The Internet of Things Vision Key Features, Applications and Open Issues
The Internet of Things Vision Key Features, Applications and Open Issues
Computer Communications
journal homepage: www.elsevier.com/locate/comcom
Review
The Internet of Things vision: Key features, applications and open issues
Eleonora Borgia
Institute of Informatics and Telematics (IIT), Italian National Research Council (CNR), via G. Moruzzi 1, 56124 Pisa, Italy
a r t i c l e
i n f o
Article history:
Received 12 May 2014
Received in revised form 16 September 2014
Accepted 16 September 2014
Available online 14 October 2014
Keywords:
Internet of Things (IoT)
RFIDs
Sensors
Machine-to-Machine (M2M)
communications
Standardization
a b s t r a c t
The Internet of Things (IoT) is a new paradigm that combines aspects and technologies coming from different approaches. Ubiquitous computing, pervasive computing, Internet Protocol, sensing technologies,
communication technologies, and embedded devices are merged together in order to form a system
where the real and digital worlds meet and are continuously in symbiotic interaction. The smart object
is the building block of the IoT vision. By putting intelligence into everyday objects, they are turned into
smart objects able not only to collect information from the environment and interact/control the physical
world, but also to be interconnected, to each other, through Internet to exchange data and information.
The expected huge number of interconnected devices and the signicant amount of available data open
new opportunities to create services that will bring tangible benets to the society, environment, economy and individual citizens. In this paper we present the key features and the driver technologies of IoT.
In addition to identifying the application scenarios and the correspondent potential applications, we
focus on research challenges and open issues to be faced for the IoT realization in the real world.
2014 Elsevier B.V. All rights reserved.
1. Introduction
Due to the huge advancements in the elds of electronics and
the deployments of wireless communication systems, mobile
devices and ubiquitous services (providing anytime-anywhere
connectivity to the users) spread rapidly over the past decade.
Today, however, the role played by devices is no longer limited
to connect users to the Internet, but it has been expanding becoming an opportunity to interlink the physical world with the cyber
world [1], leading to the emergence of Cyber-Physical Systems
(CPS) [2,3]. The notion of CPS refers to a next generation of embedded ICT systems where computation and networking are integrated with physical processes and they control and manage
their dynamics and make them more efcient, reliable, adaptable
and secure [49]. Information about physical processes, for example gathered through sensors, are transferred, processed, and used
in the digital world, but they may also affect physical processes
through feedback loops, for example by using actuators [1]. The
peculiarity of CPS is that the ICT system is designed together with
the physical components to maximize the overall efciency, thus
being in contrast with classic embedded systems where the goal
is to include electronics/computing/communication/abstraction
in an already operating physical world.
Tel.: +39 050 315 2407; fax: +39 050 315 2593.
E-mail address: [email protected]
http://dx.doi.org/10.1016/j.comcom.2014.09.008
0140-3664/ 2014 Elsevier B.V. All rights reserved.
CPS will have a great impact on the future society and humans,
and their social networks, will play a central role in bridging the
cyber, physical and social worlds [1013]. Through their interactions with ICT devices, they will gain access to the virtual world
affecting the way information is distributed and they will give their
contribution to build/modify the cyber infrastructure.
The economic value associated with the CPS will also be large.
In the 2013 report,1 McKinsey Global Institute has identied twelve
technologies that, by 2025, will have massive, economically disruptive impact, driving profound changes in many dimensions: in citizens lives, in business and across the global economy. Specically,
four technologies fall within CPS: (i) automation of knowledge work,
(ii) Internet of Things, (iii) advanced robotics, and (iv) autonomous/
near-autonomous vehicles. Among them, the Internet of Things (IoT),
with an estimated value of 36 trillion of dollars, is considered the CPS
paradigm with the highest economic impact [14].
IoT refers to an emerging paradigm consisting of a continuum of
uniquely addressable things communicating one another to form a
worldwide dynamic network. The origin of IoT has been attributed
to members of the Auto-ID Center at MIT, the development community of the Radio-Frequency Identication (RFID), around 2000 [15].
Their idea was visionary: they aimed at discovering information
about a tagged object by browsing an Internet address or a database
entry corresponding to a particular RFID. To address the above idea,
1
http://www.slideshare.net/brandsynapse/mgi-disruptive-technologiesfullreport
may2013?related=1.
efciency at multiple levels aiming to: (i) a more aware and optimized usage of the offered resources, (ii) a minimization of
environmental impact, for example by reducing CO2 emissions, and
(iii) a tangible increase in the life quality in terms of safety, health, and
wellness. Indeed, a smart city is a city that operates simultaneously
on two levels: one physical and one virtual. The smart city provides
a management of its services (e.g., transport, energy, lighting,
waste management, entertainment) through the widespread usage
of ICT technologies. Such technologies provide a logical/virtual
infrastructure that controls and coordinates the physical infrastructure in order to adapt the city services to the actual citizen
needs, while reducing waste and making sustainable the city
[21]. IoT will be essential to turn a traditional city into a smart city
and the traditional and more emerging sectors such as mobility,
buildings, energy, living, governance will also benet of it. For
example, smart mobility services will be created to provide effective tools to the citizens to accurately plan their journeys with public/private transportations, bike/car/van sharing services or multimodal transport systems. Intelligent trafc lights and static/mobile
sensors spread in the city can be used to automatically manage the
trafc, to monitor/predict situations of trafc jam and to warn
drivers about the presence of critical situations, also proposing
them alternative routes/means in real time. At the same time, data
gathered by sensors [22,23] will help municipalities to monitor the
condition of the roads (e.g., presence of potholes, slippery, not
draining roads), to plan the waste collection service (e.g., volumetric sensors may measure lling level of trashcans and report to
sanitation headquarters when full/close to full), to perform environmental monitoring and territorial prevention by measuring
water level, air pollution, presence of a certain component (i.e.,
percentage of allergenic pollen or radiation in the air) [24]. Energy
management will also be optimized by using a smart grid for monitoring and modify consumes in town and buildings through actuators and by using renewable energies for the production [2528].
Fig. 2 provides a schematic representation of the smart city. It will
be equipped with a network of sensors, cameras, screens, speakers,
smart meters, and thermostats that will collect information. The
gathered information, the so-called Big Data (the name refers
to its large volume and its heterogeneity in terms of content and
data representation), will not be used for the improvement of just
a single service/application, but it will be shared among different
services [15]. To this aim, a common platform for operational management of the city a sort of City Operating System will be
responsible for managing, storing, analyzing, processing, and forwarding it where needed within the city to improve services and
adapting to human needs. This management layer, no longer vertical but horizontal, will ensure interoperability, coordination, and
optimization of individual services/applications through the analysis of information ows. Citizens/authorities will access the services offered by the platform through their applications, will
consume them and will actively participate by creating additional
content that will be provided as further input to the City Operating
System.
As also highlighted by the above example, IoT will bring tangible
benets to the environment, the society, individuals and business
with the creation of new intelligent applications, services and products in various domains whilst ensuring the protection and privacy
of information and content exchanged [29]. The economic value
associated with IoT will be large and the benets enormous: for
example, it is envisioned a US GDP increase by 25% by 2025 with
a faster productivity growth and an increase of job creation [30].
IoT will offer a potential to affect the economic activity across industries, inuencing their strategic decisions, their investments and
their productivity. Currently, about 20% of the GDP comes from
industries working in the digital, while the majority of the GDP
(about 80%) comes from primarily physical industries. IoT will bring
those industries that are primarily physical (i.e., agriculture, construction, manufacturing, energy, transportation, healthcare) closer
to the cyber world and will radically change their way of making
business. At the same time, thanks to IoT, the largest software companies will make a shift to the physical world. For instance, recently
Google acquired a company producing thermostats to enter its
trademarks in the smart home world. Another example is IBM that
is interested in intelligent solutions for trafc management and
smart grid. Future business and marketing strategies of Google,
Facebook, Apple, IBM are clearly delineated: the future market is
the IoT, where capital investments are focused and where it is essential to be present and make great effort not to be left behind and lose
its own competitiveness.
From the above description it is clear that, for the IoT vision to
successfully emerge, a number of different technical challenges
need to be faced and solved. They range from hardware, architecture, communication, discovery, data processing, data and network
management, power and energy storage, security and privacy to cite
a few of them. The main purpose of this paper is to draw a picture of
the IoT paradigm. We will focus on the technologies enabling the
underlying IoT fabric, and on the current IoT research activities,
highlighting the most signicant contributions and solutions proposed over the recent years. Emphasis is also put on standardization
activities, which represent a central pillar for the IoT realization.
Indeed, it is a common understanding that an effort is required to
design standard solutions thus avoiding their excessive fragmentation. The industrial perspective has also a very important role in the
success of the IoT paradigm. We will discuss the key strategic industrial priorities providing an overview of the main sectors where
industries are making signicant investments for the mid- and longterm.
The remainder of the paper is organized as follows. Section 2
introduces the concepts at the basis of the IoT paradigm and the different visions expressed over the years by different bodies. Section 3
is devoted to the presentation of the key technologies involved in
IoT. Section 4 explores the impact of IoT on the economy and on
the society by providing an overview of the potential IoT applications. In Section 5 we analyze the IoT requirements, focusing also
on those specic features needed to support the IoT trafc, while
Section 6 identies the major milestones and challenges for the
IoT deployment in the real world. In Section 7, we give an overview
of the growing number of initiatives connected with the IoT domain,
while in Section 8 we provide a brief summary of other emerging
aspects that revolve around the IoT world. Finally, Section 9 concludes the paper.
