Pub Date : 2015-12-17DOI: 10.1109/IOT.2015.7356549
Gérald Rocher, J. Tigli, S. Lavirotte, Rahma Daikhi
Semantic web technologies are gaining momentum in the WoT (Web of Things) community for its ability to manage the increasing semantic heterogeneity between devices (Semantic Web of Things, SWoT) in ambient environments. However, most of the approaches rely on ad-hoc and static knowledge models (ontologies) designed for specific domains and applications. While it is a solution for handling the semantic heterogeneity issue, it offers no perspective in term of ontology evolution over time. We study in this paper several approaches allowing: (1) to handle the semantic heterogeneity issue; (2) to capitalize the knowledge contributions throughout the life of the system allowing it to potentially better assist people in their environment over time. One approach is validated on two real use-cases.
{"title":"Run-time knowledge model enrichment in SWoT: A step toward ambient services selection relevancy","authors":"Gérald Rocher, J. Tigli, S. Lavirotte, Rahma Daikhi","doi":"10.1109/IOT.2015.7356549","DOIUrl":"https://doi.org/10.1109/IOT.2015.7356549","url":null,"abstract":"Semantic web technologies are gaining momentum in the WoT (Web of Things) community for its ability to manage the increasing semantic heterogeneity between devices (Semantic Web of Things, SWoT) in ambient environments. However, most of the approaches rely on ad-hoc and static knowledge models (ontologies) designed for specific domains and applications. While it is a solution for handling the semantic heterogeneity issue, it offers no perspective in term of ontology evolution over time. We study in this paper several approaches allowing: (1) to handle the semantic heterogeneity issue; (2) to capitalize the knowledge contributions throughout the life of the system allowing it to potentially better assist people in their environment over time. One approach is validated on two real use-cases.","PeriodicalId":251982,"journal":{"name":"2015 5th International Conference on the Internet of Things (IOT)","volume":"9 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125064483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-17DOI: 10.1109/IOT.2015.7356542
L. Vojtech, M. Neruda, Jiri Skapa, J. Novotný, R. Bortel, T. Kořínek
This paper presents an RFID outdoor localization system that is able to localize hundreds of active transponders in the area of one square kilometer using three RFID receiving stations. The RFID outdoor locator is designed for the tracking of casualties during mass disasters. Active transponders are included in triage tags that are fastened to all casualties during the first wave of rescue operations. Direction of arrival of each transponder and GPS position of three receiving stations determine the position of each active transponder in the area. The location of the transponder is displayed on a mobile terminal in maps. The paper describes a design and simulations of such system. The precision of localization of realized prototypes of the system is measured. The results and applications using the proposed RFID outdoor locator are discussed.
{"title":"Design of RFID outdoor localization system: RFID locator for disaster management","authors":"L. Vojtech, M. Neruda, Jiri Skapa, J. Novotný, R. Bortel, T. Kořínek","doi":"10.1109/IOT.2015.7356542","DOIUrl":"https://doi.org/10.1109/IOT.2015.7356542","url":null,"abstract":"This paper presents an RFID outdoor localization system that is able to localize hundreds of active transponders in the area of one square kilometer using three RFID receiving stations. The RFID outdoor locator is designed for the tracking of casualties during mass disasters. Active transponders are included in triage tags that are fastened to all casualties during the first wave of rescue operations. Direction of arrival of each transponder and GPS position of three receiving stations determine the position of each active transponder in the area. The location of the transponder is displayed on a mobile terminal in maps. The paper describes a design and simulations of such system. The precision of localization of realized prototypes of the system is measured. The results and applications using the proposed RFID outdoor locator are discussed.","PeriodicalId":251982,"journal":{"name":"2015 5th International Conference on the Internet of Things (IOT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127144427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-17DOI: 10.1109/IOT.2015.7356559
S. Mayer, Erik Wilde, F. Michahelles
Social and socially-enabled applications have established themselves as a large and important set of scenarios that make sense in personal as well as in enterprise settings. However, it is still not clear how to best promote an open and extensible ecosystem of social applications. This makes it hard to design and implement applications that are good SOA citizens and can participate in an open and growing set of social interactions. Our work presents an architecture and implementation based on Activity Streams, which uses and slightly extends the format to work as a foundation for a SOA that allows applications to bridge vertical silos in the Internet of Things. In this paper, we discuss the application of our architecture in several different domains and our findings from mashing up applications across silos using Activity Streams. In addition to demonstrating the feasibility of this approach, we believe that our work can serve as illustration and guidance in the ongoing effort to standardize the next version of Activity Streams.
