Iot-Based Enterprise Resource Planning: Challenges, Open Issues, Applications, Architecture, and Future Research Directions
Iot-Based Enterprise Resource Planning: Challenges, Open Issues, Applications, Architecture, and Future Research Directions
net/publication/343041537
CITATIONS READS
2 892
3 authors:
Shahrzad Oveisi
University of Tehran
20 PUBLICATIONS 58 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Shahrzad Oveisi on 28 February 2021.
Internet of Things
journal homepage: www.elsevier.com/locate/iot
a r t i c l e i n f o a b s t r a c t
Article history: In today’s highly competitive markets, organizations can create a competitive advantage
Received 30 June 2020 through the successful implementation of Enterprise Resource Planning (ERP) systems. ERP
Revised 13 July 2020
works with different technologies, including the Internet of Things (IoT). IoT uses a unique
Accepted 18 July 2020
Internet protocol to identify, control, and transfer data to individuals as well as databases.
Available online 25 July 2020
The data is collected through IoT, stored on the cloud, and extracted and managed in
Keywords: through ERP. In this study, we review the challenges, open issues, applications, and archi-
Internet of things tecture of the IoT-based ERP. For this purpose, we review and analyze the latest IoT-related
Enterprise resource planning articles to present the unique features of the IoT and discuss its impact on ERP. The results
Cloud computing show sensors and devices connected to the Internet can manage the stored data processed
in the cloud through ERP without human intervention. We also discuss the challenges and
opportunities in the relationship between ERP and the IoT risen by the introduction of the
cloud.
© 2020 Elsevier B.V. All rights reserved.
1. Introduction
Companies in various industries collect different types of data, including invoices, customer information, project sched-
ules, shipping, and payment information, among others [89]. Enterprise Resource Planning (ERP) plays a critical role in
streamlining processes and improving business operations across industries [68]. Today, the Internet of Things (IoT) and
massive data influxes are stirring up the ERP landscape, introducing new possibilities for operational excellence and work-
flow automation [10,27]. IoT is evolving rapidly, and according to McKinsey’s report on the global economic effect of IoT, the
annual economic impact of IoT in 2025 will range from 2.7 to 6.2 trillion dollars [8,98]. However, in the midst of the ex-
citement for increasing connectivity in manufacturing, the impact of IoT has on ERP systems, and business processes should
not be overlooked [12].
Every system component in the IoT has an IP address, which enables the computers to identify, control, transfer data to
other individuals, and related databases [104,105]. The collected data, stored in the cloud, enables ERP to manage, control,
∗
Corresponding author.
E-mail addresses: tavana@lasalle.edu (M. Tavana), hajipour.v@wtiau.ac.ir (V. Hajipour), sh.oveisi@fanap.ir (S. Oveisi).
https://doi.org/10.1016/j.iot.2020.100262
2542-6605/© 2020 Elsevier B.V. All rights reserved.
2 M. Tavana, V. Hajipour and S. Oveisi / Internet of Things 11 (2020) 100262
Table 1
ERP history.
Reorder point systems The 1960s Available historical data is used to predict the It is used to manage the production of
expected inventory items in the future; when some products in high volume and at
an item reaches a level less than the constant demand; in these systems,
predetermined level, more products are the focus is on cost.
ordered.
Material requirement The 1970s Provides a method based on the need for Focus on marketing; Emphasis on
planning system (MRP) planning the production of products and more Integration and planning
ordering the raw materials
Manufacturing The 1980s Planning the newly added capacity; can be Focus on quality, focusing production
resource planning used for planning and monitoring the strategy on process control, overhead
systems (MRP-II) implementation of production plans. costs reduction, and precise cost
reporting.
Manufacturing The 1990s Enabling the adaptation of production plans Focus on the ability to adapt new
execution systems to meet customer needs; providing more services and products on a timely
(MES) feedback in relation to sales activities basis to meet specific customer needs
Enterprise resource The late 1990s Integrating the production process with Integrates supplier, manufacturer, and
planning (ERP) and beyond supply chain processes in companies; customer information throughout the
designed to integrate enterprise business supply chain.
processes to provide a seamless flow of
information from suppliers
IoT 1999 Everything has a digital identity and allows The term “Internet of Things” was
computers to organize and manage them. coined by Kevin Ashton, executive
director of the Auto-ID Center
and process the data. Overall, the integration of ERP into IoT provides a great number of opportunities, the most important
of which includes better management, automation, product traceability, and reduce ERP implementation costs [133]. IoT
creates a connection between the product and the customer by reducing human intervention and promoting automation
using sensors. However, the integration of IoT into ERP faces a lot of challenges, and the biggest challenge is the lack of
trust in IoT as a relatively new technology trend. Data security is a top concern, and companies heavily investing in ERP
are very wary of the accuracy and reliability of the data coming from an IoT system [98,108]. After almost three decades
since their introduction, ERP systems are so well-oiled that a single record could represent a few million dollars. It is simply
risky to trust new technology, and in a large-scale ERP implementation, nobody wants to save money unless it is millions
of dollars [27,30,62].
In this study, we review the challenges, open issues, applications, and ERP-based IoT architectures. The latest journal
papers at the intersection of ERP and IoT are reviewed and analyzed. We further demonstrate the relationship between ERP
with cloud-based services. In Section 2, we present a brief history of ERP and IoT. In Section 3, we present the technologies
and platforms in cloud ERP. In Section 4, we present the IoT, and in Section 5, we present our conclusions and future
research directions.
Demonstrating a history of ERP systems, Table 1 shows that IoT was introduced in 1999 by Kevin Ashton [5]. The growth
of technology in ERP is also shown in Fig. 1. As can be seen in Fig. 1, the use of Internet technology in ERP has increased
from 20 0 0 with the use of the Internet and extranet technology [70].
The evolution of ERP systems came just after the development of hardware and software systems. During the 1960s, most
organizations designed, developed, and implemented centralized computing systems, most of which automated warehouse
inventory control systems using inventory control (IC) packages. Essential Requirements Planning (ERP) systems were de-
veloped in the 1970s. In these systems, sectoral or product requirements planning is based on a comprehensive production
plan. New software programs, such as product resource planning (MRP II), were introduced, focusing on the synchroniza-
tion of the production process with the production requirements to optimize the production processes. Systems with ERP
systems technologies first appeared in the late 1980s and early 1990s and had the power to coordinate and integrate opera-
tions throughout the company. Using MRP technology, ERP systems achieve the integration between business processes such
as manufacturing, distribution, accounting, finance, human resources, project management, Inventory management, mainte-
nance, and Logistics. This integration also creates accessibility and visibility, as well as unity throughout the company.
Developments in ERP include planning and scheduling (APS), Internet business solutions, including customer relation-
ship management (CRM), and supply chain management (SCM). Fig. 2 shows the major historical events related to ERP.
During this decade, ERP has been associated with mainframe and mini and macro computer technologies, as well as data
warehousing, data mining, knowledge management, and client-server networks with a distributed database and knowledge
management. The first decade of the 20th century also saw ERP working with low-end IoT technologies, mainframes, client-
server systems, distributed computing, Internet technology, and knowledge management. Today, there are many different
systems on the market, most of which are migrating outside the cloud.
M. Tavana, V. Hajipour and S. Oveisi / Internet of Things 11 (2020) 100262 3
IRP
Enterprise Suite ERPII ERP
New Trends 2000s 1990s
2020
Platforms
Application
Platforms
Block Microsft
SAP Oracle IBM
Chain Azure
Percent
Platforms
SAP Integration Machine Platforms
Microsft
SAP Oracle IBM
Oracle Cloud Learning Azure
Infor
Platforms
Microso
Microsft
AI SAP Oracle IBM
Other Azure
Platforms
Microsft
Big Data SAP Oracle
Human Azure
Source
The company’s hardware provides the bases for the local installation of the conventional on-site ERP systems, while
cloud ERP does not require such hardware. In other words, it is considered to be a service that works through providers
and programs and is accessible through web applications. Each company can choose from a range of various ERP systems
to deploy, and of course, the choice depends on a number of factors such as the data storage location as well as software
hosting. The changes made to ERP implementation over time led to changes in the way the companies use ERP. Initially,
the systems were small and not very functional, and they were developed to perform a specific task. So companies have
no choice but to install and use various systems to perform all the tasks and provide management that a company needs.
In many cases, the existence of small systems is indicative of the fact that there will be a lot of integration and commu-
nication among these systems. It also means that there is a lot of traffic coming through the network, and there are more
risks involved, that is caused, ERP works with Internet technologies, mobile wireless, artificial intelligence, grid computing,
knowledge management, web service architecture over the years and decades.As can be seen in Fig. 1, the use of Internet
technology in ERP has increased from 20 0 0 with the use of the Internet and Extranet technology, which will reach its peak
in 2020.
4 M. Tavana, V. Hajipour and S. Oveisi / Internet of Things 11 (2020) 100262
Table 2
Advantages and disadvantages of cloud ERP vs. on-premise ERP systems (-, +).
This section will discuss cloud ERP technologies and platforms. First, the advantages and disadvantages of cloud ERP
versus on-premise ERP are discussed in Table 2; then, different cloud ERP vendors are introduced, and ERP technology
explored [75,89].
As can be seen in Fig. 1, distributed, web-based, artificial intelligence and other technologies have been more frequently
used in recent years. Therefore, this report highlights five IoT technologies, namely blockchain, artificial intelligence, machine
learning, and big data. The following will explore what platforms can work with these technologies. As shown in Fig. 2, the
platforms that can work with IoT include SAP, Oracle, Microsoft, Epicor, Sage, Netsuite, and People Soft.
The platforms that can work with blockchain technology include SAP, Oracle, Microsoft Azure, and IBM. SAP, Oracle,
Microsoft Azure, and IBM are the technologies that can work with machine learning technology and artificial intelligence.
Finally, the platforms capable of working with big data technology are SAP, Oracle, and Microsoft Azure [27].
The term Internet of Things (IoT) was coined by Kevin Ashton in 1999. He described a world where everything had a
digital identity for itself and enabled computers to organize and manage things. For Kevin Ashton, “IoT” is a tool to overcome
the domination of time and place. This view was first popularized by the Center for Automatic Identification and relevant
market analysis publications [73]. RFID is considered as a prerequisite for this technology. From another perspective, the
IoT is an environment where everything, whether human, animal or inanimate, possesses a unique Internet Protocol (IP)
that has the ability to detect, control, send and transfer data to others and their respective databases. The data collected
from objects will be visible through different tools such as mobile phones and a variety of computers and tablets. When
IoT is implemented, data can be transferred across several objects. IoT is a function of the convergence and evolution of the
three elements: Internet, wireless technology, and microelectromechanical systems. International Telecommunication Union
defines IoT as follows: at any time and place, we will have something to which anyone can connect [13].
Since the semantic web is considered to be an effective method for achieving the integration among systems, a model
for integrating ERP and IoT is introduced here. Model of integration of cloud ERP APIs and things as a service [8]. As shown
in Fig. 3, the IoT includes sensors, actuators, and applications (on mobile or Windows). Accordingly, the sensors collect data
based on the actuator’s act. This information provides a common framework that allows data to be shared and connected
to the cloud through the Semantic Web. The data is also linked to the IoT application via the cloud. ERP also manages and
controls data through the cloud. The integration of IoT and ERP has many benefits, including the following:
1. Events such as re-orders, replenishment, out of stock inventories and missed deliveries could be informed automatically
through sensors and devices connected to the internet.
