The Internet of Things Supporting Context-Aware Computing: A Cultural Heritage Case Study

2017 ◽  
Vol 22 (2) ◽  
pp. 332-343 ◽  
Author(s):  
Francesco Piccialli ◽  
Angelo Chianese
2014 ◽  
Vol 16 (1) ◽  
pp. 414-454 ◽  
Author(s):  
Charith Perera ◽  
Arkady Zaslavsky ◽  
Peter Christen ◽  
Dimitrios Georgakopoulos

Author(s):  
Derrick Ntalasha ◽  
Renfa Li ◽  
Yongheng Wang

In the Internet of Things (IoT) paradigm, context state information plays a critical role in advancing the development of adaptive pervasive applications. Pervasive services and context-aware computing are emerging as the next computing paradigms in which infrastructure and services are seamlessly available anywhere, anytime, and in any format. The IoT paradigm raises new opportunities and demands on the underlying systems, in particular, the need to have systems that are adaptive and context-aware using context state information. In this paper, we introduce a new adaptive context state design technique to model context-aware applications that are sensitive to context state information changes. Each context change event is captured, interpreted and reacted to so that applications and users use only the functionality and adaptability needs that are solutions to their needs. The solution is modeled using Finite State Machine (FSM) and semantic localization so that context state information within the IoT paradigm is aligned to events. The semantic localization process precisely estimates the proximity location of the user along with the quality of context (QoC) attributes using the Bluetooth cell-based approach. This semantic information is useful in determining and inferring the user activities in a location. The QoC attributes are used to determine the confidence of the user location and range of the Bluetooth beacons within the IoT domain. This will, in turn, be used to determine whether the user is in the location or not. The alignment technique in our model represents the proper and new solution concerning functionality and adaptability needs expressed by other user applications in the IoT environment. The experimental scenario results indicate that a user can continue to enjoy their daily activities while the IoT application adapts continuously to their changing needs and notifying service providers of the changes according to the events of the user.


Computer ◽  
2016 ◽  
Vol 49 (5) ◽  
pp. 87-90 ◽  
Author(s):  
Phillip A. Laplante ◽  
Jeffrey Voas ◽  
Nancy Laplante

Author(s):  
Tidiane Sylla ◽  
Mohamed Aymen Chalouf ◽  
Francine Krief ◽  
Karim Samaké

2018 ◽  
Vol 5 (2) ◽  
pp. 1275-1284 ◽  
Author(s):  
Gopika Premsankar ◽  
Mario Di Francesco ◽  
Tarik Taleb

IEEE Network ◽  
2018 ◽  
Vol 32 (3) ◽  
pp. 101-107 ◽  
Author(s):  
Igor Bisio ◽  
Chiara Garibotto ◽  
Aldo Grattarola ◽  
Fabio Lavagetto ◽  
Andrea Sciarrone

Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4121 ◽  
Author(s):  
Alberto Giaretta ◽  
Nicola Dragoni ◽  
Fabio Massacci

Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove. Moreover, contracts must be easy to verify against network policies. In this paper, we propose to combine the security-by-contract (S × C) paradigm with Fog computing to secure IoT devices. Following our previous work, first we formally define the pillars of our proposal. Then, by means of a running case study, we show that we can model communication flows and prevent information leaks. Last, we show that our contribution enables a holistic approach to IoT security, and that it can also prevent unexpected chains of events.


Sign in / Sign up

Export Citation Format

Share Document