October 2024
·
1 Read
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
October 2024
·
1 Read
July 2024
·
6 Reads
January 2024
Foundations and Trends® in Privacy and Security
December 2023
·
18 Reads
·
2 Citations
August 2023
·
29 Reads
·
4 Citations
January 2023
·
7 Reads
·
2 Citations
May 2022
·
137 Reads
·
13 Citations
Software and Systems Modeling
With the increasing computing and networking capabilities, IoT devices and edge gateways have become part of a larger IoT–edge–cloud computing continuum, where processing and storage tasks are distributed across the whole network hierarchy, not concentrated only in the cloud. At the same time, this also introduced continuous delivery practices to the development of software components for network-connected gateways and sensing/actuating nodes. These devices are placed on end users’ premises and are characterized by continuously changing cyber-physical contexts, forcing software developers to maintain multiple application versions and frequently redeploy them on a distributed fleet of devices with respect to their current contexts. Doing this correctly and efficiently goes beyond manual capabilities and requires an intelligent and reliable automated solution. This paper describes a model-based approach to automatically assigning multiple software deployment plans to hundreds of edge gateways and connected IoT devices implemented in collaboration with a smart healthcare application provider. From a platform-specific model of an existing edge computing platform, we extract a platform-independent model that describes a list of target devices and a pool of available deployment plans. Next, we use constraint solving to automatically assign deployment plans to devices at once with respect to their specific contexts. The result is transformed back into the platform-specific model and includes a suitable deployment plan for each device, which is then consumed by our engine to deploy software components not only on edge gateways but also on their downstream IoT devices with constrained resources and connectivity. We validate the approach with a fleet deployment prototype integrated into a DevOps toolchain used by the partner application provider. Initial experiments demonstrate the viability of the approach and its usefulness in supporting DevOps for edge and IoT software development.
May 2022
·
10 Reads
·
13 Citations
January 2022
·
527 Reads
·
32 Citations
Cybersecurity
Security of the Internet of Things (IoT)-based Smart Systems involving sensors, actuators and distributed control loop is of paramount importance but very difficult to address. Security patterns consist of domain-independent time-proven security knowledge and expertise. How are they useful for developing secure IoT-based smart systems? Are there architectures that support IoT security? We aim to systematically review the research work published on patterns and architectures for IoT security (and privacy). Then, we want to provide an analysis on that research landscape to answer our research questions. We follow the well-known guidelines for conducting systematic literature reviews. From thousands of candidate papers initially found in our search process, we have systematically distinguished and analyzed thirty-six (36) papers that have been peer-reviewed and published around patterns and architectures for IoT security and privacy in the last decade (January 2010–December 2020). Our analysis shows that there is a rise in the number of publications tending to patterns and architectures for IoT security in the last three years. We have not seen any approach of applying systematically architectures and patterns together that can address security (and privacy) concerns not only at the architectural level, but also at the network or IoT devices level. We also explored how the research contributions in the primary studies handle the different issues from the OWASP Internet of Things (IoT) top ten vulnerabilities list. Finally, we discuss the current gaps in this research area and how to fill in the gaps for promoting the utilization of patterns for IoT security and privacy by design.
September 2021
·
20 Reads
·
6 Citations
... SOAR4BC is also linked to AVATAR4BC to provide assistance to human operators. More details on these other modules can be found in [17,22]. In this paper, we mainly focus on the inner components of SOAR4BC, as presented in the following subsections. ...
December 2023
... In this section, we present our SOAR4BC approach, which leverages the DT of physical systems to provide a holistic context for security orchestration, automation, and response. SOAR4BC is connected to other components of the DYN-ABIC framework [22], providing necessary information via a Kafka bus. As seen in Fig. 2, it receives inputs from AWARE4BC for incident details, MADT4BC for system information, RISK4BC for risk analysis data and CTI4BC for external incident information. ...
August 2023
... Despite these obvious benefits, current state-of-the-art edgeto-cloud FaaS platforms, e.g., [3]- [5], [12] lack a key feature: geographical context awareness [6]. Considering the geographical location of potentially mobile serverless clients when routing their requests to the nearest serverless node can reduce network traffic and facilitate load balancing [9]. ...
Reference:
GeoFaaS: An Edge-to-Cloud FaaS Platform
January 2023
... Ferry et al. [35] introduced another framework called SERVERLEss4I0T in their publication. This framework functions as a platform for creating, deploying, and managing applications across the Cloud-Edge-IoT spectrum. ...
May 2022
... Furthermore, in Edge Computing there are also other frameworks for IoT applications, such as EdgeFlow [51], capable of assisting the developer in the application development process, dividing applications functionality into multiple parts, defining and validating the requirements and finding a deployment strategy. IoT application deployment plans are also addressed in [52], describing a model-based approach to automatically assigning multiple software deployment plans to hundreds of edge gateways and connected IoT devices. A platform-independent meta-model describes a list of target devices and deployment plans and is validated with a prototype integrated into a DevOps toolchain. ...
May 2022
Software and Systems Modeling
... Zagi [89], in his research work, carried out the grouping of articles in which reference is made to the aspects availability, confidentiality, authorization, and authentication, which as a result, are observed to be the most violated security aspects, therefore these can be considered as criteria to confirm that a system or device is protected. For Rajmohan [85] and Tange [87], the security concern covered in the primary studies is also the aforementioned criteria, adding to these privacy and resilience. ...
January 2022
Cybersecurity
... This is a massive disadvantage for users, as they are limited to the hardware manufacturers' software and prevented from installing new software. Ultimately, it leads to IoT devices becoming e-waste [12] once the developers stop supporting their software, turn off necessary cloud services, or actively disable the devices. Up to now, products from major vendors still do not talk to each other, probably due to competitive relations [23]. ...
September 2021
... self-adaptive system) can modify its own structure and behavior at runtime based on its perception of the environment, of itself and of its requirements [57]. Examples of adaptive systems include elastic cloud systems [39], intelligent IoT systems [14], and proactive process management systems [27]. ...
January 2021
... When working with business clients, operators have a number of options at their disposal, including local offload services, edge room leasing, and unified IaaS capabilities. When edge nodes are rare and management advantages are low, operators provide unified planning and deployment of IaaS and PaaS platforms for SMEs, unlike big businesses [67]. Fourth, confidence in dependability. ...
October 2020
... Many studies have been conducted to review the literature on patterns in software engineering. However, they either concentrate on specific system domains [5][6][7][8] or intentions [9][10][11][12][13][14][15][16], or they just present a quantitative description of the state-of-the-art [17,18] without attempting to synthesize the research landscape of patterns. This study aims to fill this gap and provides researchers with a structured review of the state-of-the-art of patterns in the software engineering field. ...
August 2020