| Literature DB >> 35336261 |
Mamoona Majid1, Shaista Habib1, Abdul Rehman Javed2, Muhammad Rizwan3, Gautam Srivastava4,5, Thippa Reddy Gadekallu6, Jerry Chun-Wei Lin7.
Abstract
The 21st century has seen rapid changes in technology, industry, and social patterns. Most industries have moved towards automation, and human intervention has decreased, which has led to a revolution in industries, named the fourth industrial revolution (Industry 4.0). Industry 4.0 or the fourth industrial revolution (IR 4.0) relies heavily on the Internet of Things (IoT) and wireless sensor networks (WSN). IoT and WSN are used in various control systems, including environmental monitoring, home automation, and chemical/biological attack detection. IoT devices and applications are used to process extracted data from WSN devices and transmit them to remote locations. This systematic literature review offers a wide range of information on Industry 4.0, finds research gaps, and recommends future directions. Seven research questions are addressed in this article: (i) What are the contributions of WSN in IR 4.0? (ii) What are the contributions of IoT in IR 4.0? (iii) What are the types of WSN coverage areas for IR 4.0? (iv) What are the major types of network intruders in WSN and IoT systems? (v) What are the prominent network security attacks in WSN and IoT? (vi) What are the significant issues in IoT and WSN frameworks? and (vii) What are the limitations and research gaps in the existing work? This study mainly focuses on research solutions and new techniques to automate Industry 4.0. In this research, we analyzed over 130 articles from 2014 until 2021. This paper covers several aspects of Industry 4.0, from the designing phase to security needs, from the deployment stage to the classification of the network, the difficulties, challenges, and future directions.Entities:
Keywords: Internet of Things (IoT); computer networks; industrial revolution 4.0 (IR 4.0); network security; state-of-the-art; systematic literature review (SLR); wireless sensor networks (WSN)
Mesh:
Year: 2022 PMID: 35336261 PMCID: PMC8950945 DOI: 10.3390/s22062087
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Architecture of wireless sensor network (WSN).
Figure 2Application of wireless sensor network (WSN).
Figure 3CPS system–integration of IoT, wireless devices, and people in Industry 4.0.
List of Abbreviations.
| Abbreviation | Description |
|---|---|
| 5G | fifth generation |
| 6G | sixth generation |
| AR | augmented reality |
| CPS | cyber physical system |
| DDoS | distributed denial of service |
| DNS | domain name system |
| DoS | denial of service |
| DT | digital twin |
| FoI | field of interest |
| GUI | graphical user interface |
| ID 4.0 | Industry 4.0 |
| IIoT | industrial internet of things |
| IoT | internet of things |
| IR 4.0 | industry revolution 4.0 |
| IWSN | industrial wireless sensor network |
| IWSAN | industrial wireless sensor and actuator network |
| PREQ | request packet |
| QoS | quality of service |
| RFID | radio frequency identification |
| SEPTIC | self protecting databases from attacks |
| SG | smart grid |
| SIRP | self-optimized smart routing protocol |
| SLR | systematic literature review |
| UASN | underwater acoustic sensor networks |
| WSN | wireless sensor network |
| WSAN | wireless sensor area network |
Comparative analysis of the existing review papers. Key: deployment category—DC, literature review—LR, security overview—SO, bibliometric literature review—BLR, systematic literature review—SLR.
