Buscar

Inteligencia artificial

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes
Você viu 3, do total de 4 páginas

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Prévia do material em texto

16/07/2017 https://www.pdf.investintech.com/preview/5bf714ee-6a97-11e7-922a-002590d31986/index.html
https://www.pdf.investintech.com/preview/5bf714ee-6a97-11e7-922a-002590d31986/index.html 1/4
Internet das Coisas: Perspectivas, Desafios e
Oportunidades
Antonio Marcos Alberti Dhananjay Singh
Instituto Nacional de Telecomunicações - Inatel Departamento de Engenharia Eletrônica
Caixa postal 05 - 37540-000 Hankuk (Coreia) Universidade de Estudos Estrangeiros
Santa Rita do Sapucaí, Minas Gerais, Brasil Campus Global: Yongin, Coréia do SulAlberti@inatel.br Dsingh@hufs.ac.kr
Resumo - A Internet das coisas pode ser definida para tornar o Objetos que poderíamos esperar na Internet? Estimativos vão
"Coisas" pertencem à Internet. No entanto, muitos se perguntam se o De bilhões para trilhões [2] [21] [22]. Essas estimativas
A Internet atual pode suportar esse desafio. Para este e outro Certamente faz você se perguntar se a Internet atual pode
Razões, centenas de iniciativas mundiais para redesenhar a Internet Apoiar um aumento tão tremendo no número de
Estão em andamento. Este artigo discute as perspectivas, os desafios Dispositivos e redes conectados. Estes e outrosE oportunidades por trás de uma futura Internet que suporte totalmente a
Os desafios motivaram a comunidade de redes para"Coisas", bem como como as "coisas" podem ajudar na concepção de um
Questionar se é hora de redesenhar a InternetMais sinergística futura Internet.
Palavras-chave: Internet de coisas, coisas inteligentes, Internet futura, Considerando o estado atual da arte e da informação
Definido pelo softwareRede, serviço centrismo, em formação- Tecnologias de comunicação (TIC). Assim, em todo o mundo,
Centrismo, ID / Loc divisão, segurança, privacidade, confiança. Centenas de iniciativas estão propondo reengerar o
Internet sob a bandeira da chamada Internet futura
I. I NTRODUCTION (FI) pesquisa [5] [21].
A Internet das coisas (IoT) refere-se a endereçamento exclusivo
Objetos e suas representações virtuais em uma rede de internet
Estrutura [18] [19] [20]. Podemos dizer que é uma extensão de
Internet com objetos exclusivamente endereçáveis tornando-se parte de
Internet existente. Os objetos que formam o IoT terão
Características distintas sobre eles. Eles podem manter a auto-
Informações de identificação; Eles podem até mesmo transmitir o processado
Informações ou qualquer coisa que possa ser considerada importante com
Respeito ao objeto com o qual eles estão associados.
Há muita presença generalizada no ser humano
Ambiente de coisas ou objetos, como radiofrequência
Etiquetas de identificação (RFID), sensores, atuadores, telefones celulares,
Dispositivos embutidos inteligentes, etc.- que, através de
Esquemas de endereçamento, são capazes de se comunicar efetivamente e
Interagir uns com os outros e trabalhar em conjunto para alcançar um
Objetivo de tornar o sistema mais fácil de operar e utilizar. o
Os objetos que estarão conectados serão adaptáveis, inteligentes e
Responsivo.
O IoT será um novo ambiente no qual o
A Internet atual será apoiada inteligentemente por todos juntos novos
Gama de dispositivos embutidos inteligentes. O IOT será
Caracterizado por um ambiente rico em RFID, ipv6, campo próximo Figura 1: Internet futura: uma evolução "inteligente"
Comunicação (NFC), códigos de barras, códigos de resposta rápida (QR) perspectiva.
Aplicativos de smartphones, GPS e outros dispositivos inteligentes.