{"title":"A connective fabric for bridging Internet of Things silos","authors":"S. Mayer, Erik Wilde, F. Michahelles","doi":"10.1109/IOT.2015.7356559","DOIUrl":"https://doi.org/10.1109/IOT.2015.7356559","url":null,"abstract":"Social and socially-enabled applications have established themselves as a large and important set of scenarios that make sense in personal as well as in enterprise settings. However, it is still not clear how to best promote an open and extensible ecosystem of social applications. This makes it hard to design and implement applications that are good SOA citizens and can participate in an open and growing set of social interactions. Our work presents an architecture and implementation based on Activity Streams, which uses and slightly extends the format to work as a foundation for a SOA that allows applications to bridge vertical silos in the Internet of Things. In this paper, we discuss the application of our architecture in several different domains and our findings from mashing up applications across silos using Activity Streams. In addition to demonstrating the feasibility of this approach, we believe that our work can serve as illustration and guidance in the ongoing effort to standardize the next version of Activity Streams.","PeriodicalId":251982,"journal":{"name":"2015 5th International Conference on the Internet of Things (IOT)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123033486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-17DOI: 10.1109/IOT.2015.7356560
N. Giang, Michael Blackstock, R. Lea, Victor C. M. Leung
In this paper we examine the development of IoT applications from the perspective of the Fog Computing paradigm, where computing infrastructure at the network edge in devices and gateways is leverage for efficiency and timeliness. Due to the intrinsic nature of the IoT: heterogeneous devices/resources, a tightly coupled perception-action cycle and widely distributed devices and processing, application development in the Fog can be challenging. To address these challenges, we propose a Distributed Dataflow (DDF) programming model for the IoT that utilises computing infrastructures across the Fog and the Cloud. We evaluate our proposal by implementing a DDF framework based on Node-RED (Distributed Node-RED or D-NR), a visual programming tool that uses a flow-based model for building IoT applications. Via demonstrations, we show that our approach eases the development process and can be used to build a variety of IoT applications that work efficiently in the Fog.
{"title":"Developing IoT applications in the Fog: A Distributed Dataflow approach","authors":"N. Giang, Michael Blackstock, R. Lea, Victor C. M. Leung","doi":"10.1109/IOT.2015.7356560","DOIUrl":"https://doi.org/10.1109/IOT.2015.7356560","url":null,"abstract":"In this paper we examine the development of IoT applications from the perspective of the Fog Computing paradigm, where computing infrastructure at the network edge in devices and gateways is leverage for efficiency and timeliness. Due to the intrinsic nature of the IoT: heterogeneous devices/resources, a tightly coupled perception-action cycle and widely distributed devices and processing, application development in the Fog can be challenging. To address these challenges, we propose a Distributed Dataflow (DDF) programming model for the IoT that utilises computing infrastructures across the Fog and the Cloud. We evaluate our proposal by implementing a DDF framework based on Node-RED (Distributed Node-RED or D-NR), a visual programming tool that uses a flow-based model for building IoT applications. Via demonstrations, we show that our approach eases the development process and can be used to build a variety of IoT applications that work efficiently in the Fog.","PeriodicalId":251982,"journal":{"name":"2015 5th International Conference on the Internet of Things (IOT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131771179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-17DOI: 10.1109/IOT.2015.7356546
S. Mayer, J. Siegel
We present a system that allows drivers and fleet managers to interact with their connected vehicles both by means of direct control and indirect goal-setting. The ability to move data from vehicles to a remote server is established by the flexible and secure open vehicle telematics platform “CloudThink.” Based on this platform, we present several prototypes of how people can be enabled to conveniently interact with connected vehicles: First, we demonstrate a system that allows users to select and interact with vehicles using object recognition methods and automatically generated user interfaces on smartphones or personal wearable devices. Second, we show how functional semantic metadata can be used to smooth the boundaries for interacting with vehicles in the physical and virtual worlds. Finally, we present a method for monitoring interactions between vehicles and remote services which increases safety and security by enhancing driver oversight and control over the data that leaves and enters their vehicle.
