{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T18:00:04Z","timestamp":1775152804785,"version":"3.50.1"},"reference-count":107,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T00:00:00Z","timestamp":1570233600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["LHT"],"published-print":{"date-parts":[[2019,10,5]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. To enable the vision of IoT, it utilizes technologies such as ubiquitous computing, context awareness, RFID, WSN, embedded devices, CPS, communication technologies, and internet protocols. IoT is considered to be the future internet, which is significantly different from the Internet we use today. The purpose of this paper is to provide up-to-date literature on trends of IoT research which is driven by the need for convergence of several interdisciplinary technologies and new applications.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>A comprehensive IoT literature review has been performed in this paper as a survey. The survey starts by providing an overview of IoT concepts, visions and evolutions. IoT architectures are also explored. Then, the most important components of IoT are discussed including a thorough discussion of IoT operating systems such as Tiny OS, Contiki OS, FreeRTOS, and RIOT. A review of IoT applications is also presented in this paper and finally, IoT challenges that can be recently encountered by researchers are introduced.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Studies of IoT literature and projects show the disproportionate importance of technology in IoT projects, which are often driven by technological interventions rather than innovation in the business model. There are a number of serious concerns about the dangers of IoT growth, particularly in the areas of privacy and security; hence, industry and government began addressing these concerns. At the end, what makes IoT exciting is that we do not yet know the exact use cases which would have the ability to significantly influence our lives.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This survey provides a comprehensive literature review on IoT techniques, operating systems and trends.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/lht-12-2018-0200","type":"journal-article","created":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T09:19:26Z","timestamp":1570612766000},"page":"5-66","source":"Crossref","is-referenced-by-count":83,"title":["The Internet of Things (IoT): a survey of techniques, operating systems, and trends"],"prefix":"10.1108","volume":"38","author":[{"given":"Elham Ali","family":"Shammar","sequence":"first","affiliation":[]},{"given":"Ammar Thabit","family":"Zahary","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020040611352845000_ref001","first-page":"105","article-title":"Dynamic resource provisioning through Fog micro datacenter","year":"2015"},{"key":"key2020040611352845000_ref002","first-page":"414","article-title":"Cloud of Things: integrating Internet of Things and cloud computing and the issues involved","year":"2014"},{"key":"key2020040611352845000_ref003","first-page":"1","article-title":"MeFoRE: QoE based resource estimation at Fog to enhance QoS in IoT","year":"2016"},{"issue":"3","key":"key2020040611352845000_ref004","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MCOM.2015.7060516","article-title":"The Internet of Bio-Nano Things","volume":"53","year":"2015","journal-title":"IEEE Communications Magazine"},{"issue":"4","key":"key2020040611352845000_ref005","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","article-title":"Internet of Things: a survey on enabling technologies, protocols, and applications","volume":"17","year":"2015","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"key2020040611352845000_ref006","first-page":"685","article-title":"Internet of Things (IoT) communication protocols","year":"2017"},{"issue":"9","key":"key2020040611352845000_ref007","doi-asserted-by":"crossref","first-page":"2865","DOI":"10.1109\/JSEN.2016.2519924","article-title":"TinyOS-new trends, comparative views, and supported sensing applications: a review","volume":"16","year":"2016","journal-title":"IEEE Sensors Journal"},{"key":"key2020040611352845000_ref008","first-page":"427","article-title":"Principle application and vision in Internet of Things (IoT)","year":"2015"},{"issue":"15","key":"key2020040611352845000_ref009","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The Internet of Things: a survey","volume":"54","year":"2010","journal-title":"Computer Networks"},{"key":"key2020040611352845000_ref010","doi-asserted-by":"crossref","unstructured":"Awan, I. and