{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:17:23Z","timestamp":1740147443698,"version":"3.37.3"},"reference-count":71,"publisher":"Institution of Engineering and Technology (IET)","issue":"5","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100005877","name":"Luonnontieteiden ja Tekniikan Tutkimuksen Toimikunta","doi-asserted-by":"publisher","award":["295913"],"id":[{"id":"10.13039\/501100005877","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET softw."],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1049\/iet-sen.2017.0350","type":"journal-article","created":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T02:11:31Z","timestamp":1522980691000},"page":"381-389","source":"Crossref","is-referenced-by-count":13,"title":["Architecting the Web of Things for the fog computing era"],"prefix":"10.1049","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7994-3700","authenticated-orcid":false,"given":"Niko","family":"M\u00e4kitalo","sequence":"first","affiliation":[{"name":"Department of Computer Science University of Helsinki Gustaf H\u00e4llstr\u00f6min Katu 2b 00014 Helsinki Finland"}]},{"given":"Francesco","family":"Nocera","sequence":"additional","affiliation":[{"name":"Department of Electrical & Information Engineering (DEI) Polytechnic University of Bari Via E. Orabona 4 70125 Bari Italy"}]},{"given":"Marina","family":"Mongiello","sequence":"additional","affiliation":[{"name":"Department of Electrical & Information Engineering (DEI) Polytechnic University of Bari Via E. Orabona 4 70125 Bari Italy"}]},{"given":"Stefano","family":"Bistarelli","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science University of Perugia Via Vanvitelli 1 06123 Perugia Italy"}]}],"member":"265","published-online":{"date-parts":[[2018,10]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"crossref","unstructured":"Stirbu V.: \u2018Towards a restful plug and play experience in the Web of Things\u2019.2008 IEEE Int. Conf. Semantic Computing August2008 pp.512\u2013517","DOI":"10.1109\/ICSC.2008.51"},{"key":"e_1_2_8_3_1","unstructured":"Guinard D.: \u2018Towards the Web of Things: Web mashups for embedded devices\u2019.In MEM 2009\u00a0in Proc. WWW 2009 2009"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19157-2_5"},{"key":"e_1_2_8_5_1","first-page":"55:1","article-title":"Searching the Web OF Things: state of the art, challenges, and solutions","volume":"50","author":"Tran N.K.","year":"2017","journal-title":"ACM Comput. Surv."},{"key":"e_1_2_8_6_1","doi-asserted-by":"crossref","unstructured":"Bonomi F. Milito R. Zhu J. et al.: \u2018Fog computing and its role in the Internet of Things\u2019.Proc. First Edition of the MCC Workshop on Mobile Cloud Computing 2012 pp.13\u201316","DOI":"10.1145\/2342509.2342513"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.245"},{"key":"e_1_2_8_8_1","doi-asserted-by":"crossref","unstructured":"Taivalsaari A. Mikkonen T. Anttonen M. et al.: \u2018The death of binary software: end user software moves to the Web\u2019.Creating Connecting and Collaborating Through Computing (C5) 2011\u00a0Ninth Int. Conf. January2011 pp.17\u201323","DOI":"10.1109\/C5.2011.9"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.145"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.26"},{"key":"e_1_2_8_11_1","doi-asserted-by":"crossref","unstructured":"M\u00e4kitalo N. Aaltonen T. Mikkonen T.: \u2018Coordinating proactive social devices in a mobile cloud: lessons learned and a way forward\u2019.Proc. Int. Conf. Mobile Software Engineering and Systems MOBILESoft \u201816 New York NY USA 2016 pp.179\u2013188","DOI":"10.1145\/2897073.2897079"},{"key":"e_1_2_8_12_1","unstructured":"Fielding R.T.: \u2018REST: architectural styles and the design of network-based software architectures\u2019. Doctoral dissertation University of California Irvine 2000"},{"key":"e_1_2_8_13_1","unstructured":"Internet engineering task force (IETF) RFC 7540 \u2013 hypertext transfer protocol version 2 (HTTP\/2) May2015"},{"key":"e_1_2_8_14_1","unstructured":"Bermbach D. Pallas F. P\u00e9rez D.G. et al.: \u2018A research perspective on Fog computing\u2019.Proc. 2nd Workshop on IoT Systems Provisioning & Management for Context-Aware Smart Cities Springer 2017"},{"issue":"5","key":"e_1_2_8_15_1","first-page":"433","article-title":"Architecting liquid software","volume":"16","author":"Gallidabino A.","year":"2017","journal-title":"J. Web Eng."