Next Article in Journal
Simulated Digestion of Red Sea Cucumber (Parastichopus tremulus): A Study of Protein Quality and Antioxidant Activity
Previous Article in Journal
Automated Derivation of Vine Objects and Ecosystem Structures Using UAS-Based Data Acquisition, 3D Point Cloud Analysis, and OBIA
Previous Article in Special Issue
HELPFuL: Human Emotion Label Prediction Based on Fuzzy Learning for Realizing Artificial Intelligent in IoT
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Editorial

Advances in Architecture, Protocols, and Challenges in Internet of Things: From Technologies to Applications

by
Weidong Fang
1,2,3,† and
Chunsheng Zhu
4,*,†
1
Science and Technology on Micro-System Laboratory, Shanghai Institute of Micro-System and Information Technology, Chinese Academy of Sciences, Shanghai 200051, China
2
Shanghai Research and Development Center for Micro-Nano Electronics, Shanghai 201210, China
3
School of Electronic, Electrical, and Communication Engineering, University of Chinese Academy of Sciences, Beijing 100049, China
4
College of Big Data and Internet, Shenzhen Technology University, Shenzhen 518118, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Appl. Sci. 2024, 14(8), 3266; https://doi.org/10.3390/app14083266
Submission received: 29 March 2024 / Accepted: 6 April 2024 / Published: 12 April 2024
With the rapid development and widespread application of Internet of Things (IoT) technology, we are in an era of digital transformation, where the integration between the physical and digital worlds continues to deepen [1,2,3].In this context, this Special Issue aims to explore the latest developments in the field of IoT, the evolution of relevant protocols, and the challenges faced. As a key technology connecting objects and networks, the IoT has shown enormous potential in various domains. In smart homes, IoT technology enables interconnected household devices [4,5], allowing for smart control and remote monitoring, thereby enhancing convenience and comfort in daily life. In industrial automation [6,7], IoT technology facilitates real-time communication and data exchange between devices, thus improving production efficiency and resource utilization. In smart city management [8,9], IoT technology can assist cities in achieving functions such as smart transportation, intelligent energy management, and environmental monitoring, thereby enhancing the efficiency and sustainable development capabilities of urban operations. However, as the scale of the IoT continues to expand and the number of application scenarios increases, it also brings about numerous technological and security challenges. One of these challenges is interoperability and standardization issues among IoT devices. Devices produced by different manufacturers may use different communication protocols and data formats, leading to ineffective interaction and integration between devices. Additionally, IoT devices typically have lower computing and storage capabilities, making them vulnerable to security attacks [10], which could result in issues such as data breaches [11] and device tampering [12]. Furthermore, privacy protection and data security are also significant challenges faced by the IoT. A large amount of personal and sensitive data are collected and transmitted by IoT devices, and if leaked or misused, it could have serious implications for individuals and society.
Therefore, this Special Issue is titled “Advances in Architecture, Protocols, and Challenges in the Internet of Things”, focusing on the innovation of IoT architecture, protocols, and the various challenges encountered in practical applications. We aim to provide a platform for an in-depth exploration and exchange of ideas for researchers in the IoT field, facilitating collaborative efforts to explore the development directions of IoT technology and promote its broader application and advancement across various domains. Following peer review, this Special Issue includes seven papers (one review, five articles, and one communication). L. Zhang et al. (Contributor 1) proposed a fuzzy learning-based method for predicting human emotion labels in the IoT by considering the ambiguity of composite emotions and emotion labels. This method can simultaneously handle multiple fuzzy emotion labels. Initially, the authors utilized fuzzy sets to construct a fuzzy label distribution system representing facial expressions. Subsequently, two fuzzy label distribution prediction methods based on fuzzy rough sets were proposed to address the issue of composite emotion prediction. By calculating upper and lower approximations, the probability of a sample belonging to an emotion could be obtained. The experimental results demonstrate that the algorithm not only effectively predicts human emotion labels, but can also be applied to other label distribution prediction tasks. This method represents a more general approach to label distribution prediction, making it suitable for deployment in artificial intelligence-based IoT systems.
