Internet of Things. IoT Infrastructures. Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015, Revised Selected Papers, Part II

Research Article

Networked Smart Objects: Moving Data Processing Closer to the Source

Download
489 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-47075-7_4,
        author={Alessandra Rizzardi and Daniele Miorandi and Sabrina Sicari and Cinzia Cappiello and Alberto Coen-Porisini},
        title={Networked Smart Objects: Moving Data Processing Closer to the Source},
        proceedings={Internet of Things. IoT Infrastructures. Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015, Revised Selected Papers, Part II},
        proceedings_a={IOT360},
        year={2017},
        month={6},
        keywords={Internet of Things Security Data quality Middleware Prototype},
        doi={10.1007/978-3-319-47075-7_4}
    }
    
  • Alessandra Rizzardi
    Daniele Miorandi
    Sabrina Sicari
    Cinzia Cappiello
    Alberto Coen-Porisini
    Year: 2017
    Networked Smart Objects: Moving Data Processing Closer to the Source
    IOT360
    Springer
    DOI: 10.1007/978-3-319-47075-7_4
Alessandra Rizzardi1,*, Daniele Miorandi2,*, Sabrina Sicari1,*, Cinzia Cappiello3,*, Alberto Coen-Porisini1,*
  • 1: Universita’ degli Studi dell’Insubria
  • 2: CREATE-NET
  • 3: Politecnico di Milano
*Contact email: alessandra.rizzardi@uninsubria.it, daniele.miorandi@create-net.org, sabrina.sicari@uninsubria.it, cinzia.cappiello@polimi.it, alberto.coenporisini@uninsubria.it

Abstract

The satisfaction of security and data quality requirements plays a fundamental role in the Internet of Things (IoT) scenario. Such a dynamic environment requires the adoption of heterogeneous technologies to provide customized services in various application domains and both security threats and data quality issues need to be addresses in order to guarantee an effective and efficient data management. In this paper, a lightweight and cross-domain prototype of distributed architecture for IoT is presented and evaluated by means of open data provided by different sources. We show how users can access different types of data by changing security and quality requirements.