SlideShare a Scribd company logo
TELKOMNIKA, Vol.17, No.3, June 2019, pp.1385~1392
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v17i3.11793  1385
Received November 10, 2018; Revised January 30, 2019; Accepted February 28, 2019
Lightweight IoT middleware for rapid
application development
A. Karim Mohamed Ibrahim1
, Rozeha A. Rashid*2
, A. Hadi Fikri A. Hamid3
,
M. Adib Sarijari4
, Muhammad Ariff Baharudin5
Advanced Telecommunication and Technology Research Group (ATT),
Department of Communication Engineering, Faculty of Electrical Engineering,
Universiti Teknologi Malaysia
*Corresponding author, e-mail: kemosom@gmail.com1
, rozeha@utm.my2
, hadifikri@gmail.com3
,
madib@utm.my4
, mariff@utm.my5
Abstract
Sensors connected to the cloud services equipped with data analytics has created a plethora of
new type of applications ranging from personal to an industrial level forming to what is known today as
Internet of Things (IoT). IoT-based system follows a pattern of data collection, data analytics, automation,
and system improvement recommendations. However, most applications would have its own unique
requirements in terms of the type of the smart devices, communication technologies as well as its
application provisioning service. In order to enable an IoT-based system, various services are
commercially available that provide services such as backend-as-a-service (BaaS) and
software-as-a-service (SaaS) hosted in the cloud. This, in turn, raises the issues of security and privacy.
However there is no plug-and-play IoT middleware framework that could be deployed out of the box for
on-premise server. This paper aims at providing a lightweight IoT middleware that can be used to enable
IoT applications owned by the individuals or organizations that effectively securing the data on-premise or
in remote server. Specifically, the middleware with a standardized application programming interface (API)
that could adapt to the application requirements through high level abstraction and interacts with the
application service provider is proposed. Each API endpoint would be secured using Access Control List
(ACL) and easily integratable with any other modules to ensure the scalability of the system as well as
easing system deployment. In addition, this middleware could be deployed in a distributed manner and
coordinate among themselves to fulfil the application requirements. A middleware is presented in this
paper with GET and POST requests that are lightweight in size with a footprint of less than 1 KB and a
round trip time of less than 1 second to facilitate rapid application development by individuals or
organizations for securing IoT resources.
Keywords: application programming protocol (API), Internet of Things (IoT), middlewar
Copyright © 2019 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
The internet paradigm has evolved from digital connection connecting computers to
connecting people, thus creating social interactions and bringing humans closer to each other.
Presently, the internet and the things such as, sensors, actuators, and smart devices have created
an ecosystem called The Internet of Things (IoT), which is the next technological revolution since
the internet [1-4]. The term IoT is mainly used to refer, the network of smart things connected by
internet, the enabling technologies, such as machine-to-machine communication, RFID, Wireless
sensor Network (WSN), sensors/actuators, and the set of applications that embraces the vision of
this technology to open up a new business frontier [4, 5].
IoT has a layered architecture to meet the requirements and demands of the industries
and society. Although there is no consensus on the layered architecture, Figure 1 show the
conventional generally accepted layered model for IoT to encapsulate the idea in a structured
manner. It consists of the followings: the edge layer which contains the physical abstraction
layer that represents objects such as smartphones, sensors and actuators responsible for edge
functionalities such as collecting information and providing point to point communication
support. On top of the edge layer is the gateway layer. This layer focuses on exposing the edge
devices to a larger network while providing the connected edge devices an end to end
connectivity. On top of it is the middleware layer which is responsible for bridging the devices
and becomes the gateway to the application layer and to ensure a seamless operation between
the application layer and the edge layer. Finally, the application layer is the interface to a service
 ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 3, June 2019: 1385-1392
1386
provider or the IoT user, and it is responsible for providing application services based on the
user or service provider requirements [6].
Figure 1. Basic layered model for IoT
IoT has helped in fostering the development in various industries, such as
healthcare [7], industrial applications [8], agriculture [9], smart cities [10], and home appliances.
In these landscapes, IoT devices provide crucial data to the respective industry players by
sensing and communicating the data to the business entities for better understanding of the
nature of their businesses as well as for providing services to the public and companies [11-13].
Network providers, internet engineers, and data analysts agreed that the number of connected
devices will increase rapidly in the coming years [14]. According to Cisco IBSG, IoT will have
more than 40 billion connected objects in 2020. With the plethora of connected devices, IoT
platforms have been introduced, such as Google Cloud Platform [15], IBM BlueMix, and
ThingWorx which help to create and deploy IoT applications [16]. Normally, a platform comes in
a complete package which consists of hardware and software. IoT middleware, on the other
hand, is the glue between devices and applications, a type of distributed system that provides
services to devices. According to [17], IoT middleware has several merits in IoT world. These
include providing a chain combining effect for IoT heterogeneous components, management of
data as well as enabling an abstraction of physical layer while hiding all the details and
complexity stemmed from the disparate technologies that make up the IoT ecosystem.
To enable IoT application, one of these services must be available such as Platform as
a Service (PaaS,) Software as a Service (SaaS) and Backend as Service (BaaS). For business
entities and consumers alike, this could potentially result in a huge security problems [18, 19].
Sharing resources is a sensitive matter that should be handled carefully. Furthermore, owing to
the fact that every IoT application has its own requirement, it is difficult for some companies or
individuals to use the generic services provided by the available platforms due to the general
workflow provided by most platforms do not conform to their requirements. For example, some
platforms are specific to one domain such as healthcare or agriculture which has different
requirements such as data latency and privacy as well as approach. To overcome these issues,
a lightweight IoT backend that makes an IoT application feasible and programmable by
individuals who are not necessarily experts in pervasive computing is proposed. Almost
everything on the internet requires a lightweight IoT due to the fact that most devices are
resource constrained [20, 21]. According to [17], several IoT middlewares have been developed
but a lightweight plug-and-play IoT backend is still lacking. In this paper, we propose a
future-proof lightweight IoT backend that can be hosted in any on-premise data center for the
purposes of securing the resources, avoiding the pitfall of cloud services and facilitates a
mechanism for resource sharing in an efficient manner.
The remainder of this paper is organized as follows. First, the motivation for the
implementation of lightweight IoT middleware and related works are presented in Section II.
Then, Section III introduces the representational state application programming interface (API)
and its role in IoT middleware. The methodology is discussed in Section IV, followed by the
preliminary results in Section IV. Lastly, the conclusion is drawn in Section V.
TELKOMNIKA ISSN: 1693-6930 
Lightweight IoT middleware for rapid application development (A. Karim Mohamed Ibrahim)
1387
2. Motivation
By 2020, IoT world is expected to have millions of connected things; the rapid expansion
of IoT market share creates business opportunities for industries [22]. This expansion requires a
precise and secure lightweight middleware that provides services for the devices and service
provid [23, 24]. Middleware is the crucial component of IoT and it lies between a bank of devices
and a cloud service [25]. In IoT, the system should run on edge devices and not in the cloud.
Therefore, at the edge or the border, an integration between connected devices and the cloud
