{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T15:42:31Z","timestamp":1740152551553,"version":"3.37.3"},"reference-count":136,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T00:00:00Z","timestamp":1661731200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"Internet of Things (IoT) is one of the efflorescing technologies of recent years with splendid real-time applications in the fields of healthcare, agriculture, transportation, industry, and environmental monitoring. In addition to the dominant applications and services of IoT, many challenges exist. As there is a lack of standardization for IoT technologies, the architecture emerged as the foremost challenge. The salient issues in designing an IoT architecture encompass connectivity, data handling, heterogeneity, privacy, scalability, and security. The standard IoT architectures are the ETSI IoT Standard, the ITU-T IoT Reference Model, IoT-A Reference Model, Intel\u2019s IoT Architecture, the Three-Layer Architecture, Middle-Based Architecture, Service-Oriented Architecture, Five-Layer Architecture, and IWF Architecture. In this paper, we have reviewed these architectures and concluded that IWF Architecture is most suitable for the effortless development of IoT applications because of its immediacy and depth of insight in dealing with IoT data. We carried out this review concerning smart healthcare as it is among the major industries that have been leaders and forerunners in IoT technologies. Motivated by this, we designed the novel Smart Healthcare Reference Architecture (SHRA) based on IWF Architecture. Finally, present the significance of smart healthcare during the COVID-19 pandemic. We have synthesized our findings in a systematic way for addressing the research questions on IoT challenges. To the best of our knowledge, our paper is the first to provide an exhaustive investigation on IoT architectural challenges with a use case in a smart healthcare system.<\/jats:p>","DOI":"10.3390\/a15090309","type":"journal-article","created":{"date-parts":[[2022,8,30]],"date-time":"2022-08-30T01:01:31Z","timestamp":1661821291000},"page":"309","source":"Crossref","is-referenced-by-count":15,"title":["Integrated Industrial Reference Architecture for Smart Healthcare in Internet of Things: A Systematic Investigation"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4154-4082","authenticated-orcid":false,"given":"Aswani Devi","family":"Aguru","sequence":"first","affiliation":[{"name":"National Institute of Technology Warangal, Warangal 506004, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7799-8855","authenticated-orcid":false,"given":"Erukala Suresh","family":"Babu","sequence":"additional","affiliation":[{"name":"National Institute of Technology Warangal, Warangal 506004, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4155-884X","authenticated-orcid":false,"given":"Soumya Ranjan","family":"Nayak","sequence":"additional","affiliation":[{"name":"Amity School of Engineering and Technology, Amity University Uttar Pradesh, Noida 201313, India"}]},{"given":"Abhisek","family":"Sethy","sequence":"additional","affiliation":[{"name":"Department of Information Technology, GMR Institute of Technology, Rajam 532127, India"}]},{"given":"Amit","family":"Verma","sequence":"additional","affiliation":[{"name":"Department of Computer Science Engineering, University Centre for Research Development, Chandigarh University, Mohali 140413, India"}]}],"member":"1968","published-online":{"date-parts":[[2022,8,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s10796-014-9492-7","article-title":"The Internet of Things: A survey","volume":"17","author":"Shancang","year":"2015","journal-title":"Inf. Syst. Front."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","article-title":"Internet of things(iot): A vision, architectural elements, and future directions","volume":"29","author":"Gubbi","year":"2013","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Ding, J., Nemati, M., Ranaweera, C., and Choi, J. (2020). IoT Connectivity Technologies and Applications: A Survey. arXiv.","DOI":"10.1109\/ACCESS.2020.2985932"},{"key":"ref_4","unstructured":"IoT-A (2012). Converged Architectural Reference Model for the IoT v2.0, SAP."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"15582","DOI":"10.3390\/s131115582","article-title":"Data Management for the Internet of Things: Design Primitives and Solution","volume":"13","author":"Hayajneh","year":"2013","journal-title":"Sensors"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2011","DOI":"10.1109\/COMST.2018.2803740","article-title":"How Can Heterogeneous Internet of Things Build Our Future: A Survey","volume":"20","author":"Qiu","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"020004","DOI":"10.1063\/1.5002022","article-title":"Connectivity, Interoperability and Manageability Challenges in Internet of Things","volume":"1883","author":"Haseeb","year":"2017","journal-title":"AIP Conf. Proc."