Surveys & Tutorials (Vol. 22, Issue 3, p. 1686). Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/comst.2020.2986444
Khan, A. Y., Latif, R., Latif, S., Tahir, S., Batool, G., & Saba, T. (2019). Malicious Insider Attack Detection in IoTs Using Data Analytics. In A. Y. Khan, R. Latif, S. Latif, S. Tahir, G. Batool, & T. Saba, IEEE Access (Vol. 8, p. 11743). Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/access.2019.2959047
Köse, U. (2016). An Artificial Intelligence Perspective on Ensuring Cyber‐Assurance for the Internet of Things (p. 249). https://doi.org/10.1002/9781119193784.ch10
Latif, S., Driss, M., Boulila, W., Huma, Z. e, Jamal, S. S., Idrees, Z., & Ahmad, J. (2021). Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions [Review of Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions]. Sensors, 21(22), 7518. Multidisciplinary Digital Publishing Institute. https://doi.org/10.3390/s21227518
Sim, S.-H., & Jeong, Y.-S. (2021). Multi-Blockchain-Based IoT Data Processing Techniques to Ensure the Integrity of IoT Data in AIoT Edge Computing Environments. In S.-H. Sim & Y.-S. Jeong, Sensors (Vol. 21, Issue 10, p. 3515). Multidisciplinary Digital Publishing Institute. https://doi.org/10.3390/s21103515
Siow, E., Tiropanis, T., & Hall, W. (2018). Analytics for the Internet of Things: A Survey. In E. Siow, T. Tiropanis, & W. Hall, arXiv (Cornell University). Cornell University. https://doi.org/10.48550/arxiv.1807.00971
Stout, W. M. S., & Urias, V. (2016). Challenges to securing the Internet of Things. https://doi.org/10.1109/ccst.2016.7815675
Tripathi, A. K., Singh, A. K., Choudhary, P., Vashist, P. C., & Mishra, K. K. (2020). Significance of Wireless Technology in Internet of Things (IoT) (p. 131). https://doi.org/10.1002/9781119640554.ch6
Zhao-Jiang, H., & Xiao, Y. (2019). Special issue on big data for IoT cloud computing convergence. In H. Zhao-Jiang & Y. Xiao, Web Intelligence (Vol. 17, Issue 2, p. 101). IOS Press. https://doi.org/10.3233/web-190404
Zheng, M., Xu, D., Jiang, L., Gu, C., Tan, R., & Cheng, P. (2019). Challenges of Privacy-Preserving Machine Learning in IoT (p. 1). https://doi.org/10.1145/3363347.3363357
Zhao-Jiang, H., & Xiao, Y. (2019). Special issue on big data for IoT cloud computing convergence. In H. Zhao-Jiang & Y. Xiao, Web Intelligence (Vol. 17, Issue 2, p. 101). IOS Press. https://doi.org/10.3233/web-190404
Article Statistics
Copyright License
Copyright (c) 2025 Mithal Hadi Jebur, Nawras Yahya Hussein Al-Khafaji
This work is licensed under a Creative Commons Attribution 4.0 International License.