<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Castiglione della Pescaia, Italy, May</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>An IoT Model for Coping with Trade-o s in Designing Smart Environments</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Fabio Cassano</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Antonio Piccinno</string-name>
          <email>antonio.piccinnog@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Dipartimento di Informatica, Universita di Bari Aldo Moro</institution>
          ,
          <addr-line>Bari</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <volume>29</volume>
      <issue>2018</issue>
      <fpage>80</fpage>
      <lpage>88</lpage>
      <abstract>
        <p>The Internet of Things (IoT) world is composed by a huge number of di erent so called \smart devices" and every year new and di erent models are released on the mass market. Most of those devices are intended to be used by professional people or by companies. Thanks to the constant growth of the \smart objects", end users and people with low or no-knowledge of the IT-world get in touch with these pieces of technology. Those people are expected to use the smart devices \out of the box" and in a very simple and easy way so, the human-device interaction needs to be as easiest as possible. Despite of this need, end users are commonly faced with thousand of di erent technological standards which are hard to evaluate without a solid IT background. Thus, the comparison to understand which IoT device performs better in a particular situation become complicated. In this paper we propose a comparison of two di erent IoT solutions using an IoT model. The model assesses the di erent technical speci cations of the devices and then extracts a \score" for each technological aspect. The end user can use the score to better understand the points of strength and the weaknesses of the devices.</p>
      </abstract>
      <kwd-group>
        <kwd>IoT</kwd>
        <kwd>Smart Device</kwd>
        <kwd>IoT model</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The mass market o ers to expert and non-expert users thousands of di erent
Internet of Things devices. Those devices are generally composed by sensors,
electronics boards and antennas that allows them to communicate with the \outside"
world. Due to the enormous number of combinations of those three components,
the number of the available devices gets higher and higher. Hardware,
programming, security, protocols etc. are terms that often are not clear to the end user
that has to face the choice among multiple IoT devices. Indeed, the complexity
of the choice increases when multiple objects can be used in multiple application
contexts. Often, speci c devices that are built to work in certain domains, thanks
to their characteristics, can be also used in more and di erent contexts. For
example, a temperature monitoring device for the home environment can be also
used in a pharmacy store to check and control the temperature of the medicine
room, using a \sink" node to transmit the data over the Internet. To correctly
con gure an ecosystem made by multiple di erent devices, end users need to
understand most of the device's characteristics [
        <xref ref-type="bibr" rid="ref15 ref3">3,15</xref>
        ]. This is not an easy task even
for experienced people, due to the high number of di erent technical variables
that need to be considered during this process. Thus, nding the right \trade
o " between the technological aspect of the ecosystem and the di erent devices
may be long and challenging. In literature, examples of comparing physical
devices that require skills in selecting the right devices, preparing the environment
settings, selecting users, identifying the tasks, etc. are reported [
        <xref ref-type="bibr" rid="ref2 ref3">2,3</xref>
        ].
      </p>
      <p>In this paper we rst propose a model to assess smart devices in order to give
a way to assess the suitability of a speci c smart device to a certain application
domain. Each device characteristic can be assessed and compared in order to
choose the one that best satis es the end user needs. We also report a rst
validation of the model by comparing two di erent smart devices.
2</p>
    </sec>
    <sec id="sec-2">
      <title>The IoT Device Model</title>
      <p>
        The proposed model has been developed by analyzing the characteristics of a
number of di erent devices. It is shaped as a star diagram (Figure 1). A rst
version has been proposed in [
        <xref ref-type="bibr" rid="ref12 ref14">14,12</xref>
        ]. The model is composed by four \macro"
elements each describing a speci c technological perspective of the device:
Communication, Target, Data Manipulation and Development.
      </p>
      <p>The rst one represents the device communication element and concerns how
the data are transmitted by the device. The \Target" element considers the
context of use of the device, and it is associated to the device hardware
implementation. The \Data Manipulation" element covers all the characteristics related
to the data generated and managed by the device. Finally, the \Development"
element analyses the programming characteristics of the device. \Target" and
\Development" are detailed with a group of more sub-elements that help the
assessment of the device.