| Reference | Year | Review Type | DC | Application Types | IoT and WSN Architecture Used | Challenges and Issues | R. Q. |
|---|---|---|---|---|---|---|---|
| [ | 2015 | LR | Industry | 802.11 (WiFi) technology in smart cities | WSN | × | × |
| [ | 2020 | LR | Science | IoT sensing applications discussed using sensing technology | WSN using RFID | Energy harvesting, communication interference, fault tolerance, higher capacities to handling data processing, cost feasibility. | × |
| [ | 2016 | SO | Industry | IoT application in smart grids | IoT | Challenges discussed along with solutions to cope with | × |
| [ | 2017 | SO | Industry | Deployment techniques discussed using sensor network | WSN | Communication cost, coverage time, accuracy, etc. | × |
| [ | 2016 | LR | WSN applications in urban areas | Urban areas | WSN | Problems and solution of each WSN application | × |
| [ | 2014 | SO | Industry | Network security protocols discussed in industrial applications | WSN | Challenges of stack protocol and their solutions | × |
| [ | 2020 | SLR | Smart factories | Scope and conceptualization of IoT in Industry 4.0 | IoT | × | ✔ |
| [ | 2020 | LR | Smart IoT devices | Detailed survey on security threat models applicable for IoT and WSN. They also discussed communication attacks and taxonomy of IoT and WSN | Both | ✔ | × |
| [ | 2019 | LR | – | Discussed technical and social perspective of IoT for future technology enhancement | IoT | ✔ | × |
| [ | 2017 | SLR | Smart cities | Applications, security, and taxonomy in IoT | IoT | × | × |
| [ | 2019 | LR | Industrial | Applications and usage of actuators and sensor networks using MAC protocol. | IWSN | Security challenges on different layers of the stack, also discussed their solutions | × |
| [ | 2016 | LR | – | Technologies, innovations, and applications of IoT discussed. | IoT | ✔ | × |
| [ | 2014 | LR | Industrial | Coverage areas of WSN are discussed | WSN | Challenges they face were: Node type, depth type, communication range, etc. | × |
| [ | 2016 | SUR | Industrial | Applications of intrusion detection system in IoT | IoT | × | × |
| [ | 2015 | SUR | Industrial | Only explore and analyze existing solution to detect sinkhole attack | WSN | × | × |
| [ | 2020 | LR | – | × | Both | Discuss attacks in IoT ans WSN with their solutions, advantages, and limitation | × |
| [ | 2021 | SLR | Smart mobiles | Routing attacks and security measures in mobile network are discussed | WSN | × | × |
| [ | 2021 | LR | Industrial | Detection of wormhole in both domains | Both | × | ✔ |
| [ | 2017 | SUR | IoT systems | Software board and chips, crypto algorithms, security of IoT systems, and network protocols are discussed | IoT | – | × |
| [ | 2015 | SUR | – | Existing security approaches of IoT system are described | IoT | ✔ | × |
| [ | 2016 | SUR | – | Deployment models for sensor network to achieve coverage, their classification and working was discussed | WSN | × | × |
| [ | 2018 | BLR | Smart factory & Industry | Discuss 12 approaches of Industry 4.0. in business and account management fields | IoT | × | × |
| This Paper | 2021 | SLR | Smart industry and Factory | Applications and contribution of both IoT and WSN are discussed in detail | IoT and WSN (both) | Key challenges and open issues of both IoT and WSN in Industry 4.0 are discussed | ✔ |
Research questions.
| Research Questions (RQ) | |
|---|---|
| RQ1 | What are the contributions of WSN in IR 4.0? |
| RQ2 | What are the contributions of IoT in IR 4.0? |
| RQ3 | What are the types of WSN coverage areas for IR 4.0? |
| RQ4 | What are the major types of network intruders in WSN and IoT systems? |
| RQ5 | What are the prominent network security attacks in WSN and IoT? |
| RQ6 | What are the major issues in IoT and WSN frameworks? |
| RQ7 | What are the limitations and research gaps in the existing work? |
Figure 4Planning process of systematic literature review (SLR).
Figure 5Repositories versus number of studies Used.
Search strings.
| Sr. No. | Groups | Group Search Query |
|---|---|---|
| 1 | Group 1 | Application of WSN in IR 4.0. |
| 2 | Group 2 | Implementation of IoT infrastructure in IR 4.0. |
| 3 | Group 3 | Industrial Revolution 4.0. for smart manufacturing |
| 4 | Group 4 | Security attacks, issues, and challenges of IoT and WSN in IR 4.0. |
| 5 | Group 5 | Role of WSN and IoT systems in IR 4.0. |
Inclusion and exclusion criteria.
| Inclusion Criteria | |
|---|---|
| 1 | Include only those papers written in the English language. |
| 2 | Include papers that were published in 2014–2021. |
| 3 | Include papers that reflected enough knowledge about the search strings and search objectives. |
| 4 | Include papers whose titles, keywords, abstracts, and conclusions provided enough information related to WSN, IoT, and IR 4.0. |
| 5 | Include papers whose content focused on WSN, IoT, and IR 4.0 content and provided in depth insights. |
| Exclusion Criteria | |
| 1 | Exclude papers written in a language other than the English language. |
| 2 | Exclude gray papers. |
| 3 | Exclude papers that were not published within 2014–2021. |
| 4 | Exclude research papers containing less than three pages. |
| 5 | Exclude papers that failed to meet the inclusion criteria. |
Figure 6Year-wise distribution of articles.