service is necessary to facilitate the IoT ecosystem [26, 27]. Most companies use default hybrid
integration such as PaaS and SaaS. However, nowadays, the integration does not only depend on
the technology but different locations as well. Furthermore, the variety of communication protocols
and the amount of data that goes through the middleware requires a secure framework that
ensures smooth integration in IoT system. Currently, many IoT middlewares are widely deployed
in an environment that is subject to rules provided by the service providers with resource sharing
method known to others, which gives rise to security issue. Our scope of the research work is to
provide the developers with the necessary tools to access the web with respect to HTTP methods
using RESTful APIs with lightweightness in mind.
3. Related works
Many IoT middlewares are being deployed in tandem with the growth of IoT. Calvin [28],
an open source IoT middleware from Ericsson, is one of the few lightweight IoT middlewares.
Using proprietary programming model, Calvin provides minimum latency, and high CPU
utilization [16]. The limitation in Calvin is that it does not offer Graphical User Interface (GUI). The
security and device discovery also are not addressed. Ptolemy Accessor Host, is an
actor-oriented framework for modeling, simulating, and designing of concurrent, real-time,
embedded devices [29]. Like most of the middlewares, they follow the basic model of computation
which is data/event flow. In Ptolemy, guaranteed execution of real-time distributed IoT application
is provided. However, the limitation in Ptolemy is until now, it does not support device discovery.
Project Flogo [30] on the other hand is a ultra-lightweight middleware that focuses on edge
integration from device to gateway and from gateway to cloud. It is an open source middleware
that can run on devices and requires less than 5 MB memory space [30]. Project Flogo is written
in Golang programming language which is not as popular as Node.js. The community in Node.js
provides supportive libraries and codes. The related works are summarized in Table 1. In a
nutshell, the developers can make their own choices when developing the middleware.
Table 1. Summary of Related Works
No Title Author/year Description Limitation
1 Calvin—Merging cloud
and IoT [5].
P. Persson and
O. Angelsmark/
2015.
Aims to provide a unified
programming model which is
light-weight and portable.
No GUI.
Security and device
discovery are not
addressed.
2 A development platform
for integrating wireless
devices and sensors into
ambient intelligence
systems [10].
M. Eisenhauer,
P. Rosengren,
and P. Antolin/
2009
It provides support for using
devices as services by
embedding services in
devices.
Need for programmer.
It does not help the user to
quickly, create, search and
deploy data collection and
application analysis.
3 Edge Machine Learning
with Flogo [7].
Gaurav
Subhedar/2018.
An open source IoT
middleware, consumes 3MB
memory space.
Uses Golang programming
language.
Main focus of this project was
edge integrations.
The programming language
is not popular among
developers.
4 A visual tool for writing
the internet of things [11]
Node,RED
2015
An open-source IoT
middleware platform from IBM.
It is based on node.js
It provides a visual tool that
simplifies the job of composing
IoT devices
Limited security
Limited libraries and
modules
No device discovery
 ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 3, June 2019: 1385-1392
1388
4. Application Programming Interface (API)
According to [31], API is an interface to a software component that can be invoked at a
distance over a communications network using standards-based technologies. Applications use
APIs like we use web pages as an interface. In IoT, many sensors are connected and share
information with other entities in a relatively complex ecosystem. In such scenario, API provides
the mean of communicating between different entities while maintaining data integrity and
consistency. API is actually an old technology that came up first in 1970 because of distributed
systems, and then grew in popularity. In 2000, Roy Thomas introduced in his Ph.D dissertation
representational state transfer API (RESTful API) [31]. API provides great services to IoT world.
Designing an API is not a difficult matter, but designing an efficient one that meets business
requirements is not a trivial task. In an API, the customer is the developer, not the end user.
Figure 2 shows the importance of the API due to its sensitive position in developing process.
From Figure 2, business assets of a company can consist of products information, services, and
the developers who develop IoT applications. Therefore, the customer of an API is not the end
user but the developer. So designing an API that meets the developer’s requirement is the key
to effective API. By adding some sort of storage and a user interface like a web page,
a lightweight IoT middleware can be realized.
Figure 2. API lies in between two main attributes in IoT environment
5. Middleware Architecture
The proposed middleware could be deployed in a distributed manner and coordinate
between themselves to fulfill the application requirements. Application abstraction level in the
architecture of IoT middleware is usually used for providing an interface to applications, where
context analysis level and the remote database makes it necessary to have distributable IoT
middleware. The proposed middleware adopts the actor-based architecture described in [32].
The actor-based architecture shown in Figure 3 is based on lightweight middleware which
provides services as actors. The actor (functionality/services) can be deployed in all layers such
as sensors, mobile and cloud layer. For example, if a device in the sensor layer has a
actor-based middleware that lacks storage services, another actor-based middleware that has
storage service can be downloaded from the cloud [32].
Figure 3. Actor-based architecture
6. Research Methodology
In this section, the flow of the project will be explained. For this middleware, Node.js will
be used for simplicity as well as due to its un-opinionated nature. As a proof of-concept, one
endpoint and a hard-coded database are included. In addition, it can be connected to a local or
cloud-based database as well. Figure 4 shows a client which can be a web application and the
TELKOMNIKA ISSN: 1693-6930 
Lightweight IoT middleware for rapid application development (A. Karim Mohamed Ibrahim)
1389
RESTful server. The communication between the client and the server is sent via HTTP using
JavaScript Object Notation (JSON) format. Users can send requests using HTTP methods
available such as GET, POST, DELETE and PUT. There are also PATCH, HEAD, and
CONNECT requests. This paper will illustrate the use of GET, POST, PUT, and DELETE only.
Figure 5 shows the flow chart of the middleware, which is a server running on port 3000. Once a
request is made, the middleware will first handle any errors that are present. If there is none,
then the middleware chooses which route to take and processes it, then responds back
to the user.
Figure 4. General view of the middleware
Figure 5. Middleware flow chart
7. Results and Analysis
The middleware is structured as follows. First, the middleware was developed using
Node.js with JavaScript libraries and Node Package Manager (NPM) which is one of the largest
ecosystems of open source libraries and they reduce the complexity of creating a web
applications. Second, we show how GET, POST, PUT, and DELETE requests allow the user to
interact with the database resources. Then, we show the results of GET and POST requests
sent by the client to the database through the backend. The backend exposes its functionality
as an API. These sets of APIs are parsed with the data and they are addressable to the
clients/devices. The clients/devices are accessible through REST APIs provided by the IoT
 ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 3, June 2019: 1385-1392
1390
backend. Figure 6 shows a server set to listen on port 3000, and an environment variable port,
which is necessary for applications working in other environments. Figure 7 shows GET
request. It provides the functionality of retrieving the informations from a specified resource.
GET request is the most common HTTP request and it is usually used for retrieving
non-sensitive datadata. In this middleware, for proof of concept, it is allowed to retrieve all the
resources as shown in Figure 7.
Figure 6. Crating a server Figure 7. Get request
POST request is a sensitive request. It is used for adding content to the database.
As can be seen in Figure 8, if a post request is made, first the middleware will validate the
request. After validation, if there is no error, the middleware increases the database by index 1
and inserts the new post. PUT request is used for updating the content of the database as