2. IoT: different visions for a novel paradigm
The growing interest that scientic research as well as marketing and sales strategies raises onto the IoT paradigm has the
Fig. 4. Horizontal representation for IoT applications. A non-exhaustive list of technologies and protocols is shown.
Table 1
Characteristics of the main technologies used for collecting data in IoT.
Technology
Example of devices
Capabilities
Data
rate
Maximum
distance
Reference standard
Application
RFID
Identication,
storing,
communication
Sensing, storing,
processing,
communication
Communication
Up to
640 kbps
310 m
ISO/IEC 18000
250 kbps
10100 m
106
424 kbps
610 cm
ISO/IEC18092/ECMA-340,
ISO/IEC21481/ECMA-352,
ISO/IEC14443
Sensor
NFC
http://nfc-forum.org/what-is-nfc/.
Reference
standard
Transmission
medium
Frequency bands
Data rate
Maximum distance
Limitations
Ethernet
IEEE 802.3
u/z
Twisted-pair
copper wire,
coaxial cable,
optical ber
10 Mbps,
up to 100 Gbps
100 m,
up to 5070 km
Shared medium,
physical connection
among devices
WiFi
IEEE 802.11
a/b/g/n
Wireless
2.4 GHz,
5 GHz
154600 Mbps
up to 100 m
WiMAX
IEEE 802.16
a/d/e/m
Wireless
266 GHz
up to 70 Mbps
Up to 5080 km
xDLS
ADSL,
ADSL 2+,
VDSL
Twisted-pair
copper wire,
coaxial cable
Up to 2.2 MHz
5.41.3 km
Asymmetrical
communication
Cellular
GSM, GPRS,
UMTS,
HSPA+, LTE
Wireless
9001800 MHz
21001900 MHz
8002600 MHz
Macro/micro/pico/
femto cells
(10 m to 100 km)
Limited wireless
spectrum
Satellite
BSM,
DVB-S,
Wireless
48 GHz (C band),
1018 GHz (Ku
band),
1831 GHz (Ka band)
Electrical
power system
130 MHz
>100 Mbps
Up to 1500 m
to the premise,
up to 100 m
between devices
Mutual interference
with other technologies
DVB-TS
PLC
HomePlug AV,
IEEE 1901
4. Application domains
IoT has huge potentialities for developing new intelligent applications in nearly every eld. This is mainly due to its double ability
to perform situated sensing (allowing for instance to collect information about natural phenomena, medical parameters, or user
habits), and to offer them tailored services. Irrespective of the
application eld, such applications aim at enhancing the quality
of every-day life, and will have a profound impact on the economy
and society. They will also cover different aspects: personal, social,
societal, medical, environmental, logistics to cite a few. The various
applications can be grouped in three major domains: (A) industrial
domain, (B) smart city domain, and (C) health well-being domain.
Each domain is not isolated from the others but it is partially overlapped since some applications are shared. An example is the
tracking of products, which is in common between the industrial
and the health well-being domains as it can be used for monitoring
cargos or foods, but it is also able to monitor the delivery of pharmaceutical products.
Fig. 5 shows the subdivision in the aforementioned domains
and provides a non-exhaustive list of IoT applications for each of
them. Note that not all IoT applications have currently the same
level of maturity. Some applications, typically the simplest and
the most intuitive for the user, are already part of our daily lives.
Many others are still in an experimental phase as they require
greater cooperation between the various actors. Finally, others
are more futuristic and are at an early stage. The remaining of
the section provides the description of the most prominent applications for each domain.
4.1. Industrial domain
The IoT can be exploited in all industrial activities involving
commercial or nancial transactions between companies, organizations and other entities. Indicative examples are logistics, manufacturing, monitoring of processes, service sector, banking,
nancial governmental authorities, intermediaries, etc.
4.1.1. Logistic and product lifetime management
A rst relevant example of an industrial IoT application is the
logistics and supply chain management. RFIDs can be attached to
objects and used to identify materials and goods, be they garments,
furniture, equipment, food, and liquids [119]. Their use help to
manage efciently warehouses and retails, and to simplify the
inventory by providing accurate knowledge of current inventory,
while reducing inventory inaccuracies. The entire lifecycle of
objects can be tracked too [120]. For example, RFID readers
installed along the production plant allow to monitor the production process, while the label can be traced throughout the entire
supply chain (e.g., packaging, transportation, warehousing, sale to
the customer, disposal). Advanced IoT systems, composed of
RFID-equipped items and smart shelves tracking items in real time,
may help to reduce material waste, thus lowering costs and
improving prot margins for both retailers and manufacturers.
For example, it has been estimated an approximate 8.3% reduction
on sales if shelves remain partially free of merchandise [121].
Underproduction and overproduction may reduce drastically by
having a correct estimate of needed items, which can be inferred
by analyzing data collected by smart shelves. In addition, the
real-time analysis by sensors allows to identify product deterioration events, which is of vital importance for food and liquids. For
example, to ensure the freshness of perishables (e.g., fruits, vegetables, frozen food), sensors may monitor continuously temperature
and humidity inside storages or cold storages, and actuators may
modify them to make optimal the conservation of contained food.
Additionally, product integrity may be guaranteed by using RFIDbased authentication processes. Other interesting IoT applications
are intelligent shopping systems. Such systems monitor users purchasing habits by tracking their mobile phones and guide them in
shops/supermarkets/malls suggesting discounted products or
helping in fast payment operations (e.g., automatic check-out
using biometrics).
4.1.2. Agriculture and breeding
IoT may assist in agriculture and breeding. Indeed, regulations
for traceability of animals require a continuous monitoring of animals and of their movements in order to report promptly to the
appropriate authorities any relevant events, e.g., diseases. Usage
of IoT identication systems (e.g., RFID, sensors) allows to identify
and monitor animals [122], and to isolate any infected animals
from the healthy ones, thus avoiding the spread of contagious disease. Advanced microchips may store information about the status
of the animal (e.g., demographic information, veterinary checks,
contracted diseases, vaccines performed) [122] or transmit information about the animals body health (e.g., temperature) to
streamline animal health certication, to control trade and
imports, and to avoid possible frauds. By analyzing collected data,
10
by wearable sensors on remen (e.g., due to fast or irregular heartbeat) may also provide a reliable way for monitoring the health
status of rescue persons.
4.3. Health well-being domain
IoT will play an essential role to develop intelligent services for
supporting and improving peoples and societys activities. These
range from enabling citizens and communities to get involved in
administration and government decisions (e.g., e-participation),
allowing people to live independently (e-inclusion) or to maintain
their social relationships, to improve the health and social care.
4.3.1. Medical and healthcare
The medical and healthcare sector will be strongly affected by
IoT. Advanced sensing devices allow real-time monitoring of medical parameters and vital functions (e.g., temperature, blood pressure, heart rate, cholesterol level). The gathered data is then
transmitted via standard or specic communication technologies
(e.g., Bluetooth, ZigBee, WirelessHART, ISA100) and made available
to medical personnel for diagnosis and control of the patients
health. Body Area Networks (BANs), formed by wearable devices
connected to each other, allow doctors to continue the remote
patients monitoring out of the hospital [142]. Other relevant applications are related to the identication of materials and medical
instrumentations. For example, the application of smart labels will
ensure to accurate tracking objects to prevent equipment to be lost
or stolen, or that material is left inside a patient during an operation (for example gauze or other small objects). The use of smart
labels is also important to facilitate the inventory of medical equipment. Efcient hospital management services include energy optimization and HVAC systems (similar to those discussed in Sections
4.2.2 and 4.2.3) and safety access systems. The latter refer to the
digital control of accesses enabled by smart badges (e.g., equipped
with RFIDs) to limit the access of some hospital areas to authorized
personnel only. The hospital will also be t out with a number of
Internet access points (totem) - representing a mean within
the hospital to book exams or to check where/when the medical
exams will be performed. Beds will be equipped with smart touchscreen terminals, allowing patients to access to entertainment services, TV channels, Internet, and to communicate with their
families. In addition, young patients may used them to participate
in school educational services (e.g., virtual class, accessing to
archived lessons).
4.3.2. Independent living
IoT may also provide several advantages for improving the
quality of life of citizens, for example supporting independent living (e-inclusion) and proving lifestyle suggestions for well-being.
The e-inclusion focuses mainly on specic categories of people,
such as aging or disabled population (see for example the Ambient
Assisted Living (AAL) Joint Programme by European Commission),
allowing them be active in society. Monitoring of condition/status
of elderly and emulating the medical consultation at home are key
applications. By monitoring real-time physiological signals captured through sensors, the system will be able to set off medical
alarms (e.g., in case of detected falls [143]), to suggest possible hospitalization, to diagnose dementia (e.g., Parkinson, Alzheimer) in
the earliest stage by observing deviations from normal behaviors.
Personal assistants available on PC screens or TV will stimulate
persons to do exercise [144], and guiding them in searching objects
in the house. In addition, as elderly people often have limited
mobility and may be housebound, social networks will allow
elderly to connect, communicate and exchange status, feelings
and ideas, and participate in debates and discussion groups
[145]. Obviously, simplied and customized interfaces and the
11
12
Requirement description
Heterogeneity
Scalability
Cost minimization
Self-*
Flexibility
QoS
Secure environment
Table 4
IoT communication features.
