{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T17:49:41Z","timestamp":1725299381550},"reference-count":52,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T00:00:00Z","timestamp":1674518400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Internet of Things"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1016\/j.iot.2023.100706","type":"journal-article","created":{"date-parts":[[2023,2,3]],"date-time":"2023-02-03T03:20:07Z","timestamp":1675394407000},"page":"100706","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"C","title":["Specialized path-based technique to test Internet of Things system functionality under limited network connectivity"],"prefix":"10.1016","volume":"22","author":[{"given":"Matej","family":"Klima","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2994-7826","authenticated-orcid":false,"given":"Miroslav","family":"Bures","sequence":"additional","affiliation":[]},{"given":"Bestoun S.","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Xavier","family":"Bellekens","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Atkinson","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Tachtatzis","sequence":"additional","affiliation":[]},{"given":"Pavel","family":"Herout","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.iot.2023.100706_b1","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s10796-014-9492-7","article-title":"The internet of things: a survey","volume":"17","author":"Li","year":"2015","journal-title":"Inf. Syst. Front."},{"issue":"3","key":"10.1016\/j.iot.2023.100706_b2","doi-asserted-by":"crossref","first-page":"2011","DOI":"10.1109\/COMST.2018.2803740","article-title":"How can heterogeneous Internet of Things build our future: A survey","volume":"20","author":"Qiu","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.iot.2023.100706_b3","doi-asserted-by":"crossref","first-page":"13758","DOI":"10.1109\/ACCESS.2019.2893493","article-title":"Aspects of quality in internet of things (IoT) solutions: A systematic mapping study","volume":"7","author":"Ahmed","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.iot.2023.100706_b4","series-title":"Trends and Applications in Information Systems and Technologies","first-page":"546","article-title":"Review of specific features and challenges in the current internet of things systems impacting their security and reliability","author":"Bures","year":"2021"},{"key":"10.1016\/j.iot.2023.100706_b5","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.comnet.2018.03.012","article-title":"Internet of things security: A top-down survey","volume":"141","author":"Kouicem","year":"2018","journal-title":"Comput. Netw."},{"issue":"21","key":"10.1016\/j.iot.2023.100706_b6","doi-asserted-by":"crossref","DOI":"10.1002\/cpe.4946","article-title":"An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols","volume":"32","author":"Gupta","year":"2020","journal-title":"Concurr. Comput.: Pract. Exper."},{"issue":"4","key":"10.1016\/j.iot.2023.100706_b7","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1080\/13675567.2020.1757053","article-title":"Smart logistics based on the internet of things technology: an overview","volume":"24","author":"Ding","year":"2021","journal-title":"Int. J. Logist. Res. Appl."},{"key":"10.1016\/j.iot.2023.100706_b8","series-title":"International Conference on Information Science and Applications","first-page":"625","article-title":"Internet of things: Current challenges in the quality assurance and testing methods","author":"Bures","year":"2018"},{"key":"10.1016\/j.iot.2023.100706_b9","series-title":"Software Testing, Verification and Validation (ICST), 2012 IEEE Fifth International Conference on","first-page":"280","article-title":"Better algorithms to minimize the cost of test paths","author":"Li","year":"2012"},{"key":"10.1016\/j.iot.2023.100706_b10","series-title":"Introduction to Software Testing","author":"Ammann","year":"2016"},{"key":"10.1016\/j.iot.2023.100706_b11","first-page":"1","article-title":"Synthesizing test scenarios in uml activity diagram using a bio-inspired approach","volume":"50","author":"Arora","year":"2017","journal-title":"Comput. Lang. Syst. Struct."},{"key":"10.1016\/j.iot.2023.100706_b12","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.infsof.2019.06.006","article-title":"Employment of multiple algorithms for optimal path-based test selection strategy","volume":"114","author":"Bures","year":"2019","journal-title":"Inf. Softw. Technol."},{"issue":"07","key":"10.1016\/j.iot.2023.100706_b13","doi-asserted-by":"crossref","first-page":"997","DOI":"10.1142\/S0218194019500335","article-title":"Prioritized process test: An alternative to current process testing strategies","volume":"29","author":"Bures","year":"2019","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"issue":"8","key":"10.1016\/j.iot.2023.100706_b14","doi-asserted-by":"crossref","first-page":"1978","DOI":"10.1016\/j.jss.2013.02.061","article-title":"An orchestrated survey of methodologies for automated software test case generation","volume":"86","author":"Anand","year":"2013","journal-title":"J. Syst. Softw."