RonPub

Loading...

RonPub Banner

RonPub -- Research Online Publishing

RonPub (Research online Publishing) is an academic publisher of online, open access, peer-reviewed journals.  RonPub aims to provide a platform for researchers, developers, educators, and technical managers to share and exchange their research results worldwide.

RonPub Is Open Access:

RonPub publishes all of its journals under the open access model, defined under BudapestBerlin, and Bethesda open access declarations:

  • All articles published by RonPub is fully open access and online available to readers free of charge.  
  • All open access articles are distributed under  Creative Commons Attribution License,  which permits unrestricted use, distribution and reproduction free of charge in any medium, provided that the original work is properly cited. 
  • Authors retain all copyright to their work.
  • Authors may also publish the publisher's version of their paper on any repository or website. 

RonPub Is Cost-Effective:

To be able to provide open access journals, RonPub defray publishing cost by charging a one-time publication fee for each accepted article. One of RonPub objectives is providing a fast and high-quality but lower-cost publishing service. In order to ensure that the fee is never a barrier to publication, RonPub offers a fee waiver for authors who do not have funds to cover publication fees. We also offer a partial fee waiver for editors and reviewers of RonPub as as reward for their work. See the respective Journal webpage for the concrete publication fee.

RonPub Publication Criteria

What we are most concerned about is the quality, not quantity, of publications. We only publish high-quality scholarly papers. Publication Criteria describes the criteria that should be met for a contribution to be acceptable for publication in RonPub journals.

RonPub Publication Ethics Statement:

In order to ensure the publishing quality and the reputation of the publisher, it is important that all parties involved in the act of publishing adhere to the standards of the publishing ethical behaviour. To verify the originality of submissions, we use Plagiarism Detection Tools, like Anti-Plagiarism, PaperRater, Viper, to check the content of manuscripts submitted to our journals against existing publications.

RonPub follows the Code of Conduct of the Committee on Publication Ethics (COPE), and deals with the cases of misconduct according to the COPE Flowcharts

Long-Term Preservation in the German National Library

Our publications are archived and permanently-preserved in the German National Library. The publications, which are archived in the German National Library, are not only long-term preserved but also accessible in the future, because the German National Library ensures that digital data saved in the old formats can be viewed and used on current computer systems in the same way they were on the original systems which are long obsolete.

Where is RonPub?

RonPub is a registered corporation in Lübeck, Germany. Lübeck is a beautiful coastal city, owing wonderful sea resorts and sandy beaches as well as good restaurants. It is located in northern Germany and is 60 kilometer away from Hamburg.

OJIOT Cover
Open Journal of Internet of Things (OJIOT)
OJIOT, an open access and peer-reviewed online journal, publishes original and creative research results on the internet of things. OJIOT distributes its articles under the open access model. All articles of OJIOT are fully open access and online available to readers free of charge. There is no restriction on the length of the papers. Accepted manuscripts are published online immediately.
Publisher: RonPub UG (haftungsbeschränkt), Lübeck, Germany
Contact: OJIOT Editorial Office
ISSN: 2364-7108
Call for Papers: txtUTF-8 txtASCII pdf
OJIOT Cover
Open Journal of Internet of Things (OJIOT)
OJIOT, an open access and peer-reviewed online journal, publishes original and creative research results on the internet of things. OJIOT distributes its articles under the open access model. All articles of OJIOT are fully open access and online available to readers free of charge. There is no restriction on the length of the papers. Accepted manuscripts are published online immediately.
Publisher: RonPub UG (haftungsbeschränkt), Lübeck, Germany
Contact: OJIOT Editorial Office
ISSN: 2364-7108
Call for Papers: txtUTF-8 txtASCII pdf

Aims & Scope

The current internet with its applications like web browsing, emails, social networks and online games is human oriented. It is predicted that real objects will have a much bigger impact in the future internet. Any real object will be accessible and manageable via the internet, and real objects will automatically work in cooperation. This new vision is called as the internet of things (IoT). Realizing this vision offers a new dimension of real world services to the user.

OJIOT publishes regular research papers, short communications, reviews and visionary papers in all aspects of the internet of things. There is no restriction on the length of the papers. 

Short communications reports novel research ideas. The work represented should be technically sound and significantly advancing the state of the art. Short communications also include exploratory studies and methodological articles.

Regular research papers are full original findings with adequate experimental research. They make substantial theoretical and empirical contributions to the research field.  Research papers should be written in as concise a style as possible.

Research reviews are insightful and accessible overview of a certain field of research. They conceptualize research issues, synthesize existing findings and advance the understanding of the field. They may also suggest new research issues and directions.

Visionary papers identify new research issues and future research directions, and describe new research visions 

Topics relevant to this journal include, but are NOT limited to:

  • System architectures for IoT, e.g. 
    • things-centric, 
    • data-centric, 
    • event-centric, and
    • service-centric
  • IoT applications, including e.g.
    • smart homes/offices/cities, 
    • waste management, 
    • continuous care, 
    • emergency response, and 
    • intelligent shopping
  • Nano Technology, including e.g.
    • Nano Networks
    • Nano communication
    • Nano applications
    • Nano computing
    • Internet of Nano Tings
  • IoT programming toolkits and frameworks
  • IoT prototypes and evaluation test-beds
  • Privacy and security
  • IoT management and interoperability
  • Management of IoT streams
  • Enabling technologies and standards for the IoT
  • Spatial and temporal reasoning for IoT
  • Sustainability of IoT platforms, e.g. business models for deployment and maintenance
  • Societal challenges and IoT, e.g. urban planning and decision making tools
  • Ownership of data in IoT scenarios

Author Guidelines

Publication Criteria

Publication Criteria provides important information for authors to prepare their manuscripts with a high possibility of being accepted.

Manuscript Preparation

Please prepare your manuscripts using the manuscript template of the journal. It is available for download as word doc docx and latex version zip. The template describes the format and structure of manuscripts and other necessary information for preparing manuscripts. Manuscripts should be written in English. There is no restriction on the length of manuscripts.

Submission

Authors submit their manuscripts following the information on the submit pageAuthors first submit their manuscripts in PDF format. Once a manuscript is accepted, the author then submits the revised manuscript as a PDF file and a word file or latex folder (with all the material necessary to generate the PDF file). The work described in the submitted manuscript must be previously unpublished; it is not under consideration for publication anywhere else. 

Authors are welcome to suggest qualified reviewers for their papers, but this is not mandatory. If the author wants to do so, please provide the name, affiliations and e-mail addresses for all suggested reviewers.

Manuscript Status

After submission of manuscripts, authors will receive an email to confirm receipt of manuscripts. Subsequent enquiries concerning paper progress should be sent to the email address of the journal.

Review Procedure

OJIOT is committed to enforcing a rigorous peer-review process. All manuscripts submitted for publication in OJIOT are strictly and thoroughly peer-reviewed. When a manuscript is submitted, the editor-in-chief assigns it to an appropriate editor who will be in charge of the review process of the manuscript. The editor first suggests potential reviewers and then organizes the peer-reviewing herself/himself or entrusts it to the editor office. For each manuscript, typically three review reports will be collected. The editor and the editor-in-chief evaluate the manuscript itself and the review reports and make an accept/revision/reject decision. Authors will be informed with the decision and reviewing results within 6-8 weeks on average after the manuscript submission. In the case of revision, authors are required to perform an adequate revision to address the concerns from evaluation reports. A second round of peer-review will be performed if necessary.