Feature
Feature description
abstraction of the different underlying networks (e.g., wired, wireless, cellular), support for
different communication modes (e.g., access point-based, p2p fashion)
support of anycast/unicast/multicast/broadcast transmissions, dynamic replacing of broadcast
with multicast/anycast to reduce network load
handling simultaneous or nearly simultaneous transmissions from huge number of devices
(i.e., efcient MAC protocols)
guarantee of connectivity/reliable transmissions based on different solutions (e.g., link
adaptation protocols, modulation/coding schemes, multi-path establishment)
management of priority levels of services and communications services (e.g., preemption
mechanisms)
optimization of communication paths based on different policies (e.g., network cost, delay,
transmission failures), dynamic metric selection
seamless roaming and mobility, communication management towards stationary and
low-mobile devices
managing communication towards sleeping devices
include mechanisms for reducing energy consumption
functions for supporting data acknowledgment, failure notications, and interaction mode
management of data trafc with different trafc proles (e.g., continuous transmissions, long
periods between two data transmissions, small amount of transmitted data, burst of data,
bidirectional/unidirectional transmissions)
support of data trafc with different time requirements (e.g., time-controlled trafc,
delay-tolerant trafc, extremely low-latency trafc)
report the device/gateway location to other devices/applications continuously/upon request
integrity of communications and timestamps, anonymity of identity and location, detection
of abnormal events
Addressing modes
Massive device transmission
High reliability
Enhanced access priority
Path selection
Mobility
Sleeping devices
Low power consumption
Notication and interaction
Trafc prole
Time-dependent trafc
Location reporting support
Secure connections
13
14
Fig. 7. The high-level ETSI M2M reference architecture (Source: ETSI M2M).
same time, it aims to: (i) lower operational costs of network operators when offering MTC services, (ii) reduce the impact and effort
of handling large MTC groups, (iii) optimize network operations to
minimize impact on device battery power usage, and (iv) stimulate
the development of new MTC applications [148,161].
Fig. 8 depicts an overview of 3GPP MTC architecture, highlighting also the basic elements: MTC device, MTC server, and MTC
Interworking Function, which is in charge of authorizing the communications and triggering the devices. As in the previous case,
three different domains can be distinguished: the MTC device
domain, the communication network domain, and the MTC
application domain. The peculiarity of this architecture lies in
the communication network that in this case is a 3GPP mobile network. Specically, since the dominant technology is LTE-Advanced
[162], a multi-tier connectivity can be offered. Indeed, macrocells
with LTEs base stations (eNBs) can provide a large and ubiquitous
coverage to the MTC devices as well as manage their high mobility
[94,163]. In contrast, cells with relay nodes (RNs), picocell with
eNBs, and femtocells with home eNBs (HeNBs), bring link connectivity close to MTC devices, increasing reliability and the overall
system capacity [164].
Two different communication models are envisaged. On the one
hand, an MTC user can access and control the MTC devices through
one or more MTC servers. In this case, the MTC server is provided
by an operator, and the user accesses the server through APIs specied by the operator itself. The MTC server location does not modify the access modality. MTC servers can be positioned in the
operator domain or placed outside the operator domain, but the
access procedure is the same. On the other hand, the MTC devices
can communicate with each other directly, without the help of
intermediaries, regardless of the operator to which are connected.
15
RFID tag ID and, by using such virtual address, asks for an IPv6
address to the DHCP server. It also maintains updated the mapping
in a table, which is checked every time it needs to forward packets
generated from RFID to the outside world or vice versa. Recently,
alternative solutions are proposed, which are independent from
the RFID addressing scheme, and do not require any address-translation mechanism. For example, in [168] each RFID network is connected to the IP network via the so-called RFIPv6 gateway and
nodes outside the RFID network can nd information on a specic
tag via the RFIPv6 gateway.
Another important research challenge is connected with the
address retrieval: how can we retrieve the address associated with
an object starting from the available information about that
object? In addition, how can we determine which is the object
associated with a given address? Essentially, these issues are similar to those solved, in the legacy Internet architecture, by the classic Dynamic Name Service (DNS). Within the RFID context, this role
is played by the Object Name Service (ONS) [169,170], which
implements a simple lookup service that resolves the EPC number
in the EPCIS server address of the manufacturer of the searched tag.
To ensure scalability and to maintain separate information related
to different object classes, ONS is organized as a hierarchy of
lookup services. Basically, the lookup process consists in the following steps: (i) a rst check in the Root OSN, which contains
the Local ONS addresses for each EPC Manager Number; (ii) a second check in the Local ONS, which identies the address of the
EPCIS server associated with the specic EPC, and (iii) a direct
access to the EPCIS server where the desired information is stored.
Unfortunately, ONS cannot be used for the reverse process, i.e.,
retrieving information associated to a specic EPC number. To this
aim, the Object Code Mapping Service (OCMS) has been proposed.
To improve the scalability of OCMS service, both in the storage and
search capabilities, authors of [171] propose a web service where
the repository of tag description is implemented as a P2P network.
Major open issues consist in the lack of knowledge about the
robustness of services such as OCMS, when used in large-scale systems. Furthermore, ONS and OCMS work only within the RFID
environment. Solutions for different technologies, such sensors
and other devices, are missing.
6.3. Objects mobility
A large part of IoT objects are not xed, but have a certain
degree of mobility (e.g., products in an assembly line and transported by containers). As a consequence, supporting and managing
efciently the mobility of this large amount of objects is of paramount importance.
A feasible solution is the use of MobileIPv6 [172], where, to each
mobile node (the mobile object in IoT context) are assigned a permanent address on its home network (home address) and a temporary address on each network who is visiting (Care-of Address
(CoA)). Two different agents storing the information about mobile
nodes location are used: the home agent stores the permanent
address, while the foreign agent is used when the node visits a foreign network, to announce the CoA. One of the main home agent
tasks is to intercept packets destined to a mobile node, and redirect
them to the mobile node using the CoA announced through an IP
tunnel. However, recently, it has been shown that these
approaches may not be sufciently scalable in IoT environments
due to a huge amount of signaling trafc to discover devices and
to maintain updated their positions. To deal with the above issues,
in [173] authors exploit a natural phenomenon, named object group
mobility (OGM). According to OGM, objects usually move in group
and aggregate around a carrier (e.g., a person, a vehicle, a box),
named group master (GM). GM is the entity that takes care of
assigning addresses to objects that belong to its home network,
16
17
footprint device, constraints on communication bandwidth, security mechanisms), can be extended to resource-constrained IoT
mobile devices. Its peculiar feature is the usage of SMS for wake
up and bootstrapping operations. Recently, the OMA Lightweight
M2M (LWM2M) management protocol [205] has also been proposed. It is considered the successor of OMA-DM and has been
designed targeting constrained devices. It is built on top of COAP
and features REST-based architecture. SMSs are used for wakeup
operations but also for other management operations (i.e., GET,
PUT, POST).
6.7. Data management
Managing Big Data is extremely challenging due to the different
data properties. IoT data will be sampled by a variety of objects and
sensors, each having different methods for data representation and
semantics. Moreover, the large number of IoT devices will lead to a
rapid explosion of the scale of collected data (petabytes and more).
Collected data will have often a timespace relationship (i.e., position and time information) to describe the dynamics of the objects
location (i.e., the so-called pervasive location information). In contrast with todays applications, where data is usually consumed by
single applications, data will be shared among different IoT applications, thus requiring a greater interoperability. The last data
property is connected with the data multi-dimensionality, i.e.,
the integration of different type of sensor data to monitor simultaneously a number of indicators, such as temperature, pressure, light.
IoT data properties generate new data management issues that
change the way the system works. Indeed, IoT data management
moves from being a classic ofine system, where storage/query
processing/transaction operations are managed ofine, to be an
online/ofine system, where processing and analysis are also
real-time.
Scalability of data is an important problem. Efcient indexing
methods need to be developed in order to nd a specic data item
easily. Suitable representation schemes are also needed to capture
the heterogeneity of objects and metadata, and to enable their selfdescription. In addition, interoperability among different data is
also important. Approaches introducing an abstraction level may
solve them. Ontologies and semantics look to be promising. For
example, Web Ontology Language (OWL) [206] is a family of language for representing ontology in the web that can be adapted
to IoT. Effective methods should be also developed for ltering
redundant data or events. For example, an efcient RFID data ltering solution has been proposed in the supply chain context [207].
The research attention should be also devoted to nding suitable
languages for accessing data. Structured Query Language (SQL) is
the most popular language for querying structured data. However,
data in IoT will be mainly semi-structured, hence alternative solutions should be considered. The XML Query (XQuery) language
[208] seems a suitable choice allowing to query structured data
as well as less structured data. For what concern data process modeling and data interoperability issues, the SOA approach can provide suitable solutions. For instance, in [209], a SOA-based
scheme has been proposed for managing heterogeneous data from
different devices. Specically, the proposed scheme is implemented as Web Service. Features implemented by devices are
encapsulated into services, and a common interface for invoking
services is dened. However, even though SAO-based approaches
are encouraging, several other issues need to be solved, e.g., to
guarantee the respect of the ACID (i.e., Atomicity, Consistency,
Isolation, Durability) properties.
The data archiving is another important problem covering a
number of correlated challenges. Firstly, as time passes and data
may become obsolete, suitable policies to retain or not data are
required. Inadequate policies may lead to loss of data, inaccurate
18
Their collection is extremely important. By exploiting the statistical representations of IoT trafc ows, it will be possible to design
services tailored on users needs and requirements.
6.9. Security
Security issues are central in IoT as they may occur at various
levels, investing technology as well as ethical and privacy issues.
To ensure security of data, services and entire IoT system, a series
of properties, such as condentiality, integrity, authentication,
authorization, non-repudiation, availability, and privacy, must be
guaranteed [228,229]. This is extremely challenging due to the
IoT environmental characteristics. The scarce of objects resources
limits computation and transmission operations, while the use of
short-range low-data rate protocols greatly affects packets size
and results in a fragmentation of packets. For example, an excessive fragmentation may simplify network attacks (DoS attacks),
while lowering the overall system performance. Finally, devices
heterogeneity makes necessary to dene a minimum set of functions implemented by all the objects to support interoperability
between devices and different solutions.