M. Tavana, V. Hajipour and S. Oveisi / Internet of Things 11 (2020) 100262 5
Semanc Web
Sensors Actuators
API
Cloud ERP
2
2. IoT makes it possible to send notifications and warning to the manufacturers informing them that, for example, some
of their products require their attention or some machines are down. Nevertheless, such a functionality is provided only
when the business processes are adapted to this new model and be responsive to it.
3. IoT provides a considerable amount of data that needs to be gathered, processed, and analyzed appropriately to gain
the maximum benefits from IoT ERP. The robustness of this software program, however, is a genuine concern. IoT ERP is
expected to deal with the massive influx of data from different devices and products. Thus, a lot of pre-preparation is
demanded of the manufacturing companies while they need to take into account the size of their current ERP program
and whether it is capable of connecting to IoT.
4. Real-time information is a prerequisite for an instant solution. The integration of ERP and IoT paves the way for real-
time data and immediate solutions at the same time; this is possible through ERP, which provides a clear understanding
of the situation while IoT offers the potential solutions. In fact, IoT will create junk information that can be extracted
through ERP in an attempt to improve the business.
5. Through the sensors, this integrated system is able to protect company products from theft. It does this through an alert
message such that if the package is manipulated before it gets to the destination, an alert message or an email is sent
to the registered number or email address of the customer.
6. As for special or sensitive products whose maintenance demands special circumstances such as specific temperature or
pressure, some IoT solutions safeguard these kinds of products against the environmental risks and keep the quality the
same during the shipment.
7. According to the traditional methods, the manufacturer could only check on the quality of a product that has been
shipped to the destination only through some primitive techniques such as customer service calls or field visits. However,
the advent of technologies such as IoT makes it possible for the customer to trace the product’s status and find out about
its use, behavior, wear, and tear. Even some powerful IoT devices demand to replace their parts after they detect wear
and tear.
8. There are two cases for selling the products: first, when the product is sold directly to the customer and second, when
the product is sold through dealers. Of course, adopting the second approach poses a challenge to the ERP system in
terms of keeping track of the end-users’ data. However, by enabling the products to communicate with their customer
immediately after they are initiated, IoT resolves this problem.
9. The automatic scan and entry of the barcode data are achieved through IoT in real-time. In other words, IoT reduces
human intervention to a minimum through the sensors embedded inside the machines leading to improved production
efficiency.
10. In a supply chain, IoT allows tracing the products or equipment as they are transferred from one stage to the next, and as
a result, it provides real-time information. Subsequently, the real-time data is fed into the ERP system providing all those
who are engaged with the supply chain with the feature which enables them to track the interdependencies between
product life cycle and the material flow on the other hand.
As we have seen, IoT is one of the key technologies working with ERP. In analysis review sections, according to our inves-
tigation on the IoT field, 140 articles were randomly selected from recent IEEE, ACM, and Elsevier journals from IEEE Explore,
ACM Digital library, Arvix repository, and Elsevier. By reviewing these papers, the journals in this field in our database are
6 M. Tavana, V. Hajipour and S. Oveisi / Internet of Things 11 (2020) 100262
18
16
14
NUMBER OF PAPERS
12
10
JOURNAL NAME
shown in Fig. 4. As shown in this figure, a majority of articles in our database are derived from the IEEE database, IEEE Ac-
cess, ACM database, ACM Transactions on Internet journal, and Future Generation Computer System from Elsevier database.
The IoT review articles are shown in Table 3.
4.2.1.1. IoT system architecture. This section briefly describes the architecture of IoT systems. As can be seen in Fig. 6, IoT
networks include three layers, namely Application, Network, and Perception. Fig. 6 shows the detailed architecture of IoT
[32,35,129]. The following example illustrates how IoT works. Smart parking, including sensors and microcontrollers, is lo-
cated in each parking place. The user receives a live update about the availability of all parking places and chooses the best
one. The ultrasonic sensors are used to relay information and display the available parking places in a web application. The
IoT device consists of an ESP8266 microcontroller and an HC-SR04 distance measurement sensor. The sensor periodically
measures the distance and transmits this data to the microcontroller, which is connected to AWS IoT service via the MQTT
protocol. Periodically, the device sends measurements to the cloud where they are stored in AWS IoT shadow as a sensor
state. A sensor detects a parked car by measuring the distance to the nearest obstacle. We used this example in parts a,b
and c.
a) Physical layer
The physical object surface is involved with physical IoT sensors. The physical object is mainly involved with sensing,
collecting, and sometimes processing information. At this level, diverse sensing functionalities are implemented through
adapting sensors and actuators such as temperature, motion, or acceleration sensors. In the smart parking example, the
ultrasonic sensors are in the physical layer.
b) Connectivity
M. Tavana, V. Hajipour and S. Oveisi / Internet of Things 11 (2020) 100262 7
Table 3
IoT review articles.
A Review on the Use of Blockchain for the 2018 This paper presents a focus on the way blockchain is adapted to the specific
Internet of Things needs of IoT in an attempt to develop Blockchain-based IoT (BIoT)
applications..
A Survey of Machine and Deep Learning 2018 this paper presents a comprehensive review of machine learning (ML)
Methods for the Internet of Things (IoT) methods as well as the recent advances in the field, which can be deployed
Security in the development of advanced security methods of IoT systems.
A survey on the application of machine 2018 This paper examines how machine learning works in the IoT domain intends
learning for the Internet of Things to shed light on the recent advances in the IoT ML techniques and surveys of
various IoT applications.
Deep Learning for IoT Big Data and Streaming 2018 This paper focuses on Deep Learning (DL), i.e., a class of advanced ML in an
Analytics: A Survey attempt to smooth the learning process in the IoT domain. The authors in
this paper mention the characteristics of IoT data and introduce two
significant IoT data treatments, i.e., IoT big data analytics as well as IoT
streaming data analytics.
Enabling Deep Learning on IoT Devices 2017 This paper looks into the integration of deep learning and low-potheyr IoT
products. IoT-based devices are enabled by DL, and this helps them to render
the unstructured multimedia data and be responsive no only to the
environmental events but also to the users as well as the potheyr
requirements.
Evaluating Critical Security Issues of the IoT 2017 This paper focuses on three major layers of the IoT system model, namely,
World: Present and Future Challenges Perception, Transportation, and Application providing a taxonomic analysis
from these three perspectives. The authors offer, in the end, the most critical
issues as a guide for future research directions..
Feature Reduction Method for Cognition and 2019 This paper explains the potheyr amplifier radio frequency (RF) fingerprinting
Classification of IoT Devices Based on as an example.The paper mainly focuses on studying the RF fingerprint
Artificial Intelligence dimension reduction method while taking into account the uncorrelated or
redundant features as well as the high dimensionality of RF fingerprint
features.
From Cloud Down to Things: An Overview of 2019 This paper examines the role of machine learning plays in IoT, as well as the
Machine Learning on the IoT various functions of machine learning in application data processing and
managerial tasks.
IoT for Smart Healthcare: Technologies, 2017 This paper explains the most recent research on different areas of the model,
Challenges, and Opportunities taking into account their pros and cons and discusses whether the model
can be fulfilling for a wearable IoT healthcare system.
IoT-Based Big Data Storage Systems in Cloud 2016 This paper introduces the research topics and publications which have been
Computing: Perspectives and Challenges conducted in the domain of critical IoT application.
Mobile Phone Computing and the IoT: A 2016 This paper provides a selection of more than 100 major up to date studies in
Survey the field. Based on their domain and area of application such as health,
sports, gaming and etc., and the type of focus, whether it includes
participatory sensing, eco-feedback, actuation, and control, and the involved
communicating agent such as things or people, these papers are categorized
to 10 domains.
The paper also presents an analysis of the open issues and research gaps
after they are identified.
Modeling of Aggregated IoT Traffic and Its 2019 This paper provides an insight into the accuracy of the Poisson
Application to an IoT Cloud approximation model.
Securing the IoT in the Age of Machine 2018 In this paper, a taxonomy and a review of the most recent research on IoT
Learning and Software-defined Networking security are provided while presenting a roadmap of the real research
challenges of employing machine learning and software-defined networking
to focus on the current and future IoT security issues.
Smart Electricity Meter Data Intelligence for 2015 The focus of this paper is on the smart electricity meters along with their
Future Energy Systems: A Survey use while taking into account the significant aspects metering process, the
benefits of the shareholders as well as the technologies dealing with the
interests of the shareholders. The paper put the spotlight on the challenges
as well as the opportunities brought about by the big data and the rising
interest in cloud environments.
Survey of platforms for massive IoT 2018 This paper is devoted to IoT platforms focusing mainly on their components
and features.
Data fusion and IoT for ubiquitous smart 2017 By focusing mainly on the mathematical methods, e.g., probabilistic
environments: A survey methods, artificial intelligence, and theory of belief as well as particular IoT
environments, e.g., distributed, heterogeneous, nonlinear, and object tracking
environments, this paper presents a literature review of IoT data fusion.
Big IoT data analytics: architecture, 2017 This paper proposes a state of the art architecture for big IoT data analytics
opportunities, and open research challenges after the most recent researches on the topic are examined, and the relation
between IoT and big data analytics are explained.
"IoT (IoT): A vision, architectural elements, 2017 This paper discusses the implementation of IoT across the world from the
and future directions, cloud-centric vision perspective.
Secure integration of IoT and cloud computing 2018 In this paper, IoT and cloud computing are examined while concentrating on
the security issues of these two domains.
(continued on next page)
8 M. Tavana, V. Hajipour and S. Oveisi / Internet of Things 11 (2020) 100262
Table 3 (continued)
A survey: Attacks on RPL and 6LoWPAN in IoT 2015 This paper discusses the potential attacks on RPL as well as the 6LoWPAN
network while examing the countermeasure against them and pointing out
the consequences on network parameters.
Program Analysis of Commodity IoT 2019 This paper provides a survey of the privacy and security challenges which
Applications for Security and Privacy: demand program-analysis techniques in IoT focusing on the attacks which
Challenges and Opportunities have been launched against these systems as well as the defense deployed
against them.
Leveraging User-related IoT for Continuous 2019 More than 58 papers on the major components, such as a CA system, are
Authentication: A Survey thoroughly examined in this paper. The paper also studies the industry
status focusing on 32 market contributions, research projects, and related
standards.
Blockchain for the IoT and Industrial IoT: A 2019 This paper starts with examing the underlying structure as well as the key
review features of blockchain and then focus on the security requirement for
Industry 4.0 and IoT development. Finally, the paper investigates the way IoT
security tools and techniques are employed to apply blockchain to IoT for
industry 4.0.
A survey of edge computing-based designs for 2019 In an attempt to motivate edge-based IoT security designs, the present paper
IoT security provides a thorough study of the current IoT security solutions.
Enabling IoT platforms for social IoT 2019 In this paper, after the OS standard features and hardware IoT platforms are
applications: Vision, feature mapping, and explained, an OS-to-hardware architectures features-mapping is proposed
challenges focusing on the investigation of the unique requirements that IoT application
has.
The dual effects of the IoT (IoT): A systematic 2019 This paper explains the advantage and disadvantages of IoT after analyzing
review of the benefits and risks of IoT its adaptation by the organizations. Actually, the advantages and
adoption by orGANizations disadvantages of the IoT are categorized into Big, Open, Linked Data
(BOLD)as a result of a thorough review of the literature.
