2013
DOI: 10.1007/978-3-642-38998-6_17
|View full text |Cite
|
Sign up to set email alerts
|

Retrieving Monitoring and Accounting Information from Constrained Devices in Internet-of-Things Applications

Abstract: Internet-of-Things (IoT) is envisioned to provide connectiv-ity to a vast number of sensing or actuating devices with limited com-putational and communication capabilities. For the organizations that manage these constrained devices, the monitoring of each device's oper-ational status and performance level as well as the accounting of their re-source usage are of great importance. However, monitoring and account-ing support is lacking in today's IoT platforms. Hence, this paper stud-ies the applicability of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…This information creates overhead and the processing needs additional processing power. The results in [12,13] shows that fragmentation can significantly degrade the performance of devices in the IoT ecosystem. Fragmentation of data before transmission may also open the transmission to security threats.…”
Section: Fragmentation and Re-assemblymentioning
confidence: 99%
“…This information creates overhead and the processing needs additional processing power. The results in [12,13] shows that fragmentation can significantly degrade the performance of devices in the IoT ecosystem. Fragmentation of data before transmission may also open the transmission to security threats.…”
Section: Fragmentation and Re-assemblymentioning
confidence: 99%
“…One example of using Zenoss in IoT monitoring was given in [35]. Mazhelis et al have analyzed the possibilities of use of the CoAP protocol for monitoring of IoT infrastructure as well as adapting existing Accounting and Monitoring of Authentication and Authorization Infrastructure Services (AMAAIS) project [36] for such use [37]. Although NMS products can differ significantly from each other, practically all of them support at least data gathering via SNMP.…”
Section: Integration With Existing Systemsmentioning
confidence: 99%
“…CoAP-based protocols (e.g. [16]) have also been investigated, nonetheless, these are also non standardized custom protocols on top of the application layer protocol. Considering that the IoT to some degree originated from RFID, we surveyed other technologies than those based on ISO/OSI (Internet)-like stacks.…”
Section: ) Generalmentioning
confidence: 99%