We split the remaining subsection in four parts, each corresponding to a different set of security requirements, and we discuss possible solutions in order to meet them. The four identied
requirements are:
(i)
(ii)
(iii)
(iv)
Depending on the application, a part of or all the above requirements should be satised. For example, let us focus on an application to monitor the medical parameters of a patient. The
monitoring activity starts when the patient arrives at the hospital
and wearable devices are used to monitor her status. The monitoring activity is performed during her stay in the hospital and for a
control period after her return at home. First of all, there must be
a correct identication and mapping between the wearable devices
and the monitored patient, and personal data must be stored safely
on the device (requirement (i)). The device has to securely join IoT,
and the transmission of collected data has to ensure integrity and
condentiality (requirement (ii)). Data is then maintained on a
remote server where secure storage mechanisms are essential
(requirement (iii)). Finally, data access should be guaranteed only
to authorized people such as doctors, who use it to monitor the
patients condition (requirement (iv)).
6.9.1. Secure authentication and authorization
SIM cards, and the most recent MIM cards (M2M SIM cards),
which have been designed specically for IoT applications, are elements that may deal efciently with security concerns. Among the
implemented features, they secure the identity of communicating
devices, perform secure data storage, and guarantee secure
authentication and authorization operations by using for example
PIN, PUK and Public Key Infrastructure (PKI).
6.9.2. Secure bootstrapping of objects and transmission of data
Bootstrapping operations refer to processing operations
required before the network becomes active and available. These
include installing and conguring credentials, keys, and certicates
on the devices. In [230,231], authors investigate how constrained
devices can securely bootstrap into a system. The order in which
objects are bootstrapped is also important. For example, in [231]
constrained devices can only be bootstrapped in circle starting
from a predened point.
19
20
Fig. 9. Taxonomy of IoT projects active and completed all around the world.
formulation of self-managing cloud environments, and SmartIoTSSC on spontaneous service composition for smart IoT.
The last group of projects aims to develop software frameworks
that can be directly used and tested by users. This is the case of
ELLIOT [268], where users/citizens can test the platform and join
in the creation, exploration, experimentation of novel IoT ideas,
applications and services. Similarly, SmartSantander [269] focuses
on creating an experimental facility for a smart city in order to
research and test architectures, key enabling technologies, services
and applications (e.g., control and management of environmental/
building parameters, of gardens, of parks, of different sensors and
mobile devices). SPRINT [270] provides a platform to connect the
software tools used by the industrial companies within the project
and to allow integration of different sub-systems at the design
level. Conversely, the platform developed in PLANET [271] is
designed for maintaining and testing heterogeneous and largescale networks, with particular attention to biological reserves
and aireld scenarios.
7.2. Industrial perspective
As explained in Section 1, the potentialities of IoT are limitless
and the economic value associated with IoT is expected to
produce a fast GDP increase. Therefore, industrial and business
priorities are deeply affected by this emerging paradigm. This section aims at providing an overview of the industrial perspective
on the IoT, highlighting those areas considered the most attractive
and where industrial companies are making signicant capital
investments.6 In Section 4 we have seen the huge variety of envisioned IoT applications, spanning in nearly every eld. However,
the emerging trend indicates that, in the medium term, the industry
will focus its effort mainly in one sector: the Smart City domain
(see Section 4.2). Indeed, industry believes that the development
of innovative and practical solutions promoting sustainable and
secure cities is the key to be competitive in the market. Specically,
the three main areas of interest are: (i) smart grid, (ii) smart building, and (iii) smart home. Fig. 10 summarizes the main industrial
priorities and provides some examples of commercial solutions
for each area.
7.2.1. Smart grid
As discussed in Section 4.2.2, a number of technological transformations changed radically the energy distribution system in
the last decade. The electric grid, conceived at the beginning as a
centralized unidirectional system, is now turning into a high distribution system, referred to as smart grid, where users can consume
but also generate the power. Such process is leading to a signicant
increase of efciency in the electricity transmissiondistribution
control chain, as well as to a reduction of CO2 emissions. For
example, it is envisaged that a 5% improvement of the US grid is equivalent to cut CO2 emission of 53 millions cars [272]. To meet the
performance targets set by major countries, under their research
and development plants on smart grids (see, for example, Europe
20-20-207 [273,274], and US DoE Smart Grid Research and Development Program8 [275]), major industries are making massive investments to allow the convergence of three different networks: (i) the
energy network (e.g., electricity, gas, heat), (ii) the physical network
(e.g., roads, train tracks, water), and (iii) the communication network
6
Contributions for this section come from a number of different IoT workshops
(e.g., ETSI M2M Workshops, IEEE-SA IoT Workshops, M2M Forum).
7
The 20-20-20 EU objectives for 2020 are: (i) a 20% reduction in EU greenhouse
gas emissions from 1990 levels, (ii) a 20% improvement in the EUs energy efciency,
and (iii) a 20% of EU energy production from renewable resources.
8
The US objectives for 2030 are: (i) a 20% reduction in the US peak energy demand,
(ii) a 100% availability for manage critical loads, (iii) a 40% improvement in system
efciency, and (iv) a 20% of energy capacity coming from renewal sources.
21
Fig. 10. Key industrial IoT priorities and examples of commercial products.
http://www.energy-home.it/.
22
Table 5
Standardization activities.
Standardization area
Organization
Main objectives
RFID
EPC global
STF 396 (CEN/CENELEC/
ETSI)
CEN TC 225 WP5
ETSI ERM TG 34, TG 28, TG
37
ISO/IEC JTC1/SC31 WG4,
WG6
ITU SG13, SG16
Sensors
IETF 6LoWPAN
ISO/IEC JTC1 WG7, WG4
ITU-T SG13, SG16
NFC
Communication
protocols
IEEE
3GPP
IETF
W3C EXI WG
VLC optical communication, broadband power line communication, multiple home networking technologies
Architecture, signaling congestion, network overload
IP interoperability, routing/application protocols for constrained resources
Efcient XML-based solutions
Privacy issues
Spectrum usage, tag interoperability
Data protocol, mobile RFID
Communication protocols, architecture, multimedia information access
Table 6
Objectives of the most important standardization WGs/initiatives established recently focusing on IoT as a whole.
Organization
Objectives
the IoT system. The robustness and the integrity are a complex
problem because the system can be under attack at different levels.
For example, concerning the hardware level, it has been shown
that open OS platforms are subject to malware (e.g., Android is
the target of 92% of detected malware [278]). Moreover, many
attacks are possible to software failures. In the industry vision,
usage of SIM cards represents a valid starting point. SIM is turning
into a Secure Element (SE) where hardware and software are
designed to be robust and secure. For example, the new SIM generation is composed of a MCU (ARM Secure Care) and a Crypto Coprocessor to crypto data, assuring highly stability to SE platforms.
A usability example is the Octo Telematics project,15 where SEs
offer services for car insurance (e.g., pay-as-you-drive, green car
insurance, whose policy depends on the personal CO2 emissions),
for real trafc monitoring, for smart vehicle tracking. Advantages
of using SEs in IoT are manifold. Among them, notable are: (i) secure
connection (e.g., at routing level, at e2e level), (ii) data security (i.e.,
message cryptography, data integrity), (iii) secure remote management (e.g., application verication, application loading, remote management), and (iv) safe storage.
15
http://www.octotelematics.com/en.
23
24
short-range wireless optical links using the visible light [312]. Visible light communications (VLCs) guarantee high data rate communications at short distance (up to 96 Mbps, 3 m), with 300 THz
of available visible light spectrum at low power and cost. They are
also immune to electromagnetic interference and non-interfere
with Radio Frequency (RF) systems. IEEE is also involved in developing standards for smart grid and home area networking. For
instance, the IEEE 1901 Broadband over Power Line (BPL) standard
[313] is designed for a wide range of applications including smart
energy, smart transportation and Home Area Networks, allowing
rate up to 500 Mbps. Conversely, IEEE 1901.2 [314] refers to power
line communications (PLCs) for low frequency and low data rate
(less than 500 kHz, 500 kbps). The major use is for smart grid applications (e.g., smart metering) and e-vehicle charging (at the station), but it can be also used in combination with lighting or
solar panels. The standard also provides security functions. In
2012, IEEE launched the IEEE 802.24 Smart Grid Technical Advisory
Group (TAG), which focuses on the use of IEEE 802 standards in
smart grid applications. IEEE 1905.1 [315] is another interesting
standard designed specically for convergent digital home network. It provides an abstraction layer for multiple home networking technologies to support dynamic interface selection for packets
transmission, e2e QoS and secure congurations (see Fig. 11). Currently, it works mainly with proprietary technologies (i.e., Powerline communication, Ethernet, WiFi, and MoCA 1.1), but it is
extendable to other home networking technologies.
Another major actor in the standardization of communication
protocols is 3GPP, which mainly focuses on how cellular networks
can support machine-type communications (MTC). Specically, in
Release 10, the 3GPP System Architecture WG 2 addresses the
rst and last mile problem, and denes network improvements
in UMTS and LTE core networks by addressing the MTC signaling
congestion and network overload (see also Section 6.1).
Signicant contributions at higher layers (layer 3 and above) are
produced within the IETF 6LoWPAN WG, whose main objective is
to allow the IP protocol to efciently work on smart constrained
devices (see Section 6.2). The WG was originally conceived to guarantee the IP interoperability on IEEE 802.15.4. Recently, standardization activities include solutions allowing other technologies
(e.g., Wavenis and PLC) to use the same 6LoWPAN mechanisms.