Privacy preservation in blockchain-based IoT 2019 In this paper, the integration of blockchain technology in IoT scenarios is
systems: Integration issues, prospects, analyzed, emphasizing the privacy challenges resulted from this integration.
challenges, and future research directions
The paradigm of IoT Big Data Analytics in 2019 This paper aims at examining the impacts of IoT Big Data Analytics paradigm
Healthcare Industry: A Review of Scientific (IoT BDA) on the implementation and application of IoT-based technologies
literature and Mapping of Research Trends in the area of healthcare services. A comprehensive review of the literature
in the domain is presented, and the research trends are mapped onto the IoT
BDAin the healthcare industry to achieve this. In fact,46 papers regarding IoT
BDA, as well as 84 papers about fog computing in the healthcare industry,
are reviewed from qualitative and quantitative perspectives in the paper.
Blockchain-based IoT: A Survey 2019 This paper presents a thorough examination of the BCoT by providing
summarized explanations of what IoT is and what challenges it poses. Then,
a brief review of the blockchain is presented to introduce the integration of
blockchain with IoT, an attempt which led to a proposal regarding BCoT
architecture.
One of the main goals of the IoT platform, communicate Heterogeneous sensors cooperatively, and subsequently provide
smart services. Since the sensors deployed in IoT use battery for their power and their computation as well as storage
capacity are limited, they are considered resource-limited. Therefore, IoT sensors should work with low-power sources under
a lossy and noisy communication environment. Recent IoT communication technologies: 6LoWPAN, Bluetooth, IEEE 802.15.4,
WiFi, ultra-wide bandwidth, RFID, and near-field communication. In the smart parking example, the AWS IoT core is the
service that manages the connection with the cloud.
c) Middleware
Middleware aims at demonstrating the complexity of a hardware system, and of course, this means more concentration
on the problems by the developers without being disturbed at the hardware level. Several interfaces can be used to connect
us to sensors and other objects, including Bluetooth, WI-Fi, RFID, and NFC. In a smart parking example, the AWS IoT Platform
is middleware.
d) Hardware-level
Hardware complications are usually caused by related to communication and computation issues. A software level is
provided across operating systems, applications as well as the network communication levels by the middleware, enabling
cooperative processing. From a computational standpoint, a middleware provides a level that sits between application and
system software and has the following main functions. First, it allows for collaboration between heterogeneous IoT objects
so that diverse IoT classes communicate with each other without interruptions through the middleware. Actually, the mid-
dleware plays a significant role in enabling the interoperability among IoT devices. The second major role played by the
middleware concerns the devices, which are potential for interaction within the IoT domain. In fact, it provides these de-
vices with scalability.
M. Tavana, V. Hajipour and S. Oveisi / Internet of Things 11 (2020) 100262 9
The evolution of IoT devices is expected to be the outcome of middleware through critical reforms being made when
scaling up the organization. The third role is the device discovery and environmental awareness, which has to be provided
by middleware to support object knowledge of other surrounding IoT objects. Middleware is also in charge of providing
the type of computing that is environmentally conscious so that the sensors’ data become understandable, which can be
employed to provide context and present intelligent services to users. Finally, in another role, the middleware addresses
10 M. Tavana, V. Hajipour and S. Oveisi / Internet of Things 11 (2020) 100262
100
90
80
70
60
50
40
30
20
10
0
IoT security as well as its privacy, and that is because of human or industry involvement with the data presented by IoT.
In other words, it is essential to take into account the sensitive issues of security and privacy; moreover, the firmware is
expected to consider mechanisms to create a secure IoT system [6,94].
The noticeable amount of data captured by IoT is highly valuable. Several physical objects existing in the different IoT
applications are in charge of creating such big data. Thus, the large amount of data generated by the physical devices must
be analyzed online to acquire useful knowledge. The timing of knowledge acquiring is useful. According to researchers,
there are various ways to integrate big data analytics with IoT design so that this data becomes understandable. ML and
DL go beyond the traditional analytic methods; in fact, they are capable of absorbing the invisible insight of big data and
transforming it into useful data with a minimal human contribution [6].
4.2.1.2. Applications of IoT in ERP systems. IoT has several applications. The analysis of articles available in our database
identified the applications of IoT shown in Fig. 7 and Table 4 along with the articles in our database (Smart grid, health
care, monitoring, smart home, security, wearable devices, smart city, and energy). The most common applications of IoT
were in Smart City (road management, smart agriculture, smart transportation, smart parking, and smart university), health
care, and security.
a) Smart city
Cities inherently face complex, widespread, and interconnected challenges that can only be solved using a systematic
approach. In other words, the massive crowding of residents leads to chaos, creating conditions that not only bring down
the equilibrium of cities but prevent sustainability with current methods of urban management and development. Therefore,
urban planners all over the world try to develop models of 21st-century urban development, satisfying the new demands
and expectations of today’s world with an integrated view for all aspects of urbanization. The development of a smart city
is a new concept to address the current challenges of cities in the field of urban planning, which has attracted a lot of
attention in recent years. A smart city has been the focus of the millennium transformation and development, which means
opening new concepts in urban planning that combine the capabilities of real and virtual worlds to solve urban problems
[69].
The ERP systems govern rules for purchasing, inventory usage, permitting, and billing. The city finance department tracks
all public expenditures and incoming payments via the ERP system. Public works and city engineering utilize the work order
system within the ERP system to respond to city building issues or infrastructure issues reported by citizens or identified
by the real-time event management and analytics system.
Planning, permitting, and inspections use geographical information systems (GIS) to manage the planning process for
land usage throughout the city. The permitting process utilized with the ERP system allows permits to be requested online,
and then the citizen or business can track the permit and inspection process as it is completed.Permits are issued online via
the ERP permitting web portal. The permit process includes inspections of retention ponds throughout the city. The sensor
network IoT will be utilized to provide water quality information and foliage growth data [105].
Table 4
IoT applications.
Smart Grid& Smart meter Guan [40], Afzal et al. [1,106], Ukil et al. [119], Tabrizi and Pattabiraman [113], Marjani et al. [69],
Rholam and Tabaa [93],
Health care Wu et al. [125], Subahi [110], Baker et al.(2016), Yang [128], Tekeste et al. [115], Sra Amendola
et al.(2014), Rathore et al. [91], Afzal et al. [1], Saheb and Izadi [94], Zhu et al. [137].
Smart Monitoring Jabbar et al. [50], Tekeste et al. [115], Shevtsov et al. [101], Md. Sanwar Hossain et al. [45].
Smart Home (smartwatch, Fang et al. [32], Laput and Harrison [60], Chauhan et al. [22], Tiloca et al. [117], Laput and Harrison
smartphone, smart building) [60], Saeed et al. [140], SIBONI et al. [103], Rholam and Tabaa [93].
Smart City(road management, Barcelo et al. [13], Metzger et al. [72], Gharaibeh et al. [37], Choi and Choi [24], Perera et al. [86],
smart agriculture, smart Mohammadi et al. [73], Martin Strohbach et al. [109], Furqan Alam et al. [5], Furqan Alam et al. [4],
transportation, smart parking, Chuang Hu et al. [46], Calderoni et al. [141], Paul Brous et al. [15], Bu and Wang [16], Shih et al.
smart university, smart [102], Celesti et al. [142], Vogler et al. [121], Alama et al. [4], Baranwal et al. [143], Marjani et al.
building) [69], Hu et al. [46], Calderoni et al. [141], Rholam and Tabaa [93], Bu et al. [17].
Security(Intrusion detection, Mahmudul Hasan et al. [43], Ketheyi Sha et al. [98], Adnan Akbar et al. [2], Xiao et al. [126],
Attack detection, Chauhan et al. [22], Saxena et al. [97], Emami Naeini et al. [31], Chatterjee et al. [21], Tabrizi and
Authentication) Pattabiraman [113], Shen et al. [100], Li et al. [65], Guan [40], Siddiqui et al. [104], Rathee et al.
[90]. Sha et al. [98]
Other Rathee et al. [90], Alahakoon and Yu [3], Al-Garadi et al. [6], Ateeq et al. [9], Bertino et al. [14], Bu
et al. [17], Cai et al. [18], Caro and sadr [19], Celik et al. [20], Chen and Hao [23], Chowdhury et al.
[25], Cui et al. [26], Dawe& Paradice [28], Deng et al. [29], Naeini et al. [31], Felemban et al. [33],
Fernández-Caramés and Fraga-Lamas [34], Frustaci et al. [35], Georgakopoulos et al. [36], Gogineni
et al. [38], Gonzalez-Manzano et al. [39], Gubbi et al. [41], Ham et al. [42], Hassan et al. [44], Huang
et al. [47], Huang et al. [48], Islam et al. [49], Junior et al. [51], Karimanzira and Rauschenbach [53],
Khan and Salah [54], Khelifi et al. [55], Ko et al. [56], Kolias et al. [57], Lee et al. [61], Li et al. [63],
Li et al. [64], Li et al. [65], Liu et al. [66], Lv et al. [67], Meddeb et al. [71], Moin et al. [74], Moosavi
et al. [76], Muñuzuri et al. [77], Nawaz et al. [78], Navo [79], Novo [80], Okafor and Delaney [81],
Omitola and Wills [82], Pawlick and Zhu [84], Peña and Fernández [85], Pourvahab and Ekbatanifard
[87], Restuccia et al. [92], Samie et al. [95], Sha et al. [98], Sharma and Wang [99], Siboni et al.
[103], Siddiqui et al. (2018), Siegemund and Turau [105], Soliman et al. [107], Stergiou et al. [108],
Sung and Chiang [112], Tang et al. [114], Tello-Oquendo et al. [116], Truong and Dustdar [118],
Verdouw et al. [120], Wang and Guo [122], Wang et al. [123], Wirtz et al. [124], Wu et al. [125], Xu
et al. [127], Yang et al. [129], Yao et al. [130], Yıldırım and Tatar [131], Yin et al. [132], Zheng et al.
[134], Zhou et al. [135], Zhou et al. [136], Yavuz [145], Mahmud [68], Balampanis et al. [12], Cai
et al. [18], Kumrai et al. [59], Andročec et al. [8], Wanga and Gue [122], AhmadKhan and salah [54],
Chowdhury et al. [25], Junior et al. [139], Gogineni et al. [38], Ko et al. [56], Ahmed Saeed et al.
[140], Konstantinidis et al. [58], Gonzalez-Manzano et al. [39].
The IoT devices have become the heart of key health applications recently, having received a boost from the healthcare
sector. Monitoring the health status of the patients, recording their information, notifying the related healthcare system
of the critical circumstances, and subsequently facilitating the process of treatment for the patient in a timely manner is,
among others, the significant roles of IoT devices in the healthcare systems. With almost 60% of the healthcare sector has
implemented the Internet of medical things (IoMT) devices, the IoMT is believed to be leading to a revolution in the domain
by turning disorganized healthcare into a synchronized one. IoT devices made almost 30.3% of 4.5 billion IoT devices in 2015;
however, the statistic had been predicted to rise to 20–30 billion by 2020 [1,11,69].
ERP, on the other hand, plays a major role in the healthcare sector by achieving an effective integration among the pro-
cesses and the services.ERP would make a big difference in areas such as finance, human resources, and revenue and admis-
sion resources of the healthcare sector if it were implemented successfully. Services such as diagnosis, patient’s home care,
and chronic care are provided by the healthcare system through the information they receive from various sources. Needless
to say, these various sources and processes will be much more helpful for the healthcare system if they are integrated be-
cause integration allows for more information sharing while the traditional models are based on segregated processes and
thus less information sharing. So by achieving integration across various systems in different locations and having access
to them, ERP smoothes the healthcare processes, improve the quality of their services, and help the health fraternity to be
more efficient in their jobs. Implementing ERP in a hospital is particularly beneficial for the front desk as well as the fi-
nancial management sections.ERP provides the front-desk staff with the information they require, such as appointment, bed
availability, specialized services, and the doctors’ schedules leading to the organized and effective performance of the front
desk. The financial management also benefits from ERP because it offers solutions to cut costs, produce more comprehensive
managerial reports, and reduce risks.
