Revolutionary Strategies Analysis and Proposed System for Future Infrastructure in Internet of Things

: The Internet of Things (IoT) has changed the worldwide network of people, smart devices, intelligent things, data, and information as an emergent technology. IoT development is still in its early stages, and numerous interrelated challenges must be addressed. IoT is the unifying idea of embedding everything. The Internet of Things offers a huge opportunity to improve the world’s accessibility, integrity, availability, scalability, conﬁdentiality, and interoperability. However, securing the Internet of Things is a difﬁcult issue. The IoT aims to connect almost everything within the framework of a common infrastructure. This helps in controlling devices and, will allow device status to be updated everywhere and at any time. To develop technology via IoT, several critical scientiﬁc studies and inquiries have been carried out. However, many obstacles and problems remain to be tackled in order to reach IoT’s maximum potential. These problems and concerns must be taken into consideration in different areas of the IoT, such as implementation in remote areas, threats to the system, development support, social and environmental impacts, etc. This paper reviews the current state of the art in different IoT architectures, with a focus on current technologies, applications, challenges, IoT protocols, and opportunities. As a result, a detailed taxonomy of IoT is presented here which includes interoperability, scalability, security and energy efﬁciency, among other things. Moreover, the signiﬁcance of blockchains and big data as well as their analysis in relation to IoT, is discussed. This article aims to help readers and researchers understand the IoT and its applicability to the real world.


Introduction
The Internet of Things (IoT) is a concept that connects physical items to the Internet, allowing them to gather, process, and transfer data without the need for human interaction.The objective of the Internet of Things is to build a better environment for people in which items (physical objects; terminology such as an object, gadget, entity, and thing are interchangeable) around us can understand our preferences and likeness and act properly without explicit instructions.The exponential rise of the Internet of Things has been aided by significant advancements in low-cost sensor manufacture, communication protocols, embedded systems, actuators, and hardware downsizing.The cumulative user base of linked IoT devices is expected to hit one trillion devices worldwide by 2025, a five-fold increase in ten years, as shown in Figure 1.IoT is a vast collection of smart embedded devices that are connected to the Internet and provide unique services to meet the needs of users [1].IoT represents a transition from simply connecting end-user devices to the Internet to using the Internet to connect smart objects (also known as IoT devices) and allow them to communicate with one another and/or with humans while including a diverse set of applications and services.IoT platforms typically deploy a large number of smart devices, such as wearable sensors, Radio frequency identification system (RFID) devices and actuators to remotely control various physical, environmental and physiological quantities [2].IoT, which is based on the computer Internet, actually establishes the Internet by relying on RFID and radio data transfer technology to connect things.As a result, RFID is one of the most important IoT fundamental technologies.Things are allowed to communicate with each other within this network without the need for human intervention.The foundation of the Internet of Things is the automatic identification of objects as well as their interconnection and sharing of information via the computer Internet, which is based on RFID technology, which itself is simply a technology that allows objects to "talk."RFID tags are used in the IoT phase to store information with laws and interoperability that is automatically recorded in a central information system via a radio data communication system, allowing things to be identified and information to be exchanged and shared via the open Internet.To empower diverse remote monitoring systems, IoT devices often run in a long-term mode and connect wirelessly with each other and with a central fusion node.Remote sensing systems are typically battery-powered; limited battery power affects the system's efficiency, which leads to lower integration and consumer compliance [3].To address these constraints, acquired data should first be compressed before being sent to a fusion center using optimized paths to reduce high energy utilization.Advanced data compression and transmission techniques normally consume a significant amount of onboard energy; therefore, the chosen compression method must be able to provide long-term reliable monitoring while still reducing power consumption [4].Intelligent applications have been stretched from humans to the things that surround humans as information technology has progressed.Sensor networks, the Internet, mobile communications, cloud computing, intelligent information processing, and other established networking and information technologies are all part of the Internet of Things.By establishing an isomerous link between core and terminal networks, the Internet of Things focuses on information service, combining computer systems with observation of the physical world, cognition, influence, and control.The real, digital and virtual worlds, as well as human perception, are all connected.The IoT has much to offer in different fields of life and technology.IoT has a g deal of potential in terms of both enhancing technology and facilitating human bei Therefore, the IoT is a contemporary model that connects the next generation of tech logical advances with a collection of existing facilities.IoT technologies are almost infi thus allowing the cyber-world to easily merge with the real world [7].However, des As a result, there is no common concept of the Internet of Things, and current visions are unclear.The Internet of Things (IoT) is focused on the convergence of various standards and enabling technologies with various sensing, networking, storage, computing, and other capabilities [5].However, because of the fragmentation of standards and the diversity of deployed technologies, ensuring the complete connectivity of all is a major challenge.As a result, one of the major challenges of IoT growth is dynamic integration.Many standardization organizations, partnerships, academics and industries are working on IoT growth, innovation and standardization; however, there is still a need for a holistic system with integrated standards under a single IoT vision [6].
The IoT has much to offer in different fields of life and technology.IoT has a great deal of potential in terms of both enhancing technology and facilitating human beings.Therefore, the IoT is a contemporary model that connects the next generation of technological advances with a collection of existing facilities.IoT technologies are almost infinite, thus allowing the cyber-world to easily merge with the real world [7].However, despite the tremendous efforts of standardization agencies, associations, sectors, academics, and others, various challenges still need to be solved in order to achieve the full capacity of the IoT.Such problems should be viewed from multiple angles, such as technology support, implementation, and market models as well as social and environmental effects.Many of the major problems facing IoT contribute to traffic loads and different traffic models [8].More and more devices are connecting to the Internet each day, and devices are becoming the main producers and consumers of traffic.This gives rise to traffic specifications and the need for new traffic models, protocols, network capacities, protection measures, etc. Simplification is required, and adoption of new Internet Protocol (IP) architecture enables smooth networking and efficient management in the heterogeneous network (HetNet) environment [9].Some other IoT technology issues include system recognition, addressing, interoperability, usability, management, energy consumption, stability, privacy, large scales and more.In addition, potential IoT implementations need to achieve a sustainable smart planet with an emphasis on green IoT supporting technology, which is another major issue.With recent developments in internet technologies, IoT technology is gradually affecting our everyday lives and starting to deliver fascinating and beneficial new services.According to the key IoT visions and supporting technologies, this article includes reports on the state of the art, emerging developments, and open issues [10].Blockchains, or decentralized distributed ledgers, are a game-changing technology that might help solve IoT security issues.A blockchain-based approach to IoT networks might address many of the issues with the existing paradigm while also increasing security [11].The use of blockchains in IoT security allows for direct information exchange between connected devices rather than communicating through a centralized network, reducing the IoT's vulnerability to cyber-attacks.According to a Gartner report, healthcare, transportation, and energy have the greatest rates of blockchain use among IoT-enabled firms in the United States.As a result, this paper provides readers with helpful guidelines for understanding the IoT paradigm and related open problems, as well as potential research and development opportunities [12].
The principal contribution of this article is to determine the scope, depth and variety of current IoT research.The rapid development of IoT technology has created several engineering and scientific opportunities, as well as related challenges.This requires increased research efforts from a variety of sectors including academia, industry, and government.The combined efforts of these industries should inevitably result in the development of the new protocols, systems, and services that are desperately needed to meet the IoT's difficulties.Recognizing the advancements in IoT technology and future applications, we set out to investigate the benefits, drawbacks, possibilities, and challenges that IoT technology, protocols, and applications bring.We have chosen a large number of research papers, and this article primarily outlines and provides an overview of the life-changing phenomenon of the Internet of Things, as well as the various technologies, challenges, and real-world applications that it has spawned, which have revolutionized our world with its wide-ranging outlook.This document also synthesizes existing knowledge and identifies common threads and gaps that open up new and demanding future research possibilities for IoT systems.In addition, various perspectives around IoT systems taking into account the relevance of security, privacy, and quality of service (QoS) concerns in the IoT industry are highlighted.Finally, this article summarises the available research and shows how it contributes to various areas relevant to the Internet of Things.

Motivation, Objectives, and Contributions
The remarkable recent developments in IoT technology have provided the opportunity to broadly deploy tiny sensors for wireless communication for various applications such as smart homes, smart cities, smart healthcare, and the smart industry [13].The motivation behind this contribution is that in critical situations, IoT devices can effectively deliver highly secure information, less power consumption, and low-cost solutions to the wireless network.Given these exciting prospects for IoT, several technical challenges need to be tackled and used effectively for each specific IoT application [14].The principal contributions in this paper are: The paper is structured as follows: Section 2 provides the required background and related work.Section 3 details IoT architecture such as electronic tools, cameras, actuators, radio frequency identification devices ZigBee, Bluetooth, CC, networking technologies, near-field communication, etc. IoT applications are discussed in Section 4. Section 5 describes recent IoT protocols like MQTT, CoAP, RPL, etc. Section 6 discusses the key challenges of IoT, and Section 7 describes future directions.Finally, the article is concluded in Section 8.Moreover, the outline of the paper is illustrated as shown in Figure 2.

