scispace - formally typeset
Search or ask a question

Showing papers on "Internet appliance published in 2014"


Journal ArticleDOI
TL;DR: A survey of the core functionalities of Information-Centric Networking (ICN) architectures to identify the key weaknesses of ICN proposals and to outline the main unresolved research challenges in this area of networking research.
Abstract: The current Internet architecture was founded upon a host-centric communication model, which was appropriate for coping with the needs of the early Internet users. Internet usage has evolved however, with most users mainly interested in accessing (vast amounts of) information, irrespective of its physical location. This paradigm shift in the usage model of the Internet, along with the pressing needs for, among others, better security and mobility support, has led researchers into considering a radical change to the Internet architecture. In this direction, we have witnessed many research efforts investigating Information-Centric Networking (ICN) as a foundation upon which the Future Internet can be built. Our main aims in this survey are: (a) to identify the core functionalities of ICN architectures, (b) to describe the key ICN proposals in a tutorial manner, highlighting the similarities and differences among them with respect to those core functionalities, and (c) to identify the key weaknesses of ICN proposals and to outline the main unresolved research challenges in this area of networking research.

1,408 citations


Journal ArticleDOI
TL;DR: This article presents the work being done in 6TiSCH, a newly-formed working group in the Internet Engineering Task Force, which is standardizing the mechanisms making the Industrial Internet of Things a reality.
Abstract: Industrial and IP-enabled low-power wireless networking technologies are converging, resulting in the Industrial Internet of Things. On the one hand, low-power wireless solutions are available today that answer the strict reliability and power consumption requirements of industrial applications. These solutions are based on Time- Synchronized Channel Hopping, a medium access control technique at the heart of industrial standards such as the WirelessHART and ISA100.11a, and layer 1 and 2 standards such as IEEE802.15.4e. On the other hand, a range of standards have been published to allow low-power wireless devices to communicate using the Internet Protocol (IP), thereby becoming true “fingers of the Internet,” and greatly simplifying their integration into existing networks. This article acknowledges the standardization effort to combine those capabilities. The networks resulting from this convergence exhibit reliability and power consumption performances compatible with demanding industrial applications, while being easy to integrate, and following the end-to-end paradigm of today's Internet. In particular, this article presents the work being done in 6TiSCH, a newly-formed working group in the Internet Engineering Task Force, which is standardizing the mechanisms making the Industrial Internet of Things a reality.

258 citations


Journal ArticleDOI
TL;DR: This article presents a detailed analysis on how malware has evolved over the last years for the most popular platforms and surveys, classify and discusses efforts made on detecting both malware and other suspicious software (grayware) between 2010 and 2013.
Abstract: Smart devices equipped with powerful sensing, computing and networking capabilities have proliferated lately, ranging from popular smartphones and tablets to Internet appliances, smart TVs, and others that will soon appear (e.g., watches, glasses, and clothes). One key feature of such devices is their ability to incorporate third-party apps from a variety of markets. This poses strong security and privacy issues to users and infrastructure operators, particularly through software of malicious (or dubious) nature that can easily get access to the services provided by the device and collect sensory data and personal information. Malware in current smart devices —mostly smartphones and tablets— have rocketed in the last few years, in some cases supported by sophisticated techniques purposely designed to overcome security architectures currently in use by such devices. Even though important advances have been made on malware detection in traditional personal computers during the last decades, adopting and adapting those techniques to smart devices is a challenging problem. For example, power consumption is one major constraint that makes unaffordable to run traditional detection engines on the device, while externalized (i.e., cloud-based) techniques rise many privacy concerns. This article examines the problem of malware in smart devices and recent progress made in detection techniques. We first present a detailed analysis on how malware has evolved over the last years for the most popular platforms. We identify exhibited behaviors, pursued goals, infection and distribution strategies, etc. and provide numerous examples through case studies of the most relevant specimens. We next survey, classify and discuss efforts made on detecting both malware and other suspicious software (grayware), concentrating on the 20 most relevant techniques proposed between 2010 and 2013. Based on the conclusions extracted from this study, we finally provide constructive discussion on open research problems and areas where we believe that more work is needed.

245 citations


Journal Article
TL;DR: The Internet has revolutionized the way information is shared and accessed since the rise of modern search engines, social networks and ubiquitous access through devices such as smartphones and tablet or laptop computers.
Abstract: The Internet has revolutionized the way information is shared and accessed. Information retrieval is easier now than ever before. Since the rise of modern search engines, social networks, and ubiquitous access through devices such as smartphones and tablet or laptop computers, information is

227 citations


Book
16 Apr 2014
TL;DR: This Book will specifically focus on exploring recent advances in architectures, algorithms, and applications for an Internet of Things based on Smart Objects.