Accepted manuscripts are published online immediately.

Copyrights

Authors publishing with RonPub open journals retain the copyright to their work. 

All articles published by RonPub is fully open access and online available to readers free of charge.  RonPub publishes all open access articles under the Creative Commons Attribution License,  which permits unrestricted use, distribution and reproduction freely, provided that the original work is properly cited.

Digital Archiving Policy

Our publications have been archived and permanently-preserved in the German National Library. The publications, which are archived in the German National Library, are not only long-term preserved but also accessible in the future, because the German National Library ensures that digital data saved in the old formats can be viewed and used on current computer systems in the same way they were on the original systems which are long obsolete. Further measures will be taken if necessary. Furthermore, we also encourage our authors to self-archive their articles published on the website of RonPub.

Publication Ethics Statement

In order to ensure the publishing quality and the reputation of the journal, it is important that all parties involved in the act of publishing adhere to the standards of the publishing ethical behaviour. To verify the originality of submissions, we use Plagiarism Detection Tools, like Anti-Plagiarism, PaperRater, Viper, to check the content of manuscripts submitted to our journals against existing publications.

Our journal follows the Code of Conduct of the Committee on Publication Ethics (COPE), and deals with the cases of misconduct according to the COPE Flowcharts

Very Large Internet of Things (VLIoT-2018)

Very Large Internet of Things (VLIoT 2018) is an international workshop in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil. The proceedings of VLIoT@VLDB 2018 are published in the Open Journal of Internet of Things (OJIOT) as special issue.

Aims

An increasing number of real-world objects are becoming accessible and manageable through the Internet. According to CISCO, the number of these devices will reach 50 billion by 2020, forming a very large Internet of Things (VLIoT). This massive number of "smart" objects will cooperate with each other, have their own metadata, and may continuously produce new data (in form of events, sensor data, or actuator states). Data management will be a major challenge in the very large Internet of Things. Hence, efficient IoT infrastructure and technologies must be developed to handle masses of IoT data with high performance. This will include: new techniques to filter and store relevant data; efficient replication approaches for objects with constrained resources in order to increase availability and durability; new protocols for voting about decisions among objects; and smooth integration of heterogeneous objects. The goal of this workshop is to bring together academic researchers and industry practitioners working in the field of IoT and to allow them to report and exchange their findings addressing these challenges. This workshop also intends to discuss other closely-related technologies such as Nanotechnology, Fog-, Edge-, and Dew-Computing for IoT. The ideas of Fog, Edge and Dew Computing may indeed solve or attenuate the problems of a very large Internet of Things (w.r.t. performance, energy-efficiency, as well as security and privacy aspects).

Types of Papers

We are interested in contributions describing original ideas, promising new concepts, and practical experience. In particular, we solicit papers of different types:

  • Research Papers proposing new approaches, theories or techniques related to Internet of Things, including new data structures, algorithms, whole systems, and frameworks. They should make substantial theoretical and empirical contributions to the research field.
  • Experiments and Analysis Papers focusing on the experimental evaluation of existing approaches including data structures and algorithms for Internet of Things and bring new insights through the analysis of these experiments. Results of experiments and analysis papers can be, for example, showing benefits of well-known approaches in new settings and environments, opening new research problems by demonstrating unexpected behavior or phenomena, or comparing a set of traditional approaches in an experimental survey.
  • Application Papers reporting practical experiences on Internet of Things applications. Application papers might describe specific application domains in the IoT such as smart homes/offices/cities, continuous health care, waste management, emergency response, intelligent response, and Industry 4.0.
  • Vision Papers identifying emerging or future research issues and directions, and describing new research visions in the IoT area that may have a great impact on our society.

Topics of Interest

We expect original, high-quality papers, including but NOT limited to the following topics:

  • Semantic IoT
  • Privacy-by-design and security-by-design in IoT
  • System architectures for IoT, including
    • things-centric
    • data-centric
    • event-centric
    • service-centric
  • IoT applications, including:
    • smart homes/offices/cities
    • waste management
    • health care
    • emergency response
    • intelligent shopping
  • Nano Technology, including:
    • Nano Networks
    • Nano communication
    • Nano applications
    • Nano computing
    • Internet of Nano Things
  • IoT programming toolkits and frameworks
  • IoT prototypes and evaluation test-beds
  • IoT data mining and analytics
  • IoT management and interoperability
  • Management of IoT streams
  • Enabling technologies and standards for the IoT
  • Spatial and temporal reasoning for IoT
  • Sustainability of IoT platforms, e.g. business models for deployment and maintenance
  • Societal challenges and IoT, e.g. urban planning and decision making tools
  • Ownership of data in IoT scenarios
  • Fog, Edge and Dew Computing for IoT
  • IoT benchmarks and performance measurement
  • Indexing and search in IoT environments
  • IoT transactions, concurrency control and recovery
  • Hardware accelerators and energy savers for IoT applications and core infrastructure
  • IoT discovery of devices, services and data

Guest Editors

  • Carlo Alberto Boano, Graz University of Technology, Austria
  • Sven Groppe, University of Lübeck, Germany

Important Dates

  • Submission Deadline: 25-03-2018
  • Author Notification: 31-05-2018
Articles (total number of downloads: 44457, total number of citations: 81)tex xml rdf rss

 Open Access 

Editorial of the Workshop on Very Large Internet of Things (VLIoT 2018)

Sven Groppe, Carlo Alberto Boano

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 1-6, 2018, Downloads: 3138

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519324071729480 | GNL-LP: 1163928704 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: The 2nd "Very Large Internet of Things" (VLIoT) workshop in conjunction with the 44th International Conference on Very Large Data Bases (VLDB) taking place in Rio de Janeiro, Brazil in 2018 is a forum for all researchers in the area of Internet of Things especially interested in related data management issues. This editorial of a special issue containing the workshop's papers provides an overview over the aims and scope of the workshop and the review procedure. Furthermore, we determine and shortly analyze a statistics of the topics addressed by the accepted papers.

BibTex:

    @Article{OJIOT_2018v4i1n01_VLIoT2018,
        title     = {Editorial of the Workshop on Very Large Internet of Things (VLIoT 2018)},
        author    = {Sven Groppe and
                     Carlo Alberto Boano},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {1--6},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519324071729480},
        urn       = {urn:nbn:de:101:1-2018080519324071729480},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {The 2nd "Very Large Internet of Things" (VLIoT) workshop in conjunction with the 44th International Conference on Very Large Data Bases (VLDB) taking place in Rio de Janeiro, Brazil in 2018 is a forum for all researchers in the area of Internet of Things especially interested in related data management issues. This editorial of a special issue containing the workshop's papers provides an overview over the aims and scope of the workshop and the review procedure. Furthermore, we determine and shortly analyze a statistics of the topics addressed by the accepted papers.}
    }

 Open Access 

Past, Present and Future of the ContextNet IoMT Middleware

Markus Endler, Francisco Silva e Silva

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 7-23, 2018, Downloads: 3198, Citations: 19

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519323267622857 | GNL-LP: 1163928682 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: The Internet of Things with support to mobility is already transforming many application domains, such as smart cities and homes, environmental monitoring, health care, manufacturing, logistics, public security etc. in that it allows to collect and analyze data from the environment, people and machines, and to implement some form of control or steering on these elements of the physical world. But in order to speed the development of applications for the Internet of Mobile Things (IoMT), some middleware is required. This paper summarizes seven years of research and development on the ContextNet middle ware aimed at IoMT, discusses what we achieved and what we have learned so far. We also share our vision of possible future challenges and developments in the Internet of Mobile Things.

