|
Ref | Communication | Data processing | Analytics | Interference | Calibration | Hand-held device | Security |
|
[24] | Wi-Fi | Raspberry Pi is used for data processing | Decision tree algorithm | Interference test is not carried out | Sensors are not calibrated | NA, an email has been used for alerts | Security for data transmission is not integrated into the hardware |
|
[49] | LoRa + Wi-Fi | Gateway | Not implemented | Interference between the sensor node and gateway is not mentioned | Sensors are not calibrated | Yes | Hardware is not empowered with security for data transmission |
|
[50] | Wi-Fi | Gateway | Not implemented | Wi-Fi based on 2.4 GHz interference is not implemented | Sensors are not calibrated | NA | Asymmetric encryption for data communication is not available |
|
[51] | NA | Edge computing | Deep reinforcement learning | Not mentioned | Sensors are not calibrated | NA | Security for data transmission is not mentioned |
|
[52] | NA | Data aggregator | Decision support system (DSS) | Not mentioned | Sensors are not calibrated | No | Hardware is not empowered with security for data transmission |
|
[53] | LoRa | LoRa gateway | No analytics are carried out | Not discussed | Utilized PIR, DTH11 and soil moisture sensor, but calibration is not carried out | No | No |
|
[54] | LoRa | Gateway | System is implemented in real-time for testing, but no analytics are carried out | Interference are not appeared during transmission | Sensor calibration is carried out but no discussion about the calibration is available | No visualizing device or hand-held device | Security to the system is implemented with RFID, but during communication, no security feature is considered |
|
[55] | LoRa+ NB-IoT | Aggregation node | SVM is implemented for detecting the leaks based on sensor data | NA | Calibration | An android application is developed to visualize the sensor values in real time | Security between the node to node is not explored |
|
Proposed study | 2.4 GHz + Wi-Fi | Master node | Real-time analytics on sensor data with a pretrained model | Interference avoidance algorithm based on frequency agility | Sensor calibration with a standard instrument to confirm the error-free sensor value | Hand-held device to receive the real-time sensor data and crop recommendation based on the user request | XXTea encryption functions are utilized to implement symmetric encryption |
|