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Ait Abdelouahid, R., Chhiba, L., Marzak, A., Mamouni, A., and Sael, N. (2017, January 18\u201320). IoT Interoperability Architectures: Comparative Study. Proceedings of the First International Conference on Real Time Intelligent Systems, Casablanca, Morocco.","DOI":"10.1007\/978-3-319-91337-7_20"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1007\/s11036-018-1089-9","article-title":"Interoperability in Internet of Things: Taxonomies and Open Challenges","volume":"24","author":"Noura","year":"2019","journal-title":"Mob. Netw. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.clsr.2015.07.002","article-title":"Internet of Things: Privacy Issues Revisited","volume":"31","author":"Weber","year":"2015","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1032761","DOI":"10.1155\/2018\/1032761","article-title":"Towards Privacy Preserving IoT Environments: A Survey","volume":"2018","author":"Seliem","year":"2018","journal-title":"Hindawi Wirel. Commun. Mob. Comput."},{"key":"ref_12","first-page":"1617","article-title":"Scalability in Internet of Things: Features, Techniques and Research Challenges","volume":"13","author":"Gupta","year":"2017","journal-title":"Int. J. Comput. Intell. Res."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.procs.2018.10.168","article-title":"Towards Security on Internet of Things: Applications and Challenges in Technology","volume":"141","author":"Sadique","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_14","first-page":"5747136","article-title":"A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices","volume":"2019","author":"Kavianpour","year":"2019","journal-title":"J. Comput. Netw. Commun."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"4351603","DOI":"10.1155\/2018\/4351603","article-title":"Survey of Authentication and Authorization for the Internet of Things","volume":"2018","author":"Trnka","year":"2018","journal-title":"Secur. Commun. Netw."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Atwady, Y., and Hammoudeh, M. (2017, January 19\u201320). A Survey on Authentication Techniques for the Internet of Things. Proceedings of the International Conference on Future Networks and Distributed Systems ICFNDS\u201917, Cambridge, UK.","DOI":"10.1145\/3102304.3102312"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"El-Hajj, M., Fadlallah, A., Chamoun, M., and Serhrouchni, A. (2019). A Survey of Internet of Things (IoT) Authentication Schemes. Sensors, 19.","DOI":"10.3390\/s19051141"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Capra, M., Bussolino, B., Marchisio, A., Shafique, M., Masera, G., and Martina, M. (2020). An Updated Survey of Efficient Hardware Architectures for Accelerating Deep Convolutional Neural Networks. Future Internet, 12.","DOI":"10.3390\/fi12070113"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Alabdan, R. (2020). Phishing Attacks Survey: Types, Vectors, and Technical Approaches. Future Internet, 12.","DOI":"10.3390\/fi12100168"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Ghazal, T.M., Hasan, M.K., Alshurideh, M.T., Alzoubi, H.M., Ahmad, M., Akbar, S.S., Al Kurdi, B., and Akour, I.A. (2021). IoT for Smart Cities: Machine Learning Approaches in Smart Healthcare\u2014A Review. Future Internet, 13.","DOI":"10.3390\/fi13080218"},{"key":"ref_21","unstructured":"(2022, July 26). Available online: https:\/\/libguides.umn.edu\/systematicreviews."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Gill, A.Q., Behbood, V., Ramadan-Jradi, R., and Beydoun, G. (2017, January 22\u201323). IoT architectural concerns: A systematic review. Proceedings of the Second International Conference on Internet of Things, Data and Cloud Computing (ICC\u201917), Cambridge, UK.","DOI":"10.1145\/3018896.3025166"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Adrianto, D., and Lin, F.J. (2015, January 14\u201316). Analysis of security protocols and cor-responding cipher suites in ETSI M2M standards. Proceedings of the 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy.","DOI":"10.1109\/WF-IoT.2015.7389152"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.csi.2015.09.001","article-title":"A security gateway application for End-to-End M2M communications","volume":"44","author":"Chen","year":"2016","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_25","unstructured":"Joachim, W.W. (2022, July 26). Internet-of-Things Architecture IoTA Project Deliverable D1.2-Initial Architectural Reference Model for IoT. Available online: https:\/\/cocoa.ethz.ch\/downloads\/2014\/01\/1360_D1%202_Initial_architectural_reference_model_for_IoT.pdf."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Saad, M., and Soomro, T.R. (2017). Cyber Security Andinternet of Things. Pak. J. Eng. Technol. Sci., 7.","DOI":"10.22555\/pjets.v7i1.2084"},{"key":"ref_27","first-page":"9324035","article-title":"Internet of Things: Architectures, Protocols, and Applications","volume":"2017","author":"Sethi","year":"2017","journal-title":"J. Electr. Comput. Eng."