BibTex:

    @Article{OJIOT_2018v4i1n02_Endler,
        title     = {Past, Present and Future of the ContextNet IoMT Middleware},
        author    = {Markus Endler and
                     Francisco Silva e Silva},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {7--23},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519323267622857},
        urn       = {urn:nbn:de:101:1-2018080519323267622857},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {The Internet of Things with support to mobility is already transforming many application domains, such as smart cities and homes, environmental monitoring, health care, manufacturing, logistics, public security etc. in that it allows to collect and analyze data from the environment, people and machines, and to implement some form of control or steering on these elements of the physical world. But in order to speed the development of applications for the Internet of Mobile Things (IoMT), some middleware is required. This paper summarizes seven years of research and development on the ContextNet middle ware aimed at IoMT, discusses what we achieved and what we have learned so far. We also share our vision of possible future challenges and developments in the Internet of Mobile Things.}
    }

 Open Access 

Middleware Support for Generic Actuation in the Internet of Mobile Things

Sheriton Valim, Matheus Zeitune, Bruno Olivieri, Markus Endler

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 24-34, 2018, Downloads: 2728, Citations: 5

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519322337232186 | GNL-LP: 1163928666 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: As the Internet of Things is expanding towards applications in almost any sector of our economy and daily life, so is the demand of employing and integrating devices with actuation capabilities, such as smart bulbs, HVAC,smart locks, industrial machines, robots or drones. Many middleware platforms have been developed in orderto support the development of distributed IoT applications and facilitate the sensors-to-cloud communication andedge processing capabilities, but surprisingly very little has been done to provide middleware-level, support andgeneric mechanisms for discovering the devices and their interfaces, and executing the actuation commands, i.e.transferring them to the device. In this paper, we present a generic support for actuation as an extension ofContextNet, our mobile-cloud middleware for IoMT. We describe the design of the distributed actuation supportand present a proof of working implementation that enables remote control of a Sphero mobile BB-8 toy.

BibTex:

    @Article{OJIOT_2018v4i1n03_Valim,
        title     = {Middleware Support for Generic Actuation in the Internet of Mobile Things},
        author    = {Sheriton Valim and
                     Matheus Zeitune and
                     Bruno Olivieri and
                     Markus Endler},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {24--34},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519322337232186},
        urn       = {urn:nbn:de:101:1-2018080519322337232186},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {As the Internet of Things is expanding towards applications in almost any sector of our economy and daily life, so is the demand of employing and integrating devices with actuation capabilities, such as smart bulbs, HVAC,smart locks, industrial machines, robots or drones. Many middleware platforms have been developed in orderto support the development of distributed IoT applications and facilitate the sensors-to-cloud communication andedge processing capabilities, but surprisingly very little has been done to provide middleware-level, support andgeneric mechanisms for discovering the devices and their interfaces, and executing the actuation commands, i.e.transferring them to the device. In this paper, we present a generic support for actuation as an extension ofContextNet, our mobile-cloud middleware for IoMT. We describe the design of the distributed actuation supportand present a proof of working implementation that enables remote control of a Sphero mobile BB-8 toy.}
    }

 Open Access 

Service-Relationship Programming Framework for the Social IoT

Ahmed E. Khaled, Wyatt Lindquist, Abdelsalam (Sumi) Helal

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 35-53, 2018, Downloads: 2585, Citations: 1

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519302286990058 | GNL-LP: 1163928488 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: We argue that for a true realization of innovative programming opportunities for smart spaces, the developers should be equipped with informative tools that assist them in building domain-related applications. Such tools should utilize the services offered by the space's smart things and consider the different relationships that may tie these services opportunistically to build applications. In this paper, we utilize our Inter-thing relationships programming framework to present a distributed programming ecosystem. The framework broadens the restricted set of thing-level relationships of the evolving social IoT paradigm with a set of service-level relationships. Such relationships provide guidance into how services belonging to different things can be combined to build meaningful applications. We also present a uniform way of describing the thing services and the service-level relationships along with new capabilities for the things to dynamically generate their own services, formulate the corresponding programmable interfaces (APIs) and create an ad-hoc network of socially related smart things at runtime. We then present the semantic rules that guide the establishment of IoT applications and finally demonstrate the features of the framework through a proof-of-concept application.

BibTex:

    @Article{OJIOT_2018v4i1n04_Khaled,
        title     = {Service-Relationship Programming Framework for the Social IoT},
        author    = {Ahmed E. Khaled and
                     Wyatt Lindquist and
                     Abdelsalam (Sumi) Helal},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {35--53},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519302286990058},
        urn       = {urn:nbn:de:101:1-2018080519302286990058},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {We argue that for a true realization of innovative programming opportunities for smart spaces, the developers should be equipped with informative tools that assist them in building domain-related applications. Such tools should utilize the services offered by the space's smart things and consider the different relationships that may tie these services opportunistically to build applications. In this paper, we utilize our Inter-thing relationships programming framework to present a distributed programming ecosystem. The framework broadens the restricted set of thing-level relationships of the evolving social IoT paradigm with a set of service-level relationships. Such relationships provide guidance into how services belonging to different things can be combined to build meaningful applications. We also present a uniform way of describing the thing services and the service-level relationships along with new capabilities for the things to dynamically generate their own services, formulate the corresponding programmable interfaces (APIs) and create an ad-hoc network of socially related smart things at runtime. We then present the semantic rules that guide the establishment of IoT applications and finally demonstrate the features of the framework through a proof-of-concept application.}
    }

 Open Access 

Query Rewriting by Contract under Privacy Constraints

Hannes Grunert, Andreas Heuer

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 54-69, 2018, Downloads: 2831, Citations: 1

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519303109386858 | GNL-LP: 116392850X | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: In this paper we show how Query Rewriting rules and Containment checks of aggregate queries can be combined with Contract-based programming techniques. Based on the combination of both worlds, we are able to find new Query Rewriting rules for queries containing aggregate constraints. These rules can either be used to improve the overall system performance or, in our use case, to implement a privacy-aware way to process queries. By integrating them in our PArADISE framework, we can now process and rewrite all types of OLAP queries, including complex aggregate functions and group-by extensions. In our framework, we use the whole network structure, from data producing sensors up to cloud computers, to automatically deploy an edge computing subnetwork. On each edge node, so-called fragment queries of a genuine query are executed to filter and to aggregate data on resource restricted sensor nodes. As a result of integrating Contract-based programming approaches, we are now able to not only process less data but also to produce less data in the result. Thus, the privacy principle of data minimization is accomplished.