Literature Survey
This paper reviews the state of the art in the area of IoT, defining the concept and emphasizing its key contributions and shortcomings for each of the research papers reviewed here.The majority of authors describe the IoT in terms of unique aspects and in-

Literature Survey
This paper reviews the state of the art in the area of IoT, defining the concept and emphasizing its key contributions and shortcomings for each of the research papers reviewed here.The majority of authors describe the IoT in terms of unique aspects and interests such as security, privacy, healthcare, energy, etc.Here, the different approaches to these issue that have resulted in different IoT visions for future research are discussed.
Xu et al. [15] addressed the latest IoT situation and some of the technologies and industry-specific implementations of IoT, as well as some traditional IoT protocols.Their paper discusses existing IoT science, major technologies supporting it, and significant industrial IoT implementations, and further describes technological developments and barriers to recognizing IoT growth in industries.A significant addition to this study document is that it thoroughly discusses new IoT developments in each sector.Alhamoud et al. [16] described a smart system for the development of energy-efficient intelligent home wireless sensors for protection purposes.They created a smart framework known as SMARTENERGY.KOM for the energy-efficient smart home system.Akkaya et al. [17] proposed the name of the system, including an IoT-camera RFID tag and a PIR (proximity infra-red) tracker to establish an intelligent system in a smart house.Within their article, the framework for additional work is defined in order to build up fluent knowledge acquired from at least one of the numerous IoT tools, such as some temperature sensors, recognition cameras, and RFID labels, now available for use in such systems.The most recent situation utilizing a protocol for data transfer between two organizations and the way data can be handled using such a protocol is explored and explained by Andrea et al. [18].They provided a detailed analysis of urban IoT infrastructure, protocols, and architecture.The same paper also addresses the technological approaches implemented in the smart city project of Padova, Italy, to provide details of IoT implementation in the municipality of Padova.In this way, the work can also be introduced and debated in conjunction with the municipality.
Al-Fuqaha et al. [19] addressed IoT interfaces and protocols for handling machine-tomachine contact between two systems without interrupting human beings, and identified some significant technology uses for IoT implementation and design.Their paper provides an overview of the IoT focused on technology capabilities, protocols, and implementation problems.It is through RFID, intelligent cameras, networking systems, and Web protocols that the IoT is enabled.According to Abdur et al. [20], as the number of internet applications used around the world increases, the field of life and action in day-to-day existence will shift in the future at a certain stage.If the IoT system happens as envisioned, 70 percent of devices will be targeted for protection.This additionally aims at a health concept for businesses, medical equipment, smart homes, and various IoT concepts, and provides an e-mail and SMS system that is focused on travel exploration.Raja et al. [21] have spoken about the Raspberry Pi being used in python material.A protection warning program is mentioned here that records a video when a motion is identified, loads it to the outside server, and notifies the consumer via text message.Tahir et al. [22] discussed Internet use and various forms of communication.Many different computers combine Wi-Fi, Bluetooth, and other features.They also discuss repetitive attacks in the same article.To resist internal attacks from malicious nodes, Wang et al. [23] proposed an ant colony optimization algorithm for secured routing based on a trust-sensing model (ACOSR) in wireless sensor networks.The simulation results show that the proposed algorithm has evaluated the efficiency significantly in terms of packet loss rate, end-to-end delay, efficiency, and energy usage, and demonstrate strong resistance to black hole attacks.
According to Zhu et al. [24], cameras are used for image recognition when recognizing an object in real-time.In addition, the system's deploying configuration is depicted, allowing for a simple security monitoring system to be established.Suchitra et al. [25] addressed the different protection requirements and issues of the IoT and analyzed the work of researchers who have previously identified this issue.Their paper explores the concept of a Denial of Service (DoS) attack.Zhang et al. [26] created a medical health monitoring device with the aid of a CC2430 microcontroller, a human information sensor, and microelectronic and modern wireless communication technologies.In addition to collecting medical signals, a sensor node circuit and a coordinator node circuit were planned, and wireless sensor network software was developed.Finally, each device module's online debugging was combined with hardware and software.The results of this experiment showed that the network node was trustworthy and that data transmission was precise.Wang et al. [27] suggested an anonymous batch handover authentication protocol that pre-distributes handover keys using a group signature technique.Unlike current group signature protocols, the proposed protocol avoids group signature correlation operations during the handover authentication process, resulting in improved performance.Afanasyev et al. [28] presented a detailed description of the principles and problems of the robotic internet of robotic things (IoRT) and suggested software for the IoRT.In their article, they state an intention to take further action in order to broaden the discussion regarding developing this interdisciplinary area.The same work analyzes possible solutions for the network of robotic things, discussing concerns relating to IoRT design, smart space incorporation, and robotic applications.
Dharshini et al. [29] addressed the application of IEEE 802.15.6 protocols, transmitters, and receivers.They also offer a brief overview of WBAN's sensor architecture, implementations, power efficiency, energy conservation, communication protocols, and security concerns.Alezabi et al. [30] introduced authentication and re-authentication protocols for 4G wireless networks, specifically LTE-Advanced (LTE-A) and WLAN, an interworking architecture, for 4G wireless networks.The protocols suggested are suitable for 5G networks.A new set of authentication and re-authentication protocols has been reinvented to provide quick and reliable handovers (HO) in current 4G and next 5G networks, taking into account existing standard authentication protocols.Weber [31] focused on global security and privacy issues and explored privacy and security challenges before mounting the IoT framework to work.In Edge-of-Things (EoT) applications, Toor et al. [32] implemented a dynamic speed scaling method.The proposed solution is thoroughly examined, with verification obtained through simulations performed on the iFogSim simulator.The results show that dynamically scaling the processor frequency of EoT devices in response to load variations in IoT traffic significantly improves energy conservation.Liu et al. [33] proposed a verification system with clarification to determine confirmation and access control based on an elliptical curve cryptosystem, and established it on diverse security threats.Huang et al. [34] explored how to achieve physical layer-protected connectivity by forming virtual beamforming through the collaboration of jamming nodes to point to hostile wiretap nodes.The simulation results show that power dynamic allocation and pricing have strong convergence, and the source node offers a train of thought for selecting cooperative nodes and their number.
Li et al. [35] discussed the heterogeneous nature of IoT objects and devices and ways that IoT researchers and developers are actively engaged in developing solutions for problems.Pierleoni et al. [36] introduced an IoT architecture for building monitoring that is continuous and real-time.The proposed method is based on a sensor node located inside the monitored building that is connected to the Internet and capable of performing continuous measurements and sending raw data to a remote server via the MQTT protocol in real-time.Luk et al. [37] addressed System Security Networking (SSN), recovery and privacy safety, and authentication.By combining first-order reasoning and probability graphic simulation, Li et al. [38] proposed a hybrid approach to complex everyday task identification.They created a novel "Markov logic network" that combines data-driven multi-feature modeling and inference with simpler rules-based modeling and inference, allowing and promoting the applicability and robustness of everyday activity recognition.A Delay and Energy-Efficient Data Collection (DEEDC) scheme, as discussed by Xiang et al. [39], employs a clustering approach.Matrix filling theory is used to quantify the number of slots available for transmission for each cluster, not the number of nodes that produce data.This means that data can be obtained in a network of randomly distributed data (number of slots, number of nodes), preventing slot distribution and repetitive data acquisition, which wastes time and resources.Hussain et al. [40] reviewed the security criteria, attack vectors, and emerging security options for IoT networks in a comprehensive way.They then discuss the flaws in these security solutions, which necessitate the use of ML and DL techniques.Finally, they address the latest ML and DL solutions for solving various security issues in IoT networks in depth.
A bit error performance evaluation of chaotic sequences was presented by Novosel et al. [41].For USRP software-defined radio, the performance of chaotic sequences is evaluated using multiple access spread spectrum system models.Numerical simulations and bit error rate analysis are performed using LabVIEW.One-dimensional, two-dimensional, and three-dimensional maps are used to create chaotic sequences of various lengths.To reduce the delay for Industrial Internet of Things (IIoTs), Wu et al. [42] suggested a Learning-Based Synchronous (LS) method from forwarding nodes.When using an asynchronous Media Access Control protocol, senders must always wait for their corresponding receiver to wake up before sending results.As a result, the delay is longer than in a synchronous network.Stergiou et al. [43] proposed a revolutionary infrastructure for handling Big Data (BD) on smart buildings that run on a wireless-mobile Sixth-Generation (6G) network.When the telecommunications industry expands, new threats emerge.Furthermore, a new form of wireless network technology, known as 6G, offers all of the advantages of previous generations while addressing some of the problems that have plagued its predecessors.Temglit et al. [44] proposed QoS and the establishment of IoT hardware, events, and administrations as a major basis for gaining consumer trust in IoT administration and hardware, as there are substantial problems and companies can be volatile.Wan et al. [45] proposed a novel framework for real-time personal health tracking called the Wearable IoT Cloud-Based Health Monitoring System (WISE).To enable real-time health tracking, WISE uses the BASN (body area sensor network) platform.Sensors for heartbeat, body temperature, and blood pressure sensors are among the wearable sensors that have been embedded.