2.1</p>
      <sec id="sec-2-1">
        <title>Communication</title>
        <p>The Communication element represents how the communication between the
device and the external world occurs. It analyses the technical aspect of many
device's characteristics, such as: the Security, the communication Protocol, and
the Destination of the communication.</p>
        <p>
          The Cryptography is an aspect related to the security of the communication.
Cypher data allow them to be sent and received over the net, keeping the content
safe from unauthorized users [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. For example the elliptic cryptography is always
preferred to a dictionary-based one, as reported in [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ].
        </p>
        <p>The Protocol is related to the application protocol in the communication.
All the application protocols generate some overhead in the communication, as
they add more \control" information to be sure that the data reach the receiver
uncorrupted. To receive a good assessment in this element, a low-overhead
protocol must be used. For example, COAP (COnstrained Application Protocol) is
81</p>
        <p>Firmware /
Low level design</p>
        <p>Professional</p>
        <p>Developer
Cryptography
Destination
Protocol</p>
        <p>Communication</p>
        <p>API
Domain</p>
        <p>Experts
Development</p>
        <p>IoT
device
Target</p>
        <p>User
Engagement
Functionatlities</p>
        <p>addition
Customization</p>
        <p>End Users</p>
        <p>Data</p>
        <p>Manipulation
Personal</p>
        <p>Professional</p>
        <p>Mixed
Hardware Communication type</p>
        <p>Microcontroller</p>
        <p>Cost
Size</p>
        <p>Standard
Compliant</p>
        <p>Accuracy
Remote</p>
        <p>
          Application
preferred to HTTP (Hyper Text Transfer Protocol) since it generates a very low
overhead [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ].
        </p>
        <p>The Destination is related to \where" the data are sent. This is a critical
aspect as it makes the di erence in an IoT ecosystem when multiple similar
device communicate each other at the same time. Sending the data directly to
a remote server may generate excessive tra c and interference on the network,
thus it is important that a coordination (such as the usage of a sink node) is
present.
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>Target</title>
        <p>
          The Target element represents the main usage of the device and is related to
the hardware characteristics of the device. We have classi ed the Target use in
three main area, according its use and/or deploy: Personal, Professional and
Mixed. All those aspects consider, in the assessment process, the hardware
characteristics, including the physical communication type. As a general guideline
for the assessment process, an hardware that uses low energy to work, supports
a communication type IoT-compliant (low transfer rate and low power) and is
usually exploited in multiple contexts, performs better than the others [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ].
        </p>
        <p>The Personal element considers some technological and commercial aspects
of the device such as the cost and the size, two valuable aspects in the
assessment process. The Mixed element considers the cost and the possibility to use
a remote application combined to the device. The Professional element assesses
the accuracy of the sensor used on the device and its \IoT standard compliant".</p>
        <p>Each of the above elements of the target perspective, share one more
subelement: Hardware communication type, Microcontroller, Cost, Accuracy, Size,
Remote Application and Standard compliant. While Hardware communication
type sub-element refers to the low-level technology used by the device to
communicate, the Microcontroller assesses the type of the hardware used. The device
cost is particularly important for personal and mixed usages, while for
professionals, the accuracy in its measures should be considered. Personal devices should
be small in size in order to t everywhere, while for a mixed usage, the possibility
to have a remote application is an important factor. Finally, for professionals it
is imperative to use standard-compliant devices.
2.3</p>
      </sec>
      <sec id="sec-2-3">
        <title>Data Manipulation</title>
        <p>
          The Data Manipulation element is related to the data, from the Data Collection
and Data Transformation, to the Visualization involving also the Data Privacy.
This part is critical as it is the connection between the device low level sensor
and the \outside world" represented by mobile applications, servers, services etc.
[
          <xref ref-type="bibr" rid="ref5">5</xref>
          ].
