scispace - formally typeset
Search or ask a question

Showing papers on "The Internet published in 2011"


Journal ArticleDOI
TL;DR: In this article, the authors present a framework that defines social media by using seven functional building blocks: identity, conversations, sharing, presence, relationships, reputation, and groups, and explain the implications that each block can have for how firms should engage with social media.

3,073 citations




Journal ArticleDOI
Raghu K. Ganti1, Fan Ye1, Hui Lei1
TL;DR: The need for a unified architecture for mobile crowdsensing is argued and the requirements it must satisfy are envisioned.
Abstract: An emerging category of devices at the edge of the Internet are consumer-centric mobile sensing and computing devices, such as smartphones, music players, and in-vehicle sensors. These devices will fuel the evolution of the Internet of Things as they feed sensor data to the Internet at a societal scale. In this article, we examine a category of applications that we term mobile crowdsensing, where individuals with sensing and computing devices collectively share data and extract information to measure and map phenomena of common interest. We present a brief overview of existing mobile crowdsensing applications, explain their unique characteristics, illustrate various research challenges, and discuss possible solutions. Finally, we argue the need for a unified architecture and envision the requirements it must satisfy.

1,833 citations


Book
01 Oct 2011
TL;DR: This book focuses on practical algorithms that have been used to solve key problems in data mining and which can be used on even the largest datasets, and explains the tricks of locality-sensitive hashing and stream processing algorithms for mining data that arrives too fast for exhaustive processing.
Abstract: The popularity of the Web and Internet commerce provides many extremely large datasets from which information can be gleaned by data mining. This book focuses on practical algorithms that have been used to solve key problems in data mining and which can be used on even the largest datasets. It begins with a discussion of the map-reduce framework, an important tool for parallelizing algorithms automatically. The authors explain the tricks of locality-sensitive hashing and stream processing algorithms for mining data that arrives too fast for exhaustive processing. The PageRank idea and related tricks for organizing the Web are covered next. Other chapters cover the problems of finding frequent itemsets and clustering. The final chapters cover two applications: recommendation systems and Web advertising, each vital in e-commerce. Written by two authorities in database and Web technologies, this book is essential reading for students and practitioners alike.

1,795 citations


Journal ArticleDOI
TL;DR: The Internet Topology Zoo is a store of network data created from the information that network operators make public, and is the most accurate large-scale collection of network topologies available, and includes meta-data that couldn't have been measured.
Abstract: The study of network topology has attracted a great deal of attention in the last decade, but has been hampered by a lack of accurate data. Existing methods for measuring topology have flaws, and arguments about the importance of these have overshadowed the more interesting questions about network structure. The Internet Topology Zoo is a store of network data created from the information that network operators make public. As such it is the most accurate large-scale collection of network topologies available, and includes meta-data that couldn't have been measured. With this data we can answer questions about network structure with more certainty than ever before - we illustrate its power through a preliminary analysis of the PoP-level topology of over 140 networks. We find a wide range of network designs not conforming as a whole to any obvious model.

1,333 citations


Journal ArticleDOI
01 Jan 2011
TL;DR: The architecture described in this paper is a roadmap for a future automated and flexible electric power distribution system that is suitable for plug-and-play of distributed renewable energy and distributed energy storage devices.
Abstract: This paper presents an architecture for a future electric power distribution system that is suitable for plug-and-play of distributed renewable energy and distributed energy storage devices. Motivated by the success of the (information) Internet, the architecture described in this paper was proposed by the NSF FREEDM Systems Center, Raleigh, NC, as a roadmap for a future automated and flexible electric power distribution system. In the envisioned “Energy Internet,” a system that enables flexible energy sharing is proposed for consumers in a residential distribution system. The key technologies required to achieve such a vision are presented in this paper as a result of the research partnership of the FREEDM Systems Center.

1,237 citations


Journal ArticleDOI
I. Sodagar1
TL;DR: A new standard to enable dynamic and adaptive streaming of media over HTTP is finalized, which aims to address the interoperability needs between devices and servers of various vendors.
Abstract: MPEG has recently finalized a new standard to enable dynamic and adaptive streaming of media over HTTP. This standard aims to address the interoperability needs between devices and servers of various vendors. There is broad industry support for this new standard, which offers the promise of transforming the media-streaming landscape.

