ArticlePDF Available

THE ROLE OF DEPENDABILITY IN IOT SYSTEMS

Authors:

Abstract

The advances in the Internet of Things (IoT) have contributed to the automation of various industries by enabling devices and systems to effectively connect and collect data remotely over the internet. This progress has led to the creation of an intelligent society where physical things are becoming increasingly innovative and undoubtedly, the IoT systems will continue to impact real life by providing efficient data collection and sharing. The successful implementation of IoT systems relies on their dependability, which is closely tied to several factors such as their reliability, resilience, and security. This paper explores the crucial role of dependability in IoT system, emphasizing challenges such as real-time analysis, resource constrains, connection redundancy, and quick fault recovery. The paper also provides some strategies for overcoming dependability challenges, such as efficient algorithms, edge computing, prioritization of resources, and AI techniques integration. Additionally, the paper presents a case study of an IoT system that faced dependability problems, highlighting the importance of rigorous testing and redundancy in ensuring reliable IoT deployments. As a result of this research, we suggest that by addressing the challenges related to dependability aspects, stakeholders can unlock the full potential of IoT, empowering industries and individuals with transformative, efficient, and reliable technologies. For future work, a frame work for evaluating and enhancing the IoT dependability will be developed. Several factors will be considered in developing this framework, such as reliability, availability, safety, security, resilience, and fault management. The framework will define a quantifiable metrics to measure these factors.
Journal of Intelligent Systems and Applied Data Science (JISADS), Vol.1, Issue.2, (2023), PP. 17-23
_________________________________________________________________________
Publisher: JISADS.com 17
THE ROLE OF DEPENDABILITY IN IOT SYSTEMS
Mohammad Ibraigheeth1*
1Department of Software Engineering, Bethlehem University, Bethlehem, Palestine
ABSTRACT
The advances in the Internet of Things (IoT) have contributed to the automation of various industries by
enabling devices and systems to effectively connect and collect data remotely over the internet. This progress has
led to the creation of an intelligent society where physical things are becoming increasingly innovative and
undoubtedly, the IoT systems will continue to impact real life by providing efficient data collection and sharing.
The successful implementation of IoT systems relies on their dependability, which is closely tied to several factors
such as their reliability, resilience, and security. This paper explores the crucial role of dependability in IoT
system, emphasizing challenges such as real-time analysis, resource constrains, connection redundancy, and quick
fault recovery. The paper also provides some strategies for overcoming dependability challenges, such as efficient
algorithms, edge computing, prioritization of resources, and AI techniques integration. Additionally, the paper
presents a case study of an IoT system that faced dependability problems, highlighting the importance of rigorous
testing and redundancy in ensuring reliable IoT deployments. As a result of this research, we suggest that by
addressing the challenges related to dependability aspects, stakeholders can unlock the full potential of IoT,
empowering industries and individuals with transformative, efficient, and reliable technologies. For future work,
a frame work for evaluating and enhancing the IoT dependability will be developed. Several factors will be
considered in developing this framework, such as reliability, availability, safety, security, resilience, and fault
management. The framework will define a quantifiable metrics to measure these factors.
Keywords: internet of things (IoT), dependability, reliability, resource constrains, failure recovery.
1. INTRODUCTION
Nowadays, the rapid advancement of smart sensor
applications enables objects or things in various fields of
our life to be addressed, connected, and to collect data
about the environment around them. In this context, the
“Internet of Things” (IoT) is a paradigm that emerged to
manage and organize practical and technical issues [1].
Therefore, IoT deals with different technologies and
protocols, such as Internet, mobile communication, and
wireless sensor protocols [2]. The evolution of IoT has
led to use this paradigm by different applications such as
smart home, smart payment, smart lighting, fire detection,
monitoring safety, and many other fields [3]. Central to
the successful implementation and widespread adoption of
IoT systems is the concept of dependability [4].
Dependability in general is a combination of several
attributes such as reliability, availability, security,
confidentiality, and resilience. Having these attributes
enables a user to put trust into and rely on a system [5].
The dependability of an IoT device refers to ability of this
device to consistently deliver trusted, accurate and
reliable data, while maintaining the integrity and security
of data in the face of various challenges and uncertainties.
In IoT, dealing with vulnerabilities of a huge number of
heterogeneous devices is a challenge [6,7]. Enhancing
dependability enables IoT system to handle several
Journal of Intelligent System and Applied Data
Science (JISADS)
Journal homepage : https://www.jisads.com
ISSN (2974-9840) Online
Journal of Intelligent Systems and Applied Data Science (JISADS), Vol.1, Issue.2, (2023), PP. 17-23
_________________________________________________________________________
Publisher: JISADS.com 18
challenges.
A way to realize dependability requirements in IoT
systems is by using fog computing [8,9]. Fog computing
enables real-time data processing and analysis at the
edge [10], which mean that the massive volume of data
generated by IoT devices can be processed and analyzed
locally and closer to the source of this data (network
edges) rather than sending data to centralized cloud or
data center. This reduces the data transmission and
allows faster decision-making at the edge, enhancing the
overall performance of IoT system [11]. Fog computing
provides a platform that supports data communication
between users, IoT devices and data centers, as well as
storage and processing devices. Therefore, a fog-based
IoT system can has dependability challenges, such as
managing data flow of IoT devices, memory limitation
and power constrains [12].
