2021
DOI: 10.1109/jsen.2020.2981558
|View full text |Cite
|
Sign up to set email alerts
|

A Service-Oriented Approach for Sensing in the Internet of Things: Intelligent Transportation Systems and Privacy Use Cases

Abstract: This paper presents a Sensing-as-a-Service run-time Service Oriented Architecture (SOA), called 3SOA, for the development of Internet of Things (IoT) applications. 3SOA aims to allow interoperability among various IoT platforms and support service-oriented modelling at high levels of abstraction where fundamental SOA theories and techniques are fully integrated into a practical software engineering approach. 3SOA abstracts the dependencies of the middleware programming model from the application logic. This ab… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4
1

Relationship

5
4

Authors

Journals

citations
Cited by 44 publications
(20 citation statements)
references
References 28 publications
0
20
0
Order By: Relevance
“…N OWADAYS, critical infrastructures such as power generation [1]- [4], communications [5]- [7], healthcare [8]- [10], manufacturing [11]- [13], transportation [14], [15], water treatment [16] and agriculture [17], [18] are interconnected in order to tap into the various benefits of the Internet of Things (IoT) [19]- [21]. The increased inter-connectivity and the use of Industrial Control Systems (ICS) renders smart critical infrastructures vulnerable to cyberattacks from terrorists or "hacktivists".…”
Section: Introductionmentioning
confidence: 99%
“…N OWADAYS, critical infrastructures such as power generation [1]- [4], communications [5]- [7], healthcare [8]- [10], manufacturing [11]- [13], transportation [14], [15], water treatment [16] and agriculture [17], [18] are interconnected in order to tap into the various benefits of the Internet of Things (IoT) [19]- [21]. The increased inter-connectivity and the use of Industrial Control Systems (ICS) renders smart critical infrastructures vulnerable to cyberattacks from terrorists or "hacktivists".…”
Section: Introductionmentioning
confidence: 99%
“…Chowdhury et al 2019 [1] Deng et al 2019 [66] Juma et al 2019 [68] Kim et al 2019 [51] Khalilov et al 2018 [64] Belotti et al 2019 [62] Ali et al 2019 [63] Gonczol et al 2019 [97] Al-Jaroodi et al 2019 [70] Kuperberg 2019 [87] Sharma et al 2019 [7] Salman et al 2019 [35] Pahlajani et al [49] Bernabe et al 2019 [61] Chowdhury et al 2018 [56] Park et al 2019 [65] Liu et al 2020 [80] Siris et al 2019 [6] Weiss et al 2019 [78] Mylrea et al 2018 [22] Islam et al 2020 [28] Asif 2019 [82] Yousuf et al 2019 [11] Onik et al 2019 [13] Ojo et al 2018 [17] Nalavade 2018 [20] Epiphaniou et al 2020 [50] Al-Zaben et al 2018 [60] Mushtaq et 2019 [67] Al-Jaroodi et al 2019 [71] Vafiadis et 2019 [69] AlTaei et 2018 [72] Saino et at 2019 [74] Nakasumi et at 2017 [76] Dunphy et al 2018 [77] Moyne et al 2019 [81] Hammoudeh et al 2020 [83] Shen et al 2020 [89] Sudhan et al 2017 [88] Wu et al 2019 [95] Risk Management…”
Section: Security Compliancementioning
confidence: 99%
“…[62] recommended holistic innovative security by design-based approach combining specific policies and best practice capabilities with specific technical countermeasures aimed at specific technology stacks to overcome security threats of IoT applications. Incorporating privacy-by-design into the build of IoT devices is the way forward to safeguard data privacy [82]. Skills shortage, issues with managing the enormous data accumulated through IoT devices and the lack of standardization and Interoperability were discussed.…”
Section: Security Compliancementioning
confidence: 99%
“…Numerous research works have been recently carried out to provide encryption techniques pertinent to the IoT context. They address the inherent resource limitations of IoT devices that make it difficult to apply conventional encryption algorithms that require a significant amount of resources for their operation [20]. Several researchers cope with the resource limitation challenge by proposing lightweight encryption techniques to provide efficient and secure communication with reasonable resource utilisation.…”
Section: Related Workmentioning
confidence: 99%