2020
DOI: 10.1109/access.2020.2972364
|View full text |Cite
|
Sign up to set email alerts
|

How is Open Source Software Development Different in Popular IoT Projects?

Abstract: From the software point of view, the development of IoT applications differs from other kinds of applications due to the specific features that the former exhibit. In this paper, we investigate how developers contribute to IoT applications in the Open Source Software (OSS) context, to gain a deeper understanding of how their work differs from that of non-IoT applications. To that end, we conducted a quantitative analysis of a broad set of the 60 most popular publicly available IoT and non-IoT projects on GitHu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…However, its disadvantages cannot be ignored. The main deficiencies are: 1. the need for a trusted administrator (Corno, De Russis, et al, 2020); 2. the risk that the entire network will be paralysed and disrupted if the centralised server suffers an attack (Mistry, Tanwar, et al, 2020); 3. the failure to guarantee data traceability and non-tamperability (Brous, Janssen, et al, 2020). Encrypted centralised storage solutions (Kopp, Mödinger, 2019) can make some improvements to the deficiency 3, but the first two deficiencies are determined by the centralised structure itself, particularly in deficiency 1.…”
Section: Related Workmentioning
confidence: 99%
“…However, its disadvantages cannot be ignored. The main deficiencies are: 1. the need for a trusted administrator (Corno, De Russis, et al, 2020); 2. the risk that the entire network will be paralysed and disrupted if the centralised server suffers an attack (Mistry, Tanwar, et al, 2020); 3. the failure to guarantee data traceability and non-tamperability (Brous, Janssen, et al, 2020). Encrypted centralised storage solutions (Kopp, Mödinger, 2019) can make some improvements to the deficiency 3, but the first two deficiencies are determined by the centralised structure itself, particularly in deficiency 1.…”
Section: Related Workmentioning
confidence: 99%