1,085 citations


Journal ArticleDOI
TL;DR: The state-of-the-art of IoT is studied and the key technological drivers, potential applications, challenges and future research areas in the domain of IoT are presented.
Abstract: The phrase Internet of Things (IoT) heralds a vision of the future Internet where connecting physical things, from banknotes to bicycles, through a network will let them take an active part in the Internet, exchanging information about themselves and their surroundings. This will give immediate access to information about the physical world and the objects in it--leading to innovative services and increase in efficiency and productivity. This paper studies the state-of-the-art of IoT and presents the key technological drivers, potential applications, challenges and future research areas in the domain of IoT. IoT definitions from different perspective in academic and industry communities are also discussed and compared. Finally some major issues of future research in IoT are identified and discussed briefly.

1,073 citations


Posted Content
TL;DR: In this paper, the state-of-the-art of IoT is studied and the key technological drivers, potential applications, challenges and future research areas in the domain of IoT are discussed and compared.
Abstract: The phrase Internet of Things (IoT) heralds a vision of the future Internet where connecting physical things, from banknotes to bicycles, through a network will let them take an active part in the Internet, exchanging information about themselves and their surroundings. This will give immediate access to information about the physical world and the objects in it leading to innovative services and increase in efficiency and productivity. This paper studies the state-of-the-art of IoT and presents the key technological drivers,potential applications, challenges and future research areas in the domain of IoT. IoT definitions from different perspective in academic and industry communities are also discussed and compared. Finally some major issues of future research in IoT are identified and discussed briefly.

1,012 citations


Book ChapterDOI
TL;DR: An analysis of the current landscape of smart city pilot programmes, Future Internet experimentally-driven research and projects in the domain of Living Labs, common resources regarding research and innovation can be identified that can be shared in open innovation environments.
Abstract: Cities nowadays face complex challenges to meet objectives regarding socio-economic development and quality of life. The concept of "smart cities" is a response to these challenges. This paper explores "smart cities" as environments of open and user-driven innovation for experimenting and validating Future Internet-enabled services. Based on an analysis of the current landscape of smart city pilot programmes, Future Internet experimentally-driven research and projects in the domain of Living Labs, common resources regarding research and innovation can be identified that can be shared in open innovation environments. Effectively sharing these common resources for the purpose of establishing urban and regional innovation ecosystems requires sustainable partnerships and cooperation strategies among the main stakeholders.

Book
01 Jan 2011
TL;DR: In this article, Morozov argues that despite all the talk about the democratizing power of the Internet, regimes in Iran and China are as stable and repressive as ever, and that it also entrenches dictators, threatens dissidents, and makes it hard to promote democracy.
Abstract: The revolution will be Twittered! declared journalist Andrew Sullivan after protests erupted in Iran in June 2009. Yet for all the talk about the democratizing power of the Internet, regimes in Iran and China are as stable and repressive as ever. In fact, authoritarian governments are effectively using the Internet to suppress free speech, hone their surveillance techniques, disseminate cutting-edge propaganda, and pacify their populations with digital entertainment. Could the recent Western obsession with promoting democracy by digital means backfire? In this spirited book, journalist and social commentator Evgeny Morozov shows that by falling for the supposedly democratizing nature of the Internet, Western do-gooders may have missed how it also entrenches dictators, threatens dissidents, and makes it hardernot easierto promote democracy. Buzzwords like 21st-century statecraft sound good in PowerPoint presentations, but the reality is that digital diplomacy requires just as much oversight and consideration as any other kind of diplomacy. Marshaling compelling evidence, Morozov shows why we must stop thinking of the Internet and social media as inherently liberating and why ambitious and seemingly noble initiatives like the promotion of Internet freedom might have disastrous implications for the future of democracy as a whole.

Journal ArticleDOI
05 Aug 2011-Science
TL;DR: The results of four studies suggest that when faced with difficult questions, people are primed to think about computers and that when people expect to have future access to information, they have lower rates of recall of the information itself and enhanced recall instead for where to access it.
Abstract: The advent of the Internet, with sophisticated algorithmic search engines, has made accessing information as easy as lifting a finger. No longer do we have to make costly efforts to find the things we want. We can "Google" the old classmate, find articles online, or look up the actor who was on the tip of our tongue. The results of four studies suggest that when faced with difficult questions, people are primed to think about computers and that when people expect to have future access to information, they have lower rates of recall of the information itself and enhanced recall instead for where to access it. The Internet has become a primary form of external or transactive memory, where information is stored collectively outside ourselves.