12 M. Tavana, V. Hajipour and S. Oveisi / Internet of Things 11 (2020) 100262
FREQUENCY
20
15
10
5
0
TECHNOLOGIES
c) Smart monitoring
IoT monitoring has many advantages, some of which are listed below:
• It helps in analyzing the dynamic systems and processing a large number of events and alerts.
• It also gathers and analyzes IoT data from connected devices and applications and thus create integration between
the devices and business.
• It optimizes the performance across multiple applications, APIs, networks, and protocols and thus bridges the per-
formance gaps
• It provides you with feasible insights to create a better customer experience, mitigate the problems, and increase
the IoT opportunities.
d) Smart home
Human presence detection, activity detection, self-organizing appliances, air conditioning control based on user desire
and convenience, etc. are made possible by machine learning. In particular, the detection of activity due to its use in life
support, home automation, etc., has received much attention [95]. For example, information regarding energy status, includ-
ing its availability and price now or in the future, is provided by energy sources such as photovoltaic appliances and power
suppliers. This information is used by devices which are considered the subscriber in an attempt to modify their patterns.
Smart grid deals with effective ways to effectively manage and control energy production costs and save energy, which
proves to be more reliable in achieving these goals than the conventional grid. Moreover, smart meters as modern energy
meter makes power consumption measurable and help to monitor and control electrical devices.
The smart grid, which is a flexible system connecting people with technology and natural systems, can be defined from
functional or technological perspectives. It includes an electric grid, a communications network, and controlling and mon-
itoring hardware and software and is capable of providing power, reducing costs, and presenting instant information. For
example, the digital electricity grid which gathers and pass information, and creates electricity using the bilateral technical
direction [69].
In relation to the smart grid and the onslaught of big data, financial transformation is achieved as a result of the de-
mands of business transformation. Since utility companies are encouraging industry-changing advancements of this type,
ERP systems strive to offer strategic insights for the better management and application of the gathered data.
4.2.1.3. Relation with other technologies. Another issue discussed in papers is the relationship of IoT with other technologies.
As can be seen in Fig. 8, machine learning and deep learning technologies make the most use of and have synergy with IoT
technology in reviewed papers. To this end, we also examined a variety of methods used in this field among the articles,
the results of which are shown in Fig. 8.
Recently, a lot of IoT-based applications have emerged in various vertical fields, namely health, transportation, smart
home, smart city, agriculture, education and so forth most of which are based on intelligent learning mechanism for predic-
tion (i.e., regression, classification, and clustering), data mining, and pattern recognition of data analysis in general. Recently,
M. Tavana, V. Hajipour and S. Oveisi / Internet of Things 11 (2020) 100262 13
deep learning (DP) has been employed in IoT applications more than other machine learning approaches. According to an an-
nouncement made at the Gartner/ITxpo 2016 Symposium, DL and IoTwere among the top three strategic technology trends
in 2017. This widespread advertising for DL points out the fact that the traditional machine learning approaches do not meet
the newly identified analytical needs in the field of IoT. In other words, according to the hierarchy of IoT data generation
and management, various modern analytical and artificial intelligence (AI) approaches are what IoT systems demand. The
growing interest in IoT and the big data, which have a reciprocal relationship, demands shareholders who clearly understand
its definition, components, potentials, and challenges. On the one hand, IoT is the major generator of big data, and on the
other hand, IoT services are an essential target for analyzing big data to improve processes. In addition, big IoT data analysis
has proven to be valuable to the community. For example, it was reported that identifying the damage to pipes and fixing
them saved nearly one millionUS$ in the water bills of Miami Park Administration [6]. DL models generally bring about two
important advances relative to traditional machine learning approaches in training and prediction stages. Firstly, they reduce
the need for manual, human-made, and engineered feature sets for use in education. As a result, some features that may
not be apparent for men are easily extractable by DL models. Moreover, DL models improve accuracy. Neural networks and
deep learning methods are generally used in ERP-based IoT systems for the following cases:
• Advanced analytics
Machine learning and deep learning methods allow for handling a large amount of data paving the way for real-time and
accurate data insights. As an example, we refer to AI for analyzing different types of customers’ buying behavior, providing
one with the opportunity to adapt products or services to the needs of a specific audience.
• Warehouse management
There are a large number of demand forecasting models which can be tested accurately using machine learning and deep
learning methods to adapt various kinds of variables such as change in demand, supply chain disruptions as well as new
product introduction.BMW, for example, traces an item from the time it is being manufactured until the moment it’s sold
using learning algorithms while monitoring 31 assembly lines in different countries.
• Forecasting
Machine learning and deep learning methods help find solutions that are capable of processing historical data and pre-
dicting the future. In the business world, these methods help identify seasonal patterns and provide suggestions regarding
the production volume.These forecasting methods provide the business world with more accurate predictions in a more
cost-effective way and thus help avoid overproduction or underproduction by guiding through the decisions regarding the
manufacturing volume.
• Financial management
Machine learning and deep learning methods allow the automation of quarterly and monthly processes and the closure
of operations after the accuracy reports are verified, and the account balances are compared. Invoice data can be categorized
into different accounts using these methods, enabling us to differentiate between a phone purchase and a monthly phone
bill.
• Interdepartmental processes
It is complicated to integrate sales, inventory, and accounting. However, Artificial Intelligence is not afraid of massive
amounts and various types of data, making it the perfect solution for creating a centralized platform.
• Customer service
In the case of field services, these methods provide users with the information regarding performance evaluations and
the qualification of the employees so that the planning is facilitated and the service calls are scheduled.
• Production processes
In case of integration with ERP these methods, help to identify the inefficient processes and offer a solution to reduce
costs. Moreover, these methods help to detect energy-consuming processes and facilitate predictive diagnoses and thus con-
tribute to less waste of resources.
• Human resources
ERP software enabled by AI can be proactive, and this is a big advantage because, for example, it can analyze the appli-
cants’ data based on their qualification parameters such as skills and experience, it can find out which employee needs to
be promoted.
• Sales automation
14 M. Tavana, V. Hajipour and S. Oveisi / Internet of Things 11 (2020) 100262
Learning Method
9
8
FREQUENCY
7
6
5
4
3
2
1
0
LEARNING METHOD
Chatbots powered by AI help not only customers but also conduct the whole sales triangle. Now, bots can cope with
segmentation and provide responses in real-time. After reviewing our database, the methods used in these articles are as
follows (shown in Fig. 9). Accordingly, SVM, CNN, reinforcement learning, and autoencoder were the most commonly used
tools in the articles. Some of these articles are discussed below;
Another framework operating within the IoT ecosystem was presented by Khelifi et al. [55] for a decision-support sys-
tem (DSS). The proposed framework, which has been compared with three machine learning prediction model classifiers,
i.e., Naïve Bayes, Random Forest, and Decision Tree and empirically evaluated using data sets from a commercial network,
demonstrated efficiency with a complete Bayesian network prediction model. Chen and Hao [23] concentrated on feature
dimension reduction of wireless communication signals and took the power amplifier radio frequency (RF) fingerprinting
as an example of the output of their efforts. The researches conducted on the RF fingerprint feature dimension reduction
method focus mainly on reducing the high dimensionality of RF fingerprint features and the uncorrelated or redundant fea-
tures in the features space. In another paper, Tang et al. [114] describe how CNN inference engines can enable deep-learning
tasks on IoT devices. Ateeq et al. [9] employed historical data from machine learning (ML) and proposed a proactive ar-
chitecture for prediction. Their proposed model named adaptive moving window regression (AMWR) was derived from an
adaptive prediction algorithm and was evaluated using a real-world use case (traffic data provided by the city of Madrid)
with an accuracy of over 96%. Adnan Akbar et al. [2] presented a proactive architecture that exploits historical data using
machine learning (ML) for prediction in conjunction with complex event processing. A semi-supervised deep reinforcement
learning model was introduced by Mohammadi et al. [73], which employs Variational Autoencoders (VAE) as the inference
engine to generalize optimal policies. This model can be deployed in applications related to smart cities using labeled and
unlabeled data to facilitate the performance as well as the accuracy of the learning agent.
Tekeste et al. [115] concentrated on developing technologies such as Machin Learning (ML), cloud Computing as well
as IoT in an attempt to develop a more cost-effective system for water quality monitoring replacing the traditional way
of quality monitoring. Xiao et al. [126], on the other hand, concentrated on the IoT system from different perspectives
such as the attack model, security solutions based on different techniques of machine learning such as supervised learning,
unsupervised learning, and reinforcement learning. Samie et al. [95], Mohammadi [73], Khelifi [55], and Al-Garadi et al.
[6] presented infrastructure toolsets that provide elastic provisioning of application components on resource-constrained
and heterogeneous edge devices in large-scale IoT deployments. After reviewing the papers and results, we have discussed
the machine learning and deep learning approaches in more detail. The advantages, disadvantages, and applications and
references to these methods are presented in Tables 5 and 6.
4.1.3.1.Heterogeneity. A big problem with the cloud ERP-IoT paradigm lies in the extensive heterogeneity of available devices,
operating systems, platforms and services, and possibly recently upgraded applications. cloud platform heterogeneity is not
something to be overlooked. Typically, there is an overlap in ownership of objects for cloud services, allowing for proper
merging and customization of resources according to each provider. This problem is exacerbated when users take advantage
of multiple cloud platforms.
Providers should consider target scenarios, analytic requirements, choice of hardware and software environments, a com-
bination of heterogeneous subsystems, development, and delivery of computing infrastructure, and provision of mainte-
Table 5
Machine learning and deep learning methodsin IoT-based ERP.
Application in
IoT-based ERP/
Method Working principle Advantages Disadvantages methods reference
Decision Tree (DT) • The DT-based approach uses DT to create a • It is actually a clear and simple method. • DT needs a lot of storage space because of its • Intrusion
model (i.e., a forecast model) in which the • Data preparation during the pre-processing structural nature. DT-based approaches are easy detection and
training examples are considered as branches and takes less effort in comparison with other to understand only if few DTs are involved. smart grid
leaves which facilitate the learning process. The algorithms. • The structure of the DT is very sensitive to the • Siryani et al.
new sample class is also predicted using the • No normalization is required for the DT. changes in the data. In fact, if the data changes a [106],
previously-learned model. • No scaling of data is required. little, the structure undergoes a huge change • Hasan et al. [43]
• The loss of values in the data has NO causing instability.
considerable effect on creating a decision tree. • In comparison with other algorithms, the
• It is easy to explain this tree to the team and calculations for a DT may become too
the shareholders. In addition, it is an intuitive complicated.
15
(continued on next page)
16
Table 5 (continued)
KNN • The KNN classifies the new sample according to • KNN is a popular and efficient approach to • The optimal value is usually different from one • Attack detection,
the votes of a select number of its closest detect intrusion. dataset to another. Therefore, determining the malware
neighbors. That is, the KNN class identifies • Robust to noisy training data (especially if we optimal value of K can be a challenging and detection//
unknown samples with the majority of votes to use the inverse square of the weighted distance time-consuming process. • Xiao et al. [126]
its nearest neighbors. as the distance). • Needs to specify the value of the k parameter • Alama et al. [4]
• It becomes effective when there is a large (number of nearest neighbors). • Junior et al.
amount of training data. • It is inadequate for distance-based learning [139]
because the type of distance and attribute which
must be used to derive the best results are not
Principal • NB PCA is a process that converts a number of • PCA can lead to dimensional reduction and • In order to have high efficiency, the PCA, which • Yildirim and
Component possibly correlated features into a smaller mitigation of the model complexity. is a technique for feature reduction, needs to be Tatar [131]
Analysis (PCA) number of unrelated features, called core • It’s very efficient. used in conjunction with the machine learning • Deng et al. [29]
17
18
Table 5 (continued)
ANN • ANN stands for an artificial neuron network • Requires less formal statistical restrictions, able • Big computation burden tends to overfit. • Huang et al. [48]
(ANN) whose underlying bais includes the to model complex nonlinear relationships, able to • Alama et al. [4]
structure and functions of biological neural train multiple algorithms. • Hasan et al. [43]
networks. This computational model is affected
by the information flow through the network
since the changes in a neural network depends on
that input or output.
