ChapterPDF Available

Abstract

Many of the initial developments towards the Internet of Things have focused on the combination of Auto-ID and networked infrastructures in businessto- business logistics and product life cycle applications. However, a future Internet of Things can provide a broader vision and also enable everyone to access and contribute rich information about things and locations. The success of social networks to share experience and personalised insights shows also great potential for integration with business-centric applications. The integration and interoperability with mainstream business software platforms can be enhanced and extended by real-time analytics, business intelligence and agent-based autonomous services. Information sharing may be rewarded through incentives, thus transforming the Internet of Things from a cost-focused experiment to a revenue-generating infrastructure to enable trading of enriched information and accelerate business innovation. Mash-ups and end-user programming will enable people to contribute to the Internet of Things with data, presentation and functionality. Things-generated physical world content and events from Auto-ID, sensors, actuators or meshed networks will be aggregated and combined with information from virtual worlds, such as business databases and Web 2.0 applications, and processed based on new business intelligence concepts. Direct action on the physical world will be supported through machine-interfaces and introduction of agile strategies. This chapter aims to provide a concept for a future architecture of the Internet of Things, including a definition, a review of developments, a list of key requirements and a technical design for possible implementation of the future Internet of Things. As open issues, the evaluation of usability by stakeholders in user-centric as well as business-centric scenarios is discussed and the need for quantifying costs and benefits for businesses, consumers, society and the environment is emphasised. Finally, guidelines are derived, for use by researchers as well as practitioners.
Contents
1 An Architectural Approach Towards the Future Internet of Things ............ 1
Dieter Uckelmann, Mark Harrison, Florian Michahelles
1.1 Introduction, Background and Initial Visions ..............................................2
1.2 Definitions and Functional Requirements .................................................... 4
1.3 A European Perspective on Funded Projects, Technologies and State of
the Art in Relation to the Internet of Things ......................................................9
1.4 Opportunities and Motivation..................................................................... 12
1.5 Outlook to Future Developments ...............................................................13
1.6 A Possible Architecture for the Future Internet of Things......................... 16
1.7 Conclusion and Outlook ............................................................................. 22
References......................................................................................................... 22
2 About the “Idea of Man” in System Design – An Enlightened Version of
the Internet of Things?......................................................................................... 25
Sarah Spiekermann
2.1 Introduction................................................................................................. 25
2.2 About the Idea of Man: Definition and Relation to System Design .......... 27
2.3 The Idea of Man as Opposed to the Nature of a Computer System...........28
2.4 Social Interaction and Norms at the Human/Machine Interface ................ 29
2.5 The Impact of the Programmer’s Idea of Man ........................................... 30
Foreword ................................................................................................................ V
Contents.................................................................................................................IX
Figures ................................................................................................................XIX
Tables............................................................................................................... XXIII
Abbreviations................................................................................................... XXV
X Contents
2.6 The Idea of Man: Steps and Challenges for its Recognition in System
Design............................................................................................................... 32
2.7 Conclusion.................................................................................................. 34
References ........................................................................................................ 34
3 Enabling the Masses to Become Creative in Smart Spaces........................... 37
Marc Roelands, Laurence Claeys, Marc Godon, Marjan Geerts, Mohamed
Ali Feki, Lieven Trappeniers
3.1 The Meaning of DiY in the Network Society ............................................ 37
3.1.1 DiY as Socio-Cultural Practice........................................................... 38
3.1.2 DiY in Software Application Creation ............................................... 41
3.1.3 DiY in Smart Spaces........................................................................... 41
3.2 Research Orientation towards Tangible Creation in Smart Spaces............ 42
3.3 Candidate Enabling Concept 1: The Call-out Internet of Things............... 43
3.3.1 Location-based Call-outs ....................................................................44
3.3.2 Tag-based Call-outs ............................................................................45
3.3.3 Image-based Call-outs ........................................................................ 46
3.3.4 The Future of Call-outs....................................................................... 46
3.4 Candidate Enabling Concept 2: The Smart Composables Internet of
Things ............................................................................................................... 47
3.4.1 Object Classification According to Creator and Purpose ................... 48
3.4.2 Grounding via Experimentation.......................................................... 50
3.5 Candidate Enabling Concept 3: The Phenomena Internet of Things ......... 52
