The Internet of Things (IoT) is the new hot trend in computer science and information technology. IoT devices collect different types of data through a diversity of sensors. Today IoT data is very much valuable. There are two types of data transmission requirements - real-time or batch. Usually, the IoT data is unstructured and the IoT devices from different manufacturers format the data in different ways. This should be considered when the data is received in the cloud to transform it into a unified format to facilitate its further storage, processing, and analysis. A very important concern is to maintain data integrity and ensure security while transmitting the IoT data. The main challenge is how to store and transmit the collected information to achieve data aggregation. The current paper summarizes the challenges involved in the process of collection and transmission of IoT data. Specific approaches are proposed to address some of the communications challenges involved in the process of transmitting the collected information.

1.
J.
Teizera
,
H.
Nevea
,
H.
Lib
,
S.
Wandahla
,
J.
Konigc
,
B.
Ochnerc
,
M.
Konigd
,
J.
Lerchea
, "
Construction resource efficiency improvement by Long Range Wide Area Network tracking and monitoring
" in
Automation in Construction
Volume
116
, (August
2020
)
2.
L.
Patrono
,
L.
Atzori
,
P.
Solie
,
M.
Mongiello
,
A.
Almeida
, "
Challenges to be addressed to realize Internet of Things solutions for smart environments
" in
Future Generation Computer Systems
Volume
111
, (October
2020
)
3.
C.
Yin
,
B.
Li
,
Z.
Yin
"
A distributed sensing data anomaly detection scheme
" in
Computers & Security
97
(July
2020
)
4.
F.
Ortega
,
A.
Gonzalez-Prieto
,
J.
Bobadilla
and
A.
Gutierrez
, "
Collaborative Filtering to Predict Sensor Array Values in Large IoT Networks
" in
Sensors
20
(
16
):
4628
DOI: (
2020
)
5.
S.
Medileh
,
A.
Laoui
,
M.
Nagoudi
,
R.
Euler
,
A.
Bounceur
,
M.
Hammoudeh
,
M.
AlShaikh
,
A.
Eleyan
,
O.
Khashan
2020
"
A flexible encryption technique for the internet of things environment
" in
Ad Hoc Networks
(Pub Date : 2020-06-06)
6.
I.
Stojmenovic
,
S.
Wen
, "The Fog computing paradigm: Scenarios and security issues" in
Federated Conference on Computer Science and Information Systems
,
Warsaw
, pp.
1
8
, doi: .(
2014
)
7.
C.
Machado
, "IoT Data Integrity Verification for Cyber-Physical Systems Using Blockchain" in
Conference: IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC)
At:
Singapore, Singapore
- DOI: (
2018
)
8.
N.
Garg
,
S.
Bawa
, "
Comparative analysis of cloud data integrity auditing protocols
" in
Journal of Network and Computer Applications
66
DOI: (
2016
)
9.
R.
HuZheng
,
Y.
Ding
,
L.
Yang
, "
A survey on data provenance in IoT
" in Springer World Wide Web
23
(
2
) DOI: LicenseCC BY 4.0 (
2020
)
10.
F.
Shaikh
,
E.
Bou-Harb
,
N.
Neshenko
,
A.
Wright
,
N.
Ghani
, "
Internet of Malicious Things: Correlating Active and Passive Measurements For Inferring and Characterizing Internet-scale Unsolicited IoT Devices
" in
IEEE Communications Magazine
56
(
9
) DOI: (
2018
)
11.
N.
Okafor
,
Y.
Alghorani
,
D.
Delaney
, "
Towards improvement in data quality of Low-cost IoT Sensors in environmental monitoring networks using data fusion and machine learning approach
" in
ICT Express
6
(
3
) - DOI: - LicenseCC BY-NC-ND (
2020
)
12.
P.
Mpofu
, S Hopewell,
K.
Saulo
,
M.
Jacques
,
N.
Chitiyo
, "
Utilizing a Privacy-Preserving IoT Edge and Fog Architecture in Automated Household Aquaponics
" in
Proceedings of the 2nd African International Conference on Industrial Engineering and Operations Management
Harare, Zimbabwe
, (December 7-10,
2020
)
13.
D.
Giacomo
,
V.
Albricci
,
M.
Ceria
,
F.
Cioschi
,
S.
Visconti
,
A.
Visconti
, "
Measuring Performances of a White- Box Approach in the IoT Context
" in
Symmetry
11
(
8
):
1000
DOI: (August
2019
)
14.
S.
Gawali
,
M.
Deshmukh
, "
Energy Autonomy in IoT Technologies
" in
5th International Conference on Power and Energy Systems Engineering
, CPESE 2018, 19-21,
Nagoya, Japan
(September
2018
)
15.
N. Khairi A.
Jambek
, "
Study on data compression algorithm and its implementation in portable electronic device for Internet of Things applications
" in
The European Physical Journal Conferences
162
(
1
):
01073
(January
2017
)
16.
M.
Elkhodr
,
S.
Shahrestani
,
H. S.
Cheung
, "
The Internet of Things : New Interoperability, Management and Security Challenges
" in
International Journal of Network Security & Its Applications
8
(
2
):
85
102
- DOI: (
2016
)
17.
J.
Guth
,
U.
Breitenbucher
,
M.
Falkenthal
,
P.
Fremantle
,
O.
Kopp
,
F.
Leymann
,
L.
Reinfurt
, "A detailed analysis of IoT platform architectures:
concepts, similarities, and differences"
in
Internet of Everything
pp.
81
101
, . (
2018
)
This content is only available via PDF.
You do not currently have access to this content.