01 Jan 2011
TL;DR: The survey investigated key online risks: pornography, bullying, receiving sexual messages, contact with people not known faceto- face, offline meetings with online contacts, potentially harmful user-generated content and personal data misuse.

Book
01 May 2011
TL;DR: Pariser et al. as discussed by the authors describe a new trend in how we consume information, one that will shape how we learn, what we know, and even how our democracy works, revealing that the race to collect as much personal data about us as possible, and to tailor our online experience accordingly is now the defining battle for todays internet giants like Google, Facebook, Apple and Microsoft.
Abstract: In December 2009, Google began customizing its search results for all users, and we entered a new era of personalization With little notice or fanfare, our online experience is changing, as the websites we visit are increasingly tailoring themselves to us In this engaging and visionary book, MoveOnorg board president Eli Pariser lays bare the personalization that is already taking place on every major website, from Facebook to AOL to ABC News As Pariser reveals, this new trend is nothing short of an invisible revolution in how we consume information, one that will shape how we learn, what we know, and even how our democracy worksThe race to collect as much personal data about us as possible, and to tailor our online experience accordingly, is now the defining battle for todays internet giants like Google, Facebook, Apple and Microsoft Behind the scenes, a burgeoning industry of data companies is tracking our personal information to sell to advertisers, from our political leanings to the hiking boots we just browsed on ZapposAs a result, we will increasingly each live in our own, unique information universewhat Pariser calls the filter bubble We will receive mainly news that is pleasant, familiar and confirms our beliefsand since these filters are invisible, we wont know what is being hidden from us Our past interests will determine what we are exposed to in the future, leaving less room for the unexpected encounters that spark creativity, innovation and the democratic exchange of ideasDrawing on interviews with both cyber-skeptics and cyber-optimists, from the co-founder of OK Cupid, an algorithmically-driven dating website, to one of the chief visionaries of US information warfare, THE FILTER BUBBLE tells the story of how the Internet, a medium built around the open flow ofideas, is closing in on itself under the pressure of commerce and monetization It peeks behind the curtain at the server farms, algorithms, and geeky entrepreneurs that have given us this new reality, and investigates the consequences of corporate power in the digital ageTHE FILTER BUBBLE reveals how personalization could undermine the internets original purpose as an open platform for the spread of ideas, and leave us all in an isolated, echoing world But it is not too late to change course Pariser lays out a new vision for the web, one that embraces the benefits of technology without turning a blind eye to its negative consequences, and will ensure that the Internet lives up to its transformative promise

Journal ArticleDOI
TL;DR: It is shown that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically whereas their functionality remains unchanged and is useful not only for improving significantly with low cost the robustity of existing infrastructures but also for designing economically robust network systems.
Abstract: Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a new measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically whereas their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

Journal ArticleDOI
Geng Wu1, Shilpa Talwar1, Kerstin Johnsson1, Nageen Himayat1, K D Johnson1 
TL;DR: The business motivations and technology challenges for machine-to-machine communications and the future directions of air interface technology improvements and network architectures evolution to enable the mass deployment of M2M services are discussed.
Abstract: Is M2M hype or the future of our information society? What does it take to turn the M2M vision into reality? In this article we discuss the business motivations and technology challenges for machine-to-machine communications. We highlight key M2M application requirements and major technology gaps. We analyze the future directions of air interface technology improvements and network architectures evolution to enable the mass deployment of M2M services. In particular, we consider the salient features of M2M traffic that may not be supported efficiently by present standards, and provide an overview of potential enhancements. Finally, we discuss standards development for M2M.