Os objetos em rede sentirão o ambiente com ajuda
Dos sensores e se comunicará entre si Considerando um ponto de vista evolutivo, o futuro
Diretamente ou com a ajuda da Internet. A quantidade de Internet será constituída pela Internet existente e inteligente.
Conhecimento composto por informações redundantes Objetos embutidos que serão a base da Internet de
Certamente será analisado e avaliado pelo software analítico coisas. O IoT será uma parte distinta do FI. Será
E decisões inteligentes serão o resultado final. Integrados perfeitamente na Internet existente
Nesse cenário, qual poderia ser o número de redes Infra-estrutura que ajudará o serviço orientado
Arquitetura da Internet para utilizar os serviços disponíveis Mobilidade, roteamento, etc. A Internet não tem suporte para
Através do sistema. No entanto, como computação e Identificação e transparência únicas. Os endereços IP são
communication resources become more and more ubiquitous, used no only to locate devices on the network, but also to
the smart things will increasingly become integral part of the identify them [2][4]. Since the devices’ addresses behind a
FI, augmenting the overlapping area of the IoT and Internet network address translation (NAT) are opaque [5], the IDs
spheres in Figure 1. are not valid outside an autonomous system. This severely
In an evolutionary perspective, the FI will face the limits the transparency on the network. The scalability of
challenge of the integration of smart embedded devices in to the current domain naming system (DNS) is also affected by
the ever expanding Internet. Protocols using 6lowpan are a huge increase in the number of device networks. Several
improving. Since there are bandwidth limitations, the users other aspects on the current Internet are affected by thiswhich are using ipv6 will certainly face connectivity and evolution scenario [2][3].timing issues. To resolve this more efficient compressing
New network architectures need to overcome the currentalgorithm are being developed to be used in the seamless
Internet limitations by rethinking such limiting aspects.integration in to the system.
They need to take advantage of the expected ubiquity ofIn a revolutionary perspective, most of the challenges are at
computing and communication resources to improve thethe design level. IoT and FI relationships need to be clearly
determined. More synergistic designs are required to take connectivity and robustness of wireless sensor and actuator
advantage of efforts, reducing unnecessary overlapping and networks (WSANs). Devices need to be persistently
producing more efficient and flexible architectures. This paper identified to allow perennial traceability to existent
provides a first glance discussion on the relationships between sensoring and actuating resources [3]. The challenge is to
the IoT and FI considering a full convergence point of view. identify perennially and uniquely the devices that are
The remaining of this paper is organized as follows. Section collecting real world information or actuating over the real
II covers the IoT requirements and perspectives regarding world. Also, device locators need to be decoupled from
capacity, ubiquity, and scalability issues. Section III focuses identifiers to allow mobility without loss of identity [4].
on the role of IoT considering a more deep integration This and other proposals to improve IoT scalability will be
between the real and virtual worlds. Section IV concerns on discussed on the following sections.