Selection criteria versus response graded.
| Criteria | Selection Criteria | Graded Response |
|---|---|---|
| C1 | Is the aim of research and context clearly defined? | 1, 0.5, 0 (yes, nominally, no) |
| C2 | Is the context of research well addressed? | 1, 0.5, 0 (yes, nominally, no) |
| C3 | Are the findings clearly stated? | 1, 0.5, 0 (yes, nominally, no) |
| C4 | Based on the findings, how valuable is the research? | >80% = 1, <20% = 0, in between = 0.5 |
Selected studies used for SLR analysis.
| Sr. No. | Title of Research | Authors | Year |
|---|---|---|---|
| 1. | Cyber-Physical Systems Security: Analysis, Challenges, and Solutions | Y. Ashibani and Q. H. Mahmoud | 2017 |
| 2. | A Review of IoT sensing applications and challenges using RFID and wireless sensor networks | H. Landaluce, L. Arjona, A. Perallos, F. Falcone, I. Angulo, and F. Muralter | 2020 |
| 3. | Enhancement of relay nodes communication approach in WSN-IoT for underground coal mine | R. Sharma and S. Prakash | 2020 |
| 4. | Applications of wireless sensor networks for urban areas: A survey | B. Rashid and M. H. Rehmani | 2016 |
| 5. | An empirical study of application layer protocols for IoT | U. Tandale, B. Momin, and D. P. Seetharam | 2017 |
| 6. | Digital twin technologies and smart cities. | M. Farsi, A. Daneshkhah, A. Hosseinian-Far, and H. Jahankhani | 2020 |
| 7. | Internet of things (IoT) embedded future supply chains for Industry 4.0: An assessment from ERP-based fashion apparel and footwear industry | M. A. A. Majeed and T. D. Rupasinghe | 2017 |
| 8. | Towards Industry 4.0 utilizing data-mining techniques: a case study on quality improvement | H. Oliff and Y. Liu | 2017 |
| 9. | An industrial perspective on wireless sensor networks-a survey of requirements, protocols, and challenges | A. A. Kumar S., K. Ovsthus, and L. M. Kristensen. | 2014 |
| 10. | The smart factory as a key construct of Industry 4.0: A systematic literature review | P. Osterrieder, L. Budde, and T. Friedli | 2020 |
| 11. | Social expectations and market changes in the context of developing the Industry 4.0 concept | S. Saniuk, S. Grabowska, and B. Gajdzik | 2020 |
| 12. | Key IoT Statistics | B. Jovanović | 2021 |
| 13. | 30 Internet of Things – IoT stats from reputable sources in 2021 | A. Multiple | 2021 |
| 14. | Wide-area and short-range IoT devices | S. O’Dea | 2021 |
| 15. | The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0 | M. Wollschlaeger and T. Sauter and J. Jasperneite | 2017 |
| 16. | Internet of things (IoT): a technological analysis and survey on vision, concepts, challenges, innovation directions, technologies, and applications | G. Misra, V. Kumar, A. Agarwal, and K. Agarwal | 2016 |
| 17. | EDHRP: Energy-efficient event-driven hybrid routing protocol for densely deployed wireless sensor networks | Faheem M, Abbas MZ, Tuna G, Gungor VC. | 2015 |
| 18. | A survey on deployment techniques, localization algorithms, and research challenges for underwater acoustic sensor networks. | Tuna G, Gungor VC | 2017 |
| 19. | Lrp: Link quality-aware queue-based spectral clustering routing protocol for underwater acoustic sensor networks | Faheem M, Tuna G, Gungor VC | 2017 |
| 20. | Design and deployment of a smart system for data gathering in aquaculture tanks using wireless sensor networks | Parra L, Sendra S, Lloret J, Rodrigues JJ. | 2017 |
| 21. | WSN-and IoT-based smart homes and their extension to intelligent buildings. Sensors | Ghayvat H, Mukhopadhyay S, Gui X, Suryadevara N | 2015 |
| 22. | Conceptual model for informing user with an innovative smart wearable device in Industry 4.0 | M. Periša, T. M. Kuljanić, I. Cvitić, and P. Kolarovszki | 2019 |
