ABSTRACT
Aspect-Oriented Programming (AOP) provides new constructs and concepts to handle secondary requirements in applications. Secondary requirements, i.e. crosscutting concerns, of the Internet of things (IoT) applications is inherited from the nature of the complexity of interactions, and implementation crosscutting concerns over core IoT architecture. Realizing the full potential of the IoT application requires a new abstraction design technique. This paper proposes an abstract class element toward a design approach to providing better means better separation of concerns. The proposed approach is accompanied by gathering relevant contextual properties pertaining to the environment of IoT interactions. A new architectural aspect-aware definition is proposed for tracking the logic of interaction characteristics on the IoT components being designed.
The Internet of Things - White paper - version 1.0andrepferreira
The document discusses the Internet of Things (IoT) by providing an overview of the IoT reference model and architecture. It describes a 7-layer reference model that abstracts IoT systems into physical entities, communication layers, and application layers. It also outlines an architecture framework with layers for devices, communications, data aggregation, processing, access, management, and security. Finally, it examines the typical components of an IoT system in more detail, including sensors, actuators, gateways, and applications.
This document proposes a smart semantic middleware for the Internet of Things. The middleware would allow for self-managed complex systems consisting of distributed and heterogeneous components. Each component would be represented by an autonomous software agent that monitors and controls the component. Semantic technologies and ontologies would be used to enable discovery and interoperability between heterogeneous components. The proposed middleware aims to support self-configuration, optimization, protection and healing of complex systems.
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection IJCNCJournal
This paper proposes an intelligent and compact machine learning model for IoT intrusion detection using an ensemble of semi-parametric models with Ada boost. The proposed model provides an adequate realtime intrusion detection at an affordable computational complexity suitable for the IoT edge networks. The proposed model is evaluated against other comparable models using the benchmark data on IoT-IDS and shows comparable performance with reduced computations as required.
IMMERSIVE TECHNOLOGIES IN 5G-ENABLED APPLICATIONS: SOME TECHNICAL CHALLENGES ...ijcsit
5G next-generation networking paradigm with its envisioned capacity, coverage, and data transfer rates
provide a developmental field for novel applications scenarios. Virtual, Mixed, and Augmented Reality will
play a key role as visualization, interaction, and information delivery platforms. The recent hardware and
software developments in immersive technologies including AR, VR and MR in terms of the commercial
availability of advanced headsets equipped with XR-accelerated processing units and Software
Development Kits (SDKs) are significantly increasing the penetration of such devices for entertainment,
corporate and industrial use. This trend creates next-generation usage models which rise serious technical
challenges within all networking and software architecture levels to support the immersive digital
transformation. The focus of this paper is to detect, discuss and propose system development approaches
and architectures for successful integration of the immersive technologies in the future information and
communication concepts like Tactile Internet and Internet of Skills.
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...IJECEIAES
Man and Machine in terms of heterogeneous devices and sensors collaborate giving birth to the Internet of Things, Internet of future. Within a short span of time 30billions intelligent devices in form of smart applications will get connected making it difficult to test and debug in terms of time and cost. Simulators play vital role in verifying application and providing security before actually deploying it in real environment. Due to constraint environment in terms of memory, computation, and energy this review paper under a single umbrella will throw insight on comprehensive and in-depth analysis keeping in mind various barriers, critical design characteristics along with the comparison of candidate simulator and packet sniffing tool. Post simulated analysis play vital role in deciding behavior of data and helping research community to satisfy quality of service parameters. This review makes it feasible to make an appropriate choice for simulators and network analyzer tool easy fulfilling needs and making IoT a reality.
An Event-based Middleware for Syntactical Interoperability in Internet of Th...IJECEIAES
Internet of Things (IoT) connecting sensors or devices that record physical observations of the environment and a variety of applications or other Internet services. Along with the increasing number and diversity of devices connected, there arises a problem called interoperability. One type of interoperability is syntactical interoperability, where the IoT should be able to connect all devices through various data protocols. Based on this problem, we proposed a middleware that capable of supporting interoperability by providing a multi-protocol gateway between COAP, MQTT, and WebSocket. This middleware is developed using event-based architecture by implementing publish-subscribe pattern. We also developed a system to test the performance of middleware in terms of success rate and delay delivery of data. The system consists of temperature and humidity sensors using COAP and MQTT as a publisher and web application using WebSocket as a subscriber. The results for data transmission, either from sensors or MQTT COAP has a success rate above 90%, the average delay delivery of data from sensors COAP and MQTT below 1 second, for packet loss rate varied between 0% - 25%. The interoperability testing has been done using Interoperability assessment methodology and found out that ours is qualified.
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...Jiang Zhu
1) The document proposes Fog Computing as a new platform that extends cloud computing to the edge of the network in order to address the needs of latency-sensitive IoT applications.
2) Two use cases are described to illustrate the key requirements of Fog Computing: a smart traffic light system that requires local subsystem latency of less than 10ms, and a wind farm that involves real-time analytics and coordination across a wide geographical area.
3) The key attributes that Fog Computing aims to address include mobility, geo-distribution, low and predictable latency, interplay between fog and cloud for data analytics, consistency in highly distributed systems, multi-tenancy, and multi-agency coordination.
Injecting (Micro)Intelligence in the IoT: Logic-based Approaches for (M)MASAndrea Omicini
Pervasiveness of ICT resources along with the promise of ubiquitous intelligence is pushing hard both our demand and our fears of AI: demand mandates for the ability to inject (micro) intelligence ubiquitously, fears compel the behaviour of intelligent systems to be observable, explainable, and accountable.
Whereas the first wave of the new "AI Era" was mostly heralded by non-symbolic approaches, features like explainability are better provided by symbolic techniques.
In this talk we focus on logic-based approaches, and discuss their potential in pervasive scenarios like the IoT and open (M)MAS along with our latest results in the field.
Andrea Omicini, Roberta Calegari
Invited Talk
MMAS 2018, Stockholm, Sweden, 14 July 2018
The Internet of Things - White paper - version 1.0andrepferreira
The document discusses the Internet of Things (IoT) by providing an overview of the IoT reference model and architecture. It describes a 7-layer reference model that abstracts IoT systems into physical entities, communication layers, and application layers. It also outlines an architecture framework with layers for devices, communications, data aggregation, processing, access, management, and security. Finally, it examines the typical components of an IoT system in more detail, including sensors, actuators, gateways, and applications.
This document proposes a smart semantic middleware for the Internet of Things. The middleware would allow for self-managed complex systems consisting of distributed and heterogeneous components. Each component would be represented by an autonomous software agent that monitors and controls the component. Semantic technologies and ontologies would be used to enable discovery and interoperability between heterogeneous components. The proposed middleware aims to support self-configuration, optimization, protection and healing of complex systems.
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection IJCNCJournal
This paper proposes an intelligent and compact machine learning model for IoT intrusion detection using an ensemble of semi-parametric models with Ada boost. The proposed model provides an adequate realtime intrusion detection at an affordable computational complexity suitable for the IoT edge networks. The proposed model is evaluated against other comparable models using the benchmark data on IoT-IDS and shows comparable performance with reduced computations as required.
IMMERSIVE TECHNOLOGIES IN 5G-ENABLED APPLICATIONS: SOME TECHNICAL CHALLENGES ...ijcsit
5G next-generation networking paradigm with its envisioned capacity, coverage, and data transfer rates
provide a developmental field for novel applications scenarios. Virtual, Mixed, and Augmented Reality will
play a key role as visualization, interaction, and information delivery platforms. The recent hardware and
software developments in immersive technologies including AR, VR and MR in terms of the commercial
availability of advanced headsets equipped with XR-accelerated processing units and Software
Development Kits (SDKs) are significantly increasing the penetration of such devices for entertainment,
corporate and industrial use. This trend creates next-generation usage models which rise serious technical
challenges within all networking and software architecture levels to support the immersive digital
transformation. The focus of this paper is to detect, discuss and propose system development approaches
and architectures for successful integration of the immersive technologies in the future information and
communication concepts like Tactile Internet and Internet of Skills.
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...IJECEIAES
Man and Machine in terms of heterogeneous devices and sensors collaborate giving birth to the Internet of Things, Internet of future. Within a short span of time 30billions intelligent devices in form of smart applications will get connected making it difficult to test and debug in terms of time and cost. Simulators play vital role in verifying application and providing security before actually deploying it in real environment. Due to constraint environment in terms of memory, computation, and energy this review paper under a single umbrella will throw insight on comprehensive and in-depth analysis keeping in mind various barriers, critical design characteristics along with the comparison of candidate simulator and packet sniffing tool. Post simulated analysis play vital role in deciding behavior of data and helping research community to satisfy quality of service parameters. This review makes it feasible to make an appropriate choice for simulators and network analyzer tool easy fulfilling needs and making IoT a reality.
An Event-based Middleware for Syntactical Interoperability in Internet of Th...IJECEIAES
Internet of Things (IoT) connecting sensors or devices that record physical observations of the environment and a variety of applications or other Internet services. Along with the increasing number and diversity of devices connected, there arises a problem called interoperability. One type of interoperability is syntactical interoperability, where the IoT should be able to connect all devices through various data protocols. Based on this problem, we proposed a middleware that capable of supporting interoperability by providing a multi-protocol gateway between COAP, MQTT, and WebSocket. This middleware is developed using event-based architecture by implementing publish-subscribe pattern. We also developed a system to test the performance of middleware in terms of success rate and delay delivery of data. The system consists of temperature and humidity sensors using COAP and MQTT as a publisher and web application using WebSocket as a subscriber. The results for data transmission, either from sensors or MQTT COAP has a success rate above 90%, the average delay delivery of data from sensors COAP and MQTT below 1 second, for packet loss rate varied between 0% - 25%. The interoperability testing has been done using Interoperability assessment methodology and found out that ours is qualified.
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...Jiang Zhu
1) The document proposes Fog Computing as a new platform that extends cloud computing to the edge of the network in order to address the needs of latency-sensitive IoT applications.
2) Two use cases are described to illustrate the key requirements of Fog Computing: a smart traffic light system that requires local subsystem latency of less than 10ms, and a wind farm that involves real-time analytics and coordination across a wide geographical area.