shown in Figure 9. When a request is made for a specific project, the middleware looks for the
requested project in the database by using a respective identification (id). If there is no match,
the response of (404) which is an HTTP status code is returned with notation of Not Found.
Else, an update and a return acknowledgement of a new project is given. DELETE request
follows the same method. The requested project is searched in the database. If found, a return
acknowledgement on the deleted project is given. Figure 10 shows DELETE request for deleting
a specified resource.
Figure 8. Posting to database Figure 9. Updating specific project
Figure 10. Deleting project
In order to carry out the test and analyze the performance of the middleware, we use
POSTMAN software which is installed in HP laptop with 8GB RAM and Windows 10 OS. Also, the
TELKOMNIKA ISSN: 1693-6930 
Lightweight IoT middleware for rapid application development (A. Karim Mohamed Ibrahim)
1391
network used is an Ethernet connection with 17.3 MB download and 95.01 MB upload. POSTMAN
is used to test the endpoints and sends the requests and responses. The objective was to justify
that the middleware is lightweight by assessing the required time and the size of the response of
GET and POST requests to the database resources. Figures 11 and 12 show the computational
footprint of GET and POST requests, which are summarized in Table 2. GET request uses 582 B
and takes a time of 275 ms. POST uses 578 B and takes 762 ms. It can be noted in this respect
that the proposed middleware promotes a lightweight approach for rapid application development
and ease of deployment. The proposed lightweight IoT middleware has a great advantage in
terms of security, compared to heavyweight IoT middleware which usually uses markup
languages such as XML, which it difficult to be deployed on resource-constrained devices. Most of
heavyweight IoT middlewares are based on Service-oriented architecture (SOA), that are
deployed on multiple nodes. A middleware written in Java occupies 180 MB Memory footprint
compared to lightweight IoT middleware written in Node.js which occupies 74 MB.
Figure 11. GET footprint
Figure 12. Post footprint
Table 2. GET/POST
Footprints
Request
Size
in
Bytes
Time
in ms
GET 582 257
POST 587 762
8. Conclusion
IoT middleware is the core of IoT, yet deploying the middleware in constrained
environment comes with associated challenges such as security issue. In this paper, we have
proposed a lightweight IoT middleware for rapid development and deployment of IoT
applications to provide a more secure way to protect resources for organizations and individuals
by using the concept of REST API interface. The middleware uses RESTful services and
enables the developers to create and modify their resources according to application needs.
The REST API and its importance in the middleware is also discussed. Finally, a few simple
codes for deploying such lightweight IoT middleware platform are demonstrated. Future works
will involve adding a database to store data, and to develop a friendly graphical user interface
(GUI) front end. The database will be based on document model such as MongoDB. Error
handling mechanism will be included, especially cross-origin (CORS) errors. Google developer
tools will be used to analyze the platform. Well organized understandable documentation also
will be provided for the developer.
Acknowledgement
The authors wish to express their gratitude to Ministry of Higher Education (MOHE),
Malaysia and Research Management Center (RMC), Universiti Teknologi Malaysia for the
financial support of this project under GUP research grant no: Q.J130000.2523.19H25.
POST Footprint
GET Footprint
 ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 3, June 2019: 1385-1392
1392
References
[1] Raggett D. The web of things: Challenges and opportunities. Computer. 2015; 48(5): 26-32.
[2] Want R, Schilit BN, Jenson S. Enabling the internet of things. Computer. 2015; 48(1): 28-35.
[3] Baresi L, Mottola L, Dustdar S. Building software for the internet of things. IEEE Internet Computing.
2015; 1(2): 6-8.
[4] Atzori L, Iera A, Morabito G. The internet of things: A survey. Computer networks. 2010; 54(15):
2787-805.
[5] Liu T, Lu D. The application and development of IoT. Information Technology in Medicine and
Education (ITME), 2012 International Symposium. 2012; 2: 991-994.
[6] Evans D. The internet of things: How the next evolution of the internet is changing everything. CISCO
white paper. 2011; 1: 1-1.
[7] Islam SR, Kwak D, Kabir MH, Hossain M, Kwak KS. The internet of things for health care: a
comprehensive survey. IEEE Access. 2015; 3: 678-708.
[8] Miller D. Blockchain and the Internet of Things in the Industrial Sector. IT Professional. 2018; 20(3):
15-18.
[9] Shifeng Y, Chungui F, Yuanyuan H, Shiping Z. Application of IOT in agriculture. Journal of
Agricultural Mechanization Research. 2011; 7: 190-193.
[10] Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M. Internet of things for smart cities. IEEE Internet
of Things journal. 2014; 1(1): 22-32.
[11] Paridel K, Bainomugisha E, Vanrompay Y, Berbers Y, De Meuter W. Middleware for the internet of
things, design goals and challenges. Electronic Communications of the EASST. 2010; 28.
[12] Gubbi J, Buyya R, Marusic S, Palaniswami M. Internet of Things (IoT): A vision, architectural
elements, and future directions. Future generation computer systems. 2013; 29(7): 1645-1660.
[13] Dohr A, Modre-Opsrian R, Drobics M, Hayn D, Schreier G. The internet of things for ambient assisted living.
Information technology: new generations (ITNG), 7th international conference. Las Vegas. 2010: 804-809.
[14] Ofcom. Communications market report. UK, London, 2017. [Online] Available: https:
//www.ofcom.org.uk/__data/assets/pdf_file/0017/105074/cmr-2017-uk.pdf
[15] Google Cloud. (2018). Google Cloud IoT–Fully managed IoT services from Google. [online] Available
at: https: //cloud.google.com/solutions/iot/ [Accessed 26 Jun. 2018].
[16] Nakhuva B, Champaneria T. Study of Various Internet of Things Platforms. International Journal of
Computer Science & Engineering Survey (IJCSES). 2015; 6(6): 61-74.
[17] Tiburski RT, Amaral LA, de Matos E, de Azevedo DFG, Hessel F. The Role of Lightweight
Approaches Towards the Standardization of a Security Architecture for IoT Middleware Systems.
IEEE Communications Magazine. 2016; 54(12): 56-62.
[18] Barona R, Anita EAM. A survey on data breach challenges in cloud computing security: Issues and threats.
2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT). Kollam. 2017; 1-8.
[19] Rahulamathavan Y, Rajarajan M, Rana OF, Awan MS, Burnap P, Das SK. Assessing Data Breach
Risk in Cloud Systems. 2015 IEEE 7th International Conference on Cloud Computing Technology
and Science (CloudCom). Vancouver. 2015; 363-370.
[20] Zhou J, Cao Z, Dong X, Vasilakos AV. Security and privacy for cloud-based IoT: challenges. IEEE
Communications Magazine. 2017; 55(1): 26-33.
[21] Wang K, Wang Y, Sun Y, Guo S, Wu J. Green industrial internet of things architecture: An
energy-efficient perspective. IEEE Communications Magazine. 2016; 54(12): 48-54.
[22] Singh S, Singh N. Internet of Things (IoT): Security challenges, business opportunities & reference
architecture for E-commerce. Green Computing and Internet of Things (ICGCIoT), 2015 International
Conference. Noida. 2015; 1577-1581.
[23] Wang K, Wang Y, Sun Y, Guo S, Wu J. Green industrial internet of things architecture:
An energy-efficient perspective. IEEE Communications Magazine. 2016; 54(12): 48-54.
[24] da Cruz MA, Rodrigues JJ, Al-Muhtadi J, Korotaev VV, de Albuquerque VH. A reference model for
internet of things middleware. IEEE Internet of Things Journal. 2018; 5(2): 871-883.
[25] Shi W, Cao J, Zhang Q, Li Y, Xu L. Edge computing: Vision and challenges. IEEE Internet of Things
Journal. 2016; 3(5): 637-646.
[26] Maksimovic M. Necessity of the Internet of Thins and Fog Computing Integration. International
Scientific Conference on Information Technology and Data Related Research (SINTEZA). 2017.
[27] Persson P, Angelsmark O. Calvin–merging cloud and iot. Procedia Computer Science. 2015; 52: 210-7.
[28] Ptolemy II. (1996.) [Online]. Available: http: //ptolemy.eecs.berkeley.edu. [Accessed 26 Jun. 2018].
[29] Ellis M, Rope D. (2017). Edge Machine Learning with Flogo. [Online]. Available:
D2wh20haedxe3f.cloudfront.net. [Accessed 28 Jun. 2018].
[30] 3Scale. Whats is API, your guide to the internet business revolution”. [Online]. Available: https:
//www.3scale.net/wp-content/uploads/2012/06/What-is-an-API-1.0.pdf [Accessed 28 Jun. 2018].
[31] Fielding RT. Architectural styles and the design of network-based software architectures. PhD
dissertation. Irvine: University of California; 2000.
[32] Ngu AH, Gutierrez M, Metsis V, Nepal S, Sheng QZ. IoT middleware: A survey on issues and
enabling technologies. IEEE Internet of Things Journal. 2017; 4(1): 1-20.
Ad

