ABSTRACT
The Internet of Things (IoT) is a paradigm in which smart objects actively collaborate with other physical and virtual resources available in the Internet. IoT environments are characterized by a high degree of heterogeneity, encompassing devices with different capabilities, functionalities, and network protocols. To address such a heterogeneity, some platforms have been proposed aiming at abstracting away the specificities of such devices and promoting interoperability among them. Nevertheless, the lack of standardization in IoT makes these platforms to often not properly address several important requirements in this context. In this context, reference architectures can define an initial set of building blocks for IoT environments and to provide a solid foundation for leveraging its wide adoption. In this paper, we introduce two recent reference architectures for IoT, namely the IoT Architectural Reference Model and the architecture proposed by WSO2. By analyzing the characteristics of these architectures, we intend to shed light on important issues for future research on reference architectures for IoT.
- L. Atzori, A. Iera, and G. Morabito. The Internet of Things: A survey. Computer Networks, 54(15):2787--2805, Oct. 2010. Google ScholarDigital Library
- S. Bandyopadhyay, M. Sengupta, S. Maiti, and S. Dutta. Role of middleware for Internet of Things: A study. International Journal of Computer Science & Engineering Survey, 2(3):94--105, Aug. 2011.Google ScholarCross Ref
- A. Bassi et al., editors. Enabling things to talk: Designing IoT solutions with the IoT Architectural Reference Model. Springer Berlin Heidelberg, Germany, 2013. Google ScholarDigital Library
- M. A. Chaqfeh and N. Mohamed. Challenges in middleware solutions for the Internet of Things. In Proc. of the 2012 Int. Conf. on Collaboration Technologies and Systems, pages 21--26, USA, 2012. IEEE.Google ScholarCross Ref
- P. Fremantle. A reference architecture for the Internet of Things { version 0.8.2. Whitepaper, WSO2, 2014.Google Scholar
- S. Haller. The things in the Internet of Things. In Proc. of the 2010 Internet of Things Conference, 2010.Google Scholar
- M. Nagy et al. Challenges of middleware for the Internet of Things. In A. D. Rodi c, editor, Automation & control { Theory and practice. InTech, Croatia, 2009.Google Scholar
- E. Y. Nakagawa, F. Oquendo, and J. C. Maldonado. Reference architectures. In M. C. Oussalah, editor, Software Architecture 1, pages 55{82. ISTE Ltd / John Wiley & Sons, Inc., United Kingdom, 2014.Google Scholar
- P. F. Pires, E. Cavalcante, T. Barros, F. C. Delicato, T. Batista, and B. Costa. A platform for integrating physical devices in the Internet of Things. In Proc. of the 12th IEEE Int. Conf. on Embedded and Ubiquitous Computing, pages 234--241, USA, 2014. IEEE. Google ScholarDigital Library
- T. Teixeira, S. Hachem, V. Issarny, and N. Georgantas. Service-oriented middleware for the Internet of Things: A perspective. In W. Abramowicz et al., editors, Proc. of the 4th European Conf. on Towards a Service-Based Internet, volume 6994 of Lecture Notes in Computer Science, pages 220--229. Springer-Verlag Berlin Heidelberg, Germany, 2011. Google ScholarDigital Library
Index Terms
- An Analysis of Reference Architectures for the Internet of Things
Recommendations
The internet of things: a survey
In recent year, the Internet of Things (IoT) has drawn significant research attention. IoT is considered as a part of the Internet of the future and will comprise billions of intelligent communicating `things'. The future of the Internet will consist of ...
Internet of Things security
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the ...
Cyberentity Security in the Internet of Things
A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security.
Comments