Further standardization activities is carried out under IETF ROLL
WG, which focuses on routing issues over low power and lossy networks by proposing the RPL routing protocol (see Section 6.4), and
under the IETF CoRE WG, whose main objective is to realize the
REST architecture to support resource-oriented applications. Specically, CoRE is currently proposing the Constrained Application
Protocol (CoAP) [191] (see Section 6.4). Other interesting standardization activities aim at providing very compact representations of
languages that can be described by a grammar (e.g., XML, Java,
HTTP, etc.) to simultaneously optimize performance and the utilization of computational resources. For instance, W3C EXI WG
investigated alternative XML forms developing the Efcient XML
Interchange (EXI) format [316]. EXI uses a grammar-based
approach that encodes the most likely alternatives of an XML document in fewer bits and a small set of datatype representations.
http://www.onem2m.org.
a global harmonization group to ensuring the most efcient deployment of M2M communications systems. The oneM2M objective is to
develop e2e specications for the development of a common M2M
Service Layer platform, which works with different hardware and
software and is able to connect the myriad of IoT devices. Activities
within oneM2M include: a Service Layer platform, a Service Architecture, open/standard interfaces, protocols to access resources,
security and privacy enforcement (e.g., authentication, encryption,
integrity verication), application discovery services, data collection
for billing and statistical purposes, identication and naming of
objects, management aspect (i.e., object and data management).
8. IoT emerging research directions
So far we have analyzed and discussed the main challenges that
the international community is facing to make the IoT paradigm a
reality. We have also provided an overview of the industrial perspective highlighting which are the strategic priorities for industries. Obviously, the above discussion, although extensive, cannot
be considered exhaustive. In this section, we complement it by
providing a brief overview and discussion with two other important networking and computing paradigms: social networks and
context-aware computing.
8.1. IoT and social networks
The use of the social network paradigm in the IoT context can
open new possibilities of interaction among smart objects. The main
idea is that objects may have a social consciousness and may exhibit
social behaviors allowing them to build their own social network of
objects [322]. This social network of objects can be exploited to
enhance the trust level between objects that are friends, to guarantee a higher network navigability, and to make applications and
services more efcient. Indeed, if objects share information about
their provided services, service discovery may exploit the social network of friends to search information, thus becoming manageable
and avoiding the usage of those discovery mechanisms generally
used in Internet that are not able to scale with the envisioned multitude of IoT devices. It is envisaged that the realization of the above
vision goes through three different stages, corresponding to the
three distinct levels of social involvement of the objects [322]. The
rst step relies on exploiting humans, and their social network relationships, to share the resources offered by smart things. By using
different web protocols and communication paradigms, objects
may communicate with the human social network (e.g., posting
information about their status) but not with other objects. SenseShare [323] is an example where users may share data gathered by
their smart objects with friends through the use of Facebook only,
while in [324] several social networks can be exploited for data sharing. Users may choose, for each device, the social network for sharing
data and may allow other users to use their devices. In addition, the
automatic publishing of device messages on personal prole is
allowed. In the second step, objects have interaction with the environment and exhibit pseudo-social behaviors with objects. For
example, in [325] devices are allowed to establish temporary relationships, which, however, are still controlled by their owner.
Finally, social objects, i.e., objects that take part and actively form
a social network of objects, represent the last step. In [326328],
authors focus on the social relationships that may be established
in the social network of objects (named Social Internet of IoT (SIoT)).
Such relationships are among objects rather than their owners.
Objects may become friends and may form social groups autonomously, for the benets of human but without their intervention.
Inspired by social human interactions, authors dene ve types of
relationships among objects: (i) parental objects relationship
25
26
Acknowledgments
This work was partly funded by the EC under the EINS (FP7FIRE 288021), MOTO (FP7 317959), EIT ICT Labs MOSES and
Reference Communication & Application Platform for Automotive
and ITS (Business Plan 2014) projects.
References
[1] M. Conti, S.K. Das, C. Bisdikian, M. Kumar, L.M. Ni, A. Passarella, G. Roussos, G.
Trster, G. Tsudik, F. Zambonelli, Looking ahead in pervasive computing:
challenges and opportunities in the era of cyber-physical convergence,
Pervas. Mob. Comput. 8 (1) (2012) 221.
[2] R. Poovendran, Cyber-physical systems: close encounters between two
parallel worlds [point of view], Proc. IEEE 98 (8) (2010) 13631366.
[3] K.-J. Park, R. Zheng, X. Liu, Cyber-physical systems: milestones and research
challenges, Comp. Commun. 36 (1) (2012) 17.
[4] I. Lee, O. Sokolsky, Medical cyber physical systems, in: Proceedings of 47th
Design Automation Conference, 2010, p. 743748.
[5] J. Hur, K. Kang, Dependable and secure computing in medical information
systems, Comp. Commun. 36 (1) (2012) 2028.
[6] K. Sampigethaya, R. Poovendran, L. Bushnell, Secure operation, control, and
maintenance of future e-enabled airplanes, Proc. IEEE 96 (12) (2008)
19922007.
[7] S.R. Azimi, G.G. Bhatia, R. Rajkumar, P. Mudalige, Vehicular networks for
collision avoidance at intersections, in: Proceedings of SAE 2011 World
Congress, 2011.
[8] G. Hackmann, F. Sun, N. Castaneda, C. Lu, S. Dyke, A holistic approach to
decentralized structural damage localization using wireless sensor networks,
Comp. Commun. 36 (1) (2012) 2941.
[9] S. Barro-Torres, T.M. Fernndez-Carams, H.J. Prez-Iglesias, C.J. Escudero, Realtime personal protective equipment monitoring system, Comp. Commun. 36
(1) (2012) 4250.
[10] G. Schirner, D. Erdogmus, K. Chowdhury, T. Padir, The future of human-inthe-loop cyber-physical systems, computer 99 (PrePrints) (2012) 1.
[11] F. Xia, J. Ma, Building smart communities with cyber-physical systems, in:
Proceedings of 1st International Symposium on From Digital Footprints to
Social and Community Intelligence (SCI 11), 2011, pp. 16.
[12] A. Passarella, R.I. Dunbar, M. Conti, F. Pezzoni, Ego network models for future
internet social networking environments, Comp. Commun. 35 (18) (2012)
22012217.
[13] V. Arnaboldi, A. Guazzini, A. Passarella, Egocentric online social networks:
analysis of key features and prediction of tie strength in Facebook, Comp.
Commun. 36 (1011) (2013) 11301144.
[14] McKinsey Global Institute, Disruptive technologies: advances that will
transform life, business, and the global economy, Executive Summary, May
2013.
[15] K. Gama, L. Touseaui, D. Donsez, Combining heterogeneous service
technologies for building an internet of things middleware, Comp.
Commun. 35 (4) (2012) 405417.
[16] EPCglobal Inc., GS1 EPC Tag Data Standard 1.6, 2011 <http://www.gs1.org/
gsmp/kc/epcglobal/tds/tds16-RatiedStd-20110922.pdf>.
[17] A. Sangiovanni-Vincentelli, Lets Get Physical:Marryng Physics with Computer
Science, Keynote Speech at Horizon 2020 @DIITET Conference, Rome, May
2014 <http://media.src.cnr.it/node/3239>.
[18] M. Conti, Computer communications: present status and future challenges,
Comp. Commun. 37 (2014) 14.
[19] A. Sangiovanni-Vincentelli, Lets get physical: adding physical dimensions to
cyber systems, in: Internet of Everything Summit, Rome, July 2014.
[20] R. Harle, S. Taherian, M. Pias, G. Coulouris, A. Hopper, J. Cameron, J. Lasenby,
G. Kuntze, I. Bezodis, G. Irwin, D. Kerwin, Towards real-time proling of
sprints using wearable pressure sensors, Comp. Commun. 35 (6) (2012)
650660.
[21] F. Calabrese, M. Conti, D. Dahlem, G.D. Lorenzo, S. Phithakkitnukoon, Special
issue on pervasive urban applications, Pervas. Mob. Comput. 9 (5) (2013)
614750.
[22] C. Konstantopoulos, P. Bellavista, C.-F. Huang, D. Turgut, Special issue:
reactive wireless sensor networks, Comp. Commun. 36 (9) (2013) 9631100.
[23] J. Chen, H. Frey, X. Li, Special issue: wireless sensor and robot networks:
algorithms and experiments, Comp. Commun. 35 (9) (2012) 10171164.
[24] F.M. Al-Turjman, H.S. Hassanein, M.A. Ibnkahla, Efcient deployment of
wireless sensor networks targeting environment monitoring applications,
Comp. Commun. 36 (2) (2013) 135148.
[25] E. Ancillotti, R. Bruno, M. Conti, The role of communication systems in smart
grids: architectures, technical solutions and research challenges, Comp.
Commun. 36 (1718) (2013) 16651697.
[26] R. Rajkumar, I. Lee, L. Sha, J. Stankovic, Cyber-physical systems: The next
computing revolution, in: Proceedings of 47th ACM/IEEE Design Automation
Conference (DAC), 2010, pp. 731736.
[27] A.A.T. Samad (Ed.), The Impact of Control Technology, IEEE Control Systems
Society, 2011 (Ch. Cyber-Physical Systems).
[28] H. Kim, S.K. Lee, H. Kim, H. Kim, Implementing home energy management
system with UPnP and mobile applications, Comp. Commun. 36 (1) (2012)
5162.
[29] O. Garcia-Morchon, D. Kuptsov, A. Gurtov, K. Wehrle, Cooperative security in
distributed networks, Comp. Commun. 36 (12) (2013) 12841297.