        </p>
        <p>
          The Data Collection is an important aspect related to how the data are
temporary stored into the device. There are two di erent approaches to this
aspect: the bu ering (which is the temporary store of multiple data instances)
83
or the \immediate send", which involve the transmission of the data as soon as
it has been produced. The rst one is less energy consuming [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ].
        </p>
        <p>The Data Transformation involves the conversion or the enrichment of the
data. These kind of operations are supposed to be made on an external server
rather than on the device itself.</p>
        <p>
          The Data Visualization analyses the aspect of the representation of
information on the device. To save energy, the device should not show anything on
it, but it should send the data to a remote service. An example of visualization
available on a web server is CBP, that shows home energy consumption detected
by IoT devices [
          <xref ref-type="bibr" rid="ref6 ref7">6,7</xref>
          ]. CBP was also used to show collaboration among distributed
team member that can be detected by IoT devices or software [
          <xref ref-type="bibr" rid="ref8 ref9">8,9</xref>
          ].
        </p>
        <p>
          The aspect of the Data Privacy is related to the type of the data collected
by the device [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. Data integrity (the assurance of accuracy and consistency of
the data) and privacy level of the people using the device are two of the most
critical aspects in this element.
2.4
        </p>
      </sec>
      <sec id="sec-2-4">
        <title>Development</title>
        <p>The Development element involves the possibility of the device to be programmed
by people. It has three target users: the Professional Developers, Domain Expert
and End Users.</p>
        <p>
          Professional Developers are computer-literate people that are familiar with
programming languages, low-level programming and model driven testing [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ].
They can read and understand the project speci cations and they are able to
modify it according to their needs.
        </p>
        <p>Domain expert users are people familiar with the IT world. They know how
to program, thus they can use the API to develop a small piece of software that
is able to perform the required need.</p>
        <p>
          End users are not familiar with the computer or (in general) with the
technology. They are not able to program, thus they need to be supported by possibly
visual paradigms (such as ATOOMA, IFTTT, Tasker or EFESTO)[
          <xref ref-type="bibr" rid="ref10 ref16">16,10</xref>
          ]. They
may also have the need to collaborate each other to reach together a shared
result [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ].
        </p>
        <p>
          This element has multiple sub-elements: Firmware/Low level design, API,
Customization, Functionalities addition and User engagement. The former
belongs to the world of Professional Developers: as their ability to program with
low level languages, the source of the project and the possibility to edit the
\core" of the system is essential. Domain experts, can use the API to program
their solution to their own needs. End Users need to Customize and add or
remove some functionalities on their own. The user engagement is important as
well [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
3
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Discussion</title>
      <p>The aim of this model is to give users a way to assess one or more di erent IoT
devices. By the assessment the end user can detect the right trade o between
84</p>
      <sec id="sec-3-1">
        <title>Communication</title>
      </sec>
      <sec id="sec-3-2">
        <title>Target Data Manipulation Development</title>
        <p>
          all the characteristics of the devices and chose which one suits better to his/her
needs. The domain experts take advantage of the model by having under control
all the devices characteristics at a glance, even if they are not technical experts.
This is an evolution of the work of presented in [
          <xref ref-type="bibr" rid="ref12 ref13 ref14">13,14,12</xref>
          ].
        </p>
        <p>In this section we propose a comparison between two devices: the Sono SC
ambient analyzer and an home-made air and light analyzer. The rst one is an
all-in-one device, which has all the required components inside the plastic case.