More Related Content

What's hot (19)

Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
IRJET Journal
 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of things
SumanPramanik7
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
journalBEEI
 
Top five emerging technology in industry
Top five emerging technology in industryTop five emerging technology in industry
Top five emerging technology in industry
AgitAjey
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
IndianAppDevelopers
 
venkata krishna IoT ppt
venkata krishna IoT pptvenkata krishna IoT ppt
venkata krishna IoT ppt
Raja Krishna
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
DESMOND YUEN
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformation
SANDEEP MITTAPALLY
 
Global Technology Governance Report 2021: Harnessing Fourth Industrial Revolu...
Global Technology Governance Report 2021: Harnessing Fourth Industrial Revolu...Global Technology Governance Report 2021: Harnessing Fourth Industrial Revolu...
Global Technology Governance Report 2021: Harnessing Fourth Industrial Revolu...
Prachyanun Nilsook
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
IJNSA Journal
 
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Tyrone Systems
 
Internet of Things (IoT): Readme
Internet of Things (IoT): ReadmeInternet of Things (IoT): Readme
Internet of Things (IoT): Readme
Istabraq M. Al-Joboury
 
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
BRNSS Publication Hub
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
vivatechijri
 
Discovering and Understanding The Security Issues In IoT Cloud
Discovering and Understanding The Security Issues In IoT CloudDiscovering and Understanding The Security Issues In IoT Cloud
Discovering and Understanding The Security Issues In IoT Cloud
CSCJournals
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
ijwmn
 
Latest Trends in Information Technology - Wikki Verma
Latest Trends in Information Technology - Wikki VermaLatest Trends in Information Technology - Wikki Verma
Latest Trends in Information Technology - Wikki Verma
Wikki Verma
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
IRJET Journal
 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of things
SumanPramanik7
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
journalBEEI
 
Top five emerging technology in industry
Top five emerging technology in industryTop five emerging technology in industry
Top five emerging technology in industry
AgitAjey
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
IndianAppDevelopers
 
venkata krishna IoT ppt
venkata krishna IoT pptvenkata krishna IoT ppt
venkata krishna IoT ppt
Raja Krishna
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
DESMOND YUEN
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformation
SANDEEP MITTAPALLY
 
Global Technology Governance Report 2021: Harnessing Fourth Industrial Revolu...
Global Technology Governance Report 2021: Harnessing Fourth Industrial Revolu...Global Technology Governance Report 2021: Harnessing Fourth Industrial Revolu...
Global Technology Governance Report 2021: Harnessing Fourth Industrial Revolu...
Prachyanun Nilsook
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
IJNSA Journal
 
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Tyrone Systems
 
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
BRNSS Publication Hub
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
vivatechijri
 
Discovering and Understanding The Security Issues In IoT Cloud
Discovering and Understanding The Security Issues In IoT CloudDiscovering and Understanding The Security Issues In IoT Cloud
Discovering and Understanding The Security Issues In IoT Cloud
CSCJournals
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
ijwmn
 
Latest Trends in Information Technology - Wikki Verma
Latest Trends in Information Technology - Wikki VermaLatest Trends in Information Technology - Wikki Verma
Latest Trends in Information Technology - Wikki Verma
Wikki Verma
 

Similar to Lightweight IoT middleware for rapid application development (20)

Internet of things: review, architecture and applications
Internet of things: review, architecture and applicationsInternet of things: review, architecture and applications
Internet of things: review, architecture and applications
CSITiaesprime
 
20476-38939-1-PB.pdf
20476-38939-1-PB.pdf20476-38939-1-PB.pdf
20476-38939-1-PB.pdf
IjictTeam
 
The Role of Internet of Things and Fog Computing in Smart Cities
The Role of Internet of Things and Fog Computing in Smart CitiesThe Role of Internet of Things and Fog Computing in Smart Cities
The Role of Internet of Things and Fog Computing in Smart Cities
gerogepatton
 
AI-DRIVEN PERFORMANCE TESTING FRAMEWORK FOR MOBILE APPLICATIONS
AI-DRIVEN PERFORMANCE TESTING FRAMEWORK FOR MOBILE APPLICATIONSAI-DRIVEN PERFORMANCE TESTING FRAMEWORK FOR MOBILE APPLICATIONS
AI-DRIVEN PERFORMANCE TESTING FRAMEWORK FOR MOBILE APPLICATIONS
ijseajournal
 
TOWARDS A GENERIC SOFTWARE ARCHITECTURE FOR IOT SYSTEMS
TOWARDS A GENERIC SOFTWARE ARCHITECTURE FOR IOT SYSTEMSTOWARDS A GENERIC SOFTWARE ARCHITECTURE FOR IOT SYSTEMS
TOWARDS A GENERIC SOFTWARE ARCHITECTURE FOR IOT SYSTEMS
ijseajournal
 