3) The key attributes that Fog Computing aims to address include mobility, geo-distribution, low and predictable latency, interplay between fog and cloud for data analytics, consistency in highly distributed systems, multi-tenancy, and multi-agency coordination.
Injecting (Micro)Intelligence in the IoT: Logic-based Approaches for (M)MASAndrea Omicini
Pervasiveness of ICT resources along with the promise of ubiquitous intelligence is pushing hard both our demand and our fears of AI: demand mandates for the ability to inject (micro) intelligence ubiquitously, fears compel the behaviour of intelligent systems to be observable, explainable, and accountable.
Whereas the first wave of the new "AI Era" was mostly heralded by non-symbolic approaches, features like explainability are better provided by symbolic techniques.
In this talk we focus on logic-based approaches, and discuss their potential in pervasive scenarios like the IoT and open (M)MAS along with our latest results in the field.
Andrea Omicini, Roberta Calegari
Invited Talk
MMAS 2018, Stockholm, Sweden, 14 July 2018
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
The document proposes an automatic methodology and framework to verify an organization's IT Architecture (ITA) model based on analysis of passively captured network traffic. The methodology involves three levels of network traffic analysis - sub-application layer inspection, superficial application layer content inspection, and deep application layer interpretation. Facts about the actual ITA are inferred from the traffic analysis and represented using a conceptual "Netfacts" model. Logical rules are defined to map the Netfacts model to an ITA modeling framework (CEO Framework), allowing automated verification of whether the ITA model specifies the real architecture detected in the network traffic. The goal is to detect any discrepancies between the modeled ITA and the actual systems.
Intelligent Internet of Things (IIoT): System Architectures and Communica...Raghu Nandy
Internet of Things (IoT) can be designed by various approaches with optimistic technology choices. This paper focuses on comparing recent studies on architectural choices and communication approaches for IoT Systems. Understanding Goals of an IoT system and inventing a general prototype for general IoT solutions is uniquely challenging. Existing research prototypes provide us information about IoT systems and their challenges. Existing architectures and communication approaches such as such as Service Oriented Architecture (SOA), Instant Messaging (XMPP) and Web-Sockets Service can be used to develop a general IoT System prototype. SOA provides centralized/decentralized IoT systems. Instant Message services such as XMPP can be used to build distributed and secure IoT platforms. Web-sockets also used to build scalable IoT systems. Overall the choice depends on IoT system Goal and limitations. Intelligent IoT (IIoT) Systems can be seen as decision making system. IoT systems can be built on Cloud infrastructures With Sensor Event as a Service (SEaaS) - Cloud Sensor networks can enable applications to access on-demand real-time sensor data. A generic IoT platform can be built and extended to newer applications and platforms.
Role of artificial intelligence in cloud computing, IoT and SDN: Reliability ...IJECEIAES
Information technology fields are now more dominated by artificial intelligence, as it is playing a key role in terms of providing better services. The inherent strengths of artificial intelligence are driving the companies into a modern, decisive, secure, and insight-driven arena to address the current and future challenges. The key technologies like cloud, internet of things (IoT), and software-defined networking (SDN) are emerging as future applications and rendering benefits to the society. Integrating artificial intelligence with these innovations with scalability brings beneficiaries to the next level of efficiency. Data generated from the heterogeneous devices are received, exchanged, stored, managed, and analyzed to automate and improve the performance of the overall system and be more reliable. Although these new technologies are not free of their limitations, nevertheless, the synthesis of technologies has been challenged and has put forth many challenges in terms of scalability and reliability. Therefore, this paper discusses the role of artificial intelligence (AI) along with issues and opportunities confronting all communities for incorporating the integration of these technologies in terms of reliability and scalability. This paper puts forward the future directions related to scalability and reliability concerns during the integration of the above-mentioned technologies and enable the researchers to address the current research gaps.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
Things like growing volumes and varieties of available data, cheaper and more powerful computational processing, data storage and large-value predictions that can guide better decisions and smart actions inreal time without human intervention are playing critical role in this age. All of these require models thatcan automatically analyse large complex data and deliver quick accurate results – even on a very largescale. Machine learning plays a significant role in developing these models. The applications of machinelearning range from speech and object recognition to analysis and prediction of finance markets. Artificial Neural Network is one of the important algorithms of machine learning that is inspired by the structure and functional aspects of the biological neural networks. In this paper, we discuss the purpose, representationand classification methods for developing hardware for machine learning with the main focus on neuralnetworks. This paper also presents the requirements, design issues and optimization techniques for buildinghardware architecture of neural networks.
Things like growing volumes and varieties of available data, cheaper and more powerful computational processing, data storage and large-value predictions that can guide better decisions and smart actions in real time without human intervention are playing critical role in this age. All of these require models that can automatically analyse large complex data and deliver quick accurate results – even on a very large scale. Machine learning plays a significant role in developing these models. The applications of machine learning range from speech and object recognition to analysis and prediction of finance markets. Artificial Neural Network is one of the important algorithms of machine learning that is inspired by the structure and functional aspects of the biological neural networks. In this paper, we discuss the purpose, representation and classification methods for developing hardware for machine learning with the main focus on neural networks. This paper also presents the requirements, design issues and optimization techniques for building hardware architecture of neural networks.
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...IJECEIAES
Compression and encryption of speech signals are essential multimedia technologies. In the field of speech, these technologies are needed to meet the security and confidentiality of information requirements for transferring huge speech signals via a network, and for decreasing storage space for rapid retrieval. In this paper, we propose an algorithm that includes hybrid transformation in order to analyses the speech signal frequencies. The speech signal is then compressed, after removing low and less intense frequencies, to produce a well compressed speech signal and ensure the quality of the speech. The resulting compressed speech is then used as an input in a scrambling algorithm that was proposed on two levels. One of these is an external scramble that works on mixing up the segments of speech that were divided using Fuzzy C-Means and changing their locations. The internal scramble scatters the values of each block internally based on the pattern of a Sudoku puzzle and quadratic map so that the resulting speech is an input to a proposed encryption algorithm using the threefish algorithm. The proposed algorithm proved to be highly efficient in the compression and encryption of the speech signal based on approved statistical measures.
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...ijcsit
Recommendation systems only provide more specific recommendations to users. They do not consider
giving a justification for the recommendation. However, the justification for the recommendation allows the
user to make the decision whether or not to accept the recommendation. It also improves user satisfaction
and the relevance of the recommended item. However, the IAAS recommendation system that uses
advisories to make recommendations does not provide a justification for the recommendations. That is why
in this article, our task consists for helping IAAS users to justify their recommendations. For this, we
conducted a related work on architectures and approaches for justifying recommendations in order to
identify an architecture and approach suitable for the context of IAAS. From the analysis in this article, we
note that neither of these approaches uses the notices (IAAS mechanism) to justify their recommendations.
Therefore, existing architectures cannot be used in the context of IAAS. That is why,we have developed a
new IAAS architecture that deals separately with item filtration and justification extraction that
accompanied the item during recommendation generation (Figure 7). And we haveimproved the reviews by
adding users’ reviews on the items. The user’s notices include the Documentary Unit (DU), the user Group
(G), the Justification (J) and the weight (a); noted A=(DU,G,J,a).
Novel authentication framework for securing communication in internet-of-things IJECEIAES
Internet-of-Things (IoT) offers a big boon towards a massive network of connected devices and is considered to offer coverage to an exponential number of the smart appliance in the very near future. Owing to the nascent stage of evolution of IoT, it is shrouded by security loopholes because of various reasons. Review of existing research-based solution highlights the usage of conventional cryptographic-based solution over the traditional mechanism of data forwarding process between IoT nodes and gateway. The proposed system presents a novel solution to this problem by a model that is capable of performing a highly secured and cost-effective authentication process. The proposed system introduces Authentication Using Signature (AUS) as well as Security with Complexity Reduction (SCR) for the purpose to resist participation of any form of unknown threats. The outcome of the model shows better security strength with faster response time and energy saving of the IoT nodes.
Named Data Networking (NDN) is a recently designed Internet architecture that benefits data names
instead of locations and creates essential changes in the abstraction of network services from "delivering
packets to specific destinations” to "retrieving data with special names" makes. This fundamental change
creates new opportunities and intellectual challenges in all areas, especially network routing and
communication, communication security, and privacy. The focus of this dissertation is on the forwarding
aircraft feature introduced by NDN. Communication in NDN is done by exchanging interest and data
packets
Internet Of Things: Architecture,Issues and ApplicationsIJERA Editor
Recent past year’s research on architecture standardization of IoT (Internet of thing) is going on, not yet concluded about standardization, It is still open and debatable how to make a standard platform. Thousands of researcher’s and Engineers are concentrating on IoT architecture standardization. Few open source community have already started working on IoT architecture for standardization. Yet lot of improvement is needed. Even some organization are collaborating and coming up with standardization. This will give base IoT Architecture standardization or Initial architecture which can evolve one of the solutions for making standardization. Seminar report gives full-fledged and complete modularity for IoT architecture. Depending on user application any unwanted module can be removed and addition of any number of modules to the architecture can be done easily. Mainly concentrates on modularity and scalability of the software. It helps IoT SoC(system on Chip) manufacturer to make hardware platform in-order to fit IoT applications.
IRJET - Development of Cloud System for IoT ApplicationsIRJET Journal
This document discusses the development of cloud systems for IoT applications. It begins with an introduction stating that one major problem IoT faces is storing and managing vast amounts of data generated. It then reviews 6 papers related to IoT cloud platforms, cloud storage systems, developments in cloud and IoT, exploring IoT platform development, minimizing energy consumption and SLA violations in cloud data centers, and IoT data classification. The document concludes that a detailed review of 6 IoT platform development approaches was presented and a framework was proposed to help select approaches based on requirements.
the evolving enterprise architecture: a digital transformation perspective is a paper describing the role of IoT in the enterprises and how the EA is related to that.
Artificial intelligence in cyber physical systemsPetar Radanliev
The results determine a new hierarchical cascading conceptual framework for analysing the evolution of AI decision-making in cyber physical systems. We argue that such evolution is inevitable and autonomous because of the increased integration of connected devices (IoT) in cyber physical systems. To support this argument, taxonomic methodol- ogy is adapted and applied for transparency and justifications of concepts selection decisions through building summary maps that are applied for designing the hierarchical cascading conceptual framework.