},{"key":"ref_28","first-page":"55","article-title":"Architecting the Internet of Things: State of the Art","volume":"36","author":"Romdhani","year":"2015","journal-title":"Robot. Sens. Clouds"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/978-3-319-30913-2_15","article-title":"Middleware Technology for IoT Systems:Challenges and Perspectives Toward 5G","volume":"8","author":"Amaral","year":"2016","journal-title":"Internet Things (IoT) 5G Mob. Technol."},{"key":"ref_30","first-page":"2874","article-title":"A middleware based architecture for the industrialinternet of things","volume":"10","author":"Ungurean","year":"2016","journal-title":"KSII Trans. Internet Inf. Syst. (TIIS)"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Xiao, L., Xiao, N., Li, M., Xie, S., Hou, K., and Li, Y. (2020, January 15\u201317). Architecture and Implementation of IoT Middlewarefor Ground Support Systems in Launch Site. Proceedings of the 2020 International Conference on Sensing, Measurement & Data Analytics in the Era of Artificial Intelligence (ICSMD), Xi\u2019an, China.","DOI":"10.1109\/ICSMD50554.2020.9261717"},{"key":"ref_32","first-page":"1108","article-title":"A Middleware based on Service Oriented Architec-ture for Heterogeneity Issues within the Internet of Things (MSOAH-IoT)","volume":"32","author":"Mesmoudi","year":"2020","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Mishra, S.K., and Sarkar, A. (J. King Saud Univ.-Comput. Inf. Sci., 2021). Service-oriented architecture for internet of things: A semantic approach, J. King Saud Univ.-Comput. Inf. Sci., in press.","DOI":"10.1016\/j.jksuci.2021.09.024"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Lan, L., Li, F., Wang, B., Zhang, L., and Shi, R. (2014, January 4\u20136). An Event-Driven Service-Oriented Architecture for the Internet of Things. Proceedings of the 2014 Asia-Pacific Services Computing Conference, Fuzhou, China.","DOI":"10.1109\/APSCC.2014.34"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Abd Rahim, M.R., Rashid, R.A., Rateb, A.M., Sarijari, M.A., Abdullah, A.S., Hamid, A.H.F.A., Sayuti, H., and Fisal, N. (2018). Service-Oriented Architecturefor IoT Home Area Networking in 5G. Fundam. Requir. Enabling Technol. Oper. Manag., 577\u2013602.","DOI":"10.1002\/9781119333142.ch16"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Antao, L., Pinto, R., Reis, J., and Gon\u00e7alves, G. (2018, January 9\u201313). Requirements for Testing and Validating the IndustrialInternet of Things. Proceedings of the 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), V\u00e4ster\u00e5s, Sweden.","DOI":"10.1109\/ICSTW.2018.00036"},{"key":"ref_37","first-page":"1","article-title":"Overview of Spintronic Sensors, Internet of Things, and Smart Living (2016)","volume":"55","author":"Liu","year":"2019","journal-title":"IEEE Trans. Magn."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"3594","DOI":"10.1016\/j.comnet.2012.07.010","article-title":"The Social Internet of Things (SIoT)\u2013When social networks meet the Internet of Things: Concept, architecture and network characterization","volume":"56","author":"Atzori","year":"2012","journal-title":"Comput. Netw."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"101223","DOI":"10.1016\/j.pmcj.2020.101223","article-title":"An approach to compute the scope of a social object in a Multi-IoT scenario","volume":"67","author":"Cauteruccio","year":"2020","journal-title":"Pervasive Mob. Comput."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Ursino, D., and Virgili, L. (2020). Humanizing IoT: Defining the Profile and the Reliability of a Thing in a Multi-IoT Scenario. Toward Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications, Springer.","DOI":"10.1007\/978-3-030-24513-9_4"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.future.2020.08.010","article-title":"A framework for anomaly detection and classification in Multiple IoT scenarios","volume":"114","author":"Cauteruccio","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_42","first-page":"2","article-title":"Internet of Things (IoT) System Architecture and Technologies","volume":"10","author":"Hakim","year":"2018","journal-title":"White Pap."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Al-Sarawi, S., Anbar, M., Alieyan, K., and Alzubaidi, M. (2017, January 17\u201318). Internet of Things (IoT) communication protocols: Review. Proceedings of the 2017 8th International Conference on Information Technology (ICIT), Amman, Jordan.","DOI":"10.1109\/ICITECH.2017.8079928"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"He\u0111i, I., \u0160peh, I., and \u0160arabok, A. (2017, January 22\u201326). IoT network protocols com-parison for the purpose of IoT constrained networks. Proceedings of the 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia.","DOI":"10.23919\/MIPRO.2017.7973477"},{"key":"ref_45","unstructured":"Sharma, S., and Kumar, S. (2020, January 29\u201331). A Review on IoT:Protocols, Architecture, Technologies, Application and Research Chal-lenges. Proceedings of the 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Geng, H. (2016). Networking protocols and standardsfor internet of things. Internet of Things and Data Analytics Handbook, John Wiley & Sons, Inc.","DOI":"10.1002\/9781119173601"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"201071","DOI":"10.1109\/ACCESS.2020.3035849","article-title":"The Use of MQTT in M2M and IoT Systems: A Survey","volume":"8","author":"Mishra","year":"2020","journal-title":"IEEE Access"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"16393","DOI":"10.1109\/ACCESS.2017.2742020","article-title":"A lightweight XMPP publish\/subscribe scheme for resource-constrained IoT devices","volume":"5","author":"Wang","year":"2017","journal-title":"IEEE Access"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Nikolov, N. (2020, January 16\u201318). Research of MQTT, CoAP, HTTP and XMPP IoT communication protocols for embedded system. Proceedings of the 2020 XXIX International Scientific Conference Electronics (ET), Sozopol, Bulgaria.","DOI":"10.1109\/ET50336.2020.9238208"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Uy, N.Q., and Nam, V.H. (2019, January 12\u201313). A comparison of AMQP and MQTT protocols forInternet of Things. Proceedings of the 2019 6th NAFOSTED Conference on Information and Computer Science (NICS), Hanoi, Vietnam.","DOI":"10.1109\/NICS48868.2019.9023812"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Naik, N. (2017, January 11\u201313). Choice of effective messaging protocols for IoT systems:MQTT, CoAP, AMQP and HTTP. Proceedings of the 2017 IEEE International Systems Engineering Symposium (ISSE), Vienna, Austria.","DOI":"10.1109\/SysEng.2017.8088251"},{"key":"ref_52","unstructured":"Coetzee, L., Oosthuizen, D., and Mkhize, B. (2018, January 9\u201311). An Analysis ofCoAP as Transport in an Internet of Things Environment. Proceedings of the 2018 IST-Africa Week Conference (IST-Africa), Gaborone, Botswana."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Rahman, R.A., and Shah, B. (2016, January 15\u201316). Security analysis of IoT protocols: A focus in CoAP. Proceedings of the 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), Muscat, Oman.","DOI":"10.1109\/ICBDSC.2016.7460363"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Alaerjan, A., Kim, D.K., and Al Kafaf, D. (2017, January 4\u20138). Modeling functionalbehaviors of DDS. Proceedings of the 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI), San Francisco, CA, USA.","DOI":"10.1109\/UIC-ATC.2017.8397656"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Ho, M.H., Yen, H.C., Lai, M.Y., and Liu, Y.T. (2021, January 16\u201319). Imple-mentation of DDS Cloud Platform for Real-time Data Acquisition of Sensors. Proceedings of the 2021 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Hualien City, Taiwan.","DOI":"10.1109\/ISPACS51563.2021.9650986"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Jara, A.J., Martinez-Julia, P., and Skarmeta, A. (2012, January 4\u20136). Light-Weight Multicast DNS and DNS-SD (lmDNS-SD): IPv6-Based Resource and Service Discovery for the Web of Things. Proceedings of the 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Palermo, Italy.","DOI":"10.1109\/IMIS.2012.200"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","article-title":"Internet of Things: A Survey on Enabling Technologies, Protocols and Applications","volume":"17","author":"Guizani","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Achir, M., Abdelli, A., and Mokdad, L. (2020, January 27\u201329). A taxonomy of service discovery approaches in IoT. Proceedings of the 2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM), Reims, France.","DOI":"10.1109\/WINCOM50532.2020.9272512"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Purnama, B., Budiarto, R., Stiawan, D., and Hanapi, D. (2018, January 2\u20134). Monitoring Connectivity of In-ternet of Things Device on Zigbee Protocol. Proceedings of the 2018 International Conference on Electrical Engineering and Computer Science (ICECOS), Pangkal, Indonesia.","DOI":"10.1109\/ICECOS.2018.8605225"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Chandan, A.R., and Khairnar, V.D. (2018, January 11\u201312). Bluetooth Low Energy(BLE) Crackdown Using IoT. Proceedings of the 2018 International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India.","DOI":"10.1109\/ICIRCA.2018.8597189"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Vagdevi, P., Nagaraj, D., and Prasad, G.V. (2017, January 10\u201311). Home: IOT based homeautomation using NFC. Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India.","DOI":"10.1109\/I-SMAC.2017.8058301"},{"key":"ref_62","unstructured":"(2016). IEEE Standard for Low-Rate Wireless Networks (Standard No. 802.15.4-2015)."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Geng, H. (2016). IPv6 for IoT and gatewa. Internet of Things and Data Analytics Handbook, Wiley.","DOI":"10.1002\/9781119173601"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"McGee, K., and Collier, M. (2019, January 15\u201318). 6LoWPAN Forwarding Techniques for IoT. Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland.","DOI":"10.1109\/WF-IoT.2019.8767174"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Mahmud, M.A., Abdelgawad, A., and Yelamarthi, K. (2018, January 5\u20138). Improved RPL for IoT Applications. Proceedings of the 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS), Windsor, ON, Canada.","DOI":"10.1109\/MWSCAS.2018.8623879"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Masirap, M., Amaran, M.H., Yussoff, Y.M., Ab Rahman, R., and Hashim, H. (2016, January 30\u201331). Evaluation of reliable UDP-based transport protocols for Internet of Things (IoT). Proceedings of the 2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), Penang, Malaysia.","DOI":"10.1109\/ISCAIE.2016.7575063"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Porkodi, R., and Bhuvaneswari, V. (2014, January 6\u20137). The Internet of Things (IoT) Applications and Communication Enabling Technology Standards: An Overview. Proceedings of the 2014 International Conference on Intelligent Computing Applications, Coimbatore, India.","DOI":"10.1109\/ICICA.2014.73"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Giri, A., Dutta, S., Neogy, S., Dahal, K., and Pervez, Z. (2017, January 17\u201318). Internet of things (IoT): A survey on architecture, enabling technologies, applications and challenges. Proceedings of the 1st International Conference on Internet of Things and Machine Learning (IML \u201917), Liverpool, UK.","DOI":"10.1145\/3109761.3109768"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"1687","DOI":"10.1007\/s11277-020-07446-4","article-title":"Internet of Things (IoT), Applications and Challenges: A Comprehensive Review","volume":"114","author":"Khanna","year":"2020","journal-title":"Wirel. Pers. Commun."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"26521","DOI":"10.1109\/ACCESS.2017.2775180","article-title":"Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities","volume":"5","author":"Baker","year":"2017","journal-title":"IEEE Access"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Choi, J., Choi, C., Kim, S., and Ko, H. (2019, January 26\u201328). Medical Information Protection Frameworks for Smart Healthcare based on IoT. Proceedings of the 9th International Conference on Web Intelligence, Mining and Semantics, Seoul, Korea.","DOI":"10.1145\/3326467.3326496"},{"key":"ref_72","unstructured":"Ahmed, S., Ilyas, M., and Raja, M.Y.A. (2018, January 13\u201316). Internet ofThings: Applications in Smart Healthcare. Proceedings of the 9th International Conference on Society and Information Technology (IICSIT 2018), Orlando, FL, USA."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"100747","DOI":"10.1109\/ACCESS.2019.2930628","article-title":"5G-Based Smart Healthcare Network: Architecture, Tax-onomy, Challenges and Future Research Directions","volume":"7","author":"Ahad","year":"2019","journal-title":"IEEE Access"},{"key":"ref_74","unstructured":"Khaloufi, H., Abouelmehdi, K., and Beni-Hssane, A. (April, January 31). Fog Computing for Smart Healthcare data Analytics: An Urgent Necessity. Proceedings of the 3rd International Conference on Networking, Information Systems & Security, Marrakech, Morocco."},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Ma, X., Wang, Z., Zhou, S., Wen, H., and Zhang, Y. (2018, January 25\u201329). Intelligent Healthcare Systems Assisted by Data Analyticsand Mobile Computing. Proceedings of the 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol, Cyprus.","DOI":"10.1109\/IWCMC.2018.8450377"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"16849","DOI":"10.1109\/ACCESS.2021.3052850","article-title":"Secure Healthcare Data Aggregation and Transmission inIoT\u2014A Survey","volume":"9","author":"Ullah","year":"2021","journal-title":"IEEE Access"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Lytras, M.D., Chui, K.T., and Visvizi, A. (2019). Data Analytics in Smart Healthcare: The RecentDevelopments and Beyond. Appl. Sci., 9.","DOI":"10.3390\/app9142812"},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.glohj.2019.07.001","article-title":"Smart healthcare: Making medical care more intelligent","volume":"3","author":"Tian","year":"2019","journal-title":"Glob. Health J."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/S2212-5671(14)00223-8","article-title":"Role of Emerging Technology for Building Smart Hospital Information System","volume":"11","author":"Thakare","year":"2014","journal-title":"Procedia Econ. Financ."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"678","DOI":"10.1109\/ACCESS.2015.2437951","article-title":"The Internet of Things for Health Care: A Comprehensive Survey","volume":"3","author":"Islam","year":"2015","journal-title":"IEEE Access"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Udo, I.J., and Ekpenyong, M.E. (2020, January 14\u201316). Improving Emergency Healthcare Response using Real-Time Collaborative Technology. Proceedings of the 2020 4th International Conference on Medical and Health Informatics, Kamakura City, Japan.","DOI":"10.1145\/3418094.3418118"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MCE.2017.2755378","article-title":"Everything you wanted to know about smart health care: Evaluating the different technologies and components of the internet of things for better health","volume":"7","author":"Sundaravadivel","year":"2017","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Khodkari, H., Maghrebi, S.G., Asosheh, A., and Hosseinzadeh, M. (2018, January 17\u201319). Smart Healthcare and Quality of Service Challenges. Proceedings of the 2018 9th Inter-national Symposium on Telecommunications (IST), Tehran, Iran.","DOI":"10.1109\/ISTEL.2018.8661125"},{"key":"ref_84","first-page":"2","article-title":"Internet of things devices and issues in iot system development for healthcare","volume":"32","author":"Abdullah","year":"2021","journal-title":"Turk. J. Physiother. Rehabil."