The Role of Internet of Things and Fog Computing in Smart Cities
The Role of Internet of Things and Fog Computing in Smart CitiesThe Role of Internet of Things and Fog Computing in Smart Cities
The Role of Internet of Things and Fog Computing in Smart Cities
gerogepatton
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET Journal
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
IJECEIAES
 
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
ijmnct
 
International Journal of Mobile Network Communications & Telematics ( IJMNCT)
International Journal of  Mobile Network Communications & Telematics ( IJMNCT)International Journal of  Mobile Network Communications & Telematics ( IJMNCT)
International Journal of Mobile Network Communications & Telematics ( IJMNCT)
ijmnct
 
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET Journal
 
E-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudE-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure Cloud
IRJET Journal
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
IJNSA Journal
 
Cellular Narrow Band IoT- using LTE
Cellular Narrow Band IoT- using LTE Cellular Narrow Band IoT- using LTE
Cellular Narrow Band IoT- using LTE
Sukhvinder Singh Malik
 
IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile Technology
AI Publications
 
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
Istabraq M. Al-Joboury
 
Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...
FrenchWeb.fr
 
Architectural design of IoT-cloud computing integration platform
Architectural design of IoT-cloud computing integration platformArchitectural design of IoT-cloud computing integration platform
Architectural design of IoT-cloud computing integration platform
TELKOMNIKA JOURNAL
 
An Event-based Middleware for Syntactical Interoperability in Internet of Th...
An Event-based Middleware for Syntactical Interoperability  in Internet of Th...An Event-based Middleware for Syntactical Interoperability  in Internet of Th...
An Event-based Middleware for Syntactical Interoperability in Internet of Th...
IJECEIAES
 
Trust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedTrust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-converted
tanvir616
 
Internet of things: review, architecture and applications
Internet of things: review, architecture and applicationsInternet of things: review, architecture and applications
Internet of things: review, architecture and applications
CSITiaesprime
 
20476-38939-1-PB.pdf
20476-38939-1-PB.pdf20476-38939-1-PB.pdf
20476-38939-1-PB.pdf
IjictTeam
 
The Role of Internet of Things and Fog Computing in Smart Cities
The Role of Internet of Things and Fog Computing in Smart CitiesThe Role of Internet of Things and Fog Computing in Smart Cities
The Role of Internet of Things and Fog Computing in Smart Cities
gerogepatton
 
AI-DRIVEN PERFORMANCE TESTING FRAMEWORK FOR MOBILE APPLICATIONS
AI-DRIVEN PERFORMANCE TESTING FRAMEWORK FOR MOBILE APPLICATIONSAI-DRIVEN PERFORMANCE TESTING FRAMEWORK FOR MOBILE APPLICATIONS
AI-DRIVEN PERFORMANCE TESTING FRAMEWORK FOR MOBILE APPLICATIONS
ijseajournal
 
TOWARDS A GENERIC SOFTWARE ARCHITECTURE FOR IOT SYSTEMS
TOWARDS A GENERIC SOFTWARE ARCHITECTURE FOR IOT SYSTEMSTOWARDS A GENERIC SOFTWARE ARCHITECTURE FOR IOT SYSTEMS
TOWARDS A GENERIC SOFTWARE ARCHITECTURE FOR IOT SYSTEMS
ijseajournal
 
The Role of Internet of Things and Fog Computing in Smart Cities
The Role of Internet of Things and Fog Computing in Smart CitiesThe Role of Internet of Things and Fog Computing in Smart Cities
The Role of Internet of Things and Fog Computing in Smart Cities
gerogepatton
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET Journal
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
IJECEIAES
 
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
ijmnct
 
International Journal of Mobile Network Communications & Telematics ( IJMNCT)
International Journal of  Mobile Network Communications & Telematics ( IJMNCT)International Journal of  Mobile Network Communications & Telematics ( IJMNCT)
International Journal of Mobile Network Communications & Telematics ( IJMNCT)
ijmnct
 
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET Journal
 
E-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudE-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure Cloud
IRJET Journal
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
IJNSA Journal
 
IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile Technology
AI Publications
 
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
Istabraq M. Al-Joboury
 
Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...
FrenchWeb.fr
 
Architectural design of IoT-cloud computing integration platform
Architectural design of IoT-cloud computing integration platformArchitectural design of IoT-cloud computing integration platform
Architectural design of IoT-cloud computing integration platform
TELKOMNIKA JOURNAL
 
An Event-based Middleware for Syntactical Interoperability in Internet of Th...
An Event-based Middleware for Syntactical Interoperability  in Internet of Th...An Event-based Middleware for Syntactical Interoperability  in Internet of Th...
An Event-based Middleware for Syntactical Interoperability in Internet of Th...
IJECEIAES
 
Trust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedTrust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-converted
tanvir616
 
Ad

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
TELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
TELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
TELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
TELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
TELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
TELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
TELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
TELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
TELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
TELKOMNIKA JOURNAL
 
Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
TELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
TELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
TELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
TELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
TELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
TELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
TELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
TELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
TELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
TELKOMNIKA JOURNAL
 
Ad

Recently uploaded (20)

Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Journal of Soft Computing in Civil Engineering
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Journal of Soft Computing in Civil Engineering
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdfMAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
ssuser562df4
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
π0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalizationπ0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalization
NABLAS株式会社
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdfMAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
ssuser562df4
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
π0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalizationπ0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalization
NABLAS株式会社
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 

