Derechos de autor 2022 Investigación e Innovación en Ingenierías
![Creative Commons License](http://i.creativecommons.org/l/by/4.0/88x31.png)
Esta obra está bajo una licencia internacional Creative Commons Atribución 4.0.
Modelo de medición de ecosistemas inteligentes desarrollados bajo el paradigma del internet de las cosas (IoT)
Corresponding Author(s) : Alejandro Quiroz Estrada
Investigación e Innovación en Ingenierías,
Vol. 10 Núm. 1 (2022): Enero-Junio
Resumen
Objetivo: Proponer un modelo de medición dentro de una arquitectura IoT, con el fin de establecer qué características de calidad son las más convenientes y necesarias para la red de objetos tomando como referencia el modelo jerárquico ISO/IEC 25000 de calidad del software. Metodología: Para el diseño del modelo se realizó una revisión sistemática de literatura que permitió obtener evidencias desde artículos científicos almacenados en repositorios digitales para poder cuantificar los atributos de calidad y determinar las métricas ideales. Como punto de partida se realizaron una serie de preguntas de investigación y una encuesta a un grupo de expertos con conocimiento en IoT para determinar que características y subcaracterísticas de calidad cumplen con los requisitos necesarios. Resultados: Se evidencio que los resultados y resolución de preguntas de investigación planteadas al igual que la encuesta realizada por el grupo de expertos para la validación del modelo responden a los criterios necesarios para un modelo de calidad. Además, con la finalidad de facilitar el entendimiento del modelo que aquí se propone, se realiza una representación gráfica por medio de esquemas preconceptuales. Conclusiones: Por ultimo, este modelo incluye métricas externas para medir atributos de características de calidad en cualquier área del IoT.
Palabras clave
Descargar cita
Endnote/Zotero/Mendeley (RIS)BibTeX
-
[1] A. Ghotbou, M. Khansari, “VE-CoAP: A constrained application layer protocol for IoT video transmission”, Journal of Network and Computer Applications., 173, 2020. DOI: https:// doi.org/10.1016/j.jnca.2020.102855
[2] P. Arboleya, et al., “An IoT open source platform for photovoltaic plants supervition”. International Journal of Electrical Power & Energy Systems., 125, 2020. DOI: https://doi.org/10.1016/j.ijepes.2020.106540
[3] J. Ariza, et al., “IoT architecture for adaptation to transient devices”. Journal of Parallel and Distributed Computing., 148, 14-30, 2021. DOI: https://doi.org/10.1016/j.jpdc.2020.09.012
[4] M. Hasan, et al., “Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches”., Internet of Things, 7, 2019. DOI: https://doi.org/10.1016/j.iot.2019.100059
[5] L. Wilbanks, “Diverse IT metrics”, IEEE Computer Society, 2012. ISSN: 1520-9202/12.
[6] J. Gubbi et al., “Internet of Things (IoT): A vision, architectural elements, and future directions”, Future Generation Computer System., 29(7), 1645-1660, 2013. DOI: https://doi.org/10.1016/j.future.2013.01.010
[7] A. Carvalho et al., “At the Edge of Industry 4.0”., Procedia Computer Science, 155, 276-281, 2019. DOI: https://doi.org/10.1016/j.procs.2019.08.039
[8] S. Rizvi et al., “Threat model for securing internet of things (IoT) network at device-level”, Internet of Things., 11, 2020. DOI: https://doi.org/10.1016/j.iot.2020.100240
[9] N. Bouchemal, S. Kallel, “A Survey: WSN Heterogeneous Architecture Platform for IoT. Lecture notes in Computer Science., In: Renault É., Mühlethaler P., Boumerdassi S. (eds) Machine Learning for Networking. MLN 2018. Lecture Notes in Computer Science. Springer, Cham, P.321-332. DOI: https://doi.org/10.1007/978-3-030-19945-6_23
[10] ISO/IEC. "Software Engineering - Software product Quality Requirements and Evaluation (SQuaRE) - Guide to SQuaRE". TECHNICAL REPORT ISO/IEC 25000:2005(E). 2005.