how to expose IoT resources to software and how to
orchestrate IoT related services and applications. Section V III. REAL-VIRTUAL WORLDS INTEGRATION
addresses the relationship between IoT and software-defined
The perspective behind the IoT is that the real world willnetworking. Management and human intervention aspects are
be increasingly integrated with the virtual one [3]. Rightdiscussed on section VI. Section VII covers the relationships
now, the world is in process of making new smartbetween IoT and the information-centric paradigm for FI
embedded devices. Embedded devices are still emerging.design. Section VIII focuses on naming, identification,
mobility, and multihoming support. Section IX concerns to the This will create a flood of real world information,
security, privacy, and trust aspects. Finally, the Section X does considerably enriching our applications, making them more
some final remarks. aware of what happens in the real world, in real time,
everywhere.Smart applications are being thought of as the
II.CAPACITY, UBIQUITY, AND SCALABILITY process of making the system more popular as per the
system point of views. One can expect the popularization ofThe accelerated evolution of computing and
new applications that take advantage of this situationalcommunications capacities [1], i.e. memory, processing,
information, like augment reality, ambient intelligence,storage, transmission rate, etc., allows the implementation of
social appliances, networked cars, and many others. Also,small devices capable of sensing the real world and
there are the applications to control or act over the realtransmitting the obtained data to services and applications on
Texto original
Santa Rita do Sapucaí, Minas Gerais, Brazil
Sugerir uma tradução melhor
16/07/2017 https://www.pdf.investintech.com/preview/5bf714ee-6a97-11e7-922a-002590d31986/index.html
https://www.pdf.investintech.com/preview/5bf714ee-6a97-11e7-922a-002590d31986/index.html 2/4
world. Decisions made on the virtual side can be reflectedthe Internet. As the cost of technologies fall, more and more on the real environment. This will help us to save energy, tocapacity becomes available, making the use of networked
better use our environmental resources.sensoring and actuating devices more and more viable. One
To transform this huge amount of raw data on knowledgecan expect that the number of devices will increase faster and
is one of the biggest challenges behind the IoT. There is anfaster in the next decades [2]. As a result, sensing and
entire cycle of raw data processing up to the generation of aactuating capabilities can become ubiquitous, allowing
knowledge database. Possible data processing includesunprecedented scenarios of interaction between the real and
statistics generation, data aggregation, filtering, correlation,the virtual worlds [3].
contextualization, and exposition. Depending on the serviceAlthough it is expected that this scenario will bring huge
or application, time sensitivity is also an issue.benefits for our information society, the challenges behind it
Generally speaking, the information and knowledgeare equally big [3]. A significant increase in the number of
obtained from the sensorial network will be further used tointernet-enabled devices (IEDs) can create relevant challenges
feed other processes, like decision making or actuating.to the scalability of the current TCP/IP stack [2][3], including
Therefore, complex hierarchical feedback control loops canthe support for naming, addressing, identification, location,
be created based on the obtained sensorial data. As in any V. SOFTWARE-DEFINED NETWORKING
control system, some challenges are stability, performance, Software-defined networking (SDN) means to design
and sensitivity. New network architectures must create the networks from a software engineering perspective [10]. It
necessary support to such hierarchical control systems, means to look for the right abstractions when designing new
providing the appropriate support for the data/information network architectures. OpenFlow is a first realization of this
exchange between the real and virtual worlds. idea [11]. Network control is performed based on a
centralized view of the network. However, it is important to
IV. RESOURCES EXPOSITION AND SERVICE CENTRISM note that the SDN paradigm is more broad than the
Not only the collected IoT data need to be exposed to the OpenFlow implementation. The research for the right
software environment, but also the existent IoT resources, i.e. abstractions for the SDN is still in the beginning.
sensors, actuators, or even entire networks. In other words, In this scenario, the convergence between the IoT and the
IoT resources need be exposed to software orchestration SDN is an emerging research area. A priori, the relationship
frameworks, allowing the dynamic and integrated composition between the two technologies appear to be bilateral. The
of devices, networks, services, and applications [6]. Entire SDN paradigm could be applied to the IoT design. This is
services’ life-cycles can be orchestrated involving such already happening for wireless networks and WSANs,
exposed resources. First, services and applications can search where OpenFlow is used to program/configure network
for available IoT devices. Second, dynamic usage contracts nodes [23]. Software-defined and software-controlled
can be negotiated and established. The quality of the sensoring WSANs were just emerged as a research topic. An
and actuating functionalities can be monitored and evaluated. interesting issue is how the well-known limitations of
Dynamic contracts with sensors and actuators that do not WSANs will shape the application of the SDN paradigm on
perform as expected can be revoked. Devices can compete this networks.