BibTex:

    @Article{OJIOT_2018v4i1n05_Grunert,
        title     = {Query Rewriting by Contract under Privacy Constraints},
        author    = {Hannes Grunert and
                     Andreas Heuer},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {54--69},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519303109386858},
        urn       = {urn:nbn:de:101:1-2018080519303109386858},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {In this paper we show how Query Rewriting rules and Containment checks of aggregate queries can be combined with Contract-based programming techniques. Based on the combination of both worlds, we are able to find new Query Rewriting rules for queries containing aggregate constraints. These rules can either be used to improve the overall system performance or, in our use case, to implement a privacy-aware way to process queries. By integrating them in our PArADISE framework, we can now process and rewrite all types of OLAP queries, including complex aggregate functions and group-by extensions. In our framework, we use the whole network structure, from data producing sensors up to cloud computers, to automatically deploy an edge computing subnetwork. On each edge node, so-called fragment queries of a genuine query are executed to filter and to aggregate data on resource restricted sensor nodes. As a result of integrating Contract-based programming approaches, we are now able to not only process less data but also to produce less data in the result. Thus, the privacy principle of data minimization is accomplished.}
    }

 Open Access 

Towards Adaptive Actors for Scalable IoT Applications at the Edge

Jonathan Fürst, Mauricio Fadel Argerich, Kaifei Chen, Ernö Kovacs

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 70-86, 2018, Downloads: 4042, Citations: 7

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519303887853107 | GNL-LP: 1163928518 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Traditional device-cloud architectures are not scalable to the size of future IoT deployments. While edge and fog-computing principles seem like a tangible solution, they increase the programming effort of IoT systems, do not provide the same elasticity guarantees as the cloud and are of much greater hardware heterogeneity. Future IoT applications will be highly distributed and place their computational tasks on any combination of end-devices (sensor nodes, smartphones, drones), edge and cloud resources in order to achieve their application goals. These complex distributed systems require a programming model that allows developers to implement their applications in a simple way (i.e., focus on the application logic) and an execution framework that runs these applications resiliently with a high resource efficiency, while maximizing application utility. Towards such distributed execution runtime, we propose Nandu, an actor based system that adapts and migrates tasks dynamically using developer provided hints as seed information. Nandu allows developers to focus on sequential application logic and transforms their application into distributed, adaptive actors. The resulting actors support fine-grained entry points for the execution environment. These entry points allow local schedulers to adapt actors seamlessly to the current context, while optimizing the overall application utility according to developer provided requirements.

BibTex:

    @Article{OJIOT_2018v4i1n06_Fuerst,
        title     = {Towards Adaptive Actors for Scalable IoT Applications at the Edge},
        author    = {Jonathan F{\"u}rst and
                     Mauricio Fadel Argerich and
                     Kaifei Chen and
                     Ern{\"o} Kovacs},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {70--86},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519303887853107},
        urn       = {urn:nbn:de:101:1-2018080519303887853107},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Traditional device-cloud architectures are not scalable to the size of future IoT deployments. While edge and fog-computing principles seem like a tangible solution, they increase the programming effort of IoT systems, do not provide the same elasticity guarantees as the cloud and are of much greater hardware heterogeneity. Future IoT applications will be highly distributed and place their computational tasks on any combination of end-devices (sensor nodes, smartphones, drones), edge and cloud resources in order to achieve their application goals. These complex distributed systems require a programming model that allows developers to implement their applications in a simple way (i.e., focus on the application logic) and an execution framework that runs these applications resiliently with a high resource efficiency, while maximizing application utility. Towards such distributed execution runtime, we propose Nandu, an actor based system that adapts and migrates tasks dynamically using developer provided hints as seed information. Nandu allows developers to focus on sequential application logic and transforms their application into distributed, adaptive actors. The resulting actors support fine-grained entry points for the execution environment. These entry points allow local schedulers to adapt actors seamlessly to the current context, while optimizing the overall application utility according to developer provided requirements.}
    }

 Open Access 

Smartwatch-Based IoT Fall Detection Application

Anne H. Ngu, Po-Teng Tseng, Manvick Paliwal, Christopher Carpenter, Walker Stipe

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 87-98, 2018, Downloads: 6914, Citations: 13

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519304951282148 | GNL-LP: 1163928534 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: This paper proposes using only the streaming accelerometer data from a commodity-based smartwatch (IoT) device to detect falls. The smartwatch is paired with a smartphone as a means for performing the computation necessary for the prediction of falls in realtime without incurring latency in communicating with a cloud server while also preserving data privacy. The majority of current fall detection applications require specially designed hardware and software which make them expensive and inaccessible to the general public. Moreover, a fall detection application that uses a wrist worn smartwatch for data collection has the added benefit that it can be perceived as a piece of jewelry and thus non-intrusive. We experimented with both Support Vector Machine and Naive Bayes machine learning algorithms for the creation of the fall model. We demonstrated that by adjusting the sampling frequency of the streaming data, computing acceleration features over a sliding window, and using a Naive Bayes machine learning model, we can obtain the true positive rate of fall detection in real-world setting with 93.33% accuracy. Our result demonstrated that using a commodity-based smartwatch sensor can yield fall detection results that are competitive with those of custom made expensive sensors.

BibTex:

    @Article{OJIOT_2018v4i1n07_Ngu,
        title     = {Smartwatch-Based IoT Fall Detection Application},
        author    = {Anne H. Ngu and
                     Po-Teng Tseng and
                     Manvick Paliwal and
                     Christopher Carpenter and
                     Walker Stipe},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {87--98},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519304951282148},
        urn       = {urn:nbn:de:101:1-2018080519304951282148},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {This paper proposes using only the streaming accelerometer data from a commodity-based smartwatch (IoT) device to detect falls. The smartwatch is paired with a smartphone as a means for performing the computation necessary for the prediction of falls in realtime without incurring latency in communicating with a cloud server while also preserving data privacy. The majority of current fall detection applications require specially designed hardware and software which make them expensive and inaccessible to the general public. Moreover, a fall detection application that uses a wrist worn smartwatch for data collection has the added benefit that it can be perceived as a piece of jewelry and thus non-intrusive. We experimented with both Support Vector Machine and Naive Bayes machine learning algorithms for the creation of the fall model. We demonstrated that by adjusting the sampling frequency of the streaming data, computing acceleration features over a sliding window, and using a Naive Bayes machine learning model, we can obtain the true positive rate of fall detection in real-world setting with 93.33\% accuracy. Our result demonstrated that using a commodity-based smartwatch sensor can yield fall detection results that are competitive with those of custom made expensive sensors.}
    }

 Open Access 

Software-Defined Wireless Sensor Networks Approach: Southbound Protocol and Its Performance Evaluation

Cintia B. Margi, Renan C. A. Alves, Gustavo A. Nunez Segura, Doriedson A. G. Oliveira

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 99-108, 2018, Downloads: 3752, Citations: 14

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519305710189607 | GNL-LP: 1163928550 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Software Defined Networking (SDN) has been identified as a promising network paradigm for Wireless Sensor Networks (WSN) and the Internet of Things. It is a key tool for enabling Sensing as a Service, which provides infrastructure sharing thus reducing operational costs. While a few proposals on SDN southbound protocols designed for WSN are found in the literature, they lack adequate performance analysis. In this paper, we review ITSDN main features and present a performance evaluation with all the sensing nodes transmitting data periodically. We conducted a number of experiments varying the number of nodes and assessing the impact of flow table maximum capacity. We assessed the metrics of data delivery, data delay, control overhead and energy consumption in order to show the tradeoffs of using IT-SDN in comparison to the IETF RPL routing protocol. We discuss the main challenges still faced by IT-SDN in larger WSN, and how they could be addressed to make IT-SDN use worthwhile.