In a high-frequency structure simulator, Ali et al. [46] developed a multilayer model of the human head and hand.They calculated the effects of the unique absorption rate by simulating antennas equipped with the head and hand models in the final stage.The antennas were placed on the built model to measure the specific absorption rate for the head and hand.Liu et al. [47] proposed a smart 5G IoT network based on ambient backscatter communication.The network is made up of two parts, a real-time data transmission system that uses ambient backscatter communication, and a real-time big data processing system that uses a mixture of shallow and deep neural networks.Majeed et al. [48] used previously neglected unmanned aerial vehicle (UAV) energy consumption parameters to determine the current state of available energy, and suggested a solution that more reliably estimates UAV operating airtime.The proposed model was tested in a test bed and a simulation setting; the results show that taking into account such explicit utilisation parameters improves airtime estimation significantly.Jebarani et al. [49] proposed a framework that includes medical data being transferred through the Remote Human Health Care Model.A low-energy adaptive clustering model was used to build the data transmission model.Raji et al. [50] compared the wavelet transform of output to potential wireless application framework specifications and proposed wavelet implementations in 5G waveform architecture guidance and approaches.
Palattella et al. [51] discussed security and privacy, describing security issues that will be addressed by future technology.They state that the key test in the years to come will incorporate both basic determination of advancements to handle the many open issues and a push to pass these plans on to authentication structures and applications.By considering both the technical and standardization dimensions, they examine in depth the potential of 5th Generation (5G) technology for the present IoT, and discuss the existing IoT networking environment as well as the key IoT 5G enablers.Kaur et al. [52] proposed an information model to record and utilize IoT information, and discussed use cases emerging across China and different nations and areas in connection with the COVID-19 pandemic.Their paper provides insight into the flow of examining inclines as well as some future research bearings.Behera et al. [53] proposed a wireless sensor network for use in their research scenario, and described how such a network can manage the battery for increased lifetime as well as how cluster head cells are activated for data aggregation and network efficiency enhancement using the Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol.Farman et al. [54] discussed the LEACH protocol and a modification of the LEACH protocol to provide efficient use of power, resulting in improved network efficiency at a good ratio.Behera et al. [55] proposed an enhanced version of the LEACH protocol so that the network can be used for different applications.With the use of the clustering head technique and with the help of a single cluster head, network performance can be improved.Butler et al. [56] proposed an IoT architecture in which different IoT devices can sense data and aggregate it for different environments.L. Hu et al. [57] discussed smart cloud use in the IoT network to increase data storage capacity; for training using this method, they relied on a sensor-based cloud system.
Alzahrani et al. [58] discussed a survey on patient physical healthcare monitoring and authentication protocols designed for the WBAN environment.Although this was an efficient scheme for employing lightweight operations, the paper reveals some security loopholes.This framework was limited to security features, not energy efficiency.Wang et al. [59] highlighted the ways in which data storage generated by many sensor nodes represents the biggest challenge in the IoT network.They described an efficient computing technique that reduces power consumption and increases the storage capacity of the network.Qi et al. [60] discussed malicious IoT nodes and the effect these have on future IoT networks.Because of this challenge, they expanded the current Locality-Sensitive Hashing (LSH) methodology to incorporate the time factor and further introduced a new LSH-based approach to time-aware and privacy-conserving service recommendations.In order to confirm the feasibility and efficiency of this proposal, they performed detailed experiments on a large-scale real-world dataset.The results of the experiment show that in guaranteeing privacy preservation, the method achieves a successful trade-off between accuracy and efficacy of recommendations.
Yang et al. [61] proposed a blockchain in the IoT network that works as a centralized server to control and manage IoT networks.Their simulation results show that the proposed device is efficient and feasible for capturing, measuring, and storing trust values of invehicle networks.Marche et al. [62] focused on modeling the trustor-trustee relationship in the Internet of Things and proposing recommendations for designing trust management models effectively.The effects of the proposed guidelines on a basic confidence paradigm were shown by simulations.Wang et al. [63] discussed Mobile Edge Nodes (MENs) and also described edge techniques to reduce power consumption and enhance the performance of the network.Khraisat et al. [64] proposed a novel IoT intrusion detection system (IDS) taxonomy that illuminates IoT IDS techniques, their benefits and drawbacks, IoT attacks that target IoT communication networks, and the related advanced IDS and detection capabilities to detect IoT attacks.This technique, called "cluster head," gathers information from neighboring nodes and then aggregates it so that power can be reduced for the performance enhancement of the IoT network.Haris et al. [65] proposed the use of IoT networks for 5G technology and also discussed how 5G technologies can be advanced with IoT sensor nodes.The concept of the CPS was introduced with the IoT structure.Srivastava et al. [66] discussed the energy-saving protocol used in WSNs and provide a comparative analysis of multi-agent and single-agent-based protocols.In a 5G IoT scenario involving several UAVs, Fu et al. [67] addressed the connectivity issue between UAVs and cellular base stations; these are responsible for uplink channel modeling and uplink transmission efficiency analysis.They also consider the effects of 3D distance and multi-UAV reflection on wireless signal transmission in the channel model.Yi et al. [68] established a safe energy exchange network.In comparison to other related schemes, the blockchain-based energy sharing IoT framework offers more stable consumer services.Furthermore, such technology can help secure user privacy.Gulzar et al. [69] discussed climate-smart agriculture to reduce the many losses due to climate effects.In addition, they provide a review of agricultural literature related to IoT design.
Anwer et al. [70] discussed cryptography algorithms for the IoT network with the help of blockchain technology to provide a secure flow of information between sensor nodes.Mughal et al. [71] proposed a cellular architecture whereby IoDs utilize the resources of the cellular network for energy harvesting and information transmission.The radio resources of the cellular network are divided by time and frequency, and each time-frequency block is called a Cellular Resource Block (CRB).To verify the derived analytical expressions, system-level simulations were carried out showing that the analytical results matched the simulation results.Moreover, the overall performance of the considered architecture was studied for different system parameters.With the support of an IPv6 over Low Power Wireless Personal Area Networks Protocol (6LoWPAN), Jose et al. in [72], discussed the protection features of the IoT network and also suggested a definition of an IoT scenario RPL protocol.Their paper discusses the routing needs of a Low-Power and Lossy Network (LLN), the original protocols, and new approaches.The enhancements to IoT routing are divided by their core goals and then analysed separately for their major strengths and limitations.Another key contribution of their review is its overview of considered solutions, discussion of open problems, and suggestions for new future ideas.Jangid et al. [73] discussed the risks and security problems in IoT-based devices used in healthcare systems.Cyber-protective threats remain present with both physical and mobile devices; robots are often affected by cyber-safety threats, and hackers can exploit contact between robots and surgeons.Apart from the above study, Table 1 provides IoT-based research topics along with a literature pool.Although IoT is, of course, considered a boon, because it is linked to the Internet networked devices are susceptible to security threats.
IoT Scalability Massive scaling issues [21,24] Discovery service for the IoT [72] Scaling of problems on large networks and sites, future exploration tools.
Large corporations and cyber-security experts are getting better at addressing these concerns, but there is always room for improvement.The IoT design agency claims that development should go beyond architecture and incorporate all IoT modules in a manner that concentrates on compatibility, analysis, and precision at all levels while retaining the potential to enhance the practical performance of a product or service and effectively focus on new technologies.
Table 2 provides a comparative study of various reported works on the state of the art in the field of IoT, along with their major research directions.The concept of IoT has attracted considerable research attention, as the massive connectivity it promises brings with it a variety of challenges and research gaps including heterogeneity, scalability, security, privacy, data management, interoperability, standardization of energy needs, etc.This work aims to provide a succinct overview of IoT concepts and applications and to explain key components and features.This paper discusses a large number of research papers, and primarily outlines and provides an overview of the life-changing phenomenon of the Internet of Things as well as the various technologies, challenges, and real-world applications it has spawned which have revolutionised our world with this wide-ranging outlook.