Journal ArticleDOI
TL;DR: In this paper, the authors present security of Internet of things, where every physical object has a virtual component that can produce and consume services such extreme interconnection will bring unprecedented convenience and economy, but it will also require novel approaches to ensure its safe and ethical use.
Abstract: This paper presents security of Internet of things. In the Internet of Things vision, every physical object has a virtual component that can produce and consume services Such extreme interconnection will bring unprecedented convenience and economy, but it will also require novel approaches to ensure its safe and ethical use. The Internet and its users are already under continual attack, and a growing economy-replete with business models that undermine the Internet's ethical use-is fully focused on exploiting the current version's foundational weaknesses.

Journal ArticleDOI
TL;DR: This paper explores current perspectives in power consumption for next generation networks, and provides a detailed survey on emerging technologies, projects, and work-in-progress standards, which can be adopted in networks and related infrastructures in order to reduce their carbon footprint.
Abstract: The concept of energy-efficient networking has begun to spread in the past few years, gaining increasing popularity. Besides the widespread sensitivity to ecological issues, such interest also stems from economic needs, since both energy costs and electrical requirements of telcos' and Internet Service Providers' infrastructures around the world show a continuously growing trend. In this respect, a common opinion among networking researchers is that the sole introduction of low consumption silicon technologies may not be enough to effectively curb energy requirements. Thus, for disruptively boosting the network energy efficiency, these hardware enhancements must be integrated with ad-hoc mechanisms that explicitly manage energy saving, by exploiting network-specific features. This paper aims at providing a twofold contribution to green networking. At first, we explore current perspectives in power consumption for next generation networks. Secondly, we provide a detailed survey on emerging technologies, projects, and work-in-progress standards, which can be adopted in networks and related infrastructures in order to reduce their carbon footprint. The considered approaches range from energy saving techniques for networked hosts, to technologies and mechanisms for designing next-generation and energy-aware networks and networking equipment.

Journal ArticleDOI
TL;DR: An Internet of Things application, smart community, is introduced, which refers to a paradigmatic class of cyber-physical systems with cooperating objects (i.e., networked smart homes), and the smart community architecture is defined.
Abstract: In this article, we introduce an Internet of Things application, smart community, which refers to a paradigmatic class of cyber-physical systems with cooperating objects (i.e., networked smart homes). We then define the smart community architecture, and describe how to realize secure and robust networking among individual homes. We present two smart community applications, Neighborhood Watch and Pervasive Healthcare, with supporting techniques and associated challenges, and envision a few value-added smart community services.

Journal ArticleDOI
TL;DR: WINPEPI is a handy resource for a wide variety of statistical routines used by epidemiologists and has a considerable potential as a learning and teaching aid, both with respect to practical procedures in the planning and analysis of epidemiological studies, and withrespect to important epidemiological concepts.
Abstract: The WINPEPI computer programs for epidemiologists are designed for use in practice and research in the health field and as learning or teaching aids. The programs are free, and can be downloaded from the Internet. Numerous additions have been made in recent years.

Journal ArticleDOI
TL;DR: The results strengthen the findings that the original digital divide of physical internet access has evolved into a divide that includes differences in skills to use the internet.
Abstract: Because of the growing amount of information on the internet and people’s increasing dependence on information, internet skills should be considered as a vital resource in contemporary society. This article focuses on the differential possession of internet skills among the Dutch population. In two studies, an in-depth range of internet skills are measured by charging subjects assignments to be accomplished on the internet. Subjects were recruited by applying a random stratified sampling method over gender, age, and education. While the level of operational and formal internet skills appeared quite high, the level of information and strategic internet skills is questionable. Whereas education appeared an important contributor to all skill levels, age only appeared a significant contributor to operational and formal skills. The results strengthen the findings that the original digital divide of physical internet access has evolved into a divide that includes differences in skills to use the internet.

Journal ArticleDOI
TL;DR: Choi et al. as mentioned in this paper employed a structural equation modeling approach to investigate the relationships among exogenous variables (navigation functionality, perceived security, and transaction cost) and mediating variables (trust and satisfaction), with loyalty as a dependent variable.