176 citations


Proceedings ArticleDOI
06 Mar 2014
TL;DR: This work explores the exploitation of the Domain Name System (DNS) as a scalable and ubiquitous directory mechanism for embedded devices and performs a simulation involving up to one million embedded devices, to test system performance and scalability.
Abstract: Sensor technology is becoming pervasive in our everyday lives, measuring the real world around us. The Internet of Things enables sensor devices to become active citizens of the Internet, while the Web of Things envisions interoperability between these devices and their services. An important problem remains the need for discovering these devices and services globally, ad hoc in real-time, within acceptable time delays. Attempting to solve this problem using the existing Internet infrastructure, we explore the exploitation of the Domain Name System (DNS) as a scalable and ubiquitous directory mechanism for embedded devices. We examine the feasibility of this approach by performing a simulation involving up to one million embedded devices, to test system performance and scalability. Finally, we discuss practical issues and the overall potential of this approach.

168 citations


Proceedings ArticleDOI
01 Nov 2014
TL;DR: This paper aims in structuring a state of the art review on IoT, where the technology, history and applications have been discussed briefly along with various statistics.
Abstract: Internet and its applications have become an integral part of today's human lifestyle It has become an essential tool in every aspect Due to the tremendous demand and necessity, researchers went beyond connecting just computers into the web These researches led to the birth of a sensational gizmo, Internet of Things (IoT) Communication over the internet has grown from user — user interaction to device — device interactions these days The IoT concepts were proposed years back but still it's in the initial stage of commercial deployment Home automation industry and transportation industries are seeing rapid growth with IoT Yet not many articles have been published in this field of study This paper aims in structuring a state of the art review on IoT The technology, history and applications have been discussed briefly along with various statistics

155 citations


Journal ArticleDOI
TL;DR: A critical comparative analysis of mobile versus personal computer (PC)-based forms of Internet access illustrates a wide range of ways in which mobile Internet access offers lower levels of functionality and content availability; operates on less open and flexible platforms; and contributes to diminished levels of user engagement, content creation, and information seeking.
Abstract: This article provides a critical comparative analysis of mobile versus personal computer (PC)-based forms of Internet access. Drawing from an interdisciplinary body of literature, it illustrates a wide range of ways in which mobile Internet access offers lower levels of functionality and content availability; operates on less open and flexible platforms; and contributes to diminished levels of user engagement, content creation, and information seeking. At a time when a growing proportion of the online population is “mobile only,” these disparities have created what is termed here a mobile Internet underclass. The implications of this argument for digital divide policymaking and, more broadly, for the evolutionary trajectory of the Internet and the dynamics of Internet usage are discussed.

147 citations


Proceedings ArticleDOI
24 Sep 2014
TL;DR: Evaluating some of the emerging vulnerabilities that exist and putting some figures to the scale of the threat shows an environment where even a small percentage of insecure devices may create significant vulnerabilities.
Abstract: The Internet of Things (IoT) continues to grow as uniquely identifiable objects are added to the internet. The addition of these devices, and their remote connectivity, has brought a new level of efficiency into our lives. However, the security of these devices has come into question. While many may be secure, the sheer number creates an environment where even a small percentage of insecure devices may create significant vulnerabilities. This paper evaluates some of the emerging vulnerabilities that exist and puts some figures to the scale of the threat.

118 citations


Journal ArticleDOI
TL;DR: This paper proposes a novel architecture for the future Internet based on information-centric networking (ICN), which is called DataClouds, to better accommodate data-centric services and shows that it could offer more efficient and flexible solutions than traditional ICN-based architectures.
Abstract: The Internet of Things (IoT) is emerging as one of the major trends for the next evolution of the Internet, where billions of physical objects or things (including but not limited to humans) will be connected over the Internet, and a vast amount of information data will be shared among them. However, the current Internet was built on a host-centric communication model, which was primarily designed for meeting the demand of pair-wise peer-to-peer communications and cannot well accommodate various advanced data-centric services boosted by the IoT in which users care about content and are oblivious to locations where the content is stored. In this paper, we propose a novel architecture for the future Internet based on information-centric networking (ICN), which is called DataClouds, to better accommodate data-centric services. Different from existing ICN-based architectures, we take the sharing nature of data-centric services under the IoT into consideration and introduce logically and physically formed communities as the basic building blocks to construct the network so that data could be more efficiently shared and disseminated among interested users. We also elaborate on several fundamental design challenges for the Internet under this new architecture and show that DataClouds could offer more efficient and flexible solutions than traditional ICN-based architectures.