Younas, M. (2013), \u201cTowards QoS in Internet of Things for delay sensitive information\u201d, in Matera, M. and Rossi, G. (Eds), International Conference on Mobile Web and Information Systems, Trends in Mobile Web Information Systems, MobiWIS 2013. Communications in Computer and Information Science, Vol. 183, Springer, Cham, pp. 86-94.","DOI":"10.1007\/978-3-319-03737-0_10"},{"key":"key2020040611352845000_ref011","first-page":"1","article-title":"Middleware solutions in WSN: the IoT oriented approach in the ICSI project","year":"2013"},{"key":"key2020040611352845000_ref012","first-page":"60","article-title":"A study on cloud based Internet of Things: CloudIoT","year":"2015"},{"issue":"6","key":"key2020040611352845000_ref013","doi-asserted-by":"crossref","first-page":"4428","DOI":"10.1109\/JIOT.2018.2815038","article-title":"RIOT: an open source operating system for low-end embedded devices in the IoT","volume":"5","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"key2020040611352845000_ref014","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s11277-011-0288-5","article-title":"Internet of Things: applications and challenges in technology and standardization","volume":"58","year":"2011","journal-title":"Wireless Personal Communications"},{"key":"key2020040611352845000_ref015","first-page":"127","article-title":"Research on data mining models for the Internet of Things","year":"2010"},{"key":"key2020040611352845000_ref016","first-page":"23","article-title":"On the integration of cloud computing and Internet of Things","year":"2014"},{"issue":"5","key":"key2020040611352845000_ref017","doi-asserted-by":"crossref","first-page":"1185","DOI":"10.1109\/JIOT.2017.2701408","article-title":"QoS-aware deployment of IoT applications through the fog","volume":"4","year":"2017","journal-title":"IEEE Internet of Things Journal"},{"key":"key2020040611352845000_ref018","first-page":"1000","article-title":"Challenges for data mining in distributed sensor networks","year":"2006"},{"key":"key2020040611352845000_ref019","doi-asserted-by":"crossref","unstructured":"Casado, L. and Tsigas, P. (2009), \u201cContikiSec: a secure network layer for wireless sensor networks under the Contiki Operating System\u201d, in J\u00f8sang, A., Maseng, T. and Knapskog, S.J. (Eds), Nordic Conference on Secure IT Systems, Identity and Privacy in the Internet Age, NordSec 2009, Lecture Notes in Computer Science, Vol. 5838, Springer, Berlin and Heidelberg, pp. 133-147.","DOI":"10.1007\/978-3-642-04766-4_10"},{"key":"key2020040611352845000_ref020","first-page":"21","article-title":"Challenges in middleware solutions for the Internet of Things","year":"2012"},{"issue":"3","key":"key2020040611352845000_ref021","doi-asserted-by":"crossref","first-page":"1750013","DOI":"10.1142\/S2424862217500130","article-title":"Theoretical foundations for cyber-physical systems: a literature review","volume":"2","year":"2017","journal-title":"Journal of Industrial Integration and Management"},{"issue":"4","key":"key2020040611352845000_ref022","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1109\/JIOT.2014.2337336","article-title":"A vision of IoT: applications, challenges, and opportunities with china perspective","volume":"1","year":"2014","journal-title":"IEEE Internet of Things Journal"},{"key":"key2020040611352845000_ref023","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.jii.2016.04.004","article-title":"Industrial information integration \u2013 a literature review 2006\u20132015","volume":"2","year":"2016","journal-title":"Journal of Industrial Information Integration"},{"issue":"6","key":"key2020040611352845000_ref024","doi-asserted-by":"crossref","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","article-title":"Fog and IoT: an overview of research opportunities","volume":"3","year":"2016","journal-title":"IEEE Internet of Things Journal"},{"key":"key2020040611352845000_ref025","first-page":"1082","article-title":"On-demand security configuration for IoT devices","year":"2016"},{"key":"key2020040611352845000_ref026","first-page":"205","article-title":"Efficient memory safety for TinyOS","year":"2007"},{"key":"key2020040611352845000_ref027","first-page":"176","article-title":"ELF: an efficient log-structured flash file system for micro sensor nodes","year":"2004"},{"issue":"4","key":"key2020040611352845000_ref028","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of Things in industries: a survey","volume":"10","year":"2014","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"key2020040611352845000_ref029","first-page":"60","article-title":"Software-defined wireless sensor networks