},{"volume-title":"The power of events","year":"2002","author":"Luckham D.","key":"e_1_2_8_16_1"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187671.2187677"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170432"},{"key":"e_1_2_8_19_1","doi-asserted-by":"crossref","unstructured":"Randika H. Martin H. Sampath D. et al.: \u2018Scalable fault tolerant architecture for complex event processing systems\u2019.Advances in ICT for Emerging Regions (ICTer) 2010 Int. Conf. 2010 pp.86\u201396","DOI":"10.1109\/ICTER.2010.5643265"},{"key":"e_1_2_8_20_1","doi-asserted-by":"crossref","unstructured":"Zhang H. Diao Y. Immerman N.: \u2018On complexity and optimization of expensive queries in complex event processing\u2019.Proc. 2014 ACM SIGMOD Int. Conf. Management of data 2014 pp.217\u2013228","DOI":"10.1145\/2588555.2593671"},{"issue":"2","key":"e_1_2_8_21_1","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s00607-012-0217-9","article-title":"Deployment strategies for distributed complex event processing","volume":"95","author":"Cugola G.","year":"2013","journal-title":"Computing"},{"key":"e_1_2_8_22_1","unstructured":"Soto J.A.C. Jentsch M. Preuveneers D. et al.: \u2018CEML: mixing and moving complex event processing and machine learning to the edge of the network for IoT applications\u2019.Proc. 6th Int. Conf. Internet of Things IoT'16 New York NY USA 2016 pp.103\u2013110"},{"key":"e_1_2_8_23_1","doi-asserted-by":"crossref","unstructured":"Mayer R. Tariq M.A. Rothermel K.: \u2018Minimizing communication overhead in window-based parallel complex event processing\u2019.Proc. 11th ACM Int. Conf. Distributed and Event-based Systems 2017 pp.54\u201365","DOI":"10.1145\/3093742.3093914"},{"key":"e_1_2_8_24_1","doi-asserted-by":"crossref","unstructured":"Starks F. Plagemann T.P. Kristiansen S.: \u2018DCEP-SIM: an open simulation framework for distributed CEP\u2019.Proc. 11th ACM Int. Conf. Distributed and Event-based Systems 2017 pp.180\u2013190","DOI":"10.1145\/3093742.3093919"},{"key":"e_1_2_8_25_1","doi-asserted-by":"crossref","unstructured":"Alshuqayran N. Ali N. Evans R.: \u2018A systematic mapping study in microservice architecture\u2019.2016 IEEE 9th Int. Conf. Service-Oriented Computing and Applications (SOCA) November2016 pp.44\u201351","DOI":"10.1109\/SOCA.2016.15"},{"key":"e_1_2_8_26_1","doi-asserted-by":"crossref","unstructured":"Francesco P.D. Malavolta I. Lago P.: \u2018Research on architecting microservices: trends focus and potential for industrial adoption\u2019.2017 IEEE Int. Conf. Software Architecture (ICSA) April2017 pp.21\u201330","DOI":"10.1109\/ICSA.2017.24"},{"key":"e_1_2_8_27_1","unstructured":"Lewis J. Fowler M.:\u2018Microservices\u2019. Available athttps:\/\/martinfowler.com\/articles\/microservices.html accessed March2015"},{"key":"e_1_2_8_28_1","doi-asserted-by":"crossref","unstructured":"Dragoni N. Giallorenzo S. Lluch-Lafuente A. et al.: \u2018Microservices: yesterday today and tomorrow\u2019 CoRR vol. abs\/1606.04036 2016","DOI":"10.1007\/978-3-319-67425-4_12"},{"key":"e_1_2_8_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.11"},{"key":"e_1_2_8_30_1","doi-asserted-by":"crossref","unstructured":"Pahl C. Jamshidi P.: \u2018Microservices: a systematic mapping study\u2019.CLOSER 2016 vol. 1 pp.137\u2013146","DOI":"10.5220\/0005785501370146"},{"key":"e_1_2_8_31_1","doi-asserted-by":"crossref","unstructured":"Mayer S. Karam D.S.: \u2018A computational space for the Web of Things\u2019.Proc. Third Int. Workshop on the Web of Things 2012 p.8","DOI":"10.1145\/2379756.2379764"},{"key":"e_1_2_8_32_1","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/978-1-4614-6309-2_12","volume-title":"Managing