It has an external power supply (an USB power plug) and a slot for a memory
card to store all the data collected by the sensors.</p>
        <p>The home-made air and light analyzer is composed by two parts: a
Raspberry PI 3 and an Arduino board with many sensors (such as humidity, CO2,
light sensors) connected to it. The communication between the Raspberry and
the Arduino uses the Bluetooth 4 technology. The Raspberry can formally be
connected with other Arduino boards and act as an external \sink", where all
the data get collected and then sent to the external web server.</p>
        <p>To assess all the device characteristics, we propose a score (s) from 0 to n
(with n &gt; 0) to assess the elements and the (optional) sub-elements of the model
as follows:
{ s = 0: the characteristic is not supported by the device;
{ [0 &lt; s &lt; n]: the device partially supports the characteristic (e.g.: it adopts
a technology, but a new and more performing technology is available);
{ s = n: the device fully supports the characteristic in terms of both
functionalities and recent technology.</p>
        <p>In this assessment, for the sake of simplicity, we set n = 2.</p>
        <p>Table 1 shows the assessment for the Sono SC ambient analyzer, while
Table shows 2 the assessment of the home-made air and light analyzer has been
shown. For the sake of simplicity, each element and sub-element has been named
according to a \level", which is the distance from the center of the star. At
a rst sight, the two devices are very similar in terms of performances, price
and technology. Both of them can be used in a personal and semi-professional
environmental setting.</p>
        <p>The assessment of the Communication element is similar. The home-made
device, supporting the sink node, performs slightly better than the Sono and the
assessment of the Target element is almost the same as the previous one. Thanks
to the Bluetooth 4 technology, the home-made device has a better assessment
than the Sono .</p>
        <p>The Data Manipulation is performed better by the Sono device, thanks to
the possibility to bu erize the data and the absence of any LED or display that
shows the data sent. Similarly, the Sono device allows a little bit of
personalization of the behavior of the IoT device: thanks to the graphical programming
application, it is possible to de ne rules and send alerts to the users, if needed.</p>
        <p>The overall results from the assessment of those two devices shows that they
are almost equivalent in all the elds. The home-made device is more industry
oriented, while the Sono is better to be used in an home environment. They
86
resides in the End Users element because the Sono SC device gives users the
possibility to program alerts and functionalities.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusion and Future Works</title>
      <p>In this paper we have presented a model to support the assessment of a smart
devices according to di erent dimensions. The model, has four \macro" elements:
Communication, Target, Data Manipulation and Development. Each of them is
then further speci ed. By ranking (using a discrete scale) each element, it is
possible to get an overall assessment of a given IoT device. Its suitability for a
speci c domain is then evaluated comparing its assessed characteristics to the
domain needs. We provided an example that assesses and compares two similar
IoT devices that can be used at home.</p>
      <p>In order to formally evaluate the model we are currently planning a test
study with speech-therapist physicians and IoT devices.</p>
      <p>87</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Carmelo</given-names>
            <surname>Ardito</surname>
          </string-name>
          , Barbara Rita Barricelli, Paolo Buono, Maria Francesca Costabile, Antonio Piccinno, Stefano Valtolina,
          <string-name>
            <given-names>and Li</given-names>
            <surname>Zhu</surname>
          </string-name>
          .
          <article-title>Visual mediation mechanisms for collaborative design and development</article-title>
          .
          <source>In International Conference on Universal Access in Human-Computer Interaction</source>
          , pages
          <fpage>3</fpage>
          <lpage>{</lpage>
          11. Springer,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Carmelo</given-names>
            <surname>Ardito</surname>
          </string-name>
          , Paolo Buono, Maria Francesca Costabile, Rosa Lanzilotti, and Adalberto Lafcadio Simeone.
          <article-title>Comparing low cost input devices for interacting with 3d virtual environments</article-title>
          .
          <source>In Human System Interactions</source>
          ,
          <year>2009</year>
          . HSI'
          <volume>09</volume>
          . 2nd Conference on, pages
          <volume>292</volume>
          {
          <fpage>297</fpage>
          . IEEE,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Barbara</given-names>
            <surname>Rita</surname>
          </string-name>
          Barricelli and
          <string-name>
            <given-names>Stefano</given-names>
            <surname>Valtolina</surname>
          </string-name>
          .
          <article-title>Designing for end-user development in the internet of things</article-title>
          .
          <source>In International Symposium on End User Development</source>
          , pages
          <fpage>9</fpage>
          <lpage>{</lpage>
          24. Springer,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Andrea</given-names>
            <surname>Bartoli</surname>
          </string-name>
          , Mischa Dohler, Juan Hernandez-Serrano,
          <string-name>
            <given-names>Apostolos</given-names>
            <surname>Kountouris</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Dominique</given-names>
            <surname>Barthel</surname>
          </string-name>
          .