• Where there are complicated relationships
between inputs and outputs or when patterns are
established, ANNscan is used as nonlinear
statistical data modeling tools.
Regression • Regression is used to estimate the relationships • Linear • Linear • Ateeq et al. [9]
between a dependent variable and one or more • All specifics summarized in one matrix • Doesn’t tell us about a particular parameter •Tekeste et al.
independent variables. • Logistic regression • Mixes up internal and external parameter [115]
• Makes no assumptions about distributions of • More unknowns than the true degree of •Chauhan et al.
classes in feature space freedom [22]
• Easily extended to multiple classes • Logistic regression •Hasan et al. [43]
• Natural probabilistic view of class predictions • Linear decision boundary
• Quick to train
• Resistant to overfitting
Table 6
Potential DL methods for IoT systems.
Application in IoT
based ERP/
Methods Working principle Advantages Disadvantages methods reference
Convolutional • CNNs are mainly used to reduce the data • CNNs are robust, supervised DL methods that • CNNs have high computational cost. Therefore, • Khelifi et al. [55].
19
20
Table 6 (continued)
nance services for each service or application. On the other hand, thanks to the presentation paradigms of cloud services,
it is hoped that the IoT paradigm will easily end up in IoT service provision, although the implementation requires solving
the big problem of heterogeneity. For example, it is necessary to appropriately combine (and manage) a large number of
highly heterogeneous objects (and their correspondingly generated data) across different levels of the cloud platform. This
problem encompasses a variety of dimensions, and its solutions are under consideration based on integrated platforms and
middleware, interactive programming interfaces, duplication tools in the presence of data variety, and so forth [5].
4.1.3.2. Functionality. In this section, we focus on the challenges related to Functionality discussed in the reviewed articles:
a) Performance
Most cases of cloud ERP-IoT paradigm applications provide specific functionality and quality of service (QoS) require-
ments (for example, communication and computing and storage aspects) and, in some scenarios, meet requirements that
are not easily accessible. Specifically, achieving stable and acceptable network performance for the cloud paradigm is a ma-
jor problem as the increasing bandwidth does not lead to an evolution in storage and computing since timeliness is greatly
influenced by unpredictable problems, real-time applications are essentially vulnerable to performance bottlenecks.
b) Latency (Delay)
The term latency, also known as turnaround time, in the context of mobile cloud computing, means the time when the
computation is offloaded, and the results are received from the nearby infrastructure or cloud.
c) Energy efficiency
Energy efficiency refers to a way through which the growth of energy consumption can be managed and prevented. By
delivering more services for the same energy input or for the same services for less energy input, maybe something more
energy efficient.
d) Resource limitations
Since the IoT architecture is resource-constrained, it has been difficult to define a robust security mechanism for it, and
thus in order to work within such constraints, the algorithms have to be limited. For a successful implementation of IoT
security and communication protocols, the storage and energy requirements need to be managed with each broadcast or
multicast necessary for keys or certificates exchange. This means that these protocols should be lightweight and energy-
efficient despite the complicated computations and improved energy harvesting techniques.
e) Cost-effectiveness
A major challenge for the SIoT application is to provide an efficient and profitable service development for energy and
computing costs. A major challenge for the SIoT application is to provide an efficient and profitable service development for
energy and computing costs. Multiple processes can run simultaneously, which may change as per variation in applications
and user requirements.
f) Reliability
In the field of intelligent transportation, cars are usually on the move most of the time, and vehicle networking and
communications are often disrupted or unreliable. When using applications in limited-resource environments, there are a
few problems with a crash or lack of sustained availability of the device. On the other hand, cloud capabilities help overcome
some of these problems; for instance, cloud technology improves the reliability of devices by making it possible to reduce
the burden of heavy tasks and thereby increase battery life or enable modular architecture; alternatively, the technology
itself has uncertainties regarding data center virtualization or resource depletion.
4.1.3.2. Large scale. New applications can be designed using the cloud ERP-IoT paradigm to integrate and analyze the infor-
mation received from (embedded) real-world tools. Some of the presented scenarios implicitly require interaction with a
large number of these tools, which are usually scattered across large environments. The large scale of the mentioned sys-
tems makes it more difficult to solve common problems (for example, when dealing with long-life data that are collected
at high speeds, the requirements of storage capacity and computing capability will be increasingly difficult to meet). In
addition, the distribution of IoT tools complicates monitoring tasks due to dynamic time lag and connectivity issues.
4.1.3.3. Big data. Special attention must be paid to the transfer, storage, and access and processing of the enormous amount
of data that will be generated given 50 billion devices estimated to be connected to the network by 2020. Thanks to re-
cent advances in technology, IoT will be a major source of big data, and our cloud system enables us to store and analyze
complex data for long periods and perform complex analytics on them. The ubiquity of mobile devices and sensors in-
evitably requires scalable computing platforms. Convenient handling of this volume of data is a sensitive issue since the
22 M. Tavana, V. Hajipour and S. Oveisi / Internet of Things 11 (2020) 100262
overall performance of applications depends heavily on the features of data management services. For instance, cloud-based
approaches to summarizing big data based on extracting semantic features are under investigation. Hence, following the
NoSQL movement, both proprietary and open-source solutions use alternative database technologies for big data, which in-
cludes: time series, key-value, key-value repositories, large column repositories, and graph databases. Unfortunately, there is
no excellent data management solution for the cloud system to handle big data. Moreover, data integrity is considered an
important factor not only because of its impact on service quality but due to the security and privacy dimensions that are
particularly relevant to outsourced data.
4.1.3.4. Sensor network. Sensor networks have been defined as the major enablers of IoT and one of the five technologies that
are shaping our world, giving us the ability to measure, understand and perceive environmental signals; recent advances in
technology have allowed for efficient, inexpensive, and low-cost small tools to be used for remote sensing applications on a
large scale. Furthermore, despite their limitations in battery consumption and reliability, smartphones have multiple sensors
(GPS, accelerator, digital compass, microphone, and camera) that support a wide range of mobile applications in various
areas of IoT. In this context, the timely processing of massively transmitted sensor data, which are vulnerable to power
and network constraints, is a newly introduced problem. The cloud system offers new opportunities to collect sensor data
and use them for widespread coverage and relevance, but at the same time overshadows the privacy and security aspects.
In addition, although IoT devices are not mobile, which is considered a common dimension, the sensitivity of sensors in
smartphones and wearable electronics devices is still a problem.
4.1.3.5. Monitoring. It has been widely documented in resources that surveillance is an essential activity in cloud environ-
ments for capacity planning, resource management, service level agreements, performance, and security as well as trou-
bleshooting. As a result, the cloud ERP-IoT paradigm has the same regulatory requirements as the cloud system; however,
the problems associated with this paradigm are also sensitive to the properties of the volume, variety, and speed of IoT.
4.1.3.6. Fog computing. Fog computing is part of the classic cloud computing operating on the periphery of the network. It
is a system designed to support IoT applications with features such as time delay constraints and requirements concerning
mobility and geographic distribution. Although computing, storage, and networking of resources are both cloud and fog sys-
tems, the latter has certain features as follows: being on the edge of the network and aware of the time-delayed geographic
location; geographic distribution and a large number of nodes compared to concentrated cloud system; support for object
mobility (via wireless communication) and real-time interaction (rather than batch processing); support for interaction. It is
difficult to design cloud computing projects in multiple forms. Certainly, adopting cloud-based approaches requires a variety
of specific algorithms and methodologies that examine the reliability of smart device networks and operate under specific
conditions demanding error-resolving methods.
4.1.3.7. Security. This section discusses the security challenges discussed in the articles [92,96].
• Security and trust management
When it comes to the widespread adaptation of technology, security is always a critical issue. It is essential to estab-
lish a trust to strengthen communication among two or more IoT devices. Efficient authentication and trust management
tasks in different SIoT application scenarios need to be ensured through flexible and strong security protocols within OS,
each of which may require a specific kind of encryption algorithm. However, for implementing these algorithms, they need
to be computationally less intensive; they need to operate in real-time to prevent performance degradation, and finally,
they should take into account the memory and latency requirements. Correspondingly, the memory handling can also raise
security concerns.
• Privacy
Data privacy is of great significance since it poses a major challenge preventing consumers from adopting cloud comput-
ing. The consumers’ trust must be established to meet this challenge, and this can be achieved when the application models
cover application development with privacy protection and implicit authentication mechanisms [69].
4.1.3.8. Complex environment. A complicated IoT ecosystem is made of various elements such as software programs, hard-
ware devices, different connected objects, and, most importantly, a large number of end-users. Some practical applications
are built based on this ecosystem, demonstrating its influence. However, real-time IoT applications mostly demand a large
amount of data, which requires storage and processing resources to extract intelligent information, and this is almost an
uncharted territory in the existing IoT literature.
4.1.3.9. Real-time processing. Since a considerable number of requests from various types of smart applications along with
fast responses are managed in the IoT ecosystem simultaneously, compared with the cloud-based applications, IoT appli-
cations impose multiple requirements regarding the resources for real-time and online processing. This turns the spotlight
on the resource management of such a complicated ecosystem and highlights the critical issue of multiple orders which
demands brand new solutions.
M. Tavana, V. Hajipour and S. Oveisi / Internet of Things 11 (2020) 100262 23
4.1.4.1. Open issues. This section focuses on the open issues discussed in the articles:
a) Standardization
The lack of standards has been considered by many researchers as a major issue in cloud IoT. Most objects are now
connected to the cloud via web-based interfaces, which have the potential to reduce complexity in the development of such
applications. Similarly, both clouds and objects are implemented using non-standard heterogeneous interfaces. Although the
scientific community has contributed to the deployment and standardization of IoT and cloud phenomena, the need for stan-
dard protocols, architectures, and API software interfaces is evident to facilitate the interconnection between heterogeneous
smart objects and the creation of advanced services realizing the phenomenon of cloud IoT.
b) Big data
cloud IoT involves managing and processing large amounts of data and events from different situations and heterogeneous
source types so that most applications require complex real-time operations. On the other hand, this means proper syn-
chronization of events from remote sources, reconstructing and correlating their semantics for meaningful deduction of the
status of a particular application. Alternatively, this signifies processing a lot of multimedia data in real-time for the timely
extraction of the information needed to set up affiliate services and assist the user in their current state.
Security and privacy are considered both as a research challenge attracting a lot of attention and an open issue that still
needs further work. Although many users are now worried about privacy and security in cloud-based applications, such
concerns are all the more important as cloudIoTimports real-world data into the cloud and trigger real-world actions. With
respect to privacy, providing the right roles with appropriate design and security is still a challenge, while clearly ensuring
that only authorized people have access to sensitive data, especially when data integrity must be guaranteed in response to
permitted changes.