and mining sensor data","author":"Aggarwal C.C.","year":"2013"},{"volume-title":"Building the Web of Things: with examples in node. js and raspberry pi","year":"2016","author":"Guinard D.","key":"e_1_2_8_33_1"},{"key":"e_1_2_8_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5861-5_5"},{"key":"e_1_2_8_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.36"},{"key":"e_1_2_8_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600885"},{"key":"e_1_2_8_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.02.014"},{"key":"e_1_2_8_38_1","doi-asserted-by":"crossref","unstructured":"M\u00e4kitalo N. Ometov A. Kannisto J. et al.: \u2018Safe and secure execution at the network edge: a framework for coordinating cloud fog and edge\u2019 IEEE Softw. 2018","DOI":"10.1109\/MS.2018.110164708"},{"key":"e_1_2_8_39_1","doi-asserted-by":"crossref","unstructured":"Guinard D. Trifa V. Wilde E.: \u2018A resource oriented architecture for the Web of Things\u2019 Internet of Things (IOT) 2010 pp.1\u20138","DOI":"10.1109\/IOT.2010.5678452"},{"key":"e_1_2_8_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/514183.514185"},{"key":"e_1_2_8_41_1","unstructured":"Kajimoto K. Kovatsch M. Davuluru U.: \u2018Web of Things (WoT) architecture\u2019 Technical Report World Wide Web Consortium (W3C) 092017"},{"key":"e_1_2_8_42_1","unstructured":"Kaebisch S. Kamiya T.: \u2018Web of Things (WoT) thing description\u2019 Technical Report World Wide Web Consortium (W3C) 092017"},{"key":"e_1_2_8_43_1","unstructured":"Koster M.: \u2018Web of Things (WoT) protocol binding templates\u2019 Technical Report World Wide Web Consortium (W3C) 102017"},{"key":"e_1_2_8_44_1","unstructured":"Kis Z. Nimura K. Peintner D. et al.: \u2018Web of Things (WoT) scripting API\u2019 Technical Report World Wide Web Consortium (W3C) 102017"},{"key":"e_1_2_8_45_1","doi-asserted-by":"crossref","first-page":"20058","DOI":"10.1109\/ACCESS.2017.2755259","article-title":"Hypermedia APIS for the Web of Things","volume":"5","author":"Martins J. A.","year":"2017","journal-title":"IEEE Access"},{"key":"e_1_2_8_46_1","unstructured":"Trifa V. Guinard D. Carrera D.: \u2018Web thing model W3C Member Submission\u2019 Technical Report World Wide Web Consortium (W3C) 042017"},{"key":"e_1_2_8_47_1","unstructured":"Kelly M.: \u2018JSON hypertext application language (JSON-HAL)\u2019 Technical Report IETF 112016"},{"key":"e_1_2_8_48_1","unstructured":"Koster M.: \u2018Media types for hypertext sensor markup (HSML)\u2019 Technical Report IETF 092017"},{"key":"e_1_2_8_49_1","unstructured":"Hartke K.: \u2018The constrained RESTful application language (CoRAL)\u2019 Technical Report IETF 102017"},{"key":"e_1_2_8_50_1","unstructured":"Francis B.: \u2018Web thing API (unofficial draft)\u2019 Technical Report World Wide Web Consortium (W3C) 032018"},{"key":"e_1_2_8_51_1","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1016\/B978-0-12-809764-9.00018-4","volume-title":"Managing the web of things","author":"El Jaouhari S.","year":"2017"},{"key":"e_1_2_8_52_1","unstructured":"Mendez D.M. Papapanagiotou I. Yang B.: \u2018Internet of Things: survey on security and privacy\u2019 CoRR vol. abs\/1707.01879 2017"},{"key":"e_1_2_8_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"e_1_2_8_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.04.002"},{"key":"e_1_2_8_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"key":"e_1_2_8_56_1","article-title":"A survey of secure middleware for the Internet of Things","volume":"3","author":"Fremantle P.","year":"2017","journal-title":"Peer J. Comput. Sci."