1 Introduction

Billions of things [155] are integrated over the Internet and are embedded with software to communicate seamlessly. Standardization of IoT devices is achievable with limited vendors based on Platform, Connectivity [45], and Application. Initially Kevin Ashton [1] proposed IoT. Then later on, the Internet of Things (IoT) rooted in Massachusetts of Technology (MIT) and evolved around 2009 [60]. With IoT, homes become smarter [23] and smart cars [204] make our commute easier and safer. For smart homes to be customized, they need to be secured [255]. IoT visualizes distributed data networks with bilateral communication. In the first pre-internet phase, communication was through the telephone line and short message service (SMS). In the second phase, mobile and E-Mail took over in the Internet of content phase where information in the form of texts and images were exchanged. In the third Internet of Services phase, E-Commerce plunged in. In the fourth Internet of People phase, people communicated through social media such as Facebook, Skype, etc., In the enduring Era, devices connected and communicated through the Internet.Lately, interconnected devices [25] perform without human intervention based on Artificial Intelligence integration as depicted in Fig. 1.

Fig. 1
figure 1

Incremental Stages of IoT

With the sensational skyrocketed boom in IoT devices from million to 30 billion in 2020, the ecosystem [130] of IoT is becoming smarter [61] with pressing concerns on security and universal adaptability. When the devices talk to each other and to the person we get a customized environment. In the morning, when the alarm is connected to the heater, toaster, and internet we can get hot water from the heater, meal, and favorite music from the internet. Sensors embedded in every device continuously emit data and power the internet [181]. Devices collect information about the behavior and store it in the cloud. This facilitates machine learning without manual programming. QoS parameter based resource allocation [256] could be used for efficient management. End nodes like sensors collect data, process it using data analytics [233], and sends it to the cloud [252]. How do the devices create data? How is this data collected? With a lot of devices talking to each other, how is this huge data customized? Where do these data go? How this data is processed [191]? IoT provides a common repository for the devices to manage the data and a common language for these devices to communicate. Data analytics [44] is performed and valuable information is extracted as per requirement [142]. This data is shared securely with the devices for automation and efficiency. IoT is the synchronization of Human, Things, and the Internet as shown in Fig. 2. Analogous to people communicating through their five senses, the internet senses and communicates, thereby interconnecting people and things. Electronic machines transfer data to cloud over TCP/IP [274].Lost devices could be found using a mobile App. Public transportation, self- driving cars, connected apps, and real-time traffic information will revolutionize [196] the driving modalities. Based on its vision [75], IoT extends to the Web-of-Things (WoT) if objects are integrated into the Web, Cloud-of-Things (CoT), and Internet of Nano-Things (IoNT) [254]. IoT builds a smart environment [111] based on how it is integrated into the societal, professional, and personal requirements [123]. If it is M2M [157], it is directly between devices. This does not require an Internet Connection. Due to its limited potential, the future [169] of IoT is based on 5G, customized mobile App, software development, Artificial Intelligence, deployment, and cloud-based digital innovations. Due to its massive embracement, IoT is analyzed using simulations such as Omnet +  + [95]. Tagra et al. [268] analyzed lightweight IoT using java framework. Forecasting could be done using Google Trends Tool [102].

Fig. 2
figure 2

Evolution of IoT

The organizational structure of this review contributes towards: Overview, IoT Eco-system Functional Modules, Novel physiognomies of IoT, Significance of application-oriented IoT, Research Issues and Open Challenges [119], Architectural Insights, Design Issues related to security and lightweight algorithms, Inferences and Future directions.

2 IoT Ecosystem-Functional Artifacts

An ecosystem comprises of the devices, people, data, and processes.

  • Devices Things should sense, actuate, and interact with other things so IoT applications utilize sensor, actuator, processing unit, power supply, network connectivity, and a unique ID for deployment [82]. Things collect data from the environment. Data could be temperature or live video. A smartphone [96] cannot sense these parameters. Devices (Things) should be IP-enabled, dynamic, heterogeneous [91], interoperable, and scalable with a communication protocol such as Bluetooth or Wi-Fi to communicate with other things. Based on the data such as the image from a camera, the device moves an actuator or controls a motor. In yet another approach, multiple sensors gather information about humans. If a human approaches a robot, the human–machine interaction is made satisfactory by using chatbots along with Artificial Intelligence and Machine Learning Algorithms. [20].

  • IoT has heterogeneous [63] devices running on different platforms [175]. IoT platform is an intelligent [131] layer that connects things to the network and facilitates communiqué, device management, and functionality of applications. So the devices should be interoperable [109].Various scalable distributed architectures such as Distributed Internet-Like Architecture (DIAT) addresses heterogeneity and scalability issues in IoT [49]. FogBus offers platform-independent interfaces [253].

  • Interoperability is based on: (i) Device interoperability which manages the exchange of data between different devices and permits the addition of new devices (ii) Network interoperability that operates on multi-service and multi-vendor networks. This also manages addressing, routing and security issues [177, 294]. Peer-to-peer routing was proposed using a Distributed Hash Table (DHT) approach to guarantee scalability [90]. Multi-Technology interoperation reduces hardware resource usage but consumes more energy and reduces battery lifetime due to simultaneously active radio resources [9]. (iii) Data syntax format interoperability (iv) Platform interoperability (v) Semantic interoperability enables different services [174].

  • Connectivity State of devices are expected to change dynamically. With an increase in the number of devices, data gets increased. It should be possible to extend the existing features of IoT. A huge amount of data is sent to the cloud using communication media such as Mobile, Bluetooth, Wi-Fi networks etc., Devices should be network connectivity enabled.

  • Communication Protocols Devices and servers communicate through the protocols in the physical layer, network layer, and the application layer.

  • Data Processing and Associated Services Once the data is collected in the Cloud, it is processed by the respective software. Data processing varies from reading parameters to identifying objects. IoT provides services such as Device Discovery, Data Analytics, and Device Control. Data should be location or environment-specific. Data access should not be location-specific. Mobility is supported. Data is processed intelligently using data analytics techniques such as Artificial Intelligence and Machine Learning [78] for operational efficiency. Big data [32] collected is processed in the Cloud. Using analyzed intelligent data, the device is automated and could be remotely controlled.

  • User Interface The processed data is made available to the end-user either as a message or as a control element fed through an interface. For example in healthcare, real-time patient monitoring aids doctors in decision making.

  • Management This provides functions to manage an IoT system. IoT perspective is ecosystem-based. People generate and sustain IoT. As the network increase [35] with the number of devices, the amount of data to be handled is a massive challenge. Analyzing, processing, and delivering the data accurately at the right time is the success of real-time streaming IoT.

