Javascript must be enabled to continue!
Internet of Everything: Enabling Technologies, Applications, Security and Challenges
View through CrossRef
<p>Internet of Everything (IoE) connects billions of people, devices, objects and things to the Internet for autonomous services provisioning. IoE benefits from the value created by the compound impacts of connecting people, processes, things, and data. The interoperability among heterogeneous components facilitates seamless communication exchange for service provisioning in almost all the fields of life. Apart from providing immense benefits in autonomous services provisioning, it suffers from implementation issues, architectural considerations, and security and privacy vulnerabilities. There is a lack of surveys that comprehensively discuss all the aspects of IoE. Therefore, we design this survey to discuss key effective implementation of IoE. We discuss enabling technologies, architectural components, and expectations for an efficient realization of IoE. We discuss state-of-the-art use cases, synergies, and implementations of IoE that could be used as a road-map for and effective implementation of IoE-enabled systems. We highlight key security, privacy, and trust issues. We identify lethal attack scenarios and highlight countermeasures against these attacks. Finally, we discuss current challenges, their solutions, and future research directions. This survey provides key insights for implementing future IoE systems.</p>
Institute of Electrical and Electronics Engineers (IEEE)
Title: Internet of Everything: Enabling Technologies, Applications, Security and Challenges
Description:
<p>Internet of Everything (IoE) connects billions of people, devices, objects and things to the Internet for autonomous services provisioning.
IoE benefits from the value created by the compound impacts of connecting people, processes, things, and data.
The interoperability among heterogeneous components facilitates seamless communication exchange for service provisioning in almost all the fields of life.
Apart from providing immense benefits in autonomous services provisioning, it suffers from implementation issues, architectural considerations, and security and privacy vulnerabilities.
There is a lack of surveys that comprehensively discuss all the aspects of IoE.
Therefore, we design this survey to discuss key effective implementation of IoE.
We discuss enabling technologies, architectural components, and expectations for an efficient realization of IoE.
We discuss state-of-the-art use cases, synergies, and implementations of IoE that could be used as a road-map for and effective implementation of IoE-enabled systems.
We highlight key security, privacy, and trust issues.
We identify lethal attack scenarios and highlight countermeasures against these attacks.
Finally, we discuss current challenges, their solutions, and future research directions.
This survey provides key insights for implementing future IoE systems.
</p>.
Related Results
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Novel architectures and strategies for security offloading
Novel architectures and strategies for security offloading
Internet has become an indispensable and powerful tool in our modern society. Its ubiquitousness, pervasiveness and applicability have fostered paradigm changes around many aspects...
Development Tasks of AI-based Security Industry
Development Tasks of AI-based Security Industry
Recently, the government's interest in industries utilizing AI has been amplified, with initiatives such as announcing a roadmap aiming to achieve the goal of becoming the world's ...
ACM SIGCOMM computer communication review
ACM SIGCOMM computer communication review
At some point in the future, how far out we do not exactly know, wireless access to the Internet will outstrip all other forms of access bringing the freedom of mobility to the way...
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
“Essential Security Practices for Fortifying Mobile Apps” is a definitive guide designed to empower developers, security professionals, and organizations with the knowledge and too...
Human Security
Human Security
The term “human security” was first employed in the United Nations Development Programme (UNDP) Human Development Report (HDR) of 1994, which argued for a “people-centric” concept ...
Cybersecurity and Organisational Performance – the Interplay
Cybersecurity and Organisational Performance – the Interplay
The interplay between cybersecurity and organisational performance is multifaceted in nature, as it is related to how cybersecurity impacts and is impacted by various organisationa...
Internet addiction among school children in the Western Province of Sri Lanka: A cross sectional analytical study (Preprint)
Internet addiction among school children in the Western Province of Sri Lanka: A cross sectional analytical study (Preprint)
BACKGROUND
The internet is widely used across the world and in Sri Lanka for many purposes. Though essential for everyday life there are many negative aspec...