[30] M. Mandel, Can the internet of everything bring back the high-growth
economy? in: Internet of Everything Summit, Rome, July 2014.
[31] D.L. Brock, The Electronic Product Code (EPC) A Naming Scheme for Physical
Objects, White Paper, January 2001.
[32] International Telecommunication Union, ITU Internet Report 2005: The
Internet of Things, International Telecommunication Union, Geneva, 2005.
[33] L. Atzori, A. Iera, G. Morabito, The internet of things: a survey, Comp. Netw.:
Int. J. Comp. Telecommun. Network. 54 (15) (2010) 27872805.
[34] A.K. Jain, L. Hong, S. Pankanti, Internet of Things - Strategic Research
Roadmap, Tech. rep., Cluster of European Research projects on the Internet of
Things, September 2009 <http://www.internet-of-things-research.eu/pdf/
IoTClusterStrategicResearchAgenda2009.pdf>.
[35] D. Uckelmann, M. Harrison, F. Michahelles (Eds.), Architecting the Internet of
Things, vol. 1, Springer Verlag, Berlin Heidelberg, 2011. Ch. An Architectural
Approach Towards the Future Internet of Things.
[36] Etsi, TC M2M, ETSI TS 102 689 v1.1.1 (2010-08) Machine-to-Machine
Communications (M2M); M2M Service Requirements, August 2010 <http://
www.etsi.org/deliver/etsits/102600102699/102689/01.01.0160/ts102689v
010101p.pdf>.
[37] K. Finkenzeller, RFID Handbook: Fundamentals and Applications in
Contactless Smart Cards, Radio Frequency Identication and Near-Field
Communication, John Wiley & Sons, Inc., New York, NY, USA, 2003.
[38] R. Gadh, G. Roussos, K. Michael, G.Q. Huang, B.S. Prabhu, C.-C.P. Chu, RFID a
unique radio innovation for the 21st century, Proc. IEEE 98 (9) (2010) 1546
1549.
[39] M. Buzzi, M. Conti, C. Senette, D. Vannozzi, Measuring UHF RFID tag reading
for document localization, in: Proceedings of IEEE International Conference
on RFID-Technologies and Applications (RFID-TA), 2011, pp. 115122.
[40] I. Akyildiz, M.C. Vuran, Wireless Sensor Networks, John Wiley & Sons Inc, New
York, NY, USA, 2010.
[41] S. Li, S. Peng, W. Chen, X. Lu, Income: practical land monitoring in precision
agriculture with sensor networks, Comp. Commun. 36 (4) (2013) 459467.
[42] M. Di Francesco, S.K. Das, G. Anastasi, Data collection in wireless sensor
networks with mobile elements: a survey, ACM Trans. Sensor Netw. 8 (1)
(2011) 7:17:31.
[43] I.F. Akyildiz, I.H. Kasimoglu, Wireless sensor and actor networks: research
challenges, Ad Hoc Netw. 2 (4) (2004) 351367.
27
[77] I.F. Akyildiz, D.M. Gutierrez-Estevez, R. Balakrishnan, E. Chavarria-Reyes, LTEAdvanced and the evolution to beyond 4G (B4G) systems, Phys. Commun. 10
(2014) 3160.
[78] M. Chen, V.C.M. Leung, R. Hjelsvold, X. Huang, Smart and interactive
ubiquitous multimedia services, Comp. Commun. 35 (15) (2012) 17691771.
[79] J. Mitola III, Cognitive Radio Architecture: The Engineering Foundations of
Radio XML, John Wiley and Sons Ltd., 2006.
[80] S. Haykin, Cognitive radio: brain-empowered wireless communications, IEEE
J. Select. Areas Commun. 23 (2).
[81] T. Yucek, H. Arslan, A survey of spectrum sensing algorithms for cognitive
radio applications, IEEE Commun. Surv. Tut. 11 (1) (2009) 116130.
[82] W. Ejaz, N. ul Hasan, H.S. Kim, Distributed cooperative spectrum sensing in
cognitive radio for ad hoc networks, Comp. Commun. 36 (12) (2013) 1341
1349.
[83] W. Zhang, C.K. Yeo, Joint iterative algorithm for optimal cooperative spectrum
sensing in cognitive radio networks, Comp. Commun. 36 (1) (2012) 8089.
[84] J. Wu, Y. Dai, Y. Zhao, Effective channel assignments in cognitive radio
networks, Comp. Commun. 36 (4) (2013) 411420.
[85] M.H. Rehmani, A.C. Viana, H. Khalife, S. Fdida, SURF: a distributed channel
selection strategy for data dissemination in multi-hop cognitive radio
networks, Comp. Commun. 36 (1011) (2013) 11721185.
[86] S. Bhattacharjee, S. Sengupta, M. Chatterjee, Vulnerabilities in cognitive radio
networks: a survey, Comp. Commun. 36 (13) (2013) 13871398.
[87] C. Boldrini, K. Lee, M. nen, J. Ott, E. Pagani, Opportunistic networks, Comp.
Commun. 48 (2014) 14.
[88] M. Conti, S. Giordano, Mobile ad hoc networking: milestones, challenges, and
new research directions, IEEE Commun. Magaz. 52 (1) (2014) 8596.
[89] R. Bruno, M. Conti, E. Gregori, Mesh networks: commodity multihop ad hoc
networks, IEEE Commun. Magaz. 43 (3) (2005) 123131.
[90] H. Hartenstein, K. Laberteaux, A tutorial survey on vehicular ad hoc networks,
IEEE Commun. Magaz. 46 (6) (2008) 164171.
[91] A. de la Oliva, A. Banchs, P. Serrano, Throughput and energy-aware routing for
802.11 based mesh networks, Comp. Commun. 35 (12) (2012) 14331446.
[92] S.-S. Wang, Y.-S. Lin, Passcar: a passive clustering aided routing protocol for
vehicular ad hoc networks, Comp. Commun. 36 (2) (2013) 170179.
[93] X. Yan, Y.A. Ekerciolu, S. Narayanan, A survey of vertical handover decision
algorithms in fourth generation heterogeneous wireless networks, Comp.
Netw. 54 (11) (2010) 18481863.
[94] M. Zekri, B. Jouaber, D. Zeghlache, A review on mobility management and
vertical handover solutions over heterogeneous wireless networks, Comp.
Commun. 35 (17) (2012) 20552068.
[95] B.S. Ghahfarokhi, N. Movahhedinia, A survey on applications of IEEE 802.21
media independent handover framework in next generation wireless
networks, Comp. Commun. 36 (1011) (2013) 11011119.
[96] Y. Zhu, L. Ni, B. Li, Exploiting mobility patterns for inter-technology handover
in mobile environments, Comp. Commun. 36 (2) (2013) 203210.
[97] H. Tuncer, S. Mishra, N. Shenoy, A survey of identity and handoff management
approaches for the future internet, Comp. Commun. 36 (1) (2012) 6379.
[98] V. Ishakian, J. Akinwumi, F. Esposito, I. Matta, On supporting mobility and
multihoming in recursive internet architectures, Comp. Commun. 35 (13)
(2012) 15611573.
[99] S. Galli, A. Scaglione, Z. Wang, Power line communications and the smart grid,
in: Proceedings of First IEEE Smart Grid Communications (SmartGridComm),
2010, pp. 303308.
[100] M. Chen, V.C.M. Leung, R. Hjelsvold, X. Huang, Smart and interactive
ubiquitous multimedia services, Comp. Commun. 35 (15) (2012) 17691771.
[101] E.-J. Project, Cloud of Things for empowering the citizen clout in smart cities,
20132016 <http://clout-project.eu/>.
[102] K. Kumar, Y.-H. Lu, Cloud computing for mobile users: can ofoading
computation save energy?, Computer 43 (4) (2010) 5156
[103] J. Baliga, R. Ayre, K. Hinton, R. Tucker, Green cloud computing: balancing
energy in processing, storage, and transport, Proc. IEEE 99 (1) (2011) 149167.
[104] S.-Y. Chang, C.-F. Lai, Y.-M. Huang, Dynamic adjustable multimedia streaming
service architecture over cloud computing, Comp. Commun. 35 (15) (2012)
17981808.
[105] V. Jacobson, D.K. Smetters, J.D. Thornton, M.F. Plass, N.H. Briggs, R.L.
Braynard, Networking named content, in: Proceedings of the 5th
International Conference on Emerging Networking Experiments and
Technologies, 2009, pp. 112.
[106] M. Bari, S. Chowdhury, R. Ahmed, R. Boutaba, B. Mathieu, A survey of naming
and routing in information-centric networks, Commun. Magaz., IEEE 50 (12)
(2012) 4453.
[107] B. Ahlgren, H. Karl, D. Kutscher, L. Zhang, Special section on informationcentric networking, Comp. Commun. 36 (7) (2013) 719720.
[108] B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, B. Ohlman, A survey of
information-centric networking, Commun. Magaz., IEEE 50 (7) (2012) 2636.
[109] C. Dannewitz, D. Kutscher, B. Ohlman, S. Farrell, B. Ahlgren, H. Karl, Network
of Information (NetInf) an information-centric networking architecture,
Comp. Commun. 36 (7) (2013) 721735.
[110] D. Trossen, J. Riihijrvi, P. Nikander, P. Jokela, J. Kjllman, J. Rajahalme,
Designing, implementing and evaluating a new internet working
architecture, Comp. Commun. 35 (17) (2012) 20692081.
[111] M. Amadeo, A. Molinaro, G. Ruggeri, E-CHANET: routing, forwarding and
transport in information-centric multihop wireless networks, Comp.
Commun. 36 (7) (2013) 792803.