  • Security and Secrecy With online processing of personal data, endpoints need to be secured.

  • Application IoT gains real-time insight into data assets. With this a production unit can be modeled based on accurate predictions. This provides modules to monitor, visualize, and predict futuristic prospects [228].

  • IoT objects Machine, device, Users, or applications communicate through the Internet to consume, request or access digital information. Devices are connected to the Internet through a broadband modem provided by an ISP or through a wired /wireless connection using a router. A gateway connects the nodes to the Internet. A protocol is used to connect the devices and they are identified by an IP address.

3 IoT–A Substantial Frontier- Contributions and Utilities

IoT unifies heterogeneous things with interoperability through an IP based architecture. Internet-of-things [213] integrates [265] sensing, networking, storage, and analytics based on the trending areas of health, transport, industrial automation, etc. IoT is still in the nascent stage of development. It meets its key artifacts through these design contributions and utilities [243]. IoT forms an extensive design space comprising of various dimensions that include:

Accuracy Monotonous applications are less error-prone.

Application-Specific Cloud service providers are application-specific.

Automated Interoperability with Control IoT requires to be self-adaptive with intelligence [291], autonomous for data collection, and dynamic to the ecosystem with minimal plug and play configuration pre-requisites [49]. IoT depends on the social, environmental, and business [113] perspectives in the future [193].

Economical IoT promotes economic resource utilization [43]. It minimizes cost, time, and labor. It maximizes productivity returns and minimizes cost [55]. It assures quality and security.

Efficiency With IoT, large volumes of data are processed without harnessing the system performance and with minimum manual power. This eases informative decision making for real-time applications [59].

Co-existence Industries [165] require suitability and co-existence between hardware and software integration [56].

Context-Aware Based on the sensed information from the physical and environmental resources, IoT devices will enable ambient intelligence and the infrastructure is configured.

Data sharing IoT analyses and delivers data irrespective of location in real-time. This encourages mobility, reduction in production cost, and generates revenue.

Dynamic and Adaptive Devices connect, disconnect, and dynamically adapt based on battery lifetime, mobility, and other operating conditions. For example, surveillance cameras adapt their resolution based on movement and mode as per time.

Integrated Infrastructure IoT devices are made smarter through the dynamic integration [65] of hardware, software, and networking based on the application.

Intelligent Decision Making Distribution Systems IoT employs different algorithms, data mining, and data analytics for taking decisions [93]. IoT is multi-hop in nature. It improves the energy [81] efficiency and lifetime of the system. Dhananjay et al. [58] used a semantic fusion model as a novel framework to encapsulate data processed from the sensor.

IoT buoyed Technologies Different hardware platforms such as Processor, operating systems like LiteOS, cloud service providers such as Amazon [26], wireless technologies like LoRa are used for different applications. As IoT gains momentum, wireless resources proliferate dramatically [148].

Multi-faceted Data Specific Design Data comes in different sizes and formats. Novel architectural design is required to handle multifaceted data.

Multi-protocol Integration Integrates protocols in the subsequent layers based on the application.

Safety and Security Monitoring improves safety. Sensors and suitable algorithms improve security.

Self-Configuring IoT can integrate, fetch data, set-up a network, fetch software, analyze data, and control a device.

Skills Internet skills are required for IoT acceptance and usage [220].

Transparency Devices are connected, so it is possible to track assets.

Ultra-low latency LTE (Long Term Evolution) and 5G [264] provides connectivity for future IoT devices with less delay [144, 186, 245].

Unique Identifier Each device has a unique identifier such as an IP Address or URL. This is coordinated with the infrastructure for control and monitoring.

4 Research Issues and Impediments

Ample research issues and narrations like vulnerable attacks, protocols exist. But there are less mitigating solutions in IoT. For example, RFID is a vulnerable source [187] in terms of person and asset tracking [170] and on the other side, it monitors [5] for safety purposes [288]. Blocker RFID tags were proposed for consumers to selectively block RFID readers from scanning and disclosing when required, thereby protecting privacy [151].Some of the major research challenges [58, 298] and obstacles faced by IoT are described below:

Application Based on the application, hardware, software, and tools are integrated [71].

Authentication and Authorization Clouds and mobile components [163] do not have sufficiently strong passwords. 80% have weak passwords.

Complex Computing Architecture With differing heterogeneous Operating Systems and hardware, a complex computing [97] architecture is required. Architectural solutions vary from standard to commercial depending on the major requirements of interoperability and security [67].

Confidentiality When data is transferred over the Internet from different devices, it needs to be secured.

Constraints Limitations [69] faced by IoT include:

  1. (i)

    Hardware Limitations: Miniaturized Hardware is battery powered and so precise cryptographic algorithms that consume a lot of power is perilous. RAM has memory constraints so Light Weight OS with less complex computational complexity is used. Conventional algorithms occupy space. Tamper resistant packages are required for IoT as they remain connected and unattended for a long time.

  2. (ii)

    Software Limitations: Software packages need to be fault-tolerant and thin. Dynamic reprogramming is not possible.

  3. (iii)

    Network Limitations: Mobility resilient algorithms are required. Security algorithms need to be scalable to accommodate the proliferating IoT devices. Unified security algorithm for dynamic topology, multifarious devices, multi-protocol networking, multi-vendor, and multi-medium is hard to design. Data integrity and QoS are disrupted. For data integrity, a random time hopping sequence is used to hide data. Device ports are exposed to the device level, interface level, and gateway level service providers.

  4. (iv)

    Security Constraints: Integrity, Anonymity, Authentication, Authorization, and Non-repudiation [18] is to be warranted. Access level security should certify authentication, authorization, and access control. IoT devices should be resilient against attacks [283].

  5. (v)

    Serviceable Constraints: Robust network should self-organize and sustain from hardware or software catastrophe.

  6. (vi)

    Attacks can be internal /external based on device location, active/passive depending on the level of attack, physical /logical based on the nature of the damage, user-credentials in hardware/software depending on the type of compromised host attack.

Constant update and Uninterrupted Network Connectivity Software requires updates for effective operability. Software updates are not encrypted mostly. Devices need to be online always and are unattended. This leads to vulnerable attacks. Devices are deprived of power.

Cyber-Security IoT [125] is vulnerable to cyberattacks which poses daunting challenges [242] to digital forensic experts [16]. Blockchain builds trust in sharing information [15]. Bitcoin [207] is used to exchange value across Internet [17]. With embedded [270] technologies, the attack could be from the device or from the cloud or from the network [261]. IoT devices communicate through the application programming interface over the Internet and connect the cyber world to the physical world. IoT is vulnerable [79] to denial of service attacks [163], virus attacks, and so on. Thwarting such attackers is a challenge. Cyber Physical Systems (CPS) compute, communicate, integrate, and control technologies for stability, reliability, and efficiency in the application domain. This involves Artificial Intelligence and knowledge integration [149] into the systems to develop solutions for complex problems. Cesar et al. [46] added smartness to IoT and CPS in his research using Decisional DNA to capture, store, and reuse data.