| 23. | Evolution of wireless sensor network for air quality measurements | Arroyo, P.; Lozano, J.; Suárez, J. | 2018 |
| 24. | Industrial wireless sensor and actuator networks in Industry 4.0: Exploring requirements, protocols, and challenges—A MAC survey | S. Raza, M. Faheem, and M. Genes | 2019 |
| 25. | Cause the Industry 4.0 in the automated industry to new requirements on the user interface | C. Wittenberg | 2015 |
| 26. | Impact of 5G technologies on Industry 4.0 | G. S. Rao and R. Prasad | 2018 |
| 27. | Material efficiency in manufacturing: Swedish evidence on potential, barriers, and strategies | S. Shahbazi et al. | 2016 |
| 28. | Organizational change, and industry 4.0 (id4). A perspective on possible future challenges for human resources management | J. Radel | 2017 |
| 29. | Organizational culture as an indication of readiness to implement Industry 4.0 | Z. Nafchi and M.Mohelská | 2020 |
| 30. | Smart production planning and control: concept, use-cases, and sustainability implications | O.E, Oluyisola | 2020 |
| 31. | Fortune favors the prepared: How SMEs approach business model innovations in Industry 4.0. | J. M. Müller et al. | 2018 |
| 32. | Visual computing as a critical enabling technology for industries 4.0 and industrial Internet | J. Posada et al. | 2015 |
| 33. | Digitalization and energy consumption. Does ICT reduce energy demand | S. Lange | 2020 |
| 34. | Industry 4.0: adoption challenges and benefits for SMEs | T. Masood and P. Sonntag | 2020 |
| 35. | Measurement and analysis of corporate operating vitality in the age of digital business models | J. Zhu et al. | 2020 |
| 36. | Cyber security and the Internet of Things: vulnerabilities, threats, intruders and attacks | M. Abomhara and G. M. Køien | 2015 |
| 37. | Sharing user IoT devices in the cloud | Y. Benazzouz, C. Munilla O. Gunalp, M. Gallissot, and L. Gurgen | 2014 |
| 38. | Security in Internet of things: Challenges, solutions, and future directions | S. A. Kumar, T. Vealey, and H. Srivastava | 2016 |
| 39. | Survey of intrusion detection system towards an end-to-end secure internet of things | A. A. Gendreau, M. Moorman | 2016 |
| 40. | Recent advances and trends in predictive manufacturing systems in a big data environment | J. Lee et al. | 2015 |
| 41. | A comprehensive dependability model for QOM-aware industrial WSN when performing visual area coverage in occluded scenarios | T. C. Jesus, P. Portugal, D. G. Costa, and F. Vasques | 2020 |
| 42. | Security issues and challenges on wireless sensor networks | M. A. Elsadig, A. Altigani, and M. A. A. Baraka | 2019 |
| 43. | Challenges of Wireless Sensor Networks and Issues associated with Time Synchronization | G. S. Karthik and A. A. Kumar | 2015 |
| 44. | Design and analysis of intrusion detection protocols for hierarchical wireless sensor networks | M. Wazid | 2017 |
| 45. | Intrusion detection protocols in wireless sensor networks integrated to the Internet of Things deployment: survey and future challenges | S. Pundir, M. Wazid, D. P. Singh, A. K. Das, J. J. P. C. Rodrigues, and Y. Park | 2020 |
| 46. | Robust malware detection for Internet of (battlefield) Things devices using deep Eigenspace learning [ | Azmoodeh, A. Dehghantanha, and K.-K.-R. Choo | 2019 |
| 47. | LSDAR: A lightweight structure-based data aggregation routing protocol with secure IoT integrated next-generation sensor networks. | Haseeb K, Islam N, Saba T, Rehman A, Mehmood Z. | 2020 |
| 48. | SEPTIC: Detecting injection attacks and vulnerabilities inside the DBMS. | Medeiros, M. Beatriz, N. Neves, and M. Correia | 2019 |