},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Saleem, J., Hammoudeh, M., Raza, U., Adebisi, B., and Ande, R. (2018, January 26\u201327). IoT standardisation: Challenges, perspectivesand solution. Proceedings of the 2nd International Conference on Future Networks and Distributed Systems (ICFNDS \u201918), Amman, Jordan.","DOI":"10.1145\/3231053.3231103"},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Atlam, H.F., and Wills, G.B. (2020). IoT Security, Privacy, Safety and Ethics. Digital Twin Technologies and Smart Cities, Springer.","DOI":"10.1007\/978-3-030-18732-3_8"},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Ahad, A., Tahir, M., Aman Sheikh, M., Ahmed, K.I., Mughees, A., and Numani, A. (2020). Technologies Trend towards 5G Network for SmartHealth-Care Using IoT: A Review. Sensors, 20.","DOI":"10.3390\/s20144047"},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"1362","DOI":"10.1109\/TWC.2006.1638657","article-title":"A novel random wireless packet multiple access method using cdma","volume":"5","author":"Schlegel","year":"2006","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"2715","DOI":"10.1109\/TCOMM.2017.2681662","article-title":"Compressive channel division multiple access for mtc under frequency-selective fading","volume":"65","author":"Choi","year":"2017","journal-title":"IEEE Trans. Commun."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1109\/JIOT.2018.2819645","article-title":"Millimeter-wave noma transmission in cellular m2m communications for internet of things","volume":"5","author":"Lv","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Osorio, C.A.C., Echeverry, G.A.I., Ossa, L.F.C., and Bedoya, O.H.F. (2020, January 25\u201327). Computational architecture of IoT data analytics for connected homebased on deep learning. Proceedings of the 10th Euro-American Conference on Telematics and Information Systems (EATIS \u201920), Aveiro, Portugal.","DOI":"10.1145\/3401895.3402055"},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"7483075","DOI":"10.1155\/2017\/7483075","article-title":"The Intelligent Healthcare Data ManagementSystem Using Nanosensors","volume":"2017","author":"Dorj","year":"2017","journal-title":"J. Sens."},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Kazmi, A., Jan, Z., Zappa, A., and Serrano, M. (2016, January 7). Overcoming the Heterogeneity in the Internet of Things for Smart Cities. Proceedings of the International Workshop on Interoperability and Open-Source Solutions, Stuttgart, Germany.","DOI":"10.1007\/978-3-319-56877-5_2"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"652","DOI":"10.1016\/j.adhoc.2006.11.005","article-title":"\u2018MeshUp\u2019: Self-organizing meshbased topologies for next generation radio access networks","volume":"5","author":"Ghosh","year":"2007","journal-title":"Ad Hoc Netw."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1016\/j.adhoc.2007.04.007","article-title":"Safari: A self-organizing, hierarchical architecture for scalable ad hoc networking","volume":"6","author":"Du","year":"2008","journal-title":"Ad Hoc Netw."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.adhoc.2007.11.011","article-title":"On-demand routing and channel assignment in multi-channel mobile ad hoc networks","volume":"7","author":"Gong","year":"2009","journal-title":"Ad Hoc Netw."},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.adhoc.2014.11.015","article-title":"TDOCP: A two-dimensional optimization integrating channel assignment and power control for large-scale WLANs with dense users","volume":"26","author":"Jiang","year":"2015","journal-title":"Ad Hoc Netw."},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.comnet.2015.11.006","article-title":"DAFNES: A distributed algorithm for network energy saving based on stress-centrality","volume":"94","author":"Patota","year":"2016","journal-title":"Comput. Netw."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","article-title":"SVELTE: Real-time intrusion detection in the Internet of Things","volume":"11","author":"Raza","year":"2013","journal-title":"Ad Hoc Netw."},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"1461","DOI":"10.1109\/TII.2014.2306331","article-title":"A distributed consensus algorithm for decision making in serviceoriented Internet of Things","volume":"10","author":"Li","year":"2014","journal-title":"IEEE Trans. Ind. Informat."