each other to provide better services to virtual entities. The In the opposite direction, the IoT can be used to collect
reputation of networked objects can be estimated according to real-world information that is relevant for networking
previous established contracts. control, as well as to reflect software decisions on network
Nonetheless, IoT capabilities can be seen as a service that is hardware. An open subject is how to design networking
exposed to other software via orchestration frameworks and control and management systems that take advantage of the
contracted on demand. This view approximates the IoT to the IoT. An additional challenge is to ensure the correctness
so-called Internet of services (IoS) [7][8], which is a branch of and temporal coherence of the controls sent by software to
the FI research. In this context, a first challenge is how to the actuators.
design a service oriented IoT? A second one is how to enable
the joint orchestration of non-IoT and IoT substrate resources VI. MANAGEMENT AND AUTONOMICITY
and services. The convergence, the search for synergies, and The expectation behind the IoT is that it will manage
the elimination of redundant aspects in these two proposals itself or at least reduce considerably the degree of the
strengthens both and more efficiently addresses the challenges human intervention required [3]. We can not expect that the
behind the design of a new Internet. IoT will be managed in the same way as the telecom
The IoT resources need to be very precisely exposed. Thus, operator’s networks today. First, because the quantity of
devices’ descriptors can be elaborated and divulgated to networked devices will be orders of magnitude greater. The
possible partners. The publish/subscribe paradigm fits very traditional management model would have a very high cost
well on this task [9]. However, one can not expect that small if applied for the IoT scenario. Second, hundreds or even
sensors and actuators are able to neither expose their thousands of devices will be under the ownership of non-
capabilities, nor establish dynamic contracts. It is well known technical people, in their houses, cars, clothes, etc. Third,
that energy and other factors limit the IEDs’ functionalities. IoT management requirements have several important
Therefore, proxies can be used to represent simple networked differences when compared to traditional networks [12].
objects that do not support such functionalities. Therefore, to manage such devices is a different problem
Another very important challenge for FI architectures is the when compared with traditional Internet or telephony
consistent management of exposed resources’ life-cycle. In management. Fortunately, the restrictions imposed on the
this context, some questions are: How to manage the life-cycle IoT devices (e.g. energy, computing power, faults, limited
of exposed resources? How to share IoT resources among reach, etc.) are well understood right now and have
several orchestration frameworks? How to describe the device influenced the creation of evolving management approaches
capabilities?How to format the contracts? How to provide the less dependent on human interference [14].
adequate search mechanisms? Which circumstances can cause The IoT viability depends on the scalability, generality,
a contract revocation? These are open problems that need to autonomicity, and comprehensiveness of its management.
be investigated. Moreover, when we look for more deep synergies, the FI
management may itself depend on the IoT, since sensoring
and actuating are desirable functionalities for any ICT
equipment management. Thus, while the IoT works like a databases, etc. On the contrary, the information-centric
sensorial nervous system for the FI, providing the required design considers the information as the main ingredient of
data to establish adequate real-world awareness, it also the FI [15]. The argument is the same, i.e. everything can be
demands the management of its “army” of devices. Therefore, considered as information over a certain level of
there is a two-way relationship between the substrate resources abstraction. This approach is also know as information
management and the sensoring and actuating capabilities of centric networking (ICN). Let’s call this branch of the FI
the IoT. An open challenge is how to combine both design as Internet of information (IoI). As previously
requirements in an elegant design, without unnecessary discussed, the IoT and IoS also present a two-way
overlappings. relationship, where the IoT can be seen as a service on the
Among the proposals to reduce human interference on ICT, IoS approach and the IoS depends on the contextualized
there is the so-called autonomic technology, or self-* [13]. information provided by the IoT, as well as on its actuating
The asterisk is the name of the function that is performed capability. Thus, what is the relationship between the IoT
autonomically, e.g. self-organization, self-configuration, self- and the IoI?