BibTex:

    @Article{OJIOT_2018v4i1n08_Margi,
        title     = {Software-Defined Wireless Sensor Networks Approach: Southbound Protocol and Its Performance Evaluation},
        author    = {Cintia B. Margi and
                     Renan C. A. Alves and
                     Gustavo A. Nunez Segura and
                     Doriedson A. G. Oliveira},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {99--108},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519305710189607},
        urn       = {urn:nbn:de:101:1-2018080519305710189607},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Software Defined Networking (SDN) has been identified as a promising network paradigm for Wireless Sensor Networks (WSN) and the Internet of Things. It is a key tool for enabling Sensing as a Service, which provides infrastructure sharing thus reducing operational costs. While a few proposals on SDN southbound protocols designed for WSN are found in the literature, they lack adequate performance analysis. In this paper, we review ITSDN main features and present a performance evaluation with all the sensing nodes transmitting data periodically. We conducted a number of experiments varying the number of nodes and assessing the impact of flow table maximum capacity. We assessed the metrics of data delivery, data delay, control overhead and energy consumption in order to show the tradeoffs of using IT-SDN in comparison to the IETF RPL routing protocol. We discuss the main challenges still faced by IT-SDN in larger WSN, and how they could be addressed to make IT-SDN use worthwhile.}
    }

 Open Access 

Identifying Malicious Nodes in Multihop IoT Networks using Dual Link Technologies and Unsupervised Learning

Xin Liu, Mai Abdelhakim, Prashant Krishnamurthy, David Tipper

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 109-125, 2018, Downloads: 3403, Citations: 3

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519310495220214 | GNL-LP: 1163928577 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Packet manipulation attack is one of the challenging threats in cyber-physical systems (CPSs) and Internet of Things (IoT), where information packets are corrupted during transmission by compromised devices. These attacks consume network resources, result in delays in decision making, and could potentially lead to triggering wrong actions that disrupt an overall system's operation. Such malicious attacks as well as unintentional faults are difficult to locate/identify in a large-scale mesh-like multihop network, which is the typical topology suggested by most IoT standards. In this paper, first, we propose a novel network architecture that utilizes powerful nodes that can support two distinct communication link technologies for identification of malicious networked devices (with typical singlelink technology). Such powerful nodes equipped with dual-link technologies can reveal hidden information within meshed connections that is hard to otherwise detect. By applying machine intelligence at the dual-link nodes, malicious networked devices in an IoT network can be accurately identified. Second, we propose two techniques based on unsupervised machine learning, namely hard detection and soft detection, that enable dual-link nodes to identify malicious networked devices. Our techniques exploit network diversity as well as the statistical information computed by dual-link nodes to identify the trustworthiness of resource-constrained devices. Simulation results show that the detection accuracy of our algorithms is superior to the conventional watchdog scheme, where nodes passively listen to neighboring transmissions to detect corrupted packets. The results also show that as the density of the dual-link nodes increases, the detection accuracy improves and the false alarm rate decreases.

BibTex:

    @Article{OJIOT_2018v4i1n09_XinLiu,
        title     = {Identifying Malicious Nodes in Multihop IoT Networks using Dual Link Technologies and Unsupervised Learning},
        author    = {Xin Liu and
                     Mai Abdelhakim and
                     Prashant Krishnamurthy and
                     David Tipper},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {109--125},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519310495220214},
        urn       = {urn:nbn:de:101:1-2018080519310495220214},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Packet manipulation attack is one of the challenging threats in cyber-physical systems (CPSs) and Internet of Things (IoT), where information packets are corrupted during transmission by compromised devices. These attacks consume network resources, result in delays in decision making, and could potentially lead to triggering wrong actions that disrupt an overall system's operation. Such malicious attacks as well as unintentional faults are difficult to locate/identify in a large-scale mesh-like multihop network, which is the typical topology suggested by most IoT standards. In this paper, first, we propose a novel network architecture that utilizes powerful nodes that can support two distinct communication link technologies for identification of malicious networked devices (with typical singlelink technology). Such powerful nodes equipped with dual-link technologies can reveal hidden information within meshed connections that is hard to otherwise detect. By applying machine intelligence at the dual-link nodes, malicious networked devices in an IoT network can be accurately identified. Second, we propose two techniques based on unsupervised machine learning, namely hard detection and soft detection, that enable dual-link nodes to identify malicious networked devices. Our techniques exploit network diversity as well as the statistical information computed by dual-link nodes to identify the trustworthiness of resource-constrained devices. Simulation results show that the detection accuracy of our algorithms is superior to the conventional watchdog scheme, where nodes passively listen to neighboring transmissions to detect corrupted packets. The results also show that as the density of the dual-link nodes increases, the detection accuracy improves and the false alarm rate decreases.}
    }

 Open Access 

Techniques for the Generation of Arbitrary Three-Dimensional Shapes in Tile-Based Self-Assembly Systems

Florian-Lennert Lau, Kristof Stahl, Stefan Fischer

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 126-134, 2018, Downloads: 2800, Citations: 3

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519311410579164 | GNL-LP: 1163928593 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: A big challenge in nanorobotics is the construction of nanoscale objects. DNA is a bio-compatible tool to reliably and constructively create objects at the nanoscale. A possible tool to build nano-sized structures are tile-based self-assembly systems on the basis of DNA. It is challenging and time-consuming to efficiently design blueprints for the desired objects. This paper presents basic algorithms for the creation of tilesets for nxnxn-cubes in the aTAM model. Only few publications focus on three-dimensional DNA crystals. Three-dimensional shapes are likely to be of more use in nanorobotics. We present three variations: hollow cubes, cube-grids and filled cubes. The paper also presents a basic algorithm to create arbitrary, finite, connected, three-dimensional and predefined shapes at temperature 1, as well as ideas for more efficient algorithms. Among those are algorithms for spheres, ellipsoids, red blood cells and other promising designs. The algorithms and tilesets are tested/verified using a software that has been developed for the purpose of verifying three-dimensional sets of tiletypes and was influenced by the tool ISU TAS. Others can use the simulator and the algorithms to quickly create sets of tiletypes for their desired nanostructures. A long learning process may thus be omitted.

BibTex:

    @Article{OJIOT_2018v4i1n10_Lau,
        title     = {Techniques for the Generation of Arbitrary Three-Dimensional Shapes in Tile-Based Self-Assembly Systems},
        author    = {Florian-Lennert Lau and
                     Kristof Stahl and
                     Stefan Fischer},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {126--134},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519311410579164},
        urn       = {urn:nbn:de:101:1-2018080519311410579164},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {A big challenge in nanorobotics is the construction of nanoscale objects. DNA is a bio-compatible tool to reliably and constructively create objects at the nanoscale. A possible tool to build nano-sized structures are tile-based self-assembly systems on the basis of DNA. It is challenging and time-consuming to efficiently design blueprints for the desired objects. This paper presents basic algorithms for the creation of tilesets for nxnxn-cubes in the aTAM model. Only few publications focus on three-dimensional DNA crystals. Three-dimensional shapes are likely to be of more use in nanorobotics. We present three variations: hollow cubes, cube-grids and filled cubes. The paper also presents a basic algorithm to create arbitrary, finite, connected, three-dimensional and predefined shapes at temperature 1, as well as ideas for more efficient algorithms. Among those are algorithms for spheres, ellipsoids, red blood cells and other promising designs. The algorithms and tilesets are tested/verified using a software that has been developed for the purpose of verifying three-dimensional sets of tiletypes and was influenced by the tool ISU TAS. Others can use the simulator and the algorithms to quickly create sets of tiletypes for their desired nanostructures. A long learning process may thus be omitted.}
    }

