[[1] S. Kraijak and P. Tuwanut, “A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends,” in 11th International Conference on Wireless Communications, Networking and Mobile Computing, IET, 2015, pp. 1–6. https://doi.org/10.1049/cp.2015.071410.1049/cp.2015.0714]Search in Google Scholar
[[2] C. Wang, M. Daneshmand, M. Dohler, X. Mao, R. Q. Hu, and H. Wang, “Guest editorial - special issue on internet of things (IoT): architecture, protocols and services,” IEEE Sensors Journal, vol. 13, no. 10, pp. 3505–3510, Oct. 2013. https://doi.org/10.1109/JSEN.2013.227490610.1109/JSEN.2013.2274906]Search in Google Scholar
[[3] S. K. Lee, M. Bae, and H. Kim, “Future of IoT networks: A Survey,” Applied Sciences, vol. 7, no. 10, article number 1072, Oct. 2017. https://doi.org/10.3390/app710107210.3390/app7101072]Search in Google Scholar
[[4] S. Madakam, R. Ramaswamy, and S. Tripathi, “Internet of things (IoT): A Literature Review,” Journal of Computer and Communications, vol. 3, no. 5, pp. 164–173, May 2015. https://doi.org/10.4236/jcc.2015.3502110.4236/jcc.2015.35021]Search in Google Scholar
[[5] S. Wang, J. Wan, D. Li, and C. Zhang, “Implementing smart factory of industrie 4.0: An Outlook,” International Journal of Distributed Sensor Networks, vol. 12, no. 1, Jan. 2016. https://doi.org/10.1155/2016/315980510.1155/2016/3159805]Search in Google Scholar
[[6] X. Lin, C. Zhou, and J. Song, “IoT-based early-warning system of unsafe behaviors for horizontal-transportation in shield tunnel,” China Safety Science Journal, no. 11, pp. 109–115, 2014.]Search in Google Scholar
[[7] D. Bilgeri and F. Wortmann, “Barriers to IoT business model innovation,” in 13. Internationale Tagung Wirtschaftsinformatik, Universität St. Gallen, 2017, pp. 987–990.]Search in Google Scholar
[[8] M. Almulhim and N. Zaman, “Proposing secure and lightweight authentication scheme for IoT based E-health applications,” in 2018 20th International Conference on Advanced Communication Technology, IEEE, 2018, pp. 481–487. https://doi.org/10.23919/ICACT.2018.832380110.23919/ICACT.2018.8323801]Search in Google Scholar
[[9] K. Ryu, Y. Koizumi, and T. Hasegawa, “Name-based geographical routing/forwarding support for location-based IoT services,” in 2016 IEEE 24th International Conference on Network Protocols, IEEE, 2016, pp. 1–6. https://doi.org/10.1109/ICNP.2016.778532110.1109/ICNP.2016.7785321]Search in Google Scholar
[[10] U. Durak, “Flight 4.0: The Changing Technology Landscape of Aeronautics,” in Advances in Aeronautical Informatics, (U. Durak, J. Becker, S. Hartmann, N. S. Voros, Eds.), Springer, 2018, pp. 3–13. https://doi.org/10.1007/978-3-319-75058-3_110.1007/978-3-319-75058-3_1]Search in Google Scholar
[[11] J. H. Kim, “A Review of Cyber-Physical System Research Relevant to The Emerging IT Trends: Industry 4.0, IoT, Big Data, And Cloud Computing,” Journal of Industrial Integration and Management, vol. 2, no. 3, Sep. 2017. https://doi.org/10.1142/S242486221750011710.1142/S2424862217500117]Search in Google Scholar
[[12] X. Su, H. Zhang, J. Riekki, A. Keränen, J. K. Nurminen, and L. Du, “Connecting IoT Sensors to Knowledge-based Systems by Transforming SenML to RDF,” in 5th International Conference on Ambient Systems, Networks and Technologies and 4th International Conference on Sustainable Energy Information Technology, Elsevier, 2014, pp. 215–222. https://doi.org/10.1016/j.procs.2014.05.41710.1016/j.procs.2014.05.417]Search in Google Scholar
[[13] J. D. Brock, R. F. Bruce, and M. E. Cameron, “Changing the world with a Raspberry Pi,” Journal of Computing Sciences in Colleges, vol. 29, no.2, pp. 151–153, Dec. 2013.]Search in Google Scholar
[[14] H. Chaudhari, “Raspberry Pi Technology: A Review,” International Journal of Innovative and Emerging Research in Engineering, vol. 2, no. 3, pp. 83–87, 2015.]Search in Google Scholar
[[15] B. Furht and F. Villanustre, “Introduction to big data,” in Big Data Technologies and Applications, (B. Furht, F. Villanustre, Eds.). Springer, 2016, pp. 3–11. https://doi.org/10.1007/978-3-319-44550-2_110.1007/978-3-319-44550-2_1]Search in Google Scholar
[[16] S. Kaisler, F. Armour, and J. A. Espinosa, “Introduction to Big Data: Challenges, Opportunities, and Realities Minitrack,” in 2014 47th Hawaii International Conference on System Sciences, IEEE, 2014, pp. 728–728. https://doi.org/10.1109/HICSS.2014.9710.1109/HICSS.2014.97]Search in Google Scholar