| 49. | An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Computers and Electrical Engineering | Challa S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, et al. | 2018 |
| 50. | Internet of Things: vision, applications and challenges | Rishika Mehta, Jyoti Sahnib, Kavita Khannac | 2018 |
| 51. | A roadmap for security challenges in the Internet of Things | Arabia Riahi Sfar, Enrico Natalizio, Yacine Challal, Zied Chtourou | 2018 |
| 52. | A novel low-rate denial of service attack detection approach in ZigBee wireless sensor network by combining Hilbert-Huang transformation and trust evaluation | H. Chen, C. Meng, Z. Shan, Z. Fu, and B. K. Bhargava | 2019 |
| 53. | Analysis of quantities influencing the performance of time synchronization based on linear regression in low-cost WSN | D. Capriglione, D. Casinelli, and L. Ferrigno | 2016 |
| 54. | C–Sync: Counter-based synchronization for duty-cycled wireless sensor networks | K.-P. Ng, C. Tsimenidis, and W. L. Woo | 2017 |
| 55. | Time synchronization in WSN with random bounded communication delays. | Y.-P. Tian | 2017 |
| 56. | A novel model of Sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend It | M. Jamshidi, E. Zangeneh, M. Esnaashari, A. M. Darwesh, and A. J. Meybodi | 2019 |
| 57. | Challenges, threats, security issues, and new trends of underwater wireless sensor networks | G. Yang, L. Dai, and Z. Wei | 2018 |
| 58. | Industry 4.0 key research topics: A bibliometric review | D. Trotta and P. Garengo | 2018 |
| 59. | Privacy in the Internet of Things: threats and challenges | J. H. Ziegeldorf, O. G. Morchon, and K. Wehrl | 2015 |
| 60. | On the security and privacy of the Internet of Things architectures and systems. | E. Vasilomanolakis, J. Daubert, M. Luthra, V. Gazis, A. Wiesmaier and P. Kikiras | 2015 |
| 61. | Cybersecurity issues in wireless sensor networks: current challenges and solutions | D. E. Boubiche, S. Athmani, S. Boubiche, and H. Toral-Cruz | 2020 |
| 62. | A security model for IoT-based systems | Z. Safdar, S. Farid, M. Pasha, and K. Safdar | 2017 |
| 63. | Security issues and challenges in IoT routing over wireless communication | G. Saibabu, A. Jain, and V. K. Sharma | 2020 |
| 64. | Security and privacy consideration for Internet of Things in smart home environments | Desai, Drushti, and Hardik Upadhyay | 2015 |
| 65. | E.D. Security and grand privacy challenges for the Internet of Things | Fink, G.A., Zarzhitsky, D. V., Carroll, T.E., and Farquhar | 2015 |
| 66. | A comprehensive approach to privacy in the cloud-based Internet of Things. | Henze, M., Hermerschmidt, L., Kerpen, D., Häußling, R., Rumpe, B., and Wehrle, K. | 2016 |
| 67. | Towards an analysis of security issues, challenges, and open problems on the internet of Things. | Hossain, A. J., Fotouhi, M., and Hasan, R. | 2015 |
| 68. | An End-to-end view of IoT security and privacy | Zhen Ling, Kaizheng Liu, Yiling Xu, YierJin, XinwenFu | 2017 |
| 69. | Security and privacy considerations for IoT application on smart grids: Survey and research challenges | Dalipi, F.; Yayilgan, S.Y. | 2016 |
| 70. | Internet of Things security: A survey | Alaba, Fadele Ayotunde, et al. | 2017 |
| 71. | Security for the Internet of things: a survey of existing protocols and open research issues | J. Granjal, E. Monteiro, J. Silva | 2015 |
| 72. | Security, privacy and trust in Internet of things: the road ahead | S. Sicari, A. Rizzardi, L.A. Grieco, A. Coen-Porisini | 2015 |
| 73. | Access control and authentication in the Internet of Things environment | A.K. Ranjan, G. Somani | 2016 |