Data Analysis Big data [94] should be interpreted and analyzed with fidelity. Big data can be structured, unstructured, or semi-structured. This finds use in e-health and m-health services [83].

Data-Centric Architecture Data storage varies. Currently, Redundant Array of independent Disk (RAID) architecture is insufficient. A centralized architecture is required for data storage. Many real-time applications model their communication pattern using a data-centric approach [64].

Data Volume A huge amount of data needs to be processed and handled. Storage needs to be reliable and secured.

Dedicated and Limited spectrum With an increasing number of devices, bandwidth and spectrum will increase. But the electromagnetic spectrum is limited. [150]

Encryption 70% of the devices fail to encrypt and transfers sensitive data over the network.

Hardware, Software, and Firmware IoT is an integration of both hardware and software. There is a misconception that it is software oriented. Challenge associated with hardware is miniaturization and power consumption. 60% of the software are not encrypted during updates [117].

Heterogeneity IoT is a complex heterogeneous networking platform. A plethora of devices working on different platforms and protocols, need to collect, connect, and communicate information to form an IoT. This faces addressing and optimization issues.

Identification Challenge is to identify and integrate suitable technologies for an application.

Interoperability Establishing synchronization among different platforms is challenging. Different sensors collect diverse data [140] and have interoperability issues.

IoT Forensics Big Data challenges faced by forensics [8] investigators include dynamically adaptive diverse data formats [3, 33] and insufficient real-time log statistical analysis. Threats caused due to viruses, mass surveillance etc., [157] lead to disruption in the IoT network. Tools available currently with the forensics team [15, 51] are not suitable for the IoT environment. [50].Computer Aided Investigative Environment (CAINE) is an open-source interactive forensic tool. Intelligent Edge Fabric (IEF) scans forensics images, chat history, and forensic data [8, 251]. Huge data transfer in IoT opens the way to intruders and cybercrimes. Vulnerability issues are analyzed [182] from forensics viewpoint towards challenges involved in cloud security and privacy. Francesco et al. [89] analyses on the vulnerabilities in IoT and the methodologies in developing digital [277] traces to combat cybercrimes. Traces were developed from movement, location, network traffic, and so on. Forensic preparedness will protect smart cities from criminal threats [305].An investigation of the crime scene would aid and minimize threats [51].

Light Weight IoT Integration of IoT with resource-constrained environments [62], was envisaged using light application layer protocols such as, Constrained Application Protocol (CoAP) [250] and Message Queue Telemetry Protocol (MQTT). CoAP is a web transfer protocol which is used for low power lossy networks. This uses Representational State Transfer (REST) architecture and UDP protocol [70, 221]. In CoAP, resources are identified by URI [126] and deployed using HTTP (Hypertext transfer protocol). CoAP consumes less bandwidth and MQTT does not include resource discovery mechanisms [68]. A Light Weight security architecture HIMMO was proposed to warranty back-end authentication, key–agreement, and protection against Denial-of-Service (DoS) attacks [199]. A hybrid approach [114] was proposed for RFID tags [263] to ensure data confidentiality [227].

Low Power Constraints Tiny devices with low power-constrained [120] resource is required for IoT. Low power is required to operate sensors. Energy could be harvested from peripheral and vibrational movements for energy-efficient sensing. E.g., Advanced Metering Infrastructure is used for low energy in smart homes.

Mobility Devices are in different locations. Users prefer data access from anywhere and at any time. Connectivity provides mobility.

Multiple location and Networks Data should be communicated reliably over the network. When the user changes the location and uses different networks for connectivity, the investigation becomes complex.

Network 2G for voice, 3G for voice and data. 4G for broadband internet and 5G provides transmission speed [88] up to 10Gbps; connects thousands of devices reliably [9, 37]. Network Optimization for IoT traffic improves routing, QoS, security, data rate, response time, and redundant data elimination [258]. 70% of the devices use unencrypted network services.

Performance, Investment, and Evaluation For evaluation, services need to be updated time-to-time on a regular basis. End users need better features at a lower cost.

Proprietary IoT needs ownership to maintain and grow as per needs. With heterogeneous hardware and software from multiple vendors, proprietary is difficult to realize. Managing and maintaining the numerous resources is a challenging task.

Reliability With system failure in hardware or threat induced in software, IoT faces a major setback.

Robust Communication Interface and Network technology Applying a suitable communication technology to interconnect the heterogeneous devices to the Internet is a challenging task. To meet these issues, a Mobility First Architecture was proposed by Li et al. [168]

Scalability and Network Supervision IoT connects and manages billions of devices to an existing infrastructure without affecting its existing functionalities and services [138].IoT could be integrated with process awareness to support pervasive [162] computing environments [159].

Security and Privacy Big data requires stringent security measures. Devices collect personal information [139]. 80% of devices have privacy [36, 160] concerns. Secured IoT is achievable with tools to monitor endpoints. IoT devices are to be scanned before connectivity. A dedicated network secures IoT devices. For IoT, the devices are connected online wirelessly [247] and remain unattended. This compromises authentication and data integrity in IoT. It is prone to sleep deprivation attack as the battery constrained device remains ‘ON’ always. Collected data should be used only by authorized personnel [22]. When networks are large, erroneous data could be sent, the network could be made unavailable. IoT is resource-constrained, so public key encryption algorithms are hard to use. Lightweight cryptosystems [158] are required. IPv6 routing protocol is open to threats [106] so traditional encryption techniques do not apply. Security measures based on Confidentiality [28], Authentication, Availability, and Integrity [21] is implemented. This gets complicated with automated configuration. Physical safety of the devices is required. IoT deployment and its widespread applicability is constrained due to its insufficient measures towards encryption, trust and data privacy [169, 235, 272].

Service-Oriented Architecture (SOA) Design This design faces scalability, processing, and data transfer issues. Powerful service description language, service discovery [219] methods are yet to be catered to the needs [282].

Signal processing This identifies data, collects the required data and processes it suitable for a particular application.

Software-Defined Network (SDN) This controls network and nodes dynamically based on programming. SDN combined with a deterministic virtual network (DVN) and lightweight encryption facilitates ultra-low latencies and improved security suitable for Industrial IoT [269].

