Retrieving Monitoring and Accounting Information from Constrained Devices in Internet-of-Things Applications
Mazhelis, O., Waldburger, M., Machado, G. S., Stiller, B., & Tyrväinen, P. (2013). Retrieving Monitoring and Accounting Information from Constrained Devices in Internet-of-Things Applications. In G. Doyen, M. Waldburger, P. Celeda, A. Sperotto, & B. Stiller (Eds.), Emerging Management Mechanisms for the Future Internet (pp. 136-147). Springer. Lecture Notes in Computer Science, 7943. https://doi.org/10.1007/978-3-642-38998-6_17
Published in
Lecture Notes in Computer ScienceAuthors
Date
2013Copyright
© IFIP International Federation for Information Processing 2013. This is a final draft version of an article whose final and definitive form has been published by Springer. Published in this repository with the kind permission of the publisher.
Internet-of-Things (IoT) is envisioned to provide connectivity
to a vast number of sensing or actuating devices with limited computational
and communication capabilities. For the organizations that
manage these constrained devices, the monitoring of each device’s operational
status and performance level as well as the accounting of their resource
usage are of great importance. However, monitoring and accounting
support is lacking in today’s IoT platforms. Hence, this paper studies
the applicability of the Constrained Application Protocol (CoAP), a
lightweight transfer protocol under development by IETF, for efficiently
retrieving monitoring and accounting data from constrained devices. On
the infrastructure side, the developed prototype relies on using standard
building blocks offered by the AMAAIS project in order to collect,
pre-process, distribute, and persistently store monitoring and accounting
information. Necessary on-device and infrastructure components are
prototypically implemented and empirically evaluated in a realistic simulation
environment. Experiment results indicate that CoAP is suited
for efficiently transferring monitoring and accounting data, both due to
a small energy footprint and a memory-wise compact implementation.
...
Publisher
SpringerParent publication ISBN
978-3-642-38998-6Conference
International Conference on Autonomous Infrastructure, Management, and SecurityIs part of publication
Emerging Management Mechanisms for the Future InternetISSN Search the Publication Forum
0302-9743Publication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/23027342
Metadata
Show full item recordCollections
Related items
Showing items with similar title or keywords.
-
Internet-of-things market, value networks, and business models : state of the art report
Okkonen, Hanna; Mazhelis, Oleksiy; Ahokangas, Petri; Pussinen, Pasi; Rajahonka, Mervi; Siuruainen, Riikka; Leminen, Seppo; Shveykovskiy, Alexey; Myllykoski, Jenni; Warma, Henna (University of Jyväskylä, Department of Computer Science and Information Systems, 2013) -
A gap analysis of Internet-of-Things platforms
Mineraud, Julien; Mazhelis, Oleksiy; Su, Xiang; Tarkoma, Sasu (Elsevier BV, 2016)We are experiencing an abundance of Internet-of-Things (IoT) middleware solutions that provide connectivity for sensors and actuators to the Internet. To gain a widespread adoption, these middleware solutions, referred to ... -
HALE-IoT : HArdening LEgacy Internet-of-Things devices by retrofitting defensive firmware modifications and implants
Carrillo-Mondejar, J.; Turtiainen, Hannu; Costin, Andrei; Martinez, J.L.; Suarez-Tangil, G. (IEEE, 2022)Internet-Of-Things (IoT) devices and their firmware are notorious for their lifelong vulnerabilities. As device infection increases, vendors also fail to release patches at a competitive pace. Despite security in IoT being ... -
How do startups develop internet-of-things systems : a multiple exploratory case study
Duc, Anh Nguyen; Khalid, Khan; Lønnestad, Tor; Bajwa, Sohaib Shahid; Wang, Xiaofeng; Abrahamsson, Pekka (IEEE, 2019)Internet-of-Things applications are not only the new opportunity for digital businesses but also a major driving force for the modification and creation of software systems in all industries and businesses. Compared to ... -
Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems
Costin, Andrei (Springer, 2022)In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security ...