 Open Access 

Towards Intrinsic Molecular Communication Using Isotopic Isomerism

Gunther Ardelt, Christoph Külls, Horst Hellbrück

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 135-143, 2018, Downloads: 2628, Citations: 3

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519312150952526 | GNL-LP: 1163928607 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: In this paper we introduce a new approach for molecular communication (MC). The proposed method uses isotopomers as symbols in a communication scenario, and we name this approach isotopic molecular communication (IMC). We propose a modulation scheme based on isotopic isomerism, where symbols are encoded via isotopes in molecules. This can be advantageous in applications where the communication has to be independent from chemical molecular concentration. Application scenarios include nano communications with isotopes in a macroscopic environment, i.e. encoding freshwater flow of rivers or drinking water utilities, or medical applications where blood carries isotopomers used for communication in a human or animal body. We simulate the capacity of communication in the sense of symbols per second and maximum symbol rate for different applications. We provide estimations for the symbol rate per distance and we demonstrate the feasibility to identify isotopes reliably. In summary, this isotopic molecular communication is a new paradigm for data transfer independent from molecular concentrations and chemical reactions, and can provide higher throughput than ordinary molecular communications.

BibTex:

    @Article{OJIOT_2018v4i1n11_Ardelt,
        title     = {Towards Intrinsic Molecular Communication Using Isotopic Isomerism},
        author    = {Gunther Ardelt and
                     Christoph K{\"u}lls and
                     Horst Hellbr{\"u}ck},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {135--143},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519312150952526},
        urn       = {urn:nbn:de:101:1-2018080519312150952526},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {In this paper we introduce a new approach for molecular communication (MC). The proposed method uses isotopomers as symbols in a communication scenario, and we name this approach isotopic molecular communication (IMC). We propose a modulation scheme based on isotopic isomerism, where symbols are encoded via isotopes in molecules. This can be advantageous in applications where the communication has to be independent from chemical molecular concentration. Application scenarios include nano communications with isotopes in a macroscopic environment, i.e. encoding freshwater flow of rivers or drinking water utilities, or medical applications where blood carries isotopomers used for communication in a human or animal body. We simulate the capacity of communication in the sense of symbols per second and maximum symbol rate for different applications. We provide estimations for the symbol rate per distance and we demonstrate the feasibility to identify isotopes reliably. In summary, this isotopic molecular communication is a new paradigm for data transfer independent from molecular concentrations and chemical reactions, and can provide higher throughput than ordinary molecular communications.}
    }

 Open Access 

Dynamic Allocation of Smart City Applications

Igor Miladinovic, Sigrid Schefer-Wenzl

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 144-149, 2018, Downloads: 3013, Citations: 5

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519320192483088 | GNL-LP: 1163928623 | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Cities around the world are evaluating the potential of Internet of Things (IoT) to automate and optimize public services. Cities that implement this approach are commonly referred to as smart cities. A smart city IoT architecture needs to be layered and scalable in order to fulfill not only today's but also future needs of smart cities. Network Function Virtualization (NFV) provides the scale and flexibility necessary for smart city services by enabling the automated control, management and orchestration of network resources. In this paper we consider a scalable, layered, NFV based smart city architecture and discuss the optimal location of applications regarding cloud computing and mobile edge computing (MEC). Introducing a novel concept of dynamic application allocation we show how to fully benefit from MEC and present relevant decision criteria.

BibTex:

    @Article{OJIOT_2018v4i1n12_Miladinovic,
        title     = {Dynamic Allocation of Smart City Applications},
        author    = {Igor Miladinovic and
                     Sigrid Schefer-Wenzl},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {144--149},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519320192483088},
        urn       = {urn:nbn:de:101:1-2018080519320192483088},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Cities around the world are evaluating the potential of Internet of Things (IoT) to automate and optimize public services. Cities that implement this approach are commonly referred to as smart cities. A smart city IoT architecture needs to be layered and scalable in order to fulfill not only today's but also future needs of smart cities. Network Function Virtualization (NFV) provides the scale and flexibility necessary for smart city services by enabling the automated control, management and orchestration of network resources. In this paper we consider a scalable, layered, NFV based smart city architecture and discuss the optimal location of applications regarding cloud computing and mobile edge computing (MEC). Introducing a novel concept of dynamic application allocation we show how to fully benefit from MEC and present relevant decision criteria.}
    }

 Open Access 

Semantic Caching Framework: An FPGA-Based Application for IoT Security Monitoring

Laurent d'Orazio, Julien Lallet

Open Journal of Internet Of Things (OJIOT), 4(1), Pages 150-157, 2018, Downloads: 3425, Citations: 7

Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.

Full-Text: pdf | URN: urn:nbn:de:101:1-2018080519321445601568 | GNL-LP: 116392864X | Meta-Data: tex xml rdf rss | Show/Hide Abstract | Show/Hide BibTex

Abstract: Security monitoring is one subdomain of cybersecurity which aims to guarantee the safety of systems, continuously monitoring unusual events. The development of Internet Of Things leads to huge amounts of information, being heterogeneous and requiring to be efficiently managed. Cloud Computing provides software and hardware resources for large scale data management. However, performances for sequences of on-line queries on long term historical data may be not compatible with the emergency security monitoring. This work aims to address this problem by proposing a semantic caching framework and its application to acceleration hardware with FPGA for fast- and accurate-enough logs processing for various data stores and execution engines.

BibTex:

    @Article{OJIOT_2018v4i1n13_Orazio,
        title     = {Semantic Caching Framework: An FPGA-Based Application for IoT Security Monitoring},
        author    = {Laurent d'Orazio and
                     Julien Lallet},
        journal   = {Open Journal of Internet Of Things (OJIOT)},
        issn      = {2364-7108},
        year      = {2018},
        volume    = {4},
        number    = {1},
        pages     = {150--157},
        note      = {Special Issue: Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2018) in conjunction with the VLDB 2018 Conference in Rio de Janeiro, Brazil.},
        url       = {http://nbn-resolving.de/urn:nbn:de:101:1-2018080519321445601568},
        urn       = {urn:nbn:de:101:1-2018080519321445601568},
        publisher = {RonPub},
        bibsource = {RonPub},
        abstract = {Security monitoring is one subdomain of cybersecurity which aims to guarantee the safety of systems, continuously monitoring unusual events. The development of Internet Of Things leads to huge amounts of information, being heterogeneous and requiring to be efficiently managed. Cloud Computing provides software and hardware resources for large scale data management. However, performances for sequences of on-line queries on long term historical data may be not compatible with the emergency security monitoring. This work aims to address this problem by proposing a semantic caching framework and its application to acceleration hardware with FPGA for fast- and accurate-enough logs processing for various data stores and execution engines.}
    }

OJIOT Publication Fees

All articles published by RonPub are fully open access and online available to readers free of charge. To be able to provide open access journals, RonPub defrays the costs (induced by processing and editing of manuscripts, provision and maintenance of infrastructure, and routine operation and management of journals) by charging an one-time publication fee for each accepted article. In order to ensure that the fee is never a barrier to publication, RonPub offers a fee waiver for authors from low-income countries. Authors who do not have funds to cover publication fees should submit an application during the submission process. Applications of waiver will be examined on a case by case basis. The scientific committee members of RonPub are entitled a partial waiver of the standard publication fees as reward for their work. 