Lightweight IoT middleware for rapid application development

  • 1. TELKOMNIKA, Vol.17, No.3, June 2019, pp.1385~1392 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v17i3.11793  1385 Received November 10, 2018; Revised January 30, 2019; Accepted February 28, 2019 Lightweight IoT middleware for rapid application development A. Karim Mohamed Ibrahim1 , Rozeha A. Rashid*2 , A. Hadi Fikri A. Hamid3 , M. Adib Sarijari4 , Muhammad Ariff Baharudin5 Advanced Telecommunication and Technology Research Group (ATT), Department of Communication Engineering, Faculty of Electrical Engineering, Universiti Teknologi Malaysia *Corresponding author, e-mail: [email protected] , [email protected] , [email protected] , [email protected] , [email protected] Abstract Sensors connected to the cloud services equipped with data analytics has created a plethora of new type of applications ranging from personal to an industrial level forming to what is known today as Internet of Things (IoT). IoT-based system follows a pattern of data collection, data analytics, automation, and system improvement recommendations. However, most applications would have its own unique requirements in terms of the type of the smart devices, communication technologies as well as its application provisioning service. In order to enable an IoT-based system, various services are commercially available that provide services such as backend-as-a-service (BaaS) and software-as-a-service (SaaS) hosted in the cloud. This, in turn, raises the issues of security and privacy. However there is no plug-and-play IoT middleware framework that could be deployed out of the box for on-premise server. This paper aims at providing a lightweight IoT middleware that can be used to enable IoT applications owned by the individuals or organizations that effectively securing the data on-premise or in remote server. Specifically, the middleware with a standardized application programming interface (API) that could adapt to the application requirements through high level abstraction and interacts with the application service provider is proposed. Each API endpoint would be secured using Access Control List (ACL) and easily integratable with any other modules to ensure the scalability of the system as well as easing system deployment. In addition, this middleware could be deployed in a distributed manner and coordinate among themselves to fulfil the application requirements. A middleware is presented in this paper with GET and POST requests that are lightweight in size with a footprint of less than 1 KB and a round trip time of less than 1 second to facilitate rapid application development by individuals or organizations for securing IoT resources. Keywords: application programming protocol (API), Internet of Things (IoT), middlewar Copyright © 2019 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction The internet paradigm has evolved from digital connection connecting computers to connecting people, thus creating social interactions and bringing humans closer to each other. Presently, the internet and the things such as, sensors, actuators, and smart devices have created an ecosystem called The Internet of Things (IoT), which is the next technological revolution since the internet [1-4]. The term IoT is mainly used to refer, the network of smart things connected by internet, the enabling technologies, such as machine-to-machine communication, RFID, Wireless sensor Network (WSN), sensors/actuators, and the set of applications that embraces the vision of this technology to open up a new business frontier [4, 5]. IoT has a layered architecture to meet the requirements and demands of the industries and society. Although there is no consensus on the layered architecture, Figure 1 show the conventional generally accepted layered model for IoT to encapsulate the idea in a structured manner. It consists of the followings: the edge layer which contains the physical abstraction layer that represents objects such as smartphones, sensors and actuators responsible for edge functionalities such as collecting information and providing point to point communication support. On top of the edge layer is the gateway layer. This layer focuses on exposing the edge devices to a larger network while providing the connected edge devices an end to end connectivity. On top of it is the middleware layer which is responsible for bridging the devices and becomes the gateway to the application layer and to ensure a seamless operation between the application layer and the edge layer. Finally, the application layer is the interface to a service
  • 2.  ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 3, June 2019: 1385-1392 1386 provider or the IoT user, and it is responsible for providing application services based on the user or service provider requirements [6]. Figure 1. Basic layered model for IoT IoT has helped in fostering the development in various industries, such as healthcare [7], industrial applications [8], agriculture [9], smart cities [10], and home appliances. In these landscapes, IoT devices provide crucial data to the respective industry players by sensing and communicating the data to the business entities for better understanding of the nature of their businesses as well as for providing services to the public and companies [11-13]. Network providers, internet engineers, and data analysts agreed that the number of connected devices will increase rapidly in the coming years [14]. According to Cisco IBSG, IoT will have more than 40 billion connected objects in 2020. With the plethora of connected devices, IoT platforms have been introduced, such as Google Cloud Platform [15], IBM BlueMix, and ThingWorx which help to create and deploy IoT applications [16]. Normally, a platform comes in a complete package which consists of hardware and software. IoT middleware, on the other hand, is the glue between devices and applications, a type of distributed system that provides services to devices. According to [17], IoT middleware has several merits in IoT world. These include providing a chain combining effect for IoT heterogeneous components, management of data as well as enabling an abstraction of physical layer while hiding all the details and complexity stemmed from the disparate technologies that make up the IoT ecosystem. To enable IoT application, one of these services must be available such as Platform as a Service (PaaS,) Software as a Service (SaaS) and Backend as Service (BaaS). For business entities and consumers alike, this could potentially result in a huge security problems [18, 19]. Sharing resources is a sensitive matter that should be handled carefully. Furthermore, owing to the fact that every IoT application has its own requirement, it is difficult for some companies or individuals to use the generic services provided by the available platforms due to the general workflow provided by most platforms do not conform to their requirements. For example, some platforms are specific to one domain such as healthcare or agriculture which has different requirements such as data latency and privacy as well as approach. To overcome these issues, a lightweight IoT backend that makes an IoT application feasible and programmable by individuals who are not necessarily experts in pervasive computing is proposed. Almost everything on the internet requires a lightweight IoT due to the fact that most devices are resource constrained [20, 21]. According to [17], several IoT middlewares have been developed but a lightweight plug-and-play IoT backend is still lacking. In this paper, we propose a future-proof lightweight IoT backend that can be hosted in any on-premise data center for the purposes of securing the resources, avoiding the pitfall of cloud services and facilitates a mechanism for resource sharing in an efficient manner. The remainder of this paper is organized as follows. First, the motivation for the implementation of lightweight IoT middleware and related works are presented in Section II. Then, Section III introduces the representational state application programming interface (API) and its role in IoT middleware. The methodology is discussed in Section IV, followed by the preliminary results in Section IV. Lastly, the conclusion is drawn in Section V.