[[17] M. N. O. Sadiku, Y. Wang, S. Cui, and S. M. Musa, “Industrial Internet of Things,” Journal of Advances in Scientific Research and Engineering, vol. 3, no. 11, Dec. 2017. https://doi.org/10.7324/IJASRE.2017.3253810.7324/IJASRE.2017.32538]Search in Google Scholar
[[18] H. Boyes, B. Hallaq, J. Cunningham, and T. Watson, “The industrial internet of things (IIoT): An analysis framework,” Computers in Industry, vol. 101, pp. 1–12, Oct. 2018. https://doi.org/10.1016/j.compind.2018.04.01510.1016/j.compind.2018.04.015]Search in Google Scholar
[[19] E. Gamma, R. Helm, R. Johnson, and J. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, 1st edition. Addison-Wesley Professional, 1995.]Search in Google Scholar
[[20] B. C. D. S. Oliveira, M. Wang, and J. Gibbons, “The visitor pattern as a reusable, generic, type-safe component,” in 23rd ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages and Applications, 2008, pp. 439–456. https://doi.org/10.1145/1449764.144979910.1145/1449764.1449799]Search in Google Scholar
[[21] J. Vaughn, “Hands-on computing with Arduino,” Journal of Computing Sciences in Colleges, vol. 27, no. 6, pp. 105–106, Jun. 2012.]Search in Google Scholar
[[22] A. Ghosh, R. Ratasuk, B. Mondal, N. Mangalvedhe, and T. Thomas, “LTE-advanced: next-generation wireless broadband technology,” IEEE Wireless Communications, vol. 17, no. 3, pp. 10–22, Jun. 2010. https://doi.org/10.1109/MWC.2010.549097410.1109/MWC.2010.5490974]Search in Google Scholar
[[23] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: vision and challenges,” IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637–646, Oct. 2016. https://doi.org/10.1109/JIOT.2016.257919810.1109/JIOT.2016.2579198]Search in Google Scholar
[[24] L. M. Vaquero and L. Rodero-Merino, “Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing,” ACM SIGCOMM Computer Communication Review, vol. 44, no. 5, pp. 27–32, Oct. 2014. https://doi.org/10.1145/2677046.267705210.1145/2677046.2677052]Search in Google Scholar
[[25] S. Buzzi, I. Chih-Lin, T. E. Klein, H. V. Poor, C. Yang, and A. Zappone, “A survey of energy-efficient techniques for 5G networks and challenges ahead,” IEEE Journal on Selected Areas in Communications, vol. 34, no. 4, pp. 697–709, Apr. 2016. https://doi.org/10.1109/JSAC.2016.255033810.1109/JSAC.2016.2550338]Search in Google Scholar
[[26] X. Ge, H. Cheng, M. Guizani, and T. Han, “5G wireless backhaul networks: challenges and research advances,” IEEE Network, vol. 28, no. 6, pp. 6–11, Nov. 2014. https://doi.org/10.1109/MNET.2014.696379810.1109/MNET.2014.6963798]Search in Google Scholar
[[27] W. A. Mufti, “ClientNet cluster an alternative of transferring big data files by use of mobile code,” in Xia Y., Zhang LJ. (eds) Services - SERVICES 2019. Lecture Notes in Computer Science, vol. 11517. Springer, Cham, 2019. https://doi.org/10.1007/978-3-030-23381-5_810.1007/978-3-030-23381-5_8]Search in Google Scholar
[[28] F.-J. Ferrández-Pastor, H. Mora, A. Jimeno-Morenilla, and B. Volckaert, “Deployment of IoT Edge and Fog Computing Technologies to Develop Smart Building Services,” Sustainability, vol. 10, no. 11, article number 3832, Oct. 2018. https://doi.org/10.3390/su1011383210.3390/su10113832]Search in Google Scholar
[[29] M. Habib ur Rehman, P. P. Jayaraman, S. U. R. Malik, A. U. R. Khan, and M. Medhat Gaber, “RedEdge: A Novel Architecture for Big Data Processing in Mobile Edge Computing Environments,” Journal of Sensor and Actuator Networks, vol. 6, no. 3, article number 17, Sep. 2017. https://doi.org/10.3390/jsan603001710.3390/jsan6030017]Search in Google Scholar
[[30] D. Soni and A. Makwana, “A survey on MQTT: a protocol of internet of things (IOT),” in International Conference on Telecommunication, Power Analysis and Computing Techniques, 2017.]Search in Google Scholar
[[31] S. Monk, Programming the Raspberry Pi: Getting Started with Python. McGraw-Hill, 2013.]Search in Google Scholar
[[32] H. Boyes, B. Hallaq, J. Cunningham, and T. Watson, “The industrial internet of things (IIoT): An analysis framework,” Computers in Industry, vol. 101, pp. 1–12, Oct. 2018. https://doi.org/10.1016/j.compind.2018.04.01510.1016/j.compind.2018.04.015]Search in Google Scholar
[[33] E. Pitt and K. McNiff. Java.rmi: The Remote Method Invocation Guide. Addison-Wesley, 2001.]Search in Google Scholar