**Author details**

The study in [64] compares IoT devices and smartphones in terms of many features such as "computation capacity, storage, external storage, authentication, end-to-end communication, expansibility, battery exhaustion, etc." [64]. The study shows that the smartphone has a lot of functionalities and has built-in sensors that allow it to perform most of IoT devices functions [64]. The study also shows the behavior of smartphones in the IoT environment concerning data sharing with other IoT machines, communication with IoT devices and the cloud, supporting more computation in IoT than in the web, and the possibility of sending malicious

A survey of more than 5000 consumers from the USA, UK, Canada, Austria, and Japan conducted by Norton in 2016 revealed that some people understand that smartphones and IoT devices present risks and the rest do not care about their information being hacked [65]. As stated in [65] few research studies have focused on the risk of controlling IoT devices by the use of mobile apps installed in a user's smartphone. An intruder can control or get access to the smartphone and therefore control the IoT devices from mobile applications such as control of home appliances and healthcare-sensitive sensors [65]. Mobile applications can send unencrypted sensitive information from a user's phone such as location, call logs, browser history, and account details. Examples of vulnerabilities could be adding browser favorites, downloading and changing call logs, etc. Authors in [65] state the most important best practices that a user can adopt while using IoT devices, smartphones, and mobile apps, which are the following: (1) *using a reputable mobile security app* that identifies potential vulnerabilities before downloading an app, (2) *downloading apps from an official app store*, (3) *being mindful of the app settings* such as apps asking the user to disable security setting that protects installing apps from an unknown source, (4) *keeping the IoT devices current* by installing the latest updates, (5) *protecting the device by choosing a strong and unique password*, and (6) *being stingy with the device* such as protecting the communication between the device and network using an encrypted

The Internet of Things (IoT) and Internet of Everything (IoE) are rapidly finding their paths in our modern lives, allowing connecting and automating everything around us. This chapter gave an overview about these new trends, their enabling technologies, architecture, and application fields such as smart homes and healthcare. In this chapter, we also talked about the different IoT and IoE enabling technologies available in the smartphone and examples of its use in IoT and IoE scenarios. We proposed a model for IoT implementation that uses the smartphone sensors to sense and transmit data to multiple backend applications using a middleware layer. The applications could be running on a smartphone, which receive the data and present it to the end user, that is, the patient, hospital administration, or physician in the case of healthcare. These data could be stored in special databases or in the cloud and retrieved by the user later on upon need, using the smartphone dedicated application. We also covered the differences between IoT networks and mobile cellular networks in terms of requirements such as the need in IoT networks for long battery life, support for a massive number of devices, network scalability, low device and deployment costs, and extended coverage. Finally, future

Wi-Fi connection or a hard-coded LAN connection if available [65].

data to other IoT machines [64].

156 Smartphones from an Applied Research Perspective

**10. Conclusion**

Mehdia Ajana El Khaddar<sup>1</sup> \* and Mohammed Boulmalf2

\*Address all correspondence to: mehdia.ajana@gmail.com

1 Ecole Nationale Supérieure de L'informatique et d'Analyse des Systèmes (ENSIAS), Rabat, Morocco

2 International University in Rabat (UIR), Rabat, Morocco