Review of big data analytics (bda) architecture trends and analysis Conference Papers
This document reviews big data analytics (BDA) architecture trends and analysis. It discusses the evolution of data analytics from ancient times to modern technologies like Hadoop and Spark. It describes key features of BDA like flexibility, scalability, and fault tolerance. Common BDA architectures like lambda and kappa architectures are summarized. The lambda architecture uses batch, speed, and serving layers to handle both real-time and batch processing. The kappa architecture simplifies this by removing the batch layer and handling all processing through streaming. Overall, the document provides a high-level overview of BDA architectures and technologies.
A presentation in English aiming to discuss the definition behind the autonomic working of 5G network projects. It is based on the layered reference model of the brain, the autonomy view from the IBM (International Business Machines Corporation) and the cognition from the point of view of Qusay H. Mahmoud. In addition, the ARIB, the BWAC, the XIA and the Horizon 2020 projects are summarized.
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...IRJET Journal
This document summarizes a research paper on mobile cloud computing (MCC). It begins with definitions of cloud computing and MCC, describing MCC as incorporating cloud computing resources and services into mobile environments. It then discusses security issues in MCC, categorizing them as mobile threats, cloud threats, and issues related to infrastructure and communication channels. The document proceeds to summarize 17 other research papers on topics like user authentication, open research issues, applications of MCC, and security challenges and solutions. It concludes by outlining the focus of the authors' own research on algorithms and cryptography for addressing security in MCC.
Cyber Physical Systems – Collaborating Systems of SystemsJoachim Schlosser
This document discusses computational semantics in complex cyber-physical systems. It begins by noting the increasing connectivity between embedded microprocessors, sensors, actuators and networks. This merging of the physical and virtual worlds highlights the importance of computation. The document then discusses modeling heterogeneous systems and the challenges of computational semantics across different domains like physics, information, electronics and networks. It emphasizes simulating systems early and often to validate designs and gain insights. Finally, it outlines best practices like creating high-level system models during specification, using multidomain simulation from the start, creating virtual test suites to stress systems, and reusing models and tests as a reference.
there is an obvious trend toward the future Internet
environment, where billions of sensors are connected in a highly
dynamic environment to provide fine-grained information about
the physical world. Applications that utilize such information are
smart and belong to the Internet of Things (IOT) paradigm.
There is a need for IOT systems to have a higher understanding
of the situations in which to provide services or functionalities, to
adapt accordingly. Information context should be collected,
modeled, inferred, and distributed to serve IOT applications with
the required knowledge. Developing context-awareness IOT
applications demands a specialized framework that helps in
applying computations transparently on the cloud and feed the
context-awareness IOT applications with appropriate context
information to prevent the direct access of the context sources.
In this paper, a framework for developing context-aware IOT
applications is proposed. The framework is distributed,
autonomous, and adaptive to fit the IOT applications’
characteristics. The proposed framework utilizes agent’s
technology as well as semantic-based features to provide the basic
functionality required to develop a context-awareness IOT
application. A scenario for elder healthcare is explained to
evaluate this framework.
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYijasuc
Internet of Things(IoT) in recent days playing a vital role in networking related applications. However,
there are several protocols available for building IoT applications, but RPL and CoAP are important
protocols.There is a customized protocol requirement for specific IoT applications, while working on
specific research problems. Further, adequate platforms are required to evaluate the performance of these
protocols. These platforms need to be configured for the protocol, which is very crucial and timeconsuming task. At present, there is no collective and precise information available to carry out this work.
This paper discusses two different open source platforms available for IoT. Also,various IoT research ideas
need to design of IoT protocols. A few IoT communication technologies are mentioned in the paper. The
detail analysis of, two common protocols, namely Routing Protocol for Low-Power Lossy Networks (RPL)
and Constrained Application layer protocol (CoAP) is carried out with respect to latency delay and packet
delivery ratio. The results, discussion and conclusion presented in this paper are useful for researchers,
who are interested to work with IoT protocols and standards.
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYijasuc
Internet of Things(IoT) in recent days playing a vital role in networking related applications. However,
there are several protocols available for building IoT applications, but RPL and CoAP are important
protocols.There is a customized protocol requirement for specific IoT applications, while working on
specific research problems. Further, adequate platforms are required to evaluate the performance of these
protocols. These platforms need to be configured for the protocol, which is very crucial and timeconsuming task. At present, there is no collective and precise information available to carry out this work.
This paper discusses two different open source platforms available for IoT. Also,various IoT research ideas
need to design of IoT protocols. A few IoT communication technologies are mentioned in the paper. The
detail analysis of, two common protocols, namely Routing Protocol for Low-Power Lossy Networks (RPL)
and Constrained Application layer protocol (CoAP) is carried out with respect to latency delay and packet
delivery ratio. The results, discussion and conclusion presented in this paper are useful for researchers,
who are interested to work with IoT protocols and standards
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
The document proposes an automatic methodology and framework to verify an organization's IT Architecture (ITA) model based on analysis of passively captured network traffic. The methodology involves three levels of network traffic analysis - sub-application layer inspection, superficial application layer content inspection, and deep application layer interpretation. Facts about the actual ITA are inferred from the traffic analysis and represented using a conceptual "Netfacts" model. Logical rules are defined to map the Netfacts model to an ITA modeling framework (CEO Framework), allowing automated verification of whether the ITA model specifies the real architecture detected in the network traffic. The goal is to detect any discrepancies between the modeled ITA and the actual systems.
Intelligent Internet of Things (IIoT): System Architectures and Communica...Raghu Nandy
Internet of Things (IoT) can be designed by various approaches with optimistic technology choices. This paper focuses on comparing recent studies on architectural choices and communication approaches for IoT Systems. Understanding Goals of an IoT system and inventing a general prototype for general IoT solutions is uniquely challenging. Existing research prototypes provide us information about IoT systems and their challenges. Existing architectures and communication approaches such as such as Service Oriented Architecture (SOA), Instant Messaging (XMPP) and Web-Sockets Service can be used to develop a general IoT System prototype. SOA provides centralized/decentralized IoT systems. Instant Message services such as XMPP can be used to build distributed and secure IoT platforms. Web-sockets also used to build scalable IoT systems. Overall the choice depends on IoT system Goal and limitations. Intelligent IoT (IIoT) Systems can be seen as decision making system. IoT systems can be built on Cloud infrastructures With Sensor Event as a Service (SEaaS) - Cloud Sensor networks can enable applications to access on-demand real-time sensor data. A generic IoT platform can be built and extended to newer applications and platforms.
Role of artificial intelligence in cloud computing, IoT and SDN: Reliability ...IJECEIAES
Information technology fields are now more dominated by artificial intelligence, as it is playing a key role in terms of providing better services. The inherent strengths of artificial intelligence are driving the companies into a modern, decisive, secure, and insight-driven arena to address the current and future challenges. The key technologies like cloud, internet of things (IoT), and software-defined networking (SDN) are emerging as future applications and rendering benefits to the society. Integrating artificial intelligence with these innovations with scalability brings beneficiaries to the next level of efficiency. Data generated from the heterogeneous devices are received, exchanged, stored, managed, and analyzed to automate and improve the performance of the overall system and be more reliable. Although these new technologies are not free of their limitations, nevertheless, the synthesis of technologies has been challenged and has put forth many challenges in terms of scalability and reliability. Therefore, this paper discusses the role of artificial intelligence (AI) along with issues and opportunities confronting all communities for incorporating the integration of these technologies in terms of reliability and scalability. This paper puts forward the future directions related to scalability and reliability concerns during the integration of the above-mentioned technologies and enable the researchers to address the current research gaps.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
Things like growing volumes and varieties of available data, cheaper and more powerful computational processing, data storage and large-value predictions that can guide better decisions and smart actions inreal time without human intervention are playing critical role in this age. All of these require models thatcan automatically analyse large complex data and deliver quick accurate results – even on a very largescale. Machine learning plays a significant role in developing these models. The applications of machinelearning range from speech and object recognition to analysis and prediction of finance markets. Artificial Neural Network is one of the important algorithms of machine learning that is inspired by the structure and functional aspects of the biological neural networks. In this paper, we discuss the purpose, representationand classification methods for developing hardware for machine learning with the main focus on neuralnetworks. This paper also presents the requirements, design issues and optimization techniques for buildinghardware architecture of neural networks.
Things like growing volumes and varieties of available data, cheaper and more powerful computational processing, data storage and large-value predictions that can guide better decisions and smart actions in real time without human intervention are playing critical role in this age. All of these require models that can automatically analyse large complex data and deliver quick accurate results – even on a very large scale. Machine learning plays a significant role in developing these models. The applications of machine learning range from speech and object recognition to analysis and prediction of finance markets. Artificial Neural Network is one of the important algorithms of machine learning that is inspired by the structure and functional aspects of the biological neural networks. In this paper, we discuss the purpose, representation and classification methods for developing hardware for machine learning with the main focus on neural networks. This paper also presents the requirements, design issues and optimization techniques for building hardware architecture of neural networks.
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...IJECEIAES
Compression and encryption of speech signals are essential multimedia technologies. In the field of speech, these technologies are needed to meet the security and confidentiality of information requirements for transferring huge speech signals via a network, and for decreasing storage space for rapid retrieval. In this paper, we propose an algorithm that includes hybrid transformation in order to analyses the speech signal frequencies. The speech signal is then compressed, after removing low and less intense frequencies, to produce a well compressed speech signal and ensure the quality of the speech. The resulting compressed speech is then used as an input in a scrambling algorithm that was proposed on two levels. One of these is an external scramble that works on mixing up the segments of speech that were divided using Fuzzy C-Means and changing their locations. The internal scramble scatters the values of each block internally based on the pattern of a Sudoku puzzle and quadratic map so that the resulting speech is an input to a proposed encryption algorithm using the threefish algorithm. The proposed algorithm proved to be highly efficient in the compression and encryption of the speech signal based on approved statistical measures.