},{"issue":"1","key":"10.1016\/j.iot.2023.100706_b15","doi-asserted-by":"crossref","DOI":"10.1145\/3020266","article-title":"A survey on data-flow testing","volume":"50","author":"Su","year":"2017","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.iot.2023.100706_b16","series-title":"Automatic test data generation using data flow information","author":"Khamis","year":"2000"},{"issue":"2","key":"10.1016\/j.iot.2023.100706_b17","first-page":"355","article-title":"Bigradient neural network-based quantum particle swarm optimization for blind source separation","volume":"10","author":"Salman","year":"2021","journal-title":"IAES Int. J. Artif. Intell. (IJ-AI)"},{"issue":"2","key":"10.1016\/j.iot.2023.100706_b18","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/s00500-016-2474-6","article-title":"Particle swarm optimization algorithm: an overview","volume":"22","author":"Wang","year":"2018","journal-title":"Soft Comput."},{"key":"10.1016\/j.iot.2023.100706_b19","series-title":"Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation","first-page":"1121","article-title":"Applying particle swarm optimization to software testing","author":"Windisch","year":"2007"},{"key":"10.1016\/j.iot.2023.100706_b20","series-title":"TENCON 2009-2009 IEEE Region 10 Conference","first-page":"1","article-title":"An approach of optimal path generation using ant colony optimization","author":"Srivastava","year":"2009"},{"issue":"2","key":"10.1016\/j.iot.2023.100706_b21","first-page":"14","article-title":"Optimized test sequence generation from usage models using Ant colony optimization","volume":"2","author":"Srivastava","year":"2010","journal-title":"Int. J. Softw. Eng. Appl."},{"key":"10.1016\/j.iot.2023.100706_b22","series-title":"2015 International Congress on Technology, Communication and Knowledge","first-page":"435","article-title":"Automated generation of software testing path based on ant colony","author":"Sayyari","year":"2015"},{"key":"10.1016\/j.iot.2023.100706_b23","series-title":"The internet of things : QA unleashed","author":"Muthiah","year":"2015"},{"key":"10.1016\/j.iot.2023.100706_b24","series-title":"2018 8th International Conference on Computer Science and Information Technology","first-page":"17","article-title":"Software testing techniques in IoT","author":"Murad","year":"2018"},{"key":"10.1016\/j.iot.2023.100706_b25","series-title":"Software quality assurance testing methodologies in IoT","author":"Sirshar","year":"2019"},{"key":"10.1016\/j.iot.2023.100706_b26","series-title":"IoTBDS","first-page":"309","article-title":"Performance testing of an internet of things platform","author":"Esquiagola","year":"2017"},{"key":"10.1016\/j.iot.2023.100706_b27","series-title":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","first-page":"1","article-title":"Towards reliable iot: Testing lora communication","author":"Rude\u0161","year":"2018"},{"key":"10.1016\/j.iot.2023.100706_b28","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/j.jss.2017.05.125","article-title":"Quality of service approaches in IoT: A systematic mapping","volume":"132","author":"White","year":"2017","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.iot.2023.100706_b29","doi-asserted-by":"crossref","DOI":"10.1155\/2021\/6805151","article-title":"Machine learning for smart environments in B5G networks: connectivity and QoS","volume":"2021","author":"Alsamhi","year":"2021","journal-title":"Comput. Intell. Neurosci."},{"issue":"6","key":"10.1016\/j.iot.2023.100706_b30","doi-asserted-by":"crossref","first-page":"1636","DOI":"10.3390\/s20061636","article-title":"A systematic analysis of narrowband IoT quality of service","volume":"20","author":"Matz","year":"2020","journal-title":"Sensors"},{"issue":"3","key":"10.1016\/j.iot.2023.100706_b31","doi-asserted-by":"crossref","first-page":"2227","DOI":"10.1007\/s11277-021-08563-4","article-title":"Data traffic management based on compression and MDL techniques for smart agriculture in IoT","volume":"120","author":"Al-Qurabat","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.iot.2023.100706_b32","doi-asserted-by":"crossref","first-page":"117","DOI":"10.12785\/ijcds\/110109","article-title":"A lightweight huffman-based differential encoding lossless compression technique in IoT for smart agriculture","volume":"11","author":"Al-Qurabat","year":"2022","journal-title":"IJCDS J."},{"key":"10.1016\/j.iot.2023.100706_b33","doi-asserted-by":"crossref","first-page":"875","DOI":"10.21123\/bsj.2022.19.4.0875","article-title":"Perceptually important points-based data aggregation method for wireless sensor networks","volume":"19","author":"Dakhil Idan\u00a0Saeedi","year":"2022","journal-title":"Baghdad Sci. J."},{"issue":"1","key":"10.1016\/j.iot.2023.100706_b34","doi-asserted-by":"crossref","DOI":"10.1063\/5.0093971","article-title":"An energy-saving data aggregation method for wireless sensor networks based on the extraction of extrema points","volume":"2398","author":"Saeedi","year":"2022","journal-title":"AIP Conf. Proc."},{"issue":"4","key":"10.1016\/j.iot.2023.100706_b35","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1504\/IJCAT.2022.125182","article-title":"Important extrema points extraction-based data aggregation approach for elongating the WSN lifetime","volume":"68","author":"Al-Qurabat","year":"2022","journal-title":"Int. J. Comput. Appl. Technol."},{"issue":"16","key":"10.1016\/j.iot.2023.100706_b36","doi-asserted-by":"crossref","first-page":"17844","DOI":"10.1007\/s11227-022-04548-7","article-title":"Two-level energy-efficient data reduction strategies based on SAX-LZW and hierarchical clustering for minimizing the huge data conveyed on the internet of things networks","volume":"78","author":"Al-Qurabat","year":"2022","journal-title":"J. Supercomput."