Open Access

Lightweight Coordination Patterns for Applications of the Internet of Things


Cite

[1] S. Kraijak and P. Tuwanut, “A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends,” in 11th International Conference on Wireless Communications, Networking and Mobile Computing, IET, 2015, pp. 1–6. https://doi.org/10.1049/cp.2015.071410.1049/cp.2015.0714Search in Google Scholar

[2] C. Wang, M. Daneshmand, M. Dohler, X. Mao, R. Q. Hu, and H. Wang, “Guest editorial - special issue on internet of things (IoT): architecture, protocols and services,” IEEE Sensors Journal, vol. 13, no. 10, pp. 3505–3510, Oct. 2013. https://doi.org/10.1109/JSEN.2013.227490610.1109/JSEN.2013.2274906Search in Google Scholar

[3] S. K. Lee, M. Bae, and H. Kim, “Future of IoT networks: A Survey,” Applied Sciences, vol. 7, no. 10, article number 1072, Oct. 2017. https://doi.org/10.3390/app710107210.3390/app7101072Search in Google Scholar

[4] S. Madakam, R. Ramaswamy, and S. Tripathi, “Internet of things (IoT): A Literature Review,” Journal of Computer and Communications, vol. 3, no. 5, pp. 164–173, May 2015. https://doi.org/10.4236/jcc.2015.3502110.4236/jcc.2015.35021Search in Google Scholar

[5] S. Wang, J. Wan, D. Li, and C. Zhang, “Implementing smart factory of industrie 4.0: An Outlook,” International Journal of Distributed Sensor Networks, vol. 12, no. 1, Jan. 2016. https://doi.org/10.1155/2016/315980510.1155/2016/3159805Search in Google Scholar

[6] X. Lin, C. Zhou, and J. Song, “IoT-based early-warning system of unsafe behaviors for horizontal-transportation in shield tunnel,” China Safety Science Journal, no. 11, pp. 109–115, 2014.Search in Google Scholar

[7] D. Bilgeri and F. Wortmann, “Barriers to IoT business model innovation,” in 13. Internationale Tagung Wirtschaftsinformatik, Universität St. Gallen, 2017, pp. 987–990.Search in Google Scholar

[8] M. Almulhim and N. Zaman, “Proposing secure and lightweight authentication scheme for IoT based E-health applications,” in 2018 20th International Conference on Advanced Communication Technology, IEEE, 2018, pp. 481–487. https://doi.org/10.23919/ICACT.2018.832380110.23919/ICACT.2018.8323801Search in Google Scholar

[9] K. Ryu, Y. Koizumi, and T. Hasegawa, “Name-based geographical routing/forwarding support for location-based IoT services,” in 2016 IEEE 24th International Conference on Network Protocols, IEEE, 2016, pp. 1–6. https://doi.org/10.1109/ICNP.2016.778532110.1109/ICNP.2016.7785321Search in Google Scholar

[10] U. Durak, “Flight 4.0: The Changing Technology Landscape of Aeronautics,” in Advances in Aeronautical Informatics, (U. Durak, J. Becker, S. Hartmann, N. S. Voros, Eds.), Springer, 2018, pp. 3–13. https://doi.org/10.1007/978-3-319-75058-3_110.1007/978-3-319-75058-3_1Search in Google Scholar

[11] J. H. Kim, “A Review of Cyber-Physical System Research Relevant to The Emerging IT Trends: Industry 4.0, IoT, Big Data, And Cloud Computing,” Journal of Industrial Integration and Management, vol. 2, no. 3, Sep. 2017. https://doi.org/10.1142/S242486221750011710.1142/S2424862217500117Search in Google Scholar

[12] X. Su, H. Zhang, J. Riekki, A. Keränen, J. K. Nurminen, and L. Du, “Connecting IoT Sensors to Knowledge-based Systems by Transforming SenML to RDF,” in 5th International Conference on Ambient Systems, Networks and Technologies and 4th International Conference on Sustainable Energy Information Technology, Elsevier, 2014, pp. 215–222. https://doi.org/10.1016/j.procs.2014.05.41710.1016/j.procs.2014.05.417Search in Google Scholar

[13] J. D. Brock, R. F. Bruce, and M. E. Cameron, “Changing the world with a Raspberry Pi,” Journal of Computing Sciences in Colleges, vol. 29, no.2, pp. 151–153, Dec. 2013.Search in Google Scholar

[14] H. Chaudhari, “Raspberry Pi Technology: A Review,” International Journal of Innovative and Emerging Research in Engineering, vol. 2, no. 3, pp. 83–87, 2015.Search in Google Scholar

[15] B. Furht and F. Villanustre, “Introduction to big data,” in Big Data Technologies and Applications, (B. Furht, F. Villanustre, Eds.). Springer, 2016, pp. 3–11. https://doi.org/10.1007/978-3-319-44550-2_110.1007/978-3-319-44550-2_1Search in Google Scholar

[16] S. Kaisler, F. Armour, and J. A. Espinosa, “Introduction to Big Data: Challenges, Opportunities, and Realities Minitrack,” in 2014 47th Hawaii International Conference on System Sciences, IEEE, 2014, pp. 728–728. https://doi.org/10.1109/HICSS.2014.9710.1109/HICSS.2014.97Search in Google Scholar