Standardization Yet there is no existing standardization [209] in connecting disparate networks [11]. IEEE has produced more than 80 standards [143] relating to IoT [223]. In 2013, universities and industries collaborated [135] and developed an architectural reference model [54] for IoT referred to as IoT-A, which is no longer active. IEEE standardization is required to preserve data flow across heterogeneous networks (HetNet) and provide design specifications for information exchange and processing. In smart home automation [84], different devices are from different vendors. IoT faces connectivity issues [240].

Traffic Threats IoT device ports decide on the network traffic. These ports are susceptible to threats [110].

Uncontrolled Environment One model will not fit for all. Getting accurate and stabilized results for IoT in an uncontrolled environment is the challenge [153].

Unified Information Infrastructure Different devices occupy different bandwidths. A unified information infrastructure suitable for heterogeneous devices is required.

Unique ID Due to limited IPv4 addresses, it is impossible to consign each device with a unique identifier. This is overcome using IPv6. Network plays a major role in IoT. IPv6 routing protocol (RPL) is used for resource-constrained low power lossy network (LLN). This improves network lifetime, throughput and QoS. Internet Protocol (IP) manages traffic load from multiple devices and provides seamless [99] connectivity [217]. RPL is used for real-time applications to transmit sensitive data [30]. It replaces an up-to-date route in case of dynamic network changes.

Virtualization Lot of challenges exist in realizing, developing, and adopting a model to the existing scenario to meet the requirements [121].

Web Interface 60% of the devices raised concerns about insecure web interfacing such as cross-scripting and weak session management.

Compatibility 5G is revolutionizing IoT with faster data rate [245] for future IoT applications [241] such as virtual reality, high definition video streaming, and augmented reality with 25 Mbps for optimized performance. 5G is in its budding stage and requires scalability, low-latency for video games, upgraded handover efficiency, increased battery life-time, time constraints for real-time applications and smart service provider to provide services as per application and mobility [122]. Radio Access Technology (RAT) and antenna innovations serve the purpose. Modulation is implemented in the physical layer. Timely handling of multiple input data will produce errors. These issues need to be handled. Mutual shaping between 5G and IoT will improve business models [183]. IoT along with high efficiency video coding is used in smart city framework for media security [189].

5 Categories of IoT

IoT is an embedded internet technology encompassing the physical and digital components. IoT categories are based on its applications [133]:

  1. (i)

    Consumer IoT (C-IoT) for smart home automation proliferates the quality of people’s life with saving in time and money. Smart Homes are automated and networked with electronics, sensors, and software to reduce energy wastage in devices and to improve safety [200]. Researchers analyze the revenue patterns targeted by the manufacturing companies [87]. Smart Homes use Arduino [47] as cyber physical systems for energy monitoring [167].

  2. (ii)

    Commercial IoT Healthcare Automation and Transport Automation uses Vehicle to Vehicle Communication. In-home care, IoT devices such as wearable sensors are fused with IoT services[188] such as telemedicine [296].With increasing chronic diseases, Clinic centric is focused on Patient-centric using a multi-layer e-Health Architecture [29]. Information and communication technologies (ICT) provide promising e-Health solutions [152]. An anti-counterfeit platform is used to check the creditability in online purchases [170].

  3. (iii)

    Industrial IoT (IIoT) This integrates operational and informational technologies to design autonomic industrial plants, smart agriculture etc. [165]. With IIoT, [257] for intelligent transportation, a vehicle and its movement could be monitored. Based on the predictions, traffic could be anticipated resulting in shortest route discovery and time-saving [176].

  4. (iv)

    Infrastructure IoT This connects smart cities with sensors and user-friendly apps. Big data is used to provide smart transportation, smart healthcare etc., in cities [124].Fiware is an open platform for smart cities [85].

  5. (v)

    Military IoT Robots are used for surveillance in disaster-prone areas.

6 IoT Communication Technologies

IoT design related to the applications of IoT include connectivity, cost, coverage, deployment, infrastructure, lifetime, mobility, modality, QoS, size and topology for cellular and non-cellular technologies [77]. Some of them are:

  1. (i)

    RFID Radio Frequency Identification has a tag and a reader [7]. This uses the radiofrequency electromagnetic field to transfer data associated with the object. Each RFID has a unique ID.This is of low cost [171]. It has a microchip along with an antenna as a package. RFID Tags could be self -powered active tags or signal powered passive tags. They monitor objects [146] in real-time without Line-of-Sight. Passive RFID tags are made duplex to remotely exchange data for communication [72].

  2. (ii)

    Zensys Wave (Z-Wave) This is a low power wireless communication protocol used for home automation to connect devices within 30 m.

  3. (iii)

    Long Term Evolution (LTE) [76] This is a high-speed wireless communication protocol that transfers data between mobiles with high throughput and low latency.

  4. (iv)

    Long Range (LoRa) This is a digital wireless technology that is used to connect devices remotely over a long-range.

  5. (v)

    NearField Communication (NFC) This is a short-range, low power, radio communication wireless link enabled on mobile devices within close proximity of 20 cm, and operating at a licensed frequency range of 13.56 MHz to exchange data. Unlike Bluetooth, pairing is not required. Security is achieved using key agreement techniques [115, 214]. NFC [103] facilitates contactless communication [41].

  6. (vi)

    Ultra-Wideband (UWB) This technology supports data transmission with low power over short distances. If sensors are deployed for applications, it consumes wider bandwidth.

  7. (vii)

    Machine to Machine Communication (M2M) This connects devices to the network or devices to a gateway [244] and then to a network for information transfer.

  8. (viii)

    IPv6 Low Power Wireless Personal Area Network (6LoWPAN) This low power IP Network Protocol defines encapsulation and header mechanisms [210]. This supports multiple communication platforms like Ethernet, Wi-Fi etc. Integrating management protocols such as 6LoWPAN [300], CoAP into IPv6 is a challenge [201].

7 IoT Architecture and it's Operating Systems

IoT is conceptualized to reality by jumbling up different technologies. IoT Vision is to interconnect heterogeneous devices Anywhere, Anytime and with Any-media using IP, communicates and processes data using Cloud and embedded software. For example, to analyze multimedia traffic, media-aware traffic architecture is proposed for IoT. IoT is an interdisciplinary field that is oriented towards three prototypes: Things oriented (devices), Internet-oriented (middleware), and Semantic oriented (knowledge) [107] e.g., WoT. IoT expands human–human communication to human-things and things-things to exchange information between the physical world and the virtual world [124]. Architecture can be user-centric or cloud-centric. In user-centric, the user will be at the center and uses data and infrastructure depending on the applications. Economically cloud-centric is better. Al-Fuqaha et al. envisioned IoT [10] as a technology that enables physical objects to see, hear, think, share information, coordinate decisions, and perform jobs.