Additionally, in the IoT, infrared (IR) image preprocessing is often employed for image denoising and enhancement to facilitate small target detection. Traditional denoising methods based on nuclear norm minimization (NNM) average all feature values, blurring specific details, thereby failing to achieve satisfactory denoising performance. J. Chen et al. (Contributor 2) proposed a method that combines weighted nuclear norm minimization (WNNM) with adaptive similar patch fusion for searching IR images based on group sparse representation. They adaptively select similar structural blocks according to specific computational criteria and use k-nearest neighbor (KNN) clustering to form more similar groups, which helps in the recovery of complex backgrounds with high Gaussian noise. Furthermore, the authors narrowed down the feature values with different weights in the WNNM model to solve the optimization problem. The results demonstrated that the proposed method can recover more detailed information in the images. This algorithm not only achieved good denoising performance in regular image denoising, but also demonstrated excellent performance in denoising IR images. It showed effective denoising results on commonly used datasets as well as real-world IR images.
Speech synthesis is one of the key technologies in IoT [13,14]. At this stage, end-to-end speech synthesis systems are capable of generating relatively realistic human-like voices. However, the commonly used parallel text-to-speech systems currently suffer from the loss of useful information during the two-stage conversion process, resulting in the monotonous control characteristics of the synthesized speech, with insufficient expression of features such as emotion. This makes emotion-based speech synthesis a challenging task. To address this issue, W. Zhao et al. (Contributor 3) proposed a new system called Emo-VITS, which is based on the expressive speech synthesis module VITS, aiming to achieve emotion control in text-to-speech synthesis. They designed an emotion network to extract global and local features from reference audio, and then fused these features using an attention-based emotion feature fusion module, enabling more accurate and comprehensive emotion speech synthesis. Their experimental results demonstrate that, compared to networks without emotion, the Emo-VITS system outperforms other networks in terms of naturalness, sound quality, and emotion similarity, albeit with a slight increase in error rates.
W.-W. Jin et al. (Contributor 4) proposed a deep learning model for road surface damage detection based on local minimum gray-value feature points. Initially, they segmented image patches from image windows composed of feature point neighborhoods to form an image patch dataset. These image patches were then fed into a Convolutional Neural Network (CNN) for model training, where they extracted features from the image patches. During the testing phase, feature points and image patches were selected from test images, and the trained CNN model could output feature vectors for these feature image patches. All feature vectors were combined into a composite feature vector, serving as the feature descriptor for the test image. Finally, a model classifier constructed using Support Vector Machine (SVM) was utilized to classify whether the image window contained damaged areas. The experimental results demonstrate that the proposed road surface damage detection method based on feature-point image patches and feature fusion achieves higher accuracy and efficiency.
G. Chen et al. (Contributor 5) proposed a novel algorithm to solve the resource allocation problem for enhanced Mobile Broadband (eMBB) and Ultra-Reliable and Low-Latency Communications (URLLC) services with the help of dual connectivity (DC). Firstly, the authors considered a heterogeneous network scenario that encompassed two typical network slices. In this scenario, DC was employed to address the issue of lower quality of experience for users caused by limited network resources in small base stations (SBSs) [15]. Building upon this, the authors formulated an optimization problem with weighted objectives of system throughput, system quality, and additional system energy, and they proved that this problem is an NP-hard problem. Next, due to the non-convex and combinatorial nature of the problem, the authors proposed a slicing resource allocation algorithm called the dueling double deep Q-network with long short-term memory (LSTM-D3QN), aiming to improve the overall utility of the network while ensuring quality of experience (QoE). The complexity of this algorithm was also analyzed. Simulation results showed the effectiveness and convergence of the proposed algorithm by comparing it with other Deep Reinforcement Learning (DRL) algorithms. In addition, the authors extensively compared the utility of the system and the QoE of users with and without the assistance of DC technology, demonstrating that users and the network system achieve higher QoE and throughput in most cases when aided by DC technology. Furthermore, the authors assessed the impact of different numbers of users in the environment on different optimization objectives. The proposed algorithm was able to maximize the overall utility of the system while ensuring user experience quality.