74 citations


Journal ArticleDOI
TL;DR: Beyond that, perhaps, the Internet of Anything--a radically super-connected ecosystem where questions about security, trust, and control assume entirely new dimensions.
Abstract: Today, the Internet of Things. Tomorrow, the Internet of Everything. Beyond that, perhaps, the Internet of Anything--a radically super-connected ecosystem where questions about security, trust, and control assume entirely new dimensions.

01 Jan 2014
TL;DR: This book outlines the background and overall vision for the Internet of Things (IoT) and Machine-to-Machine (M2M) communications and services, including major standards, and describes everything from physical instrumentation of devices to the cloud infrastructures used to collect data.

Proceedings ArticleDOI
01 Jan 2014
TL;DR: This work adapts, extends, and bridges using IPv6 the existing IoT building blocks such as solutions from IEEE 802.15.4, BT-LE, RFID while maintaining backwards compatibility with legacy networked embedded systems from building and industrial automation.
Abstract: Emerging Internet of Things IoT/Machine-to-Machine M2M systems require a transparent access to information and services through a seamless integration into the Future Internet. This integration exploits infrastructure and services found on the Internet by the IoT. On the one hand, the so-called Web of Things aims for direct Web connectivity by pushing its technology down to devices and smart things. On the other hand, the current and Future Internet offer stable, scalable, extensive, and tested protocols for node and service discovery, mobility, security, and auto-configuration, which are also required for the IoT. In order to integrate the IoT into the Internet, this work adapts, extends, and bridges using IPv6 the existing IoT building blocks such as solutions from IEEE 802.15.4, BT-LE, RFID while maintaining backwards compatibility with legacy networked embedded systems from building and industrial automation. Specifically, this work presents an extended Internet stack with a set of adaptation layers from non-IP towards the IPv6-based network layer in order to enable homogeneous access for applications and services.

Journal ArticleDOI
TL;DR: Analysing opinions collected from medical students regarding old and new teaching methods and tools has become mandatory, with a view towards renovating the process of medical education.
Abstract: SummaryBackground The rapid and dramatic incursion of the Internet and social networks in everyday life has revolutionised the methods of exchanging data. Web 2.0 represents the evolution of the Internet as we know it. Internet users are no longer passive receivers, and actively participate in the delivery of information. Medical education cannot evade this process. Increasingly, students are using tablets and smartphones to instantly retrieve medical information on the web or are exchanging materials on their Facebook pages. Medical educators cannot ignore this continuing revolution, and therefore the traditional academic schedules and didactic schemes should be questioned. Analysing opinions collected from medical students regarding old and new teaching methods and tools has become mandatory, with a view towards renovating the process of medical education. Methods A cross-sectional online survey was created with Google® docs and administrated to all students of our medical school. Students were asked to express their opinion on their favourite teaching methods, learning tools, Internet websites and Internet delivery devices. Data analysis was performed using spss. Results The online survey was completed by 368 students. Although textbooks remain a cornerstone for training, students also identified Internet websites, multimedia non-online material, such as the Encyclopaedia on CD–ROM, and other non-online computer resources as being useful. Discussion The Internet represented an important aid to support students’ learning needs, but textbooks are still their resource of choice. Among the websites noted, Google and Wikipedia significantly surpassed the peer-reviewed medical databases, and access to the Internet was primarily through personal computers in preference to other Internet access devices, such as mobile phones and tablet computers. Increasingly, students are using tablets and smartphones to instantly retrieve medical information

Proceedings ArticleDOI
01 Oct 2014
TL;DR: This paper proposes an IoT architecture for disabled people and intends to identify and describe the most relevant IoT technologies and international standards for the stack of the proposed architecture.
Abstract: We are living in a new communication age, which will radically transform the way we live in our society. A world where anything will be connected to Internet is being created, generating an entirely new dynamic network - The Internet of Things (IoT) - enabling new means of communication between people, things and environment.