3.5.1 Ingredients of the Phenomena Internet of Things............................... 53
3.5.2 Links to Current and Historical State of the Art................................. 55
3.5.3 Potential Application Domains........................................................... 57
3.5.4 Grounding via Experimentation.......................................................... 58
3.6 Conclusion.................................................................................................. 61
References ........................................................................................................ 62
Contents XI
4 The Toolkit Approach for End-user Participation in the Internet of
Things .................................................................................................................... 65
Irena Pletikosa Cvijikj, Florian Michahelles
4.1 From Internet to Internet of Things ............................................................ 65
4.2 Problems and Challenges............................................................................ 67
4.3 Towards a Participatory Approach ............................................................. 68
4.3.1 User-centered Design.......................................................................... 68
4.3.2 Open-source Development.................................................................. 70
4.3.3 End-user Programming .......................................................................71
4.3.4 Crowdsourcing .................................................................................... 72
4.3.5 Living Labs .........................................................................................73
4.4 Innovations to Users via Toolkits...............................................................75
4.5 Existing Toolkits......................................................................................... 76
4.5.1 I/O Boards and HW Based Systems ................................................... 77
4.5.2 SW Based Solutions............................................................................85
4.6 Discussion................................................................................................... 90
4.7 Conclusion .................................................................................................. 92
References......................................................................................................... 93
5 From the Internet of Things to the Web of Things: Resource-oriented
Architecture and Best Practices..........................................................................97
5.1 From the Internet of Things to the Web of Things..................................... 97
5.2 Designing RESTful Smart Things............................................................100
5.2.1 Modeling Functionality as Linked Resources................................... 100
5.2.2 Representing Resources .................................................................... 101
5.2.3 Servicing Through a Uniform Interface............................................ 103
5.2.4 Syndicating Things............................................................................ 105
5.2.5 Things Calling Back: Web Hooks ....................................................106
5.3 Web-enabling Constrained Devices .........................................................107
5.4 Physical Mashups: Recomposing the Physical World .............................112
Dominique Guinard, Vlad Trifa, Friedemann Mattern, Erik Wilde
XII Contents
5.4.1 Energy Aware Mashup: “Energie Visible”....................................... 113
5.4.2 Business Intelligence Mashup: RESTful EPCIS .............................. 114
5.4.3 A Mashup Editor for the Smart Home.............................................. 116
5.5 Advanced Concepts: The Future Web of Things ..................................... 118
5.5.1 Real-time Web of Things.................................................................. 119
5.5.2 Finding and Describing Smart Things .............................................. 121
5.5.3 Sharing Smart Things ....................................................................... 123
5.6 Discussing the Future Web of Things ...................................................... 126
5.7 Conclusion................................................................................................ 127
References ...................................................................................................... 128
6 A Service-oriented, Semantic Approach to Data Integration for an
Internet of Things Supporting Autonomous Cooperating Logistics
Processes.............................................................................................................. 131
Karl A. Hribernik, Carl hans, Christoph Kramer, Klaus-Dieter Thoben
6.1 Introduction and Background............................................................... 131
6.2 State of the Art ..................................................................................... 134
6.2.1 The Internet of Things.................................................................. 134
6.2.2 Autonomous Cooperating Logistics Processes............................ 136
6.2.3 Item-level Information Management Approaches ....................... 137
6.2.4 Enterprise Application Integration Approaches........................... 141
6.3 Problem Analysis...................................................................................... 143
6.3.1 Logistics Systems Integration Targets ......................................... 143
6.3.2 Integrating Intelligent Logistics Objects...................................... 144
6.3.3 Summary of Data Integration Requirements ............................... 146
6.4 Solution Concept – A Service-oriented, Ontology-based Mediator .... 149
6.4.1 Ontology-based Mediator............................................................. 149
6.4.2 Service Interface Layer for Logical Views .................................. 152
6.5 Conclusions and Outlook ..................................................................... 154
References ...................................................................................................... 155
Contents XIII
7 Resource Management in the Internet of Things: Clustering,
Synchronisation and Software Agents.............................................................. 159