and Internet of Things standardization synergism","year":"2015"},{"key":"key2020040611352845000_ref030","first-page":"1","article-title":"Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing","year":"2017"},{"key":"key2020040611352845000_ref031","first-page":"1","year":"2016"},{"key":"key2020040611352845000_ref032","first-page":"618","article-title":"Blockchain for IoT security and privacy: the case study of a smart home","year":"2017"},{"key":"key2020040611352845000_ref033","first-page":"455","article-title":"Contiki \u2013 a lightweight and flexible operating system for tiny networked sensors","year":"2004"},{"key":"key2020040611352845000_ref095","unstructured":"Fosstrak.github (2018), \u201cFosstrak \u2013 Welcome\u201d, available at: http:\/\/fosstrak.github.io\/ (accessed August 20, 2018)."},{"key":"key2020040611352845000_ref034","first-page":"33","article-title":"Operating systems for IoT devices: a critical survey","year":"2015"},{"key":"key2020040611352845000_ref035","first-page":"155","article-title":"Developing IoT applications in the fog: a distributed dataflow approach","year":"2015"},{"issue":"7","key":"key2020040611352845000_ref036","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","article-title":"Internet of Things (IoT): a vision, architectural elements, and future directions","volume":"29","year":"2013","journal-title":"Future Generation Computer Systems"},{"issue":"7","key":"key2020040611352845000_ref037","first-page":"14","article-title":"A systematic review to merge discourses: Interoperability, integration and cyber-physical systems","volume":"9","year":"2018","journal-title":"Journal of Industrial Information Integration"},{"issue":"5","key":"key2020040611352845000_ref038","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1109\/JIOT.2015.2505901","article-title":"Operating systems for low-end devices in the Internet of Things: a survey","volume":"3","year":"2016","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"key2020040611352845000_ref039","doi-asserted-by":"publisher","DOI":"10.14738\/tmlai.54.3192","article-title":"A comparative study between operating systems (Os) for the Internet of Things (IoT)","volume":"5","year":"2017","journal-title":"Transactions on Machine Learning and Artificial Intelligence"},{"key":"key2020040611352845000_ref096","unstructured":"IPv6 (2018), \u201cUsing RFID and IPv6 | IPv6.com\u201d, available at: www.ipv6.com\/applications\/using-rfid-ipv6\/ (accessed August 21, 2018)."},{"issue":"2","key":"key2020040611352845000_ref040","doi-asserted-by":"crossref","first-page":"235","DOI":"10.3390\/jsan2020235","article-title":"IETF standardization in the field of the Internet of Things (IoT): a survey","volume":"2","year":"2013","journal-title":"Journal of Sensor and Actuator Networks"},{"key":"key2020040611352845000_ref041","first-page":"941","article-title":"Block chain based data security enhanced IoT server platform","year":"2018"},{"issue":"3","key":"key2020040611352845000_ref042","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1109\/TCE.2015.7298088","article-title":"AVIoT: web-based interactive authoring and visualization of indoor Internet of Things","volume":"61","year":"2015","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"9","key":"key2020040611352845000_ref043","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/MCOM.2016.7565271","article-title":"Internet of Things standardization in ITU and prospective networking technologies","volume":"54","year":"2016","journal-title":"IEEE Communications Magazine"},{"key":"key2020040611352845000_ref044","first-page":"11","article-title":"A survey on application layer protocols for the Internet of Things","volume":"3","year":"2015","journal-title":"Transaction on IoT and Cloud Computing"},{"key":"key2020040611352845000_ref045","first-page":"162","article-title":"TinySec: a link layer security architecture for wireless sensor networks","year":"2004"},{"key":"key2020040611352845000_ref046","unstructured":"Keller, T. (2011), \u201cMining the Internet of Things \u2013 detection of false-positive RFID tag reads using low-level reader data\u201d, PhD thesis, University of St. Gallen, School of Management."