[17] M. N. O. Sadiku, Y. Wang, S. Cui, and S. M. Musa, “Industrial Internet of Things,” Journal of Advances in Scientific Research and Engineering, vol. 3, no. 11, Dec. 2017. https://doi.org/10.7324/IJASRE.2017.3253810.7324/IJASRE.2017.32538Search in Google Scholar

[18] H. Boyes, B. Hallaq, J. Cunningham, and T. Watson, “The industrial internet of things (IIoT): An analysis framework,” Computers in Industry, vol. 101, pp. 1–12, Oct. 2018. https://doi.org/10.1016/j.compind.2018.04.01510.1016/j.compind.2018.04.015Search in Google Scholar

[19] E. Gamma, R. Helm, R. Johnson, and J. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, 1st edition. Addison-Wesley Professional, 1995.Search in Google Scholar

[20] B. C. D. S. Oliveira, M. Wang, and J. Gibbons, “The visitor pattern as a reusable, generic, type-safe component,” in 23rd ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages and Applications, 2008, pp. 439–456. https://doi.org/10.1145/1449764.144979910.1145/1449764.1449799Search in Google Scholar

[21] J. Vaughn, “Hands-on computing with Arduino,” Journal of Computing Sciences in Colleges, vol. 27, no. 6, pp. 105–106, Jun. 2012.Search in Google Scholar

[22] A. Ghosh, R. Ratasuk, B. Mondal, N. Mangalvedhe, and T. Thomas, “LTE-advanced: next-generation wireless broadband technology,” IEEE Wireless Communications, vol. 17, no. 3, pp. 10–22, Jun. 2010. https://doi.org/10.1109/MWC.2010.549097410.1109/MWC.2010.5490974Search in Google Scholar

[23] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: vision and challenges,” IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637–646, Oct. 2016. https://doi.org/10.1109/JIOT.2016.257919810.1109/JIOT.2016.2579198Search in Google Scholar

[24] L. M. Vaquero and L. Rodero-Merino, “Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing,” ACM SIGCOMM Computer Communication Review, vol. 44, no. 5, pp. 27–32, Oct. 2014. https://doi.org/10.1145/2677046.267705210.1145/2677046.2677052Search in Google Scholar

[25] S. Buzzi, I. Chih-Lin, T. E. Klein, H. V. Poor, C. Yang, and A. Zappone, “A survey of energy-efficient techniques for 5G networks and challenges ahead,” IEEE Journal on Selected Areas in Communications, vol. 34, no. 4, pp. 697–709, Apr. 2016. https://doi.org/10.1109/JSAC.2016.255033810.1109/JSAC.2016.2550338Search in Google Scholar

[26] X. Ge, H. Cheng, M. Guizani, and T. Han, “5G wireless backhaul networks: challenges and research advances,” IEEE Network, vol. 28, no. 6, pp. 6–11, Nov. 2014. https://doi.org/10.1109/MNET.2014.696379810.1109/MNET.2014.6963798Search in Google Scholar

[27] W. A. Mufti, “ClientNet cluster an alternative of transferring big data files by use of mobile code,” in Xia Y., Zhang LJ. (eds) Services - SERVICES 2019. Lecture Notes in Computer Science, vol. 11517. Springer, Cham, 2019. https://doi.org/10.1007/978-3-030-23381-5_810.1007/978-3-030-23381-5_8Search in Google Scholar

[28] F.-J. Ferrández-Pastor, H. Mora, A. Jimeno-Morenilla, and B. Volckaert, “Deployment of IoT Edge and Fog Computing Technologies to Develop Smart Building Services,” Sustainability, vol. 10, no. 11, article number 3832, Oct. 2018. https://doi.org/10.3390/su1011383210.3390/su10113832Search in Google Scholar

[29] M. Habib ur Rehman, P. P. Jayaraman, S. U. R. Malik, A. U. R. Khan, and M. Medhat Gaber, “RedEdge: A Novel Architecture for Big Data Processing in Mobile Edge Computing Environments,” Journal of Sensor and Actuator Networks, vol. 6, no. 3, article number 17, Sep. 2017. https://doi.org/10.3390/jsan603001710.3390/jsan6030017Search in Google Scholar

[30] D. Soni and A. Makwana, “A survey on MQTT: a protocol of internet of things (IOT),” in International Conference on Telecommunication, Power Analysis and Computing Techniques, 2017.Search in Google Scholar

[31] S. Monk, Programming the Raspberry Pi: Getting Started with Python. McGraw-Hill, 2013.Search in Google Scholar

[32] H. Boyes, B. Hallaq, J. Cunningham, and T. Watson, “The industrial internet of things (IIoT): An analysis framework,” Computers in Industry, vol. 101, pp. 1–12, Oct. 2018. https://doi.org/10.1016/j.compind.2018.04.01510.1016/j.compind.2018.04.015Search in Google Scholar

[33] E. Pitt and K. McNiff. Java.rmi: The Remote Method Invocation Guide. Addison-Wesley, 2001.Search in Google Scholar

eISSN:
2255-8691
Language:
English