IoT requires a power-optimized communication stack, reliable peer-to-peer communication stack, and an Internet empowered communication stack [184]. IoT architecture facilitates a systematic understanding of the tools, technologies [216], and methodologies that are vital to a developer to connect the digital world and the physical world [72] and to build the infrastructure. IoT Architecture is framed, based on the application such as healthcare and its pre-requisites such as security [228]. Currently, RFID and healthcare are rated stringent. Data is created by the device. Data is sent to centralized service using HTTP/CoAP/MQTT. HTTP is not suitable for low bandwidth applications. MQTT—A Resource-constrained protocol uses publish /subscribe model. It has low overhead, lower bandwidth, but has no encryption procedures [211]. CoAP is suitable for low power and low bandwidth applications. A centralized server is risky in case of data loss without back-up. IoT architecture [302] should satisfy scalability, interoperability, reliability, and Quality of Service. IoT requires real-time analytics, a platform to analyze the aggregated data, a cloud to collect the data, trigger remote action and send remote notifications. IoT enabling technologies in tandem comprises of the hardware, middleware, and application occupying the perceptive, network, and application layers respectively. The basic architecture of IoT is a three-layer architecture [124, 157, 215, 290]. It consists of the physical layer, network layer, and the application layer as shown in Fig. 3. A clarified insight into the lifecycle of the processes involved in IoT leads to prediction in future developments.

  1. (i)

    IoT Things (The Physical Layer) This is the physical layer that senses and gathers entities from the environment [303]. This specifies the path between adjacent nodes for data transfer. Hardware consists of wireless sensors [179], Robotic cameras, Radio Frequency Identification Tags (RFID) etc., based on the application. Barcode facilitates automatic identification of anything. Wireless Sensor Networks [122] are cost-efficient and power-efficient. Physical devices and controllers referred to as ‘Things’ collect and transmit the data on receiving the command.

Fig. 3
figure 3

IoT Architecture

Sensors collect data and share it with the centralized system for analytics. Sensors have transceivers, processing units, A/D converters, and recently they operate on one frequency range, making it less complex. Actuators [190] control the things using the electrical inputs. Simply put, for the smart room controller, a temperature sensor senses the heat, and sends the signal to the control center. The control center sends commands to the sprinkler. The sprinkler turns on and puts out the flame.

Sensorpedia is a new integration platform that guides users regarding identifying and sharing of sensor data. Sensor data is processed on a Google map. Users can search and explore [299] published sensor data using an interface [104]. In some cases, data would be time-sensitive. In other cases, this data velocity creates an avalanche. For data that entails profound processing, it is sent to the cloud. Short-wave technologies like Bluetooth permits devices to communicate with each other. IPv6 connects sensors to the internet without additional processing.

Technologies used in the physical layer like Bluetooth, Wi-Fi (devices are connected by radio), BLE (short distances), and 6LoWPAN (IPV6 and low power personal wireless personal area network) are suitable for IoT. 5G improves data rate and latency [224]. BLE uses Blue–voice [98] for providing Speech Streaming Services.

  1. (ii)

    IoT Network Layer This connects devices to servers and specifies the communication path over the network (IP Address). Data collected from the sensors are processed and analyzed intelligently for optimized decision making. Raw data collected from the sensors is converted into digital streams by Data Acquisition systems. Data acquisition samples the real-time physical entities and converts it into digital streams suitable for transmission using analog-to-digital conversion. The Internet gateway aggregates these digitized data and routes it to Wi-Fi or wired LAN for further processing. This layer inclusive of switches and routers is responsible for secured, reliable, and timely delivery of data. Data is stored and retrieved as per queries. Efficient net centric algorithm could be used to reconstruct the data efficiently [166].

  • (a) Challenges involved in Data Analytics and Processing

  • Data analysis varies depending on the volume, velocity at which the data is generated, and the structure of the data. Data analysis is done using Machine Learning by fitting the data into the model. Based on the pattern generated from Machine Learning, a predictive analysis (of what would happen), prescriptive analysis (steps to be followed next), and adaptive analysis (to be in line with the changes) could be done. IoT includes real-time streaming data without delay using a real-time framework such as Apache Storm. If the size of the data is huge, then distributed data analytics is used to reduce the load on a single server such as Apache Hadoop Server. Data is distributed across several nodes and is processed using the MapReduce engine.

  • Apart from Data Processing, storing a huge amount of data is not feasible using the traditional database approach. IBM Cloudant provides a solution. Amazon, Microsoft [192], Google provide infrastructure, platform, and software as a service. Consumers save a lot of money and manpower. Based on consumption, charges are applicable.

  1. (iii)

    IoT Cloud and Application Layer: This provides application-specific services to the user. This specifies the interfaces and protocols used by IoT devices [40].Once the data is aggregated, the information is either stored locally or in a centralized remote server for analysis. Then it is fed to new applications and services. IoT requires platforms, tools, and libraries to visualize the data. IBM’s BlueMix is a platform that connects innumerable devices and sensors and provides API‘s for data visualization in formats specific to the device [266]. ThingSpeak supports sensor data along with MATLAB for visualization. Individual software work as per requirements on device control, visualization, and analytics. Data and conclusions are shared with other applications leading to innovative IoT.

(a) IoT and Cloud Integration involves

  • Device Management: As devices increase, management [230] such as registration, updating of software complexity, and cost increases. With Cloud, based on usage, charges apply.

  • Resource Pooling: Based on demand, resources are integrated into the Cloud [108].

  • Data Storage: Large scale data and Long term data is stored in the Cloud.

  • Access Control: There is access control authentication for Cloud.

IoT employs protocols, networks, and applications [236]. IoT applications are based on monitoring, control, automation, and optimization [101]. Commonly used operating systems to enable the functionalities of the application domain are TinyOS [164], LiteOS, Contiki etc. They require few kiloBytes of RAM and provide optimized low power Internet Communication. Software Development Kits (SDK) supports application programming using C, C++, and Java etc. Software connects IoT objects to the network using communication protocols. Table 1. Displays the functionality and the types of devices associated with each layer.

Table 1 IoT Layer functionalities

Due to the trending applications in IoT, different layers are proposed by practitioners. A five-layered approach includes Middleware Layer and Business Layer to the basic prototype [280].