With regard to security, it remains challenging to deal with various hacker threats since malicious software can be in-
jected into physical sensors to provide manipulated data; raw or processed data can be stolen or tampered with on cloud;
compromised gateways can violate cloud IoT system security; communication channels are vulnerable to leakage of side-
channel information.
d) Intelligence
Focusing on real-time data coming from inhomogeneous objects enhances increased decision-making abilities using in-
formation combination and selection mechanisms. Although there have been researching efforts in this area, maximizing
intelligence in this field is still an obvious challenge.
e) Integration methodology
As long as cloud IoT solutions are built around specific applications, little effort has been devoted to developing a com-
mon methodology for the integration of cloud systems and IoT. Because the suite of applications has defined requirements,
standard multi-tasking can be described. Moreover, a flexible, public platform can be a starting point for easier implemen-
tation of such tasks.
f) Network communications
cloud IoT includes several heterogeneous network technologies where many applications require continuous data transfer,
and overall bandwidth consumption is dramatically increased. On the one hand, the efficiency of access management for en-
abling continuity and optimizing bandwidth utilization is still an open issue. Alternatively, the current bandwidth constraint
cannot support this increasing trend, and further research work is needed to refine large-scale allocation methods.
g) Storage
Storage solutions have been discussed in several articles. For instance, we have already considered them as an outcome
for the integration of cloud and IoT. Nevertheless, articles continue to address this issue as an open one because current
solutions may not provide the support needed for future applications. While data must receive time labels to enable server-
side reconstruction and processing, the transfers need proper scheduling to avoid over-networking and load processing. A
likely orientation to address such a topic involves the introduction of prophetic storage and concealment.
24 M. Tavana, V. Hajipour and S. Oveisi / Internet of Things 11 (2020) 100262
The organizations’ awareness of the changes in ERP plays a significant role in customer satisfaction. Intelligent devices
that provide organizations with online data about their product, their quality, their transportation, etc. can have a drastic
influence on not only the customer services but also on better management of the whole organization. However, cloud ERP
integrated with IoT is a modern area promising more fulfilling management as well as customer services.
In this article, because of the impact of IoT on cloud ERP quality, our primary focus was on identifying important IoT
features by analyzing articles from recent scholarly and academic journals. We presented a history of ERP and IoT, along
with cloud ERP and IoT technologies and platforms. We further discussed the integrated ERP and IoT and analyzed recently
published research in IoT. We presented a taxonomy of IoT systems and architecture with applications of IoT in ERP systems.
Finally, we presented the challenge related to cloud ERR and IoT and presented future research directions in the integrated
ERP and IoT research.
Further research efforts are expected in several directions to realize the full potential of the cloud IoT [35,41,95]:
• Proper identification, naming, and addressing of objects to support a large number of objects as well as real-time mo-
bility. While IPv6 may be a viable solution, large scale adoption of it, is still an ongoing process. Further research is
needed in specific scenarios to accelerate this slow process (such as access networks) and in dealing with new drivers
and scalable requirements.
• Solutions for detecting environmental changes based on IoT data will enable the delivery of advanced content-based
services. Such an opportunity leads to research on more effective ways to deliver personalized content and advertising.
• Large-scale support is necessary for multi-network scalers (such as multi-homing, multi-path, multi-cost), connection
delivery, and roaming to improve network reliability and ensure continuous connectivity, QoS, redundancy, and error
tolerance. Software-based network solutions are also expected.
• Many cloud-based IoT applications can utilize efficient and flexible mechanisms to create logical discrete network par-
titions without the need for globally distributed network infrastructures, which could be another important driver for
research into network virtualization and software-centric networks.
• Convergence towards a common open-service infrastructure environment provides APLs with the third-party deployment
of cloud-based applications. This convergence will provide new business opportunities and result in research efforts to
define standard protocols, libraries, languages , and methodologies for the cloud computing Internet.
None.
Acknowledgements
The authors would like to thank the anonymous reviewers and the editor for their insightful comments and suggestions.
Dr. Madjid Tavana is grateful for the partial support he received from the Czech Science Foundation (GAˇCR19-13946S) for
this research, and Dr. Vahid Hajipour would like to acknowledge the support he received from the Research Center at FANAP
Co.
References
[1] B. Afzal, M. Umair, G.A. Shah, E. Ahmed, Enabling IoT platforms for social IoT applications: vision, feature mapping, and challenges, Fut. Gener.
Comput. Syst. 92 (2019) 718–731.
[2] A. Akbar, A. Khan, F. Carrez, K. Moessner, Predictive analytics for complex IoT data streams, IEEE Internet Things J. 4 (5) (2017) 1571–1582.
[3] D. Alahakoon, X. Yu, Smart electricity meter data intelligence for future energy systems: a survey, IEEE Trans. Ind. Inform. 12 (1) (2015) 425–436.
[4] F. Alam, R. Mehmood, I. Katib, A. Albeshri, Analysis of eight data mining algorithms for smarter Internet of Things (IoT), Procedia Comput. Sci. 98
(2016) 437–442.
[5] F. Alam, R. Mehmood, I. Katib, N.N. Albogami, A. Albeshri, Data fusion and IoT for smart ubiquitous environments: a survey, IEEE Access 5 (2017)
9533–9554.
[6] M.A. Al-Garadi, A. Mohamed, A. Al-Ali, X. Du, M. Guizani, A survey of machine and deep learning methods for internet of things (IoT) security, 2018.
arXiv preprint arXiv:1807.11023.
[7] S. Amendola, R. Lodato, S. Manzari, C. Occhiuzzi, G. Marrocco, RFID technology for IoT-based personal healthcare in smart spaces, IEEE Internet Things
J. 1 (2) (2014) 144–152.
[8] D. Andročec, R. Picek, M. Mijač, The ontologically based model for the integration of the IoT and cloud ERP services, 8th International Conference on
Cloud Computing and Services Science (CLOSER 2018), 2018.
[9] M. Ateeq, F. Ishmanov, M.K. Afzal, M. Naeem, Multi-parametric analysis of reliability and energy consumption in IoT: a deep learning approach,
Sensors 19 (2) (2019) 309.
[10] D.M. Bahssas, A.M. AlBar, M.R. Hoque, Enterprise resource planning (ERP) systems: design, trends and deployment, Int. Technol. Manag. Rev. 5 (2)
(2015) 72–81.
[11] S.B. Baker, W. Xiang, I. Atkinson, Internet of things for smart healthcare: technologies, challenges, and opportunities, IEEE Access 5 (2017)
26521–26544.
[12] S. Balampanis, S. Sotiriadis, E.G. Petrakis, Internet of things architecture for enhanced living environments, IEEE Cloud Comput. 3 (6) (2016) 28–34.
[13] M. Barcelo, A. Correa, J. Llorca, A.M. Tulino, J.L. Vicario, A. Morell, IoT-cloud service optimization in next generation smart environments, IEEE J. Sel.
Areas Commun. 34 (12) (2016) 4077–4090.
[14] E. Bertino, K.K.R. Choo, D. Georgakopolous, S. Nepal, Internet of things (IoT): smart and secure service delivery, ACM Trans. Internet Technol. 16 (4)
(2016) 22.
M. Tavana, V. Hajipour and S. Oveisi / Internet of Things 11 (2020) 100262 25
[15] P. Brous, M. Janssen, P. Herder, The dual effects of the Internet of Things (IoT): a systematic review of the benefits and risks of IoT adoption by
organizations, Int. J. Inf. Manag. (2019).
[16] F. Bu, X. Wang, A smart agriculture IoT system based on deep reinforcement learning, Fut. Gener. Comput. Syst. 99 (2019) 500–507.
[17] L. Bu, M. Isakov, M.A. Kinsy, A secure and robust scheme for sharing confidential information in IoT systems, Ad Hoc Netw. 92 (2019) 101762.
[18] H. Cai, B. Xu, L. Jiang, A.V. Vasilakos, IoT-based big data storage systems in cloud computing: perspectives and challenges, IEEE Internet Things J. 4
(1) (2016) 75–87.
[19] F. Caro, R. Sadr, The Internet of Things (IoT) in retail: bridging supply and demand, Bus Horiz 62 (1) (2019) 47–54.
[20] Z.B. Celik, E. Fernandes, E. Pauley, G. Tan, P. McDaniel, Program analysis of commodity IoT applications for security and privacy: challenges and
opportunities, 2018. arXiv preprint arXiv:1809.06962.
[21] U. Chatterjee, R.S. Chakraborty, D. Mukhopadhyay, A PUF-based secure communication protocol for IoT, ACM Trans. Embedd. Comput. Syst. 16 (3)
(2017) 67.
[22] J. Chauhan, J. Rajasegaran, S. Seneviratne, A. Misra, A. Seneviratne, Y. Lee, Performance characterization of deep learning models for breathing-based
authentication on resource-constrained devices, in: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2, 2018,
p. 158.
[23] X. Chen, X. Hao, Feature reduction method for cognition and classification of iot devices based on artificial intelligence, IEEE Access 7 (2019)
103291–103298.
[24] C. Choi, J. Choi, Ontology-based security context reasoning for power IoT-cloud security service, IEEE Access 7 (2019) 110510–110517.
[25] A. Chowdhury, S.A. Raut, H.S. Narman, DA-DRLS: drift adaptive deep reinforcement learning based scheduling for IoT resource management, J. Netw.
Comput. Appl. 138 (2019) 51–65.
[26] L. Cui, S. Yang, F. Chen, Z. Ming, N. Lu, J. Qin, A survey on application of machine learning for Internet of Things, Int. J. Mach. Learn. Cybern. 9 (8)
(2018) 1399–1417.
[27] D. Snellman, Difference in Cloud ERP Systems – A comparison, Degree Project In Information and Communication Technology, 2017 Second Cycle, 30
Credits Stockholm, Sweden.
[28] S.N. Dawe, D. Paradice, A Systems Approach to Smart City Infrastructure: A Small City Perspective, 2016, p. 11. Dublin, Ireland.
[29] L. Deng, D. Li, X. Yao, D. Cox, H. Wang, Mobile network intrusion detection for IoT system based on transfer learning algorithm, Cluster Comput.
(2018) 1–16.
[30] M.A.A. Elmonem, E.S. Nasr, M.H. Geith, Benefits and challenges of cloud ERP systems–a systematic literature review, Fut. Comput. Inform. J. 1 (1–2)
(2016) 1–9.
[31] P.E. Naeini, M. Degeling, L. Bauer, R. Chow, L.F. Cranor, M.R. Haghighat, H. Patterson, The Influence of friends and experts on privacy decision making
in IoT scenarios, in: Proceedings of the ACM on Human-Computer Interaction, 2, 2018, p. 48.
[32] S. Fang, L. Da Xu, Y. Zhu, J. Ahati, H. Pei, J. Yan, Z. Liu, An integrated system for regional environmental monitoring and management based on
internet of things, IEEE Trans. Ind. Inform. 10 (2) (2014) 1596–1605.
[33] M. Felemban, E. Felemban, J. Kobes, A. Ghafoor, Threat management in data-centric IoT-based collaborative systems, ACM Trans. Internet Technol. 19
(3) (2019) 42.
[34] T.M. Fernández-Caramés, P. Fraga-Lamas, A review on the use of blockchain for the Internet of Things, IEEE Access 6 (2018) 32979–33001.
[35] M. Frustaci, P. Pace, G. Aloi, G. Fortino, Evaluating critical security issues of the IoT world: present and future challenges, IEEE Internet Things J. 5 (4)
(2017) 2483–2495.
[36] D. Georgakopoulos, P.P. Jayaraman, M. Fazia, M. Villari, R. Ranjan, Internet of Things and edge cloud computing roadmap for manufacturing, IEEE
Cloud Comput. (4) (2016) 66–73.