  • Standard publication fee: 338 Euro (excluding tax).
  • Authors from the low-income countries: 71% waiver of the standard publication fee. (Note: The list is subject to change based on the data of the World Bank Group.):
    Afghanistan, Bangladesh, Benin, Bhutan, Bolivia (Plurinational State of), Burkina Faso, Burundi, Cambodia, Cameroon, Central African Republic, Chad, Comoros, Congo (Democratic Republic), Côte d'Ivoire, Djibouti, Eritrea, Ethiopia, Gambia, Ghana, Guinea, Guinea-Bissau, Haiti, Honduras, Kenya, Kiribati, Korea (Democratic People’s Republic), Kosovo, Kyrgyz Republic, Lao (People’s Democratic Republic), Lesotho, Liberia, Madagascar, Malawi, Mali, Mauritania, Micronesia (Federated States of), Moldova, Morocco, Mozambique, Myanmar, Nepal, Nicaragua, Niger, Nigeria, Papua New Guinea, Rwanda, Senegal, Sierra Leone, Solomon Islands, Somalia, South Sudan, Sudan, Swaziland, Syrian Arab Republic, São Tomé and Principe, Tajikistan, Tanzania, Timor-Leste, Togo, Uganda, Uzbekistan, Vietnam, West Bank and Gaza Strip, Yemen (Republic), Zambia, Zimbabwe
  • Scientific committee members: 25% waiver of the standard publication fee.
  • Guest editors and reviewers: 25% waiver of the standard publication fee for one year.

Payments are subject to tax. A German VAT (value-added tax) at 19% will be charged if applicable. US and Canadian customers need to provide their sales tax number and their certificate of incorporation to be exempt from the VAT charge; European Union customers (not German customers) need to provide their VAT to be exempt from the VAT charge. Customers from Germany and other countries will be charged with the VAT charge. Individuals are not eligible for tax exempt status.

Editors and reviewers have no access to payment information. The inability to pay will not influence the decision to publish a paper; decisions to publish are only based on the quality of work and the editorial criteria.

OJIOT Indexing

In order for our publications getting widely abstracted, indexed and cited, the following methods are employed:

  • Various meta tags are embedded in each publication webpage, including Google Scholar Tags, Dublic Core, EPrints, BE Press and Prism. This enables crawlers of e.g. Google Scholar to discover and index our publications.
  • Different metadata export formats are provided for each article, including BibTex, XML, RSS and RDF. This makes readers to cite our papers easily.
  • An OAI-PMH interface is implemented, which facilitates our article metadata harvesting by indexing services and databases.

The paper Getting Indexed by Bibliographic Databases in the Area of Computer Science provides a comprehensive survey on indexing formats, techniques and databases. We will also continue our efforts on dissemination and indexing of our publications.

OJIOT has been indexed by the following libraries and bibliographic databases:

Submission to Open Journal of Internet of Things (OJIOT)

Please submit your manuscript by carefully filling in the information in the following web form. If there technical problems, you may also submit your manuscript by sending the information and the manuscript to .

Submission to Regular or Special Issue

Please specify if the paper is submitted to a regular issue or one of the special issues:

Type of Paper

Please specify the type of your paper here. Please check Aims & Scope if you are not sure of which type your paper is.





Title

Please specify the title of your paper here:

Abstract

Please copy & paste the abstract of your paper here:

Authors

Please provide necessary information about the authors of your submission here. Please mark the contact authors, which will be contacted for the main correspondence.

Author 1:


Name:
EMail:
Affiliation:
Webpage (optional):

Author 2:


Name:
EMail:
Affiliation:
Webpage (optional):

Author 3:


Name:
EMail:
Affiliation:
Webpage (optional):

Add Author

Conflicts of Interest

Please specify any conflicts of interests here. Conflicts of interest occur e.g. if the author and the editor are colleagues, work or worked closely together, or are relatives.

Suggestion of Editors (Optional)

You can suggest editors (with scientific background of the topics addressed in your submission) for handling your submission. The Editor-in-Chief may consider your suggestion, but may also choose another editor.

Suggestion of Reviewers (Optional)

You can suggest reviewers (with scientific background of the topics addressed in your submission) for handling your submission. The editor of your submission may consider your suggestion, but may also choose other or additional reviewers in order to guarantee an independent review process.

Reviewer 1:

Name:
EMail:
Affiliation:
Webpage (optional):

Reviewer 2:

Name:
EMail:
Affiliation:
Webpage (optional):

Reviewer 3:

Name:
EMail:
Affiliation:
Webpage (optional):

Add Reviewer

Paper upload

Please choose your manuscript file for uploading. It should be a pdf file. Please take care that your manuscript is formatted according to the templates provided by RonPub, which are available at our Author Guidelines page. Manuscripts not formatted according to our RonPub templates will be rejected without review!

If you wish that the reviewer are not aware of your name, please submit a blinded manuscript leaving out identifiable information like authors' names and affiliations.

Choose PDF file...

Chosen PDF file: none

Captcha

Please fill in the characters of the image into the text field under the image.

Captcha

Submission

For Authors

Manuscript Preparation

Authors should first read the author guidelines of the corresponding journal. Manuscripts must be prepared using the manuscript template of the respective journal. It is available as word and latex version for download at the Author Guidelines of the corresponding journal page. The template describes the format and structure of manuscripts and other necessary information for preparing manuscripts. Manuscripts should be written in English. There is no restriction on the length of manuscripts.

Submission

Authors submit their manuscripts via the submit page of the corresponding journal. Authors first submit their manuscripts in PDF format. Once a manuscript is accepted, the author then submits the revised manuscript as PDF file and word file or latex folder (with all the material necessary to generate the PDF file). The work described in the submitted manuscript must be previously unpublished; it is not under consideration for publication anywhere else. 

Authors are welcome to suggest qualified reviewers for their papers, but this is not mandatory. If the author wants to do so, please provide the name, affiliations and e-mail addresses for all suggested reviewers.

Manuscript Status

After submission of manuscripts, authors will receive an email to confirm receipt of manuscripts within a few days. Subsequent enquiries concerning paper progress should be made to the corresponding editorial office (see individual journal webpage for concrete contact information).

Review Procedure

RonPub is committed to enforcing a rigorous peer-review process. All manuscripts submitted for publication in RonPub journals are strictly and thoroughly peer-reviewed. When a manuscript is submitted to a RonPub journal, the editor-in-chief of the journal assigns it to an appropriate editor who will be in charge of the review process of the manuscript. The editor first suggests potential reviewers and then organizes the peer-reviewing herself/himself or entrusts it to the editor office. For each manuscript, typically three review reports will be collected. The editor and the editor-in-chief evaluate the manuscript itself and the review reports and make an accept/revision/reject decision. Authors will be informed with the decision and reviewing results within 6-8 weeks on average after the manuscript submission. In the case of revision, authors are required to perform an adequate revision to address the concerns from evaluation reports. A new round of peer-review will be performed if necessary.