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...ijcsit
Recommendation systems only provide more specific recommendations to users. They do not consider
giving a justification for the recommendation. However, the justification for the recommendation allows the
user to make the decision whether or not to accept the recommendation. It also improves user satisfaction
and the relevance of the recommended item. However, the IAAS recommendation system that uses
advisories to make recommendations does not provide a justification for the recommendations. That is why
in this article, our task consists for helping IAAS users to justify their recommendations. For this, we
conducted a related work on architectures and approaches for justifying recommendations in order to
identify an architecture and approach suitable for the context of IAAS. From the analysis in this article, we
note that neither of these approaches uses the notices (IAAS mechanism) to justify their recommendations.
Therefore, existing architectures cannot be used in the context of IAAS. That is why,we have developed a
new IAAS architecture that deals separately with item filtration and justification extraction that
accompanied the item during recommendation generation (Figure 7). And we haveimproved the reviews by
adding users’ reviews on the items. The user’s notices include the Documentary Unit (DU), the user Group
(G), the Justification (J) and the weight (a); noted A=(DU,G,J,a).
Novel authentication framework for securing communication in internet-of-things IJECEIAES
Internet-of-Things (IoT) offers a big boon towards a massive network of connected devices and is considered to offer coverage to an exponential number of the smart appliance in the very near future. Owing to the nascent stage of evolution of IoT, it is shrouded by security loopholes because of various reasons. Review of existing research-based solution highlights the usage of conventional cryptographic-based solution over the traditional mechanism of data forwarding process between IoT nodes and gateway. The proposed system presents a novel solution to this problem by a model that is capable of performing a highly secured and cost-effective authentication process. The proposed system introduces Authentication Using Signature (AUS) as well as Security with Complexity Reduction (SCR) for the purpose to resist participation of any form of unknown threats. The outcome of the model shows better security strength with faster response time and energy saving of the IoT nodes.
Named Data Networking (NDN) is a recently designed Internet architecture that benefits data names
instead of locations and creates essential changes in the abstraction of network services from "delivering
packets to specific destinations” to "retrieving data with special names" makes. This fundamental change
creates new opportunities and intellectual challenges in all areas, especially network routing and
communication, communication security, and privacy. The focus of this dissertation is on the forwarding
aircraft feature introduced by NDN. Communication in NDN is done by exchanging interest and data
packets
Internet Of Things: Architecture,Issues and ApplicationsIJERA Editor
Recent past year’s research on architecture standardization of IoT (Internet of thing) is going on, not yet concluded about standardization, It is still open and debatable how to make a standard platform. Thousands of researcher’s and Engineers are concentrating on IoT architecture standardization. Few open source community have already started working on IoT architecture for standardization. Yet lot of improvement is needed. Even some organization are collaborating and coming up with standardization. This will give base IoT Architecture standardization or Initial architecture which can evolve one of the solutions for making standardization. Seminar report gives full-fledged and complete modularity for IoT architecture. Depending on user application any unwanted module can be removed and addition of any number of modules to the architecture can be done easily. Mainly concentrates on modularity and scalability of the software. It helps IoT SoC(system on Chip) manufacturer to make hardware platform in-order to fit IoT applications.
IRJET - Development of Cloud System for IoT ApplicationsIRJET Journal
This document discusses the development of cloud systems for IoT applications. It begins with an introduction stating that one major problem IoT faces is storing and managing vast amounts of data generated. It then reviews 6 papers related to IoT cloud platforms, cloud storage systems, developments in cloud and IoT, exploring IoT platform development, minimizing energy consumption and SLA violations in cloud data centers, and IoT data classification. The document concludes that a detailed review of 6 IoT platform development approaches was presented and a framework was proposed to help select approaches based on requirements.
the evolving enterprise architecture: a digital transformation perspective is a paper describing the role of IoT in the enterprises and how the EA is related to that.
Artificial intelligence in cyber physical systemsPetar Radanliev
The results determine a new hierarchical cascading conceptual framework for analysing the evolution of AI decision-making in cyber physical systems. We argue that such evolution is inevitable and autonomous because of the increased integration of connected devices (IoT) in cyber physical systems. To support this argument, taxonomic methodol- ogy is adapted and applied for transparency and justifications of concepts selection decisions through building summary maps that are applied for designing the hierarchical cascading conceptual framework.
Review of big data analytics (bda) architecture trends and analysis Conference Papers
This document reviews big data analytics (BDA) architecture trends and analysis. It discusses the evolution of data analytics from ancient times to modern technologies like Hadoop and Spark. It describes key features of BDA like flexibility, scalability, and fault tolerance. Common BDA architectures like lambda and kappa architectures are summarized. The lambda architecture uses batch, speed, and serving layers to handle both real-time and batch processing. The kappa architecture simplifies this by removing the batch layer and handling all processing through streaming. Overall, the document provides a high-level overview of BDA architectures and technologies.
A presentation in English aiming to discuss the definition behind the autonomic working of 5G network projects. It is based on the layered reference model of the brain, the autonomy view from the IBM (International Business Machines Corporation) and the cognition from the point of view of Qusay H. Mahmoud. In addition, the ARIB, the BWAC, the XIA and the Horizon 2020 projects are summarized.
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...IRJET Journal
This document summarizes a research paper on mobile cloud computing (MCC). It begins with definitions of cloud computing and MCC, describing MCC as incorporating cloud computing resources and services into mobile environments. It then discusses security issues in MCC, categorizing them as mobile threats, cloud threats, and issues related to infrastructure and communication channels. The document proceeds to summarize 17 other research papers on topics like user authentication, open research issues, applications of MCC, and security challenges and solutions. It concludes by outlining the focus of the authors' own research on algorithms and cryptography for addressing security in MCC.
Cyber Physical Systems – Collaborating Systems of SystemsJoachim Schlosser
This document discusses computational semantics in complex cyber-physical systems. It begins by noting the increasing connectivity between embedded microprocessors, sensors, actuators and networks. This merging of the physical and virtual worlds highlights the importance of computation. The document then discusses modeling heterogeneous systems and the challenges of computational semantics across different domains like physics, information, electronics and networks. It emphasizes simulating systems early and often to validate designs and gain insights. Finally, it outlines best practices like creating high-level system models during specification, using multidomain simulation from the start, creating virtual test suites to stress systems, and reusing models and tests as a reference.
there is an obvious trend toward the future Internet
environment, where billions of sensors are connected in a highly
dynamic environment to provide fine-grained information about
the physical world. Applications that utilize such information are
smart and belong to the Internet of Things (IOT) paradigm.
There is a need for IOT systems to have a higher understanding
of the situations in which to provide services or functionalities, to
adapt accordingly. Information context should be collected,
modeled, inferred, and distributed to serve IOT applications with
the required knowledge. Developing context-awareness IOT
applications demands a specialized framework that helps in
applying computations transparently on the cloud and feed the
context-awareness IOT applications with appropriate context
information to prevent the direct access of the context sources.
In this paper, a framework for developing context-aware IOT
applications is proposed. The framework is distributed,
autonomous, and adaptive to fit the IOT applications’
characteristics. The proposed framework utilizes agent’s
technology as well as semantic-based features to provide the basic
functionality required to develop a context-awareness IOT
application. A scenario for elder healthcare is explained to
evaluate this framework.
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYijasuc
Internet of Things(IoT) in recent days playing a vital role in networking related applications. However,
there are several protocols available for building IoT applications, but RPL and CoAP are important
protocols.There is a customized protocol requirement for specific IoT applications, while working on
specific research problems. Further, adequate platforms are required to evaluate the performance of these
protocols. These platforms need to be configured for the protocol, which is very crucial and timeconsuming task. At present, there is no collective and precise information available to carry out this work.
This paper discusses two different open source platforms available for IoT. Also,various IoT research ideas
need to design of IoT protocols. A few IoT communication technologies are mentioned in the paper. The
detail analysis of, two common protocols, namely Routing Protocol for Low-Power Lossy Networks (RPL)
and Constrained Application layer protocol (CoAP) is carried out with respect to latency delay and packet
delivery ratio. The results, discussion and conclusion presented in this paper are useful for researchers,
who are interested to work with IoT protocols and standards.
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYijasuc
Internet of Things(IoT) in recent days playing a vital role in networking related applications. However,
there are several protocols available for building IoT applications, but RPL and CoAP are important
protocols.There is a customized protocol requirement for specific IoT applications, while working on
specific research problems. Further, adequate platforms are required to evaluate the performance of these
protocols. These platforms need to be configured for the protocol, which is very crucial and timeconsuming task. At present, there is no collective and precise information available to carry out this work.
This paper discusses two different open source platforms available for IoT. Also,various IoT research ideas
need to design of IoT protocols. A few IoT communication technologies are mentioned in the paper. The
detail analysis of, two common protocols, namely Routing Protocol for Low-Power Lossy Networks (RPL)
and Constrained Application layer protocol (CoAP) is carried out with respect to latency delay and packet
delivery ratio. The results, discussion and conclusion presented in this paper are useful for researchers,
who are interested to work with IoT protocols and standards
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYijasuc
Internet of Things(IoT) in recent days playing a vital role in networking related applications. However,
there are several protocols available for building IoT applications, but RPL and CoAP are important
protocols.There is a customized protocol requirement for specific IoT applications, while working on
specific research problems. Further, adequate platforms are required to evaluate the performance of these
protocols. These platforms need to be configured for the protocol, which is very crucial and timeconsuming task. At present, there is no collective and precise information available to carry out this work.
This paper discusses two different open source platforms available for IoT. Also,various IoT research ideas
need to design of IoT protocols. A few IoT communication technologies are mentioned in the paper. The
detail analysis of, two common protocols, namely Routing Protocol for Low-Power Lossy Networks (RPL)
and Constrained Application layer protocol (CoAP) is carried out with respect to latency delay and packet
delivery ratio. The results, discussion and conclusion presented in this paper are useful for researchers,
who are interested to work with IoT protocols and standards.
The document is a chapter on Internet of Things (IoT) network architecture from a course on IoT. It discusses key aspects of IoT architecture including:
- The three layers of a core IoT functional stack: the "things" layer containing sensors and actuators, the communications network layer connecting things, and the applications and analytics layer.
- Considerations for the communications network layer such as access network technologies, topologies, and sublayers for gateways, transport, and management.
- The role of edge, fog and cloud computing in IoT data management across the three stack layers.
