2022
DOI: 10.1016/j.csi.2021.103604
|View full text |Cite
|
Sign up to set email alerts
|

A microservice architecture for real-time IoT data processing: A reusable Web of things approach for smart ports

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 47 publications
(19 citation statements)
references
References 30 publications
0
16
0
2
Order By: Relevance
“…InfluxDB was built from scratch as a time series database [30]. InfluxDB is part of a comprehensive platform that supports the collection, storage, monitoring, visualization and alerting of time series data.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…InfluxDB was built from scratch as a time series database [30]. InfluxDB is part of a comprehensive platform that supports the collection, storage, monitoring, visualization and alerting of time series data.…”
Section: Methodsmentioning
confidence: 99%
“…The following papers [18][19][20][21][22][23][24][25] address the incorporation of MQTT systems into custom key agreement schemes as a two-phase authentication mechanism. There are papers that focus solely on authentication mechanisms for MQTT, such as [26][27][28][29][30]. There are also studies that propose a distributed architecture for MQTT without focusing on security solutions [31][32][33][34][35].…”
Section: Review Of Related Publicationsmentioning
confidence: 99%
“…Supporting a huge number of devices with different amounts of memory, processing power, Because of this, it is important to have an independent and reliable data transmission route to make sure that resources and services are always available. 7) Quality of service (QoS) [254], [301]- [311] Another critical aspect of IoT is QoS. QoS is a metric used to assess the performance, quality, and efficiency of IoT devices, systems, and architecture.…”
Section: Obstacles and Challengesmentioning
confidence: 99%
“…To this end, network packets are defined as simple events and the detected attacks are the resulting complex events. The successful deployment of CEP engines in IoT environments has been widely demonstrated [13][14][15][16]. Although CEP is very advantageous for real-time attack detection, it has one limitation, namely the need for a domain expert who is able to define the rules that must be followed to carry out such detection.…”
Section: Introductionmentioning
confidence: 99%