The fifth-generation mobile communication system, 5G, provides high bandwidth, low latency, and massive connectivity for various IoT applications [16]. The widespread adoption of 5G has brought about significant changes in the IoT domain [17,18], fostering the development of intelligent transportation, smart factories, and smart cities. Various IoT technologies such as autonomous driving, intelligent video, autonomous mining faces, industrial control, and intelligent robot inspection are crucial in the field of smart mining. In key areas such as main transport routes, mining faces, and underground substations, frequency-domain interference and crosstalk are major factors affecting the stability and reliability of 5G signals. To improve the performance of 5G in mines, L. Zhang et al. (Contributor 6) designed a fusion anti-interference scheme. Based on deep complex networks and blind source separation, this scheme enables the periodic monitoring and filtering suppression of signal interference. The test results demonstrate that this method achieves 20% higher suppression capability for frequency-domain excitation compared to traditional equalization methods. Regarding frequency-domain crosstalk, the proposed method can eliminate 90% of the interference without introducing additional delays when compared to traditional blind source separation methods. Additionally, it ensures the high bandwidth and low latency characteristics of 5G communication. S. Szymoniak et al. (Contributor 7) published a survey on key protocols and authentication protocols in the Internet of Things (IoT). They collected research papers focusing on security issues, particularly in the context of the IoT. These papers propose new protocols aimed at addressing vulnerabilities in existing protocols, defining secure communication processes and encryption techniques. The authors analyze the security levels, vulnerabilities, and computational and communication costs associated with these protocols. Furthermore, they discuss the theoretical aspects of the IoT environment, encryption methods that can be employed for secure communication, and network attacks that could compromise the security of the considered environment. In their paper, they emphasize the importance of key protocols, distribution processes, and the authentication of users or devices in such networks. These processes provide crucial communication steps as they prevent unauthorized users from accessing session keys and unauthorized access by users or devices.
In conclusion, in this era of digital transformation, we are facing tremendous opportunities and challenges. Firstly, it is necessary to strengthen interoperability and standardization among Internet of Things (IoT) devices, promoting unified communication protocols and data formats across industries. Secondly, it is important to enhance the security of IoT devices, including improving the security design of the devices themselves and establishing comprehensive security monitoring and response mechanisms. Additionally, it is essential to strengthen the protection of personal privacy and data security by enacting relevant laws, regulations, and policies to regulate the collection, transmission, and usage of IoT data, ensuring the security and privacy rights of individuals. To fully leverage the advantages of IoT technology and address the challenges it faces, comprehensive measures need to be taken. Through these measures, we can better promote the development and application of IoT technology, achieve deep integration between the physical and digital worlds, and propel digital transformation to new heights. From complex emotion prediction to infrared recognition, speech synthesis, road damage detection, network slicing resource allocation, and the periodic monitoring and suppression of signal interference in 5G communication in mines, the development of these technologies not only drives innovation in the IoT field, but also profoundly impacts our lives and work. Through continuous research and innovation, we can better understand human emotions, improve the efficiency of security monitoring, enhance communication reliability, effectively manage resources, and respond to challenges. The application of these technologies not only makes our lives more convenient, safe, and intelligent, but also creates a more connected and intelligent world. In the future, we need to continue strengthening cooperation, jointly overcome technological and security challenges, and promote the healthy development of IoT technology. Only through continuous innovation and collaboration can we better seize the opportunities of digital transformation and achieve shared progress between technology and society.