[11] ISO/IEC. "Software engineering — Product quality — Part 1: Quality model, Part 2: External metrics, Part 3: Internal metrics, Part 4: Quality in use metrics". International Standar ISO/IEC 9126-1, 2, 3, 4:2001(E). 2001.
[12] C. M. Zapata et al., “Esquemas preconceptuales ejecutables”, Revista Avances en Sistemas e Informática., 7, 2011. ISSN 1657-7663
[13] Y. Xuanxia et al., “Security and privacy issues of physical objects in the IoT: Challenges and opportunities”, Digital Communications and Networks, 2020. DOI: https://doi.org/10.1016/j.dcan.2020.09.001
[14] X. Yao et al., “Security and privacy issues of physical objects in the IoT: Challenges and opportunities”, Digital Communications and Networks., 2019. DOI: https://doi.org/10.1016/j.dcan.2020.09.001
[15] R. Rani, V. Kashyap & M. Khurana, “Role of IoT-Cloud Ecosystem in Smart Cities: Review and Challenges”, Materials Today., 2020. DOI: Doi: https://doi.org/10.1016/j.matpr.2020.10.054
[16] R. Bharathi et al., “Energy efficient clustering with disease diagnosis model for IoT based sustainable healthcare systems”, Sustainable Computing: Informatics and Systems., 28, 2020. DOI: https://doi.org/10.1016/j.suscom.2020.100453
[17] S. Nižetić et al., “Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future”, Journal of Cleaner Production., 274, 2020. DOI: Doi: https://doi.org/10.1016/j.jclepro.2020.122877
[18] R. S. Pressman, “SOFTWARE ENGINEERING. A PRACTITIONER’S APPROACH”, McGraw-Hill. 2010.
[19] ISO/IEC. "Software engineering — Product quality — Part 1: Quality model, Part 2: External metrics, Part 3: Internal metrics, Part 4: Quality in use metrics". International Standar ISO/IEC 9126-1, 2, 3, 4:2001(E). 2001
[20] E. Geisler, R.N. Kostoff, “The unintended consequences of metrics in technology evaluation”, Journal of Infometrics., 7(2), 103-114, 2007. DOI: 10.1016/j.joi.2007.02.002
[21] Poniszewska et al., “Studying usability of AI in the IoT systems/paradigm through embedding NN techniques into mobile smart service system”, Computing 101., 1661–1685, 2019. DOI: https://doi.org/10.1007/s00607-018-0680-z
[22] D.Ferraris, C. Fernandez, “TrUStAPIS: a trust requirements elicitation method for IoT”, International Journal of Information Security., 19, 111-127, 2020. DOI: https://doi.org/10.1007/s10207-019-00438-x.
[23] S. Valtolina et al., “Facilitating the Development of IoT Applications in Smart City Platforms. Lecture Notes in Computer Science, ed.; Springer, Cham, 83-99. DOI: https://doi.org/10.1007/978-3-030-24781-2_6
[24] H. Seokjun, K. Youngsun & K.J. Gerard, “Developing Usable Interface for Internet of Things (IoT) Security Analysis Software”. En: Lecture Notes in Computer Science, ed. Human Aspects of Information Security, Privacy and Trust, Springer, Cham, 322-328.DOI: https://doi.org/10.1007/978-3-030-24781-2_6
[25] J. Smith, J. Talavera, “Framework conceptual de ciberseguridad para aplicaciones de Internet de las cosas”, Computación y Sistemas., 15, 2012.
[26] J. Oviedo, M. Rodriguez & M. Piattini. (2015, Abr.). Certification of IPavement Applications for Smart Cities A Case Study, 2015 International Conference on Evaluation of Novel Approaches to software Engineering. 2015. [En línea] Disponible: https://ieeexplore.ieee.org/document/7320360
[27] K. Mi, “A Quality Model for Evaluating IoT Applications”, International Journal of Computer and Electrical Engineering., 8(1), 66-76, 2016. DOI: 10.17706/ijcee.2016.8.1.66-76
[28] I. A. Baños, (2017) Metodología para Evaluar la Calidad de un Producto Software de una Implementación de Internet de las Cosas. Tesis de Maestría, Universidad Tecnológica de Bolívar.
[29] M. Shafiq et al., “Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city”, Journal Future Generation Computer Systems., 107, 433-442, 2020. DOI: https://doi.org/10.1016/j.future.2020.02.017
[30] Y. Liu et al., “Capability-based IoT access control using blockchain”, Journal Digital Communications and Networks., 2020. DOI: https://doi.org/10.1016/j.dcan.2020.10.004
[31] D. Gopika, R. Panjanathan, “Energy efficient routing protocols for WSN based IoT applications: A review”, Journal Materials Today: Proceedings., 2020. DOI: https://doi.org/10.1016/j.matpr.2020.10.137
[32] M. Etemadi, M. Ghobaei-Arani & A. Shahidinejad, “Resource provisioning for IoT services in the fog computing environment: An autonomic approach”, Journal Computer Communications., 161, 109-131, 2020. DOI: https://doi.org/10.1016/j.comcom.2020.07.028
[33] D. Arellanes, K. Lau, “Evaluating IoT service composition mechanisms for the scalability of IoT systems”, Journal Future Generation Computer Systems., 108, 827-848, 2020. DOI: https://doi.org/10.1016/j.future.2020.02.073
[34] B. Costa, P. F. Pires & F. C. Delicato, “Towards the adoption of OMG standards in the development of SOA-based IoT systems”, Journal of Systems and Software., 169, 2020. DOI: https://doi.org/10.1016/j.jss.2020.110720
[35] M. A. Amanullah et al., “Deep learning and big data technologies for IoT security”, Journal Computer Communications., 151, 495-517, 2020. DOI: https://doi.org/10.1016/j.comcom.2020.01.016
[36] A. Singh, A. Payal & S. Bharti, “A walkthrough of the emerging IoT paradigm: Visualizing inside functionalities, key features, and open issues”, Journal of Network and Computer Applications., 143, 111-151, 2019. DOI: Doi: https://doi.org/10.1016/j.jnca.2019.06.013
[37] H. Fouad et al., “Distributed and scalable computing framework for improving request processing of wearable IoT assisted medical sensors on pervasive computing system”, Journal Computer Communications., 151, 257-265, 2020. DOI: https://doi.org/10.1016/j.comcom.2020.01.020
[38] H. Zahmatkesh, F. Al-Turjman, “Fog computing for sustainable smart cities in the IoT era: Caching techniques and enabling technologies - an overview”, Sustainable Cities and Society., 59, 2210-6707, 2020. DOI: https://doi.org/10.1016/j.scs.2020.102139
[39] H. Chen, B. Zhou, “Environmental performance evaluation of green buildings based on machine learning and IOT systems”, Microprocessors and Microsystems., 2020. DOI: https://doi.org/10.1016/j.micpro.2020.103496
[40] J. Bauwens et al., “Portability, compatibility and reuse of MAC protocols across different IoT radio platforms”, Ad Hoc Networks., 86, 144-153, 2019. DOI: https://doi.org/10.1016/j.adhoc.2018.11.013
[41] M. Bures et al. (2020, Nov.). A Comprehensive View on Quality Characteristics of the IoT Solutions, (eds) 3rd EAI International Conference on IoT in Urban Space. 2020. [En línea] Disponible: https://doi-org.ezproxy.unal.edu.co/10.1007/978-3-030-28925-6_6
[42] J. Soldatos et al., “Securing IoT Applications with Smart Objects: Framework and a Socially Assistive Robots Case Study”, Wireless Pers Commu., 2020. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/s11277-020-07039-1
[43] M. Singh, G. Baranwal, &A. Tripathi, “QoS-Aware Selection of IoT-Based Service”, Arab J Sci Eng., 45, 10033–10050, 2020. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/s13369-020-04601-8
[44] Y. Ashibani, Q.H.Mahmoud, “Design and evaluation of a user authentication model for IoT networks based on app event patterns”, Cluster Comput., 2020. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/s10586-020-03156-5
[45] K. Mitra, R. Ranjan & C. Åhlund, “Context-Aware IoT-Enabled Cyber-Physical Systems: A Vision and Future Directions”. En: Handbook of Integration of Cloud Computing, Cyber Physical Systems and Internet of Things, ed.: Scalable Computing and Communications, Springer, p.1-16. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/978-3-030-43795-4_1
[46] L. Urquhart, N. Sailaja & D. McAuley, “Realising the right to data portability for the domestic Internet of things”, Pers Ubiquit Comput., 22, 317–332, 2018. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/s00779-017-1069-2
[47] S.J. Moore et al., “IoT reliability: a review leading to 5 key research directions”, CCF Trans. Pervasive Comp. Interact., 2, 147–163, 2020. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/s42486-020-00037-z
[48] E. Andrade, B. Nogueira, “Dependability evaluation of a disaster recovery solution for IoT infrastructures”, J Supercomput., 76, 828–1849, 2020. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/s11227-018-2290-0
[49] C.C. Sobin, “A Survey on Architecture, Protocols and Challenges in IoT”, Wireless Pers Commun., 112, 1383–1429, 2020. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/s11277-020-07108-5
[50] D. Huynh-Van et al., “Development and Deployment of an IoT-Based Reconfigurable System: A Case Study for Smart Garden”. En: Industrial Networks and Intelligent Systems, ed.; Springer, Cham, p. 243-252. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/978-3-030-05873-9_20
[51] L. Khalid, “Internet of Things (IoT). In: Software Architecture for Business”, Springer, 2019, pp.107-127. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/978-3-030-13632-1_7
[52] M.Kim, J.H. Park & N.Y. Lee, “A Quality Model for IoT Service”. En: Advances in Computer Science and Ubiquitous Computing, ed.; Springer. Singapore, p.497-504. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/978-981-10-3023-9_77
[53] G. Baranwal, M. Singh, M. & D. P. Vidyarthi, “A framework for IoT service selection”, Journal Supercompu., 76, 2777–2814, 2020. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/s11227-019-03076-1
[54] J. Ariza et al., “IoT architecture for adaptation to transient devices”, Journal of Parallel and Distributed Computing., 148, 14-30, 2021. DOI: https://doi.org/10.1016/j.jpdc.2020.09.012
[55] M.N Bahiri, A. Zyane & A. Ghammaz. “IoTScal-C: A Based Cloud Computing Collaboration Solution for Scalability Issue in IoT Networks”. En: Proceedings of the 2nd International Conference on Electronic Engineering and Renewable Energy Systems, ed.; Springer. Singapore, p.123-133. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/978-981-15-6259-4_11
[56] A. Smiari, S. Bibi & D. Feitosa, “Examining the reuse potentials of IoT application frameworks”, Journal of Systems and Software., 169, 2020. DOI: https://doi.org/10.1016/j.jss.2020.110706.
[57] L. Hang, I. Ullah & D.H. Kim, “A secure fish farm platform based on blockchain for agriculture data integrity”, Computers and Electronics in Agriculture., 170, 2020. DOI: https://doi.org/10.1016/j.compag.2020.105251
[58] K. Kotteswari, A. Bharathi. (2019, Abr.) Spectral Expansion Method for Cloud Reliability Analysis, International Conference on Advances in Computing and Communication Engineering (ICACCE). 2019. [En línea] Disponible: https://ieeexplore.ieee.org/abstract/document/9080012.
[59] N. Sidek, N. Ali. (2019, Ene.) Quality Challenges in Internet of Things-based Services Implementation: An Exploratory Study, IEEE Conference on Application, Information and Network Security (AINS). 2019. [En línea] Disponible: https://ieeexplore.ieee.org/document/8968702.
[60] B. Kitchenham. (2004) Procedures for Performing Systematic Reviews [Internet, Keele University Technical Report, Disponible desde: https://www.inf.ufsc.br/~aldo.vw/kitchenham.pdf.
[61] M. Shahzad, A. Ganji. (2018, Nov) IoTm: A Lightweight Framework for Fine-Grained Measurements of IoT Performance Metrics, IEEE 26th International Conference on Network Protocols (ICNP). 2018. [En línea] Disponible: https://ieeexplore.ieee.org/document/8526800
[62] S. Li and J. Huang, "GSPN-Based Reliability-Aware Performance Evaluation of IoT Services," 2017 IEEE International Conference on Services Computing (SCC), 2017, pp. 483-486, DOI: 10.1109/SCC.2017.70.
[63] D. Minovski, C. Åhlund, K. Mitra & R. Zhohov, "Defining Quality of Experience for the Internet of Things", in IT Professional., 22(5), 62-70, 2020. DOI: 10.1109/MITP.2020.2968259.
[64] M. I. Robles, B. Silverajan & N. C. Narendra. (2019, Abr.) Web of Things Semantic Functionality Distance, 26th International Conference on Telecommunications. 2019. [En línea] Disponible: https://ieeexplore.ieee.org/document/8798818.
[65] A. J. Rodigues, L. T. Manera & M. Veloso, "Low-cost wireless sensor network applied to real-time monitoring and control of water consumption in residences", Revista Ambiente & Água.,6(14), 2019. DOI: https://doi.org/10.4136/ambi-agua.2407
[66] K. Williamson, “Chapter 12 - The Delphi method”, Research Methods for Students, Academics and Professionals (Second Edition)., 209-220, 2002.
Referencias
[2] P. Arboleya, et al., “An IoT open source platform for photovoltaic plants supervition”. International Journal of Electrical Power & Energy Systems., 125, 2020. DOI: https://doi.org/10.1016/j.ijepes.2020.106540
[3] J. Ariza, et al., “IoT architecture for adaptation to transient devices”. Journal of Parallel and Distributed Computing., 148, 14-30, 2021. DOI: https://doi.org/10.1016/j.jpdc.2020.09.012
[4] M. Hasan, et al., “Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches”., Internet of Things, 7, 2019. DOI: https://doi.org/10.1016/j.iot.2019.100059
[5] L. Wilbanks, “Diverse IT metrics”, IEEE Computer Society, 2012. ISSN: 1520-9202/12.
[6] J. Gubbi et al., “Internet of Things (IoT): A vision, architectural elements, and future directions”, Future Generation Computer System., 29(7), 1645-1660, 2013. DOI: https://doi.org/10.1016/j.future.2013.01.010
[7] A. Carvalho et al., “At the Edge of Industry 4.0”., Procedia Computer Science, 155, 276-281, 2019. DOI: https://doi.org/10.1016/j.procs.2019.08.039
[8] S. Rizvi et al., “Threat model for securing internet of things (IoT) network at device-level”, Internet of Things., 11, 2020. DOI: https://doi.org/10.1016/j.iot.2020.100240
[9] N. Bouchemal, S. Kallel, “A Survey: WSN Heterogeneous Architecture Platform for IoT. Lecture notes in Computer Science., In: Renault É., Mühlethaler P., Boumerdassi S. (eds) Machine Learning for Networking. MLN 2018. Lecture Notes in Computer Science. Springer, Cham, P.321-332. DOI: https://doi.org/10.1007/978-3-030-19945-6_23
[10] ISO/IEC. "Software Engineering - Software product Quality Requirements and Evaluation (SQuaRE) - Guide to SQuaRE". TECHNICAL REPORT ISO/IEC 25000:2005(E). 2005.
[11] ISO/IEC. "Software engineering — Product quality — Part 1: Quality model, Part 2: External metrics, Part 3: Internal metrics, Part 4: Quality in use metrics". International Standar ISO/IEC 9126-1, 2, 3, 4:2001(E). 2001.
[12] C. M. Zapata et al., “Esquemas preconceptuales ejecutables”, Revista Avances en Sistemas e Informática., 7, 2011. ISSN 1657-7663
[13] Y. Xuanxia et al., “Security and privacy issues of physical objects in the IoT: Challenges and opportunities”, Digital Communications and Networks, 2020. DOI: https://doi.org/10.1016/j.dcan.2020.09.001
[14] X. Yao et al., “Security and privacy issues of physical objects in the IoT: Challenges and opportunities”, Digital Communications and Networks., 2019. DOI: https://doi.org/10.1016/j.dcan.2020.09.001
[15] R. Rani, V. Kashyap & M. Khurana, “Role of IoT-Cloud Ecosystem in Smart Cities: Review and Challenges”, Materials Today., 2020. DOI: Doi: https://doi.org/10.1016/j.matpr.2020.10.054
[16] R. Bharathi et al., “Energy efficient clustering with disease diagnosis model for IoT based sustainable healthcare systems”, Sustainable Computing: Informatics and Systems., 28, 2020. DOI: https://doi.org/10.1016/j.suscom.2020.100453
[17] S. Nižetić et al., “Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future”, Journal of Cleaner Production., 274, 2020. DOI: Doi: https://doi.org/10.1016/j.jclepro.2020.122877
[18] R. S. Pressman, “SOFTWARE ENGINEERING. A PRACTITIONER’S APPROACH”, McGraw-Hill. 2010.
[19] ISO/IEC. "Software engineering — Product quality — Part 1: Quality model, Part 2: External metrics, Part 3: Internal metrics, Part 4: Quality in use metrics". International Standar ISO/IEC 9126-1, 2, 3, 4:2001(E). 2001
[20] E. Geisler, R.N. Kostoff, “The unintended consequences of metrics in technology evaluation”, Journal of Infometrics., 7(2), 103-114, 2007. DOI: 10.1016/j.joi.2007.02.002
[21] Poniszewska et al., “Studying usability of AI in the IoT systems/paradigm through embedding NN techniques into mobile smart service system”, Computing 101., 1661–1685, 2019. DOI: https://doi.org/10.1007/s00607-018-0680-z
[22] D.Ferraris, C. Fernandez, “TrUStAPIS: a trust requirements elicitation method for IoT”, International Journal of Information Security., 19, 111-127, 2020. DOI: https://doi.org/10.1007/s10207-019-00438-x.
[23] S. Valtolina et al., “Facilitating the Development of IoT Applications in Smart City Platforms. Lecture Notes in Computer Science, ed.; Springer, Cham, 83-99. DOI: https://doi.org/10.1007/978-3-030-24781-2_6
[24] H. Seokjun, K. Youngsun & K.J. Gerard, “Developing Usable Interface for Internet of Things (IoT) Security Analysis Software”. En: Lecture Notes in Computer Science, ed. Human Aspects of Information Security, Privacy and Trust, Springer, Cham, 322-328.DOI: https://doi.org/10.1007/978-3-030-24781-2_6
[25] J. Smith, J. Talavera, “Framework conceptual de ciberseguridad para aplicaciones de Internet de las cosas”, Computación y Sistemas., 15, 2012.
[26] J. Oviedo, M. Rodriguez & M. Piattini. (2015, Abr.). Certification of IPavement Applications for Smart Cities A Case Study, 2015 International Conference on Evaluation of Novel Approaches to software Engineering. 2015. [En línea] Disponible: https://ieeexplore.ieee.org/document/7320360
[27] K. Mi, “A Quality Model for Evaluating IoT Applications”, International Journal of Computer and Electrical Engineering., 8(1), 66-76, 2016. DOI: 10.17706/ijcee.2016.8.1.66-76
[28] I. A. Baños, (2017) Metodología para Evaluar la Calidad de un Producto Software de una Implementación de Internet de las Cosas. Tesis de Maestría, Universidad Tecnológica de Bolívar.
[29] M. Shafiq et al., “Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city”, Journal Future Generation Computer Systems., 107, 433-442, 2020. DOI: https://doi.org/10.1016/j.future.2020.02.017
[30] Y. Liu et al., “Capability-based IoT access control using blockchain”, Journal Digital Communications and Networks., 2020. DOI: https://doi.org/10.1016/j.dcan.2020.10.004
[31] D. Gopika, R. Panjanathan, “Energy efficient routing protocols for WSN based IoT applications: A review”, Journal Materials Today: Proceedings., 2020. DOI: https://doi.org/10.1016/j.matpr.2020.10.137
[32] M. Etemadi, M. Ghobaei-Arani & A. Shahidinejad, “Resource provisioning for IoT services in the fog computing environment: An autonomic approach”, Journal Computer Communications., 161, 109-131, 2020. DOI: https://doi.org/10.1016/j.comcom.2020.07.028
[33] D. Arellanes, K. Lau, “Evaluating IoT service composition mechanisms for the scalability of IoT systems”, Journal Future Generation Computer Systems., 108, 827-848, 2020. DOI: https://doi.org/10.1016/j.future.2020.02.073
[34] B. Costa, P. F. Pires & F. C. Delicato, “Towards the adoption of OMG standards in the development of SOA-based IoT systems”, Journal of Systems and Software., 169, 2020. DOI: https://doi.org/10.1016/j.jss.2020.110720
[35] M. A. Amanullah et al., “Deep learning and big data technologies for IoT security”, Journal Computer Communications., 151, 495-517, 2020. DOI: https://doi.org/10.1016/j.comcom.2020.01.016
[36] A. Singh, A. Payal & S. Bharti, “A walkthrough of the emerging IoT paradigm: Visualizing inside functionalities, key features, and open issues”, Journal of Network and Computer Applications., 143, 111-151, 2019. DOI: Doi: https://doi.org/10.1016/j.jnca.2019.06.013
[37] H. Fouad et al., “Distributed and scalable computing framework for improving request processing of wearable IoT assisted medical sensors on pervasive computing system”, Journal Computer Communications., 151, 257-265, 2020. DOI: https://doi.org/10.1016/j.comcom.2020.01.020
[38] H. Zahmatkesh, F. Al-Turjman, “Fog computing for sustainable smart cities in the IoT era: Caching techniques and enabling technologies - an overview”, Sustainable Cities and Society., 59, 2210-6707, 2020. DOI: https://doi.org/10.1016/j.scs.2020.102139
[39] H. Chen, B. Zhou, “Environmental performance evaluation of green buildings based on machine learning and IOT systems”, Microprocessors and Microsystems., 2020. DOI: https://doi.org/10.1016/j.micpro.2020.103496
[40] J. Bauwens et al., “Portability, compatibility and reuse of MAC protocols across different IoT radio platforms”, Ad Hoc Networks., 86, 144-153, 2019. DOI: https://doi.org/10.1016/j.adhoc.2018.11.013
[41] M. Bures et al. (2020, Nov.). A Comprehensive View on Quality Characteristics of the IoT Solutions, (eds) 3rd EAI International Conference on IoT in Urban Space. 2020. [En línea] Disponible: https://doi-org.ezproxy.unal.edu.co/10.1007/978-3-030-28925-6_6
[42] J. Soldatos et al., “Securing IoT Applications with Smart Objects: Framework and a Socially Assistive Robots Case Study”, Wireless Pers Commu., 2020. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/s11277-020-07039-1
[43] M. Singh, G. Baranwal, &A. Tripathi, “QoS-Aware Selection of IoT-Based Service”, Arab J Sci Eng., 45, 10033–10050, 2020. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/s13369-020-04601-8
[44] Y. Ashibani, Q.H.Mahmoud, “Design and evaluation of a user authentication model for IoT networks based on app event patterns”, Cluster Comput., 2020. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/s10586-020-03156-5
[45] K. Mitra, R. Ranjan & C. Åhlund, “Context-Aware IoT-Enabled Cyber-Physical Systems: A Vision and Future Directions”. En: Handbook of Integration of Cloud Computing, Cyber Physical Systems and Internet of Things, ed.: Scalable Computing and Communications, Springer, p.1-16. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/978-3-030-43795-4_1
[46] L. Urquhart, N. Sailaja & D. McAuley, “Realising the right to data portability for the domestic Internet of things”, Pers Ubiquit Comput., 22, 317–332, 2018. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/s00779-017-1069-2
[47] S.J. Moore et al., “IoT reliability: a review leading to 5 key research directions”, CCF Trans. Pervasive Comp. Interact., 2, 147–163, 2020. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/s42486-020-00037-z
[48] E. Andrade, B. Nogueira, “Dependability evaluation of a disaster recovery solution for IoT infrastructures”, J Supercomput., 76, 828–1849, 2020. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/s11227-018-2290-0
[49] C.C. Sobin, “A Survey on Architecture, Protocols and Challenges in IoT”, Wireless Pers Commun., 112, 1383–1429, 2020. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/s11277-020-07108-5
[50] D. Huynh-Van et al., “Development and Deployment of an IoT-Based Reconfigurable System: A Case Study for Smart Garden”. En: Industrial Networks and Intelligent Systems, ed.; Springer, Cham, p. 243-252. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/978-3-030-05873-9_20
[51] L. Khalid, “Internet of Things (IoT). In: Software Architecture for Business”, Springer, 2019, pp.107-127. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/978-3-030-13632-1_7
[52] M.Kim, J.H. Park & N.Y. Lee, “A Quality Model for IoT Service”. En: Advances in Computer Science and Ubiquitous Computing, ed.; Springer. Singapore, p.497-504. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/978-981-10-3023-9_77
[53] G. Baranwal, M. Singh, M. & D. P. Vidyarthi, “A framework for IoT service selection”, Journal Supercompu., 76, 2777–2814, 2020. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/s11227-019-03076-1
[54] J. Ariza et al., “IoT architecture for adaptation to transient devices”, Journal of Parallel and Distributed Computing., 148, 14-30, 2021. DOI: https://doi.org/10.1016/j.jpdc.2020.09.012
[55] M.N Bahiri, A. Zyane & A. Ghammaz. “IoTScal-C: A Based Cloud Computing Collaboration Solution for Scalability Issue in IoT Networks”. En: Proceedings of the 2nd International Conference on Electronic Engineering and Renewable Energy Systems, ed.; Springer. Singapore, p.123-133. DOI: https://doi-org.ezproxy.unal.edu.co/10.1007/978-981-15-6259-4_11
[56] A. Smiari, S. Bibi & D. Feitosa, “Examining the reuse potentials of IoT application frameworks”, Journal of Systems and Software., 169, 2020. DOI: https://doi.org/10.1016/j.jss.2020.110706.
[57] L. Hang, I. Ullah & D.H. Kim, “A secure fish farm platform based on blockchain for agriculture data integrity”, Computers and Electronics in Agriculture., 170, 2020. DOI: https://doi.org/10.1016/j.compag.2020.105251
[58] K. Kotteswari, A. Bharathi. (2019, Abr.) Spectral Expansion Method for Cloud Reliability Analysis, International Conference on Advances in Computing and Communication Engineering (ICACCE). 2019. [En línea] Disponible: https://ieeexplore.ieee.org/abstract/document/9080012.
[59] N. Sidek, N. Ali. (2019, Ene.) Quality Challenges in Internet of Things-based Services Implementation: An Exploratory Study, IEEE Conference on Application, Information and Network Security (AINS). 2019. [En línea] Disponible: https://ieeexplore.ieee.org/document/8968702.
[60] B. Kitchenham. (2004) Procedures for Performing Systematic Reviews [Internet, Keele University Technical Report, Disponible desde: https://www.inf.ufsc.br/~aldo.vw/kitchenham.pdf.
[61] M. Shahzad, A. Ganji. (2018, Nov) IoTm: A Lightweight Framework for Fine-Grained Measurements of IoT Performance Metrics, IEEE 26th International Conference on Network Protocols (ICNP). 2018. [En línea] Disponible: https://ieeexplore.ieee.org/document/8526800
[62] S. Li and J. Huang, "GSPN-Based Reliability-Aware Performance Evaluation of IoT Services," 2017 IEEE International Conference on Services Computing (SCC), 2017, pp. 483-486, DOI: 10.1109/SCC.2017.70.
[63] D. Minovski, C. Åhlund, K. Mitra & R. Zhohov, "Defining Quality of Experience for the Internet of Things", in IT Professional., 22(5), 62-70, 2020. DOI: 10.1109/MITP.2020.2968259.
[64] M. I. Robles, B. Silverajan & N. C. Narendra. (2019, Abr.) Web of Things Semantic Functionality Distance, 26th International Conference on Telecommunications. 2019. [En línea] Disponible: https://ieeexplore.ieee.org/document/8798818.
[65] A. J. Rodigues, L. T. Manera & M. Veloso, "Low-cost wireless sensor network applied to real-time monitoring and control of water consumption in residences", Revista Ambiente & Água.,6(14), 2019. DOI: https://doi.org/10.4136/ambi-agua.2407
[66] K. Williamson, “Chapter 12 - The Delphi method”, Research Methods for Students, Academics and Professionals (Second Edition)., 209-220, 2002.