[37] A. Gharaibeh, A. Khreishah, M. Mohammadi, A. Al-Fuqaha, I. Khalil, A. Rayes, Online auction of cloud resources in support of the Internet of Things,
IEEE Internet Things J. 4 (5) (2017) 1583–1596.
[38] S.K. Gogineni, T. Riedelsheimer, R. Stark, Systematic product development methodology for customizable IoT devices, Procedia CIRP 84 (2019)
393–399.
[39] L. Gonzalez-Manzano, J.M.D. Fuentes, A. Ribagorda, Leveraging user-related internet of things for continuous authentication: a survey, ACM Comput.
Surv. (CSUR) 52 (3) (2019) 1–38.
[40] Z. Guan, J. Li, L. Wu, Y. Zhang, J. Wu, X. Du, Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid, IEEE
Internet Things J. 4 (6) (2017) 1934–1944.
[41] J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, Internet of Things (IoT): a vision, architectural elements, and future directions, Fut. Gener. Comput.
Syst. 29 (7) (2013) 1645–1660.
[42] S. Ham, J. Lee, K. Lee, Quicktalk: an association-free communication method for IoT devices in proximity, in: Proceedings of the ACM on Interactive,
Mobile, Wearable and Ubiquitous Technologies, 1, 2017, p. 56.
[43] M. Hasan, M.M. Islam, M.I.I. Zarif, M.M.A. Hashem, Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches,
Internet Things 7 (2019) 10 0 059.
[44] M.U. Hassan, M.H. Rehmani, J. Chen, Privacy preservation in blockchain based IoT systems: integration issues, prospects, challenges, and future re-
search directions, Fut. Gener. Comput. Syst. 97 (2019) 512–529.
[45] M.S. Hossain, M. Rahman, M.T. Sarker, M.E. Haque, A. Jahid, A smart IoT based system for monitoring and controlling the sub-station equipment,
Internet Things 7 (2019) 10 0 085.
[46] C. Hu, W. Bao, D. Wang, Y. Qian, M. Zheng, S. Wang, sTube+: an IoT communication sharing architecture for smart after-sales maintenance in
buildings, ACM Trans. Sensor Netw. 14 (3–4) (2018) 29.
[47] J. Huang, L. Kong, G. Chen, M.Y. Wu, X. Liu, P. Zeng, Towards secure industrial IoT: blockchain system with credit-based consensus mechanism, IEEE
Trans. Ind. Inform. (2019).
[48] X. Huang, S.H. Hong, Y. Li, Hour-ahead price based energy management scheme for industrial facilities, IEEE Trans. Ind. Inform. 13 (6) (2017)
2886–2898.
[49] M.M. Islam, N. Funabiki, R.W. Sudibyo, K.I. Munene, W.C. Kao, A dynamic access-point transmission power minimization method using PI feedback
control in elastic WLAN system for IoT applications, Internet Things 8 (2019) 10 0 089.
[50] W.A. Jabbar, H.K. Shang, S.N. Hamid, A.A. Almohammedi, R.M. Ramli, M.A. Ali, IoT-BBMS: Internet of Things-based baby monitoring system for smart
cradle, IEEE Access 7 (2019) 93791–93805.
[51] C.M.D. Junior, S.P. da Silva, R.V. da Nóbrega, A.C. Barros, A.K. Sangaiah, P.P. Rebouças Filho, V.H.C. de Albuquerque, A new approach for mobile robot
localization based on an online IoT system, Fut. Gener. Comput. Syst. 100 (2019) 859–881.
[52] A. Kamilaris, A. Pitsillides, Mobile phone computing and the internet of things: a survey, IEEE Internet Things J. 3 (6) (2016) 885–898.
[53] D. Karimanzira, T. Rauschenbach, Enhancing aquaponics management with Iot-based predictive analytics for efficient information utilization, Inf.
Process. Agric. (2019).
[54] M.A. Khan, K. Salah, IoT security: review, blockchain solutions, and open challenges, Fut. Gener. Comput. Syst. 82 (2018) 395–411.
[55] H. Khelifi, S. Luo, B. Nour, A. Sellami, H. Moungla, S.H. Ahmed, M. Guizani, Bringing deep learning at the edge of information-centric Internet of
Things, IEEE Commun. Lett. 23 (1) (2018) 52–55.
[56] I.Y. Ko, H.G. Ko, A.J. Molina, J.H. Kwon, SoIoT: toward a user-centric IoT-based service framework, ACM Trans. Internet Technol. 16 (2) (2016) 8.
[57] C. Kolias, G. Kambourakis, A. Stavrou, J. Voas, DDoS in the IoT: mirai and other botnets, Computer (Long Beach Calif) 50 (7) (2017) 80–84.
[58] A. Konstantinidis, P. Irakleous, Z. Georgiou, D. Zeinalipour-Yazti, P.K. Chrysanthis, IoT data prefetching in indoor navigation SOAs, ACM Trans. Internet
Technol. 19 (1) (2018) 10.
26 M. Tavana, V. Hajipour and S. Oveisi / Internet of Things 11 (2020) 100262
[59] T. Kumrai, K. Ota, M. Dong, J. Kishigami, D.K. Sung, Multiobjective optimization in cloud brokering systems for connected Internet of Things, IEEE
Internet Things J. 4 (2) (2016) 404–413.
[60] G. Laput, C. Harrison, Exploring the efficacy of sparse, general-purpose sensor constellations for wide-area activity sensing, in: Proceedings of the
ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 3, 2019, p. 55.
[61] S.Y. Lee, S.R. Wi, E. Seo, J.K. Jung, T.M. Chung, ProFiOt: abnormal behavior profiling (ABP) of IoT devices based on a machine learning approach, in:
2017 27th International Telecommunication Networks and Applications Conference (ITNAC), IEEE, 2017, pp. 1–6.
[62] A. Lenart, in: ERP in the Cloud–Benefits and Challenges. In Euro Symposium on Systems Analysis and Design, Springer, Berlin, Heidelberg, 2011,
pp. 39–50.
[63] H. Li, M. Dong, K. Ota, Radio access network virtualization for the social Internet of Things, IEEE Cloud Comput. 2 (6) (2015) 42–50.
[64] H. Li, K. Ota, M. Dong, Learning IoT in edge: deep learning for the Internet of Things with edge computing, IEEE Netw. 32 (1) (2018) 96–101.
[65] J. Li, M. Siddula, X. Cheng, W. Cheng, Z. Tian, Y. Li, Approximate data aggregation in sensor equipped IoT networks, Tsinghua Sci. Technol. 25 (1)
(2019) 44–55.
[66] W. Liu, L. Zhang, Z. Zhang, C. Gu, C. Wang, M. O’neill, F. Lombardi, XOR-based low-cost Reconfigurable PUFs for IoT Security, ACM Trans. Embedd.
Comput. Syst. 18 (3) (2019) 25.
[67] P. Lv, L. Wang, H. Zhu, W. Deng, L. Gu, An IoT-oriented privacy-preserving publish/subscribe model over blockchains, IEEE Access 7 (2019)
41309–41314.
[68] B. Mahmud, Internet of Things (IoT) for manufacturing logistics on SAP ERP applications, J. Telecommun. Electron. Comput. Eng. 9 (2–6) (2017) 43–47.
[69] M. Marjani, F. Nasaruddin, A. Gani, A. Karim, I.A.T. Hashem, A. Siddiqa, I. Yaqoob, Big IoT data analytics: architecture, opportunities, and open research
challenges, IEEE Access 5 (2017) 5247–5261.
[70] Mary Sumner, Pearson New International Edition, British Library Cataloguing-in-Publication Data, 2014.
[71] M. Meddeb, A. Dhraief, A. Belghith, T. Monteil, K. Drira, H. Mathkour, Least fresh first cache replacement policy for NDN-based IoT networks, Pervas.
Mob. Comput. 52 (2019) 60–70.
[72] F. Metzger, T. Hoßfeld, A. Bauer, S. Kounev, P.E. Heegaard, Modeling of aggregated IoT traffic and its application to an IoT cloud, Proc. IEEE 107 (4)
(2019) 679–694.
[73] M. Mohammadi, A. Al-Fuqaha, S. Sorour, M. Guizani, Deep learning for IoT big data and streaming analytics: a survey, IEEE Commun. Surv. Tut. 20
(4) (2018) 2923–2960.
[74] S. Moin, A. Karim, Z. Safdar, K. Safdar, E. Ahmed, M. Imran, Securing IoTs in distributed blockchain: analysis, requirements and open issues, Fut.
Gener. Comput. Syst. 100 (2019) 325–343.
[75] E. Monk, B. Wagner, Concepts in enterprise resource planning, Cengage Learn. (2012).
[76] S.R. Moosavi, T.N. Gia, A.M. Rahmani, E. Nigussie, S. Virtanen, J. Isoaho, H. Tenhunen, SEA: a secure and efficient authentication and authorization
architecture for IoT-based healthcare using smart gateways, Procedia Comput. Sci. 52 (2015) 452–459.
[77] J. Muñuzuri, L. Onieva, P. Cortés, J. Guadix, Using IoT data and applications to improve port-based intermodal supply chains, Comput. Ind. Eng. (2019).
[78] F. Nawaz, N.K. Janjua, O.K. Hussain, PERCEPTUS: predictive complex Event Processing and reasoning For IoT-enabled supply Chain, Knowl.-Based Syst.
(2019).
[79] O. Novo, Blockchain meets IoT: an architecture for scalable access management in IoT, IEEE Internet Things J. 5 (2) (2018) 1184–1195.
[80] O. Novo, Making constrained things reachable: a secure IP-agnostic NAT traversal approach for IoT, ACM Trans. Internet Technol. 19 (1) (2019) 3.
[81] N.U. Okafor, D. Delaney, Considerations for system design in IoT-based autonomous ecological sensing, Procedia Comput. Sci. 155 (2019) 258–267.
[82] T. Omitola, G. Wills, Towards mapping the security challenges of the Internet of Things (IoT) supply chain, Procedia Comput. Sci. 126 (2018) 441–450.
[83] C. Pan, M. Xie, S. Han, Z.H. Mao, J. Hu, Modeling and optimization for self-powered non-volatile IoT edge devices with ultra-low harvesting power,
ACM Trans. Cyber-Phys. Syst. 3 (3) (2019) 32.
[84] J. Pawlick, Q. Zhu, Strategic trust in cloud-enabled cyber-physical systems with an application to glucose control, IEEE Trans. Inf. Forensics Secur. 12
(12) (2017) 2906–2919.
[85] M.A.L. Peña, I.M. Fernández, SAT-IoT: an architectural model for a high-performance fog/edge/cloud IoT platform, in: 2019 IEEE 5th World Forum on
Internet of Things (WF-IoT), IEEE, 2019, pp. 633–638.
[86] C. Perera, C. Liu, R. Ranjan, L. Wang, A.Y. Zomaya, Privacy-knowledge modeling for the internet of things: A look back, Computer 49 (12) (2016)
60–68.
[87] M. Pourvahab, G. Ekbatanifard, An efficient forensics architecture in software-defined networking-IoT using blockchain technology, IEEE Access 7
(2019) 99573–99588.
[88] R.H. Randhawa, A. Hameed, A.N. Mian, Energy efficient cross-layer approach for object security of CoAP for IoT devices, Ad Hoc Netw. 92 (2019)
101761.
[89] M.A. Rashid, L. Hossain, J.D. Patrick, The evolution of ERP systems: a historical perspective, in: Enterprise Resource Planning: Solutions and Manage-
ment, IGI Global, 2002, pp. 35–50.
[90] G. Rathee, A. Sharma, R. Kumar, R. Iqbal, A secure communicating things network framework for industrial IoT using blockchain technology, Ad Hoc
Netw. (2019) 101933.
