9 research outputs found

    The Role of Cross-Domain Use Cases in IoT – A Case Analysis

    Get PDF
    The strong rise of Internet connected things contrib- utes to the big data phenomenon. Data is increasingly becoming available from various devices in large vol- ume, variety and velocity. However, many Internet of Things (IoT) applications still seem to be used to solve single problems and infrastructural elements (e.g. sen- sors or data) are not openly available for other use cases. This paper argues that a growing need for cross- domain applications is approaching within the sharing economy and other ecosystem-based business models. It investigates the current state of such cross-domain ap- plications by analyzing currently deployed IoT case studies. The analysis shows that most cases remain in the silo mentality and focus on a specific domain. Only a few cases feature some cross-domain characteristics. These are especially present in smart city cases, which engage multiple stakeholders and promote the share of resources

    Toward Business Models for a Meta-Platform: Exploring Value Creation in the Case of Data Marketplaces

    Get PDF
    Investigating meta-platforms has been a continuing concern within information system literature due to the increasingly complex constellations of platforms in ecologies of ecosystems. A meta-platform is a platform built on top of two or more platforms, hence connecting their respective ecosystems. One promising case to benefit from meta-platforms is data marketplaces: a particular type of platform that facilitates responsible (personal and non-personal) data sharing among companies. Given that business models for meta-platforms are largely unexplored in this emerging case, how they can create value for data marketplaces remain speculative. As a starting point toward business model investigations, this paper explores value creation of a meta-platform in the case of data marketplaces. We interviewed fourteen data-sharing consultants and six meta-platform experts. We identify three potential value creation archetypes of a meta-platform. The discovery aggregator archetype emphasizes searching and dispatching value, while the brokerage one focuses on promoting and supporting value. Finally, the one-stop-shop archetype creates value by standardizing, regulating, sharing, and experimenting. This study is among the first that explore value creation archetypes for a meta-platform, thus identifying core value as a base for further business model investigations

    Adaptive Mediation for Data Exchange in IoT Systems

    Get PDF
    International audienceMessaging and communication is a critical aspect of next generation Internet-of-Things (IoT) systems where interactions among devices, software systems/services and end-users is the expected mode of operation. Given the diverse and changing communication needs of entities, the data exchange interactions may assume different protocols (MQTT, CoAP, HTTP) and interaction paradigms (point to point, multicast, unicast). In this paper, we address the issue of supporting adaptive communications in IoT systems through a mediation-based architecture for data exchange. Here, components called mediators support protocol translation to bridge the heterogeneity gap. Aiming to provide a placement of mediators to nodes, we introduce an integer linear programming solution that takes as input: a set of Edge nodes, IoT devices, and networking semantics. Our proposed solution achieves adaptive placement resulting in timely interactions between IoT devices for larger topologies of IoT spaces

    Interoperability in IoT

    Full text link
    Interoperability refers to the ability of IoT systems and components to communicate and share information among them. This crucial feature is key to unlock all of the IoT paradigm´s potential, including immense technological, economic, and social benefits. Interoperability is currently a major challenge in IoT, mainly due to the lack of a reference standard and the vast heterogeneity of IoT systems. IoT interoperability has also a significant importance in big data analytics because it substantively eases data processing. This chapter analyzes the critical importance of IoT interoperability, its different types, challenges to face, diverse use cases, and prospective interoperability solutions. Given that it is a complex concept that involves multiple aspects and elements of IoT, for a deeper insight, interoperability is studied across different levels of IoT systems. Furthermore, interoperability is also re-examined from a global approach among platforms and systems.González-Usach, R.; Yacchirema-Vargas, DC.; Julián-Seguí, M.; Palau Salvador, CE. (2019). Interoperability in IoT. Handbook of Research on Big Data and the IoT. 149-173. http://hdl.handle.net/10251/150250S14917

    A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Towards Universal and Resilient Systems

    Get PDF
    The Internet-of-Things (IoT) is rapidly becoming ubiquitous. However the heterogeneous nature of devices and protocols in use, the sensitivity of the data contained within, as well as the legal and privacy issues, make security for the IoT a growing research priority and industry concern. With many security practices being unsuitable due to their resource intensive nature, it is deemed important to include second line defences into IoT networks. These systems will also need to be assessed for their efficacy in a variety of different network types and protocols. To shed light on these issues, this paper is concerned with advancements in intrusion detection practices in IoT. It provides a comprehensive review of current Intrusion Detection Systems (IDS) for IoT technologies, focusing on architecture types. A proposal for future directions in IoT based IDS are then presented and evaluated. We show how traditional practices are unsuitable due to their inherent features providing poor coverage of the IoT domain. In order to develop a secure, robust and optimised solution for these networks, the current research for intrusion detection in IoT will need to move in a different direction. An example of which is proposed in order to illustrate how malicious nodes might be passively detected

    A survey of secure middleware for the Internet of Things

    Get PDF
    The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework. The paper is composed of three main sections. Firstly, we propose a matrix of security and privacy threats for IoT. This matrix is used as the basis of a widespread literature review aimed at identifying requirements on IoT platforms and middleware. Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches. We utilise the requirements from the first phase to evaluate. Finally, we draw a set of conclusions and identify further work in this area

    A survey of secure middleware for the Internet of Things

    Get PDF
    corecore