{"title":"Conversations with connected vehicles","authors":"S. Mayer, J. Siegel","doi":"10.1109/IOT.2015.7356546","DOIUrl":"https://doi.org/10.1109/IOT.2015.7356546","url":null,"abstract":"We present a system that allows drivers and fleet managers to interact with their connected vehicles both by means of direct control and indirect goal-setting. The ability to move data from vehicles to a remote server is established by the flexible and secure open vehicle telematics platform “CloudThink.” Based on this platform, we present several prototypes of how people can be enabled to conveniently interact with connected vehicles: First, we demonstrate a system that allows users to select and interact with vehicles using object recognition methods and automatically generated user interfaces on smartphones or personal wearable devices. Second, we show how functional semantic metadata can be used to smooth the boundaries for interacting with vehicles in the physical and virtual worlds. Finally, we present a method for monitoring interactions between vehicles and remote services which increases safety and security by enhancing driver oversight and control over the data that leaves and enters their vehicle.","PeriodicalId":251982,"journal":{"name":"2015 5th International Conference on the Internet of Things (IOT)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131461238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-17DOI: 10.1109/IOT.2015.7356545
Mohit Sethi, P. Kortoçi, M. D. Francesco, T. Aura
The Internet of Things (IoT) refers to an interconnected world where physical devices seamlessly integrate into a global network and become active participants of business, information, and social processes. These physical devices are referred to as smart objects since they understand and react to the environment they reside in. However, deploying such Internet-connected smart objects is challenging, since they need to be correctly configured with appropriate network and security credentials. This is exacerbated by the fact that they have minimal input capabilities and may be in inaccessible locations. In this article, we describe how to employ the 3rd Generation Partnership Project (3GPP) Generic Bootstrapping Architecture (GBA) to ensure secure authentication and communication among a variety of devices and services. Although GBA relies on the infrastructure of mobile network operators, it requires no mobile network access but only IP connectivity to perform authentication. We show the feasibility of our approach with a prototype implementation that incurs in a minimal memory overhead. Experimental results also show that our solution is energy-efficient.
物联网(Internet of Things, IoT)是指物理设备无缝集成到全球网络中,成为业务、信息和社会进程的积极参与者的互联世界。这些物理设备被称为智能对象,因为它们理解它们所处的环境并对其做出反应。然而,部署这种与互联网连接的智能对象具有挑战性,因为它们需要使用适当的网络和安全凭证进行正确配置。由于它们的输入能力极低,而且可能位于难以接近的位置,这一事实加剧了这种情况。在本文中,我们描述了如何使用第三代合作伙伴项目(3GPP)通用引导体系结构(GBA)来确保各种设备和服务之间的安全身份验证和通信。虽然GBA依赖于移动网络运营商的基础设施,但它不需要移动网络接入,只需要IP连接即可进行身份验证。我们用一个原型实现来展示我们的方法的可行性,它只会产生最小的内存开销。实验结果也表明了该方案的节能效果。
{"title":"Secure and low-power authentication for resource-constrained devices","authors":"Mohit Sethi, P. Kortoçi, M. D. Francesco, T. Aura","doi":"10.1109/IOT.2015.7356545","DOIUrl":"https://doi.org/10.1109/IOT.2015.7356545","url":null,"abstract":"The Internet of Things (IoT) refers to an interconnected world where physical devices seamlessly integrate into a global network and become active participants of business, information, and social processes. These physical devices are referred to as smart objects since they understand and react to the environment they reside in. However, deploying such Internet-connected smart objects is challenging, since they need to be correctly configured with appropriate network and security credentials. This is exacerbated by the fact that they have minimal input capabilities and may be in inaccessible locations. In this article, we describe how to employ the 3rd Generation Partnership Project (3GPP) Generic Bootstrapping Architecture (GBA) to ensure secure authentication and communication among a variety of devices and services. Although GBA relies on the infrastructure of mobile network operators, it requires no mobile network access but only IP connectivity to perform authentication. We show the feasibility of our approach with a prototype implementation that incurs in a minimal memory overhead. Experimental results also show that our solution is energy-efficient.","PeriodicalId":251982,"journal":{"name":"2015 5th International Conference on the Internet of Things (IOT)","volume":"571 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123160770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-17DOI: 10.1109/IOT.2015.7356553
Yu Wang, Junhui Xiang, Xianliang Chen, Tao Yang, N. Yan, Hao Min
This paper presents a 512-bit low power electrically programmable embedded non-volatile memory (eNVM) for the Internet of Things (IoT) applications. A novel memory bit cell which is fully compatible to the CMOS logic process is developed using dual tunneling gate structure. Costumer designed lateral double diffused MOS transistor (LDMOS) is proposed in a novel high voltage management circuit to improve the reliability and safety of the memory established by thin gate oxide transistors. In charge pump design, a frequency step-up scheme is proposed to control the current surge during writing operation, thus large voltage droops in the power supply is prevented, improving the stability of the system. The memory is implemented in a standard 0.13μm CMOS technology process. Measured results indicate that under the supply voltage of 1.2 V, it consumes 9.2 μW (22.9 μW) at the read (write) rate of 6.78 Mb/s (8 kb/s). Endurance characteristics under 100k program cycles stress test and data retention characteristics of up to 10 years are demonstrated.