This paper studies the crucial rule of dependability
of IoT systems and its implications in different
applications. In the following sections, first some factors
that affect the IoT system's dependability will be
identified, then the challenges that can impact the
dependability as well as some solutions for overcoming
these challenges will be explored. Then a case study
related to IoT system that faced dependability problems
will be presented. Finally, a conclusion and future work
are described.
2. FACTORS AFFECTING
DEPENDABILITY IN IOT SYSTEMS
Dependability allows for continuity (uninterrupted)
of system services [13]. In other words, a dependable
system should provide mechanisms to tolerate any
condition throughout its life cycle. The dependability can
be achieved through different factors including
reliability, availability, safety and security, resilience,
fault management methods, scalability, and other factors
[14].
2.1 Reliability
We begin by considering the traditional IoT
architecture, characterized by centralized data processing
and decision-making. This framework emphasizes the
limitations of this approach, particularly in terms of
latency and scalability [1].
First, confirm that you have the correct template for
your paper size. This template has been tailored for
output on the A4 paper size. If you are using US letter-
sized paper, please close this file and download the
Microsoft Word, Letter file.
System reliability is the probability that system will
behave as expected (without failure) over a given period
of time (t). The system reliability can be measured
through two metrics: mean time between failures
(MTBF) and mean time to failure (MTTF). The reliability
is measured by MTBF if the system has failure recovery
mechanism, while MTTF is used to measure the
reliability if there is no failure recovery mechanism [15].
Given R(t) is the reliability function of time:
󰇛󰇜  (1)
where λ=1/ MTBF if there is recovery mechanism,
otherwise λ=1/ MTTF.
Reliability is critical in IoT environment because
unreliable data collection, processing, and transmission
can cause long delay and data loss which can lead to a
loss of confidence in the IoT systems, and therefore
reliability is essential for the widespread of these systems
[16].
2.2 Availability
The availability attribute in IoT system is directly
related to reliability. The availability of an IoT system
can be defined as its ability to deliver the required
service as long as possible to ensure continuous
operation. There are methods that can help to keep the
system available, like maintaining a mechanism for faults
management [17], and apply some approaches to manage
hardware redundancy [18]. The availability can be
calculated as follows:
 
 (2)
where MTTF is mean time to failure, and MTTR is
mean time to repair.
2.3 Safety and Security
Safety and security are essential non-functional
requirements (NFR) for any IoT system and are
considered critical attributes for its dependability [19].
Safety is key attributes in IoT systems to prevent harm to
their users or to the IoT environment [20]. IoT's security
is related to avoiding security threats [21]. The two
attributes are both source of risks and there are affected by
each other [22]. Many IoT applications are integrated into
safety critical environment, such as smart transportation
and medical healthcare devices. It is essential to mitigate
potential risks associated with these situations. Similarly,
Journal of Intelligent Systems and Applied Data Science (JISADS), Vol.1, Issue.2, (2023), PP. 17-23
_________________________________________________________________________
Publisher: JISADS.com 19
security protection against unauthorized access and cyber-
attacks can help to preserve user privacy and sensitive
information
One of major requirements of an IoT system is that
safety and security issues are designed to support the
dependability of the system. Many attributes could affect
the safety and security of IoT systems, such as hardware
faults and, human errors, and security attacks [23]. These
impediments need to be identified and mitigated.
2.4 Resilience
Resilience is the property of preserving the system's
dependability when it encounters changes; thus, it is the
ability to deal with failure, predict, tolerate and prevent it
[24]. In an IoT system, the devices are connected through
a network, and resilience is responsible for keeping the
system connected regardless any failure that could affect
the network [25]. The IoT system must deal with some
constraints related to resources, such as network, memory
and battery constraints, to recover from faults and failures
as quickly as possible. Therefore, for the IoT system to be
resilient, it should provide a fault (and failure)
management mechanism. In addition, the system should
be survivable in which it should offer continuity
throughout managing and recovering the faults.
2.5 Fault and Failure Management
In IoT systems, a failure represents an unexpected
behavior, such as data loss due to network connection
problems or due memory overflow. To deal with faults,
there are four strategies: detection, prediction, mitigation
and prevention. Fault detection is the process of verifying
the unexpected behavior using various methods, such as
statistical machine learning methods [26], while fault
prediction applies different techniques to predict probable
failure, such as classification and regression techniques.
Fault mitigation aim to recover the IoT system from
failure, such as applying node load balancing [27] and
redundancy techniques [28]. Fault preventions aims to
prevent fault occurrence using different approach,
replicating data on more than one node.
