The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recommending similar-interest users’ groups in multimedia services is the problem of detecting for each registered user his/her membership to one interest-group of relevant consumers. The consumers in each interest-group share some relevant preferences which guarantee that the interest-group as a whole satisfies some desired properties of similarity. As a result, forming these interest-groups requires...
Semantic Web of Things is a new field combining Semantic Web and Internet of Things technologies to be surrounded by smart objects and applications connected to the Web. On one hand, one of the Linked Open Data applications, called DataHub aims at referencing datasets, on the other hand, the Linked Open Vocabularies (LOV) references more than 400 ontologies. However, we discovered that more than 200...
Ontology-based applications are becoming more and more popular and are usually domain-specific (e.g., eHealth or domotic). Designing ontologies and semantic-based applications manually is tedious and cumbersome for non-technical expert or semantic web beginners. Internet of Things (IoT) is a new field aiming to connect the physical world surrounded by devices such as sensors to the web to automatically...
Internet of Things (IoT) is becoming more and more popular. Increasingly, European projects (CityPulse, IoT.est, IoT-i and IERC), standard development organizations (ETSI M2M, oneM2M and W3C) and developers are involved in integrating Semantic Web technologies to Internet of Things. All of them design IoT application uses cases which are not necessarily interoperable with each other. The main innovative...
The paper advocates for applying Internet of Things (IoT) for personalized healthcare in smart homes. An IoT architecture is presented which enables such healthcare services. Continuous monitoring of physical parameters and processing of the medical data form the basis of smarter, connected and personalized healthcare. The core functionalities of the IoT architecture are exposed using RESTful web...
Internet of Things (IoT) applications are becoming more and more popular but not interoperable with each other. In this paper, we propose the Machine-to-Machine Measurement (M3) framework to: (1) build IoT applications, (2) assist users in interpreting sensor measurements, and (3) combine domains with each other. The M3 framework is based on semantic web technologies to explicitly describe the meaning...
This paper presents a user centric and cross-domain IoT application development framework for smart devices. The framework includes automatic discovery of M2M devices, provisioning of sensors and IoT domains, semantic reasoning on sensor data and actuation based on the suggestions. The framework integrates a lightweight version of the Machine-to-Machine Measurement framework and has been adapted for...
Recent challenges in Internet of Things (IoT) include — (i) providing interoperability among IoT data, (ii) interpreting data generated by IoT devices, and (iii) assisting developers in accomplishing these tasks. Current standard development organizations such as oneM2M are designing semantic-based IoT architecture to address such challenges. However, the recent release of oneM2M standards does not...
Semantics is becoming a requirement in Internet of Things (IoT). Recent works underline future challenges for IoT: (1) integrate semantic web technologies, (2) provide interoperability, (3) interpret IoT data, (4) ease the development of IoT applications, and (5) fit to the different requirements of people and applications. In this paper, we design a semantic engine to meet these requirements and...
Domain-specific Internet of Things (IoT) applications are becoming more and more popular. Each of these applications uses their own technologies and terms to describe sensors and their measurements. This is a difficult task to help users build generic IoT applications to combine several domains. To explicitly describe sensor measurements in uniform way, we propose to enrich them with semantic web...
Securing the Internet of Things, more precisely, the ETSI Machine to Machine (M2M) architecture is a difficult task, since there is a need to secure heterogeneous wireless communications (cellular, wireless, wired), devices (sensor or mobile phone) and applications (programming language, framework, database). In this article, we present the state of the art concerning the security ontologies in various...
The number of mobile devices connected to the Internet is rapidly growing, inducing security issues that cannot be prevented by common mechanisms such as HTTPS. Indeed, mobile environments require light algorithms that can reduce the power-consumption and extend battery life. Moreover, HTTPS does not offer fine-grained control over the security properties such as integrity, confidentiality or authenticity...
The Internet of Things, more specifically, the Machine-to-Machine (M2M) standard enables machines and devices such as sensors to communicate with each other without human intervention. The M2M devices provide a great deal of M2M data, mainly used for specific M2M applications such as weather forecasting, healthcare or building automation. Existing applications are domain-specific and use their own...
Mobile Cloud Computing is a new concept, which offers Cloud resources and services for mobile devices. It also brings several advantages to mobile devices and to the applications developed for them. However, it increases the security risks and privacy invasion due to the fact that it combines mobile devices with Cloud services and because there is not a well-defined application model. The security...
Cloud computing is a new paradigm providing software and hardware resources according to the customers' needs. However, it introduces new security risks such as confidentiality of data stored in cloud databases. Actually, this last risk is a crucial issue that must be addressed as ciphering mechanisms are not sufficient to guarantee a strong confidentiality of data. In this paper, we discuss the main...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.