},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1007\/s00607-012-0239-3","article-title":"Process Interoperability in Healthcare Systemswith Dynamic Semantic Web Services","volume":"95","author":"Khan","year":"2013","journal-title":"Computing"},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/s11277-011-0292-9","article-title":"Managed ecosystems of networked objects","volume":"58","author":"Hoebeke","year":"2011","journal-title":"Wirel. Pers.Commun."},{"key":"ref_103","unstructured":"Tolk, A. (2004). Composable mission spaces and M&S repositories\u2013applicability of open standards. Spring Simulation Interoperability Workshop, Springer."},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Ishaq, I., Hoebeke, J., Moerman, I., and Demeester, P. (2012, January 20\u201323). Internet of things virtual networks: Bringing network virtualization to constrained devices. Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, Besancon, France.","DOI":"10.1109\/GreenCom.2012.152"},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Ahmed, S.M., and Rajput, A. (2020). Threats to patients\u2019 privacy in smart healthcareenvironment. Innovation in Health Informatics, Academic Press.","DOI":"10.1016\/B978-0-12-819043-2.00016-2"},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Ranjith, J., and Mahantesh, K. (2019, January 13\u201314). Privacy and Security issues in Smart HealthCare. Proceedings of the 2019 4th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT), Mysuru, India.","DOI":"10.1109\/ICEECCOT46775.2019.9114681"},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"2143897","DOI":"10.1155\/2018\/2143897","article-title":"Towards Smart Healthcare: Patient Data Pri-vacy and Security in Sensor-Cloud Infrastructure Survey","volume":"2018","author":"Masood","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_108","first-page":"330","article-title":"Survey on Smart Healthcare: An Application of IoT","volume":"8","author":"Sharma","year":"2017","journal-title":"Int. J. Emerg. Technol."},{"key":"ref_109","doi-asserted-by":"crossref","unstructured":"Gia, T.N., Rahmani, A.M., Westerlund, T., Liljeberg, P., and Tenhunen, H. (2015, January 13\u201315). Fault Tolerant and Scalable IoT-based Architecturefor Health Monitoring. Proceedings of the 2015 IEEE Sensors Applications Symposium (SAS), Zadar, Croatia.","DOI":"10.1109\/SAS.2015.7133626"},{"key":"ref_110","first-page":"1","article-title":"Based Real Time Remote Health Monitoring Systems: A Review on Patients Prioritization and Related \u201cBig Data\u201d UsingBody Sensors information and Communication Technology","volume":"42","author":"Kalid","year":"2018","journal-title":"J. Med. Syst."},{"key":"ref_111","doi-asserted-by":"crossref","first-page":"103251","DOI":"10.1016\/j.jbi.2019.103251","article-title":"A hierarchical, scalable architecture for areal-time monitoring system for an electrocardiography, using context-aware computing","volume":"96","author":"Borujeni","year":"2019","journal-title":"J. Biomed. Inform."},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"31010","DOI":"10.1109\/ACCESS.2019.2899323","article-title":"Secure Edge of Things for Smart Healthcare Surveillance Framework","volume":"7","author":"Alabdulatif","year":"2019","journal-title":"IEEE Access"},{"key":"ref_113","doi-asserted-by":"crossref","unstructured":"Tseng, C.-L., and Lin, F.J. (2018, January 5\u20138). Extending scalability of IoT\/M2M platforms with Fog computing. Proceedings of the 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore.","DOI":"10.1109\/WF-IoT.2018.8355143"},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"Shif, L., and Wang, F. (2018, January 23\u201327). Improvement of security and scalability for IoT network using SD-VPN. Proceedings of the NOMS 2018\u20142018 IEEE\/IFIP Network Operations and Management Symposium, Taipei, Taiwan.","DOI":"10.1109\/NOMS.2018.8406192"},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MS.2017.4","article-title":"Scalable-Application Design for the IoT","volume":"34","author":"Venkatesh","year":"2017","journal-title":"IEEE Softw."},{"key":"ref_116","doi-asserted-by":"crossref","first-page":"8182","DOI":"10.1109\/JIOT.2019.2935189","article-title":"IoT: Internet of Threats?: A survey of practical security vulnerabilities in real IoT devices","volume":"6","author":"Meneghello","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"2483","DOI":"10.1109\/JIOT.2017.2767291","article-title":"Evaluating Critical Security Issues of the IoTWorld: Present and Future Challenges","volume":"5","author":"Frustaci","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Lu, Y., and Sinnott, R.O. (2020). Security and privacy solutions forsmart healthcare systems. Innovation in Health Informatics, Academic Press.","DOI":"10.1016\/B978-0-12-819043-2.00008-3"},{"key":"ref_119","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/MIC.2021.3051675","article-title":"Security and Privacy in IoT SmartHealthcare","volume":"25","author":"Karunarathne","year":"2021","journal-title":"IEEE Internet Comput."