Tomás Sánchez López, Alexandra Brintrup, Marc-André Isenberg,
Jeanette Mansfeld
7.1 Introduction............................................................................................... 159
7.2 Background and Related Work................................................................. 160
7.2.1 Clustering .......................................................................................... 160
7.2.2 Software Agents ................................................................................ 164
7.2.3 Data Synchronisation ........................................................................ 166
7.3 Assumptions and Definitions.................................................................... 168
7.4 Clustering for Scalability.......................................................................... 170
7.4.1 Clustering Principles in an Internet of Things Architecture ............. 170
7.4.2 The Role of Context.......................................................................... 172
7.4.3 Design Guidelines ............................................................................. 173
7.5 Software Agents for Object Representation ............................................. 179
7.6 Data Synchronisation................................................................................ 182
7.6.1 Types of Network Architectures ....................................................... 182
7.6.2 Requirements and Challenges...........................................................186
7.7 Summary and Conclusion......................................................................... 190
References....................................................................................................... 191
8 The Role of the Internet of Things for Increased Autonomy and Agility
in Collaborative Production Environments.....................................................195
Marc-André Isenberg, Dirk Werthmann, Ernesto Morales-Kluge,
Bernd Scholz-Reiter
8.1 Introduction............................................................................................... 195
8.2 Emerging Challenges of Networked Enterprises ..................................... 197
8.3 Fundamental Concepts of Agility and Autonomy.................................... 199
8.3.1 Agility ............................................................................................... 199
8.3.2 Autonomous Control.........................................................................202
8.4 Enabling Autonomy and Agility by the Internet of Things...................... 206
XIV Contents
8.5 Technical Requirements for Satisfying the New Demands in Production
Logistics.......................................................................................................... 209
8.5.1 The Evolution from the RFID-based EPC Network to an Agent-
based Internet of Things............................................................................. 209
8.5.2 Agents for the Behaviour of Objects ................................................ 213
8.6 Application Field: Automotive Tail-lights – Intelligent Product............. 216
8.6.1 Assembly Scenario............................................................................ 217
8.6.2 Layout ............................................................................................... 218
8.6.3 The System........................................................................................ 219
8.6.4 Technological Prerequisites.............................................................. 221
8.7 Challenges by Developing the Internet of Things.................................... 223
8.8 Conclusion and Outlook ........................................................................... 225
References ...................................................................................................... 226
9 Integrated Billing Solutions in the Internet of Things................................. 229
9.1 Introduction .............................................................................................. 229
9.2 Cost of RFID and the Internet of Things.................................................. 231
9.3 Benefits of RFID and the Internet of Things............................................ 238
9.4 Cost Benefit Sharing................................................................................. 241
9.5 A Technical Framework for Integrating Billing Capabilities into the
EPCglobal Network........................................................................................ 242
9.6 Discussion and Outlook............................................................................ 249
References ...................................................................................................... 250
10 Business Models for the Internet of Things ................................................ 253
Eva Bucherer, Dieter Uckelmann
10.2.1 Business Models ............................................................................. 255
10.2.2 Business Model Innovation............................................................. 258
Dieter Uckelmann, Bernd Scholz-Reiter
10.2 Business Models and Business Model Innovation ................................. 255
10.1 Introduction ............................................................................................. 253
Contents XV
10.3.2 Revenue Generation in the Internet of Things................................ 263
10.4.1 Scenario 1: Product as a Service (PaaS) .........................................266
10.4.3 Scenario 3: End-userInvolvement...................................................270
10.4.4 Scenario 4: Right-time Business Analysis and Decision making... 273
11 The DiY Smart Experiences Project............................................................ 279
Marc Roelands, Johan Plomp, Diego Casado Mansilla, Juan R. Velasco,
Ismail Salhi, Gyu Myoung Lee, Noel Crespi, Filipe Vinci dos Santos, Julien
Vachaudez, Frédéric Bettens, Joel Hanqc, Carlos Valderrama, Nilo Menezes,
Alexandre Girardi, Xavier Ricco, Mario Lopez-Ramos, Nicolas Dumont, Iván
Alonso, Quentin Reul, Yan Tang, Robert Meersman
11.1 Drivers, Motives and Persona in the DiY Society.................................. 280
11.1.1 Evolution of DiY............................................................................. 281
11.1.2 Why Do People Build Things Themselves? ................................... 281