  • 3. TELKOMNIKA ISSN: 1693-6930  Lightweight IoT middleware for rapid application development (A. Karim Mohamed Ibrahim) 1387 2. Motivation By 2020, IoT world is expected to have millions of connected things; the rapid expansion of IoT market share creates business opportunities for industries [22]. This expansion requires a precise and secure lightweight middleware that provides services for the devices and service provid [23, 24]. Middleware is the crucial component of IoT and it lies between a bank of devices and a cloud service [25]. In IoT, the system should run on edge devices and not in the cloud. Therefore, at the edge or the border, an integration between connected devices and the cloud service is necessary to facilitate the IoT ecosystem [26, 27]. Most companies use default hybrid integration such as PaaS and SaaS. However, nowadays, the integration does not only depend on the technology but different locations as well. Furthermore, the variety of communication protocols and the amount of data that goes through the middleware requires a secure framework that ensures smooth integration in IoT system. Currently, many IoT middlewares are widely deployed in an environment that is subject to rules provided by the service providers with resource sharing method known to others, which gives rise to security issue. Our scope of the research work is to provide the developers with the necessary tools to access the web with respect to HTTP methods using RESTful APIs with lightweightness in mind. 3. Related works Many IoT middlewares are being deployed in tandem with the growth of IoT. Calvin [28], an open source IoT middleware from Ericsson, is one of the few lightweight IoT middlewares. Using proprietary programming model, Calvin provides minimum latency, and high CPU utilization [16]. The limitation in Calvin is that it does not offer Graphical User Interface (GUI). The security and device discovery also are not addressed. Ptolemy Accessor Host, is an actor-oriented framework for modeling, simulating, and designing of concurrent, real-time, embedded devices [29]. Like most of the middlewares, they follow the basic model of computation which is data/event flow. In Ptolemy, guaranteed execution of real-time distributed IoT application is provided. However, the limitation in Ptolemy is until now, it does not support device discovery. Project Flogo [30] on the other hand is a ultra-lightweight middleware that focuses on edge integration from device to gateway and from gateway to cloud. It is an open source middleware that can run on devices and requires less than 5 MB memory space [30]. Project Flogo is written in Golang programming language which is not as popular as Node.js. The community in Node.js provides supportive libraries and codes. The related works are summarized in Table 1. In a nutshell, the developers can make their own choices when developing the middleware. Table 1. Summary of Related Works No Title Author/year Description Limitation 1 Calvin—Merging cloud and IoT [5]. P. Persson and O. Angelsmark/ 2015. Aims to provide a unified programming model which is light-weight and portable. No GUI. Security and device discovery are not addressed. 2 A development platform for integrating wireless devices and sensors into ambient intelligence systems [10]. M. Eisenhauer, P. Rosengren, and P. Antolin/ 2009 It provides support for using devices as services by embedding services in devices. Need for programmer. It does not help the user to quickly, create, search and deploy data collection and application analysis. 3 Edge Machine Learning with Flogo [7]. Gaurav Subhedar/2018. An open source IoT middleware, consumes 3MB memory space. Uses Golang programming language. Main focus of this project was edge integrations. The programming language is not popular among developers. 4 A visual tool for writing the internet of things [11] Node,RED 2015 An open-source IoT middleware platform from IBM. It is based on node.js It provides a visual tool that simplifies the job of composing IoT devices Limited security Limited libraries and modules No device discovery
  • 4.  ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 3, June 2019: 1385-1392 1388 4. Application Programming Interface (API) According to [31], API is an interface to a software component that can be invoked at a distance over a communications network using standards-based technologies. Applications use APIs like we use web pages as an interface. In IoT, many sensors are connected and share information with other entities in a relatively complex ecosystem. In such scenario, API provides the mean of communicating between different entities while maintaining data integrity and consistency. API is actually an old technology that came up first in 1970 because of distributed systems, and then grew in popularity. In 2000, Roy Thomas introduced in his Ph.D dissertation representational state transfer API (RESTful API) [31]. API provides great services to IoT world. Designing an API is not a difficult matter, but designing an efficient one that meets business requirements is not a trivial task. In an API, the customer is the developer, not the end user. Figure 2 shows the importance of the API due to its sensitive position in developing process. From Figure 2, business assets of a company can consist of products information, services, and the developers who develop IoT applications. Therefore, the customer of an API is not the end user but the developer. So designing an API that meets the developer’s requirement is the key to effective API. By adding some sort of storage and a user interface like a web page, a lightweight IoT middleware can be realized. Figure 2. API lies in between two main attributes in IoT environment 5. Middleware Architecture The proposed middleware could be deployed in a distributed manner and coordinate between themselves to fulfill the application requirements. Application abstraction level in the architecture of IoT middleware is usually used for providing an interface to applications, where context analysis level and the remote database makes it necessary to have distributable IoT middleware. The proposed middleware adopts the actor-based architecture described in [32]. The actor-based architecture shown in Figure 3 is based on lightweight middleware which provides services as actors. The actor (functionality/services) can be deployed in all layers such as sensors, mobile and cloud layer. For example, if a device in the sensor layer has a actor-based middleware that lacks storage services, another actor-based middleware that has storage service can be downloaded from the cloud [32]. Figure 3. Actor-based architecture 6. Research Methodology In this section, the flow of the project will be explained. For this middleware, Node.js will be used for simplicity as well as due to its un-opinionated nature. As a proof of-concept, one endpoint and a hard-coded database are included. In addition, it can be connected to a local or cloud-based database as well. Figure 4 shows a client which can be a web application and the
  • 5. TELKOMNIKA ISSN: 1693-6930  Lightweight IoT middleware for rapid application development (A. Karim Mohamed Ibrahim) 1389 RESTful server. The communication between the client and the server is sent via HTTP using JavaScript Object Notation (JSON) format. Users can send requests using HTTP methods available such as GET, POST, DELETE and PUT. There are also PATCH, HEAD, and CONNECT requests. This paper will illustrate the use of GET, POST, PUT, and DELETE only. Figure 5 shows the flow chart of the middleware, which is a server running on port 3000. Once a request is made, the middleware will first handle any errors that are present. If there is none, then the middleware chooses which route to take and processes it, then responds back to the user. Figure 4. General view of the middleware Figure 5. Middleware flow chart 7. Results and Analysis The middleware is structured as follows. First, the middleware was developed using Node.js with JavaScript libraries and Node Package Manager (NPM) which is one of the largest ecosystems of open source libraries and they reduce the complexity of creating a web applications. Second, we show how GET, POST, PUT, and DELETE requests allow the user to interact with the database resources. Then, we show the results of GET and POST requests sent by the client to the database through the backend. The backend exposes its functionality as an API. These sets of APIs are parsed with the data and they are addressable to the clients/devices. The clients/devices are accessible through REST APIs provided by the IoT