01 Jan 2014
TL;DR: This paper focuses the security issues for Internet of Things, where central entities acquire, process and provide information using centralized architecture.
Abstract: The Internet of Things (IoT) is becoming one of the milestones in the era of communication and networking which is going to determine future of IT. The Internet of Things (IoT) provides connection to users on anywhere, anything, anytime basis, which leads to concern subject of security and privacy. In Internet of Things services are provided using centralized architecture where central entities acquire, process and provide information. In this paper we have focused the security issues for Internet of Things.

Book
20 Oct 2014
TL;DR: In this article, the authors consider the lessons learnt so far from the emergence of the Internet and the development of the field of Internet studies, whilst also considering possible directions for the future.
Abstract: This book considers the lessons learnt so far from the emergence of the Internet and the development of the field of Internet studies, whilst also considering possible directions for the future. Examining broad media theories and emerging theorisations around the Internet specifically, it explores the possibility of the development of an Internet theory in the future. A comprehensive overview of the field, Internet Studies considers key issues of social importance that the study of the Internet draws upon, such as the role of the Internet in civic participation and democratisation, the development of virtual communities, digital divides and social inequality, as well as Internet governance and policy control. At the same time, it examines the role of the Internet in social research and the development of highly interdisciplinary and rapidly developing Internet research. Hence, this volume maps key areas of certainty and uncertainty in the field of Internet studies and, as such, it will be of interest to scholars and students of media and communication, sociology and social research methods.

Proceedings ArticleDOI
23 Jun 2014
TL;DR: A detailed analysis based on real Internet traffic captured on fixed (xDSL, FTTH) and mobile networks of Orange France and Telefónica operators is proposed and the relation between access technologies and traffic profiles is discussed.
Abstract: Network and service operators nowadays use probes located in their networks in order to improve their knowledge on traffic evolution. The limited set of managed services like IPTV enable the use of well controlled rules for network dimensioning but this is not the case for public Internet originated traffic. Due to the growing success of services delivered by Internet players, a close attention given to customers' usage is mandatory to make accurate forecasts in order to avoid future network congestion. The present paper proposes a detailed analysis based on real Internet traffic captured on fixed (xDSL, FTTH) and mobile networks of Orange France and Telefonica operators. Internet traffic profile (traffic evolution over the time) for fixed and mobile networks is described. The paper discusses the relation between access technologies and traffic profiles. Additionally, it clarifies how both fixed and mobile residential customers access Internet services. This provides insight on the applications generating the major part of the traffic (i.e. video streaming, peer-to-peer, file downloading, etc.) and on the proportion of traffic generated by the “heavy users”.

Book ChapterDOI
01 Sep 2014
TL;DR: This paper instantiate IoT to define a social network of vehicles, tNote, where vehicles can share transport related safety, efficiency, and comfort notes with each other, and defines the tNote message structure following the Dedicated Short Range Communication (DSRC) standard.
Abstract: The main vision of Internet of Things (IoT) is to equip real life physical objects with computing and communication power so that they can interact with each other for social good. As one of the important members of Internet of Things (IoT), vehicles have seen steep advancement in communication technology. In this paper we instantiate IoT to define a social network of vehicles, tNote, where vehicles can share transport related safety, efficiency, and comfort notes with each other. We leverage the infrastructure laid down by Vehicular Ad-Hoc Networks (VANETs) to propose an architecture for social network of vehicles in the paradigm of Social Internet of Things (SIoT). We have identified the social structures of vehicles, their relationship types, interactions and the components to manage the system. We also define the tNote message structure following the Dedicated Short Range Communication (DSRC) standard. The paper ends with prototype implementation details of the tNote message and the proposed system architecture along with experimental results.

Journal ArticleDOI
TL;DR: This article is anchored in longitudinal survey data on how Britons use the Internet, which illuminates the emergence of new patterns of accessing the Internet over multiple devices—some of which are portable—in everyday life and work.
Abstract: The Internet is central to the new media, but the Internet is itself a dynamic technology that is constantly evolving as users adopt and reject new features, devices and applications and use them in ways that are often unanticipated. This article is anchored in longitudinal survey data on how Britons use the Internet, which illuminates the emergence of new patterns of accessing the Internet over multiple devices—some of which are portable—in everyday life and work. We call those who adopt this new approach ‘next generation users’. In contrast, first generation users remain anchored to one or more personal computers in the household or workplace for accessing the Internet. The analysis shows how this emerging pattern of access is reshaping the use and impact of the Internet, such as in supporting the production of user generated content. The analysis also shows how next generation access is socially distributed; creating a new digital divide that reinforces socioeconomic inequalities. Future research needs to move beyond the study of access to the Internet to track the diffusion of next generation access and its implications across a wider array of nations.