Accepted manuscripts are published online immediately.

Copyrights

Authors publishing with RonPub open journals retain the copyright to their work. 

All articles published by RonPub is fully open access and online available to readers free of charge.  RonPub publishes all open access articles under the Creative Commons Attribution License,  which permits unrestricted use, distribution and reproduction freely, provided that the original work is properly cited.

Digital Archiving Policy

Our publications have been archived and permanently-preserved in the German National Library. The publications, which are archived in the German National Library, are not only long-term preserved but also accessible in the future, because the German National Library ensures that digital data saved in the old formats can be viewed and used on current computer systems in the same way they were on the original systems which are long obsolete. Further measures will be taken if necessary. Furthermore, we also encourage our authors to self-archive their articles published on the website of RonPub.

For Editors

About RonPub

RonPub is academic publisher of online, open access, peer-reviewed journals. All articles published by RonPub is fully open access and online available to readers free of charge.

RonPub is located in Lübeck, Germany. Lübeck is a beautiful harbour city, 60 kilometer away from Hamburg.

Editor-in-Chief Responsibilities

The Editor-in-Chief of each journal is mainly responsible for the scientific quality of the journal and for assisting in the management of the journal. The Editor-in-Chief suggests topics for the journal, invites distinguished scientists to join the editorial board, oversees the editorial process, and makes the final decision whether a paper can be published after peer-review and revisions.

As a reward for the work of a Editor-in-Chief, the Editor-in-Chief will obtain a 25% discount of the standard publication fee for her/his papers (the Editor-in-Chief is one of authors) published in any of RonPub journals.

Editors’ Responsibilities

Editors assist the Editor-in-Chief in the scientific quality and in decision about topics of the journal. Editors are also encouraged to help to promote the journal among their peers and at conferences. An editor invites at least three reviewers to review a manuscript, but may also review him-/herself the manuscript. After carefully evaluating the review reports and the manuscript itself, the editor makes a commendation about the status of the manuscript. The editor's evaluation as well as the review reports are then sent to EiC, who make the final decision whether a paper can be published after peer-review and revisions. 

The communication with Editorial Board members is done primarily by E-mail, and the Editors are expected to respond within a few working days on any question sent by the Editorial Office so that manuscripts can be processed in a timely fashion. If an editor does not respond or cannot process the work in time, and under some special situations, the editorial office may forward the requests to the Publishers or Editor-in-Chief, who will take the decision directly.

As a reward for the work of editors, an editor will obtain a 25% discount of the standard publication fee for her/his papers (the editor is one of authors) published in any of RonPub journals.

Guest Editors’ Responsibilities

Guest Editors are responsible of the scientific quality of their special issues. Guest Editors will be in charge of inviting papers, of supervising the refereeing process (each paper should be reviewed at least by three reviewers), and of making decisions on the acceptance of manuscripts submitted to their special issue. As regular issues, all accepted papers by (guest) editors will be sent to the EiC of the journal, who will check the quality of the papers, and make the final decsion whether a paper can be published.

Our editorial office will have the right directly asking authors to revise their paper if there are quality issues, e.g. weak quality of writing, and missing information. Authors are required to revise their paper several times if necessary. A paper accepted by it's quest editor may be rejected by the EiC of the journal due to a low quality. However, this occurs only when authors do not really take efforts to revise their paper. A high-quality publication needs the common efforts from the journal, reviewers, editors, editor-in-chief and authors.

The Guest Editors are also expected to write an editorial paper for the special issue. As a reward for work, all guest editors and reviewers working on a special issue will obtain a 25% discount of the standard publication fee for any of their papers published in any of RonPub journals for one year.

Reviewers’ Responsiblity

A reviewer is mainly responsible for reviewing of manuscripts, writing reviewing report and suggesting acception or deny of manuscripts. Reviews are encouraged to provide input about the quality and management of the journal, and help promote the journal among their peers and at conferences.  

Upon the quality of reviewing work, a reviewer will have the potential to be promoted to a full editorial board member. 

As a reward for the reviewing work, a reviewer will obtain a 25% discount of the standard publication fee for her/his papers (the review is one of authors) published in any of RonPub journals.

Launching New Journals

RonPub always welcomes suggestions for new open access journals in any research area. We are also open for publishing collaborations with research societies. Please send your proposals for new journals or for publishing collaboration to This email address is being protected from spambots. You need JavaScript enabled to view it. .

Publication Criteria

This part provides important information for both the scientific committees and authors.

Ethic Requirement:

For scientific committees: Each editor and reviewer should conduct the evaluation of manuscripts objectively and fairly.
For authors: Authors should present their work honestly without fabrication, falsification, plagiarism or inappropriate data manipulation.

Pre-Check:

In order to filter fabricated submissions, the editorial office will check the authenticity of the authors and their affiliations before a peer-review begins. It is important that the authors communicate with us using the email addresses of their affiliations and provide us the URL addresses of their affiliations. To verify the originality of submissions, we use various plagiarism detection tools to check the content of manuscripts submitted to our journal against existing publications. The overall quality of paper will be also checked including format, figures, tables, integrity and adequacy. Authors may be required to improve the quality of their paper before sending it out for review. If a paper is obviously of low quality, the paper will be directly rejected.

Acceptance Criteria:

The criteria for acceptance of manuscripts are the quality of work. This will concretely be reflected in the following aspects:

  • Novelty and Practical Impact
  • Technical Soundness
  • Appropriateness and Adequacy of 
    • Literature Review
    • Background Discussion
    • Analysis of Issues
  • Presentation, including 
    • Overall Organization 
    • English 
    • Readability

For a contribution to be acceptable for publication, these points should be at least in middle level.

Guidelines for Rejection:

  • If the work described in the manuscript has been published, or is under consideration for publication anywhere else, it will not be evaluated.
  • If the work is a plagiarism, or contains data falsification or fabrication, it will be rejected.
  • Manuscripts, which have seriously technical flaws, will not be accepted.

Call for Journals

Research Online Publishing (RonPub, www.ronpub.com) is a publisher of online, open access and peer-reviewed scientific journals.  For more information about RonPub please visit this link.

RonPub always welcomes suggestions for new journals in any research area. Please send your proposals for journals along with your Curriculum Vitae to This email address is being protected from spambots. You need JavaScript enabled to view it. .

We are also open for publishing collaborations with research societies. Please send your publishing collaboration also to This email address is being protected from spambots. You need JavaScript enabled to view it. .

Be an Editor / Be a Reviewer

RonPub always welcomes qualified academicians and practitioners to join as editors and reviewers. Being an editor/a reviewer is a matter of prestige and personnel achievement. Upon the quality of reviewing work, a reviewer will have the potential to be promoted to a full editorial board member.

If you would like to participate as a scientific committee member of any of RonPub journals, please send an email to This email address is being protected from spambots. You need JavaScript enabled to view it. with your curriculum vitae. We will revert back as soon as possible. For more information about editors/reviewers, please visit this link.

Contact RonPub

Location

RonPub UG (haftungsbeschränkt)
Hiddenseering 30
23560 Lübeck
Germany

Comments and Questions

For general inquiries, please e-mail to This email address is being protected from spambots. You need JavaScript enabled to view it. .

For specific questions on a certain journal, please visit the corresponding journal page to see the email address.