2.6 Assuring Data Quality and integrity
In IoT system, the collected data should represent
the actual system context. For example, in an
environment such as Polar Regions, where the climate is
always cold, data from temperature sensors with a warm
temperature is likely wrong. Therefore, an IoT system
should previously know the context and related domain
to provide meaningful and trustworthy results that are
suitable for accurate decision -making [29].
2.7 Scalability
The IoT system should be scalable to accommodate
thousands or even millions of sensors in terms of data
transfer, storage, and real time processing [30]. The
scalable system needs to provide more computing
devices as well as the required hardware infrastructure
[31].
2.8 Heterogeneity
The IoT system includes different heterogeneous
devices that have different technologies and hardware
implementations [32]. The IoT system provides the
needed protocols to enable devices to communicate and
understand each other. Each communication protocol has
its own characteristics and application scenarios. For
example, low- power wide- area network (LPWAN)
technologies provide low power consumption and long
transmission ranges. Examples of LPWAN technologies:
Sigfox and NB-IoT [33]. Other examples of IoT
communications technologies are: Bluetooth [34], Z-
Wave [35], and Zigbee [36]. Furthermore, IEEE 802.11
standards can be adopted in an IoT environment for
devices with no battery constraints and for data
transmission over short distances [34].
3. CHALLENGES TO DEPENDABILITY
IN IOT SYSTEMS
This section presents some of most important
challenges of dependability in IoT systems:
3.1 Real-Time Analysis and Resource
Constrains
In the IoT environment, dealing with real-time
analysis and resource constrains is major challenge.
Real-time analysis involves processing data immediately
as it received from sensors without significant delay.
Furthermore, there is a need address resource constraints
such as limited availability of memory and power. IoT
devices may have limited resources compared to other
traditional devices, as they often designed to be small,
inexpensive, and power-efficient. As a result,
implementing complex real-time IoT system given some
resource constraints can be challenging.
Energy consumption is a major challenge, and more
research is needed to implement IoT systems with low
power consumption [38]. The IoT requires mechanism of
minimizing the power to be spent during the system
operation.
Journal of Intelligent Systems and Applied Data Science (JISADS), Vol.1, Issue.2, (2023), PP. 17-23
_________________________________________________________________________
Publisher: JISADS.com 20
3.2 Connection Redundancy
Connection redundancy is a crucial aspect of ensuring
dependable and continuous communication in IoT
deployments. The IoT system may involve numerous
interconnected devices with different data formats. IoT
nodes can be deployed with more than one communication
protocol [37]. Disconnections can be prevented using
monitoring mechanism that make automatic switching
between connection technologies. In other words, each
node can transmit and receive data using two or more
communication protocols and it can select a protocol with
better performance. However, in scenarios with huge
number of nodes and connection redundancy mechanisms,
it is challenge to deploy without the cost of hardware.
3.3 Quick Fault-Recovery
IoT system needs to detect and recover faults that may
occur in its components. It is critical to ensure that the
system can detect and recover from faults in real-time.
Faults can arise due to hardware failure, software error,
human error, or environmental factors.
4. STRATEGIES FOR OVERCOMING
IOT DEPENDABILITY CHALLENGES
Some strategies can help to overcome IoT
challenges. For example, using efficient and lightweight
algorithms can be used to optimize the computational
burden on IoT devices.
Other approach that can help to optimize IoT devices
communication is applying edge computing to perform
data processing near the IoT devices themselves, rather
than sending all data to centralized server. The edge
devices such as edge or gateway servers can perform data
analysis and filtering locally reducing the need for
continuous high-bandwidth communication.
Applying prioritization task mechanism allocate
resources based on tasks importance as well as scheduling
mechanisms that ensure critical tasks get the resources
promptly. Furthermore, enable the IoT system to
dynamically adjust resource allocation based on task
priority and available resources will help the system to
respond any changing condition
To overcome the limited-power challenges, it is
recommended to use hardware components that are
designed for low-power operational environment. For
example, using energy-efficient microcontrollers that
offer needed computational capabilities will help to
minimize power consumption during the IoT system
operation. Using energy harvesting techniques (such as
solar panels) to power IoT devices can help can help to
extend battery life or even eliminate the need for
batteries.
Using artificial intelligent (AI) techniques can play
vital role in enhancing IoT system dependability. AI
techniques can analyze massive amount of data, predict
probable failures, and detect security threats, aiding in
system optimization and predictive maintenance. Using
AI techniques can help in developing decision-making
system that can be used to enhance system reliability,
ensuring that IoT system can adapt to changes and
provide consistent performance.
By combining these strategies, many challenges can
be resolved, enabling a more robust and efficient IoT
system.
5. CASE STUDY: NEST THERMOSTAT
GLITCH
One example of an IoT system that faced problems
that affect its dependability is the "Nest Thermostat
Glitch" incident that occurred in January 2016 [39]. Nest
Labs, a company owned by Google, and specializing in
home automation and WiFi-enabled products that can
controlled remotely, such as smart thermostats, sensor-
driven and smoke detectors [40]. This company
experienced a service outage that impacted a large
number of their smart thermostats [41].