},{"key":"10.1016\/j.iot.2023.100706_b37","doi-asserted-by":"crossref","first-page":"579","DOI":"10.33640\/2405-609X.3259","article-title":"A clustering approach based on fuzzy C-means in wireless sensor networks for IoT applications","volume":"8","author":"Abdulzahra","year":"2022","journal-title":"Karbala Int. J. Mod. Sci."},{"key":"10.1016\/j.iot.2023.100706_b38","doi-asserted-by":"crossref","first-page":"15480","DOI":"10.1109\/ACCESS.2018.2802489","article-title":"IoT-TaaS: Towards a prospective IoT testing framework","volume":"6","author":"Kim","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.iot.2023.100706_b39","series-title":"Internet of Things from Hype to Reality","first-page":"1","article-title":"Internet of things (IoT) overview","author":"Rayes","year":"2019"},{"issue":"3","key":"10.1016\/j.iot.2023.100706_b40","doi-asserted-by":"crossref","DOI":"10.1088\/1757-899X\/928\/3\/032055","article-title":"An overview of periodic wireless sensor networks to the internet of things","volume":"928","author":"M.\u00a0Al-Qurabat","year":"2020","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"10.1016\/j.iot.2023.100706_b41","series-title":"2019 11th International Conference on Knowledge and Systems Engineering","first-page":"1","article-title":"Challenges of testing complex internet of things (IoT) devices and systems","author":"Gomez","year":"2019"},{"issue":"3","key":"10.1016\/j.iot.2023.100706_b42","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1007\/s11036-018-1089-9","article-title":"Interoperability in internet of things: Taxonomies and open challenges","volume":"24","author":"Noura","year":"2018","journal-title":"Mob. Netw. Appl."},{"key":"10.1016\/j.iot.2023.100706_b43","series-title":"Trends and Applications in Information Systems and Technologies","first-page":"570","article-title":"A testing tool for IoT systems operating with limited network connectivity","author":"Klima","year":"2021"},{"key":"10.1016\/j.iot.2023.100706_b44","series-title":"International Conference on Information Science and Applications","first-page":"585","article-title":"Prioritized process test: More efficiency in testing of business processes and workflows","author":"Bures","year":"2017"},{"key":"10.1016\/j.iot.2023.100706_b45","series-title":"IFIP International Conference on Testing Software and Systems","first-page":"63","article-title":"Minimum number of test paths for prime path and other structural coverage criteria","author":"Dwarakanath","year":"2014"},{"issue":"1","key":"10.1016\/j.iot.2023.100706_b46","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/3477.484436","article-title":"Ant system: optimization by a colony of cooperating agents","volume":"26","author":"Dorigo","year":"1996","journal-title":"IEEE Trans. Syst. Man Cybern. B"},{"key":"10.1016\/j.iot.2023.100706_b47","series-title":"Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No. 99TH8406), Vol. 2","first-page":"1470","article-title":"Ant colony optimization: a new meta-heuristic","author":"Dorigo","year":"1999"},{"key":"10.1016\/j.iot.2023.100706_b48","series-title":"New Contributions in Information Systems and Technologies","first-page":"789","article-title":"Pctgen: Automated generation of test cases for application workflows","author":"Bures","year":"2015"},{"key":"10.1016\/j.iot.2023.100706_b49","first-page":"1725","article-title":"Smart homes using Internet of Things","author":"Aravindan","year":"2017","journal-title":"Int. Res. J. Eng. Technol."},{"issue":"3","key":"10.1016\/j.iot.2023.100706_b50","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MS.2014.68","article-title":"Mutation testing","volume":"31","author":"Reales","year":"2014","journal-title":"IEEE Softw."},{"issue":"5","key":"10.1016\/j.iot.2023.100706_b51","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1109\/TSE.2010.62","article-title":"An analysis and survey of the development of mutation testing","volume":"37","author":"Jia","year":"2010","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.iot.2023.100706_b52","series-title":"2020 IEEE 13th International Conference on Software Testing, Validation and Verification","first-page":"442","article-title":"Open-source defect injection benchmark testbed for the evaluation of testing","author":"Bures","year":"2020"}],"container-title":["Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S254266052300029X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S254266052300029X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,1,14]],"date-time":"2024-01-14T22:37:47Z","timestamp":1705271867000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S254266052300029X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7]]},"references-count":52,"alternative-id":["S254266052300029X"],"URL":"https:\/\/doi.org\/10.1016\/j.iot.2023.100706","relation":{},"ISSN":["2542-6605"],"issn-type":[{"value":"2542-6605","type":"print"}],"subject":[],"published":{"date-parts":[[2023,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Specialized path-based technique to test Internet of Things system functionality under limited network connectivity","name":"articletitle","label":"Article Title"},{"value":"Internet of Things","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.iot.2023.100706","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"100706"}}