IoT Architectures
There is no single universally agreed-upon consensus on IoT architecture.Different architectures such as healthcare-based architecture, smart home-based architecture, and FC-based architecture, etc. have been proposed by different researchers.

IoT General Architecture
The IoT area includes a wide variety of technologies based on different architectures.Thus, it is impossible to use a single reference architecture as a blueprint for all possible concrete implementations.While it is understood that a specific paradigm occurs, other similar models will coexist on the internet.In this context, the architecture is specifically defined as a framework for the description of the physical components, functional arrangement, networking, operational principles, procedures and data formats used in its operation [74].The IoT design of patented protocols is extremely scalable and can support several different network implementations, as seen in Figure 3.In order to facilitate internet integration in the data environment, certain middleware should also be included for scalability, stability and semantics.Several different physical objects, devices, application networks, engineers, activators, networking channels, customers, market rates and IoT protocols are part of the IoT framework; the IoT layer architecture is shown in Figure 4.It mainly functions on three layers; the function of each layer is discussed below.

Perception Layer
The perception layer is also known as the physical layer, and directly works with IoT sensors.The interesting aspect of sensors is their capacity to interpret knowledge received from the outside environment.In other words, in order to continue to include of sensors in the three stages of an IoT architecture system, it is necessary to get information in a  The perception layer is also known as the physical layer, and directly works with IoT sensors.The interesting aspect of sensors is their capacity to interpret knowledge received from the outside environment.In other words, in order to continue to include of sensors in the three stages of an IoT architecture system, it is necessary to get information in a

Perception Layer
The perception layer is also known as the physical layer, and directly works with IoT sensors.The interesting aspect of sensors is their capacity to interpret knowledge received from the outside environment.In other words, in order to continue to include of sensors in the three stages of an IoT architecture system, it is necessary to get information in a format that can be processed.The exceptional feature of sensors is the ability to convert data obtained from the outside world into analysis.In other words, the incorporation of sensors into the three stages of the IoT system background will begin to include details with a look and feel that can be easily interpreted.The cycle continues with actuators, which are capable of interacting with physical realities.For starters, a light may be switched off, or the temperature in a room changed.As a consequence, the sensing and operating stages cover and change anything required for additional study of the real environment.

Network Layer
The network layer provides the network with access to the data, and works as a cloud.The network layer links to other intelligent objects, network appliances and servers.Its capability is often used for the transfer of sensor data and analysis.The optimised details are passed to the IT environment during this period through the phases of the IoT architecture.Enhanced analytics and preprocessing are carried out by edge IT systems, in particular; this applies to, for example, the technologies of machine learning and visualization.Around the same point, any extra testing will happen in the data center.In addition, stage two is similarly related to the previous phases of IoT construction.It ensures that the edge IT systems are placed next to those where the sensors and actuators are installed, and that a wiring closet is built.At the same time, it is also necessary to live far from the workplace.

Application Layer
The application layer provides unique consumer resources.It describes different applications for IoT such as smart houses, intelligent communities, and intelligent wellbeing.Throughout the data center or cloud, the core processes exist in the latest phase in the IoT architecture.This enables detailed treatment, and a follow-up review of feedback in particular.The expertise of IT and Operative Technology (OT) experts is needed here; that is, the process contains now the highly ranked scientific knowledge in both the modern environment and in humans.Data from other websites should also be used here in order to allow for a detailed review.Notwithstanding, the volume of information produced is becoming difficult to store and process in neighborhood stages.The adaptability offered by CC answers this issue.Distributed computing provides assets while requiring little to no effort on the part of clients.

IoHT Architecture
The main design challenges for an efficient IoT architecture in a heterogeneous setting are scalability, modularity, interoperability, and flexibility [75].The IoT architecture must be built to fulfil the needs of cross-domain interactions, and multi-system integration, with the ability to provide easy and flexible functional management relations, massive data processing and storage, and user-friendly applications.The software should also be able to scale up its features and incorporate some insight and automation into the system's IoT computers.The amount of massive data produced by the communication between IoT sensors and devices represents a new task.Therefore, the large volume of streaming data in the IoT framework requires a powerful architecture.Perception, network, and application all operate on three different levels.
Figure 5, based on IoHT, portrays the information stream across these layers.Because of human association, each layer in [46] has certain security issues, including secrecy, honesty, and credibility.The human connection has raised affectability; therefore, information acquired from people and patients requires authorization from the framework in order to acquire to the data.Due to protection concerns, clients are unable to completely utilise some gadgets.Medical care information assurance is basic; along these lines, information realness, genuineness, and classification should be maintained.For the ongoing wellbeing check framework, it is necessary to construct a security system.Health technicians and paramedics now use a variety of protection frameworks and equipment.

IoT Architecture with FC
FC data is obtained from sensors connected to physical devices in an IoT platform.The FC model uses local computing services located at the network edge rather than CC resources.Low latency, real-time decisionmaking and optimum bandwidth usage are some of the key advantages of this paradigm.The FC architecture enables fog nodes, cloud, and IoT to be moved dynamically through processing, networking and storage services.However, fog interfaces may enable the versatile and complex movement of devices, storage, and control roles between these various organizations to communicate with the server, other fogs, and staff or users.This has facilitated well-located FC consumer evaluation and has also allowed accurate and successful control of QoS.FC acts as a cloudto-end gateway that enables end-users to access data, storage, and network resources.The nodes of fog are referred to as such units.They can be mounted anywhere with a network connection.Figure 6, based on the optimization of QoS parameters and the proposed model, illustrates the smart city technology architecture of the new platform.The functions of the different layers are explained below.

Cloud Computing
Cloud computing and stacking the CC layer is responsible for compiling and executing information derived from other layers in heterogeneous IoT.CC with a diverse set of heterogeneous IoTs is able to handle the massive volume of data immediately and in a particular manner.Because cloud services can track hierarchical computing, this is likely.In addition to storage capacity, cloud providers also can make decisions based on the information obtained.In addition, relying on emergency event-aware architectures, cloud vendors can take decisive action in certain critical heterogeneous IoT environments.

Fog Layer
The conceptual fog manager is in charge of this layer, which analyses and categorizes requests based on their complexity at the time.The fog handler is a critical component for optimizing QoS and tool use on fog layers.

Sensor or Physical Layer
Specific sensors in the IoT's physical layer collect data from different locations which are then fed into the cloud infrastructure for decision-making.A large number of sensors are placed in a specific location, and a topology is developed for data transmission.In a standard network, there are sink nodes, sensor nodes, and control nodes.
Fog nodes act as a bridge between the end device and the cloud infrastructure.The fog nodes are considered transient and consequently not trusted.The end device (for example, a user or an IoT smart device) must be authenticated by the fog node before any service is provided.This authentication can involve the cloud server, which introduces latency as well as overhead at the cloud server.Normally, authentication and session key establishment between an end device and the fog nodes relies on public-key cryptography.However, this is rather computationally expensive, relatively speaking.Fog nodes are considered transient possibly due to the nodes being out of range or becoming offline for various reasons.In this case, the end-user will need to re-authenticate with a secondary fog node that will take over the prior fog node's job.The primary goal of this research is to accomplish failover re-authentication without the need for public-key cryptography.This may be accomplished if the fog nodes agree on some security tokens ahead of time which are then made available to the end device after the first authentication.These security tokens may be used to provide quick authentication between the end device and the secondary fog node.Furthermore, unsecured communication between end devices and fog nodes can expose an adversary to a variety of security attacks such as replay, impersonation, man-in-the-middle, and denial of service attacks.

IoT Architecture for Smart Homes
A sensor creates data, but it contributes little value to the home environment on its own.A thermostat is often not called "smart" because the homeowner must regulate the temperature based on the outside temperature, humidity, and other factors.It is possible to maintain a stable temperature, but this is automation, not "smartness."Only when all environmental data is collectively analysed based on collected patterns and decisions made without the intervention of the consumer can it be called a "smart" ecosystem.The way sensors interact, how and where sensor and equipment usage pattern information is processed, how this data is interpreted and patterns are detected, and how the systems can be interacted with by the consumer and vice versa is decided by the smart home infrastructure.
The symbiosis of numerous components, such as sensors, connections, and applications, that generate a complex, heterogeneous infrastructure to effectively control home devices and provide advanced services to consumers can be described as a smart home.Figure 7 depicts cloud-based smart home architecture in general.The internal network consists of terminal equipment, cameras, processors, and actuators.These machines link with a firewall at the network's edge, which makes linking internal networks to the internet even simpler.The communication difference between end-users, sensors, software, and the cloud is bridged by a gateway computer [76].

IoT Architecture with FC
FC data is obtained from sensors connected to physical devices in an IoT platform The FC model uses local computing services located at the network edge rather than C resources.Low latency, real-time decisionmaking and optimum bandwidth usage a some of the key advantages of this paradigm.The FC architecture enables fog node cloud, and IoT to be moved dynamically through processing, networking and storage se

Cloud Computing
Cloud computing and stacking the CC layer is responsible for compiling and executing information derived from other layers in heterogeneous IoT.CC with a diverse set of heterogeneous IoTs is able to handle the massive volume of data immediately and in a particular manner.Because cloud services can track hierarchical computing, this is likely.In addition to storage capacity, cloud providers also can make decisions based on the information obtained.In addition, relying on emergency event-aware architectures, cloud vendors can take decisive action in certain critical heterogeneous IoT environments.

Fog Layer
The conceptual fog manager is in charge of this layer, which analyses and categorizes requests based on their complexity at the time.The fog handler is a critical component for optimizing QoS and tool use on fog layers.

