{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T09:59:12Z","timestamp":1726135152520},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030870126"},{"type":"electronic","value":"9783030870133"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-87013-3_32","type":"book-chapter","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T14:08:05Z","timestamp":1631196485000},"page":"421-436","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-level Fault Tolerance Approach for\u00a0IoT Systems"],"prefix":"10.1007","author":[{"given":"M\u00e1rio","family":"Melo","sequence":"first","affiliation":[]},{"given":"Gibeon","family":"Aquino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,10]]},"reference":[{"issue":"15","key":"32_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Celesti, A., Carnevale, L., Galletta, A., Fazio, M., Villari, M.: A watchdog service making container-based micro-services reliable in IoT clouds. In: 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud), pp. 372\u2013378. IEEE (2017)","DOI":"10.1109\/FiCloud.2017.57"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Choi, J., Jeoung, H., Kim, J., Ko, Y., Jung, W., Kim, H., Kim, J.: Detecting and identifying faulty IoT devices in smart home with context extraction. In: 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 610\u2013621. IEEE (2018)","DOI":"10.1109\/DSN.2018.00068"},{"issue":"1","key":"32_CR4","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MS.2017.1","volume":"34","author":"F Ciccozzi","year":"2017","unstructured":"Ciccozzi, F., Crnkovic, I., Di Ruscio, D., Malavolta, I., Pelliccione, P., Spalazzese, R.: Model-driven engineering for mission-critical IoT systems. IEEE Softw. 34(1), 46\u201353 (2017)","journal-title":"IEEE Softw."},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Gia, T.N., Rahmani, A.M., Westerlund, T., Liljeberg, P., Tenhunen, H.: Fault tolerant and scalable IoT-based architecture for health monitoring. In: 2015 IEEE Sensors Applications Symposium (SAS), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/SAS.2015.7133626"},{"key":"32_CR6","series-title":"Microsoft Patterns & Practices","volume-title":"Cloud Design Patterns: Prescriptive Architecture Guidance for Cloud Applications","author":"A Homer","year":"2014","unstructured":"Homer, A., Sharp, J., Brader, L., Narumoto, M., Swanson, T.: Cloud Design Patterns: Prescriptive Architecture Guidance for Cloud Applications. Microsoft Patterns& Practices, CreateSpace, Scotts Valley (2014)"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Javed, A., Heljanko, K., Buda, A., Fr\u00e4mling, K.: CEFIoT: a fault-tolerant IoT architecture for edge and cloud. In: 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), pp. 813\u2013818. IEEE (2018)","DOI":"10.1109\/WF-IoT.2018.8355149"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Karthikeya, S.A., Vijeth, J., Murthy, C.S.R.: Leveraging solution-specific gateways for cost-effective and fault-tolerant IoT networking. In: 2016 IEEE Wireless Communications and Networking Conference, pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/WCNC.2016.7564811"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Khan, F.I., Hameed, S.: Understanding security requirements and challenges in Internet of Things (IoTs): a review. arXiv preprint arXiv:1808.10529 (2018)","DOI":"10.1155\/2019\/9629381"},{"issue":"01","key":"32_CR10","doi-asserted-by":"publisher","first-page":"5","DOI":"10.4236\/ait.2011.11002","volume":"1","author":"EA Kosmatos","year":"2011","unstructured":"Kosmatos, E.A., Tselikas, N.D., Boucouvalas, A.C.: Integrating RFIDs and smart objects into a unified internet of things architecture. Adv. Internet Things 1(01), 5 (2011)","journal-title":"Adv. Internet Things"},{"key":"32_CR11","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.pmcj.2014.09.005","volume":"20","author":"S Kubler","year":"2015","unstructured":"Kubler, S., Fr\u00e4mling, K., Buda, A.: A standardized approach to deal with firewall and mobility policies in the IoT. Pervasive Mob. Comput. 20, 100\u2013114 (2015)","journal-title":"Pervasive Mob. Comput."