| 74. | Toward secure and provable authentication for the Internet of Things: realizing Industry 4.0 | S. Garg, K. Kaur, G. Kaddoum, and K. K. R. Choo | 2020 |
| 75. | Prediction of satellite shadowing in smart cities with application to IoT | S. Hornillo-Mellado, R. Martín-Clemente, and V. Baena-Lecuyer | 2020 |
| 76. | Software-defined industrial Internet of Things in the context of Industry 4.0 | J. Wan et al. | 2016 |
| 77. | Residual energy-based cluster-head selection in WSN for IoT application. | T. M. Behera, G. S. Mohapatra, U. C. Samal, M. G. S. Han, M. Daneshmand, and A. H. Gandomi | 2019 |
| 78. | DistB-SDoIndustry: enhancing security in Industry 4.0 services based on the distributed blockchain through software-defined networking-IoT enabled architecture, | A. Rahman et al. | 2020 |
| 79. | Application of IoT-aided simulation to manufacturing systems in the cyber-physical system | Y. Tan, W. Yang, K. Yoshida, and S. Takakuwa | 2019 |
| 80. | Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in Industry 4.0 [ | Y. Wu, H.-N. Dai, and H. Wang | 2020 |
| 81. | Comparative study of IoT-based topology maintenance protocol in a wireless sensor network for structural health monitoring | M. E. Haque, M. Asikuzzaman, I. U. Khan, I. H. Ra, M. S. Hossain, and S. B. Hussain Shah | 2020 |
| 82. | Toward dynamic resources management for IoT-based manufacturing | J. Wan et al. | 2018 |
| 83. | SENET: A novel architecture for IoT-based body sensor networks | Z. Arabi Bulaghi, A. Habibi Zad Navin, M. Hosseinzadeh, and A. Rezaee | 2020 |
| 84. | Bio-inspired routing protocol for WSN-based smart grid applications in the context of Industry 4.0 | M. Faheem et al. | 2019 |
| 85. | IoT and wireless sensor network-based autonomous farming robot | A. Khan, S. Aziz, M. Bashir, and M. U. Khan | 2020 |
| 86. | Efficient and secure three-party mutual authentication key agreement protocol for WSN in IoT environments | C. T. Chen, C. C. Lee, and I. C. Lin | 2020 |
| 87. | Wireless sensor network combined with cloud computing for air quality monitoring | P. Arroyo, J. L. Herrero, J. I. Suárez, and J. Lozano | 2019 |
| 88. | Edge computing-enabled wireless sensor networks for multiple data collection tasks in Smart Agriculture | X. Li, L. Zhu, X. Chu, and H. Fu | 2020 |
| 89. | Cluster centroid-based energy-efficient routing protocol for WSN-Assisted IoT | N. Prophess, R. Kumar, and J. B. Gnanadhas | 2020 |
| 90. | An energy-efficient and secure IoT-based WSN framework: an application to smart agriculture | K. Haseeb, I. U. Din, A. Almogren, and N. Islam | 2020 |
| 91. | Deployment schemes in a wireless sensor network to achieve blanket coverage in large-scale open area | Vikrant Sharmaa, R.B. Patelb, H.S. Bhadauriaa, D. Prasadc | 2016 |
Figure 7Graded percentage of selected studies.
Figure 8Taxonomy of existing studies.
Network Security Attacks on IoT and WSN Layers.
| Sr. No. | Layer Name | Attacks |
|---|---|---|
| 1 | Physical layer | Interception, radio interference, jamming, tempering, Sybil attack. |
| 2 | Data link layer | Replay attack, Spoofing, altering routing attack, Sybil Attack, collision, traffic analysis, and monitoring, exhaustion. |
| 3 | Network layer | Black hole attack, wormhole attack, sinkhole attack, grey hole attack, selective forwarding attack, hello flood attack, misdirection attack, internet smurf attack, spoofing attack. |
| 4 | Transport layer | De-synchronization, transport layer flooding attack. |
| 5 | Application layer | Spoofing, alter routing attack, false data ejection, path-based DoS. |
Figure 9Issues in WSN and IoT Framework.