  1. (iv)

    Middle-Ware Layer: A middleware is a software that interconnects and manages these heterogeneous components. Smart Things is a Samsung cloud-based platform, which supports 300 plus devices for user control home automation. Web-of-Things and cloud is used as an interoperable platform for smart home [24].This layer is between the application and technology layer to aid design workflow [147], data management [2], and interoperability [57]. Data Management combines multiple databases and unifies interfaces [33]. Centralized storage archives data and also integrates both structured and non-structured data [92]. HTML5, Web Socket, Canvas supports real-time applications. HTML5 and Adobe Flash are preferred for low latency [304].Middleware manages the services offered by things, stores it, processes it, and analyses the data [172]. Middleware is specific to the application. For example, ASPIRE is specific for RFID. There is no generic middleware common for smart home, smart transport etc., Middleware delivers application layer interfaces (API) for physical layer communication and related services to the applications [31]. IoT-ICN architecture is included in the middle layer. Real-world deployment is yet to be implemented. Wang et al. [285] proposed a data platform (RESTful Web Service) as a middleware to access physical objects with a unique URI.

  2. (v)

    Business Layer provides business models and graphs along with the data.

CISCO [Cisco] as shown in Fig. 4 has proposed a seven-layer reference model based on the functionality:

Fig. 4
figure 4

IoT Reference Model

The physical layer has things ranging from a small chip to a big machine. These devices convert the data from analog to digital and are being controlled by the net. The Connectivity (Network) layer connects the IP –Enabled devices. If they are not IP Enabled, they are connected via gateways. This layer associates the necessary switches, routers, and protocols required for connectivity. Security is associated with this layer. The Edge Computing [267] layer translates the data into a form that is suitable for storage [39]. Fog Computing [286] bridges the gap between data centers and IoT devices [13]. It is considered as a mini cloud which is close to the IoT devices [273]. For example, the sensor provides several samples per second in a day. The Data Accumulation Layer keeps the data. Certain applications cannot run the data at network speed. This layer has data filters and converts data into relational tables. The Data Abstraction Layer collects data from multiple sources and reconciles differences in terms of format etc. Information interpretation occurs in the Application Layer. This gives data at the right time for real-time applications. Collaboration and processes layer involves collaboration for business logic to meet people and people use applications as per requirement. Security is involved in each of the layers. Devices have an IPAddress and communicates with the services offered by the Cloud. Devices without an IPAddress use short-range communication protocol such as ZigBee [48] and connect with an IoT Gateway which communicates with the services offered by the cloud.

In future, there is a likelihood that the number of base stations will upsurge than the number of mobile phones [145]. Figure 4 and Figure 5 relates the layers in the IoT architecture with their associated security.

Fig. 5
figure 5

IoT Security

Operating system [212] design features [74] include low memory requirements, low cost, low power consumption, small size, low processing power [38], heterogeneity, catering to multiple network stacks, security, and energy-efficiency [225]. OS is usually embedded. It collects and communicates data over the Internet. TinyOS is used for low power wireless devices with commands and tasks for inter-component communication and tasks for intra-component communication. Contiki OS [4] is an open-source lightweight portable OS with low power, low memory, low processing, and low bandwidth. RIOT OS is the Linux of IoT [27].This uses minimal resource devices and provides real-time services. Ubuntu OS is suitable for IoT devices [275].Instead of the conventional programming languages, IoT uses scripting languages like Bash Shell in platforms such as GNU/Linux [112].

8 Taxonomy for IoT Security Framework:

The Interagency International Cyber Security Standardization Working Group has formed the IoT task group in 2017 to formulate the cybersecurity standards [53] for IoT [118]. LTE is preferred for better bandwidth, and spectral efficiency but IoT architecture suffers from threats [116]. Salman et.al. reviewed [238] on the existing standards and protocols for IoT. Common attacks in IoT include DoS attack, Man-in-the-Middle Attack. IoT security demands research on the privacy of data [218, 259, and 128], prevention of loss of data from personalized devices, leading to impersonation attacks and prevention of malware via botnets which leads to Distributed Denial of Service Attacks (DDoS) [51]. For IoT devices to be secured, it requires to ensure authentication, integrity, confidentiality, availability, authorization, secrecy, and non-repudiation. To ensure these, cryptographic techniques [249] such as encryption at the wearable device level (AES and SHA algorithm), device level (Public Key Exchange (PKE)), network-level are implemented in an IoT Ecosystem. For a wider area of coverage and data stored in a Cloud, Internet Protocol Security (IPSec) and Secure Socket Layer (SSL)) are used. Symmetric (AES) algorithms, Asymmetric algorithms (RSA), Light Weight Algorithms, and Digital Signatures are used in IPSec for authentication [260]. IoT Botnets are massively attacked and controlled by Hackers [19]. For instance, Mirai cyberattack tool used brute force attack [194] and took over numerous IoT devices. This remains a mystery. Botnets IoT Security is based on the Application domain, Architectural Domain, Data domain, and Communication Channel.

In the physical layer, the sensor nodes operate with stringent power and memory requirements. This makes frequency hopping spread spectrum and public-key encryption hard to realize. Sensors could be compromised by transmitters and antennas from a distance [178]. RFID Tags suffer due to security issues [156] in wireless technologies [28]. This requires mutual authentication [197] implementation in high frequency RFID tags [206]. A lightweight security algorithm with low power and area is achievable by using a combination of encryption algorithms [205].

Network Layer is prone to man-in-the-middle attacks. Authentication prevents unauthorized access. Data sharing at the application layer poses threats to access control and privacy, resulting in disclosure of data. The application layer across heterogeneous networks demands user privacy and authentication. Physical layer security (PLS) is used to avoid data leakage. Challenge is to provide reliable security with low power. Modulation techniques decide upon the data rate, bandwidth, spectral efficiency, and power of the hardware used. PLS also depends on modulation in wireless technologies. If data is less, narrowband is used. If the data is more, then wideband communication is used. With bulky directional antennas, secrecy is improved. By performing modulation after encryption, low power consumption and reduced hardware complexity is achieved [222]. Narrowband IoT supports features like deep coverage both indoors and outdoors, less complex multiple devices, and low power consumption. With low power, security is compromised [77]. 5G supports narrow-band IoT and increasing traffic [9].

IPv6 communication protocol is used for IoT in the physical layer. Datagram Transport Layer Security Protocol (DTLS) [154] is used in the network layer. Constrained Application Protocol (CoAP) is used in the Application layer and IPv6 is used for addressing in the proposed lightweight security architecture [232]. AMQP supports various communication patterns [3]. IoT protocol stack is not categorized as OSI or TCP/IP [246] protocol suite. IoT security protocols operate in multiple layers to provide security. The chosen type of protocol depends on the node as to whether it is constrained or not. A comparison of the some of the protocols used in conventional internet and IoT networks is detailed in Table 2. There are many more protocols apart from those compared.