Sensor or Physical Layer
Specific sensors in the IoT's physical layer collect data from different locations which are then fed into the cloud infrastructure for decision-making.A large number of sensors are placed in a specific location, and a topology is developed for data transmission.In a standard network, there are sink nodes, sensor nodes, and control nodes.
Fog nodes act as a bridge between the end device and the cloud infrastructure.The fog nodes are considered transient and consequently not trusted.The end device (for example, a user or an IoT smart device) must be authenticated by the fog node before any service is provided.This authentication can involve the cloud server, which introduces latency as well as overhead at the cloud server.Normally, authentication and session key establishment between an end device and the fog nodes relies on public-key cryptog- are considered transient possibly due to the nodes being out of range or becoming offline for various reasons.In this case, the end-user will need to re-authenticate with a secondary fog node that will take over the prior fog node's job.The primary goal of this research is to accomplish failover re-authentication without the need for public-key cryptography.This may be accomplished if the fog nodes agree on some security tokens ahead of time which are then made available to the end device after the first authentication.These security tokens may be used to provide quick authentication between the end device and the secondary fog node.Furthermore, unsecured communication between end devices and fog nodes can expose an adversary to a variety of security attacks such as replay, impersonation, man-in-the-middle, and denial of service attacks.

IoT Architecture for Smart Homes
A sensor creates data, but it contributes little value to the home environment on its own.A thermostat is often not called "smart" because the homeowner must regulate the temperature based on the outside temperature, humidity, and other factors.It is possible to maintain a stable temperature, but this is automation, not "smartness."Only when all environmental data is collectively analysed based on collected patterns and decisions made without the intervention of the consumer can it be called a "smart" ecosystem.The way sensors interact, how and where sensor and equipment usage pattern information is processed, how this data is interpreted and patterns are detected, and how the systems can be interacted with by the consumer and vice versa is decided by the smart home infrastructure.
The symbiosis of numerous components, such as sensors, connections, and applications, that generate a complex, heterogeneous infrastructure to effectively control home devices and provide advanced services to consumers can be described as a smart home.Figure 7 depicts cloud-based smart home architecture in general.The internal network consists of terminal equipment, cameras, processors, and actuators.These machines link with a firewall at the network's edge, which makes linking internal networks to the internet even simpler.The communication difference between end-users, sensors, software, and the cloud is bridged by a gateway computer [76].A smart home gateway architecture that is configured in terms of accepted communication protocols and can convert heterogeneous data from sensors into a standard format.In general, the gateway is a device that accepts several communication protocols with the end devices for interoperability.It is efficient enough to do any computation at the edge of the network before uploading the data to the cloud.The gateway further adds a layer of security to the smart home network as it connects contact between end devices and the outside world, meaning all communication is filtered before instructions are transmitted to the end devices.This effectively includes ways to improve usability, stability and security while at the same time taking advantage of higher computational power and scalable architecture.The cloud can connect multiple services from third parties as well, such as data visualization, control of smart home products, or access and role management for consumers.

Blockchain-Based Smart City Architecture
Blockchains are decentralised distributed ledgers, a game-changing technology that may help solve IoT security issues.A blockchain-based approach to IoT networks might address many of the issues with the existing paradigm while also increasing security.The use of blockchains in IoT security allows for direct information exchange between connected devices rather than communicating through a centralised network, reducing the IoT's vulnerability to cyberattacks [76].According to a Gartner report, healthcare, transportation, and energy have the greatest rates of blockchain use among IoT-enabled firms in the United States.
When it comes to encryption, the technology employed in digital ledger systems is rather advanced.Because a blockchain is an encrypted database that is distributed, decentralized, and impenetrable, it has sparked the minds of today's youth.Since its inception, it has been used to reshape the way business is done in nearly every area, spanning government, finance, healthcare, and smart cities. Figure 8

IoT Applications
IoT technologies pledge human lives to be of tremendous importance.IoT could be the next phase in the form of the wallet connecting modern cellular networks, superior devices, and innovative computational capabilities.IoT technologies are supposed to provide communication and information for trillions of daily items.The various application domains of IoT are shown in Figure 9.

IoT Applications
IoT technologies pledge human lives to be of tremendous importance.IoT could be the next phase in the form of the wallet connecting modern cellular networks, superior devices, and innovative computational capabilities.IoT technologies are supposed to provide communication and information for trillions of daily items.The various application domains of IoT are shown in Figure 9.

Smart Home
Smart homes take care of problems such as activating environmental checks so that when a person comes into the house, it is already fully comfortable.Dinner that needs an oven or a crockpot may be prepared remotely so that the meal is ready immediately.
Protection devices are also rendered more available by allowing customers to remotely monitor appliances and lighting, and to activate the smart lock to enable appropriate individuals to enter the house even though they do not have a key [77].Some smart home features are shown in Figure 10.

Smart Agriculture
The use of IoT in agriculture targets traditional agricultural practices to satisfy rising demands and reduce output losses.IoT utilizes robotics, drones, remote sensors, and computer vision in agricultural industries together with rapidly evolving machine-learning and analytical instruments for field observation, farm surveys, and monitoring, which provide farmers with knowledge regarding appropriate farm management strategies to save both time and energy.In indoor planting, IoT allows micro-climate monitoring and management, which effectively increases efficiency.For outdoor planting, soil humidity and nutrients can be sensed in conjunction with temperature to enable smart irrigation and fertilizer systems through devices using IoT technology.For instance, when water is provided only by sprinkler systems, this may prevent a useful resource for being lost [78].Some smart agriculture features are shown in Figure 11.

Smart Cities
IoT can enable smart city technologies to spread through many industries, leading to a safer atmosphere and increasing public protection and road lighting.Intelligent parking systems can determine if parking lots are filled or open, and build intelligent community systems using GPS data from drivers' smartphones or ground-surface sensors installed on the floor on parking lots.As the name implies, intelligent cities are a major advance that includes a broad variety of use cases, from the delivery and control of water, to traffic, to waste reduction and environmental protection [79].Some smart city features are shown in Figure 12.

Smart Health Care
In the first instance, wearable IoT technology allows hospitals to track the safety of their patients at home and thereby minimize medical visits while also delivering knowledge that can save lives in real time.For hospitals, intelligent beds can keep workers updated about the bed supply for more efficient use of rooms.Placing IoT captors on vital hardware ensures fewer faults and greater durability, which can make a life-or-death difference.Reactive medical networks will become adaptive, wellness-based devices with IoT implementations.Important real-world knowledge is scarce as a tool of modern medical science.It utilizes much of the available info, managed environments, and medical test volunteers.Through observing, utilizing real-time data, and evaluating, IoT opens a door to a world of usable data.IoT also increases the strength, efficiency, and usability of installed equipment.IoT is not only about hardware but also about building structures [80].Some smart healthcare features are shown in Figure 13.

Smart Home
Smart homes take care of problems such as activating environmental checks so when a person comes into the house, it is already fully comfortable.Dinner that nee oven or a crockpot may be prepared remotely so that the meal is ready immediately Protection devices are also rendered more available by allowing customers motely monitor appliances and lighting, and to activate the smart lock to enable a priate individuals to enter the house even though they do not have a key [77].Some s home features are shown in Figure 10.

Smart Home
Smart homes take care of problems such as activating environmenta when a person comes into the house, it is already fully comfortable.Dinne oven or a crockpot may be prepared remotely so that the meal is ready im Protection devices are also rendered more available by allowing cu motely monitor appliances and lighting, and to activate the smart lock to priate individuals to enter the house even though they do not have a key [7 home features are shown in Figure 10.

Smart Grids
The interesting field is intelligent grids of IoT technologies.In turn, an intelligent grid aims to continuously collect knowledge from customers and power providers on the actions of energy supplies to boost the quality and reliability of delivery.IoT devices for tracking climate, such as moisture, temperature, and illumination, may be used.The IoT sensor knowledge will assist with the development of algorithms to monitor energy consumption and adapt accordingly, replacing the human factor [81].Some smart grid features are shown in Figure 14.
demands and reduce output losses.IoT utilizes robotics, drones, remote sensors, and com-puter vision in agricultural industries together with rapidly evolving machine-learning and analytical instruments for field observation, farm surveys, and monitoring, which provide farmers with knowledge regarding appropriate farm management strategies to save both time and energy.In indoor planting, IoT allows micro-climate monitoring and management, which effectively increases efficiency.For outdoor planting, soil humidity and nutrients can be sensed in conjunction with temperature to enable smart irrigation and fertilizer systems through devices using IoT technology.For instance, when water is provided only by sprinkler systems, this may prevent a useful resource for being lost [78].Some smart agriculture features are shown in Figure 11.