11.1.3 People Motivation as Driver ...........................................................282
11.1.4 People Logics, Distinguishing Motivation Levels.......................... 282
11.1.5 Eco-awareness, an Example Application Theme in DiYSE...........284
11.2 Sensor-actuator Technologies and Middleware as a Basis for a DiY
Service Creation Framework .......................................................................... 289
11.2.1 Device Integration...........................................................................290
11.2.2 Middleware Technologies Needed for a DiY Internet of Things ... 293
11.3 Semantic Interoperability as a Requirement for DiY Creation .............. 295
11.3.1 Ontology.......................................................................................... 295
11.3.2 Ontology Engineering Methodologies............................................ 296
10.3.1 Laws of Information........................................................................ 260
10.4.2 Scenario 2: Information Service Providers ..................................... 268
De Roeck, Christof van Nimwegen, Leire Bastida, Marisa Escalante, Juncal
Corredor, Miguel S. Familiar, José F. Martínez, Vicente Hernández, Dries
10.3 Value Creation in the Internet of Things................................................ 260
10.4 Exemplary Business Model Scenarios for the Interet of Things ...........266
10.5 Conclusion............................................................................................... 275
References....................................................................................................... 276
XVI Contents
11.3.3 Application of Ontology Engineering in the Internet of Things..... 298
11.4 The DiYSE Service Framework............................................................. 302
11.4.1 Contextualisation Layer .................................................................. 303
11.4.2 Service Composition and Exposition Layer ................................... 304
11.4.3 Execution Layer .............................................................................. 305
11.4.4 DiYSE Application Creation and Deployment............................... 305
11.5 Interactions, Using and Creating in Smart Spaces ................................. 306
11.5.1 Service Interaction and Environment Configuration...................... 307
11.5.2 Ecological Design Approach .......................................................... 307
11.5.3 Architectural Support and Modelling for Interaction ..................... 308
11.5.4 Example Personalised Interaction Method: Smart Companion
Devices....................................................................................................... 309
11.5.5 Multimodal Middleware Protocol................................................... 311
11.5.6 The Ultimate Example: Simple Smart Space Interaction with
Multi-device Interfaces .............................................................................. 311
11.6 Conclusion - Future Work of the Consortium........................................ 312
References ...................................................................................................... 313
12 Intelligent Cargo – Using Internet of Things Concepts to Provide High
Interoperability for Logistics Systems ............................................................. 317
Jens Schumacher, Mathias Rieder, Manfred Gschweidl, Philip Masser
12.1 Introduction ............................................................................................ 317
12.2 Semantic Web......................................................................................... 319
12.2.1 Semantic Web Services................................................................... 320
12.2.2 Semantic Web Services Processes and Lifecycle........................... 321
12.3 Ontology ................................................................................................. 325
12.3.1 Ontology and the Organisational Perspective................................. 326
12.3.2 Ontology and the IT-System Perspective ....................................... 327
12.3.3 Ontology and the Data Perspective................................................. 327
12.3.4 Ontologies in Multi-agent Systems................................................. 329
12.3.5 The Role of a Top-level Ontology.................................................. 331
Contents XVII
12.4 The Internet of Things in Context of EURIDICE ..................................332
12.4.1 Interoperability in EURIDICE ........................................................ 333
12.4.2 The EURIDICE Architecture.......................................................... 337
12.4.3 Integration .......................................................................................339
12.4.4 Deployment ..................................................................................... 340
12.4.5 Project Evaluation ........................................................................... 341
12.4.6 EURIDICE and the Internet of Things ...........................................341
12.5 Business Impact...................................................................................... 342
12.6 Future Developments.............................................................................. 344
12.7 Conclusion .............................................................................................. 345
References....................................................................................................... 346
Index .................................................................................................................... 349
About the Editors ............................................................................................... 353
... Eventually, after opening WSNs to the Internet the threat model changed as attackers can reach WSNs ubiquitously where sensor nodes are the most vulnerable due to scarce computational resources. According to [101], in order to enable massive adoption of Internet of Things devices; security, including confidentiality, integrity, availability, and privacy issues must be addressed in order to make them trustworthy to the public. [101] suggests as well that there should exist different security levels since the requirements are not the same between devices. ...