Nest's smart thermostats allow their users to
remotely control their home heating and cooling systems
through web service or mobile app. The smart thermostat
aims to provide personalized comfort to users and
optimized energy usage. This thermostat collects data
from sensors and use machine learning techniques to
adjust the temperature [42].
On January 13, 2016, an unexpected glitch
happened On Nest's servers during a scheduled
maintenance update. As a result of this glitch, many Nest
thermostats became inaccessible for users. Some
thermostats also provide wrong temperature readings,
causing problems in heating and cooling systems. This
accident affected the dependability of Nest thermostats
and led to user dissatisfaction and inconvenience as many
users were unable to control their thermostat, and the
wrong temperature reading caused energy inefficiency
and discomfort in their homes [41].
Nest engineers investigate and address the root
Journal of Intelligent Systems and Applied Data Science (JISADS), Vol.1, Issue.2, (2023), PP. 17-23
_________________________________________________________________________
Publisher: JISADS.com 21
cause of the glitch and developed solutions to prevent
occurring similar incident in the future to ensure the
dependability of their smart system. The nest lab
implemented more extensive testing procedures before
final deploying their final system. Additionally, they
improve the communication protocols to promptly
response to any incident and keep user updated related to
issues related to their service.
The Nest Thermostat Glitch incident illustrates how
even well-established IoT companies can face
dependability challenges. This incident showed the
importance of rigorous testing, quality assurance, and
redundancy in IoT systems. Furthermore, it highlights the
necessity of having backup solutions in place to ensure
reliable system functionality.
6. CONCLUSION AND FUTURE WORK
The role of dependability in IoT systems is essential
to ensure a reliable and secure system. Dependability
plays a critical role in building trust, ensuring safety, and
enabling the successful implementation of IoT solutions.
By addressing the challenges related to reliability,
resilience, security, and other dependability aspects,
stakeholders can unlock the full potential of IoT,
empowering industries and individuals with
transformative, efficient, and reliable technologies.
This paper identified factors affecting IoT system
dependability, including reliability, availability, safety,
security, resilience, fault management, data quality,
scalability, and heterogeneity. There are several
dependability challenges including real- time processing,
limited resources, continuous communication and quick
fault recovery. This paper addressed some strategies to
overcome these challenges and enhance the
dependability such as efficient algorithms, edge
computing, prioritization/ scheduling of resources, and
using AI techniques. This paper also identified one case
study that faced problems that affect its dependability,
which is the "Nest Thermostat Glitch" incident. This
incident showed how it is necessary to perform rigorous
testing, quality assurance, and redundancy before final
deployment of the IoT systems, and how it is important
to have backup solutions in place to ensure reliable
system functionality.
As future work, a framework to evaluate IoT
dependability can be developed. This framework should
consider several factors to assess the dependability of an
IoT system. The framework will define a quantifiable
metrics to measure different factors, such as reliability,
availability, safety, security, resilience, and fault
management. These metrics can be used for evaluating
the system's performance. By developing such
framework, the IoT system decision makers can assess
the dependability, and can take enhancing steps that will
lead to more reliable and successful IoT solutions.
In comparison to previous works in the realm of the
Internet of Things (IoT), our study delves into the
paramount role of dependability in IoT systems. While
past research has acknowledged the significance of some
factors such as reliability and security in IoT [20-23], our
paper extends the discussion to emphasize resilience,
real-time analysis, connection redundancy, and swift
fault recovery as critical factors influencing
dependability. We build upon existing literature by
proposing strategic solutions to overcome these
challenges, including the integration of efficient
algorithms, edge computing, resource prioritization, and
the incorporation of artificial intelligence techniques.
Notably, our work contributes a valuable case study
highlighting the practical implications of dependability
issues in an IoT system. This case underscores the
necessity for rigorous testing and redundancy measures
to ensure the reliability of IoT deployments, an aspect
that has not been extensively explored in prior studies.
Furthermore, we advocate for the development of a
comprehensive framework for evaluating and enhancing
IoT dependability in future work. This proposed
framework will consider a spectrum of factors including
reliability, availability, safety, security, resilience, and
fault management, providing quantifiable metrics for a
holistic assessment of IoT systems. Our research
contends that by addressing these dependability
challenges, stakeholders can unlock the full potential of
IoT, fostering transformative, efficient, and reliable
technologies for both industries and individuals.
REFERENCES
[1] Nižetić, Sandro, et al. "Internet of Things (IoT):
Opportunities, issues and challenges towards a smart
and sustainable future." Journal of cleaner
production 274 (2020): 122877.
[2] Kumar, Sachin, Prayag Tiwari, and Mikhail
Zymbler. "Internet of Things is a revolutionary
approach for future technology enhancement: a
review." Journal of Big data 6.1 (2019): 1-21.
[3] Kumar, Mohit, Kalka Dubey, and Rakesh Pandey.
"Evolution of emerging computing paradigm cloud
Journal of Intelligent Systems and Applied Data Science (JISADS), Vol.1, Issue.2, (2023), PP. 17-23
_________________________________________________________________________
Publisher: JISADS.com 22
to fog: applications, limitations and research
challenges." 2021 11th international conference on
cloud computing, data science & engineering
(Confluence). IEEE, 2021
[4] L. Bukowski, "System of systems dependability
Theoretical models and applications examples", Rel.