- Standardized IoT architectures like oneM2M and the IoT World Forum's 7
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...IRJET Journal
This document discusses testing uncertainties in cyber-physical systems (CPS) that span Internet of Things (IoT) and cloud infrastructures. It proposes combining model-driven engineering and elastic execution techniques to dynamically provision both the CPS under test and testing utilities across various IoT and cloud infrastructures. Specifically, it suggests using software-defined IoT units and cloud-based elastic services that can be composed, controlled via APIs, and provisioned elastically to enable testing CPS configurations and behaviors across heterogeneous environments.
The document discusses key aspects of Internet of Things (IoT) architectures. It begins by explaining the differences between traditional IT systems and IoT, noting that IoT is focused on data generated by sensors. It then outlines the core functional stack of IoT including the things layer of physical devices, communication networks, and application/analytics layers. The document also describes two standardized IoT architectures from oneM2M and IoTWorld Forum. Finally, it discusses IoT data management using fog computing to distribute data processing close to the edge for reduced latency and network traffic.
Fog Computing: A Platform for Internet of Things and AnalyticsHarshitParkar6677
Internet of Things (IoT) brings more than an explosive proliferation of
endpoints. It is disruptive in several ways. In this chapter we examine those disruptions,
and propose a hierarchical distributed architecture that extends from the edge
of the network to the core nicknamed Fog Computing. In particular, we pay attention
to a new dimension that IoT adds to Big Data and Analytics: a massively distributed
number of sources at the edge.
The constant evolution in internet technology has made. The internet of things (IoT) to be the center of research fields in computer engineering. This review paper discusses the choice of an application layer protocol in an IoT system integration so first, the paper briefly defines the potential protocols. After that, it opens up a comparison between these protocols according to how they manage their overhead and messages which affects traffic management and thus starts the discussion. The main contribution of this work is the simplification of comparison between session layer protocols in the benefit of IoT applications exclusively. IoT system Standards and platforms are being improved constantly. IoT enables application devices to connect and coordinate their tacks, such applications like healthcare, smart home, and industrial automation. Several protocols have been discussed to provide effective communication for resource-limited devices. However, their traffic management is still a field for researches, to find the optimal protocol choice for different situations. The review collects the results of other works that experimentally compared application layer protocols in the IoT environment and presents the graphical and tabular compression. Finally, the conclusion summarize the choice in different applications.
Lightweight IoT middleware for rapid application developmentTELKOMNIKA JOURNAL
Sensors connected to the cloud services equipped with data analytics has created a plethora of new type of applications ranging from personal to an industrial level forming to what is known today as Internet of Things (IoT). IoT-based system follows a pattern of data collection, data analytics, automation, and system improvement recommendations. However, most applications would have its own unique requirements in terms of the type of the smart devices, communication technologies as well as its application provisioning service. In order to enable an IoT-based system, various services are commercially available that provide services such as backend-as-a-service (BaaS) and software-as-a-service (SaaS) hosted in the cloud. This, in turn, raises the issues of security and privacy. However there is no plug-and-play IoT middleware framework that could be deployed out of the box for on-premise server. This paper aims at providing a lightweight IoT middleware that can be used to enable IoT applications owned by the individuals or organizations that effectively securing the data on-premise or in remote server. Specifically, the middleware with a standardized application programming interface (API) that could adapt to the application requirements through high level abstraction and interacts with the application service provider is proposed. Each API endpoint would be secured using Access Control List (ACL) and easily integratable with any other modules to ensure the scalability of the system as well as easing system deployment. In addition, this middleware could be deployed in a distributed manner and coordinate among themselves to fulfil the application requirements. A middleware is presented in this paper with GET and POST requests that are lightweight in size with a footprint of less than 1 KB and a round trip time of less than 1 second to facilitate rapid application development by individuals or organizations for securing IoT resources.
Open Source Platforms Integration for the Development of an Architecture of C...Eswar Publications
The goal of the Internet of Things (IoT) is to achieve the interconnection and interaction of all kind of everyday
objects. IoT architecture can be implemented in various ways. This paper presents a way to mount an IoT architecture using open source hardware and software platforms and shows that this is a viable option to collect information through various sensors and present it through a web page.
Stary2020_Chapter_TheInternet-of-BehaviorAsOrganRG.pdfHải Quân
The document discusses the concept of the Internet-of-Behavior (IoB) as a continuous organizational transformation space. It proposes a model that represents organizations through behavior encapsulations and choreographic interactions between roles. This model allows describing tasks and activities as interactive behavior patterns to achieve common objectives. The model can be refined and adapted over time using value-based analysis of interactions and data. This design-science based approach aims to enable informed and continuous digital transformation of organizations as IoB systems become integrated into work. The model is exemplified through a home healthcare case study.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
The document discusses key topics related to the Internet of Things (IoT) including:
1. It defines IoT and lists its main characteristics as intelligence, connectivity, enormous scale, dynamic nature, heterogeneity, sensing, and security.
2. It describes the physical design of IoT including IoT devices and protocols used for communication between devices and cloud servers.
3. It outlines the logical design of IoT including functional blocks, common communication models like request-response, publish-subscribe, and push-pull, as well as communication APIs.
Analysis of Energy Management Scheme in Smart City: A Reviewijtsrd
A brilliant city misuses feasible data and correspondence innovations to improve the quality and the presentation of urban administrations for natives and government, while decreasing assets utilization. Wise vitality control in structures is a significant viewpoint in this. The Internet of Things can give an answer. It means to associate various heterogeneous gadgets through the web, for which it needs an adaptable layered design where the things, the general population and the cloud administrations are consolidated to encourage an application task. Such adaptable IoT various leveled engineering model will be presented in this paper with a review of each key segment for astute vitality control in structures for keen urban communities. Manisha Kumari Singh | Prof. Avinash Sharma "Analysis of Energy Management Scheme in Smart City: A Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29446.pdfPaper URL: https://www.ijtsrd.com/other-scientific-research-area/other/29446/analysis-of-energy-management-scheme-in-smart-city-a-review/manisha-kumari-singh
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion DetectionIJCNCJournal
This paper proposes an intelligent and compact machine learning model for IoT intrusion detection using an ensemble of semi-parametric models with Ada boost. The proposed model provides an adequate realtime intrusion detection at an affordable computational complexity suitable for the IoT edge networks. The proposed model is evaluated against other comparable models using the benchmark data on IoT-IDS and shows comparable performance with reduced computations as required.
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET Journal
This document provides an overview of the Internet of Things (IoT) including its definition, architecture, applications, and advantages/disadvantages. The key points are:
1. IoT allows both things and people to be connected anytime, anywhere through any network or service. It enables communication between machines (M2M).
2. The IoT architecture has two main components - the edge (sensors, devices, gateways) and cloud. Field protocols like Bluetooth, Zigbee, and WiFi enable communication at the edge, while cloud protocols like MQTT, CoAP, and HTTP connect to cloud services.
3. Important applications of IoT discussed are smart homes, farming, healthcare, cities
This document provides an overview of the fundamentals of the Internet of Things (IoT). It discusses the basic architecture of IoT systems including sensing, network, data processing, and application layers. It also covers main design principles such as security, data management, and human factors. Additional topics include IoT standards considerations, devices and gateways, networking approaches, business processes, Everything as a Service models, reference architectures, and technical constraints around interoperability, privacy and security.
This document proposes a new software defined fog platform for internet of things (IoT) architecture that combines software defined networking (SDN) and fog computing. It discusses challenges with traditional cloud computing for IoT including delays and bottlenecks. The proposed platform uses SDN to centrally control network resources and fog computing to process and manage data at the network edge. It describes the SDN and fog architectures and how they are integrated into the platform. Potential uses of the platform are discussed for applications requiring low latency like intelligent traffic management, healthcare networks, industrial robotics, smart cameras, and precision agriculture.
Similar to ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSAL (20)
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
AI for Legal Research with applications, toolsmahaffeycheryld
AI applications in legal research include rapid document analysis, case law review, and statute interpretation. AI-powered tools can sift through vast legal databases to find relevant precedents and citations, enhancing research accuracy and speed. They assist in legal writing by drafting and proofreading documents. Predictive analytics help foresee case outcomes based on historical data, aiding in strategic decision-making. AI also automates routine tasks like contract review and due diligence, freeing up lawyers to focus on complex legal issues. These applications make legal research more efficient, cost-effective, and accessible.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSAL
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
DOI: 10.5121/ijcsit.2018.10601 1
ARCHITECTURAL ASPECT-AWARE DESIGN FOR
IOT APPLICATIONS: CONCEPTUAL PROPOSAL
Anas M. R. AlSobeh and Aws A. Magableh
Department of Computer Information System, Yarmouk University, Irbid, Jordan
ABSTRACT
Aspect-Oriented Programming (AOP) provides new constructs and concepts to handle secondary
requirements in applications. Secondary requirements, i.e. crosscutting concerns, of the Internet of things
(IoT) applications is inherited from the nature of the complexity of interactions, and implementation
crosscutting concerns over core IoT architecture. Realizing the full potential of the IoT application requires
a new abstraction design technique. This paper proposes an abstract class element toward a design
approach to providing better means better separation of concerns. The proposed approach is accompanied
by gathering relevant contextual properties pertaining to the environment of IoT interactions. A new
architectural aspect-aware definition is proposed for tracking the logic of interaction characteristics on the
IoT components being designed.
KEYWORDS
Aspect-Oriented Programming, Aspect Orientation, Modularization, Behavior-Interaction-Priority Model,
BIP Components, Internet of things, IoT, crosscutting concerns, Aspects
1. INTRODUCTION
Internet of Things (IoT) is a modern technology evolved throughout the years. IoT has turned into
the most crucial and prevalent system that empowers everybody to make, create, offer, utilize the
data to produce information. IoT is the network of physical things, cars, water systems, home
appliances and other items embedded with electronics, software, sensors with different types, and
networks which enables these objects to connect and exchange data [3]. IoT targets at connecting
of smart devices facilitating interactions among things and people. With IoT real word and digital
words are interacting through various kinds of technologies such as internet protocols, sensors
types and communication [4]. Having all these issues in mind, there will be so many crosscutting
concerns that spread across different components of IoT architecture [15]. Managing and dealing
with these crosscutting concerns in IoT environments is not an easy task, due to lack of
management tools that ensure the performance, robustness, dependability, and security of IoT
systems [2].