Smart Cities
IoT can enable smart city technologies to spread through many industries, leading to a safer atmosphere and increasing public protection and road lighting.Intelligent parking systems can determine if parking lots are filled or open, and build intelligent community systems using GPS data from drivers' smartphones or ground-surface sensors installed on the floor on parking lots.As the name implies, intelligent cities are a major advance that includes a broad variety of use cases, from the delivery and control of water, to traffic, to waste reduction and environmental protection [79].Some smart city features are shown in Figure 12.

Smart Health Care
In the first instance, wearable IoT technology allows hospitals to track the safety of their patients at home and thereby minimize medical visits while also delivering knowledge that can save lives in real time.For hospitals, intelligent beds can keep workers updated about the bed supply for more efficient use of rooms.Placing IoT captors on vital hardware ensures fewer faults and greater durability, which can make a life-or-death difference.Reactive medical networks will become adaptive, wellness-based devices with IoT implementations.Important real-world knowledge is scarce as a tool of modern medical science.It utilizes much of the available info, managed environments, and medical test volunteers.Through observing, utilizing real-time data, and evaluating, IoT opens a door to a world of usable data.IoT also increases the strength, efficiency, and usability of installed equipment.IoT is not only about hardware but also about building structures [80].Some smart healthcare features are shown in Figure 13.

Smart Health Care
In the first instance, wearable IoT technology allows hospitals to track the safety of their patients at home and thereby minimize medical visits while also delivering knowledge that can save lives in real time.For hospitals, intelligent beds can keep workers updated about the bed supply for more efficient use of rooms.Placing IoT captors on vital hardware ensures fewer faults and greater durability, which can make a life-or-death difference.Reactive medical networks will become adaptive, wellness-based devices with IoT implementations.Important real-world knowledge is scarce as a tool of modern medical science.It utilizes much of the available info, managed environments, and medical test volunteers.Through observing, utilizing real-time data, and evaluating, IoT opens a door to a world of usable data.IoT also increases the strength, efficiency, and usability of installed equipment.IoT is not only about hardware but also about building structures [80].Some smart healthcare features are shown in Figure 13.

Smart Grids
The interesting field is intelligent grids of IoT technologies.In turn, an intelligent grid aims to continuously collect knowledge from customers and power providers on the actions of energy supplies to boost the quality and reliability of delivery.IoT devices for

Smart Industry
Another way to learn about the Internet is to look at connected devices and equipment in sectors such as power production, mining, gas, and medical services.This also concerns circumstances in which unplanned disruption and faults in the network will contribute to life risks.A device installed in the IoT appears to provide devices such as cardiac tracking exercise bands or intelligent home appliances.Such programs are reliable and should be simple to use, but they are not efficient, because they usually struggle to establish emergencies.Another huge champion in the IoT sweepstakes is the automotive and industrial automation sector.From start to finish on the manufacturing floor, RFID and GPS systems can help a supplier monitor a commodity across the entire supply chain throughout its destination shop.Sensors may gather details about travel duration, the state of a device, and the environmental conditions of the system [81].Some smart industry features are shown in Figure 15.

IoT Communication Protocols
IoT protocols are a vital aspect of the IoT infrastructure stack; hardware is worthless without them because the IoT protocols allow it to communicate data in a standardized and functional manner.Useful knowledge may be derived from these exchanged pieces Smart Turbine Smart Solar

Smart Industry
Another way to learn about the Internet is to look at connected devices and equipment in sectors such as power production, mining, gas, and medical services.This also concerns circumstances in which unplanned disruption and faults in the network will contribute to life risks.A device installed in the IoT appears to provide devices such as cardiac tracking exercise bands or intelligent home appliances.Such programs are reliable and should be simple to use, but they are not efficient, because they usually struggle to establish emergencies.Another huge champion in the IoT sweepstakes is the automotive and industrial automation sector.From start to finish on the manufacturing floor, RFID and GPS systems can help a supplier monitor a commodity across the entire supply chain throughout its destination shop.Sensors may gather details about travel duration, the state of a device, and the environmental conditions of the system [81].Some smart industry features are shown in Figure 15.

Smart Industry
Another way to learn about the Internet is to look at connected devices and equipment in sectors such as power production, mining, gas, and medical services.This also concerns circumstances in which unplanned disruption and faults in the network will contribute to life risks.A device installed in the IoT appears to provide devices such as cardiac tracking exercise bands or intelligent home appliances.Such programs are reliable and should be simple to use, but they are not efficient, because they usually struggle to establish emergencies.Another huge champion in the IoT sweepstakes is the automotive and industrial automation sector.From start to finish on the manufacturing floor, RFID and GPS systems can help a supplier monitor a commodity across the entire supply chain throughout its destination shop.Sensors may gather details about travel duration, the state of a device, and the environmental conditions of the system [81].Some smart industry features are shown in Figure 15.

IoT Communication Protocols
IoT protocols are a vital aspect of the IoT infrastructure stack; hardware is worthless without them because the IoT protocols allow it to communicate data in a standardized and functional manner.Useful knowledge may be derived from these exchanged pieces Smart Turbine Smart Solar

IoT Communication Protocols
IoT protocols are a vital aspect of the IoT infrastructure stack; hardware is worthless without them because the IoT protocols allow it to communicate data in a standardized and functional manner.Useful knowledge may be derived from these exchanged pieces of data for the end consumer, and thus the whole project is commercially competitive.The classification of IoT protocols is shown in Figure 16.Moreover, some of the most important IoT protocols are listed in Table 3.
of data for the end consumer, and thus the whole project is commercially competitive.The classification of IoT protocols is shown in Figure 16.Moreover, some of the most important IoT protocols are listed in Table 3.

Constrained Application Protocol (CoAP)
CoAP is generally used by restricted smart gadgets, i.e., devices that have a similar grouped community.IoT systems using CoAP are driven by HTTP protocols and use a User Datagram Protocol (UDP) for the implementation of lightweight data.Its restful architecture and binary data format make it a perfect fit for applications related to automation, mobile phones and microcontrollers.It employs inside mobiles and interpersonal organization-based applications, and disposes of equivocalness by utilizing the HTTP get, post, put and erase techniques.Aside from imparting IoT information, CoAP has been created alongside DTLS for the safe trade of messages.It utilizes DTLS for the safe exchange of information in the vehicle layer [82].

Advanced Message Queuing Protocol (AMQP)
AMQP is a middleware-based application layer protocol which was discovered at JP Morgan Chase, London by John O'Hara.MQP is an object layer view for message-arranged middleware conditions.It is an internationally recognized protocol that uses its

Constrained Application Protocol (CoAP)
CoAP is generally used by restricted smart gadgets, i.e., devices that have a similar grouped community.IoT systems using CoAP are driven by HTTP protocols and use a User Datagram Protocol (UDP) for the implementation of lightweight data.Its restful architecture and binary data format make it a perfect fit for applications related to automation, mobile phones and microcontrollers.It employs inside mobiles and interpersonal organizationbased applications, and disposes of equivocalness by utilizing the HTTP get, post, put and erase techniques.Aside from imparting IoT information, CoAP has been created alongside DTLS for the safe trade of messages.It utilizes DTLS for the safe exchange of information in the vehicle layer [82].

Advanced Message Queuing Protocol (AMQP)
AMQP is a middleware-based application layer protocol which was discovered at JP Morgan Chase, London by John O'Hara.MQP is an object layer view for messagearranged middleware conditions.It is an internationally recognized protocol that uses its message-oriented architecture to transfer data via its three prime components of exchange, message queue, and binding.All of these components work collectively to place the parts of the received message in a queue and store it over a connection facilitated by the binding component [83].

Data Distribution Service (DDS)
DDS is an expandable, high-performance and real-time M2M interacting IoT standard which is capable of transferring data to cloud platforms and low-footprint devices.Through its two layers, Data-Centric Publish-Subscribe (DCPS) and Data Local Reconstruction Layer (DLRL), a data distribution service delivers information to a platform in an intuitive manner [84].

Message Queue Telemetry Transport (MQTT)
In 1999, MQTT was discovered by Andy Stanford-Clark of IBM and Arlen Nipper of Arcom.Message Query Telemetry Transport is used extensively for remote monitoring.It is effective in obtaining data from multiple far-off located electronic devices and sharing it with a centralized platform.The MQTT protocol works due to its three major components, the subscriber, publisher, and broker.While the data is generated and transmitted by its subscriber mechanism, the publisher is capable of providing information-routing options.The broker ensures the security of the data being transmitted [85].