Journal Article
TL;DR: Jonathan Zittrain's book discusses the tension between generativity, the "capacity to produce unanticipated change through unfiltered contributions from a broad and varied audience" and the security problems inherent in today's personal computers and Internet system.
Abstract: The Future of the Internet and How to Stop It Jonathan Zittrain. New Haven: Yale University Press, 2008. 342 pages. $30.00.Jonathan Zittrain's book, The Future of the Internet and How to Stop It, discusses the tension between generativity, the "capacity to produce unanticipated change through unfiltered contributions from a broad and varied audience" and the security problems inherent in today's personal computers and Internet system (70). This generativity, Zittrain argues, is the greatest strength of personal computers and the Internet and had led to great innovations, including creative software, peer-to-peer networking, blogs and content sites such as Wikipedia, and even the Internet itself. Yet this same generativity has also spawned security, legal, and social problems that may lead to the demise of personal computers and the Internet as they exist today (101). If we do not find solutions for these problems, Zittrain warns, we will be faced with government or corporate control of personal computers and the Internet, similar to current controls of cellular telephones and cable converter boxes, which will effectively shut down the innovations that personal computers and the Internet currently enable (245). Personal computers, according to Zittrain, will become nothing but appliances programmed by the manufacturer, capable only of limited tasks, and stripped of the tools and capabilities necessary for innovation.The first part of the book traces the history of personal computers, mainframes, proprietary servers, and the Internet. This section highlights how differences in technology and administration fostered generativity in personal computers and on the Internet and prohibited innovation on the mainframes and proprietary networks. Yet the innovations made possible by the generative nature of the Internet and personal computers also created its vulnerabilities: viruses, worms, malware, and spyware. Despite his obvious support of generativity, Zittrain admits that the current situation is "not sustainable" (43), but warns that the obvious solutions-such as limited functionality, governmental controls, and censorship-completely undermine the creativity made possible by personal computers and the Internet. The sec- ond part of the book defines generativity and explores its benefits and detriments. Here, Zittrain proposes that information technology functions best when generative, while admitting that we cannot ignore the problems caused by generativity (64), and warns equally of the dangers of controlled appliances: censorships, surveillance, forced legal compliance, and unannounced changes in machine functions. Chapter 6 in this section considers Wikikpedia as a self-regulating generative system that functions imperfectly but well. Part Three proposes technological, legal, and social solutions to the problems discussed earlier in the book.The Future of the Internet intertwines its analysis of current personal computer/Internet problems with current and historical examples from business, law, culture (Internet and otherwise), and technology. These examples, often worthwhile and interesting in and of themselves, underpin Zittrain's analysis rationally and support his conclusions. The examples show that the kind of sledgehammer solutions that Zittrain predicts are not merely possibilities or potentialities, but already have been and are being employed by various companies and governments. Perhaps best of all, Zittrain's use of these historical and current examples avoids the sensationalism often seen in other works that predict governmental and corporate control of options, behavior, and creativity. …

09 Jan 2011
TL;DR: The WebSocket Protocol enables two-way communication between a client running untrusted code in a controlled environment to a remote host that has opted-in to communications from that code.
Abstract: The WebSocket Protocol enables two-way communication between a client running untrusted code in a controlled environment to a remote host that has opted-in to communications from that code. The security model used for this is the origin-based security model commonly used by web browsers. The protocol consists of an opening handshake followed by basic message framing, layered over TCP. The goal of this technology is to provide a mechanism for browser-based applications that need two-way communication with servers that does not rely on opening multiple HTTP connections (e.g., using XMLHttpRequest or s and long polling). [STANDARDS-TRACK]

Book
01 Jan 2011
TL;DR: The Future of Power examines what it means to be powerful in the twenty-first century and illuminates the road ahead as mentioned in this paper, and the United States must adopt a strategy that considers the impact of the internet on global power resources.
Abstract: Power evolves At the beginning of the twenty-first century, unsurpassed in military strength and ownership of world resources, the United States was indisputably the most powerful nation in the world But the global information age is rendering these traditional markers of power obsolete To remain at the pinnacle of world power, the United States must adopt a strategy that considers the impact of the internet on global power resources The Future of Power examines what it means to be powerful in the twenty-first century and illuminates the road ahead

Journal ArticleDOI
TL;DR: This analysis of one person’s Twitter network shows that it is the basis for a real community, even though Twitter was not designed to support the development of online communities.
Abstract: The notion of “community” has often been caught between concrete social relationships and imagined sets of people perceived to be similar. The rise of the Internet has refocused our attention on this ongoing tension. The Internet has enabled people who know each other to use social media, from e-mail to Facebook, to interact without meeting physically. Into this mix came Twitter, an asymmetric microblogging service: If you follow me, I do not have to follow you. This means that connections on Twitter depend less on in-person contact, as many users have more followers than they know. Yet there is a possibility that Twitter can form the basis of interlinked personal communities—and even of a sense of community. This analysis of one person’s Twitter network shows that it is the basis for a real community, even though Twitter was not designed to support the development of online communities. Studying Twitter is useful for understanding how people use new communication technologies to form new social connections and maintain existing ones.