},{"key":"key2020040611352845000_ref047","first-page":"257","article-title":"Future internet: the Internet of Things Architecture, possible applications and key challenges","year":"2012"},{"issue":"1","key":"key2020040611352845000_ref048","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1080\/23270012.2016.1259967","article-title":"Shifting paradigm to service-dominant logic via Internet-of-Things with applications in the elevators industry","volume":"4","year":"2017","journal-title":"Journal of Management Analytics"},{"issue":"4","key":"key2020040611352845000_ref049","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","article-title":"The Internet of Things (IoT): applications, investments, and challenges for enterprises","volume":"58","year":"2015","journal-title":"Business Horizons"},{"key":"key2020040611352845000_ref050","first-page":"1243","article-title":"EPC vs IPv6 mapping mechanism","year":"2007"},{"issue":"2","key":"key2020040611352845000_ref051","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1109\/TII.2014.2306782","article-title":"QoS-aware scheduling of services-oriented Internet of Things","volume":"10","year":"2014","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"4","key":"key2020040611352845000_ref052","doi-asserted-by":"crossref","first-page":"2177","DOI":"10.1109\/TII.2012.2189222","article-title":"Compressed sensing signal and data acquisition in wireless sensor networks and Internet of Things","volume":"9","year":"2013","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"2","key":"key2020040611352845000_ref053","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s10796-014-9492-7","article-title":"The Internet of Things: a survey","volume":"17","year":"2015","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"key2020040611352845000_ref054","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1108\/IntR-07-2014-0173","article-title":"The Internet of Things: a security point of view","volume":"26","year":"2016","journal-title":"Internet Research"},{"key":"key2020040611352845000_ref055","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jii.2018.01.005","article-title":"5G Internet of Things: a survey","volume":"10","year":"2018","journal-title":"Journal of Industrial Information Integration"},{"key":"key2020040611352845000_ref056","first-page":"5779","article-title":"Leveraging TinyOS for integration in process automation and control systems","year":"2012"},{"key":"key2020040611352845000_ref057","first-page":"771","article-title":"A novel approach to IoT security based on immunology","year":"2013"},{"issue":"1","key":"key2020040611352845000_ref058","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1080\/23270012.2016.1214540","article-title":"Traversing knowledge networks: an algorithmic historiography of extant literature on the Internet of Things (IoT)","volume":"4","year":"2017","journal-title":"Journal of Management Analytics"},{"issue":"4","key":"key2020040611352845000_ref059","doi-asserted-by":"crossref","first-page":"1142","DOI":"10.1109\/TCSS.2018.2871694","article-title":"Fog computing approach for music cognition system based on machine learning algorithm","volume":"5","year":"2018","journal-title":"IEEE Transactions on Computational Social Systems"},{"issue":"3","key":"key2020040611352845000_ref060","doi-asserted-by":"crossref","first-page":"1750014","DOI":"10.1142\/S2424862217500142","article-title":"Cyber physical system (CPS)-based Industry 4.0: a survey","volume":"2","year":"2017","journal-title":"Journal of Industrial Integration and Management"},{"issue":"2","key":"key2020040611352845000_ref061","first-page":"2103","article-title":"Internet of Things (IoT) cybersecurity research: a review of current research topics","volume":"6","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"key":"key2020040611352845000_ref062","doi-asserted-by":"crossref","first-page":"5247","DOI":"10.1109\/ACCESS.2017.2689040","article-title":"Big IoT data analytics: architecture, opportunities, and open research challenges","volume":"5","year":"2017","journal-title":"IEEE Access"},{"key":"key2020040611352845000_ref063","first-page":"263","article-title":"A Framework for outlier mining in RFID data","year":"2007"},{"issue":"7","key":"key2020040611352845000_ref064","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","article-title":"Internet of Things: vision, applications and research challenges","volume":"10","year":"2012","journal-title":"Ad Hoc Networks"},{"key":"key2020040611352845000_ref065","first-page":"219","article-title":"A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT)","year":"2015"},{"key":"key2020040611352845000_ref066","first-page":"555","article-title":"An assessment of Internet of Things protocols for resource-constrained applications","year":"2016"},{"issue":"3","key":"key2020040611352845000_ref067","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MCE.2017.2684981","article-title":"IFCIoT: Integrated Fog Cloud IoT: a novel architectural paradigm for the future Internet of Things","volume":"6","year":"2017","journal-title":"IEEE Consumer Electronics