          <article-title>Low-power low-rate goes long-range: The case for secure and cooperative machine-to-machine communications</article-title>
          .
          <source>In International Conference on Research in Networking</source>
          , pages
          <volume>219</volume>
          {
          <fpage>230</fpage>
          . Springer,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Alessando</given-names>
            <surname>Bianchi</surname>
          </string-name>
          , Danilo Caivano, and
          <string-name>
            <given-names>Giuseppe</given-names>
            <surname>Visaggio</surname>
          </string-name>
          .
          <article-title>Method and process for iterative reengineering of data in a legacy system</article-title>
          .
          <source>In In Proceedings of Working Conference on Reverse Engineering</source>
          , pages
          <volume>86</volume>
          {
          <fpage>96</fpage>
          . IEEE,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Paolo</given-names>
            <surname>Buono</surname>
          </string-name>
          .
          <article-title>A low cost system for home energy consumption awareness</article-title>
          . In AmI (Workshops/Posters),
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Paolo</given-names>
            <surname>Buono</surname>
          </string-name>
          .
          <article-title>A circular visualization technique for collaboration and quantifying self</article-title>
          .
          <source>In Proceedings of the International Working Conference on Advanced Visual Interfaces</source>
          , pages
          <volume>348</volume>
          {
          <fpage>349</fpage>
          . ACM,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Paolo</given-names>
            <surname>Buono</surname>
          </string-name>
          , Maria Francesca Costabile, and
          <string-name>
            <given-names>Rosa</given-names>
            <surname>Lanzilotti</surname>
          </string-name>
          .
          <article-title>A circular visualization of people s activities in distributed teams</article-title>
          .
          <source>Journal of Visual Languages &amp; Computing</source>
          ,
          <volume>25</volume>
          (
          <issue>6</issue>
          ):
          <volume>903</volume>
          {
          <fpage>911</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>Paolo</given-names>
            <surname>Buono</surname>
          </string-name>
          and
          <string-name>
            <given-names>Giuseppe</given-names>
            <surname>Desolda</surname>
          </string-name>
          .
          <article-title>Visualizing collaborative traces in distributed teams</article-title>
          .
          <source>In Proceedings of the 2014 International Working Conference on Advanced Visual Interfaces</source>
          , pages
          <volume>343</volume>
          {
          <fpage>344</fpage>
          . ACM,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Federico</surname>
            <given-names>Cabitza</given-names>
          </string-name>
          , Daniela Fogli, Rosa Lanzilotti, and Antonio Piccinno.
          <article-title>Rulebased tools for the con guration of ambient intelligence systems: a comparative user study</article-title>
          .
          <source>Multimedia Tools and Applications</source>
          ,
          <volume>76</volume>
          (
          <issue>4</issue>
          ):
          <volume>5221</volume>
          {
          <fpage>5241</fpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Danilo</surname>
            <given-names>Caivano</given-names>
          </string-name>
          , Fabio Cassano, Daniela Fogli, Rosa Lanzilotti, and Antonio Piccinno.
          <article-title>We@ home: A gami ed application for collaboratively managing a smart home</article-title>
          .
          <source>In International Symposium on Ambient Intelligence</source>
          , pages
          <fpage>79</fpage>
          {
          <fpage>86</fpage>
          . Springer,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Danilo</surname>
            <given-names>Caivano</given-names>
          </string-name>
          , Fabio Cassano, Rosa Lanzillotti, and Antonio Piccinno.
          <article-title>Towards an iot model for the assessment of smart devices</article-title>
          .
          <source>In Advanced Visual Interface (Workshops/Posters)</source>
          . Springer, In print.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Danilo</surname>
            <given-names>Caivano</given-names>
          </string-name>
          , Fabio Cassano, and Antonio Piccinno.
          <article-title>Eud4sh: A eud model for the smart home</article-title>
          .