Table 2 Comparison of protocols used in Internet and IoT network

Not all the protocols are used. For example, while loading a webpage from a domain, the web browser makes a Domain Name System (DNS) request using a HTTP request and sends it to the internet. These protocols are used in each layer. WLAN-IP-TCP-HTTP. If the webpage is served over HTTPS, then multiple protocols are used in the application layer. Each layer uses a different protocol. IoT Security framework depends on time constraints, power and energy consumption, lightweight constraints, reliability, robustness, and smart applicability. [284]

9 Low Energy Methodologies

Energy Efficiency is required for battery constrained IoT Devices. Zeeshan et al. has provided energy-optimized solutions [301] for wireless technologies operating with IoT. Towards 2025, IoT devices will reach 11 trillion [ISO/IEC].Almost every device will have an internet node, and devices need to sustain energy. Green IoT is proposed for energy conservation [52].

Energy consumed by the sensor nodes is reduced by:

  1. (i)

    Variable Duty Cycle The duty cycle is varied, based on the ON time and OFF time of the node. This is made automatically adjustable.

  2. (ii)

    Multilayer based approach Nodes are grouped as layers. Applying optimization techniques to these layers, power is reduced.

  3. (iii)

    Low power Protocols for sensor networks Vakulya et al. proposed two protocols namely queue response protocol and piggybacking protocol for low power [279]. This is achieved with an increase in latency.

  4. (iv)

    Frame size control Based on the MAC frame size, optimization is achieved.

  5. (v)

    Low latency IoT deals with real-time data applications where continuous data stream is required with low latency. This is achieved using parameter tuning, with frame synchronization and sleeping behavior.

  6. (vi)

    Priority-based By assigning pre-defined priority smartly to the nodes, nodes with the highest priority can access the media. This saves power.

  7. (vii)

    Variable back-off By varying Back-off exponent (BE) and Contention Window Length (CW) of MAC, throughput, packet delivery ratio, and low energy is achieved.

  8. (viii)

    Self –configuration Networks are configured with less overhead.

10 Standardization of IoT

Smart objects consume and process large volumes of data that need to be transferred securely. This requires universally accepted standardization of protocols for interoperability between devices and applications [134]. IoT is one of the context data for smart applications. IoT devices connect through the network through messaging and communication protocols at each layer. The protocol depends on the type of application and the range of communication. Based on the range extending from local to global [100, 287], the corresponding standardization varies. 6LowPAN, BLE are such examples. Application layer protocols used are CoAP, MQTT.

  1. (i)

    Ultra-Short range Near-Field Communication (NFC) and RFID is used for healthcare based on the operating frequency range. The adaptability between RFID and NFC is analyzed by Bravo et al. [41]. NFC works for medium-range frequencies in the ISM band and RFID is used for high frequencies.

  2. (ii)

    Short Range Bluetooth uses IEEE 802.15.1 [105]. Among 4 versions each one has an added feature. Bluetooth Low Energy (BLE)-Single mode has one protocol and provides low energy [37]. BLE Dual-mode has low power and uses Gaussian Frequency shift keying for range extension [42]. For power optimization, low baud rate, less channel usage, FHSS mode is used. Bluetooth 5.0 [229] has inherent range, data rate extensions, advertising extension features [66]. Its broadcasting message ability makes it suitable for IoT applications. Bluetooth security is vital in IoT [214, 226]. Safety of the IoT application depends on the technologies used.

  3. (iii)

    Bluetooth, Zigbee [120] consumed low power but the area of coverage is less. Centenaro et al. used low power wide area network [45] to connect the node to the base station directly.

11 Threats due to IoT

Traditional security does not work with IoT Security. Recently in 2017, the data network of a well-known University was hacked. In healthcare, if IoMT devices were hacked [231], this could endanger the lives of patients. Industrial Utilities that depend on IIoT are at risk. If IoT sensors are compromised, massive compliance and legal issues would crop in. Unsecured gateways in an organization provides a pathway for cybercriminals.

IoT devices have less processing power and memory. So they are catastrophic and lack robust security protocols to protect themselves from threats. IoT devices are connected to the Internet. They are exposed to the hackers through webcams, mails, search engines, etc. It is not just devices, but also the protocols and networks that connect these devices to the Internet are exposed. There is no end-to-end encryption. There are no standards or procedures to ensure security in IoT. How often are the secret AES keys renewed in smart home automation [161]? Data collected from the sensor is sent to different devices and networks owned by different service providers. A webcam could take personal footages and stream the footages if hacked. A single error in code, could malfunction an automated industry. A skilled hacker could control a smart car.

IoT is a disruptive technology [208] with a lot of data. One sticking point in IoT is the insidious security risks. There are no serious security quality assurance checks in their product development cycle. IoT enabled Mirai Botnet was developed in 2016 to combat threats against insecure IoT devices. With 5G, huge data, energy conservation, wideband is achievable at the cost of inflated infrastructure, health hazards due to waves, and impermeability to solid obstacles. These challenges [73] are insurmountable. Hash-based techniques and firewalls are used to secure RFID Tags. Artificial Intelligence could be used to identify the usage patterns and alert the user about abnormalities.

12 Mitigations

IoT must be secured from hardware, software, and OS. To prevent DoS (Denial-of-Service) Attack, DTLS and IPSec are used to verify the host address. These protocols are also used for authentication and encryption. Currently,existing routing protocols are insecure. Decentralized topology is preferred for mitigating threats. Applications, Management, and Data Analytics are decentralized using a distributed model referred to as Fog Computing [137, 173]. Object-based security with digital signatures is secured than peer-to-peer encryption [262]. The intrusion detection system (IDS) is required to prevent unauthorized access to IoT [153]. But these introduce challenges to power, bandwidth, and network. Legislations should be made mandatory as in Verizon for IoT [281]. Other issues of research are IoT mobility, Standardization, etc., with the integration of IoT in wearables. IoT is the thrust area vulnerable to cyber security threats in the near future.

Artificial Intelligence is providing promising solutions in IoT. IoT Security could be improved by a combination of government regulations, privacy controls, standards and AI. With Covid-19, IoT is widely adopted in IT, in industries as IIoT, in healthcare as IoMT and in many more. With less workforce there are more security breaches. With Covid-19, there is an increase in the usage of IoT, thereby resulting in increased cyber-attacks. Vendors are working on specific security solutions. Devices need to be authenticated. Network needs to be protected. Data needs to be encrypted and secured using API and PKI. Public Key Infrastructure policies is an effective solution to encrypt data using symmetric and asymmetric encryption. SSL along with asymmetric cryptography comes handy in providing end to end [14] encryption. Cryptographic algorithms like ECC with shorter key could be preferred than RSA. Server certificate could be verified before the data is sent from the sensor. Communication could be secured using encryption, AES 256 or TLS. IoT Security Analytics could be used rather than just securing the gateways from harmful threats. IoT network is protected with anti-malware, anti-virus, firewall, and intrusion prevention etc. IoT devices need to be protected by authentication.