Funding

This research was funded by the Shanghai Natural Science Foundation, grant number 21ZR1461700, and the Special Projects for Key Research and Development Tasks in the Autonomous Region, grant number 2022B01009.

Acknowledgments

We extend our sincere gratitude to the esteemed authors who have made invaluable contributions to this Special Issue on “Advances in Architecture, Protocols, and Challenges in Internet of Things”. Their dedication in presenting cutting-edge research has been instrumental in the success of this issue. The exceptional quality of the submissions underscores the significance of investigating the evolving architectures and protocols and of overcoming challenges in the realm of the Internet of Things.

Conflicts of Interest

The authors declare no conflicts of interest.

List of Contributions

  • Zhang, L.; Zhang, H.; Wu, Y.; Xu, Y.; Ye, T.; Ma, M.; Li, L. HELPFuL: Human Emotion Label Prediction Based on Fuzzy Learning for Realizing Artificial Intelligent in IoT. Appl. Sci. 2023, 13, 7799. https://doi.org/10.3390/app13137799.
  • Chen, J.; Zhu, Z.; Hu, H.; Qiu, L.; Zheng, Z.; Dong, L. A Novel Adaptive Group Sparse Representation Model Based on Infrared Image Denoising for Remote Sensing Application. Appl. Sci. 2023, 13, 5749. https://doi.org/10.3390/app13095749.
  • Zhao, W.; Yang, Z. An Emotion Speech Synthesis Method Based on VITS. Appl. Sci. 2023, 13, 2225. https://doi.org/10.3390/app13042225.
  • Jin, W.-W.; Chen, G.-H.; Chen, Z.; Sun, Y.-L.; Ni, J.; Huang, H.; Ip, W.-H.; Yung, K.-L. Road Pavement Damage Detection Based on Local Minimum of Grayscale and Feature Fusion. Appl. Sci. 2022, 12, 13006. https://doi.org/10.3390/app122413006.
  • Chen, G.; Mu, X.; Shen, F.; Zeng, Q. Network Slicing Resource Allocation Based on LSTM-D3QN with Dual Connectivity in Heterogeneous Cellular Networks. Appl. Sci. 2022, 12, 9315. https://doi.org/10.3390/app12189315.
  • Zhang, L.; Yang, W.; Fang, W.; Jiang, Y.; Zhao, Q. Periodic Monitoring and Filtering Suppression of Signal Interference in Mine 5G Communication. Appl. Sci. 2022, 12, 7689. https://doi.org/10.3390/app12157689.
  • Szymoniak, S.; Kesar, S. Key Agreement and Authentication Protocols in the Internet of Things: A Survey. Appl. Sci. 2023, 13, 404. https://doi.org/10.3390/app13010404.