          <source>In International Symposium on Ambient Intelligence</source>
          . Springer, In print.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Danilo</surname>
            <given-names>Caivano</given-names>
          </string-name>
          , Fabio Cassano, and Antonio Piccinno.
          <article-title>Wip: a model for assessing iot devices</article-title>
          .
          <source>In 4th International Conference on Smart Computing</source>
          . Springer, In print.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Danilo</surname>
            <given-names>Caivano</given-names>
          </string-name>
          , Daniela Fogli, Rosa Lanzilotti, Antonio Piccinno, and
          <string-name>
            <given-names>Fabio</given-names>
            <surname>Cassano</surname>
          </string-name>
          .
          <article-title>Supporting end users to control their smart home: design implications from a literature review and an empirical investigation</article-title>
          .
          <source>Journal of System and Software</source>
          , In print.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Giuseppe</surname>
            <given-names>Desolda</given-names>
          </string-name>
          , Carmelo Ardito, and
          <string-name>
            <given-names>Maristella</given-names>
            <surname>Matera</surname>
          </string-name>
          .
          <article-title>Efesto: a platform for the end-user development of interactive workspaces for data exploration</article-title>
          .
          <source>In Rapid Mashup Development Tools</source>
          , pages
          <volume>63</volume>
          {
          <fpage>81</fpage>
          . Springer,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Wenbo</surname>
            <given-names>He</given-names>
          </string-name>
          , Xue Liu, Hoang Nguyen, Klara Nahrstedt, and
          <string-name>
            <given-names>Tarek</given-names>
            <surname>Abdelzaher</surname>
          </string-name>
          . Pda:
          <article-title>Privacy-preserving data aggregation in wireless sensor networks</article-title>
          .
          <source>In INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE</source>
          , pages
          <year>2045</year>
          {
          <year>2053</year>
          . IEEE,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Vivek</surname>
            <given-names>Kapoor</given-names>
          </string-name>
          , Vivek Sonny Abraham, and
          <string-name>
            <given-names>Ramesh</given-names>
            <surname>Singh</surname>
          </string-name>
          .
          <article-title>Elliptic curve cryptography</article-title>
          .
          <source>Ubiquity</source>
          ,
          <year>2008</year>
          (May):
          <fpage>7</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <given-names>Joongheon</given-names>
            <surname>Kim</surname>
          </string-name>
          .
          <article-title>Energy-e cient dynamic packet downloading for medical iot platforms</article-title>
          .
          <source>IEEE Transactions on Industrial Informatics</source>
          ,
          <volume>11</volume>
          (
          <issue>6</issue>
          ):
          <volume>1653</volume>
          {
          <fpage>1659</fpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20. Beatriz Perez Lamancha, Macario Polo, Danilo Caivano, Mario Piattini, and
          <string-name>
            <given-names>Giuseppe</given-names>
            <surname>Visaggio</surname>
          </string-name>
          .
          <article-title>Automated generation of test oracles using a model-driven approach</article-title>
          .
          <source>Information and Software Technology</source>
          ,
          <volume>55</volume>
          (
          <issue>2</issue>
          ):
          <volume>301</volume>
          {
          <fpage>319</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21. Tapio Leva,
          <string-name>
            <given-names>Oleksiy</given-names>
            <surname>Mazhelis</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Henna</given-names>
            <surname>Suomi</surname>
          </string-name>
          .
          <article-title>Comparing the cost-e ciency of coap and http in web of things applications</article-title>
          .
          <source>Decision Support Systems</source>
          ,
          <volume>63</volume>
          :
          <fpage>23</fpage>
          {
          <fpage>38</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>Kai</given-names>
            <surname>Zhao</surname>
          </string-name>
          and
          <string-name>
            <given-names>Lina</given-names>
            <surname>Ge</surname>
          </string-name>
          .
          <article-title>A survey on the internet of things security</article-title>
          .
          <source>In Computational Intelligence and Security (CIS)</source>
          ,
          <year>2013</year>
          9th International Conference on, pages
          <volume>663</volume>
          {
          <fpage>667</fpage>
          . IEEE,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>