To address such issues, we need to introduce a dynamic management approach which provide
better separation of concerns. Aspect Orientation (AO) is a suitable technique that introduce a
modularization concept to encapsulate common crosscutting concerns into lossy coupled
abstraction [12]. However, Aspect-Oriented Programming (AOP) is limited to a set of specific
programming constructs such as constructors, methods, and proprieties. Consequently, less
attention has been paid on developing AO to be used for model based design flow. Behavior-
Interaction-Priority (BIP) model has been designed to provide a formal description language for
essential real-time interactions (e.g. IoT systems) between system’s components based on a set of
priority rules for the transition of the behavior [7].
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
2
In this paper, we present and discuss the modelling of a combination model-based design of both
BIP and AOP (named BIP-AOP) to overcome the challenges of modularizing IoT-related
crosscutting concerns. The proposed model presents BIP-AOP as an IoT-aware interaction design
through introducing a set of intercepted invoke/execution points. These points represent IoT-
related context information, which are encapsulated into a high-level abstract aspect. Our abstract
aspect can be extended to create an efficient runtime crosscutting module. Such a module is
implemented into runtime advices that might be woven into an IoT-based system dynamically.
BIP-AOP consists of three-layer architecture: IoT layer, AOP layer and Application layer. IoT
layer represents systems interactions between components; AOP layer represents a mediator on
the IoT infrastructure to glue the IoT-related components with needed application concerns; and
Application layer allows developer to customize the IoT behaviors without prior implementation
knowledge. All those layers are mapped into BIP components to address the design of an event-
based interaction components as a solution for pulling all relevant context information from IoT
components.
The paper is organized as follows: section 2 provides an overview of the AOP and BIP
components and a set of important related works, section 3 illustrates the motivated case study
that inspired us to propose our model. Section 4 discusses our proposed model, finally conclusion
and future work have been presented in section 5.
2. BACKGROUND AND LITERATURE REVIEW
Crosscutting concerns in network systems using IoT face challenges stemmed in nature of the
interactions between nodes and resources. This makes the dynamic control and management at
run-time is a fundamentally complex problem. Managing interpretability and complexity are one
of the key essential ways of controlling the run-time interactions between connected nodes at
different IoT layers architecture [1]. This section explains a little bit of background and essential
major related studies and works that focused on managing IoT application complexity and
portability either using AO or non-AO methods.
2.1. Nutshell background
The interactions amongst the different abstraction layers of the IoT-based application architecture
impact the overall system's complexity and portability. IoT-based applications are overlapping
networks of heterogeneous objects. Thus, the Representational State Transfer (REST) design is an
architectural style that enables application-layer interoperability and reuse. Additionally, AOP is
used to decompose systems, but the nodes may be tautly coupled in a design IoT-centric
component, which is more often complex. Here, we use the most IoT systems support for the
design REST-based applications. Understanding the below concepts are vital to understanding the
novelty of the idea.
2.1.1. Aspect-Oriented Programming (AOP)
Generally, the relationships among user requirements and program components intersect or
crosscut in distributed and extended systems. In other words, a requirement may have to be
implemented through several components; while on the other hand, a single component could
cover more than one requirement or different parts of more than one requirement. Thus, a
component may provide core functionality and at the same time include code for several other
system requirements. An approach that tries to overcome this programming difficulty is called
aspect-oriented software development (AOSD). These aspects encapsulate the functionalities that
crosscut other functionalities in different parts of a system (Ex IoT systems). In AOSD, an
executable AO program is created by automatically combining or ‘weaving’ together objects,
methods and aspects to create a program that is not only easier to maintain, but also to reuse [5].
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
3
Aspect-oriented programming (AOP) is one of the most promising methods that developers can
use to produce encapsulated objects that do not have any unnecessary additional functionality.
This type of programming enables the developer to divide crosscutting concerns (i.e., an activity
is also known as the separation of concerns (SoCs) into single logic, i.e., aspects. These aspects
are the modular units of crosscutting concerns. In addition, as mentioned above, new behaviour
can be added to a cloud application without the need to alter or interfere with the base source
code. There are three key components in AOP: joinpoints, pointcuts, and advices [8] [9].
2.1.2. Internet of Things (IoT)
Internet of Things has been defined as a paradigm consisting of a variety of uniquely identifiable
day to day things communicating with one another to form a large scale dynamic network. The
exponential growth in semiconductor domain has resulted in an explosion of usage patterns of
cost-effective sensor based processor system. These systems when get empowered with advanced
communication technologies (e.g., Bluetooth Low Energy, LoRA, ZigBee, Insteon, 3G, 4G, 5G
etc.) converges into an emerging form of technological domain-Internet of Things or in short IoT.
IoT aims to offer, a massive scale, heterogeneous, interoperable, and context-aware, and simplified
application development cum deployment capabilities to the enterprises and end-users. The
Internet of Things (IoT) envisions a world in which everyday objects collaborate using the
Internet in order to provide integrated services for users. This vision defines the IoT as a dynamic
global network requiring global self-managing capabilities, based on standard and interoperable
communication protocols.
2.1.3. BIP Component Framework
BIP stands for (Behaviour-Interaction-Priority) [6] is a formal framework for building complex
systems by coordinating the behaviour of a set of atomic components. Behaviour is defined as a
transition system extended with data and functions. The definition of coordination between
components is layered: in the first layer lie the component interactions, while the second layer
involves dynamic priorities between interactions [10].
2.2. Related Literature Review
Our literature review is focusing on investigating and reviewing the existing works those talks
about utilizing AO in IoT systems, AO and BIP model in IoT and other approached were used to
maintain portability of IoT applications. As stated in [4], there is the decent amount of works
have been done to maintain service discover and service quality using different approaches, in [4]
they have proposed AO to extend and enable IoT application to be more portable. They have
stated that IoT derives various challenges from the Internet in the context of scalability,
heterogeneity, undefined topology and data point information, incomplete metadata, and conflicts
in user preferences. They have investigated the ability to develop an AO intermediate layer to
inject the needed context related functionality. Their proposition works as a layered interface
between IoT applications hardware and data gathered at software.
Few more works such as [1] have proposed a model-based design flow for networked systems
with nodes running an Internet of Things (IoT) operating system. The design flow specifically
targets web service applications of REST style and it is based on a formal modelling language,
the BIP component model. Figure 1 explains their approach to managing IoT applications by
using the BIP model. However, in [7] defined a method to modularize crosscutting concerns in
the BIP component-based design. The authors have defied the BIP using AOP in a formal method
and have given a mathematical representation for the AO and BIP concepts. However, this work
has not proposed a solution for possibly modularization the IoT system concepts and related
common crosscutting concerns.
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No
Figure 1. Model
Aspect-oriented programming is being used to manage systems (such as component
systems) where IoT is considered as one of them. Some of the decent amount of works have been
proposed at this space [11] [12].
3. CASE STUDY
IoT environments have a significant potential to provide for monitoring of water services to
promote the possibility of tracing water flow. Such environments are typically equipped with
many heterogeneous sensors that monitor both wate
example of it is water level display in the tank. IoT water system is used by water
determine the level or amount of water that flow in an open or closed water system. Sensors
usually detect the specific battery energy levels, if the sensing state is low then the brightness of
dashboard light is reduced. It is integrated into the single device to get an alarm or trigger. These
sensors measure water levels within a specified range and continuously mak
water the level.
Figure 2 illustrates basic IoT water system components that represent the dashboard that consist
of data input and sound components. The energy management component is responsible for
keeping track of power level f
controlling on the level of dashboard brightness (LED) by observing the percentage of power
volume.
Energy management is a common crosscutting concern and often poorly modularized in
traditional design approach. Battery
and sensor network can be preserved: (a
turn off dashboard after 10 seconds of no interaction; (b
volume by 25%, and reducing display brightness to 50% after 5 seconds of no interaction; and (c
high energy state) by reducing sound volume and brightness 0%. Implementation energy
management component as an aspect
integration of it with core IoT water system including that management as crosscutting. From
secondary requirement perspective, focus on the energy management concerns that will manifest
as interaction in the IoT system, can be
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, Decem
Figure 1. Model-based design flow for IoT [1]
oriented programming is being used to manage systems (such as component
systems) where IoT is considered as one of them. Some of the decent amount of works have been
IoT environments have a significant potential to provide for monitoring of water services to
promote the possibility of tracing water flow. Such environments are typically equipped with
many heterogeneous sensors that monitor both water and environmental parameters. The best
example of it is water level display in the tank. IoT water system is used by water-level sensors to
determine the level or amount of water that flow in an open or closed water system. Sensors
cific battery energy levels, if the sensing state is low then the brightness of
dashboard light is reduced. It is integrated into the single device to get an alarm or trigger. These
sensors measure water levels within a specified range and continuously make a notification of the
Figure 2 illustrates basic IoT water system components that represent the dashboard that consist
of data input and sound components. The energy management component is responsible for
keeping track of power level for turning off or sleeping the dashboard and responsible for
controlling on the level of dashboard brightness (LED) by observing the percentage of power
Energy management is a common crosscutting concern and often poorly modularized in
design approach. Battery-level applications such as remote controls, dashboard, sound
and sensor network can be preserved: (a-Low energy state) by reducing sound volume by 33%
turn off dashboard after 10 seconds of no interaction; (b-medium energy state) by reducing sound
volume by 25%, and reducing display brightness to 50% after 5 seconds of no interaction; and (c
high energy state) by reducing sound volume and brightness 0%. Implementation energy
management component as an aspect-oriented extension that supports decomposition and
integration of it with core IoT water system including that management as crosscutting. From
secondary requirement perspective, focus on the energy management concerns that will manifest
as interaction in the IoT system, can be encapsulated in loosely coupled aspect module.