Magazine"},{"key":"key2020040611352845000_ref068","doi-asserted-by":"crossref","first-page":"8459","DOI":"10.1109\/ACCESS.2018.2808324","article-title":"A survey on resource management in IoT operating systems","volume":"6","year":"2018","journal-title":"IEEE Access"},{"issue":"3","key":"key2020040611352845000_ref069","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1145\/1065887.1065892","article-title":"CCured: type-safe retrofitting of legacy software","volume":"27","year":"2005","journal-title":"ACM Transactions on Programming Languages and Systems"},{"issue":"1","key":"key2020040611352845000_ref070","first-page":"1","article-title":"IoT middleware: a survey on issues and enabling technologies","volume":"4","year":"2017","journal-title":"IEEE Internet of Things Journal"},{"key":"key2020040611352845000_ref071","first-page":"41","article-title":"Development of IoT security component for interoperability","year":"2017"},{"issue":"1","key":"key2020040611352845000_ref072","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1109\/SURV.2013.042313.00197","article-title":"Context aware computing for the Internet of Things: a survey","volume":"16","year":"2014","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"key2020040611352845000_ref073","first-page":"553","article-title":"ARMOUR: Large-scale experiments for IoT security amp; trust","year":"2016"},{"key":"key2020040611352845000_ref074","first-page":"324","article-title":"The Internet of Things (IOT) applications and communication enabling technology standards: an overview","year":"2014"},{"issue":"1-2","key":"key2020040611352845000_ref075","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.fcij.2017.02.001","article-title":"A survey of IoT cloud platforms","volume":"1","year":"2016","journal-title":"Future Computing and Informatics Journal"},{"issue":"1","key":"key2020040611352845000_ref076","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/JIOT.2015.2498900","article-title":"Middleware for Internet of Things: a survey","volume":"3","year":"2016","journal-title":"IEEE Internet of Things Journal"},{"key":"key2020040611352845000_ref077","article-title":"Memory safety and untrusted extensions for TinyOS","year":"2006"},{"key":"key2020040611352845000_ref094","unstructured":"Riot-os (2018), \u201cFile systems: RIOT documentation\u201d, available at: https:\/\/riot-os.org\/api\/group__sys__fs.html (accessed October 25, 2018)."},{"key":"key2020040611352845000_ref078","first-page":"369","article-title":"Comparison of IoT constrained devices operating systems: a survey","year":"2017"},{"key":"key2020040611352845000_ref079","first-page":"508","article-title":"A scalable distributed architecture towards unifying IoT applications","year":"2014"},{"key":"key2020040611352845000_ref080","first-page":"187","article-title":"EATT: Energy aware target tracking for wireless sensor networks using TinyOS","year":"2010"},{"key":"key2020040611352845000_ref081","article-title":"Internet of Things: architectures, protocols, and applications","volume":"2017","year":"2017","journal-title":"Journal of Electrical and Computer Engineering"},{"key":"key2020040611352845000_ref082","first-page":"287","article-title":"A survey of Internet-of-Things: future vision, architecture, challenges and services","year":"2014"},{"key":"key2020040611352845000_ref083","first-page":"51","article-title":"Blockchain: a game changer for securing IoT data","year":"2018"},{"key":"key2020040611352845000_ref084","article-title":"Network protocols, schemes, and mechanisms for Internet of Things (IoT): features, open challenges, and trends","volume":"2018","year":"2018","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"1","key":"key2020040611352845000_ref085","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/SURV.2013.103013.00206","article-title":"Data mining for Internet of Things: a survey","volume":"16","year":"2014","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"key2020040611352845000_ref086","first-page":"349","article-title":"Enabling large-scale storage in sensor networks with the coffee file system","year":"2009"},{"issue":"21","key":"key2020040611352845000_ref087","doi-asserted-by":"crossref","first-page":"2154","DOI":"10.19026\/rjaset.8.1213","article-title":"Qos by priority routing in Internet of Things","volume":"8","year":"2014","journal-title":"Research Journal of Applied Sciences, Engineering and Technology"},{"issue":"2","key":"key2020040611352845000_ref088","doi-asserted-by":"crossref","first-page":"1426","DOI":"10.1109\/TII.2014.2300346","article-title":"IoT and cloud computing in automation of assembly modeling