2016
DOI: 10.1145/2835492
|View full text |Cite
|
Sign up to set email alerts
|

SoIoT

Abstract: An emerging issue in urban computing environments is the seamless selection, composition, and delivery of user-centric services that run over what is known as the Internet of Things (IoT). This challenge is about enabling services actuated by IoT devices to be delivered spontaneously from the perspective of users. To accomplish this goal, we propose the Service-Oriented Internet of Things (SoIoT), a user-centric IoT-based service framework, which integrates services that utilize IoT resources in an urban compu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(4 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Unfortunately, there are no multiple datasets available on the service composition in IoT domains, and the available datasets are confined to three datasets, QWS [ 80 ], WS-DREAM [ 81 ], and OWLS-Xplan [ 82 ], and datasets that are generated randomly. We considered the QWS dataset [ 83 ], similar to the work of some other scholars [ 41 , 84 ], to approve and validate our theory. The QWS dataset comprises a set of QWS measurements for 2507 service implementations.…”
Section: Experiments Resultsmentioning
confidence: 99%
“…Unfortunately, there are no multiple datasets available on the service composition in IoT domains, and the available datasets are confined to three datasets, QWS [ 80 ], WS-DREAM [ 81 ], and OWLS-Xplan [ 82 ], and datasets that are generated randomly. We considered the QWS dataset [ 83 ], similar to the work of some other scholars [ 41 , 84 ], to approve and validate our theory. The QWS dataset comprises a set of QWS measurements for 2507 service implementations.…”
Section: Experiments Resultsmentioning
confidence: 99%
“…The scalar-point multiplication is significantly more expensive than symmetric encryption/decryption, hash function evaluation, and MAC generation/verification. Furthermore, despite the use of ECC, the majority of schemes fail to achieve user anonymity and mutual authentication [27,28].However, the ECC based encryption is recommended for resource constrained devices like IoT devices to design anonymous and authentication scheme combined with Identity based encryption.…”
Section: International Journal On Recent and Innovation Trends In Com...mentioning
confidence: 99%
“…Such works however have never been considered in the context of IoT services, network services and clouds together. In [39] user-centric IoT application composition is shown. This, however, does not include networks.…”
Section: Programming and Composition Models For Ensemblesmentioning
confidence: 99%