6, December 2018
4
oriented programming is being used to manage systems (such as component-based
systems) where IoT is considered as one of them. Some of the decent amount of works have been
IoT environments have a significant potential to provide for monitoring of water services to
promote the possibility of tracing water flow. Such environments are typically equipped with
r and environmental parameters. The best
level sensors to
determine the level or amount of water that flow in an open or closed water system. Sensors
cific battery energy levels, if the sensing state is low then the brightness of
dashboard light is reduced. It is integrated into the single device to get an alarm or trigger. These
e a notification of the
Figure 2 illustrates basic IoT water system components that represent the dashboard that consist
of data input and sound components. The energy management component is responsible for
or turning off or sleeping the dashboard and responsible for
controlling on the level of dashboard brightness (LED) by observing the percentage of power
Energy management is a common crosscutting concern and often poorly modularized in
level applications such as remote controls, dashboard, sound
Low energy state) by reducing sound volume by 33%
by reducing sound
volume by 25%, and reducing display brightness to 50% after 5 seconds of no interaction; and (c-
high energy state) by reducing sound volume and brightness 0%. Implementation energy
supports decomposition and
integration of it with core IoT water system including that management as crosscutting. From
secondary requirement perspective, focus on the energy management concerns that will manifest
encapsulated in loosely coupled aspect module.
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No
Figure 2. Basic IoT Components for Smart Water
Traditionally, EnergyManagment
and Sound) while calculation of energy state is tangled across multiple components. Indeed, the
main difficulty is not the code complexity only, but it is mainly associated with interactions
nodes and component state they effect, which might refer to these interactions as “spaghetti bowl”
[13] [14], as shown in Figure 3.
BIP is a model-driven engineering approach can help in reducing the complexity of IoT
designs through its support a clear separation between architecture and interaction to allow for
compositional design and analysis of systems [7]. However, BIP does not address the design of
crosscutting concerns that do not manifest as code in th
techniques for capturing such requirements. In general, the code of such management interaction
cuts across the system components, so their modularization significantly reduces their
complexity, where the state of practice is to use BIP constraints for some behavior characteristics,
BIP-AOP is an extension on top of such techniques to demonstrate its use to modularization and
reuse. See next sections for more details.
4. PROPOSED BIP-IOT SYSTEM
During a comprehensive analysis of an IoT application, it emerged that concerns related to IoT
architecture and behaviour were most significant. Inspiring BIP with the AOP technique was
conceived to design and support the modularization during the developm
EnergyManagment
Inter
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, Decem
Figure 2. Basic IoT Components for Smart Water
EnergyManagment implementation is scattered across multiple classes (Dashboard
and Sound) while calculation of energy state is tangled across multiple components. Indeed, the
main difficulty is not the code complexity only, but it is mainly associated with interactions
nodes and component state they effect, which might refer to these interactions as “spaghetti bowl”
Figure 3.IoT Interaction Model
driven engineering approach can help in reducing the complexity of IoT
designs through its support a clear separation between architecture and interaction to allow for
compositional design and analysis of systems [7]. However, BIP does not address the design of
crosscutting concerns that do not manifest as code in the system but is complementary to existing
techniques for capturing such requirements. In general, the code of such management interaction
cuts across the system components, so their modularization significantly reduces their
practice is to use BIP constraints for some behavior characteristics,
AOP is an extension on top of such techniques to demonstrate its use to modularization and
reuse. See next sections for more details.
YSTEM DESIGN USING AOP
During a comprehensive analysis of an IoT application, it emerged that concerns related to IoT
architecture and behaviour were most significant. Inspiring BIP with the AOP technique was
conceived to design and support the modularization during the development of IoT applications
EnergyManagment Battery
Dashboard
Inter #4
Inter #3
Inter #5
Inter #6
Water-
Level
Sensor
Inter #1
Inter #2
6, December 2018
5
implementation is scattered across multiple classes (Dashboard
and Sound) while calculation of energy state is tangled across multiple components. Indeed, the
main difficulty is not the code complexity only, but it is mainly associated with interactions IoT
nodes and component state they effect, which might refer to these interactions as “spaghetti bowl”
driven engineering approach can help in reducing the complexity of IoT systems
designs through its support a clear separation between architecture and interaction to allow for
compositional design and analysis of systems [7]. However, BIP does not address the design of
e system but is complementary to existing
techniques for capturing such requirements. In general, the code of such management interaction
cuts across the system components, so their modularization significantly reduces their
practice is to use BIP constraints for some behavior characteristics,
AOP is an extension on top of such techniques to demonstrate its use to modularization and
During a comprehensive analysis of an IoT application, it emerged that concerns related to IoT
architecture and behaviour were most significant. Inspiring BIP with the AOP technique was
ent of IoT applications
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No
[7]. Our design has a formal semantics and makes a clear separation between IoT components to
allow for decomposition IoT design into maintainable and reuse modules. Figure 4 shows
context-aware aspects that is utilized to capture t
components. It presents components, interactions, priorities, and their composition. An atomic
context aspect is the basic low-level computation modules, which encapsulate IoT
information. It is implemented as an aspect and their behaviours defined as a glue
extended with high-level abstractions. Transitions are represented as arrows associated with
context-related IoT components to transfer data and messages between components.
Figure 4 demonstrates artifacts of the proposed aspect layer
generate the BIP-AOP components to be reused in the IoT application. The IoT components are
instantiated from the IoT design definition including the IoT’s appli
system components. Atomic-context components obtained by pulling a set of interactions among
low-level components occur when execution of one component modifies the behaviour of another
one. Such interactions may cause by modificati
accessible by high-level glue-aspect components, including the state of the core IoT application,
communications, protocols, and network.
Figure 4. Standard IoT Design
4.1. The BIP model of the IoT Application
The overall our approach involves converting the application design definition for the IoT
application and its protocol, e.g., REST, into BIP components as shown in Figure 5. Description
of structure allows constructs application
BIP components implemented by the BIP
framework through determining the components’ context parameterization and their
characteristics. These are encaps
an observer for tracing the state space of secondary requirements, i.e., crosscutting concerns, with
the BIP components as mentioned. Validation of properties derived from functional and non
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, Decem
[7]. Our design has a formal semantics and makes a clear separation between IoT components to
allow for decomposition IoT design into maintainable and reuse modules. Figure 4 shows
aware aspects that is utilized to capture the behaviour and interaction concerns of IoT
components. It presents components, interactions, priorities, and their composition. An atomic
level computation modules, which encapsulate IoT-related context
implemented as an aspect and their behaviours defined as a glue-
level abstractions. Transitions are represented as arrows associated with
related IoT components to transfer data and messages between components.
gure 4 demonstrates artifacts of the proposed aspect layer- model design, they are possible to
AOP components to be reused in the IoT application. The IoT components are
instantiated from the IoT design definition including the IoT’s application mapping onto AOP
context components obtained by pulling a set of interactions among
level components occur when execution of one component modifies the behaviour of another
one. Such interactions may cause by modification or extension aspects to any state that is
aspect components, including the state of the core IoT application,
communications, protocols, and network.
Figure 4. Standard IoT Design-based Model with AOP
l of the IoT Application
The overall our approach involves converting the application design definition for the IoT
application and its protocol, e.g., REST, into BIP components as shown in Figure 5. Description
of structure allows constructs application analysis findings back to the IoT design definition. The
BIP components implemented by the BIP-AOP architecture are instantiated from the IoT
framework through determining the components’ context parameterization and their
characteristics. These are encapsulated in the atomic-context component which is formalized as
an observer for tracing the state space of secondary requirements, i.e., crosscutting concerns, with
the BIP components as mentioned. Validation of properties derived from functional and non
6, December 2018
6
[7]. Our design has a formal semantics and makes a clear separation between IoT components to
allow for decomposition IoT design into maintainable and reuse modules. Figure 4 shows
he behaviour and interaction concerns of IoT
components. It presents components, interactions, priorities, and their composition. An atomic-
related context
-aspect that is
level abstractions. Transitions are represented as arrows associated with
model design, they are possible to
AOP components to be reused in the IoT application. The IoT components are
cation mapping onto AOP
context components obtained by pulling a set of interactions among
level components occur when execution of one component modifies the behaviour of another
on or extension aspects to any state that is
aspect components, including the state of the core IoT application,
The overall our approach involves converting the application design definition for the IoT
application and its protocol, e.g., REST, into BIP components as shown in Figure 5. Description
analysis findings back to the IoT design definition. The
AOP architecture are instantiated from the IoT
framework through determining the components’ context parameterization and their
context component which is formalized as
an observer for tracing the state space of secondary requirements, i.e., crosscutting concerns, with
the BIP components as mentioned. Validation of properties derived from functional and non-
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
7
functional IoT requirements takes place with by state-space exploration with BIP components
according to the specified mapping onto system’s component.
Figure 5. Architectural BIP-AOP for IoT Activities
The runtime properties IoT requirements take place by invoking the generated code on the
components and within IoT environment. All IoT constraints are pulled and weaved to/into the
core code modules. In AOP, for instance, abstract aspect used to impose constraints on the
matching of pointcuts and application of advice. Glue-Aspect components can be framed as the
abstractions directly representing the architecture of IoT event-based interactions as detailed
below.
4.2. Initial Context-Aware Aspects
Context primitives allow the IoT application developer to identify scattered and tangled over
multiple codes using existing standards, technologies, and protocols for encapsulating IoT
crosscutting concerns and leverage wherever possible [16]. BIP encourages the development of a
smaller set of defacto standards for IoT concerns (e.g., implement policy and practice to ensure
the monitoring concerns of IoT interactions of distributed components), an interaction is a
software implementation based on behaviour function(s) that transforms groups of data into
context data, and priority is a selection process, we select more sequence of execution flow of
advices out of many other advices.
In context-aware IoT applications, Definitions 1&2 identify the semantic properties for support of
the different type of information that allows applications to adapt their behaviour in response to
interaction in the IoT environment using AOP. These properties are encapsulated in the aspect-
oriented abstract layer.
Definition 1 ( ): An advice encapsulates a set of context data is defined by a
pointcut and a set of joinpoint ℎ ℎ ℎ ∀ ∈ : ⊆ .
Definition 2 ( ): An abstract aspectis a tuple , where is a
transition state consists of relevant context proprieties, which is possibly receiving the new
valuation of the holds the application of computation with the set possible properties in
!.