{"title":"A fully logic CMOS compatible non-volatile memory for low power IoT applications","authors":"Yu Wang, Junhui Xiang, Xianliang Chen, Tao Yang, N. Yan, Hao Min","doi":"10.1109/IOT.2015.7356553","DOIUrl":"https://doi.org/10.1109/IOT.2015.7356553","url":null,"abstract":"This paper presents a 512-bit low power electrically programmable embedded non-volatile memory (eNVM) for the Internet of Things (IoT) applications. A novel memory bit cell which is fully compatible to the CMOS logic process is developed using dual tunneling gate structure. Costumer designed lateral double diffused MOS transistor (LDMOS) is proposed in a novel high voltage management circuit to improve the reliability and safety of the memory established by thin gate oxide transistors. In charge pump design, a frequency step-up scheme is proposed to control the current surge during writing operation, thus large voltage droops in the power supply is prevented, improving the stability of the system. The memory is implemented in a standard 0.13μm CMOS technology process. Measured results indicate that under the supply voltage of 1.2 V, it consumes 9.2 μW (22.9 μW) at the read (write) rate of 6.78 Mb/s (8 kb/s). Endurance characteristics under 100k program cycles stress test and data retention characteristics of up to 10 years are demonstrated.","PeriodicalId":251982,"journal":{"name":"2015 5th International Conference on the Internet of Things (IOT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129844862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-17DOI: 10.1109/IOT.2015.7356555
D. Carlson, Matthias Mogerle, Max Pagel, Shivam Verma, David S. Rosenblum
The number of networked “smart devices” available in everyday environments is rapidly increasing; however, most adopt mutually incompatible networks, protocols, and application programming interfaces. In previous work, we introduced a variety of adaptive middleware techniques that enables a user's commodity mobile device (e.g., a smartphone) to serve as an adaptive gateway between mutually incompatible devices - providing service adaptation and protocol translation services through plug-ins that can be installed on-the-fly. In this paper, we present a complementary set of novel smart space design tools, which enable non-programmers to visually “remix” their ambient environments in new, playful and potentially unforeseen ways using an intuitive flow-graph model. Visual designs can be sent over the network to the user's mobile device, which instantiates them during runtime. This paper presents a detailed overview of the approach, introduces our fully functional prototype, and presents a user study that provides encouraging first results.