Contributions and limitation of the literature.
| Reference | Title of Article | Proposed Solution | Limitations and Future Work |
|---|---|---|---|
| Sharma et al. [ | Enhancement of relay nodes communication approach in WSN-IoT for underground coal mine | They designed relay node structures for a wireless sensor network and load balancing to improve network lifetime parameters. They designed an IoT-based WSN to provide advance warning of any natural disaster in coal mines. | There were several analysis parameters to analyze the networks, such as network lifetime, communication and transmission cost, energy consumption, and coverage of the whole area. |
| Faheem et al. [ | Bio-inspired routing protocol for WSN-based smart grid applications in the context of Industry 4.0 | They designed a comprehensive, optimized, and QoS monitoring multi-hop network system for real-time data transmission in Industry 4.0. This self-optimized smart routing protocol (SIRP) was efficiently used for WSN-based SG applications. | In the future, they will attempt to enhance their developed SIRP routing scheme and communications architecture to collect QoS-aware data for different WSN-based smart grid applications with little data redundancy. |
| Arslan et al. [ | IoT and wireless sensor network-based autonomous farming robot | They developed a computer vision-based algorithm used for the classification of weed and a non-image. Wireless sensor nodes detect weed images through image processing methods and gather light, temperature, humidity, and moisture data. | The limitation of this work is that they did not provide any GUI or mobile application control to work robot autonomously. |
| Chen et al. [ | Efficient and secure three-party mutual authentication key agreement protocol for WSN in IoT environments | They proposed a practical and secure approach to merge IoT and WSN. Their scheme had high performance, low communication, and computational costs, low energy consumption, and provided effective authentication of the user in IoT. | The limitation of this study is that they did not provide a solution to the security threats in a heterogeneous IoT environment. In the future, they will evaluate the reliability and scalability of their systems of heterogeneous environments. |
| Rathee et al. [ | A secure IoT sensors communication in Industry 4.0 using blockchain technology | Wireless sensor network security improved using blockchain and compared security metrics. &It ensured confidentiality and responsibility and tracked each sensor’s operation. The blockchain was used to store IoT artifacts and sensors. | The developed IoT sensor takes time to test a single block before it is put to the blockchain. |
| Mellado et al. [ | Prediction of satellite shadowing in smart cities with application to IoT | The technology had a minimal processing load. It was highly desirable to create a coverage map that can optimize network resources in satellites. | There is a lack of evaluation of requirements for satellite-based IoT and output connectivity protocols through simulations in actual situations. |
| Garg et al. [ | Towards secure and provable authentication for the internet of things: realizing Industry 4.0 | The effectiveness of the developed protocol was evaluated with frequently utilized AVISPA, PUFs, and ECC encryption algorithms. A proposed technique was developed to create a durable, stable, and efficient user architecture that promotes shared authentication for IoT and server nodes and is resistant to cyber threats. | This protocol is for academic and research purposes only, and its implementation has not yet been tested in the real world. |
| Behera et al. [ | Residual energy-based cluster-head selection in WSN for IoT application | The method takes into account the intended value of initial energy, residual energy, and cluster heads to choose the specific set of cluster heads in the network that adapts IoT applications to maximize flow, durability, and residual energy. | They did not review existing path selection factors in a node mobility network that altered its role constantly. |
| Wan et al.