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
8
Develop scalable approaches for separation of resource-constrained IoT nodes. We adapt some
fundamental IoT-related context concepts into BIP components. IoT nodes interactions require
that applications deal with the inherent unreliability of communications and processes. We have
identified six primary context concerns that require support by developers. They are distributed,
node discovery, limited connectivity, location, proximity, and quality of service. This context
information can be exploited to address the semantic heterogeneities of data exchanged by nodes
interactions, e.g., Atomic-context data of sensors, s1 → d1 means that sensor 1 has produced a
piece of data that is numbered 1. Likewise, s2 → d2 means that sensor 2 has produced a piece of
data that is numbered 2. Sensors will likely be heterogeneous, from different manufacturers, and
collect data, with varying levels of data integrity. Usually, sensors are geographically located.
Sensors may have an owner(s) who will have a control over the collected data, who can access it,
and when. Implementing such input leads to scattered across multiple modules which cause
spaghetti bowl as discussed in section 3.
Interaction Ωserves as the glue-aspect component that encapsulates crosscutting concerns through
their atomic-context components. An interaction involves one or more abstract aspects of
different atomic-context properties and extends advice that realizes data management between the
IoT application components.
Definition 3 (Interaction): An interaction Ωis enabled iff its holds and all its pointcuts are
invoked. An invoked interaction is called from the complete list of possible interactions that
based on the states of the atomic-context components.
The BIP approach defines the invoked interactions and executes its , which defined in the
application context with an atomic-context aspect that is extended by implementing the logic that
interferes with the execution of an IoT-based component used a special kind of inner class. Hook
atomic-context components invoke their corresponding pointcuts given the new value received by
the designated joinpoints. In the following, we consider an atomic-context component with
behavior is filtered the invoked higher-level abstractions dynamically and decrease non-
determinism.
Definition 4 (Priority): Priority" is a set of advices to be applied once a pointcut has been
matched to be found simply by specifying the precedence ordering to the abstract aspects, which
contain the in the glue-aspect components.
Apart from these changes, the weaving semantics for regular aspects does not have to be modified
for IoT-based aspects. Priority " over is used to define the event that should be performed
preceding or succeeding a function execution. BIP-AOP model components are elaborated on
AOP processes. It extends by defining glue-aspects for capturing multiple concerns and
specifying a precedence order on the set of interactions Ω, which is defined the set of transitions
satisfying Definition 4.
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
9
Figure 6. BIP-AOP Architectural IoT Pattern Design
4.3. BIP-AOP Model-Based Architecture
Figure 6 illustrates the architectural BIP-AOP design model in IoT domain. It traces state of every
distributed IoT components based on using observing state approach. In case, the state of
interaction changes, IoT components will be notified at different levels in the system. We define
many BIP components to provide the understanding of using different IoT concepts (thing,
protocol, node, communication, etc.) in an IoT context as discussedearlier. AtomicContextAaspect
is an aspect component acts as an observer into a spectrum of the lower-level model to be a
controller of the IoT components interactions. In other words, it represents the aspect that
implements the advice function whose task is to handle all the crosscutting concern logic (e.g.,
monitoring, security, management, etc.). It relies on AOP inter-type declarations to introduce
context properties and methods to IoT components and APIs. We extend this aspect with the
proposed high-level customization aspect called GlueAspect, to weave custom logic or amend the
normal workflow of interaction in the system. The idea behind defining such aspect is to decouple
the implementation by offering pointcuts, advices, inter-type declarations were defined in
AtomicContextAspect to exclude components dependency. GlueAspect involves a set of joinpoints
such as initialization, call and execution for the InitializationJP, MessageJP, CommunicationJP,
EndJP, ControlJP, ThingJP and so on. GlueAspect offers pointcuts to pick up those joinpoints
and then use advice to inject the logic of the crosscutting concerns. Once running the IoT
application, the state of the one thing object has been changed by the BIP event handler (such as
call, initiation, exit, etc.) all other components objects depending on it will be notified and take
appropriate action as shown in Figure 6. The RegistryAspect then takes responsibility to register
and monitor all IoT components interactions states.
5. CONCLUSIONS
This paper has proposed an integrated model of using AOP and BIP to provide a better
modularization of cross-cutting concerns in of IoT applications. The proposed model
demonstrates crosscutting issues in IoT application and highlights how AOP addresses them.
Specifically, the purpose of this paper is to provide a roadmap for using BIP model components
with AOP to deal effectively with crosscuts in IoT application design, systems interaction, and
integration. In the future, we will work on conducting a primary experiment to showcasing the
efficiency and effectiveness of using our model in encapsulating, modularizing and separating
crosscutting concerns obliviously.
call
init
End
[ev==Exit]
yield
call
Exit
weaves
weaves
weaves
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
10
REFERENCES
[1] Lekidis, A., Stachtiari, E., Katsaros, P., Bozga, M., &Georgiadis, C. K. (2018). Model‐based design
of IoT systems with the BIP component framework. Software: Practice and Experience, 48(6), 1167-
1194.
[2] Tselentis, G., &Galis, A. (Eds.). (2010). Towards the future Internet: emerging trends from European
research. IOS press.
[3] Borgia, E (2014), "The Internet of Things vision: Key features, applications and open issues",
Computer Communications,Vol.54, pp.1-31.
[4] Balakrishnan, S. M., &Sangaiah, A. K. (2015). Aspect oriented middleware for Internet of things: a
state-of-the art survey of service discovery approaches. Int. J. Intell. Eng. Syst, 8(4), 16-28.
[5] Shanmughaneethi, V., Praveen, R. Y., &Swamynathan, S. (2012). CIVD: detection of command
injection vulnerabilities in web services through aspect–oriented programming. International Journal
of Computer Applications in Technology, 44(4), 312-320.
[6] Basu, A., Bensalem, B., Bozga, M., Combaz, J., Jaber, M., Nguyen, T. H., &Sifakis, J. (2011).
Rigorous component-based system design using the BIP framework. IEEE software, 28(3), 41-48.
[7] El-Hokayem, A., Falcone, Y., &Jaber, M. (2016, July). Modularizing crosscutting concerns in
component-based systems. In International Conference on Software Engineering and Formal
Methods (pp. 367-385). Springer, Cham.
[8] Djoko, S. D., Douence, R., &Fradet, P. (2012). Aspects preserving properties. Science of Computer
Programming, 77(3), 393-422.
[9] Katz, S. (2006). Aspect categories and classes of temporal properties. In Transactions on aspect-
oriented software development I (pp. 106-134). Springer, Berlin, Heidelberg.
[10] Verimag: BIP Tools, http://www-verimag.imag.fr/BIP-Tools,93.html
[11] Nazarpour, H., Falcone, Y., Jaber, M., Bensalem, S., &Bozga, M. (2017). Monitoring Distributed
Component-Based Systems. arXiv preprint arXiv:1705.05242.
[12] Ma, K., Sun, R., & Abraham, A. (2013). Toward a Module-centralized and Aspect-oriented
Monitoring Framework in Clouds. J. UCS, 19(15), 2241-2265.
[13] Abbes, M., Khomh, F., Gueheneuc, Y. G., &Antoniol, G. (2011, March). An empirical study of the
impact of two antipatterns, blob and spaghetti code, on program comprehension. In Software
maintenance and reengineering (CSMR), 2011 15th European conference on (pp. 181-190). IEEE.
[14] Mikkonen, T., &Taivalsaari, A. (2007). Web Applications: Spaghetti code for the 21st century.
[15] Bilal, M. (2017). A Review of Internet of Things Architecture, Technologies and Analysis
Smartphone-based Attacks Against 3D printers. arXiv preprint arXiv:1708.04560.
[16] Perera, C., Zaslavsky, A., Christen, P., Compton, M., &Georgakopoulos, D. (2013, June). Context-
aware sensor search, selection and ranking model for internet of things middleware. In Mobile Data
Management (MDM), 2013 IEEE 14th International Conference on (Vol. 1, pp. 314-322). IEEE.
[17] AlSobeh, A., & Clyde, S. Unified Conceptual Model for Joinpoints in Distributed Transactions.
In ICSE (Vol. 14, pp. 8-15).
11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No
Authors
Dr.AnasAlSobeh, Dr.AlSobeh received his B.Sc. and M.Sc. degrees in computer
information systems from Yarmouk Univers
also received PhD degree in computer science from Utah State University/USA with
honour in Dec. 2015. He joined Yarmouk University academic staff in 2016. He is
currently an assistant professor of computer information
interests include web technology, e
distributed systems, cloud systems, Internet of things (IoT) and data modelling. He
has many scientific publications. He also has European
active member of credit mobility projects to exchange academic members.
Aws A. Magableh is an Assistant Professor at the Faculty of Information Technology
and Computer Science in Yarmouk University, Jordan. He obtained his PhD from th
National University of Malaysia (UKM) in 2015, he obtained his master in Software
Engineering from University Malaysia (UM) in 2008, and Bachelor’s in Software
Engineering from the Hashemite University in 2006. His research interests include
Web technology, Web Services, Cloud Computing, Aspect
Engineering, System design and modelling. Aws is very passionate about Learning &
Development (L&D) and I have been immersed in the training industries with Nokia,
Microsoft and Huawei for the past 10 years focusing on building skillsets
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, Decem
Dr.AlSobeh received his B.Sc. and M.Sc. degrees in computer
information systems from Yarmouk University in 2007 and 2010, respectively. He
also received PhD degree in computer science from Utah State University/USA with
honour in Dec. 2015. He joined Yarmouk University academic staff in 2016. He is
currently an assistant professor of computer information systems (CIS). His research
interests include web technology, e-learning systems, software engineering,
distributed systems, cloud systems, Internet of things (IoT) and data modelling. He
has many scientific publications. He also has European-funded projects. He is also an
active member of credit mobility projects to exchange academic members.
Aws A. Magableh is an Assistant Professor at the Faculty of Information Technology
and Computer Science in Yarmouk University, Jordan. He obtained his PhD from the
National University of Malaysia (UKM) in 2015, he obtained his master in Software
Engineering from University Malaysia (UM) in 2008, and Bachelor’s in Software
Engineering from the Hashemite University in 2006. His research interests include
gy, Web Services, Cloud Computing, Aspect-Orientation, Software
Engineering, System design and modelling. Aws is very passionate about Learning &
Development (L&D) and I have been immersed in the training industries with Nokia,
past 10 years focusing on building skillsets
6, December 2018
11