Investigation on Constraints and Recommended Context Aware Elicitation for IoT Runtime Workflow
Keywords:
Ontology, Semantic methods, QoS aware, Context aware, Run-time workflow, Interoperability, Things Mark-up LanguageAbstract
Various technological and application challenges arise in the advancement of Internet of Things. Apart from Design and Deployment, Security also falls as a primary challenge to overcome. Device Management is becoming more complex as numerous network services to be handled. Inter-device communication for technical aspects appears to be underappreciated. There is a critical necessity to include this area's requirements and challenges. By abstracting data models and operations and expressing them using semantics, M2Mcommunication and interoperability and may be made simple. A thorough investigation of the foregoing is preparing the way for various approaches. Along with Semantics, a high-level language construct is suggested that can enable run-time workflow construction. Things Markup Language is the name of the concept (TML).
Downloads
References
IsamIshaq et al., “IETF Standardization in the Field of the Internet of Things (IoT): A Survey”, Journal of Sensor and Actuator Networks, ISSN 2224-2708, Vol 2, p 235-287; 2013.
Kevin Ashton, Auto-ID Center, MIT, The Internet of Things - presentation to Procter & Gamble, 1999.
"The Internet Toaster." Living Internet, 7 Jan. 2000.http://www.livinginternet.com/i/ia_myths_toast.html. Accessed August 2016
"The "Only" Coke Machine on the Internet". CarnegieMellonUniversity.https://www.cs.cmu.edu/~coke/history_long.txt Accessed on August 2016.
Tschofenig, J. Arkko, D. Thaler, D. McPherson, RFC 7452, “Architectural Considerations in Smart Object Networking”, ISSN: 2070-1721, 2015.https://datatracker.ietf.org/doc/html/rfc7452
F. Mattern and C. Floerkemeier. From the internet of computers to the internet of things. Volume 6462 LNCS, pages 242 – 259, 2010.https://vs.inf.ethz.ch/publ/papers/Internet-of-things.pdf
IERC - European Research Cluster on the Internet of Things: IoT Semantic Interoperability: Research Challenges, Best Practices, Recommendations and Next Steps, March, 2015.http://www.internet-of-things-research.eu/pdf/IE
RC_Position_Paper_IoT_Semantic_Interoperability_Final.pdf
H. van der Veer, A. Wiles, "Achieving Technical Interoperability – the ETSI Approach", ETSI White Paper No.3, 3rd edition, April 2008. https://www.etsi.org/images/files/ETSIWhitePapers/IOP%20whitepaper%20Edition%203%20final.pdf
Z. Shelby Sensinode, C. ChauvenetWatteco, “The IPSO Application Framework”, IPSO Alliance Interop Committee, 24 August 2012.https://www.omaspecworks.org/wp-content/uploads/2018/03/draft-ipso-app-framework-04.pdf
“OneM2M architecture”, Technical Specification, Doc. No: TS -0001-V1.6.1, 30 January, 2015. https://onem2m.org/images/files/deliverables/TS-0001-Functional_Architecture-V1_6_1.pdf
Mike Botts, ‘SWE-IoT Workshop, Open Geospatial Consortium”, Texas, USA, 21 March 2012.
https://portal.ogc.org › files/?artifact_id=52162
“IoT-A ARM”, SOTA report on existing integration frameworks/architectures for WSN, RFID and other emerging IoT related Technologies, 4 April 2011, Accessed Aug 2016
David, D. S., Anam, M., Kaliappan, C., Arun, S., Sharma, D. K. et al. (2022). “Cloud Security Service for Identifying Unauthorized User Behaviour”, CMC-Computers, Materials & Continua, 70(2), 2581–2600.