Eng. Syst. Saf., vol. 151, pp. 76-92, Jul. 2016.
[5] Avižienis, A., Laprie, J. C., Randell, B., Landwehr,
C. (2004): Basic concepts and taxon-omy of
dependable and secure computing. IEEE Trans.
Dependable Secure Comput.,1(1).
[6] E. Park, A. del Pobil and S. Kwon, "The role of
Internet of Things (IoT) in smart cities: Technology
roadmap-oriented approaches", Sustainability, vol.
10, no. 5, pp. 1388, May 2018.
[7] P. P. Ray, "A survey on Internet of Things
architectures", J. King Saud Univ. Comput. Inf. Sci.,
vol. 30, no. 3, pp. 291-319, 2018.
[8] S. Verma, Y. Kawamoto, Z. M. Fadlullah, H.
Nishiyama and N. Kato, "A survey on network
methodologies for real-time analytics of massive IoT
data and open research issues", IEEE Commun.
Surveys Tuts., vol. 19, no. 3, pp. 1457-1477, 3rd
Quart. 2017.
[9] R. Mahmud, R. Kotagiri and R. Buyya, "Fog
computing: A taxonomy survey and future
directions" in Internet of Everything,
Singapore:Springer, 2018.
[10] F. Bonomi, R. Milito, J. Zhu and S. Addepalli, "Fog
computing and its role in the Internet of Things",
Proc. 1st Ed. MCC Workshop Mobile Cloud
Comput. (MCC), pp. 13-16, 2012.
[11] C. Mouradian, D. Naboulsi, S. Yangui, R. H. Glitho,
M. J. Morrow and P. A. Polakos, "A comprehensive
survey on fog computing: State-of-the-art and
research challenges", IEEE Commun. Surveys Tuts.,
vol. 20, no. 1, pp. 416-464, 1st Quart. 2018.
[12] H. Atlam, R. Walters and G. Wills, "Fog computing
and the Internet of Things: A review", Big Data
Cogn. Comput., vol. 2, no. 2, pp. 10, Apr. 2018.
[13] L. M. C. E. Martins, F. L. de Caldas Filho, R. T. de
Sousa Júnior, W. F. Giozza and J. P. C. L. da Costa,
"Increasing the dependability of IoT middleware
with cloud computing and microservices", Proc. 10th
Int. Conf. Utility Cloud Comput. (UCC Companion),
pp. 203-208, Dec. 2017.
[14] J.-H. Cho, S. Xu, P. M. Hurley, M. Mackay, T.
Benjamin and M. Beaumont, "STRAM: Measuring
the trustworthiness of computer-based systems",
ACM Comput. Surv., vol. 51, no. 6, pp. 1-47, Feb.
2019.
[15] C. Maiorano, E. Pascale, L. Bouillaut, P. Sannino, Y.
Solorzano, S. Borriello, et al., "MTBF (metric that
betrays folk)", Proc. 29th Eur. Saf. Rel. Conf., pp. 6,
2019.
[16] Prasad, S.S., & Kumar, C. 2013. A Green and
Reliable Internet of Things. Communications and
Network, 5(1B), pp.44-48. Available at:
https://doi.org/10.4236/cn.2013.51B011.
[17] Z. Bakhshi and G. Rodriguez-Navas, "A preliminary
roadmap for dependability research in fog
computing", SIGBED Rev., vol. 16, no. 4, pp. 14-19,
2020.
[18] E. Andrade and B. Nogueira, "Dependability
evaluation of a disaster recovery solution for IoT
infrastructures", J. Supercomput., vol. 76, no. 3, pp.
1828-1849, Mar. 2020.
[19] Abdulhamid, A.; Kabir, S.; Ghafir, I.; Lei, C.
Dependability of The Internet of Things: Current
Status and Challenges. In Proceedings of the 2nd
International Conference on Electrical, Computer,
Communications and Mechatronics Engineering,
Malé, Maldives, 1618 November 2022; pp. 2532
2537. [Google Scholar]
[20] Kumar, R.; Stoelinga, M. Quantitative security and
safety analysis with attack-fault trees. In Proceedings
of the 2017 IEEE 18th International Symposium on
High Assurance Systems Engineering (HASE),
Singapore, 1214 January 2017; pp. 2532. [Google
Scholar]
[21] Sasaki, R. A Risk Assessment Method for IoT
Systems Using Maintainability, Safety, and Security
Matrixes. In Information Science and Applications;
Springer: Singapore, 2020; Volume 621, pp. 363
374. [Google Scholar]
[22] Cerf, V.G.; Ryan, P.S.; Senges, M.; Whitt, R.S. Iot
safety and security as shared responsibility. Bus.