[91] M.M. Rathore, A. Paul, A. Ahmad, M. Anisetti, G. Jeon, Hadoop-based intelligent care system (hics): analytical approach for big data in iot, ACM Trans.
Internet Technol. 18 (1) (2017) 8.
[92] F. Restuccia, S. D’Oro, T. Melodia, Securing the internet of things in the age of machine learning and software-defined networking, IEEE Internet
Things J. 5 (6) (2018) 4829–4842.
[93] O. Rholam, M. Tabaa, Smart device for multi-band industrial IoT communications, Procedia Comput. Sci. 155 (2019) 660–665.
[94] T. Saheb, L. Izadi, Paradigm of IoT Big Data Analytics in Healthcare Industry: A Review of Scientific literature and Mapping of Research Trends,
Telematics and Informatics, 2019.
[95] F. Samie, L. Bauer, J. Henkel, From cloud down to things: an overview of machine learning in Internet of Things, IEEE Internet Things J. (2019).
[96] F.K. Santoso, N.C. Vun, 2015 International Symposium on Consumer Electronics (ISCE), IEEE (2015) 1–2.
[97] N. Saxena, S. Grijalva, N.S. Chaudhari, Authentication protocol for an IoT-enabled LTE network, ACM Trans. Internet Technol. 16 (4) (2016) 25.
[98] K. Sha, T.A. Yang, W. Wei, S. Davari, A survey of edge computing based designs for security, Digit. Commun. Netw. (2019).
[99] S.K. Sharma, X. Wang, Live data analytics with collaborative edge and cloud processing in wireless IoT networks, IEEE Access 5 (2017) 4621–4635.
[100] S. Shen, L. Huang, H. Zhou, S. Yu, E. Fan, Q. Cao, Multistage signaling game-based optimal detection strategies for suppressing malware diffusion in
fog-cloud-based IoT networks, IEEE Internet Things J. 5 (2) (2018) 1043–1054.
[101] S. Shevtsov, D. Weyns, M. Maggio, SimCA∗ : a control-theoretic approach to handle uncertainty in self-adaptive systems with guarantees, ACM Trans.
Autonom. Adapt. Syst. 13 (4) (2019) 17.
[102] C.S. Shih, J.J. Chou, N. Reijers, T.W. Kuo, Designing CPS/IoT applications for smart buildings and cities, IET Cyber-Phys. Syst. 1 (1) (2016) 3–12.
[103] S. Siboni, A. Shabtai, N.O. Tippenhauer, J. Lee, Y. Elovici, Advanced security testbed framework for wearable IoT devices, ACM Trans. Internet Technol.
16 (4) (2016) 26.
[104] F. Siddiqui, J. Beley, S. Zeadally, G. Braught, Secure and lightweight communication in heterogeneous IoT environments, Internet Things (2019) 10 0 093.
[105] G. Siegemund, V. Turau, A self-stabilizing publish/subscribe middleware for iot applications, ACM Trans. Cyber-Phys. Syst. 2 (2) (2018) 12.
[106] J. Siryani, B. Tanju, T.J. Eveleigh, A machine learning decision-support system improves the internet of things’ smart meter operations, IEEE Internet
Things J. 4 (4) (2017) 1056–1066.
[107] S. Soliman, M.A. Jaela, A.M. Abotaleb, Y. Hassan, M.A. Abdelghany, A. Abdel-Hamid, H. T&Mostafa, FPGA implementation of dynamically reconfigurable
IoT security module using algorithm hopping, Integration (2019).
M. Tavana, V. Hajipour and S. Oveisi / Internet of Things 11 (2020) 100262 27
[108] C. Stergiou, K.E. Psannis, B.G. Kim, B. Gupta, Secure integration of IoT and cloud computing, Fut. Gener. Comput. Syst. 78 (2018) 964–975.
[109] M. Strohbach, H. Ziekow, V. Gazis, N. Akiva, Towards a big data analytics framework for IoT and smart city applications, in: Modeling and Processing
for Next-Generation Big-Data Technologies, Cham, Springer, 2015, pp. 257–282.
[110] A.F. Subahi, Edge-based IoT medical record system: requirements, recommendations and conceptual design, IEEE Access 7 (2019) 94150–94159.
[111] M. Sun, Z. Zhou, J. Wang, C. Du, W. Gaaloul, Energy-efficient IoT service composition for concurrent timed applications, Fut. Gener. Comput. Syst.
(2019).
[112] W.T. Sung, Y.C. Chiang, Improved particle swarm optimization algorithm for android medical care IoT using modified parameters, J. Med. Syst. 36 (6)
(2012) 3755–3763.
[113] F.M. Tabrizi, K. Pattabiraman, Design-level and code-level security analysis of IoT devices, ACM Trans. Embed. Comput. Syst. 18 (3) (2019) 20.
[114] J. Tang, D. Sun, S. Liu, J.L. Gaudiot, Enabling deep learning on IoT devices, Computer (Long Beach Calif) 50 (10) (2017) 92–96.
[115] T. Tekeste, H. Saleh, B. Mohammad, M. Ismail, Ultra-low power QRS detection and ECG compression architecture for IoT healthcare devices, IEEE
Trans. Circ. Syst. I 66 (2) (2018) 669–679.
[116] L. Tello-Oquendo, S.C. Lin, I.F. Akyildiz, V. Pla, Software-defined architecture for QoS-aware IoT deployments in 5G systems, Ad Hoc Netw. (2019)
101911.
[117] M. Tiloca, K. Nikitin, S. Raza, Axiom: DTLS-based secure IoT group communication, ACM Trans. Embedd. Comput. Syst. 16 (3) (2017) 66.
[118] H.L. Truong, S. Dustdar, Principles for engineering IoT cloud systems, IEEE Cloud Comput. 2 (2) (2015) 68–76.
[119] A. Ukil, S. Bandyopadhyay, A. Pal, IoT-privacy: to be private or not to be private, in: 2014 IEEE Conference on Computer Communications Workshops
(INFOCOM WKSHPS), IEEE, 2014, pp. 123–124.
[120] C. Verdouw, H. Sundmaeker, B. Tekinerdogan, D. Conzon, T. Montanaro, Architecture framework of IoT-based food and farm systems: a multiple case
study, Comput. Electron. Agric. 165 (2019) 104939.
[121] M. Vögler, J.M. Schleicher, C. Inzinger, S. Dustdar, A scalable framework for provisioning large-scale IoT deployments, ACM Trans. Internet Technol. 16
(2) (2016) 11.
[122] A. Wang, Y. Guo, Multiple-Terminal Aggregation Algorithm for IoT Service, Procedia Comput. Sci. 147 (2019) 495–498.
[123] Q. Wang, X. Zhu, Y. Ni, L. Gu, H. Zhu, Blockchain for the iot and industrial iot: a review, Internet Things (2019) 10 0 081.
[124] B.W. Wirtz, J.C. Weyerer, F.T. Schichtel, An integrative public IoT framework for smart government, Gov. Inf. Q. 36 (2) (2019) 333–345.
[125] T. Wu, J.M. Redouté, M.R. Yuce, A wireless implantable sensor design with subcutaneous energy harvesting for long-term IoT healthcare applications,
IEEE Access 6 (2018) 35801–35808.
[126] L. Xiao, X. Wan, X. Lu, Y. Zhang, D. Wu, IoT security techniques based on machine learning, 2018. arXiv preprint arXiv:1801.06275.
[127] S. Xu, G. Yang, Y. Mu, X. Liu, A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance, Fut. Gener.
Comput. Syst. 97 (2019) 284–294.
[128] P. Yang, D. Stankevicius, V. Marozas, Z. Deng, E. Liu, A. Lukosevicius, G. Min, Lifelogging data validation model for internet of things enabled person-
alized healthcare, IEEE Trans. Syst. Man Cybern. 48 (1) (2016) 50–64.
[129] Z. Yang, Y. Yue, Y. Yang, Y. Peng, X. Wang, W. Liu, Study and application on the architecture and key technologies for IoT, in: 2011 International
Conference on Multimedia Technology, IEEE, 2011, July, pp. 747–751.
[130] H. Yao, T. Mai, J. Wang, Z. Ji, C. Jiang, Y. Qian, Resource trading in blockchain-based industrial Internet of Things, IEEE Trans. Ind. Inform. (2019).
[131] G. Yıldırım, Y. Tatar, Simplified agent-based resource sharing approach for WSN-WSN interaction in IoT/CPS projects, IEEE Access 6 (2018)
78077–78091.
[132] J. Yin, Z. Yang, H. Cao, T. Liu, Z. Zhou, C. Wu, A survey on bluetooth 5.0 and mesh: new milestones of IoT, ACM Trans. Sensor Netw. 15 (3) (2019) 28.
[133] A.H. Zadeh, B.A. Akinyemi, A. Jeyaraj, H.M. Zolbanin, Cloud ERP systems for small-and-medium enterprises: a case study in the food industry, J. Cases
Inf. Technol. 20 (4) (2018) 53–70.
[134] X. Zheng, P. Martin, K. Brohman, L. Da Xu, Cloud service negotiation in internet of things environment: a mixed approach, IEEE Trans. Ind. Inform. 10
(2) (2014) 1506–1515.
[135] J. Zhou, Z. Cao, X. Dong, A.V. Vasilakos, Security and privacy for cloud-based IoT: challenges, IEEE Commun. Mag. 55 (1) (2017) 26–33.
[136] L. Zhou, S.H. Kondapalli, K. Aono, S. Chakrabartty, Desynchronization of self-powered FN tunneling timers for trust verification of IoT supply-chain,
IEEE Internet Things J. (2019).
[137] H. Zhu, P. Podesva, X. Liu, H. Zhang, T. Teply, Y. Xu, A. Niculescu, IoT PCR for Pandemic Disease Detection and Its Spread Monitoring, 2019. Available
at SSRN 3352008.
[138] H. Dai, Z. Zheng, Y. Zhang, Blockchain for Internet of Things: A Survey, IEEE Internet Things 6 (5) (2019).
[139] C.M.D. Junior, S.P. da Silva, R.V. da Nobrega, A.C. Barros, A.K. Sangaiah, P.P. Reboucas Filho, V.H.C. de Albuquerque, A new approach for mobile robot
localization based on an online IoT system, Future Gener. Comp. Sy. 100 (2019) 859–881.
[140] A. Saeed, A. Ahmadinia, A. Javed, H. Larijani, Intelligent intrusion detection in low-power IoTs, ACM T. Internet Techn. (TOIT) 16 (4) (2016) 1–25.
[141] L. Calderoni, A. Magnani, D. Maio, IoT Manager: An open-source IoT framework for smart cities, J. Syst. Architect. 98 (2019) 413–423.
[142] A. Celesti, A. Galletta, L. Carnevale, M. Fazio, A. Ĺay-Ekuakille, M. Villari, An IoT cloud system for traffic monitoring and vehicular accidents prevention
based on mobile sensor data processing, IEEE Sens. J. 18 (12) (2017) 4795–4802.
[143] T. Baranwal, P.K. Pateriya, Development of IoT based smart security and monitoring devices for agriculture, in: 2016 6th International Conference–
Cloud System and Big Data Engineering (Confluence), IEEE, 2016, pp. 597–602.
[144] T.R. Bennett, N. Gans, R. Jafari, Data-driven synchronization for Internet-of-Things systems, ACM T. Embed. Comput. S. (TECS) 16 (3) (2017) 1–24.
[145] F.Y. Yavuz, Deep learning in cyber security for internet of things (Doctoral dissertation), 2018.