Using tosca for automating the deployment of iot en-
vironments. In CLOSER, pages 330–339.
Franco da Silva, A. C., Breitenb
¨
ucher, U., K
´
epes, K., Kopp,
O., and Leymann, F. (2016). Opentosca for iot: au-
tomating the deployment of iot applications based on
the mosquitto message broker. In Proceedings of
the 6th International Conference on the Internet of
Things, pages 181–182. ACM.
Fredj, S. B., Boussard, M., Kofman, D., and Noirie, L.
(2014). Efficient semantic-based iot service discovery
mechanism for dynamic environments. In 2014 IEEE
25th Annual International Symposium on Personal,
Indoor, and Mobile Radio Communication (PIMRC),
pages 2088–2092. IEEE.
Gubbi, J., Buyya, R., Marusic, S., and Palaniswami, M.
(2013). Internet of things (iot): A vision, architec-
tural elements, and future directions. Future genera-
tion computer systems, 29(7):1645–1660.
Hunkeler, U., Truong, H. L., and Stanford-Clark, A. (2008).
Mqtt-sa publish/subscribe protocol for wireless sen-
sor networks. In 2008 3rd International Conference
on Communication Systems Software and Middleware
and Workshops (COMSWARE’08), pages 791–798.
IEEE.
Kyriazis, D. and Varvarigou, T. (2013). Smart, autonomous
and reliable internet of things. Procedia Computer
Science, 21:442–448.
Madden, S. R., Franklin, M. J., Hellerstein, J. M., and
Hong, W. (2005). Tinydb: an acquisitional query pro-
cessing system for sensor networks. ACM Transac-
tions on database systems (TODS), 30(1):122–173.
Mahfouz, M. R., Fathy, A. E., Kuhn, M. J., and Wang, Y.
(2009). Recent trends and advances in uwb position-
ing. In 2009 IEEE MTT-S International Microwave
Workshop on Wireless Sensing, Local Positioning, and
RFID, pages 1–4. IEEE.
Meng, Z., Wu, Z., Muvianto, C., and Gray, J. (2016). A
data-oriented m2m messaging mechanism for indus-
trial iot applications. IEEE Internet of Things Journal,
4(1):236–246.
Meyer, S., Ruppen, A., and Magerkurth, C. (2013). In-
ternet of things-aware process modeling: integrating
iot devices as business process resources. In Inter-
national conference on advanced information systems
engineering, pages 84–98. Springer.
Miorandi, D., Sicari, S., De Pellegrini, F., and Chlamtac,
I. (2012). Internet of things: Vision, applications and
research challenges. Ad hoc networks, 10(7):1497–
1516.
Newman, M. E. and Watts, D. J. (1999). Renormaliza-
tion group analysis of the small-world network model.
Physics Letters A, 263(4-6):341–346.
Qiu, T., Luo, D., Xia, F., Deonauth, N., Si, W., and Tolba, A.
(2016). A greedy model with small world for improv-
ing the robustness of heterogeneous internet of things.
Computer Networks, 101:127–143.
Seeger, J., Deshmukh, R. A., and Br
¨
oring, A. (2018a). Dy-
namic iot choreographies–managing discovery, distri-
bution, failure and reconfiguration. arXiv preprint
arXiv:1803.03190.
Seeger, J., Deshmukh, R. A., and Broring, A. (2018b).
Running distributed and dynamic iot choreographies.
In 2018 Global Internet of Things Summit (GIoTS),
pages 1–6. IEEE.
Selander, G., Mattsson, J., Palombini, F., and Seitz, L.
(2017). Object security of coap (oscoap). Internet
Engineering Task Force (IETF) Internet-Draft work in
progress.
Shelby, Z., Bormann, C., and Krco, S. (2013). Core re-
source directory.
Shelby, Z., Hartke, K., and Bormann, C. (2014). The con-
strained application protocol (coap). Technical report.
Sicari, S., Rizzardi, A., Grieco, L. A., and Coen-Porisini,
A. (2015). Security, privacy and trust in internet of
things: The road ahead. Computer networks, 76:146–
164.
Stankovic, J. A. (2014). Research directions for the internet
of things. IEEE Internet of Things Journal, 1(1):3–9.
Tankard, C. (2016). What the gdpr means for businesses.
Network Security, 2016(6):5–8.
Vermesan, O. and Friess, P. (2013). Internet of things: con-
verging technologies for smart environments and inte-
grated ecosystems. River Publishers.
Wang, Y., Yang, X., Zhao, Y., Liu, Y., and Cuthbert, L.
(2013). Bluetooth positioning using rssi and triangula-
tion methods. In 2013 IEEE 10th Consumer Commu-
nications and Networking Conference (CCNC), pages
837–842. IEEE.
Warren, S. D. and Brandeis, L. D. (1890). Right to privacy.
Harv. L. Rev., 4:193.
Weber, R. H. (2010). Internet of things–new security and
privacy challenges. Computer law & security review,
26(1):23–30.
Weerawarana, S., Curbera, F., Leymann, F., Storey, T., and
Ferguson, D. F. (2005). Web Services Platform Ar-
chitecture: SOAP, WSDL, WS-Policy, WS-Addressing,
WS-BPEL, WS-Reliable Messaging and More. Pren-
tice Hall PTR, Upper Saddle River, NJ, USA.
White, S. A. (2004). Introduction to bpmn. Ibm Coopera-
tion, 2(0):0.
Witrisal, K., Meissner, P., Leitinger, E., Shen, Y.,
Gustafson, C., Tufvesson, F., Haneda, K., Dardari, D.,
Molisch, A. F., Conti, A., et al. (2016). High-accuracy
localization for assisted living: 5g systems will turn
multipath channels from foe to friend. IEEE Signal
Processing Magazine, 33(2):59–70.
Yan, Z., Zhang, P., and Vasilakos, A. V. (2014). A survey
on trust management for internet of things. Journal of
network and computer applications, 42:120–134.
Yasumoto, K., Yamaguchi, H., and Shigeno, H. (2016).
Survey of real-time processing technologies of iot
data streams. Journal of Information Processing,
24(2):195–202.
IoTBDS 2020 - 5th International Conference on Internet of Things, Big Data and Security
374