Inform. 2016, 1, 719. [Google Scholar] [CrossRef]
[23] Kabir, S.; Gope, P.; Mohanty, S.P. A Security-
enabled Safety Assurance Framework for IoT-based
Smart Homes. IEEE Trans. Ind. Appl. 2022, 59, 6
14. [Google Scholar] [CrossRef]
[24] C. Tsigkanos, S. Nastic and S. Dustdar, "Towards
resilient Internet of Things: Vision challenges and
research roadmap", Proc. IEEE 39th Int. Conf.
Distrib. Comput. Syst. (ICDCS), pp. 1754-1764, Jul.
2019.
[25] V. Prokhorenko and M. A. Babar, "Architectural
resilience in cloud fog and edge systems: A survey",
IEEE Access, vol. 8, pp. 28078-28095, 2020.
[26] D. Ratasich, F. Khalid, F. Geissler, R. Grosu, M.
Shafique and E. Bartocci, "A roadmap toward the
Journal of Intelligent Systems and Applied Data Science (JISADS), Vol.1, Issue.2, (2023), PP. 17-23
_________________________________________________________________________
Publisher: JISADS.com 23
resilient Internet of Things for cyber-physical
systems", IEEE Access, vol. 7, pp. 13260-13283,
2019.
[27] F. H. Rahman, T.-W. Au, S. H. S. Newaz, W. S.
Suhaili and G. M. Lee, "Find my trustworthy fogs: A
fuzzy-based trust evaluation framework", Future
Gener. Comput. Syst., vol. 109, pp. 562-572, Aug.
2020.
[28] Z. Bakhshi and G. Rodriguez-Navas, "A preliminary
roadmap for dependability research in fog
computing", SIGBED Rev., vol. 16, no. 4, pp. 14-19,
2020.
[29] H. Baqa, N. B. Truong, N. Crespi, G. M. Lee and F.
L. Gall, "Quality of information as an indicator of
trust in the Internet of Things", Proc. 17th IEEE Int.
Conf. Trust Secur. Privacy Comput. Commun./12th
IEEE Int. Conf. Big Data Sci. Eng.
(TrustCom/BigDataSE), pp. 204-211, Aug. 2018.
[30] S. Verma, Y. Kawamoto, Z. M. Fadlullah, H.
Nishiyama and N. Kato, "A survey on network
methodologies for real-time analytics of massive IoT
data and open research issues", IEEE Commun.
Surveys Tuts., vol. 19, no. 3, pp. 1457-1477, 3rd
Quart. 2017.
[31] K. Iwanicki, "A distributed systems perspective on
industrial IoT", Proc. IEEE 38th Int. Conf. Distrib.
Comput. Syst. (ICDCS), pp. 1164-1170, Jul. 2018.
[32] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M.
Aledhari and M. Ayyash, "Internet of Things: A
survey on enabling technologies protocols and
applications", IEEE Commun. Surveys Tuts., vol.
17, no. 4, pp. 2347-2376, 4th Quart. 2015.
[33] K. Mekki, E. Bajic, F. Chaxel and F. Meyer, "A
comparative study of LPWAN technologies for
large-scale IoT deployment", ICT Exp., vol. 5, no. 1,
pp. 1-7, Mar. 2019.
[34] O. Elijah, T. A. Rahman, I. Orikumhi, C. Y. Leow
and M. N. Hindia, "An overview of Internet of
Things (IoT) and data analytics in agriculture
Benefits and challenges", IEEE Internet Things J.,
vol. 5, no. 5, pp. 3758-3773, Oct. 2018.
[35] M. B. Yassein, W. Mardini and A. Khalil, "Smart
homes automation using Z-wave protocol", Proc. Int.
Conf. Eng. MIS (ICEMIS), pp. 1-6, Sep. 2016.
[36] J.-S. Lee, Y.-W. Su and C.-C. Shen, "A comparative
study of wireless protocols: Bluetooth UWB ZigBee
and Wi-Fi", Proc. IECON 33rd Annu. Conf. IEEE
Ind. Electron. Soc., pp. 46-51, Nov. 2007.
[37] G. Signoretti, M. Silva, J. Araujo, I. Silva, D. Silva,
P. Ferrari, et al., "A dependability evaluation for
OBD-II edge devices: An Internet of intelligent
vehicles perspective", Proc. 9th Latin-Amer. Symp.
Dependable Comput. (LADC), pp. 1-9, Nov. 2019.
[38] Shakerighadi, Bahram, et al. "Internet of things for
modern energy systems: State-of-the-art, challenges,
and open issues." Energies 11.5 (2018): 1252.
[39] Zeng, Eric, Shrirang Mare, and Franziska Roesner.
"End user security and privacy concerns with smart
homes." thirteenth symposium on usable privacy and
security (SOUPS 2017). 2017.
[40] Crunchbase website (2023), Nest Lab company,
[Online], Available:
https://www.crunchbase.com/organization/nest-labs
[41] Bilton, Nick. "Nest thermostat glitch leaves users in
the cold." The New York Times 14 (2016).
[42] Park, Toby. "Evaluating the Nest Learning
Thermostat-Four field experiments evaluating the
energy saving potential of Nest’s Smart Heating
Control." (2017).