  • 6.  ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 3, June 2019: 1385-1392 1390 backend. Figure 6 shows a server set to listen on port 3000, and an environment variable port, which is necessary for applications working in other environments. Figure 7 shows GET request. It provides the functionality of retrieving the informations from a specified resource. GET request is the most common HTTP request and it is usually used for retrieving non-sensitive datadata. In this middleware, for proof of concept, it is allowed to retrieve all the resources as shown in Figure 7. Figure 6. Crating a server Figure 7. Get request POST request is a sensitive request. It is used for adding content to the database. As can be seen in Figure 8, if a post request is made, first the middleware will validate the request. After validation, if there is no error, the middleware increases the database by index 1 and inserts the new post. PUT request is used for updating the content of the database as shown in Figure 9. When a request is made for a specific project, the middleware looks for the requested project in the database by using a respective identification (id). If there is no match, the response of (404) which is an HTTP status code is returned with notation of Not Found. Else, an update and a return acknowledgement of a new project is given. DELETE request follows the same method. The requested project is searched in the database. If found, a return acknowledgement on the deleted project is given. Figure 10 shows DELETE request for deleting a specified resource. Figure 8. Posting to database Figure 9. Updating specific project Figure 10. Deleting project In order to carry out the test and analyze the performance of the middleware, we use POSTMAN software which is installed in HP laptop with 8GB RAM and Windows 10 OS. Also, the
  • 7. TELKOMNIKA ISSN: 1693-6930  Lightweight IoT middleware for rapid application development (A. Karim Mohamed Ibrahim) 1391 network used is an Ethernet connection with 17.3 MB download and 95.01 MB upload. POSTMAN is used to test the endpoints and sends the requests and responses. The objective was to justify that the middleware is lightweight by assessing the required time and the size of the response of GET and POST requests to the database resources. Figures 11 and 12 show the computational footprint of GET and POST requests, which are summarized in Table 2. GET request uses 582 B and takes a time of 275 ms. POST uses 578 B and takes 762 ms. It can be noted in this respect that the proposed middleware promotes a lightweight approach for rapid application development and ease of deployment. The proposed lightweight IoT middleware has a great advantage in terms of security, compared to heavyweight IoT middleware which usually uses markup languages such as XML, which it difficult to be deployed on resource-constrained devices. Most of heavyweight IoT middlewares are based on Service-oriented architecture (SOA), that are deployed on multiple nodes. A middleware written in Java occupies 180 MB Memory footprint compared to lightweight IoT middleware written in Node.js which occupies 74 MB. Figure 11. GET footprint Figure 12. Post footprint Table 2. GET/POST Footprints Request Size in Bytes Time in ms GET 582 257 POST 587 762 8. Conclusion IoT middleware is the core of IoT, yet deploying the middleware in constrained environment comes with associated challenges such as security issue. In this paper, we have proposed a lightweight IoT middleware for rapid development and deployment of IoT applications to provide a more secure way to protect resources for organizations and individuals by using the concept of REST API interface. The middleware uses RESTful services and enables the developers to create and modify their resources according to application needs. The REST API and its importance in the middleware is also discussed. Finally, a few simple codes for deploying such lightweight IoT middleware platform are demonstrated. Future works will involve adding a database to store data, and to develop a friendly graphical user interface (GUI) front end. The database will be based on document model such as MongoDB. Error handling mechanism will be included, especially cross-origin (CORS) errors. Google developer tools will be used to analyze the platform. Well organized understandable documentation also will be provided for the developer. Acknowledgement The authors wish to express their gratitude to Ministry of Higher Education (MOHE), Malaysia and Research Management Center (RMC), Universiti Teknologi Malaysia for the financial support of this project under GUP research grant no: Q.J130000.2523.19H25. POST Footprint GET Footprint
  • 8.  ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 3, June 2019: 1385-1392 1392 References [1] Raggett D. The web of things: Challenges and opportunities. Computer. 2015; 48(5): 26-32. [2] Want R, Schilit BN, Jenson S. Enabling the internet of things. Computer. 2015; 48(1): 28-35. [3] Baresi L, Mottola L, Dustdar S. Building software for the internet of things. IEEE Internet Computing. 2015; 1(2): 6-8. [4] Atzori L, Iera A, Morabito G. The internet of things: A survey. Computer networks. 2010; 54(15): 2787-805. [5] Liu T, Lu D. The application and development of IoT. Information Technology in Medicine and Education (ITME), 2012 International Symposium. 2012; 2: 991-994. [6] Evans D. The internet of things: How the next evolution of the internet is changing everything. CISCO white paper. 2011; 1: 1-1. [7] Islam SR, Kwak D, Kabir MH, Hossain M, Kwak KS. The internet of things for health care: a comprehensive survey. IEEE Access. 2015; 3: 678-708. [8] Miller D. Blockchain and the Internet of Things in the Industrial Sector. IT Professional. 2018; 20(3): 15-18. [9] Shifeng Y, Chungui F, Yuanyuan H, Shiping Z. Application of IOT in agriculture. Journal of Agricultural Mechanization Research. 2011; 7: 190-193. [10] Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M. Internet of things for smart cities. IEEE Internet of Things journal. 2014; 1(1): 22-32. [11] Paridel K, Bainomugisha E, Vanrompay Y, Berbers Y, De Meuter W. Middleware for the internet of things, design goals and challenges. Electronic Communications of the EASST. 2010; 28. [12] Gubbi J, Buyya R, Marusic S, Palaniswami M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems. 2013; 29(7): 1645-1660. [13] Dohr A, Modre-Opsrian R, Drobics M, Hayn D, Schreier G. The internet of things for ambient assisted living. Information technology: new generations (ITNG), 7th international conference. Las Vegas. 2010: 804-809. [14] Ofcom. Communications market report. UK, London, 2017. [Online] Available: https: //www.ofcom.org.uk/__data/assets/pdf_file/0017/105074/cmr-2017-uk.pdf [15] Google Cloud. (2018). Google Cloud IoT–Fully managed IoT services from Google. [online] Available at: https: //cloud.google.com/solutions/iot/ [Accessed 26 Jun. 2018]. [16] Nakhuva B, Champaneria T. Study of Various Internet of Things Platforms. International Journal of Computer Science & Engineering Survey (IJCSES). 2015; 6(6): 61-74. [17] Tiburski RT, Amaral LA, de Matos E, de Azevedo DFG, Hessel F. The Role of Lightweight Approaches Towards the Standardization of a Security Architecture for IoT Middleware Systems. IEEE Communications Magazine. 2016; 54(12): 56-62. [18] Barona R, Anita EAM. A survey on data breach challenges in cloud computing security: Issues and threats. 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT). Kollam. 2017; 1-8. [19] Rahulamathavan Y, Rajarajan M, Rana OF, Awan MS, Burnap P, Das SK. Assessing Data Breach Risk in Cloud Systems. 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). Vancouver. 2015; 363-370. [20] Zhou J, Cao Z, Dong X, Vasilakos AV. Security and privacy for cloud-based IoT: challenges. IEEE Communications Magazine. 2017; 55(1): 26-33. [21] Wang K, Wang Y, Sun Y, Guo S, Wu J. Green industrial internet of things architecture: An energy-efficient perspective. IEEE Communications Magazine. 2016; 54(12): 48-54. [22] Singh S, Singh N. Internet of Things (IoT): Security challenges, business opportunities & reference architecture for E-commerce. Green Computing and Internet of Things (ICGCIoT), 2015 International Conference. Noida. 2015; 1577-1581. [23] Wang K, Wang Y, Sun Y, Guo S, Wu J. Green industrial internet of things architecture: An energy-efficient perspective. IEEE Communications Magazine. 2016; 54(12): 48-54. [24] da Cruz MA, Rodrigues JJ, Al-Muhtadi J, Korotaev VV, de Albuquerque VH. A reference model for internet of things middleware. IEEE Internet of Things Journal. 2018; 5(2): 871-883. [25] Shi W, Cao J, Zhang Q, Li Y, Xu L. Edge computing: Vision and challenges. IEEE Internet of Things Journal. 2016; 3(5): 637-646. [26] Maksimovic M. Necessity of the Internet of Thins and Fog Computing Integration. International Scientific Conference on Information Technology and Data Related Research (SINTEZA). 2017. [27] Persson P, Angelsmark O. Calvin–merging cloud and iot. Procedia Computer Science. 2015; 52: 210-7. [28] Ptolemy II. (1996.) [Online]. Available: http: //ptolemy.eecs.berkeley.edu. [Accessed 26 Jun. 2018]. [29] Ellis M, Rope D. (2017). Edge Machine Learning with Flogo. [Online]. Available: D2wh20haedxe3f.cloudfront.net. [Accessed 28 Jun. 2018]. [30] 3Scale. Whats is API, your guide to the internet business revolution”. [Online]. Available: https: //www.3scale.net/wp-content/uploads/2012/06/What-is-an-API-1.0.pdf [Accessed 28 Jun. 2018]. [31] Fielding RT. Architectural styles and the design of network-based software architectures. PhD dissertation. Irvine: University of California; 2000. [32] Ngu AH, Gutierrez M, Metsis V, Nepal S, Sheng QZ. IoT middleware: A survey on issues and enabling technologies. IEEE Internet of Things Journal. 2017; 4(1): 1-20.