},{"key":"e_1_2_8_57_1","doi-asserted-by":"crossref","unstructured":"Atamli A. Martin A.P.: \u2018Threat-based security analysis for the Internet of Things\u2019 2014 Int. Workshop on Secure Internet of Things SIoT 2014 Wroclaw Poland September 10 2014 pp.35\u201343","DOI":"10.1109\/SIoT.2014.10"},{"key":"e_1_2_8_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_2_8_59_1","doi-asserted-by":"crossref","unstructured":"Dragoni N. Giaretta A. Mazzara M.: \u2018The internet of hackable things\u2019 CoRR vol. abs\/1707.08380 2017","DOI":"10.31224\/osf.io\/5ua7g"},{"key":"e_1_2_8_60_1","unstructured":"\u2018Internet of Things research study\u2019. Available athttp:\/\/www8.hp.com\/us\/en\/hp-news\/press-release.html?id=1744676 2015 accessed 30\u00a0November 2017"},{"key":"e_1_2_8_61_1","doi-asserted-by":"crossref","unstructured":"Zhao K. Ge L.: \u2018A survey on the Internet of Things security\u2019.Ninth Int. Conf. Computational Intelligence and Security CIS 2013 EMEI Mountain Sichan Province China December 14\u201315 2013 pp.663\u2013667","DOI":"10.1109\/CIS.2013.145"},{"key":"e_1_2_8_62_1","doi-asserted-by":"crossref","unstructured":"Madlmayr G. Langer J. Kantner C. et al.: \u2018NFC devices: security and privacy\u2019.Proc. Third Int. Conf. Availability Reliability and Security ARES 2008 Technical University of Catalonia Barcelona Spain March 4\u201372008 pp.642\u2013647","DOI":"10.1109\/ARES.2008.105"},{"key":"e_1_2_8_63_1","doi-asserted-by":"crossref","unstructured":"Zafari F. Papapanagiotou I.: \u2018Enhancing ibeacon based micro-location with particle filtering\u2019.2015 IEEE Global Communications Conf. GLOBECOM 2015 San Diego CA USA December 6\u2013102015 pp.1\u20137","DOI":"10.1109\/GLOCOM.2015.7417504"},{"key":"e_1_2_8_64_1","doi-asserted-by":"crossref","unstructured":"Zafari F. Papapanagiotou I. Devetsikiotis M. et al.: \u2018Enhancing the accuracy of ibeacons for indoor proximity-based services\u2019.IEEE Int. Conf. Communications ICC 2017 Paris France May 21\u2013252017 pp.1\u20137","DOI":"10.1109\/ICC.2017.7996508"},{"issue":"1","key":"e_1_2_8_65_1","doi-asserted-by":"crossref","first-page":"65","DOI":"10.4304\/jnw.3.1.65-77","article-title":"Securing wireless sensor networks: security architectures","volume":"3","author":"Boyle D.","year":"2008","journal-title":"JNW"},{"key":"e_1_2_8_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6704479"},{"key":"e_1_2_8_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2498900"},{"key":"e_1_2_8_68_1","unstructured":"OASIS Message Queuing Telemetry Transport (MQTT) TC: \u2018MQTT Version 3.1.1\u2019 Standard Oasis October 2014. Edited by Andrew Banks and Rahul Gupta. 29 October 2014. OASIS Standard. Available athttp:\/\/docs.oasis-open.org\/mqtt\/mqtt\/v3.1.1\/os\/mqtt-v3.1.1-os.html. Latest version:http:\/\/docs.oasis-open.org\/mqtt\/mqtt\/v3.1.1\/mqtt-v3.1.1.html"},{"key":"e_1_2_8_69_1","unstructured":"I.J.I. Technology.: \u2018ISO\/IEC 20922:2016\u2019 Standard International Organization for Standardization (ISO) June2016"},{"key":"e_1_2_8_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.37"},{"key":"e_1_2_8_71_1","article-title":"Securing fog computing for Internet of Things applications: challenges and solutions","author":"Ni J.","year":"2017","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"e_1_2_8_72_1","doi-asserted-by":"crossref","unstructured":"Ometov A. Masek P. Urama J. et al.: \u2018Implementing secure network-assisted d2d framework in live 3GPP LTE deployment\u2019.2016 IEEE Int. Conf. Communications Workshops (ICC) Kuala Lumpur Malaysia May2016 pp.749\u2013754","DOI":"10.1109\/ICCW.2016.7503877"}],"container-title":["IET Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-sen.2017.0350","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-sen.2017.0350","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-sen.2017.0350","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,18]],"date-time":"2022-08-18T05:24:19Z","timestamp":1660800259000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-sen.2017.0350"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":71,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["10.1049\/iet-sen.2017.0350"],"URL":"https:\/\/doi.org\/10.1049\/iet-sen.2017.0350","archive":["Portico"],"relation":{},"ISSN":["1751-8806","1751-8814"],"issn-type":[{"type":"print","value":"1751-8806"},{"type":"electronic","value":"1751-8814"}],"subject":[],"published":{"date-parts":[[2018,10]]}}}