.
... Internet of Things (IoT) Examining how IoT devices and sensors contribute to data collection, analysis, and decision-making for improved city management (Ibraigheeth, 2023). Information and Communication Technologies (ICT) Investigating the role of ICT infrastructure in enabling connectivity, communication, and data sharing among various urban systems. ...
... IoT technologies offer numerous benefits for urban design and planning by providing enhanced data collection, efficient resource management, improved transportation systems, and greater citizen engagement. The integration of GIS applications, cloud technologies, and geo-referenced systems further enhances these capabilities, enabling planners to create smarter, more sustainable urban environments (Ibraigheeth, 2023). ...
... It also discusses important IoT application areas where ongoing work is being done. Additionally, the role of big data analytics is emphasized, as it can provide accurate insights essential for developing an enhanced IoT system (Ibraigheeth, 2023). This study highlights significant differences in the construction and implementation of Smart Cities (SCs) between developed and developing countries. ...
Article
Full-text available
As we are aware of current demographic conditions, the urban sprawl, and promoting compact city growth, high-density planning towards achieving sustainability. For uplifting the existing status of today's city environment technology has played and played a major role. As cities become 'engines of growth' with their share in the global economy and wealth their size, growth rate, and distribution of the population matter a lot in urban reforms. It is important to ensure that cities are modified to achieve maximum efficiency and sustainability while enhancing the quality of life in the city. Transforming normal cities to smart cities by exploring the use of ever-improving technology to its extent, will be a stepping stone. The use of Radio-frequency identification (RIFD), Information and Communication Technologies (ICTs), Artificial intelligence (AI), Augmented reality (AR), Internet of Things (IoT) are being implemented in many different models to achieve smart city objectives. It does seem the involvement of IT professionals only, but architects, urban planners, and designers are the ones, to carefully plan the implementation of these technology and develop the technology roadmap (TRM) of a smart city. As urbanization continues to accelerate globally, the integration of smart technologies offers opportunities to enhance efficiency, resilience, and the overall quality of life in urban environments. This paper delves into the key components of smart cities, their impact on sustainability, and the challenges and opportunities associated with their implementation in public places. This research paper aims to study the role of technology in the improvisation of public places in smart cities, concerning Environmental Variables & Sustainable Environment and some real-time context-aware scenarios. This research paper explores the multifaceted transformation of cities into smart cities, primarily focusing on fostering sustainability. This study will be useful to the architectural fraternity to think about infusing the technology at the initial concept stage of planning that will add to the well-being of society at large
Article
Full-text available
An increasing number of large-scale distributed systems are being built by incorporating Cloud, Fog, and Edge computing. There is an important need of understanding how to ensure the resilience of systems built using Cloud, Fog, and Edge computing. This survey reports the state-of-the-art of architectural approaches that have been reported for ensuring the resilience of Cloud-, Fog- and Edge-based systems. This work reports a flexible taxonomy for reviewing architectural resilience approaches for distributed systems. In addition, this work also presents a capability-based cyber-foraging framework intended to improve the overall system resilience in the context of a physical node’s capabilities. This survey also highlights the trust-related issues and solutions in the context of system resilience and reliability. This survey will help improve the understanding of the current state of system resilience solutions and raise awareness about the issues related to physical capabilities and trust management in the context of distributed systems resilience.
Article
Full-text available
Abstract Internet of Things (IoT) is a new paradigm that has changed the traditional way of living into a high tech life style. Smart city, smart homes, pollution control, energy saving, smart transportation, smart industries are such transformations due to IoT. A lot of crucial research studies and investigations have been done in order to enhance the technology through IoT. However, there are still a lot of challenges and issues that need to be addressed to achieve the full potential of IoT. These challenges and issues must be considered from various aspects of IoT such as applications, challenges, enabling technologies, social and environmental impacts etc. The main goal of this review article is to provide a detailed discussion from both technological and social perspective. The article discusses different challenges and key issues of IoT, architecture and important application domains. Also, the article bring into light the existing literature and illustrated their contribution in different aspects of IoT. Moreover, the importance of big data and its analysis with respect to IoT has been discussed. This article would help the readers and researcher to understand the IoT and its applicability to the real world.
Conference Paper
Full-text available
Each industrial field seems affected by revolutionary innovations that will push forward the quality and variety of disparate services: driverless trains running 24 hours/day, self-driving cars and interconnected objects are only some of the latest trends. The intrinsic common aspect among all these promising concepts is the increase in reliability needs: human intervention for restoring and rescuing is not tolerated anymore. Despite this consideration, electronic equipment datasheets of many vendors do measure reliability through fuzzy metrics, the MTBF (Mean Time Between Failures) being the first among those. Firstly, this paper aims to provide information on the origin of the MTBF and on the reason why it is nowadays the most common mean for referring to reliability. Furthermore, the reasons behind the fallacy of the MTBF are explained. Using MTBF as synthetic indicator of reliability does often represents the wrong choice. Indeed, high MTBF figures could be measured even if the actual reliability is low. However, MTBF use is often imposed by regulations or contracts, and some examples are reported in this paper related to the railway signaling domain. Finally, alternative structured ways of communicating about reliability, based on further concepts than the bare MTBF, are provided as conclusion of the article.