IPv6 over Low-Power Wireless Personal Area Networks Protocol (6LoWPAN)
As the core hardware of the Internet Protocol (IP) network, it is the 6LowPAN network standard, rather than the IoT protocols such as Bluetooth and ZigBee [86], which specifies embedding protocols and header compression.Because multiple Zigbee-certified devices can be connected, Zigbee is an appropriate protocol for the IoT.As more Zigbee devices are connected, the number of communication pathways connecting them grows, reducing the likelihood of a single-point signal failure.Zigbee is interoperable and standardises network and application layers, allowing devices from various manufacturers to communicate with one another.Furthermore, Zigbee is based on the 2.4 GHz frequency band, which can be used without a licence anywhere in the world.Solution providers can sell the same product wherever they are on earth as a result of this.In addition, Zigbee has a data transfer rate of 250 kbit/s across 16 channels.Zigbee is a mesh network, which is a communication system made up of radio nodes that are connected in a mesh topology.The mesh network is distinguished by its high degree of interconnectedness.Each mesh network device functions as a node, connecting to the signal and passing it on to the next device.Zigbee can support up to 65,000 devices in a network while preserving signal strength and data transmission capabilities.Certain networks like Wi-Fi, 802.15.4,and sub-1 GHz ISM will also include the frequency range, physical layer, and communication.Internet protocol version 6 (IPv6) has been a major aspect of the IoT in recent years.

Routing Protocol for Low Power and Lossy Networks (RPL)
IoT is now being developed particularly in health care and smart environments, adding a large number of low-power sensors and actuators to enhance the way of life and provide the community with new services.The Internet Engineering Task Force (IETF) has developed and standardized RPLs in 2012 as the Low Power and Loss Network (LLN) routing protocol.RPL soon attracted attention and was incorporated with specific applications to test and enhance its performance [87].

Wi-Fi Protocol
To set up a Wi-Fi network, a device that can send wireless signals such as a phone, computer, or routers is required.A router is used at home to convert an internet connection from a public network to the private network of a home or business.WiFi connects neighboring devices that are within a specified range to the Internet.Another option to utilize WiFi is to establish a WiFi hotspot, in which phones or laptops broadcast a signal to share a wireless or wired internet connection with other devices [88].

Key Challenges of IoT
IoT is a combination of fields including cyber technology, telecommunications, software analytics, and farming, which generally have a strong emphasis on maintaining privacy.To preserve the following principles provided below to avoid IoT hampering, the critical commitment of states, civil society, and the private sector will play a crucial role

Data Management
Due to billions of IoT devices, data management is the biggest challenge in the present scenario.While there are several other IoT protocols as well as Near Field Communication (NFC), RFID, and Thread, it is important to note that every standard has its distinct specifications and advantages.Studying these specifications is an essential aspect for any company before developing an IoT solution, as protocols are responsible for speed, volume, and range of data transmission.Some examples include bar code obvious affirmation, vision-based article identification, etc. RFID and NFC types of progress are used for disengaging purposes [89].

Information Decryption and Encryption
Sensor gadgets perform self-governing recognizing or estimations and trade data to the information taking care of the unit over the transmission system with the help of decryption and encryption [90].An extensive number of gadgets are related to the web.Thus, it is difficult to recognize whether any unapproved gadget partners with a present framework and catch the basic information amid a trade over the web [91].Thus, classification can be considered the best test for security.Frameworks can consolidate symmetric figures, hash works, and advanced criminological instruments, for instance, code validation and sandboxing [92].IoT protection focuses on securing the internet-enabled gadgets that link to one another on wireless networks.IoT protection is the security aspect connected to the Internet of Things, which aims to secure IoT devices and networks from cybercrime [93].

Data Privacy
The IoT uses a distinctive kind of article recognizing confirmation headways, e.g., RFID, 2D-institutionalized labels, etc.As every sort of step-by-step use article will pass on these conspicuous verification marks and add the specific item information, it is vital to take lawful assurance measures and counteract unapproved get-to.IoT ought to work to support straightforward and safe joint customer effort and control.Customers need confidence and the ability to get a handle on the IoT in order to take advantage of its power to secure data privacy.Thus, the major task of the system is to check the privacy of IoT devices [94].

Interoperability and Standardization
One of the major challenges in the growth of IoT applications is the diversity of technologies and standards.The future of IoT production will be built on the standardization of IoT architecture and communication technologies.These facts suggest that open standards are one of the most important factors in IoT implementation performance.Since they are open to the public, these principles are essential facilitators of creativity.To provide better interoperability for systems using different technologies, they are designed, accepted, and maintained through a collective consensus-based decision-making process [95].

System Security
The correspondence structure should have the ability to manage data from countless gadgets without any data misfortune in light of framework obstruction, ensure legitimate safety efforts for sending data, and check the security issue.IoT gadgets are poised to be more central in our lives than cell phones, and will push toward the most delicate individual information, for example, government debilitation numbers and banking data, in a way that is exponentially replicated.Even a few security weights on a solitary contraption, for example a telephone, can rapidly swing to 50 or 60 concerns while considering unmistakable IoT gadgets in an interconnected home or business.In light of the vitality that IoT gadgets approach, it is essential to understand their security threats [96].

Availability
One of the most important problems to address to better manage the complexities of IoT systems is service availability.For any approved object, availability means that IoT applications should be available anywhere and at any time.To support seamless communication and desired availability, the objects that will be linked should be adaptive and intelligent.The network's availability and coverage area must allow for the use of networks to continue regardless of mobility, complex network topology changes, or changes in current technologies.All of this necessitates interoperability, handover, and recovery processes in the event of unattended operations [97].

Transfer Speed and Power Consumption
There is a need for new calibration and computational techniques as the number of connected objects and data traffic volumes grows dramatically.To support big data, IoT systems need a popular analytic framework that can be provided as a service to IoT apps.Various data mining techniques, such as artificial intelligence (AI), machine learning, and other intelligent decisionmaking algorithms enable computational processes to find patterns in large datasets.These methods can be used to organize raw data as well as extract useful information and knowledge from it, although they are expensive.One of the most pressing concerns is enhancing system capabilities while lowering device costs and power consumption.In addition, one of the main criteria for power and energy efficiency is a low-power communication stack [98].

Future Directions
The internet has always been relevant, from industrial machinery to children's toys, and IoT is there to keep the internet safe from abuse.There are many IoT trends coming up for our protection and to keep it healthy.IoT is fundamentally a blend of several new advancements.However, there is no single innovation that can convey the desires of the present for future situations.The classification of future directions in the field of IoT is shown in Figure 18.

IoT Trends in Transport
In the transportation and logistics industry, the pace of IoT adoption is already high and is continuing to accelerate.By investing in new technology, transport companies are reducing shipping or transportation costs to increase productivity in operations.Predictive diagnostics and vehicle maintenance based on automotive IoT, full transport telematics, and Vehicle-to-Vehicle (V2V) contact are the latest developments in IoT changing the way people and goods are transported [99].Generalized research insights and implications for transport are:

•
In the transportation and logistics industry, the pace of IoT adoption is already high and is continuing to accelerate [100][101][102][103].

•
The use of data from many IoT devices produces rich videos and images.

•
To gain valuable insight into the IoT transportation network, it is required to improve the quality of images and videos.

•
For fast-tracking systems, a minimum event detection time is required.

•
For real-time tracking of full transport telematics and V2V, minimization of end-to-end delays is required.

•
Various methods to protect privacy in terms of such metrics as the position, activity, and description of vehicles must be ensured.

Blockchain Technologies
Reliable exchange of money and data between IoT devices becomes po blockchain technology provides them with a simple infrastructure to do so mented nature of IoT is in line with a blockchain's decentralized nature.The multiple networks and their owners privacy and protection, whilst the digital and private keys that accompany each transaction ensure a secure IoT environ Generalized research insights and implications for blockchain technologies inc

•
As of today, blockchain is one of the main developments in IoT technolog • For reliable exchange of money and data between IoT devices, blockchain should provide efficient infrastructure to do so.

Modern Artificial Intelligence and Management
It would be incomplete to list the emerging developments in IoT without c Artificial Intelligence (AI).In the most complex cases, combinations involving t of Things, blockchain and artificial intelligence arise.The rise in data is one of

Blockchain Technologies
Reliable exchange of money and data between IoT devices becomes possible once blockchain technology provides them with a simple infrastructure to do so.The fragmented nature of IoT is in line with a blockchain's decentralized nature.The latter gives multiple networks and their owners privacy and protection, whilst the digital signatures and private keys that accompany each transaction ensure a secure IoT environment [104].Generalized research insights and implications for blockchain technologies include:

•
As of today, blockchain is one of the main developments in IoT technology.

•
For reliable exchange of money and data between IoT devices, blockchain technology should provide efficient infrastructure to do so.

Modern Artificial Intelligence and Management
It would be incomplete to list the emerging developments in IoT without considering Artificial Intelligence (AI).In the most complex cases, combinations involving the Internet of Things, blockchain and artificial intelligence arise.The rise in data is one of the biggest causes of change and underlies many of the developments in the IoT market [108].Generalized research insights and implications for AI technologies are:

•
IoT privacy, security, and their link during operations should be taken into account when using IoT for healthcare applications.

•
In health IoT systems, powerful analytic methods are required for emergency cases.