28
[112] W.K. Chai, D. He, I. Psaras, G. Pavlou, Cache less for more in informationcentric networks (extended version), Comp. Commun. 36 (7) (2013) 758
770.
[113] G. Caroglio, M. Gallo, L. Muscariello, D. Perino, Evaluating per-application
storage management in content-centric networks, Comp. Commun. 36 (7)
(2013) 750757.
[114] A. Passarella, A survey on content-centric technologies for the current
internet: CDN and P2P solutions, Comp. Commun. 35 (1) (2012) 132.
[115] S. Ramabhadran, S. Ratnasamy, J.M. Hellerstein, S. Shenker, Brief
announcement: Prex hash tree, in: Proceedings of the 23th ACM
Symposium on Principles of Distributed Computing, 2004, pp. 368368.
[116] A.R. Bharambe, M. Agrawal, S. Seshan, Mercury: supporting scalable multiattribute range queries, in: Proceedings of ACM SIGCOMM 2004, 2004, pp.
353366.
[117] M. Cai, M. Frank, J. Chen, P. Szekely, MAAN: a multi-attribute addressable
network for grid information services, in: Proceedings of the 4th
International Workshop on Grid Computing, GRID 03, 2003.
[118] C. Schmidt, M. Parashar, Squid: enabling search in DHT-based systems,
J. Paral. Distrib. Comput. 68 (7) (2008) 962975.
[119] F. Villanueva, D. Villa, F. Moya, M. Santomia, J. Lopez, Internet of things
architecture for an RFID-based product tracking business model, in:
Proceedings of 6th Innovative Mobile and Internet Services in Ubiquitous
Computing (IMIS), 2012, pp. 811816.
[120] H. Cai, L.D. Xu, B. Xu, C. Xie, S. Qin, L. Jiang, IoT-based congurable
information service platform for product lifecycle management, IEEE Trans.
Indust. Inform. 10 (2) (2014) 15581567.
[121] T.W. Gruen, D.S. Corsten, S. Bharadwaj, Retail Out-of-Stocks: A Worldwide
Examination of Extent, Causes and Consumer Responses, Tech. rep., 2002.
[122] A.S. Voulodimos, C.Z. Patrikakis, A.B. Sideridis, V.A. Ntas, E.M. Xylouri, A
complete farm management system based on animal identication using
RFID technology, Comp. Electron. Agricult. 70 (2) (2010) 380388.
[123] J. Ma, X. Zhou, S. Li, Z. Lio, Connecting agriculture to the internet of things
through sensor networks, in: Proceedings of Internet of Things (iThings/
CPSCom), 2011, pp. 184187.
[124] D. Yan-e, Design of intelligent agriculture management information system
based on IoT, in: Proceedings of International Conference on Intelligent
Computation Technology and Automation (ICICTA), 2011, 2011, pp. 1045
1049.
[125] J. Chun Zhao, J. Feng Zhang, Y. Feng, J. Xin Guo, The study and application of
the IOT technology in agriculture, in: Proceedings of 3rd IEEE Computer
Science and Information Technology (ICCSIT), 2010, 2010, pp. 462465.
[126] P. Hank, S. Mller, O. Vermesan, J. Van Den Keybus, Automotive ethernet: invehicle networking and smart mobility, in: Proceedings of the Conference on
Design, Automation and Test in Europe (DATE13), 2013, pp. 17351739.
[127] R. Ganti, F. Ye, H. Lei, Mobile crowd sensing: current state and future
challenges, IEEE Commun. Magaz. 49 (11) (2011) 3239.
[128] E. Polycarpou, L. Lambrinos, E. Protopapadakis, Smart parking solutions for
urban areas, in: Proceedings of IEEE 14th International Symposium and
Workshops on a World of Wireless, Mobile and Multimedia Networks
(WoWMoM13), 2013, pp. 16.
[129] M. Qadeer, N. Akhtar, S. Govil, A. Varshney, A novel scheme for mobile
payment using RFID-enabled smart SIMcard, in: Proceedings of International
Conference on Future Computer and Communication (ICFCC 2009), 2009, pp.
339343.
[130] G. Amato, F. Falchi, F. Rabitti, Landmark recognition in VISITO tuscany, in: C.
Grana, R. Cucchiara (Eds.), Multimedia for Cultural Heritage,
Communications in Computer and Information Science, vol. 247, Springer,
Berlin Heidelberg, 2012, pp. 113.
[131] E. Ancillotti, R. Bruno, M. Conti, Smoothing peak demands through aggregate
control of background electrical loads, in: Proceedings of IEEE PES Innovative
Smart Grid Technologies Conference (ISGT), 2014, 2014, pp. 15.
[132] M. Gharbaoui, B. Martini, R. Bruno, L. Valcarenghi, M. Conti, P. Castoldi,
Policies for efcient usage of an EV charging infrastructure deployed in city
parking facilities, in: Proceedings of 13th ITS Telecommunications (ITST),
2013, 2013, pp. 384389.
[133] M. Gharbaoui, B. Martini, R. Bruno, L. Valcarenghi, M. Conti, P. Castoldi,
Designing and evaluating activity-based electric vehicle charging in urban
areas, in: Proceedings of IEEE Electric Vehicle Conference (IEVC), 2013, 2013,
pp. 15.
[134] J. Lu, T. Sookoor, V. Srinivasan, G. Gao, B. Holben, J. Stankovic, E. Field, K.
Whitehouse, The smart thermostat: using occupancy sensors to save energy
in homes, in: Proceedings of the 8th ACM Conference on Embedded
Networked Sensor Systems (SenSys 10), 2010, pp. 211224.
[135] C. Chen, D.J. Cook, A.S. Crandall, The user side of sustainability: modeling
behavior and energy usage in the home, Pervas. Mob. Comput. 9 (1) (2013)
161175.
[136] E. Sun, X. Zhang, Z. Li, The internet of things (IOT) and cloud computing (CC)
based tailings dam monitoring and pre-alarm system in mines, Safety Sci. 50
(4) (2012) 811815.
[137] G. Deak, K. Curran, J. Condell, A survey of active and passive indoor
localisation systems, Comp. Commun. 35 (16) (2012) 19391954.
[138] K. Kaemarungsi, P. Krishnamurthy, Analysis of WLANs received signal
strength indication for indoor location ngerprinting, Pervas. Mob. Comput.
8 (2) (2012) 292316.
29
[195] M. Starsinic, System architecture challenges in the home M2M network, in:
IEEE Long Island Section Systems, Applications and Technology Conference
(LISAT), 2010, pp. 17.
[196] M. Dillinger, K. Madani, N. Alonistioti, Software Dened Radio: Architectures,
Systems and Functions, John Wiley & Sons Inc., New York, NY,
USA, 2003.
[197] B. Gu, J. Heo, S. Oh, N. Park, G. Jeon, Y. Cho, An SDR-based wireless
communication gateway for vehicle networks, in: Proceedings of the IEEE
Asia-Pacic Services Computing Conference, 2008, pp. 16171622.
[198] T. Teubler, U. Walther, H. Hellbrck, EZgate-a exible gateway for the
internet of things, Electron. Commun. EASST 37.
[199] Q. Zhu, R. Wang, Q. Chen, Y. Liu, W. Qin, IOT Gateway: bridging wireless
sensor networks into internet of things, in: Proceedings of the IEEE/IFIP
International Conference on Embedded and Ubiquitous Computing (EUC),
2010, pp. 347352.
[200] R. Enns, M. Bjorklund, J. Schoenwaelder, A. Bierman, Broadband Forum TR069 CPE WAN Management Protocol <http://www.broadband-forum.org/
technical/download/TR-069Amendment-5.pdf1>.
[201] D. Harrington, R. Presuhn, B. Wijnen, An architecture for describing simple
network management protocol (SNMP) management frameworks (2002).
[202] R. Enns, M. Bjorklund, J. Schoenwaelder, A. Bierman, IETF RFC 6241
NETCONF Conguration Protocol, 2006 <http://tools.ietf.org/html/rfc6241>.
[203] A. Sehgal, V. Perelman, S. Kuryla, J. Schonwalder, Management of resource
constrained devices in the internet of things, Commun. Magaz., IEEE 50 (12)
(2012) 144149.
[204] O.M. Alliance, OMA Device Management V2.0 <http://technical.
openmobilealliance.org/Technical/technical-information/release-program/
current-releases>.
[205] G. Klas, F. Rodermund, Z. Shelby, S. Akhouri, J. Hller, Lightweight M2M:
Enabling Device Management and Applications for the Internet of Things,
White Paper, February 2014.
[206] W3C OWL Working Group, W3C Recommendation OWL 2 Web Ontology
Language Document Overview, second ed., 2012 <http://www.w3.org/TR/
2012/REC-owl2-overview-20121211/>.
[207] T. Ku, Y. Zhu, K. Hu, A novel complex event mining network for monitoring
RFID-enable application, in: PacicAsia Workshop on Computational
Intelligence and Industrial Application, 2008. PACIIA 08, 2008,
pp. 925929.
[208] W3C XML Query Working Group, W3C Recommendation XQuery 1.0: An
XML Query Language, second ed., 2010 <http://www.w3.org/TR/xquery/>.
[209] T. Fan, Y. Chen, A scheme of data management in the internet of things, in:
2nd IEEE International Conference on Network Infrastructure and Digital
Content (IC-NIDC), 2010, pp. 110114.
[210] P. Buneman, S. Khanna, K. Tajima, W. Tan, Archiving scientic data, ACM
Trans. Datab. Syst. 27 (1) (2004) 242.
[211] H. Gonzalez, J. Han, X. Li, D. Klabjan, Warehousing and analyzing massive
RFID data sets, in: Proceedings of the 22nd International Conference on Data
Engineering (ICDE), 2006, pp. 8383.
