A Systematic Exploration on Challenges and Limitations in Middleware Programming for IoT Technology

Author:

Taveras Pedro1

Affiliation:

1. Pontificia Universidad Catolica Madre y Maestra, Santo Domingo, Dominican Republic

Abstract

In a distributed environment, such as IoT, the requirement for constant sensing and actuating from a diverse source of devices increases the complexity and therefore, the operational cost of the software required to keep the system running. The article covers the conceptual and technological aspects, together with a series of previous experiences, findings, and literature that constitute the essence of the body of knowledge related to the issues and challenges for developing a middleware that supports the IoT domain's independent functionality. The article provides the foundation to understand the challenges faced in the development of IoT middleware, focusing on five sensitizing elements, namely, IoT evolution, architecture, security, middleware, and programming. The systematic exploration on limitations for IoT software development revealed the need for programming methods and language abstractions to cope with the demands of IoT scenarios, specifically to deal with the challenges of massive communications, limited infrastructure, and multiplicity of devices.

Publisher

IGI Global

Reference86 articles.

1. Ahamed, J., & Rajan, A. V. (2016, December 6–8). Internet of Things (IoT): Application systems and security vulnerabilities. Paper presented at the 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), United Arab Emirates.

2. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

3. Thing theory: Connecting humans to location-aware smart environments.;A.Applin;IUI Workshop on Location Awareness for Mixed and Dual Reality (LAMDa),2013

4. Asthon, K. (2009). That 'Internet of Things' thing in the real world, things matter more than ideas. RFID Journal. Retrieved from http://www.rfidjournal.com/articles/view?4986

5. Enforcing security, safety and privacy for the Internet of Things

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Blockchain and IoT: A Proposed Security Framework;Advances in Intelligent Systems and Computing;2020

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3