... According to [101], in order to enable massive adoption of Internet of Things devices; security, including confidentiality, integrity, availability, and privacy issues must be addressed in order to make them trustworthy to the public. [101] suggests as well that there should exist different security levels since the requirements are not the same between devices. User privacy and integrity can also be endangered from the lack of data confidentiality and integrity. ...
Preprint
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or "things". While its purpose is to provide effective and efficient solutions, security of the devices and network is a challenging issue. The number of devices connected along with the ad-hoc nature of the system further exacerbates the situation. Therefore, security and privacy has emerged as a significant challenge for the IoT. In this paper,we aim to provide a thorough survey related to the privacy and security challenges of the IoT. This document addresses these challenges from the perspective of technologies and architecture used. This work focuses also in IoT intrinsic vulnerabilities as well as the security challenges of various layers based on the security principles of data confidentiality, integrity and availability. This survey analyzes articles published for the IoT at the time and relates it to the security conjuncture of the field and its projection to the future.
... These technologies foster patient empowerment by facilitating self-care, thereby enhancing patient satisfaction, bolstering self-management, and curbing healthcare expenses. Furthermore, IoT-based devices find utility in remotely monitoring patients' physiological state, particularly when continuous care is necessary [23,24]. The recent convergence of various IoT paradigms has paved the way for the creation of intelligent healthcare systems [25,26]. ...
Article
Full-text available
Conventional healthcare systems have long struggled to address the varied needs of large patient populations, often leading to inefficiencies and less-than-optimal outcomes. Yet, the advent of machine learning (ML) and deep learning (DL) models has heralded a transformative shift toward value-based care, enabling healthcare providers to offer personalized and remarkably effective treatments. Contemporary medical equipment and devices are equipped with internal applications that gather and store extensive patient data, forming a valuable resource for ML-powered predictive models.we have conducted a systematic literature review (SLR) which mainly focuses on Theoretical background, challenges, Application framework, Organization of IoT in healthcare and HIoT application.In the SLR process some efficient methodologies has been used. In the SLR process we have conducted Quality metadata analysis (QMA) which provides the complete statistical analysis by considering different parameters.Machine learning algorithms enable the analysis of the extensive data produced by IoT devices, uncovering patterns and irregularities that may escape human detection. Deep learning, leveraging sophisticated neural network models, enhances the accuracy of medical image interpretation, disease prognosis, and forecasting patient outcomes.
... The intended goal of the Internet of Things (IoT) was to narrow the gap between real and virtual worlds and enable direct machine-to-machine (M2M) communication [1]. The original concept of a domain-independent universal identifier for identifying physical objects has been modified to fit the GS1 numbering schemes, which are broadly used in retail and supply chain management [2]. ...
Preprint
Full-text available
Industry 5.0 is the key to a revolution in the banking industry, the driving forces are the Internet of Things (IoT) and fifth-generation (5G) high-speed coµµunication technology. The article aiµs to propose a 5GIoT business µodel in the banking revolution with a neuro-fuzzy technique that will enhance banking services and operations. The developed µodel is based on the online survey of nuµerous custoµer categories, including international and national bankers, students, IT professionals, housewives and others. The survey’s data is used to verify the banking business µodel using Machine Learning & Neuro-fuzzy techniques. This µodel deals with instant loans, collateral µonitoring, overspending by banks, Credit cards, Card readers, Autoµatic Trailer Machine (ATM), Real-Tiµe Data Sharing and online payµents easily. The ML µodel is fed with 403 survey data and perforµs well with an accuracy of 79.2% on the Python platform.
Article
Full-text available
With the emergence of quantum computers, traditional cryptographic methods are vulnerable to attacks, emphasizing the need for post-quantum cryptography to secure devices and networks. This review paper critically analyzes the challenges and future directions of post-quantum cryptography for Internet of Things (IoT). It provides an overview of various post-quantum cryptographic algorithms and protocols and evaluates their suitability for securing IoT devices. The paper also examines implementation challenges, such as limited computing resources and the need for lightweight post-quantum algorithms. Additionally, the paper discusses future directions of post-quantum cryptography, such as the development of hybrid quantum-classical algorithms and integration with other security measures like secure key exchange and device authentication. The study provides a comprehensive analysis of post-quantum cryptography for IoT, highlighting key issues and challenges to ensure secure deployment of IoT devices in a post-quantum world. This paper’s conclusions and recommendations will be valuable to researchers, practitioners, and policymakers working in the subject of IoT security and cryptography.
