2012 IEEE 12th International Conference on Computer and Information Technology 2012
DOI: 10.1109/cit.2012.195
|View full text |Cite
|
Sign up to set email alerts
|

Study on the Architecture of Platform for Internet of Things Service Based on EDSOA

Abstract: This paper proposes architecture for Internet of Things service based on EDSOA. This architecture can fulfil the processing of perception flow information in a large scale; it can also support the mode of Internet of Things service which can make an interaction of business flow, control flow and perception flow. It has the advantages of loose coupling, business supporting and high ability of being integrated. This kind of architecture is helpful for industry developing of business, cooperative work, compositio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Always around event processing, Li et al (2012) propose a service-based architecture for the IoT, called event-driven service-oriented architecture (EDSOA), enabling the processing of more complex flows with low coupling. The signals obtained through the IoT world are concentrated in an Enterprise Service Bus that uses the Publish/Subscribe model for event processing.…”
Section: Complex Event Processing (Cep)mentioning
confidence: 99%
“…Always around event processing, Li et al (2012) propose a service-based architecture for the IoT, called event-driven service-oriented architecture (EDSOA), enabling the processing of more complex flows with low coupling. The signals obtained through the IoT world are concentrated in an Enterprise Service Bus that uses the Publish/Subscribe model for event processing.…”
Section: Complex Event Processing (Cep)mentioning
confidence: 99%
“…This layer collects environmental information through monitoring tools such as GPS, cameras, sensors, and sensor‐enabled RFID tags. Smart appliances in a smart kitchen, sensory devices in a smart home, smart equipment used in a smart grid, smart medical appliances inside a smart hospital, smart light and heavy machinery inside a factory 4.0 environment, communication components of a smart vehicle, smart entertainment equipment, and smart education appliances, and so on can be considered as part of the huge physical resources of an IoT system 12,14,17‐21 …”
Section: Iot System Model and Security Issuesmentioning
confidence: 99%
“…The most famous security threats in this layer are data attack, malicious code injection, common attack due to the inherent security weakness of infrastructure and underlying misbehavior, insecure communication with a third party, virtualization threats, shared resources, data protection attack, recovery attack, and software vulnerabilities. The effects of such attacks are data leakage or data loss, halt transmission, service hijacking, data Leakage, resource destruction, resource theft, permanent data loss as well as buffer overflow, and so on 12,16‐19 . Further details on some of these attacks are provided in the following.…”
Section: Iot System Model and Security Issuesmentioning
confidence: 99%
“…Classic Internet approaches need to be revised to address the complex requirements imposed by IoT. This asks for the development of intelligent algorithms for routing [1], information sharing security [6], [5], novel network paradigms [8], [14], [16], new services [11], [15], and advanced techniques for data fusion [3].…”
Section: Introductionmentioning
confidence: 99%