[ | Software-defined industrial Internet of Things in the context of industry 4.0 | They proposed a new idea of information interaction in Industry 4.0 using software-defined IIoT. They enhanced the network size using IIoT. The IIoT architecture manages physical devices and information exchange methods via a customized networking protocol. | The limitation of the study is the effective coordination between IIoT where the network is heterogeneous for transmission of information. |
| Tan et al. [ | Application of IoT-aided simulation to manufacturing systems in cyber-physical systems | They discussed the construction and implementation methods of digital twin (DT). In this study also explained the issues involved in developing DT with the help of IoT manufacturing devices. DT is the simulation tool that can gather and synchronize data for the real world to a real-time environment. | The absence of experimentation and optimization in predicting future locations or results are other essential aspects of DT. |
| Rahman et al. [ | DistB-SDoIndustry: enhancing security in Industry 4.0 services based on the distributed blockchain through software-defined networking-IoT enabled architecture | In this work, the authors develop a distributed blockchain-based security system integrated with the help of IoT and SDN. Blockchain is used for data security and confidentiality, while SDN-IoT incorporates sensor networks and IoT devices to improve the security services in Industry 4.0. | Limitations of this study are that the developed model SDN-IoT was still in the initial stage, so it was not able to detect different types of risks, such as service denial (DoS) and flood attack and packet filtering. The developed system had no proper GUI, so the throughput, packet arrival time, and response time were rarely challenging to analyze. |
| Haque et al. [ | Comparative study of IoT-based topology maintenance protocol in a wireless sensor network for structural health monitoring | They developed a computer-based monitoring system to analyze the vibration or earthquake measurement. WSN are used to sense structural damages and identify their pinpoint location. They also proposed a topology-based maintenance system to analyze network architecture. Their system was an energy-efficient system that automatically turned off nodes where no traffic was detected. | The limitation of this study is that WSN nodes are not capable enough to provide scalability for large coverage areas. |
| Wan et al. [ | Toward dynamic resources management for IoT-based manufacturing | To build a fully interactive environment and dynamic management of resources, an ontology-based technology, SDN, communication technology device to device combined with ontology modeling and multi-agency technology were used to accomplish sophisticated administration of resources. They solved load secluding problems using Jena logic reasoning and contract-net protocol-based technology in Industry 4.0. | The limitation of this work was the high time complexity of the load balancing algorithm to complete the task efficiently. It was challenging to refine the process due to the complex nature of multi-agent technology, and referencing rules were much more complex. |
| Bulaghi et al. [ | SENET: a novel architecture for IoT-based body sensor networks | Multiple algorithms, such as particle swarm optimization (PSO), ant colony optimization (ACO), and genetic algorithms (GA) were used to save energy of WSN. They evaluated WSN energy consumption using optimization algorithms and calculated the total number of uncovered points, their stability, and dependability. | The design meets some disadvantages and does not work in real-time data. |
| Thiago et al. [ | A comprehensive dependability model for QoM-aware Industrial WSN | When performing visual area coverage in occluded scenarios. They proposed a mathematical model named quality of monitoring parameter (QoM) to assess the dependability of WSN, their availability, and reliability considering hardware, networking, and visual coverage failures. | Their developed method was inefficient at analyzing the system’s dependability in real-time applications due to failures or repairs happening as soon. |
| Patricia et al. [ | Wireless sensor network combined with cloud computing for air quality monitoring | They designed a small size, low cost, and efficient system to monitor the air quality using wireless sensor nodes. They performed multiple algorithms such as multi-layer perceptron, SVM, and PCA to discriminate and quantify the volatile organic compounds. | The limitation of this study is that sensor nodes are less efficient at covering a large area to monitor and cannot do real-time testing and the field measurements of sensors. |
| Li et al. [ | Edge computing-enabled wireless sensor networks for multiple data collection tasks in smart agriculture | They designed a data collection algorithm considering data quality factors in smart agriculture. Then modeled the data collection process by merging WSN and IoT. | The developed edge computing driven framework [ |
| Kumar et al. [ | Cluster centroid-based energy-efficient routing protocol for WSN-assisted IoT | They developed a system that was capable of self-organization of local nodes to save energy. Their system adopted new algorithms to rotate head clusters based on centroid locations in IoT using WSN. The technique exceeds conventional protocols for efficiency criteria, such as the consumption of energy by the network, intermediate sensor node, packet distribution ratio, packet failure percentage, and network output. Their work was best for the base station located in the network. | The routing protocol was not optimal, routing strategies were lacking, and packet loss was caused if the base stations were even in the network. In the future, they will enhance this work by using a multi-hop path strategy to the base station. In this technique, the cluster head will transmit data to the base station, even outside the network. |
| Haseeb et al. [ | An energy-efficient and secure IoT-based WSN framework: an application to smart agriculture | They proposed an IoT-based WSN framework that collected data from agriculture and transmitted it to the nearest base station. They enhanced network throughput, low latency rate, energy consumption, and packet drop ratio. They also provided security to the data transmission channel using the recurrence of the linear generator. | The limitation of this work is that they did not assess the device consistency in a mobile IoT. Therefore, they will analyze the performance and reliability of developed frameworks in the transportation system and mobile-based IoT network. |