[212] H. Zhonglin, H. Yuhua, Preliminary study on data management technologies
of internet of things, in: International Conference on Intelligence Science and
Information Engineering (ISIE), 2011, pp. 137140.
[213] Z. Ding, Q. Yang, H. Wu, Massive heterogeneous sensor data management in
the internet of things, in: Proceedings of the 2011 International Conference
on Internet of Things and 4th International Conference on Cyber, Physical and
Social Computing (ITHINGSCPSCOM), 2011, pp. 100108.
[214] T. Li, Y. Liu, Y. Tian, S. Shen, W. Mao, A storage solution for massive IoT data
based on NoSQL, in: Proceedings of IEEE International Conference on Green
Computing and Communications (GreenCom), 2012, pp. 5057.
[215] R. Cattell, Scalable SQL and NoSQL data stores, ACM SIGMOD Rec. 39 (4)
(2011) 1227.
[216] N. Fernando, S.W. Loke, W. Rahayu, Mobile cloud computing: a survey, Fut.
Gener. Comp. Syst. 29 (1) (2013) 84106.
[217] H.T. Dinh, C. Lee, D. Niyato, P. Wang, A survey of mobile cloud computing:
architecture, applications, and approaches, Wirel. Commun. Mob. Comput. 13
(18) (2013) 15871611.
[218] E.E. Marinelli, Hyrax: Cloud Computing on Mobile Devices using MapReduce,
Masters thesis, Carnegie Mellon University, 2009.
[219] M. Satyanarayanan, P. Bahl, R. Caceres, N. Davies, The case for VM-based
cloudlets in mobile computing, IEEE Pervas. Comput. (2009).
[220] A. Passarella, M. Kumar, M. Conti, E. Borgia, Minimum-delay service
provisioning in opportunistic networks, IEEE Trans. Paral. Distrib. Syst. 22
(8) (2011) 12671275.
[221] A. Passarella, M. Conti, E. Borgia, M. Kumar, Performance evaluation of service
execution in opportunistic computing, in: Proceedings of the 13th ACM
MSWiM 2010, 2010, pp. 291298.
[222] V. Arnaboldi, M. Conti, F. Delmastro, CAMEO: a novel context-aware
middleware for opportunistic mobile social networks, Pervas. Mob.
Comput. 11 (2014) 148167.
[223] Z. Yu, B. Xiao, S. Zhou, Achieving optimal data storage position in wireless
sensor networks, Comp. Commun. 33 (1) (2010) 92102.
[224] M. Dischinger, A. Haeberlen, K.P. Gummadi, S. Saroiu, Characterizing
residential broadband networks, in: Proceedings of the 7th ACM SIGCOMM
Internet Measurement Conference, 2007.
[225] G. Maier, A. Feldmann, V. Paxson, M. Allman, On dominant characteristics of
residential broadband internet trafc, in: Proceedings of the 9th ACM
SIGCOMM Internet Measurement Conference, 2009, pp. 90102.
30
[226] L. DiCioccio, R. Teixeira, C. Rosenberg, Impact of home networks on end-toend performance: controlled experiments, in: Proceedings of ACM SIGCOMM
Workshop on Home Networks (HomeNets), 2010, pp. 712.
[227] P. Chhabra, N. Laoutaris, P. Rodriguez, R. Sundaram, Home is where the (fast)
internet is: at-rate compatible incentives for reducing peak load, in:
Proceedings of ACM SIGCOMM Workshop on Home Networks (HomeNets),
2010, pp. 1318.
[228] T. Heer, O. Garcia-Morchon, R. Hummen, S.L. Keoh, S.S. Kumar, K. Wehrle,
Security challenges in the ip-based internet of things, Wirel. Pers. Commun.:
Int. J. 61 (3) (2011) 527542.
[229] S. Cirani, G. Ferrari, L. Veltri, Enforcing security mechanisms in the ip-based
internet of things: an algorithmic overview, Algorithms 6 (2) (2013) 197
226, http://dx.doi.org/10.3390/a6020197. <http://www.mdpi.com/19994893/6/2/197>.
[230] B. Sarikaya, IETF Internet-Draft Security Bootstrapping Solution for
Resource-Constrained Devices, 2013 <http://tools.ietf.org/html/draftsarikaya-core-secure-bootsolution-00>.
[231] C. Jennings, IETF Internet-Draft Transitive Trust Enrollment for Constrained
Devices,
2012 <http://tools.ietf.org/html/draft-jennings-core-transitivetrust-enrollment-01>.
[232] IETF Network Working Group, IETF RFC Security Architecture for the
Internet Protocol, 1998 <http://www.ietf.org/rfc/rfc2401.txt>.
[233] D. Harkins, D. Carrel, IETF RFC The Internet Key Exchange (IKE), 1998
<http://www.ietf.org/rfc/rfc2409.txt>.
[234] S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt, U. Roedig, Securing
communication in 6LoWPAN with compressed IPsec, in: Proceedings of IEEE
7th International Conference on Distributed Computing in Sensor Systems,
2011, pp. 18.
[235] P. Nikander, A. Gurtov, T.R. Henderson, Host identity protocol (HIP):
connectivity, mobility, multi-homing, security, and privacy over IPv4 and
IPv6 networks, IEEE Commun. Surv. Tut. 12 (2) (2010) 186204.
[236] S. Raza, D. Trabalza, T. Voigt, 6LoWPAN compressed DTLS for CoAP, in:
Proceedings of IEEE 8th International Conference on Distributed Computing
in Sensor System Distributed Computing in Sensor Systems, 2012, pp. 287
289.
[237] J. Daemen, V. Rijmen, AES Proposal: Rijndaell, 1999 <http://csrc.nist.gov/
archive/aes/rijndael/Rijndael-ammended.pdf#page=1>.
[238] T. Eisenbarth, S. Kumar, A survey of lightweight-cryptography
implementations, IEEE Des. Test Comp. 24 (6) (2007) 522533.
[239] F.-X. Standaert, G. Piret, N. Gershenfeld, J.-J. Quisquater, SEA: a scalable
encryption algorithm for small embedded applications, in: Proceedings of 7th
IFIP WG 8.8/11.2 International Conference Smart Card Research and
Advanced Applications (CARDIS), Springer-Verlag, 2006, pp. 222236.
[240] A. Bogdanov, L.R. Knudsen, G. Le, C. Paar, A. Poschmann, M.J.B. Robshaw, Y.
Seurin, C. Vikkelsoe, PRESENT: an ultra-lightweight block cipher, in:
Proceedings of Workshop on Cryptographic Hardware and Embedded
Systems (CHES), Springer, 2007.
[241] N. Koblitz, Elliptic curve cryptosystems, Math. Comput. 48 (177) (1987) 203
209.
[242] IETF Network Working Group, IETF RFC Elliptic Curve Cryptography (ECC)
Cipher Suites for Transport Layer Security (TLS), 2006 <http://tools.ietf.org/
html/rfc4492>.
[243] D. Fu, J. Solinas, IETF RFC Elliptic Curve Groups modulo a Prime (ECP
Groups) for IKE and IKEv2, 2010 <http://tools.ietf.org/html/rfc5903>.
[244] J. Guo, T. Peyrin, A. Poschmann, The PHOTON family of lightweight hash
functions, in: Proceedings of 31st Annual Conference on Advances in
Cryptology (CRYPTO), 2011, pp. 222239.
[245] A. Bogdanov, G. Leander, C. Paar, A. Poschmann, M.J. Robshaw, Y. Seurin, Hash
functions and RFID tags: mind the gap, in: Proceedings of the 10th
International Workshop on Cryptographic Hardware and Embedded
Systems (CHES), 2008, pp. 283299.
[246] A. Shamir, SQUASH a new MAC with provable security properties for highly
constrained devices such as RFID tags, in: K. Nyberg (Ed.), Fast Software
Encryption, Springer-Verlag, Berlin, Heidelberg, 2008, pp. 144157.
[247] E. He, Q. Wen, A single sign-on scheme for cross domain web applications
based on SOA, in: Proceedings of International Workshop Internet of Things
(IOT), 2012, pp. 581589.
[248] Y. Wang, Q. Wen, H. Zhang, A single sign-on scheme for cross domain web
applications using identity-based cryptography, in: Proceedings of 2nd
International Conference on Networks Security Wireless Communications
and Trusted Computing (NSWCTC), 2010, pp. 483485.
[249] European Union, An Action Plan for Europe, 2009 <http://eur-lex.europa.eu/
LexUriServ/LexUriServ.do?uri=COM:2009:0278:FIN:EN:PDF>.
[250] FP7-ICT 257852, ebbits Enabling the Business-Based Internet of Things and
Services, 20102014 <http://datatracker.ietf.org/doc/rfc6750/>.
[251] FP7-ICT 288385, IoT.est Internet of Things Environment for Service Creation
and Testing, 20112014 <http://ict-iotest.eu/iotest/>.
[252] Nsf, FIA CNS-1040672, NEBULA a trustworthy, secure and evolvable Future
Internet Architecture, 20102014 <http://nebula-a.org>.
[253] FP7-ICT 317674, BETaaS Building the Environment for the Things as a
Service, 20122015 <http://www.betaas.eu>.
[254] National Basic Research 973 Program of China under Grant No.
2011CB302701, Basic Research on the Architecture of Internet of Things
(2011).
[255] FP7-ICT 257521, iot-a - Internet of Things Architecture, 20102013 <http://
www.iot-a.eu/public>.
31
[309] ISO/IEC
JT1/SC06,
ISO/IEC
13157:
Information
technology