Skip to main content
Log in

Managed Ecosystems of Networked Objects

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Small embedded devices such as sensors and actuators will become the cornerstone of the Future Internet. To this end, generic, open and secure communication and service platforms are needed in order to be able to exploit the new business opportunities these devices bring. In this paper, we evaluate the current efforts to integrate sensors and actuators into the Internet and identify the limitations at the level of cooperation of these Internet-connected objects and the possible intelligence at the end points. As a solution, we propose the concept of Managed Ecosystem of Networked Objects, which aims to create a smart network architecture for groups of Internet-connected objects by combining network virtualization and clean-slate end-to-end protocol design. The concept maps to many real-life scenarios and should empower application developers to use sensor data in an easy and natural way. At the same time, the concept introduces many new challenging research problems, but their realization could offer a meaningful contribution to the realization of the Internet of Things.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Perez A. J., Labrador M. A., Barbeau S. J. (2010) G-sense: A scalable architecture for global sensing and monitoring. IEEE Network 24(4): 57–64

    Article  Google Scholar 

  2. FP7 SPITFIRE project, http://www.spitfire-project.eu/.

  3. Mosharaf Kabir Chowdhury N. M., Boutaba R. (2009) Network virtualization: State of the art and research challenges. IEEE Communications Magazine 47(7): 20–26

    Article  Google Scholar 

  4. Hoebeke J., Holderbeke G., Moerman I., Dhoedt B., Demeester P. (2006) Virtual private ad hoc networking. Wireless Personal Communications 38(1): 125–141

    Article  Google Scholar 

  5. Marco, Z., & Bhaskar, K. (2003). Integrating future large-scale wireless sensor networks with the internet. USC Computer Science Technical Report CS 03-792.

  6. Dunkels, A., & Vasseur, J. P. (2008). IP for smart objects, white paper.

  7. Mayer, K., & Fritsche, W. (2006). IP-enabled wireless sensor networks and their integration into the internet. In: Proceedings of the First International Conference on Integrated Internet Ad Hoc and Sensor Networks, InterSense ‘06. (Vol. 138). France.

  8. uIP TCP/IP stack, http://www.sics.se/~adam/uip/index.php/Main_Page.

  9. Montenegro, G., Kushalnagar, N., Hui, J., & Culler, D. (2007). Transmission of IPv6 Packets over IEEE 802.15.4 Networks. RFC 4944.

  10. Chakrabarti, S., & Schelby, Z. (2009). 6LoWPAN neighbor discovery: A highlevel overview, white paper.

  11. Hui, J. W., Culler, D. (2008). IP is dead, long live IP for wireless sensor networks. In: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, SenSys ‘08 (pp. 15–28). USA.

  12. Chen M., Mao S., Xiao Y., Li M., Leung V.C.M. (2008) IPSA: A novel architecture design for integrating IP and sensor networks. International Journal of Sensor Networks 5(1): 48–57

    Article  Google Scholar 

  13. FP7 SENSEI project, D1.3, State of the art—sensor frameworks and Future Internet.

  14. FP7 SENSEI project. http://www.ict-sensei.org/.

  15. Malan, D. J., Welsh, M., & Smith, M. D. (2004). A public key infrastructure for key distribution in tinyOS based on elliptic curve cryptography. In: Proceedings of 1st IEEE Conference on Sensor and Ad Hoc Communications and Networks. USA.

  16. Menezes A. J. (1993) Elliptic curve public key cryptosystems. Kluwer Academic Publishers, Boston

    MATH  Google Scholar 

  17. Amin, F., Jahangir, A. H., & Rasifard, H. (2008). Analysis of public-key cryptography for wireless sensor networks security. In: Proceedings of World Academy of Science, Engineering and Technology. (Vol. 31).

  18. Uhsadel, L., Poschmann, A., & Paar, C. (2007). Enabling full-size public-key algorithms on 8-bit sensor nodes. In: Proceedings of ESAS 2007, (Vol. 4572 of LNCS, pp. 73–86).

  19. Piotrowski, K., Langendoerfer, P., & Peter, S. (2006). How public key cryptography influences wireless sensor node lifetime. In: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (pp. 169–176). USA

  20. Liu D., Ning P., Li R. (2005) Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information Systems Security 8(1): 41–47

    Article  Google Scholar 

  21. Zhu, S., Setia, S., Jajodia, S. (2003). LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, USA (pp. 62–72)

  22. Chan, H., Perrig, A. (2005). PIKE: Peer intermediaries for key establishment in sensor networks. In: Proceedings of IEEE INFOCOM, (Vol. 1, pp. 524–535).

  23. Kohler E., Morris R., Chen B., Jannotti J., Kaashoek M. F. (2000) The click modular router. ACM Transactions on Computer Systems 18(3): 263–297

    Article  Google Scholar 

  24. De Poorter, E., Moerman, I., Demeester, P. (2009). An information driven sensornet architecture. In: Proceedings of The Third International Conference on Sensor Technologies and Applications, SensorComm.

  25. FP7 IoT-A project. http://www.iot-a.eu.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jeroen Hoebeke.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hoebeke, J., De Poorter, E., Bouckaert, S. et al. Managed Ecosystems of Networked Objects. Wireless Pers Commun 58, 125–143 (2011). https://doi.org/10.1007/s11277-011-0292-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-011-0292-9

Keywords

Navigation