“Light Weight M2M”, Open Mobile Alliance - Enabler Test Specification for Lightweight M2M Candidate Version 1.0 – 29 August 2016. https://www.openmobilealliance.org/release/ETS/OMA-ETS-LightweightM2M-V1_0-20160829-C.pdf
Xiang Su, Hao Zhang, JukkaRiekki, Ari Keränen, Jukka K. Nurminen, Libin Du, “Connecting IoT Sensors to Knowledge-based Systems by Transforming SenML to RDF, Procedia Computer Science, Volume 32, 2014, Pages 215-222, ISSN 1877-0509.https://www.sciencedirect.com/science/article/pii/S1877050914006176?via%3Dihub
“Weave”, https://developers.google.com/weave, Accessed Aug 2016
”Thread Stack Fundamentals”, Thread Group – Public Release, Revision 2, July 2015.https://www.silabs.com/documents/public/white-papers/Thread-Stack-Fundamentals.pdf
“Vorto”, http://www.eclipse.org/vorto/Accessed Aug 2016
“Vorto Repository”, http://vorto.eclipse.org/,Accessed Aug 2016
“Ponte”, http://www.eclipse.org/ponte/,Accessed Aug 2016
Tao Gong, Zheng Hu, HaiFeng Liu, Feng Lin, Dian Zhou and Hui Tian, "A context-aware computing mediated dynamic service composition and reconfiguration for ubiquitous environment," 2012 3rd IEEE International Conference on the Internet of Things, Wuxi, 2012, pp. 16-23. doi: 10.1109/IOT.2012.6402299
L. Zhang, S. Yu, X. Ding and X. Wang, "Research on IOT RESTful Web Service Asynchronous Composition Based on BPEL," 2014 Sixth International Conference on Intelligent Human-Machine Systems and Cybernetics, Hangzhou, 2014, pp.62-65.DoI: 10.1109/IHMSC.2014.23
S. D. Kim, J. Y. Lee, D. Y. Kim, C. W. Park and H. J. La, "Modeling BPEL-Based Collaborations with Heterogeneous IoT Devices," 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, Dalian, 2014, pp. 289-294.DoI: 10.1109/DASC.2014.58
Sonja Meyer, Andreas Ruppen, and Carsten Magerkurth. 2013. Internet of things-aware process modeling: integrating IoT devices as business process resources. In Proceedings of the 25th international conference on Advanced Information Systems Engineering (CAiSE'13), Camille Salinesi, Moira C. Norrie, and Óscar Pastor (Eds.). Springer-Verlag, Berlin, Heidelberg, 84-98. DOI: http://dx.doi.org/10.1007/978-3-642-38709-8_6
Im Y. Jung and et al., “Design of a Situation Aware Service for Internet of Things”, International Journal of Distributed Sensor Networks, Volume 2015, Article ID 641312, 8 pages. http://dx.doi.org/10.1155/2015/641312
Safina Showkat Ara and et al., “Web-of-Objects Based User-Centric Semantic Service Composition Methodology in the Internet of Things”, International Journal of Distributed Sensor Networks, Volume 2014, Article ID 482873, 11 pages. http://dx.doi.org/10.1155/2014/482873
Prashant Doshi, “Dynamic Workflow Composition using Markov Decision Processes”, Source: DBLP, January 2005, DOI:10.1109/ICWS.2004.51
Mahmood Allameh Amiri and Hadi Serajzadeh, “QoS Aware Web Service Composition Based on Genetic Algorithm”, 5th International Symposium on Telecommunications, 2010, pages 502 -507.
Mwangi , J., Cohen, D., Silva, C., Min-ji, K., & Suzuki, H. Improving Fraud Detection in Financial Transactions with Machine Learning. Kuwait Journal of Machine Learning, 1(4). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/148
Ibrahim, S. S. ., & Ravi, G. . (2023). Deep learning based Brain Tumour Classification based on Recursive Sigmoid Neural Network based on Multi-Scale Neural Segmentation. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2s), 77–86. https://doi.org/10.17762/ijritcc.v11i2s.6031
Kshirsagar, P.R., Reddy, D.H., Dhingra, M., Dhabliya, D., Gupta, A. A Review on Comparative study of 4G, 5G and 6G Networks (2022) Proceedings of 5th International Conference on Contemporary Computing and Informatics, IC3I 2022, pp. 1830-1833.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.