Proceedings ArticleDOI
17 Oct 2014
TL;DR: This keynote is presenting the advantages of the extension of wearable devices with Internet capabilities for a wide range of use-cases covering from experiences in solutions for marketing inevents/exhibitions, entertainment in shopping centres, tourism in Smart cities developed, and emergencies in Smart Countries.
Abstract: The proposed extension of the Internet of Things to Wearable Computing is making feasible thedevelopment of a new generation of Wearable devices connected to Internet. It is what I havedenominated "Wearable Internet".The Wearable Internet is the powering of personal devices with the Internet of Things capabilities. Thisextension can be found in the new generation of wearable sensors such as electrocardiograms, cadenceand speed sensors, activity monitors such as HOP Extended from HOP Ubiquitous (www.hopu.eu), etc.These sensors enabled with Internet are able to detect events and anomalies for daily activities, as theaccelerometers in a car are able to detect a crash. Therefore, the connectivity to Internet and CloudComputing platforms are providing a great potential of innovative solutions, where the sensors can gobeyond their sense capabilities to enable a data-enabled analysis that can reach actuation and optimizationin a wide-range of use-cases and scenarios.In details, this keynote presents the key evolutions of technologies for wireless communications such asBluetooth Low Energy (Bluetooth Smart) to be enabled with Internet connectivity (IPv6) throughprotocols such as 6LoWPAN and GLoWBAL IPv6.GLoWBAL IPv6 protocol is presented in details, demonstrating the performance of IPv6 and CoAPintegration over Bluetooth Smart, with the embedded stack and optimized protocol for constraineddevices that we have developed during the last years.This keynote is also presenting the advantages of the extension of wearable devices with Internetcapabilities for a wide range of use-cases covering from experiences in solutions for marketing inevents/exhibitions, entertainment in shopping centres, tourism in Smart cities developed, and emergenciesin Smart Countries.

Proceedings ArticleDOI
01 Dec 2014
TL;DR: The goal is to allow a technician to access an appliance that is not reachable from the Internet, using IdM and without creating a single compromising point in the gateway that links the two contexts, to reach integration between both contexts.
Abstract: Internet of Things (IoT) brings significant challenges to authentication schemes in a scenario with several appliances for a smart house that should be accessed by a technician for maintenance tasks, for instance. An Identity Management (IdM) can be applied to easily authenticate a technician that intend to access the appliances from the Internet. However, Internet context is significantly different from IoT, demanding context adaptation to work. Thus, integrate these contexts to allow the authentication on the Internet and provide Single Sign-On (SSO) in IoT is a challenge. The goal is to allow a technician to access an appliance that is not reachable from the Internet, using IdM and without creating a single compromising point in the gateway that links the two contexts. The proposal interacts two key-based scheme, one for Internet and another for IoT, to reach integration between both contexts. A proof-of-concept implementation shows the proposal is feasible and presents no significant overhead for messages with up to 4096 bytes and 50 appliances.

Journal Article
TL;DR: In this article, the authors explore the context and potential offered by the growth of the Internet of Things (IoT) and provide an overview of this next phase of the digital revolution that is underpinned by social web, web 2.0, and the convergence of technologies such as mobile and ubiquitous broadband.
Abstract: In many ways the Internet of Things will change everything, as devices and software mesh and become part of the connected fabric of the Internet. This article explores the context and potential offered by the growth of the Internet of Things (IoT). It provides an overview of this next phase of the digital revolution that is underpinned by the growth of the social web, web 2.0, and the convergence of technologies such as mobile and ubiquitous broadband. This article also attempts to provide some insight into the potential value of the Internet of Things market in the future. The opportunities offered by the Internet of Things also raise serious questions about privacy and security in a connected world. As Umair Haque noted recently: ?At some point, we should all question the value of an internet that objectifies you, tracks you, and polices you...without your consent.? (Haque 2014)

Proceedings ArticleDOI
08 Dec 2014
TL;DR: Internet of things based on Web application architecture and key technology research is of great practical significance and triggered a new wave of information industry, and with infinite commercial value.
Abstract: With the deepening of the research and development of embedded devices and the Internet of things technology widespread application, intelligent objects and types, increasing the number of the Internet of things devices constantly gained popularity in the People's Daily life. The development of digital and network technology makes the controller node, sensor node, radio frequency identification, and home appliances such as TV, air conditioning equipment can make use of the Internet protocol, wireless communication protocol to achieve information transmission and exchange. The Internet of things technology triggered a new wave of information industry, and with infinite commercial value. Internet of things based on Web application architecture and key technology research is of great practical significance.