systems","volume":"10","year":"2014","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"1","key":"key2020040611352845000_ref089","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1109\/TII.2013.2250510","article-title":"Data cleaning for RFID and WSN integration","volume":"10","year":"2014","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"2","key":"key2020040611352845000_ref090","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/s10796-014-9489-2","article-title":"The Internet of Things \u2013 a survey of topics and trends","volume":"17","year":"2015","journal-title":"Information Systems Frontiers"},{"issue":"4","key":"key2020040611352845000_ref091","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1080\/23270012.2018.1490211","article-title":"Healthcare data analysis system for regional medical union in smart city","volume":"5","year":"2018","journal-title":"Journal of Management Analytics"},{"issue":"1","key":"key2020040611352845000_ref092","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1080\/17517575.2015.1053416","article-title":"The design of an m-health monitoring system based on a cloud computing platform","volume":"11","year":"2017","journal-title":"Enterprise Information Systems"},{"key":"key2020040611352845000_ref093","first-page":"249","article-title":"TSAaaS: time series analytics as a service on IoT","year":"2014"},{"issue":"2","key":"key2020040611352845000_ref097","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1080\/23270012.2015.1029550","article-title":"An emerging technology\u2013wearable wireless sensor networks with applications in human health condition monitoring","volume":"2","year":"2015","journal-title":"Journal of Management Analytics"},{"key":"key2020040611352845000_ref098","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.jbi.2018.10.006","article-title":"The Internet of Things (IoT): informatics methods for IoT-enabled health care","volume":"87","year":"2018","journal-title":"Journal of Biomedical Informatics"},{"key":"key2020040611352845000_ref100","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/TSMC.2016.2586075","article-title":"Lifelogging data validation model for Internet of Things enabled personalized healthcare","volume":"48","year":"2018","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"key2020040611352845000_ref099","first-page":"747","article-title":"Study and application on the architecture and key technologies for IOT","year":"2011"},{"key":"key2020040611352845000_ref101","first-page":"617","article-title":"RFID networking mechanism using address management agent","year":"2008"},{"key":"key2020040611352845000_ref102","first-page":"1162","article-title":"Remote security management server for IoT devices","year":"2017"},{"key":"key2020040611352845000_ref103","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.jii.2016.03.004","article-title":"The Internet of Things in healthcare: an overview","volume":"1","year":"2016","journal-title":"Journal of Industrial Information Integration"},{"key":"key2020040611352845000_ref104","first-page":"201","article-title":"Searching in Internet of Things: vision and challenges","year":"2011"},{"key":"key2020040611352845000_ref105","first-page":"294","article-title":"Architecture of Internet of Things and its key technology integration based-on RFID","year":"2012"},{"issue":"2","key":"key2020040611352845000_ref106","doi-asserted-by":"crossref","first-page":"1527","DOI":"10.1109\/TII.2014.2306329","article-title":"CLOUDQUAL: a quality model for cloud services","volume":"10","year":"2014","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"2","key":"key2020040611352845000_ref107","doi-asserted-by":"crossref","first-page":"1506","DOI":"10.1109\/TII.2014.2305641","article-title":"Cloud service negotiation in Internet of Things environment: a mixed approach","volume":"10","year":"2014","journal-title":"IEEE Transactions on Industrial Informatics"}],"container-title":["Library Hi Tech"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/LHT-12-2018-0200\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/LHT-12-2018-0200\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:15:37Z","timestamp":1753395337000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/lht\/article\/38\/1\/5-66\/259513"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,5]]},"references-count":107,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,10,5]]}},"alternative-id":["10.1108\/LHT-12-2018-0200"],"URL":"https:\/\/doi.org\/10.1108\/lht-12-2018-0200","relation":{},"ISSN":["0737-8831"],"issn-type":[{"value":"0737-8831","type":"print"}],"subject":[],"published":{"date-parts":[[2019,10,5]]}}}