01 Jun 2011
TL;DR: Krishnan et al. as mentioned in this paper investigated the long tail phenomenon of the Pareto principle and found that consumers' usage of Internet search and discovery tools, such as recommendation engines, is associated with an increase in the share of niche products.
Abstract: Many markets have historically been dominated by a small number of best-selling products. The Pareto principle, also known as the 80/20 rule, describes this common pattern of sales concentration. However, information technology in general and Internet markets in particular have the potential to substantially increase the collective share of niche products, thereby creating a longer tail in the distribution of sales. This paper investigates the Internet's “long tail” phenomenon. By analyzing data collected from a multichannel retailer, it provides empirical evidence that the Internet channel exhibits a significantly less concentrated sales distribution when compared with traditional channels. Previous explanations for this result have focused on differences in product availability between channels. However, we demonstrate that the result survives even when the Internet and traditional channels share exactly the same product availability and prices. Instead, we find that consumers' usage of Internet search and discovery tools, such as recommendation engines, are associated with an increase the share of niche products. We conclude that the Internet's long tail is not solely due to the increase in product selection but may also partly reflect lower search costs on the Internet. If the relationships we uncover persist, the underlying trends in technology portend an ongoing shift in the distribution of product sales. This paper was accepted by Ramayya Krishnan, information systems.

Book
04 Mar 2011
TL;DR: Earl and Kimport as discussed by the authors examined key characteristics of online political protest and investigated their impacts on organizing and participation, and found that the more these affordances are leveraged, the more transformative the changes to organizing and participating in protest.
Abstract: Much attention has been paid in recent years to the emergence of "Internet activism," but scholars and pundits disagree about whether online political activity is different in kind from more traditional forms of activism. Does the global reach and blazing speed of the Internet affect the essential character or dynamics of online political protest? In Digitally Enabled Social Change, Jennifer Earl and Katrina Kimport examine key characteristics of Web activism and investigate their impacts on organizing and participation. Earl and Kimport argue that the Web offers two key affordances relevant to activism: sharply reduced costs for creating, organizing, and participating in protest; and the decreased need for activists to be physically together in order to act together. A rally can be organized and demonstrators recruited entirely online, without the cost of printing and mailing; an activist can create an online petition in minutes and gather e-signatures from coast to coast using only her laptop. Drawing on evidence from samples of online petitions, boycotts, and letter-writing and e-mailing campaigns, Earl and Kimport show that the more these affordances are leveraged, the more transformative the changes to organizing and participating in protest; the less these affordances are leveraged, the more superficial the changes. The rally organizers, for example, can save money on communication and coordination, but the project of staging the rally remains essentially the same. Tools that allow a single activist to create and circulate a petition entirely online, however, enable more radical changes in the process. The transformative nature of these changes, Earl and Kimport suggest, demonstrate the need to revisit long-standing theoretical assumptions about social movements.

Journal ArticleDOI
TL;DR: This article identifies requirements for the next generation of IoT experimental facilities, while providing a taxonomy, and survey currently available research testbeds, identify existing gaps, and suggest new directions based on experience from recent efforts in this field.
Abstract: The initial vision of the Internet of Things was of a world in which all physical objects are tagged and uniquely identified by RFID transponders. However, the concept has grown into multiple dimensions, encompassing sensor networks able to provide real-world intelligence and goal-oriented collaboration of distributed smart objects via local networks or global interconnections such as the Internet. Despite significant technological advances, difficulties associated with the evaluation of IoT solutions under realistic conditions in real-world experimental deployments still hamper their maturation and significant rollout. In this article we identify requirements for the next generation of IoT experimental facilities. While providing a taxonomy, we also survey currently available research testbeds, identify existing gaps, and suggest new directions based on experience from recent efforts in this field.