Enhanced IoT Edge Computation
Edge computing is one of the biggest developments in the IoT industry at present.Connected to IoT devices and applications, the edge nodes and gateways help to access various data center styles.IoT data can also move from the data center to the computer over long distances [113].Generalized research insights and implications for IoT edge computation include:

•
Data in data centres manages all the processes in IoT.

•
Focus on the reliability of the network that is used to run the IoT applications [114].

Software-as-a-Service
Software-as-a-Service (SaaS) has already been deemed a popular subject for conversation for anyone speaking about IoT device developments.SaaS is a type of operation in which a platform houses the target functionality and allows it to open to consumers on the Web [115].Generalized research insights and implications for SaaS are:

•
Related trends in IoT allow businesses a communications outlet for promotion.

Smart Home IoT Devices
Even those who first rejected the technologies of smart houses and later embraced them as a blessing can hardly escape the appeal of IoT smart home apps.In the coming years, these devices will be popular and can be expected to dominate other future IoT trends in 2021.Such mobile apps can slowly become increasingly creative and give tremendous assistance to consumers through the use of advanced technologies.Intelligent home appliances not only provide great convenience but also make families more comfortable and happy at home [117].Generalized research insights and implications for smart home technologies are:

•
In the future, IoT devices for smart cities and homes will be popular and will dominate other future IoT trends in 2021.

IoT Security
With more and more apps linking items to the internet, vast amounts of knowledge can be accessed across various networks.More detail becomes a danger as the network grows.Therefore, it is necessary to maintain secure IoT protection to protect data from manipulation and malicious attacks through the use of IoT.Like all other IoT developments, this will prove to be a significant one in the near future.Throughout the coming years, IoT health will become a significant focus for the easier and better production of smartphone applications focused on IoT.Data are at higher danger in the cloud [123].Generalized research insights and implications for IoT security are:

•
When developing IoT systems, security and privacy issues should be considered.

•
Safe systems for information delivery should be developed and applied.

•
Compared with other conventional IoT systems, the architecture of the IoT system for the delivery of information should be economical.

Importance of Blockchain and Big Data Analytics in IoT
Big Data has been around for a long time, and blockchain technology is currently riding the crest of a wave of popularity.The addition of blockchain to the Big Data analytics process adds another data layer.The ledger's data can be related to energy trade, real estate, and a variety of other fields.This fact has resulted in a slew of Big Data analytics enhancements [128].For example, fraud protection is possible thanks to blockchain technology, which allows financial institutions to monitor each transaction in real time.As a result, rather than reviewing the records of previous frauds, banks are now able to identify dangerous or fraudulent transactions on the fly, preventing fraud entirely.The importance of these emerging technologies in IoT is discussed below.

Big Data Analytics in IoT
Over the past several years, the IoT has become an integral part of our daily lives.A large number of sensors or intelligent gadgets have been combined to link humans to the real environment, generating vast amounts of sensing data in the process.IoT device data is gathered, distributed, and transferred among individuals, businesses, and society.The quantity of data created by enterprises or people has increased considerably as a result of the growth of IoT.Despite the great benefit of the huge amount of data created in the IoT environment, researching and utilising this data's amazing worth will increase the danger of privacy violation [129].The acquisition, storage, and reuse of data for financial gain presents a severe danger to privacy.As a result, researchers have the difficult task of ensuring data utility while maintaining privacy.In order to preserve data privacy, a variety of strategies have been created.These data privacy approaches may be classified into three categories depending on the stages of the big data life cycle [130].
IoT systems are made up of a large number of devices and sensors that interact with one another.The number of these sensors and devices is continuously expanding due to the significant growth and extension of the IoT network [131].These gadgets connect and send large amounts of data via the internet.This data is massive and updated every second, earning it the moniker "big data".With the continued growth of IoT-based networks, complicated issues such as data management and collection, storage and processing, and analytics can arise [132].An IoT big data framework for smart buildings may help with a variety of challenges in smart buildings, including monitoring oxygen levels, measuring smoke and hazardous gases, and determining brightness.Such a framework is capable of collecting data from building sensors and doing data analytics for decision-making [133].Furthermore, an IoT-based cyber-physical system equipped with information analysis and knowledge acquisition methodologies might boost industrial productivity.In smart cities, traffic congestion is a major concern.IoT devices and sensors embedded in traffic signals can collect real-time traffic information, which can then be processed in an IoT-based traffic management system [134].
In healthcare analysis, IoT sensors attached to patients create a large amount of data regarding their health status every second.This vast volume of data must be consolidated into a single database and analyzed in real-time to make rapid, accurate decisions, and big data technology is the best tool for the task.In conjunction with big data analytics, IoT can also aid in the transformation of conventional industrial techniques into new ones [135].Furthermore, cloud computing and analytics may aid in the development and conservation of energy while lowering costs and increasing customer satisfaction.IoT devices create a large volume of streaming data that must be efficiently stored and analyzed to make realtime decisions.Deep learning is particularly adept at dealing with enormous amounts of data, and can produce very accurate results.As a result, combining IoT, Big Data Analytics, and Deep Learning is critical for the development of a high-tech civilization [136].

Blockchain Analytics in IoT
We are now surrounded by a plethora of IoT devices and sensors.These gadgets are intended to make life easier and more pleasant.Blockchain technology, particularly its widespread implementation, is quickly becoming a household name.There are still obstacles to overcome when it comes to integrating blockchains into corporate networks.The use of blockchain technology can improve network security and efficiency [137][138][139].The blockchain's main property, immutability, makes it resistant to illegal changes.Because a blockchain stores the whole history of device configuration modifications, recovering after an event is simple.A blockchain, also known as a distributed shared ledger, is a cryptographically secure store of records.Devices that download a configuration file from a centralized server must have faith in that authority, and if that trust is broken, the device becomes susceptible.There is no need for a central authority with a blockchain.Peer-to-peer exchanges allow devices to trade assets directly with one another [140][141][142][143].
The blockchain has a few essential characteristics that set it apart from other databases.For starters, it is automatically dispersed.It is futile to try to build a blockchain network with only one node.Next, blockchain records are immutable, which means they cannot be deleted or modified.This would invalidate their validity.Only by adding a fully new record may records be updated.In this manner, a safe history of all modifications may be retained.Smart contracts (chaincode) are used on the blockchain to ensure that preset business rules are followed correctly [144].A smart contract is a computer program or agreement that is run by nodes on a blockchain for automation.Devices should be connected wirelessly, opening up new opportunities for system interactions as well as additional choices for device control and tracking and the introduction of sophisticated service capabilities [145].When compared to network devices in business contexts, IoT devices are constrained by design, with limitations on available resources and performance.When creating a management and monitoring system for IoT devices, this must be taken into account.Different settings and levels of monitoring are used by the heterogeneity of IoT devices for diverse goals.Because business network settings include a similar variety of devices, current network monitoring and management tools may be adapted for IoT implementation [146][147][148][149][150].

Conclusions
Recent advances in IoT have drawn the attention of researchers and developers all over the world.IoT developers and researchers are collaborating to bring these technologies to a wider audience and to benefit society as much as possible.However, improvements are only possible if we take into account the various issues and flaws in current technical approaches.To provide intelligent services, IoT must allow seamless communication anywhere, for anyone and anything.This includes detecting, sensing, networking, encoding, and visualization capabilities.This concept has opened up a slew of new possibilities for large-scale service and product development, resulting in many new ideas and business opportunities.The technological standards required for IoT implementation is explored in this review paper.Furthermore, basic communication entities and networks that underpin IoT are examined to anticipate challenges with IoT implementation.We have discussed several issues and challenges that IoT developers must consider when developing a better model, and most importantly, IoT application areas in which IoT developers and researchers are currently involved are presented.This research also contains a detailed review of protocols used for various applications and the security issues involved in implementing the IoT.Future research directions, implementation challenges, and open issues are also reviewed for real-time scenarios.

Figure 2 .
Figure 2. Outline of the paper.
inability 2022, 13, x FOR PEER REVIEW 14 of check framework, it is necessary to construct a security system.Health technicians an paramedics now use a variety of protection frameworks and equipment.

Figure 6 .
Figure 6.The system architecture of IoT with fog computing.

Figure 6 .
Figure 6.The system architecture of IoT with fog computing.

2 Figure 17 .Figure 17 .
Figure 17.Challenges in IoT [89-98].6.1.Data ManagementDue to billions of IoT devices, data management is the biggest challenge in th sent scenario.While there are several other IoT protocols as well as Near Field Com cation (NFC), RFID, and Thread, it is important to note that every standard has its d specifications and advantages.Studying these specifications is an essential aspect f

•
To clarify IoT vision and definitions and to provide a comprehensive overview of IoT features • To elaborate on the various IoT architectures, and protocols that result from the integration of IoT with different technologies • Designing a technical taxonomy to classify the various IoT applications • To provide a discussion about open IoT issues and challenges in IoT applications.

Table 1 .
IoT-based research topics related with literature pool.

Table 2 .
Comparative study of various reported work on the state of the art in the IoT field, with research directions.