13 IoT in Academics -Smart Academics Management

As an IoT application, an economical smart classroom was implemented.Smart classroom is a pivotal innovative tool for teaching. A prototype is set using raspberry pi and a raspberry pi camera to record lectures of faculties. Recorded lectures uploaded into the website could be accessed with a given username and a password provided for each student. The quality of education [234] is a vital demand in today's competitive setting. Technology has affected us in each facet. Intuitive categories are a progressive approach of education. Attendance could be taken by uploading a picture using IoT. Students presence in online classes could be monitored using IoT. Quality and Systematic teaching is provided to the students. New teaching methodologies involve instructional material, 3D animated modules and videos.

  1. (i)

    Implementation The Raspberry Pi module along with a 5MP color camera module is used for recording the lecture. Using Raspivid, lectures were recorded.Once recorded, the recorded video is uploaded using Raspbian software in a google drive as shown in Fig. 6.

Fig. 6
figure 6

Smart Academics

This is accessible by the student using a username and a password. The website is designed for the students using XAMPP and PHP software. A database was created with the help of MySQL. The apache software in XAMPP can be used to generate the request and response for the website. The login credentials is the request and the output received is the response. If the entered username and password matches with the credentials stored in the database, then the user is redirected to the link where the materials are available. This application is useful during coronavirus (Covid-19) pandemic crisis as the students are not able to attend the classes in person.

  1. (ii)

    Analysis Fig. 7 displays the user interface of the website. Students login and access to the drive are shown in Figs. 7 and 8 to watch the recordings.

Fig. 7
figure 7

User Interface

Fig. 8
figure 8

Video Recording

These days everything is ‘smart’ starting from vehicles and homes to nanobots. The concept of IoT has played an important [132] role in our day to day life. Technology has immensely developed over a period of time and the real usage of this technology in academics is noticeable during the coronavirus (covid-19) pandemic situation. This eco-friendly concept would come in handy to students who miss their classes during unavoidable circumstances. The smart classroom is an enhanced sharing mode that improves teaching and learning opportunities by a group of students with limited resources.

14 Futuristic Research Inclinations

Information-centric network (ICN) [40] forms the future of IoT. IoT devices provide content. It targets content by name and not by location. It supports multicasting and mobility. It integrates network functionalities in the form of content rather than by location address [295]. Challenges faced by IoT are at the technology level, communication and networking level, and intelligence level. Smart objects integration is done at the technology level. At the communication and networking level, challenges are involved in the networking and ubiquitous service provisions. Data fusion and service detection is done at the intelligence level. IoT cannot be globally deployed without a precise architecture. IoT-A –Architecture –seamlessly integrates heterogeneous devices. Handling heterogeneous devices is a major task. Effective measures are required to handle the increasing number of IoT devices and Big Data [180].Streaming is used for collecting the data from heterogeneous devices, process it, and make it available in real-time without latency [63, 203]. With proliferating wearable devices and mobiles, IoT is embarking towards personalized health care [152]. Intelligent algorithms are used for analyzing specific diseases. Mobile apps collect jogging activity, tracking [292], and life–logging data. These aspects along with specific algorithms are used in IoT personalized healthcare solutions [202]. IoT serves as a tool for quality education. [150]. IoT supports teaching and promotes academic performance. 5G and IoT will form the mobile broadband [127] in the future and thrive the growth of IIoT [141]. This flourishes the economic growth of the country. Human 4.0 augments human with features that are integrated with the neural system [237].This technology makes IoT fully autonomous with a foreseeable future. CloudIoT bridges Cloud and IoT and is gaining momentum [12]. Digitization improves economy, management control and provides hybrid solutions [86]. Forensic vigilance is required for smart cities. Digital Witness is collected with a privacy warranty [15]. Security depends on the data, location of data, tools [195] used to analyze data etc. Conjoining cloud forensics with client forensics, and logistical solutions are obtained for an Internet-of-Anything (IoA) Era, where swarms of resources are connected. Block Chain [239] provides viable de-centralized secured management solutions but hashing functions and the key could be compromised [193]. The Government is working towards standardization [271, 129, and 100]. Mohammad (2013) et al. [198] used user-centered tools such as Microsoft Gadgeteer to thrive interest in the user towards IoT. Future IoT would have recyclable materials, and power independent systems with embedded intelligence [136]. Future IoT architecture [293] should use narrowband and cater to hardware and software solutions [248]. IoT is deployed in e-Learning for virtual labs and the global library [34] to improve the teaching–learning process [185]. As a part of digital learning, M-Learning is in the earlier stage of research [297]. Internet of Medical Things (IoMT) is used to manage medical services [6] and healthcare workers by connecting medical devices and applications [80]. Information skills, communication skills, strategic skills [278], and content creation skills are required besides for IoT operability [276].

15 Conclusion

Internet-of-Things is a proven technology in the field of automation connecting the virtual world of intelligent objects to the real world of things. It generates and processes data from a lot of implanted devices. With increased connectivity, quality of life, optimized energy, time, cost, and labor, IoT improves by preventing unplanned downtime. Automation improves efficiency, connectivity, and integration [289]. With data-rich resources, newer innovations will burgeon. With IoT, comfort, local-to-global connectivity, eco-friendly support, quality of life, and safety increases. Hazardous ecosystems could be remotely controlled and monitored. Organizations connect the physical world (hardware) to the digital world (software, data analytics) and build an organizational structure to meet the expectations. This article has a systematic insight into the contributions, pre-requisites, research challenges, and architectural design factors integrated into IoT for futuristic remedial measures. Companies need to shift from the traditional approach towards virtual IoT for satisfactory returns. We are heading towards a world where everything will be connected with IoT reaching escape velocity. IoT adds brain and provides the ability to communicate. IoT devices draw power from outlets or they are powered by batteries. This limitation could be thwarted by using IoT devices powering up from other sources of energy. To listen to a song, it is not necessary to have the song stored in the device. If the device is connected to a cloud and if we are able to play the desired song then it is a smart device. If we are planning for a flight travel and if the flight is cancelled, we might travel unnecessarily in worst environment conditions. But if we have an IoT device, if customized,we would get notification and we could avoid hurdles. After the coronavirus pandemic crisis, based on the virtual usage pattern and social distancing modes, prognostications reveal that IoT and Cloud usage in Education, Business, Healthcare, and Automation would cater to the need of the hour.