Article
Full-text available
The Internet of Things (IoT) is a ubiquitous system connecting many different devices – the things – which can be accessed from the distance. The cyber-physical systems (CPS) monitor and control the things from the distance. As a result, the concepts of dependability and security get deeply intertwined. The increasing level of dynamicity, heterogeneity, and complexity adds to the system’s vulnerability, and challenges its ability to react to faults. This paper summarizes state-of-the-art of existing work on anomaly detection, fault-tolerance and self-healing, and adds a number of other methods applicable to achieve resilience in an IoT. We particularly focus on non-intrusive methods ensuring data integrity in the network. Furthermore, this paper presents the main challenges in building a resilient IoT for CPS which is crucial in the era of smart CPS with enhanced connectivity (an excellent example of such a system is connected autonomous vehicles). It further summarizes our solutions, work-in-progress and future work to this topic to enable “Trustworthy IoT for CPS”. Finally, this framework is illustrated on a selected use case: A smart sensor infrastructure in the transport domain.
Article
The exponential growth of the Internet of Things (IoT) has paved the way for safety-critical cyber-physical systems to enter our everyday activities. While such systems have changed the way of our life, they brought new challenges that can adversely affect our life and the environment. Safety and security are two such challenges that can hamper the widespread adoption of new IoT applications. Due to a large number of connected devices and their ability to control critical physical assets, intended attacks on them and/or unintended failure events such as mechanical failure of devices, communication failure and unforeseen bad interactions between connected devices may cause an IoT-based system to enter into unsafe and dangerous physical states. By considering the importance of safety and security of IoT systems, in this article, we present a security-enabled safety monitoring framework for IoT-based systems. In the proposed framework, we utilise design-time system analysis to create an executable monitoring model that enables run-time safety assurance provision for a system via collecting and analysing operational data and evidence to determine the safety status of the system and then taking appropriate actions and securely communicating the safety status and recommended actions to the system users to minimise the risk of the system entering into an unsafe state.
Article
The rapid development and implementation of smart and IoT (Internet of Things) based technologies have allowed for various possibilities in technological advancements for different aspects of life. The main goal of IoT technologies is to simplify processes in different fields, to ensure a better efficiency of systems (technologies or specific processes) and finally to improve life quality. Sustainability has become a key issue for population where the dynamic development of IoT technologies is bringing different useful benefits, but this fast development must be carefully monitored and evaluated from an environmental point of view to limit the presence of harmful impacts and ensure the smart utilization of limited global resources. Significant research efforts are needed in the previous sense to carefully investigate the pros and cons of IoT technologies. This review editorial is partially directed on the research contributions presented at the 4th International Conference on Smart and Sustainable Technologies held in Split and Bol, Croatia, in 2019 (SpliTech2019) as well as on recent findings from literature. The SpliTech2019 conference was a valuable event that successfully linked different engineering professions, industrial experts and finally researchers from academia. The focus of the conference was directed towards key conference tracks such as Smart City, Energy/Environment, e-Health and Engineering Modelling. The research presented and discussed at the SpliTech2019 conference helped to understand the complex and intertwined effects of IoT technologies on societies and their potential effects on sustainability in general. Various application areas of IoT technologies were discussed as well as the progress made. Four main topical areas were discussed in the herein editorial, i.e. latest advancements in the further fields: (i) IoT technologies in Sustainable Energy and Environment, (ii) IoT enabled Smart City, (iii) E-health – Ambient assisted living systems (iv) IoT technologies in Transportation and Low Carbon Products. The main outcomes of the review introductory article contributed to the better understanding of current technological progress in IoT application areas as well as the environmental implications linked with the increased application of IoT products.
Article
Various system metrics have been proposed for measuring the quality of computer-based systems, such as dependability and security metrics for estimating their performance and security characteristics. As computer-based systems grow in complexity with many subsystems or components, measuring their quality in multiple dimensions is a challenging task. In this work, we tackle the problem of measuring the quality of computer-based systems based on the four key attributes of trustworthiness we developed: security, trust, resilience, and agility. In addition to conducting a systematic survey on metrics, measurements, attributes of metrics, and associated ontologies, we propose a system-level trustworthiness metric framework that accommodates four submetrics, called STRAM ( S ecurity, T rust, R esilience, and A gility M etrics). The proposed STRAM framework offers a hierarchical ontology structure where each submetric is defined as a sub-ontology. Moreover, this work proposes developing and incorporating metrics describing key assessment tools, including vulnerability assessment, risk assessment, and red teaming, to provide additional evidence in the measurement and quality of trustworthy systems. We further discuss how assessment tools are related to measuring the quality of computer-based systems and the limitations of the state-of-the-art metrics and measurements. Finally, we suggest future research directions for system-level metrics research toward measuring fundamental attributes of the quality of computer-based systems and improving the current metric and measurement methodologies.