},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"La Marra, A., Martinelli, F., Mori, P., Saracino, A.: Implementing usage control in internet of things: a smart home use case. In: 2017 IEEE Trustcom\/BigDataSE\/ICESS, pp. 1056\u20131063. IEEE (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.352"},{"key":"32_CR13","doi-asserted-by":"publisher","unstructured":"Lee, P.A., Anderson, T.: Fault tolerance. In: Fault Tolerance. Dependable Computing and Fault-Tolerant Systems, vol. 3, pp. 51\u201377. Springer, Vienna (1990). https:\/\/doi.org\/10.1007\/978-3-7091-8990-0_3","DOI":"10.1007\/978-3-7091-8990-0_3"},{"issue":"2","key":"32_CR14","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s11036-012-0355-5","volume":"18","author":"X Li","year":"2013","unstructured":"Li, X., Ji, H., Li, Y.: Layered fault management scheme for end-to-end transmission in internet of things. Mob. Netw. Appl. 18(2), 195\u2013205 (2013)","journal-title":"Mob. Netw. Appl."},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"Lyu, M.R.: Software reliability engineering: a roadmap. In: Future of Software Engineering (FOSE 2007), pp. 153\u2013170. IEEE (2007)","DOI":"10.1109\/FOSE.2007.24"},{"issue":"05","key":"32_CR16","doi-asserted-by":"publisher","first-page":"10","DOI":"10.4236\/jcc.2015.35021","volume":"3","author":"S Madakam","year":"2015","unstructured":"Madakam, S., Ramaswamy, R., Tripathi, S.: Internet of things (IoT): a literature review. J. Comput. Commun. 3(05), 10 (2015)","journal-title":"J. Comput. Commun."},{"key":"32_CR17","doi-asserted-by":"publisher","unstructured":"Miraz, M.H., Ali, M., Excell, P.S., Picking, R.: A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT). In: 2015 Internet Technologies and Applications (ITA), pp. 219\u2013224 (2015). https:\/\/doi.org\/10.1109\/ITechA.2015.7317398","DOI":"10.1109\/ITechA.2015.7317398"},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Ojie, E., Pereira, E.: Exploring dependability issues in IoT applications. In: Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, p. 123. ACM (2017)","DOI":"10.1145\/3018896.3036364"},{"key":"32_CR19","doi-asserted-by":"publisher","first-page":"13260","DOI":"10.1109\/ACCESS.2019.2891969","volume":"7","author":"D Ratasich","year":"2019","unstructured":"Ratasich, D., Khalid, F., Gei\u00dfler, F., Grosu, R., Shafique, M., Bartocci, E.: A roadmap toward the resilient internet of things for cyber-physical systems. IEEE Access 7, 13260\u201313283 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2891969","journal-title":"IEEE Access"},{"key":"32_CR20","doi-asserted-by":"crossref","unstructured":"\u015etefan, V.K., Otto, P., Alexandrina, P.M.: Considerations regarding the dependability of internet of things. In: 2017 14th International Conference on Engineering of Modern Electric Systems (EMES), pp. 145\u2013148. IEEE (2017)","DOI":"10.1109\/EMES.2017.7980401"},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"Su, P.H., Shih, C.S., Hsu, J.Y.J., Lin, K.J., Wang, Y.C.: Decentralized fault tolerance mechanism for intelligent IoT\/M2M middleware. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 45\u201350. IEEE (2014)","DOI":"10.1109\/WF-IoT.2014.6803115"},{"key":"32_CR22","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1016\/j.future.2017.04.004","volume":"78","author":"MW Woo","year":"2018","unstructured":"Woo, M.W., Lee, J., Park, K.: A reliable IoT system for personal healthcare devices. Futur. Gener. Comput. Syst. 78, 626\u2013640 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"32_CR23","doi-asserted-by":"crossref","unstructured":"Xing, L., Zhao, G., Wang, Y., Mandava, L.: Competing failure analysis in IoT systems with cascading functional dependence. In: 2018 Annual Reliability and Maintainability Symposium (RAMS), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/RAM.2018.8463129"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87013-3_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T14:31:51Z","timestamp":1631197911000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87013-3_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030870126","9783030870133"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87013-3_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cagliari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Customed version of CyberChair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1588","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"466","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}