{"title":"Ambient flow: A visual approach for remixing the Internet of Things","authors":"D. Carlson, Matthias Mogerle, Max Pagel, Shivam Verma, David S. Rosenblum","doi":"10.1109/IOT.2015.7356555","DOIUrl":"https://doi.org/10.1109/IOT.2015.7356555","url":null,"abstract":"The number of networked “smart devices” available in everyday environments is rapidly increasing; however, most adopt mutually incompatible networks, protocols, and application programming interfaces. In previous work, we introduced a variety of adaptive middleware techniques that enables a user's commodity mobile device (e.g., a smartphone) to serve as an adaptive gateway between mutually incompatible devices - providing service adaptation and protocol translation services through plug-ins that can be installed on-the-fly. In this paper, we present a complementary set of novel smart space design tools, which enable non-programmers to visually “remix” their ambient environments in new, playful and potentially unforeseen ways using an intuitive flow-graph model. Visual designs can be sent over the network to the user's mobile device, which instantiates them during runtime. This paper presents a detailed overview of the approach, introduces our fully functional prototype, and presents a user study that provides encouraging first results.","PeriodicalId":251982,"journal":{"name":"2015 5th International Conference on the Internet of Things (IOT)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133432726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-17DOI: 10.1109/IOT.2015.7356547
Z. Rashid, E. Peig, R. Pous
Retail is undergoing through major technological changes. Online shopping is rapidly increasing because of the features it offers. Bringing online shopping features to offline retail will enrich customer experience. In this paper we present Augmented Reality (AR) interfaces developed for handheld devices, linked to a physical Smart Space to bridge the gap between offline and online retail. Preliminary evaluation shows that the user is able to interact with the products in the physical spaces while having access to online shopping features. System is tested and validated with number of products at Radio Frequency(RFID) based smart shelf.
{"title":"Bringing online shopping experience to offline retail through augmented reality and RFID","authors":"Z. Rashid, E. Peig, R. Pous","doi":"10.1109/IOT.2015.7356547","DOIUrl":"https://doi.org/10.1109/IOT.2015.7356547","url":null,"abstract":"Retail is undergoing through major technological changes. Online shopping is rapidly increasing because of the features it offers. Bringing online shopping features to offline retail will enrich customer experience. In this paper we present Augmented Reality (AR) interfaces developed for handheld devices, linked to a physical Smart Space to bridge the gap between offline and online retail. Preliminary evaluation shows that the user is able to interact with the products in the physical spaces while having access to online shopping features. System is tested and validated with number of products at Radio Frequency(RFID) based smart shelf.","PeriodicalId":251982,"journal":{"name":"2015 5th International Conference on the Internet of Things (IOT)","volume":"53 81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122869723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/IOT.2015.7356552
N. Beijar, Oscar Novo, Jaime Jiménez, Jan Melén
The world is adopting machine-type communication, wherein sensors and actuators blend seamlessly with the environment around us, bringing a new ubiquitous computing and communication era - a shift that is, to some extent, illustrated by the explosive growth of the Internet of Things (IoT). Capillary Networks play an important role in the growth of IoT, enabling wireless sensor networks to connect and use the capabilities of cellular networks through Capillary Gateways. In that sense, Capillary Gateways facilitate the seamless integration of wireless sensor networks with cellular networks. Therefore, an optimal selection of the Capillary Gateways by the wireless sensor network is crucial for balancing the load between the gateways and optimizing the end-to-end path through both networks. This paper describes a set of possible gateway selection architectures and presents an algorithm for determining the gateway selection based on policies and a set of constraints. Then, the paper describes our implementation of two selected architectures, discussing the solutions and challenges encountered during implementation. Finally, the paper evaluates the traffic and load generated by gateway selection.
{"title":"Gateway selection in capillary networks","authors":"N. Beijar, Oscar Novo, Jaime Jiménez, Jan Melén","doi":"10.1109/IOT.2015.7356552","DOIUrl":"https://doi.org/10.1109/IOT.2015.7356552","url":null,"abstract":"The world is adopting machine-type communication, wherein sensors and actuators blend seamlessly with the environment around us, bringing a new ubiquitous computing and communication era - a shift that is, to some extent, illustrated by the explosive growth of the Internet of Things (IoT). Capillary Networks play an important role in the growth of IoT, enabling wireless sensor networks to connect and use the capabilities of cellular networks through Capillary Gateways. In that sense, Capillary Gateways facilitate the seamless integration of wireless sensor networks with cellular networks. Therefore, an optimal selection of the Capillary Gateways by the wireless sensor network is crucial for balancing the load between the gateways and optimizing the end-to-end path through both networks. This paper describes a set of possible gateway selection architectures and presents an algorithm for determining the gateway selection based on policies and a set of constraints. Then, the paper describes our implementation of two selected architectures, discussing the solutions and challenges encountered during implementation. Finally, the paper evaluates the traffic and load generated by gateway selection.","PeriodicalId":251982,"journal":{"name":"2015 5th International Conference on the Internet of Things (IOT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122260989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}