Chapter
Full-text available
The exponential growth of the Internet of Things (IoT) has introduced considerable security and forensic challenges due to the rising complexity and heterogeneity of connected devices. As the adoption of the Internet of Things (IoT) continues to expand, so too do the vulnerabilities inherent to this technology, with threats ranging from the exploitation of individual devices to large-scale breaches of network security. It is imperative that IoT security frameworks undergo continuous evolution to address weaknesses in cryptography, authentication, and communication protocols. Concurrently, the field of IoT forensics encounters obstacles in the gathering and analysis of evidence due to the restricted memory and heterogeneous architectures of IoT devices. This chapter examines the critical aspects of IoT security, highlighting prevalent attacks, mitigation techniques, and the forensic methodologies employed to investigate compromised devices. Particular attention is given to the role of device heterogeneity, emerging forensic tools, and the impact of artificial intelligence on both security and forensic efforts. The discussion underscores the necessity for ongoing advancements to create a resilient IoT ecosystem capable of mitigating threats and enhancing forensic investigations.
Chapter
The Internet of Things (IoT) lets smart devices and humans use enticing services. Fostering adaptive machine-to-machine cooperation among intelligent objects may help IoT devices reach powerful sensing, reasoning, and real-time acting capabilities. To employ multiagent systems and the social attitude of engaging and cooperating for services, IoT devices must be paired with software agents. As IoT devices move across numerous settings, it may be challenging to locate credible partners for cooperation. As reputation may affect social groups, grouping agents in each IoT environment by social skills may be a solution. This study emphasizes agent reputation capital in a reputation model. Second, reputation capital organized IoT agents. The last contribution is employing blockchain technology to authenticate reputation capital, because this competition needs trustworthy and verified device or agent reputation information. Our testing shows that the model can identify almost all deceptive agents and provide good group composition findings if their proportion is below a threshold.
Article
Full-text available
It has become popular to attach the term "real-time" to many concepts in business intelligence (BI) and data warehousing (DW) – real-time BI, real-time enterprise, real-time warehouse, real-time ETL (extract, transform and load), real-time analytics, and so on. I dislike this usage because it conveys a partial truth while obscuring the important issues. In our industry, the usage of "real-time" as an adjective has unfortunately become marketing fluff. Some have suggested the term "right-time" as a substitute; however, that begs the question about what is right. The Webster dictionary defines "real-time" as the simultaneous recording of an event with the actual occurrence of that event. In engineering disciplines, the term is extended to describe a system that records and responds to an event within milliseconds.
Conference Paper
Full-text available
The deployment of wireless sensor networks in many application areas, e.g., aggregation services, requires self-organization of the network nodes into clusters. Quite a lot of node clustering techniques have appeared in the literature, and roughly fall into two families; those based on the construction of a dominating set and those which are based solely on energy consider- ations. The former family suffers from the fact that only a small subset of the network nodes are respon- sible for relaying the messages, and thus cause rapid consumption of the energy of these nodes. The later family uses the residual energy of each node in order to direct its decision about whether it will elect itself as a leader of a cluster or not. This family's methods ignore topological features of the nodes and are used in combination with the methods of the former family. We propose a novel distributed clustering protocol for wireless sensor networks, based on a novel metric for characterizing the importance of a node, w.r.t. its con- tribution in relaying messages. The protocol achieves small communication complexity and linear computa- tion complexity. Experimental results for various sen- sor network topologies show that the protocol generates only a few clusters, guaranteeing a small number of message relays thus improving network lifetime. Keywords. Sensor networks, clustering, network life- time, energy conservation, backbone formation.