Proceedings ArticleDOI
27 Aug 2014
TL;DR: How the high error rate associated with wireless communications channels, combined with the low computational capability of some of the networked resources, dictates different requirements and solutions for achieving acceptable quality of experience by the users is indicated.
Abstract: The Future Internet concept has received a great deal of attention in recent years. The topic has been approached by a variety of perspectives, and certainly standardization is still to be agreed upon regarding some of the new terms and concepts that have gained currency in this period. One widely discussed direction involves the expansion of the Internet's model to include different forms of communications that may support connection to "things", i.e. all sorts of resources with some form of connectivity, that can connect to the Internet. These are not necessarily the resources that have traditionally been associated with computing, such as hosts, servers, routers, and so on. Rather, these can be any type of appliance with some minimal computational capability. This scenario proposes a much more richly connected world, in which connectivity to all sorts of things has suggested the expression "Internet of Things". Given the variety of functionality permitted to the networked resources, many mechanisms need to be investigated to suit different resource functionalities. As video data now accounts for over 50% of the Internet traffic, what are the considerations for video transmission, in real time, when the Internet of Things are incorporated? In this paper, we discuss some salient aspects, and consider specific recommendations for encoding based on the widely adopted ITU-T H264 standard. More specifically, we indicate how the high error rate associated with wireless communications channels, combined with the low computational capability of some of the networked resources, dictates different requirements and solutions for achieving acceptable quality of experience by the users.

Posted Content
TL;DR: This survey aims to provide the reader with a broad overview of the Internet of things concept, its building blocks, its applications along with its challenges.
Abstract: Internet of things (IoT) constitutes one of the most important technology that has the potential to affect deeply our way of life, after mobile phones and Internet. The basic idea is that every objet that is around us will be part of the network (Internet), interacting to reach a common goal. In another word, the Internet of Things concept aims to link the physical world to the digital one. Technology advances along with popular demand will foster the wide spread deployement of IoT's services, it would radically transform our corporations, communities, and personal spheres. In this survey, we aim to provide the reader with a broad overview of the Internet of things concept, its building blocks, its applications along with its challenges.

01 Jan 2014
TL;DR: The availability of cost effective sensors, mobile smart devices, scalable cloud infrastructure, and advanced analytics that have consumerized the Internet of Things have transformative potential and provides entire new affordances for organizations and their ecosystems across most industries.
Abstract: The Internet of Things facilitates the identification, digitization, and control of physical objects. However, it is the availability of cost effective sensors, mobile smart devices, scalable cloud infrastructure, and advanced analytics that have consumerized the Internet of Things. The accessibility of digital representations of things has transformative potential and provides entire new affordances for organizations and their ecosystems across most industries.

Journal ArticleDOI
01 Sep 2014

Proceedings ArticleDOI
06 Mar 2014
TL;DR: A web platform for the design, co-design and sharing of smart objects is presented and represents a design environment where physical shapes, sensing and actuation features, as well as functioning logics are integrated in a user friendly framework.
Abstract: Internet has formerly been used to link ideas, then people and now it is starting to connect things together. IoT constitutes a good paradigm to enable people to design and modify things, and then sharing their designs and modifications. Through the internet, things are nowadays able to exchange raw data and information thus enabling the development of a new class of interconnected smart objects. In this paper a web platform for the design, co-design and sharing of smart objects is presented. The platform represents a design environment where physical shapes, sensing and actuation features, as well as functioning logics are integrated in a user friendly framework. A platform test has been performed in the context of the Maker Faire Rome 2013 demonstrating how the developed infrastructure acts as design enabler for both makers and mainstream users.

Journal Article
TL;DR: A model for conducting Internet of Things classes based on a web-service oriented cloud platform to provide university students with knowledge about IoT concepts, possibilities, and business models, and allow them to develop basic system prototypes using general-purpose microdevices and a cloud and service infrastructure.
Abstract: This paper presents a model for conducting Internet of Things (IoT) classes based on a web-service oriented cloud platform. The goal of the designed model is to provide university students with knowledge about IoT concepts, possibilities, and business models, and allow them to develop basic system prototypes using general-purpose microdevices and a cloud and service infrastructure. The model was based on a cloud infrastructure deployed at the E-Business Department at the Belgrade University, and some implementation details are given. The model was tested and evaluated