optimizing, self-healing, etc. The goal would be to create a Node-centrism is perhaps the most common approach for
self-management solution or an autonomic “pilot” for the IoT. designing WSANs. A possible explanation is that for many
The implementation of the self-* properties is typically years the main design challenges were related to the energy
based on an autonomic element that performs an autonomic and other environmental pre-requirements. The idea of
cycle. According to Kephart and Chess [13], this cycle putting sensoring and actuating nodes on the Internet made
consists on the following phases: monitoring, analyzing, other design aspects emerge, such as the ones addressed on
planning, execution, and knowledge. The monitoring phase this paper. Additionally, there are the information-centric
relies on sensors that collect the relevant data at a managed aspects, e.g. information representation, naming,
entity, while the execution phase depends on effectors that identification, addressing, search, locating, traceability,
execute the planned actions. The analyzing phase aims at distribution, privacy, security, integrity, and management.
16/07/2017 https://www.pdf.investintech.com/preview/5bf714ee-6a97-11e7-922a-002590d31986/index.html
https://www.pdf.investintech.com/preview/5bf714ee-6a97-11e7-922a-002590d31986/index.html 3/4
contextualizing the monitored data to create the required Thus this paper defends that the IoT can take great
awareness regarding the managed entity. At the planning advantage of the precepts behind the IoI. Self-certifying
phase, actuating plans are generated and evaluated based on names (SCNs) can be used to name data and/or information
the analyzed data and other inputs, like politics, rules, goals, in a persistent and verifiable way1. The integrity of sensing
etc. The execution phase aims at executing the elaborated and actuating data can be checked based on such names.
plans. And, in a knowledge phase, fitness and learning takes Also, IoT information can be described and represented by
place based on the history of the actions done. In this context, information objects, which contain digital signatures,
the IoT role on future networks: checksums, metadata, access rights, formats, ontology, etc.
Merges with the necessary functionalities to implement a The persistent identification of data chunks or coded
self-management approach. Observe that many of the IoT information is another requirement advocated by the IoI.
roles overlap with the functionalities advocated by the Information identifiers need to be decoupled from addresses
autonomic cycle. Thus, the autonomic technology appears and locators. Therefore, IoT information could be moved or
to be a natural candidate for the IoT management [14]. copied without loosing its identity. Search and discovery of
Provides the contextualized real-world information IoT information can be performed based on persistent
necessary to feed the autonomic cycle of other FI names and/or identifiers. Also, information coherence,
architectural components. For example, assume a virtual provenance, and traceability become persistent. Finally,
network admission control service that decides whether a data and information are secured per se [16] - they do not
new virtual network can be established or not over some depend anymore only on secured connections.
real-world substrate. The autonomic cycle of this service In the opposite direction, the IoT can enrich the IoI with
could rely in a set of contracted sensors that measure the the information measured in the real world, as well as allow
available capacity on the physical infrastructure. If a new actuating over it. The benefits for the IoI are similar to those
virtual network is accepted, the admission installation can resulting from the convergence of the IoS and the IoT.
be done by effectors at the real-world equipment, e.g. Thus, the application of the information-centric paradigm
optical switch control or electromechanical antenna on the context of the IoT is an unexplored research area.
positioning. Thus, the IoT appears to be a natural Some open challenges are: How to name data chunks and
candidate to implement some of the phases of the information sensed on the IoT? How to create identifier for
autonomic cycle for FI components. them? How to resolve identifiers to locators? How to create
the metadata for the measured data? How to distribute the
VII. INFORMATION-CENTRISM data to one or more interested destinations? How to support
ID-based mobility? How to enable search and discovery ofThe IoS approach considers that behind a certain level of
abstraction, everything in a new Internet can be considered a
service, e.g. infrastructure, frameworks, operating systems, 1 SCNs contain the result of a cryptographic hash function over the
binary pattern of the data.
sensorial information? How to deal with the privacy of the IoT IoT. An approach to deal with this situation (and many
information? Or more generally speaking, how to apply the others on the FI) could be the establishment of a trust
state-of-the-art on information-centric design to the IoT network of hospitals. Instead of individually authorizing
scope? every possible hospital in a country, the patient authorizes
the trust network. Thus, in case of emergency access can be
VIII.NAMING, IDENTIFICATION, MOBILITY, AND MULTIHOMING granted to other hospital in the trust network.
Trust networks are in essence a collaboration contractPeople like to assign legible names to devices, networks,
between trustable peers. They can be established amongservices, and even for information. In addition to the legible
nodes in a WSAN in order to authenticate forwarding,names, SCNs can be calculated based on the binary patterns of
routing, or even aggregation of data [17]. They can alsodigital entities and information. On the other hand, identifiers
help on the selection of a node cluster’s leader. Observeare symbols that uniquely identify an entity or a content in a
howclose this idea is to the dynamic contract establishmentcertain scope. SCNs can be identifiers if they are unique in
idea on the IoS. Therefore, the management of trustsome scope. The dynamic resolution of an identifier in other
networks requires a complex contract life-cycleidentifiers allows the architecture to model the relationships
management. Also, entities reputation need to be estimatedamong devices and their sensorial data. As a data moves it
in order to decline or not their participation in somechanges its address and location, but its identifier remains the
network. Moreover, the establishment of comprehensivesame within the same scope. The same occurs to a node that
trust networks that spread over the IoT and other FImoves in some network. Therefore, the separation of
components is a new research frontier.identifiers and locators in the IoT is very desirable. More
research needs to be done on the dynamic resolution problem.
X.FINAL REMARKSAlso, standardization bodies need to verify the suitability of
the contemporary approaches for device identification on the The Internet of things is a fundamental ingredient of the
FI. The research on mechanisms to generate persistent and future Internet, since it provides the sensorial and actuating
unique identifiers to other entities in the IoT is also an issue, capabilities required to greatly enhance the interaction
including networks, services, virtual entities, etc. Other between the real and virtual worlds. Not only it collects the
challenges are: How to ensure that there is no collision? Or at real world data that feeds the entire FI, but also it offers the
least, how to minimize collisions probability? How to check actuating devices that can make virtual world decisions real.
the veracity and uniqueness of a given identifier? How to map The continued reduction in the cost of computing and
an identifier to a locator in a large population of IoT devices? communication capabilities indicates that the IoT will
Is it possible to use the IDs as addresses to forward or route become ubiquitous, allowing the FI to achieve increasing
information? Or more generally, how to design an ID-based levels of environmental awareness, as well as making our
IoT? environment more intelligent and sustainable. Such
Finally, there is the multihoming support for IoT resources. capabilities feed significant bilateral relationships with other
The current Internet provides a limited support for FI ingredients, such as: information- and service-centric
multihoming. New architectures need to support simultaneous approaches, software-defined networking, self-management,
connectivity and multipath routing. The ubiquitous naming, identification, mobility, multihoming, security,
connectivity needs to be explored in design, as well as new privacy, and trust. Therefore, this paper argues that the FI
routing approaches. Service redundancy is also a pre- research should better exploit the synergies between these
requirement. proposals and the IoT, eliminating unnecessary
overlappings and cohesively integrating them towards the
IX. SECURITY, PRIVACY, AND TRUST design of a cohesive new Internet.
The data gathered from IoT sensors or tags can carry
REFERENCESsensible information for client’s privacy. For example,
consider a personal area health monitoring system that [1] R. Kurzweil, The singularity is near: when humans transcend
biology, A Penguin Book: Science, Penguin, (2006).periodically transfers to a hospital the state of a certain patient. [2] H. Harai et al., New generation network architecture akari
The data collected by this system are property of the patient conceptual design, Tech. Rep. v1, NICT, (2010).
being monitored, which authorizes the hospital and its medical [3] M. Presser, P. Daras, N. Baker, S. Karnouskos, A. Gluhak, S. Krco,
C. Diaz, I. Verbauwhede, S. Naqvi, F. Alvarez, A. A. Fernandez-staff to access and analyze it. An unauthorized access to this Cuesta, Real world internet, Tech. rep., Future Internet Assembly
data consists of a breaking on the security and privacy of this (2008).