},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"259","DOI":"10.3390\/iot1020016","article-title":"IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework","volume":"1","author":"Wheelus","year":"2020","journal-title":"IoT"},{"key":"ref_121","doi-asserted-by":"crossref","first-page":"10250","DOI":"10.1109\/JIOT.2020.2997651","article-title":"An In-Depth Analysis of IoT Security Requirements, Challenges and their Countermeasures via Software Defined Security","volume":"7","author":"Iqbal","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_122","doi-asserted-by":"crossref","unstructured":"Shivraj, V.L., Rajan, M.A., Singh, M., and Balamuralidhar, P. (2015, January 17\u201319). One timepassword authentication scheme based on elliptic curves for internet of things (iot). Proceedings of the 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), Riyadh, Saudi Arabia.","DOI":"10.1109\/NSITNSW.2015.7176384"},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.comnet.2016.02.007","article-title":"GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications","volume":"99","author":"Lai","year":"2016","journal-title":"Comput. Netw."},{"key":"ref_124","doi-asserted-by":"crossref","first-page":"1327","DOI":"10.1109\/JIOT.2017.2703088","article-title":"Mutual Authentication in IoT Systems Using Physical Unclonable Functions","volume":"4","author":"Aman","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_125","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/JIOT.2016.2619679","article-title":"S2M: A Lightweight Acoustic Fingerprintsbased Wireless Device Authentication Protocol","volume":"4","author":"Chen","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_126","doi-asserted-by":"crossref","unstructured":"Wallrabenstein, J.R. (2016, January 22\u201324). Practical and Secure IoT Device Authentication Using Physical Unclonable Functions. Proceedings of the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria.","DOI":"10.1109\/FiCloud.2016.22"},{"key":"ref_127","doi-asserted-by":"crossref","first-page":"2710","DOI":"10.1016\/j.adhoc.2013.05.003","article-title":"DTLS based security and two-way authentication for the Internet of Things","volume":"11","author":"Kothmayr","year":"2013","journal-title":"Ad Hoc Netw."},{"key":"ref_128","unstructured":"(2022, July 26). DRAFT\u2013Controlled Distribution, White Paper, The Internet of Things Reference Model, \u00a9 2014 Cisco and\/or Its Affiliates. Available online: https:\/\/dl.icdst.org\/pdfs\/files4\/0f1d1327c5195d1922175dd77878b9fb.pdf."},{"key":"ref_129","unstructured":"(2022, July 26). Building the Internet of Things, White Paper, \u00a9 2013 Cisco and\/or Its Affiliates. Available online: https:\/\/www.cisco.com."},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/bs.adcom.2018.10.006","article-title":"Technical aspects of blockchain and IoT","volume":"115","author":"Atlam","year":"2019","journal-title":"Adv. Comput."},{"key":"ref_131","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","article-title":"Current research on Internet of Things (IoT) security: A survey","volume":"148","author":"Noor","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_132","doi-asserted-by":"crossref","first-page":"118433","DOI":"10.1109\/ACCESS.2020.3004790","article-title":"A Novel Smart Healthcare Design, Simulation, and Implementation Using Healthcare 4.0 Processes","volume":"8","author":"Kumar","year":"2020","journal-title":"IEEE Access"},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"109986","DOI":"10.1109\/ACCESS.2021.3101579","article-title":"Review of Algorithms for Artificial Intelligence on Low Memory Devices","volume":"9","author":"Radanliev","year":"2021","journal-title":"IEEE Access"},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"60117","DOI":"10.1109\/ACCESS.2020.2982318","article-title":"Trust and Reputation in the Internet of Things: State-of-the-Art and Research Challenges","volume":"8","author":"Fortino","year":"2020","journal-title":"IEEE Access"},{"key":"ref_135","unstructured":"Corradini, E., Nicolazzo, S., Nocera, A., Ursino, D., and Virgili, L. (2021). Increasing protection and autonomy in the IoT through a two-tier blockchain framework. CEUR Workshop Proceedings, Sun SITE Central Europe."},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1007\/s12626-021-00086-5","article-title":"Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things","volume":"15","author":"Radanliev","year":"2021","journal-title":"Rev. Socionetwork Strateg."}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/15\/9\/309\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,2]],"date-time":"2024-10-02T19:59:41Z","timestamp":1727899181000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/15\/9\/309"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,29]]},"references-count":136,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2022,9]]}},"alternative-id":["a15090309"],"URL":"https:\/\/doi.org\/10.3390\/a15090309","relation":{},"ISSN":["1999-4893"],"issn-type":[{"type":"electronic","value":"1999-4893"}],"subject":[],"published":{"date-parts":[[2022,8,29]]}}}