References

  1. Tsiatsis, V.; Karnouskos, S.; Holler, J.; Boyle, D.; Mulligan, C. Internet of Things: Technologies and Applications for a New Age of Intelligence; Academic Press: Cambridge, MA, USA, 2018. [Google Scholar]
  2. Rose, K.; Eldridge, S.; Chapin, L. The internet of things: An overview. Int. Soci. 2015, 80, 1–53. [Google Scholar]
  3. Tariq, U.; Ahmed, I.; Bashir, A.K.; Shaukat, K. A critical cybersecurity analysis and future research directions for the Internet of Things: A comprehensive review. Sensors 2023, 23, 4117. [Google Scholar] [CrossRef] [PubMed]
  4. Yudidharma, A.; Nathaniel, N.; Gimli, T.N.; Achmad, S.; Kurniawan, A. A systematic literature review: Messaging protocols and electronic platforms used in the internet of things for the purpose of building smart homes. Proc. Comput. Sci. 2023, 216, 194–203. [Google Scholar] [CrossRef]
  5. Padmanaban, S.; Nasab, M.A.; Shiri, M.E.; Javadi, H.H.S.; Nasab, M.A.; Zand, M.; Samavat, T. The role of internet of things in smart homes. In Artificial Intelligence-Based Smart Power Systems; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 2023; pp. 259–271. [Google Scholar]
  6. Babayigit, B.; Abubaker, M. Industrial internet of things: A review of improvements over traditional scada systems for industrial automation. IEEE Syst. J. 2023, 18, 120–133. [Google Scholar] [CrossRef]
  7. Soori, M.; Arezoo, B.; Dastres, R. Internet of things for smart factories in industry 4.0, a review. IoT Cyber-Phys. Syst. 2023, 3, 192–204. [Google Scholar] [CrossRef]
  8. Fang, W.; Cui, N.; Chen, W.; Zhang, W.; Chen, Y. A trust-based security system for data collection in smart city. IEEE Trans. Ind. Inform. 2021, 17, 4131–4140. [Google Scholar] [CrossRef]
  9. Fang, W.; Zhang, W.; Chen, W.; Pan, T.; Ni, Y.; Yang, Y. Trust-based attack and defense in wireless sensor networks: A survey. Wirel. Commun. Mob. Comput. 2020, 2020, 2643546. [Google Scholar] [CrossRef]
  10. Surianarayanan, C.; Chelliah, P.R. Integration of the internet of things and cloud: Security challenges and solutions—A review. Int. J. Cloud Appl. Comput. 2023, 13, 1–30. [Google Scholar] [CrossRef]
  11. Wang, M.; Qin, Y.; Liu, J.; Li, W. Identifying personal physiological data risks to the Internet of Everything: The case of facial data breach risks. Human. Soc. Sci. Commun. 2023, 10, 216. [Google Scholar] [CrossRef] [PubMed]
  12. Tauseef, M.; Kounte, M.R.; Nalband, A.H.; Ahmed, M.R. Exploring the joint potential of blockchain and AI for securing Internet of Things. Int. J. Adv. Comput. Sci. Appl. 2023, 14, 885–895. [Google Scholar] [CrossRef]
  13. Bi, M.; Lu, H.; Zhang, S.; Lei, M.; Yan, Z. Deep Feed-Forward Sequential Memory Networks for Speech Synthesis. In Proceedings of the 2018 IEEE ICASSP, Calgary, AB, Canada, 15–20 April 2018. [Google Scholar]
  14. Xu, G.; Song, W.; Zhang, Z.; Zhang, C.; He, X.; Zhou, B. Improving Prosody Modelling with Cross-Utterance BERT Embeddingsfor End-to-end Speech Synthesis. arXiv 2020, arXiv:2011.05161. [Google Scholar]
  15. Zhao, N.; Liang, Y.-C.; Niyato, D.; Pei, Y.; Wu, M.; Jiang, Y. Deep reinforcement learning for user association and resource allocation in heterogeneous cellular networks. IEEE Trans. Wirel. Commun. 2019, 18, 5141–5152. [Google Scholar] [CrossRef]
  16. Agiwal, M.; Roy, A.; Saxena, N. Next generation 5G wireless networks: A comprehensive survey. IEEE Commun. Surv. Tutor. 2016, 18, 1617–1655. [Google Scholar] [CrossRef]
  17. Chettri, L.; Bera, R. A comprehensive survey on Internet of Things (IoT) toward 5G wireless systems. IEEE Internet Things J. 2020, 7, 16–32. [Google Scholar] [CrossRef]
  18. Shafique, K.; Khawaja, B.A.; Sabir, F.; Qazi, S.; Mustaqim, M. Internet of Things (IoT) for next-generation smart systems: Areview of current challenges, future trends and prospects for emerging 5G-IoT scenarios. IEEE Access 2020, 8, 23022–23040. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Fang, W.; Zhu, C. Advances in Architecture, Protocols, and Challenges in Internet of Things: From Technologies to Applications. Appl. Sci. 2024, 14, 3266. https://doi.org/10.3390/app14083266

AMA Style

Fang W, Zhu C. Advances in Architecture, Protocols, and Challenges in Internet of Things: From Technologies to Applications. Applied Sciences. 2024; 14(8):3266. https://doi.org/10.3390/app14083266

Chicago/Turabian Style

Fang, Weidong, and Chunsheng Zhu. 2024. "Advances in Architecture, Protocols, and Challenges in Internet of Things: From Technologies to Applications" Applied Sciences 14, no. 8: 3266. https://doi.org/10.3390/app14083266

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop