<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Modeling Opportunistic IoT Services in Open IoT Ecosystems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Giancarlo Fortino</string-name>
          <email>g.fortino@unical.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Wilma Russo</string-name>
          <email>w.russo@unical.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Claudio Savaglio</string-name>
          <email>csavaglio@dimes.unical.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mirko Viroli⸸</string-name>
          <email>mirko.viroli@unibo.it</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>MengChu Zhou⁑</string-name>
          <email>zhou@njit.edu</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Things</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Cyberphysical Services</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Dept. of Informatics</institution>
          ,
          <addr-line>Modelling, Electronics and Systems (DIMES)</addr-line>
          ,
          <institution>University of Calabria</institution>
          ,
          <addr-line>87036 Rende (CS)</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <fpage>90</fpage>
      <lpage>95</lpage>
      <abstract>
        <p>-Internet of Thing (IoT) is transforming our physical world into a giant information system, daily providing novel, advanced, cyberphysical services. Differently from conventional computing services (e.g., web-services, and ubiquitous services) that are usually loosely impacted by contextawareness, co-location or transience, Internet of Things (IoT) services require to actually consider the overall spatio-temporal context of the heterogeneous entities involved in the service provisioning. This paper proposes a novel and full-fledged approach to IoT service modeling, aiming to fully support IoT service development according to opportunistic properties.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Keywords—Internet of
Modelling</p>
    </sec>
    <sec id="sec-2">
      <title>I. INTRODUCTION</title>
      <p>
        Services notably contributed to the spread of Internet,
which evolved from a restricted/small-sized academic and
military network into a worldwide platform hosting
applications of all kinds [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Likewise, services promise to
represent the real drivers for the Internet of Things (IoT) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], a
dynamic and heterogeneous ecosystem of networked everyday
objects, conventional computing systems, places, pets and
people. These entities, supported by ubiquitous and seamless
connectivity, take part in novel, advanced, cyberphysical
services (indicated as IoT Services in the follow), which are
expected to revolutionize every application context. As matter
of fact, from industry and public safety, to wellness and
transportation, new IoT services are always coming on the
scene1, facilitated by the continuous spread of Smart Objects
(SOs, namely everyday objects empowered in their
conventional functionalities). Indeed, SOs acquire, process, and
communicate information about the surrounding environment,
entities and ongoing activities, and accordingly act and
interoperate, regardless of their different communication
protocols or technologies [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. In such a scenario, IoT services
are therefore fundamental, since they are high-level interfaces
for straightforwardly accessing heterogeneous SOs, especially
in dense, cooperative, open environments, e.g., a Smart City in
which SOs belonging to different application contexts
cooperate for providing services related to e-health, smart
factories, energy and traffic management, etc. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        Although IoT is gaining momentum, and regardless the
substantial background on computing services, the
development of an IoT service is a challenging and not fully
mastered task. Traditional computing services are based on a
vertical data flow between physical and application layers, and
each service is often independent [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Conversely, IoT services
exploit both data and cyberphysical functionalities provided by
a horizontal landscape of heterogeneous entities, sharing the
same resources and environment. Due to their complexity, IoT
services require a specific development methodology, so to be
thoughtfully designed, formally verified, and simulated. Such a
full-fledged approach, so long as supported by a preliminary
and systematic modeling phase, paves the way toward reliable,
fast and effective IoT Service development [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. However,
service modeling is often a neglected or underestimated
activity, which is complicating the overall development process
and limiting IoT services potentials.
      </p>
      <p>In this work we propose a novel and full-fledged approach
to IoT service modeling, aiming to support IoT Service
development according to (i) different granularity, from
highlevel and general purpose metamodels (suitable to the analysis
phase) to detailed models, instantiated over specific domains or
case studies (suitable to the implementation and verification
phases); and (ii) different perspectives, providing both
descriptive and operational service models, thus meeting the
requirements of several professionals involved in the service
development.</p>
      <p>The rest of the paper is organized as follows. In Sec. II,
related works pertaining service modeling are surveyed, with a
particular focus on the most relevant IoT research initiatives. In
Sec. III, our modeling approach for Opportunistic IoT Services
is presented and its application shown in a concrete case study
(public safety during a mass event’s evolution) in Sec. IV.
Conclusions are drawn and future work outlined in Sec. V.</p>
    </sec>
    <sec id="sec-3">
      <title>II. RELATED WORK Even though there has been much talk about IoT services, the majority of the related results directly or indirectly derive from only a few IoT Service models.</title>
      <p>
        One of the most important contributions derives from the
IoT-A project [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] (see Fig. 1(a)), in which a detailed IoT
service model has been provided and then exploited as an
architectural building block (“IoT Service Layer”) in different
IoT platforms [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] like Butler and ICore. The IoT-A service
model extends the previous one developed within the SENSEI2
project, and is totally aligned with the ones of AIOTI3 and
FIWARE4 initiatives, as well as with the IEEE P2413
“Standard for an Architectural Framework for the IoT”5.
According to the SSN (Semantic Sensor Networks)6 ontology,
it describes an IoT service as a well-defined and standardized
interface enabling interactions with the real world, specifically
through its Virtual Entities (VEs, namely physical entities
abstractions). Indeed, IoT services allow accessing a VE’s
status, properties and functionalities (sensing, actuation,
computation, storage or networking) by means of its
Resources, thereby hiding VE heterogeneity/complexity to IoT
developers and users. Associations between IoT services and
VEs are established according to both dynamic (e.g., IoT
service current status, VE location, and VE resource
availability) and static information (for example, IoT Service
specifications and quality of service, VE id and dimension). In
particular, relevant information for each IoT service is coded in
a Service Description Model according to the business-oriented
USDL (Unified Service Description Language). This paves the
way toward the application of the IoT-A service model within
the world of Business Processes (BPs): indeed, by extending
the BPMN 2.0 (Business Process Model and Notation), it is
possible to treat IoT services as IoT-aware BPs [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        Similarly to the IoT-A project [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], authors of [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] and [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]
propose an SSN-based model in which IoT services are
provided according to established associations between
Physical Entities (PE, namely every person, place, or object
whose spatio-temporal attributes and preferences constitute its
Context). Differently from business-oriented service model of
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], however, the IoT service model of [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] and [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] specifically
focus on semantic IoT service description, thus extending the
OWL-S (Web Ontology Language for Service)7. Indeed, each
IoT Service (see Fig. 1(b)) is featured by a ServiceProfile
describing what a service does (functional and not-functional
properties), a ServiceModel eliciting how a service works
(processes and related Preconditions, Effects, Inputs, and
Outputs), and a ServiceGrounding specifying how a service is
concretely implemented (message formats, serialization,
transport and addressing, etc.). In particular, with respect to the
original OWL-S service model, ServiceProvisionConstraint,
ContextPrecondition and ContextEffect classes have been
introduced within the Service Profile to explicitly consider
context-awareness and cyberphysicality at the modeling phase.
Indeed, the ContextPrecondition class specifies the conditions
related to the PE Context (namely its spatio-temporal features)
that should hold before the service can be provided
(Precondition specifies just general functional preconditions).
2 SENSEI: Integrating the Physical with the Digital World of the Network of
the Future, www.sensei-project.eu
3 AIOTI: Alliance for IoT Innovation, www.aioti.eu
4 FIWARE: Future Internet ware, https://www.fiware.org/
5 IEEE P2413, standards.ieee.org/develop/project/2413.html
6 SSN, http://www.w3.org/2005/Incubator/ssn
7 OWL-S, https://www.w3.org/Submission/OWL-S/
      </p>
      <p>Similarly, the ContextEffect class describes changes to the
external world or environment (Effect just describes the change
to the service provider entity). Finally,
ServiceProvisionConstraint class represents PE physical
constraints that are relevant to the service provision.</p>
      <p>
        An IoT-A like, but not SSN-based, service model is
reported in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], which mainly consists of IoT
services and Entities of Interest (EoI). In particular, the latter
represent physical objects, featured by their Properties of
Interest (PoI, namely desired properties associated with an
EoI), to be monitored, controlled, or tracked through Devices.
IoT services, instead, are featured by a set of Requirements
which consider a specific application context, an EoI, its PoI,
and PoI’s observation rate and provided reliability (as shown in
Fig. 1(c)). IoT service Requirements are specified in a
declarative way and can be autonomously processed and
matched with the expected levels of dependability.
      </p>
      <p>
        A completely different approach to service modeling is
carried out in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. In particular, these models are
specifically conceived for operational purposes more than for
descriptive goals. Indeed, both works exploit (extensions of)
Petri Nets [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] to model real world entities as Nets, their
operations as transitions and their IoT services as a sequence of
states, as shown in Fig. 1(d). Such operational modeling allows
controlling the correctness of IoT services among dynamic
context changes, thus exhaustively and automatically checking
their compliance to a given set of specifications.
      </p>
      <p>
        Finally, the work in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] focuses on modelling IoT services
at the level of cooperating devices, namely, as computational
processes working on spatio-temporal sensed data. The work
discussed in the present paper addresses architectural aspects of
IoT services sharing a common view where such services
operate in given spatio-temporal execution contexts.
      </p>
    </sec>
    <sec id="sec-4">
      <title>III. OPPORTUNISTIC IOT SERVICE MODELING</title>
      <p>This work proposes a novel approach to service modeling,
conceived to fully support IoT service development. Our
approach has two main steps: (i) metamodeling, in which
highlevel representations are provided, mainly for descriptive
purposes, to outline a service overview particularly suitable for
the analysis phase; and (ii) operational modeling, in which
services are formalized following specific notations to support
the further phases of service design, verification and
simulation. These two steps (based on the same concepts but
presented from two different perspectives) are both centered
around innovative cyber-physical IoT services involving
heterogeneous entities, generally defined “IoT Entities”, within
a certain “IoT Environment”, to be detailed later, as depicted in
Fig. 2. Similarly to models surveyed in Sec. II, we consider IoT
services as interfaces for making an IoT Entity’s functionality
accessible by other IoT Entities. Conversely, our IoT service
model is the first that explicitly considers the following
opportunistic properties, crucial to capture the real IoT service
potentials but largely overlooked in the past:
i. Dynamicity, IoT services can be dynamically, and not
apriori, created/activated;
ii. Context-awareness, any implicit/explicit information about</p>
      <p>IoT Entities synergically interact within the IoT
Environment, providing and leveraging IoT Services according
to their own features (namely static/dynamic attributes) and
cyber-physical functionalities (namely entity capabilities
subject to specific conditions or constraints). To provide more
customized modeling, and differently from the surveyed related
works, IoT Entities are categorized into Humans, Pets (both
involved uniquely in service consuming) and Things (acting as
IoT service prosumers). Fig. 3 depicts the aforementioned IoT
Entities’ classification and their role in the IoT Service
provision. In their turn, Things can be further classified into
Smart Objects and Computing Systems. In particular,
Computing Systems are conventional PC, notebooks, servers,
etc. They are usually described by means of features like
IP/MAC addresses, software and hardware specifications,
exposing their functionalities (typically computation) locally
or remotely on the Web. Smart Objects (SOs), instead, are
everyday objects augmented with sensing/actuation,
processing, storing, and networking functionalities. Because of
their capabilities, cyberphysical nature and pervasiveness, SOs
are primary service prosumers in an IoT scenario.</p>
      <p>
        To consider all the information that could be relevant for the
IoT Service provision, the SO metamodel of [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] has been
extended in Fig. 4, thus describing each SO through its:
 Status: it is characterized by a list of variables, given as
pairs &lt;name, value&gt;, that capture the SO state.
 FingerPrint: it contains the following basic and distinctive
SO information, such as Identifier (representing the Id of
the SO, which allows its unique identification within the
IoT or an IoT subsystem), Creator (either an individual
creating the SO for personal use, an industrial company
that creates it for business, or an academic research
laboratory implementing it for research purposes), Type
(given for categorizing SOs with a deeper level of detail,
thus distinguishing for example a smart pen from a smart
car or a smart building), QoSParameter (associated to the
SO, like reliability, availability, etc.), Constraint (defines
an SO static constraint that, if violated, prevent the SO
from working, such as electric voltage, and maximum SO
work temperature), and Preference (helping choose
between alternatives options, properties, modalities, etc.
(e.g., a SmartCar with a preferred fuel brand). A
preference is not necessarily stable over time and, as
opposed to a Constraint, it can be disregarded.
 PhysicalProperty: it represents a physical property of the
original object without any hardware augmentation and
embedded smartness.
 Service: it models an IoT service provided/consumed by the
      </p>
      <p>SO.
 Device: it defines the hardware and software characteristics
of a device that allows to augment the physical object and
make it smart. A device can be specialized into (i)
Computer, representing the SO processing unit (e.g.
embedded computer, plug computer, etc.); (ii) Sensor,
modeling a sensor node belonging to the SO; and (iii)
Actuator: modeling an actuator node belonging to the SO.
 Location: it represents the geophysical position of the SO.</p>
      <sec id="sec-4-1">
        <title>B. IoT Environment and Context Metamodeling</title>
        <p>Differently from the conventional computing services,
usually loosely impacted by context-awareness, co-location or
transience, IoT Services are actually and opportunistically
tightly related to the “IoT Environment”. It represents the
physical environment without any augmentation (e.g., a
parking area, an agricultural field, and an industrial
warehouse) in which IoT Entities and Physical Elements (e.g.,
trees, unanimated obstacles, and weather phenomena) are
colocated during the IoT Service provision. Context, instead,
represents a set of dependencies among IoT services and both
IoT Entities and the IoT Environment. Indeed, service
provision is expected to exploit any implicit or explicit
information regarding IoT Entity, IoT Environment, or other
IoT Services. For example, an IoT Service can be influenced
from an IoT Entity constraint or preference, as well as from
the dimensions of the physical environment.</p>
      </sec>
      <sec id="sec-4-2">
        <title>C. IoT Service Metamodeling</title>
        <p>Each IoT Service is featured by a Service Model and a
Service Profile, such that it can be accurately described,
automatically discovered, consumed or composed. The
Service Model contains the main attributes describing the IoT
Service itself and the relationships between the service
provision and the involved IoT Environment. In detail:
 Service Name: it refers to the name of the IoT Service that is
being offered. It can be used as service’s identifier;
 Service Description: it provides a brief human-readable
description of the IoT Service;
 Service Category: it refers to an entry in some IoT Service
ontology or taxonomy (e.g., monitoring, and payment);
 Service Parameter: it describes the quality parameters
provided by the IoT Service (e.g., latency, and precision);
 Service Input: information required for the IoT Service
execution;
 Service Output: information generated as output of the IoT</p>
        <p>Service execution;
 Service Precondition &amp; Service Context Precondition:
functional and IoT Entity-related conditions required for a
valid IoT Service execution;
 Service Effect &amp; Service Context Effect: events involving</p>
        <p>IoT Entities which result from the IoT Service execution;
 Service Provision Constraint: IoT Entity's constraint that is
relevant to the IoT Service execution.</p>
        <p>The Service Profile, instead, contains details about a
process, namely the operation(s) concretely implementing the
IoT Service. In detail:
 Process Id: it identifies the process;
 Process Input: it specifies the information that the Process
requires for its execution;
 Process Output: it specifies the information generated from
the Process execution;
 Process Precondition: it specifies the condition under which
the Process has place;
 Process Effect: events or changes to the state of IoT Entities
that result from the Process execution.</p>
      </sec>
      <sec id="sec-4-3">
        <title>D. IoT Service Operational Modeling</title>
        <p>
          For a number of reasons, IoT services promise to be
notably more complicated, heterogeneous and large-scale than
conventional ones. First, the IoT service deployment phase is
obviously notably complex, time-consuming, and error-prone,
comprising not only software distribution but also the
configuration of (even thousands of) heterogeneous devices
according to their specific resources and surrounding
environment [
          <xref ref-type="bibr" rid="ref16 ref3">3, 16</xref>
          ]. Second, IoT service provisions cannot
underestimate several issues related to the network size,
density, and topology, as well as failures and changes to
service working conditions, that are difficult to be described
through static metamodels [
          <xref ref-type="bibr" rid="ref16 ref5">5, 16</xref>
          ]. Third, IoT services require
to completely adhere to their expected provisions, since they
perform cyberphysical actuation in time-sensitive, critical
environments [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. It follows that the static and descriptive, yet
accurate and expressive, IoT service metamodels need to be
complemented by operational IoT service models for paving
the way toward verification and simulation phases. DES
(Discrete Event System) formalization allows descriptive
models to be mapped into operational representations, enabling
the subsequent verification and simulation by means of
different computing tools. Essential elements in DESs are the
(discrete) Event set Ev and the (discrete) States Space Ss. Ss
comprises all the services states (e.g., activation, ready,
execution, and aborted) that can be reached according to the
possible events (e.g., input received, computed value out of
threshold, physical constraint violated, etc.) included in Ev.
Doing so, it is possible to model, verify and simulate IoT
Services by taking into account relevant elements defining their
ServiceProfile and Service Model (e.g., service/process input,
output, preconditions, and effects), as well as important IoT
Entity features (e.g., constraints, and preferences locations).
Petri nets and their extensions (e.g., for dealing with real time
and stochastic systems) represent an excellent model for DESs
and provide a well-established suite of tools for their formal
verification [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. Future works will also explore advanced
operational models for large-scale collective adaptive systems,
such as the work in [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>IV. USE CASE</title>
      <p>
        The modeling approach described in Sec. III has been
applied to the “Crowd safety” opportunistic IoT Service,
inspired by the one proposed in [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. It considers a mass public
event, such as the Vienna marathon, and aims at (i) alerting
people located nearby overcrowded zones, where any small
incident can create a dangerous panic situation; (ii) proposing
alternative paths according to the user’s preferences/constraints
(e.g., a tourist, an elder, a biker can receive different
suggestions for the same destination customized on their
preferences). In details, SOs deployed around the city (e.g.,
smart traffic lights, and smart lamps) monitor through their
embedded devices the flow of athletes and audience, and allow
estimating the city zones’ density. The “Crowd Safety” IoT
Service” thus alerts citizens located nearby overcrowded zones
by sending a notification on their personal devices. The same
alerted citizens can hence specify their destination and receive
customized, context-aware, and real-time hints on the best path
to be followed. The “Crowd Safety” is clearly an opportunistic
IoT Service because it exposes the four aforementioned
opportunistic properties of:
i. Dynamicity, since it is activated only if a zone’s density
level exceeds a threshold continuously for a certain
amount of time;
ii. Co-located, since it exploits multiple SOs at the same
time for contemporary serving multiple citizens
located nearby the overcrowded zones;
iii. Transient, since it lasts only for an emergency situation
and until the citizen is near an overcrowded zone;
iv. Context-aware, since it considers athletes and audience
positions and environmental elements (e.g., a bridge)
for determining density and risk levels, as well as
citizens positions and their preferences for providing
alerts and customized hints.
      </p>
      <sec id="sec-5-1">
        <title>A. “Crowd Safety” IoT Service Modeling</title>
        <p>Next, the opportunistic “Crowd Safety” IoT Service is
described according to high-level metamodels (Fig.5) and
operational models (Fig.6). Citizens and Things (namely, IoT
Entities) located in Vienna and deployed on its monitored
Streets, Squares and Bridges (IoT Environment) are differently
involved in the “Crowd Safety” IoT Service. This comprises
three processes for mapping each zone to a risk level (Density
calculation), alerting citizens located near overcrowded zones
(User Alert), and, if required by the same alerted citizens,
providing customized alternative paths for a certain destination
(Path Suggestion). The Crowd Safety IoT Service and related
processes are better detailed through a Service Model and a
Service Profile. The former provides functional specifications
(e.g., a citizen’s position is determined with a precision of 50
meters and they are notified within 10 seconds from their
detection near an overcrowded zone), while the second
specific preconditions can trigger certain events concretely
implementing the “Crowd Safety” IoT Service (e.g., how a
city zone gets matched with its density level).</p>
        <p>A (simplified but enough expressive) operational model
describing the “Crowd Safety” IoT Service according to the
Petri net formalism is depicted in Fig. 6. In detail, Service
Space Ss comprises five service states while six events in
Event set Ev represent service preconditions (e.g., the density
level should exceed a warning threshold for a period before
the zone is considered as being overcrowded) and effects (alert
notifications or path suggestions are sent to a citizen who is
near a dangerous zone). Even at a first glance, it is evident to
see the matching between the concepts of Figs. 5 and 6. For
example, S0, S3 and S4 depicted in Fig. 6 are the homonyms
processes constituting the “Crowd Safety” Service Model in
Fig. 5, which encodes, among others, ev3 as Process
Precondition and ev4 as Process Effect. However, as
previously motivated, the metamodels in Fig. 5 accomplish a
descriptive functionality while operational model in Fig.6
allows performing the formal verification and simulation of
the service.</p>
        <p>Services are the real IoT drivers, generating unforeseen
opportunities into an extremely rich market. The IoT's potential
benefits deriving from effectively connected products and
services, however, are bounded by some limitations affecting
current IoT service development methodologies, especially
with regard to IoT service modeling, verification and
simulation. In such direction, this work has proposed a novel
full-fledged approach that support opportunistic IoT Service
development by means of descriptive metamodels and
operational models. They are instantiated on a case study
related to crowd safety on a large mass event. The approach
can be effectively used to analyze, simulate and validate any
IoT service before its actual deployment.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>ACKNOWLEDGMENT</title>
      <p>This work has been carried out under the framework of
INTER-IoT, Research and Innovation action - Horizon 2020
European Project, Grant Agreement #687283, financed by the
European Union.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Huhns</surname>
          </string-name>
          and
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Singh</surname>
          </string-name>
          , “
          <article-title>Service-oriented computing: Key concepts and principles,” IEEE Internet Comput</article-title>
          ., vol.
          <volume>9</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>75</fpage>
          -
          <lpage>81</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Gubbi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Buyya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Marusic</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Palaniswami</surname>
          </string-name>
          , “
          <article-title>Internet of Things (IoT): A vision, architectural elements, and future directions,” Future Gener</article-title>
          .
          <source>Comput. Syst.</source>
          , vol.
          <volume>29</volume>
          , no.
          <issue>7</issue>
          , pp.
          <fpage>1645</fpage>
          -
          <lpage>1660</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>C.</given-names>
            <surname>Savaglio</surname>
          </string-name>
          , G. Fortino, and
          <string-name>
            <given-names>M.</given-names>
            <surname>Zhou</surname>
          </string-name>
          , “
          <article-title>Towards interoperable, cognitive and autonomic IoT systems: An agent-based approach,” in Internet of Things (WF-IoT</article-title>
          ),
          <source>2016 IEEE 3rd World Forum on, 2016</source>
          , pp.
          <fpage>58</fpage>
          -
          <lpage>63</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>B.</given-names>
            <surname>Molina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. E.</given-names>
            <surname>Palau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Fortino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Guerrieri</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Savaglio</surname>
          </string-name>
          , “
          <article-title>Empowering smart cities through interoperable Sensor Network Enablers,”</article-title>
          <source>in Systems, Man and Cybernetics</source>
          (SMC),
          <source>2014 IEEE Int. Conf. on, 2014</source>
          , pp.
          <fpage>7</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>G.</given-names>
            <surname>Fortino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Russo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Savaglio</surname>
          </string-name>
          , “
          <article-title>Agent-oriented modeling and simulation of IoT networks</article-title>
          ,
          <source>” in Computer Science and Information Systems (FedCSIS)</source>
          ,
          <source>2016 Federated Conf. on, 2016</source>
          , pp.
          <fpage>1449</fpage>
          -
          <lpage>1452</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Meissner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. D.</given-names>
            <surname>NEC</surname>
          </string-name>
          , and
          <string-name>
            <surname>G. M. TID</surname>
          </string-name>
          , “
          <article-title>Internet of Things Architecture IoT-A Project Deliverable D2</article-title>
          .
          <fpage>1</fpage>
          -Resource Description Specification.”
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>C.</given-names>
            <surname>Savaglio</surname>
          </string-name>
          and G. Fortino, “
          <article-title>Autonomic and Cognitive Architectures for the Internet of Things,”</article-title>
          <source>in Int. Conf. on Internet and Distributed Computing Systems</source>
          ,
          <year>2015</year>
          , pp.
          <fpage>39</fpage>
          -
          <lpage>47</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>K.</given-names>
            <surname>Sperner</surname>
          </string-name>
          , S. Meyer, and C. Magerkurth, “
          <article-title>Introducing entity-based concepts to business process modeling</article-title>
          ,
          <source>” in Int. Workshop on Business Process Modeling Notation</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>166</fpage>
          -
          <lpage>171</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>De</surname>
          </string-name>
          , P. Barnaghi,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bauer</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Meissner</surname>
          </string-name>
          , “
          <article-title>Service modelling for the Internet of Things,”</article-title>
          <source>in Computer Science and Information Systems (FedCSIS)</source>
          ,
          <source>2011 Federated Conf. on, 2011</source>
          , pp.
          <fpage>949</fpage>
          -
          <lpage>955</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Huang</surname>
          </string-name>
          et al., “
          <article-title>Extending service model to build an effective service composition framework for cyber-physical systems,” in Service-Oriented Computing and Applications (SOCA</article-title>
          ),
          <source>2009 IEEE Int. Conf. on, 2009</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>K. S.</given-names>
            <surname>Dar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Taherkordi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Eliassen</surname>
          </string-name>
          , “
          <article-title>Enhancing Dependability of Cloud-based IoT Services through Virtualization,” in Internet-of-Things Design and Implementation (IoTDI</article-title>
          ),
          <source>2016 IEEE First Int. Conf. on, 2016</source>
          , pp.
          <fpage>106</fpage>
          -
          <lpage>116</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Haller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Serbanati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bauer</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Carrez</surname>
          </string-name>
          , “
          <article-title>A domain model for the internet of things,” in Green Computing</article-title>
          and
          <source>Communications (GreenCom)</source>
          ,
          <source>2013 IEEE and Internet of Things, IEEE Int. Conf. on and IEEE Cyber, Physical and Social Computing</source>
          ,
          <year>2013</year>
          , pp.
          <fpage>411</fpage>
          -
          <lpage>417</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>M. A. B. Ahmadon</surname>
            and
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Yamaguchi</surname>
          </string-name>
          , “
          <article-title>On service personalization analysis for the internet of me based on PN2,” in Consumer Electronics (ICCE</article-title>
          ),
          <source>2016 IEEE Int. Conf. on, 2016</source>
          , pp.
          <fpage>413</fpage>
          -
          <lpage>416</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Davoudpour</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sadeghian</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Rahnama</surname>
          </string-name>
          , “
          <article-title>'CANthings'(Context Aware Network for the Design of Connected Things) service modeling based on Timed CPN,” in Semantic Computing (ICSC</article-title>
          ),
          <source>2015 IEEE Int. Conf. on, 2015</source>
          , pp.
          <fpage>127</fpage>
          -
          <lpage>130</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>R.</given-names>
            <surname>Roman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhou</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Lopez</surname>
          </string-name>
          , “
          <article-title>On the features and challenges of security and privacy in distributed internet of things,” Comput</article-title>
          . Netw., vol.
          <volume>57</volume>
          , no.
          <issue>10</issue>
          , pp.
          <fpage>2266</fpage>
          -
          <lpage>2279</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J.</given-names>
            <surname>Beal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Pianini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Viroli</surname>
          </string-name>
          , “
          <article-title>Aggregate programming for the internet of things</article-title>
          ,” Computer, vol.
          <volume>48</volume>
          , no.
          <issue>9</issue>
          , pp.
          <fpage>22</fpage>
          -
          <lpage>30</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>G.</given-names>
            <surname>Fortino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rovella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Russo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Savaglio</surname>
          </string-name>
          , “
          <article-title>Towards Cyberphysical Digital Libraries: Integrating IoT Smart Objects into Digital Libraries,” in Management of Cyber Physical Objects in the Future Internet of Things</article-title>
          , Springer,
          <year>2016</year>
          , pp.
          <fpage>135</fpage>
          -
          <lpage>156</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Tian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Duan</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Zhou</surname>
          </string-name>
          , “
          <article-title>Model checking Petri nets with MSVL,” Inf</article-title>
          . Sci., vol.
          <volume>363</volume>
          , pp.
          <fpage>274</fpage>
          -
          <lpage>291</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>R.</given-names>
            <surname>Casadei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Pianini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Viroli</surname>
          </string-name>
          , “
          <article-title>Simulating large-scale aggregate MASs with alchemist</article-title>
          and scala,” in
          <source>Computer Science and Information Systems (FedCSIS)</source>
          ,
          <source>2016 Federated Conf. on, 2016</source>
          , pp.
          <fpage>1495</fpage>
          -
          <lpage>1504</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>