patient. However, consider that the communication to the [4] Y. Wang, J. Bi, X. Jiang, Mobility support in the internet using
identifiers, in: Proceedings of the 7th International Conference onauthorized hospital is lost and another medical staff needs to
Future Internet Technologies, CFI ‘12, ACM, New York, NY, USA,access the data due to a supposed emergency. This situation (2012).
can become much worse if the patient is unconscious and can [5] European Commission FIArch Group, Future Internet design
not authorize the new medical team. This scenario illustrates principles, Position Paper, (2012).
[6] M. Presser, P. Barnaghi, M. Eurich, C. Villalonga, The senseihow complex can be the security and privacy problem in the project: integrating the physical world with the digital world of the
network of the future, Communications Magazine, IEEE 47 (4), (2009).
[7] C. Schroth, T. Janner, Web 2.0 and soa: Converging concepts enabling
the internet of services, IT Professional 9 (3), (2007).
[8] P. Buxmann, T. Hess, R. Ruggaber, Internet of services, Business and
Information Systems Engineering 1 (5).
16/07/2017 https://www.pdf.investintech.com/preview/5bf714ee-6a97-11e7-922a-002590d31986/index.html
https://www.pdf.investintech.com/preview/5bf714ee-6a97-11e7-922a-002590d31986/index.html 4/4
[9] S. Tarkoma et al., The Publish/Subscribe Internet Routing Paradigm(PSIRP): Designing the Future Internet Architecture, IOS Press, 2009.
[10] ONF, Open networking foundation, (2012). URL
www.opennetworking.org.
[11] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson,
J. Rexford, S. Shenker, J. Turner, Openflow: enabling innovation in
campus networks, SIGCOMM Comput. Commun. Rev. 38 (2) (2008).
[12] L. Ruiz, J. Nogueira, A. Loureiro, MANNA: A management
architecture for Wireless Sensor Networks, IEEE Communications
Magazine, February (2003).
[13] J. Kephart, D. Chess, The vision of autonomic computing, Computer 36
(1) (2003).
[14] T. Braga, F. Silva, J. Nogueira, A. Loureiro, L. Ruiz, A tiny and light-
weight autonomic element for wireless sensor networks, IEEE Fourth
International Conference on Autonomic Computing (ICAC’07), 2007.
[15] D. Trossen, M. Sarela, K. Sollins, Arguments for an information-centric
internetworking architecture, SIGCOMM Comput. Commun. Rev. 40
(2010).
[16] C. Dannewitz, Netinf: An information-centric design for the future
internet, in: Proc. 3rd GI ITG KuVS Workshop on The Future Internet,
2009.
[17] P. Trakadas, T. Zahariadis, H. Leligou, S. Voliotis, K. Papadopoulos,
Awissenet: Setting up a secure wireless sensor network, in: ELMAR,
2008. 50th International Symposium, Vol. 2, (2008).
[18] K. Ashton, That ‘Internet of things’ thing, RFID Journal, (2009).
[19] J. P. Conti, The internet of things, Communications Engineer, Vol 4,
2006.
[20] L. Atzori, A. Iera, G. Morabito, The internet of things: A survey,
Comput. Netw. 54 (2010).
[21] D. Papadimitriou et al., Future internet: The cross-etp vision document,
Tech. rep., Cross-ETP (2009).
[22] H. Sundmaeker et al., Vision and challenges for realising the Internet
of Things, Cluster of European Research Projects on the Internet of
Things, European Commission (2010).
[23] T. Luo, H. Tan; T.Q.S. Quek, Sensor OpenFlow: Enabling Software-
Defined Wireless Sensor Networks, IEEE Communications Letters,
vol.16, no.11, pp.1896,1899, (2012).

Outros materiais