Book
ThisvolumecontainstheproceedingsoftheInternetofThings(IOT)Conference 2008, the ?rst international conference of its kind. The conference took place in Zurich,Switzerland, March26–28,2008. The term ‘Internet of Things’ hascome to describe a number of technologies and researchdisciplines that enable the - ternet to reach out into the real world of physical objects. Technologies such as RFID, short-range wireless communications, real-time localization, and sensor networks are becoming increasingly common, bringing the ‘Internet of Things’ into industrial, commercial, and domestic use. IOT 2008 brought together le- ing researchersand practitioners, from both academia and industry, to facilitate the sharing of ideas, applications, and research results. IOT 2008 attracted 92 high-quality submissions, from which the technical program committee accepted 23 papers, resulting in a competitive 25% acc- tance rate. In total, there were over 250 individual authors from 23 countries, representing both academic and industrial organizations. Papers were selected solely on the quality of their blind peer reviews. We were fortunate to draw on the combined experience of our 59 program committee members, coming from the most prestigious universities and research labs in Europe, North America, Asia, and Australia. Program committee members were aided by no less than 63 external reviewers in this rigorous process, in which each committee member wrote about 6 reviews. The total of 336 entered reviews resulted in an average of 3. 7 reviews per paper, or slightly more than 1000 words of feedback for each paper submitted.
Book
Mit dem "Internet der Dinge" zeichnet sich ein fundamentaler Technik-Trend ab, dessen betriebswirtschaftliche Konsequenzen und Chancen hier erstmals erläutert werden. Das Buch stellt dabei nicht nur eine klare technologisch wie ökonomisch begründete Vision des Ubiquitous Computing dar, sondern beschreibt darüber hinaus in mehreren Fallstudien auch deren Umsetzung in die Unternehmenspraxis unterschiedlichster Branchen, skizziert die wichtigsten Technologien und leitet unmittelbar anwendbare Handlungsanleitungen ab. Es liefert eine fundierte, in sich geschlossene und übersichtlich dargestellte Analyse für Praktiker, Forscher und Studierende, die sich mit Gestaltung, Chancen und Risiken von RFID-Anwendungen und Ubiquitous-Computing-Szenarien auseinandersetzen.
Article
For over twenty-five years, the Universal Product Code (UPC or "bar code") has helped streamline retail checkout and inventory processes. As one of the most successful standards ever developed, UPC coding and labeling methods have grown to include numerous elements of the supply chain. The emergence of the Internet, the digitalization of information and the globalization of business offer new possibilities for product identification and tracking. To take advantage of this network infrastructure, we propose a new object identification scheme, the Electronic Product Code (EPC), which uniquely identifies objects and facilitates tracking throughout the product life cycle. The EPC is a short, simple and extensible code designed for efficient referencing to networked information.
Conference Paper
Given the unquestionable importance of performance measurement on the one hand and the promise of large-scale economic gains through the application of RFID technology in business processes on the other, a crucial question arises: To what extent do RFID users measure the economic performance of their applications and how is the success of RFID applications affected by performance measurement? This contribution presents the first empirical evaluation of RFID performance measurement behaviour as far as we know, conducted among 146 German companies. Following an extensive review of performance measurement methods in the RFID field, a categorisation with respect to criteria such as financial and comprehensive measurement is presented. Subsequently, the empirical analysis reveals that partial measurement methods, covering isolated aspects of RFID investments, exhibit the highest usage frequency. Furhermore, we find that RFID users tend to apply several methods in various combinations, depending on factors such as firm size and duration of application. Accordingly, four different types of RFID performance measurement users are derived. Finally, a connection is established between performance measurement and business success of RFID applications: Hence, usage frequency of particular measurement methods is significantly connected to the improvement of target variables such as lead time and labour costs.
Article
Data gathering is a common but critical operation in many applications of wireless sensor networks. Innovative techniques that improve energy efficiency to prolong the network lifetime are highly required. Clustering is an effective topology control approach in wireless sensor networks, which can increase network scalability and lifetime. Ill this paper, we propose a novel energy efficient Clustering scheme (EECS) for single-hop wireless sensor networks, which better Suits the periodical data gathering applications. Out approach elects cluster heads with more residual energy in all autonomous manner through local radio communication with no iteration while achieving good cluster head distribution: further more, it introduces a novel distance-based method to balance the load among, the cluster heads. Simulation results Show that EECS prolongs the network lifetime significantly against the other Clustering protocols such as LEACH and HEED.