Professional Documents
Culture Documents
Ad Hoc Networks
journal homepage: www.elsevier.com/locate/adhoc
a r t i c l e i n f o a b s t r a c t
Article history: The high penetration rate of new technologies in all the activities of everyday life is fostering the be-
Received 26 April 2016 lief that for any new societal challenge there is always an ICT solution able to successfully deal with
Revised 21 November 2016
it. Recently, the solution that is proposed almost anytime is the “Internet of Things” (IoT). This appar-
Accepted 9 December 2016
ent panacea of the ICT world takes different aspects on and, actually, is identified with different (often
Available online 24 December 2016
very different) technological solutions. As a result, many think that IoT is just RFIDs, others think that it is
Keywords: sensor networks, and yet others that it is machine-to-machine communications. In the meanwhile, indus-
Internet of Things trial players are taking advantage of the popularity of IoT to use it as a very trendy brand for technology
Web of things solutions oriented to the consumer market. The scientific literature sometimes does not help much in
Cloud of things clarifying, as it is rich in definitions of IoT often discordant between them.
Objective of this paper is to present the evolutionary stages, i.e., generations, that have characterized
the development of IoT, along with the motivations of their triggering. Besides, it analyzes the role that
IoT can play in addressing the main societal challenges and the set of features expected from the relevant
solutions. The final objective is to give a modern definition of the phenomenon, which de facto shows a
strong pervasive nature, and, if not well understood in its theories, technologies, methodologies, and real
potentials, then runs the risk of being regarded with suspicion and, thus, rejected by users.
© 2016 Elsevier B.V. All rights reserved.
http://dx.doi.org/10.1016/j.adhoc.2016.12.004
1570-8705/© 2016 Elsevier B.V. All rights reserved.
L. Atzori et al. / Ad Hoc Networks 56 (2017) 122–140 123
Maybe it is a little excessive to assume that the undoubted ge- To ease the reading, in Table 1 we summarize all the acronyms
nius and visionary nature of Tesla allowed him to imagine the In- that are used throughout the paper. Additionally, in order to have a
ternet of Things so many years ago, but certainly, from that date comprehensive view of all the technological fields involved in the
on, he and many others helped forming the idea of IoT by starting evolution of the IoT over the three generations, in Table 2 we sum-
from a clear knowledge of current technologies and making a leap marize the major objective for each addressed technological field,
into the future. To name a few, it is the case of Mark Weiser who the key standards, and the representative scientific works.
defined Pervasive Computing and stated that “The most profound The remainder of the paper is organized as follows. In
technologies are those that disappear. They weave themselves into the Section 2 we describe how the IoT had the potential to play a
fabrics of everyday life until they are indistinguishable from it” [3], key role in the solutions of most societal challenges. In the fol-
of Bruce Sterling who coined the SPIME neologism referring to an lowing Sections 3–5 we provide details of the major technical con-
object “by definition, the protagonist of a documented process [... ] an cepts and solutions proposed for each generation of the IoT. In
historical entity with an accessible, precise trajectory through space Section 6 we overview the technologies that will impact the evo-
and time” [4], of Kevin Ashton who first used the term “Internet of lution of the IoT in the next few years. In light of such upcoming
Things” at that time focusing mainly on the RFID technologies. evolutions, we elaborate on the concept of the IoT itself to reach
The idea of IoT has, therefore, evolved over time and has un- a correct definition of the IoT paradigm in Section 7. Finally, in
dergone succeeding transformations that will predictably still con- Section 8 we draw our final conclusions.
tinue over the next years with the advent of new enabling tech-
nologies. For instance, the advent of the new concepts, such as 2. Role of IoT for societal challenges
cloud computing, information centric networking, big data, social Our societies are facing many challenges and ICT can assume
networking, have already partially impacted and still are impact- a pivotal role, with the raise of IoT systems taking a momentous
ing the IoT idea and novel futuristic paradigms are already in the responsibility in this process. An effective classification of the soci-
horizon (see [5,6]). etal challenges is provided by the Horizon 2020 framework, which
This paper is motivated by the above considerations and aims is the main program funding research and innovation activities in
at providing a careful analysis of the technologies that have con- Europe [7]: health, demographic change and wellbeing; food secu-
tributed to the birth of the IoT and to its growth over the time. rity and sustainable agriculture; secure, clean and efficient energy;
The approach we follow to conduct the analysis of the Inter- smart, green and integrated transport; climate action, environment,
net of Things paradigm is evolutionary in nature. Accordingly, we resource efficiency and raw materials; inclusive, innovative and re-
identify three main stages of evolution of the paradigm, each one flective societies; secure societies.
characterized by key enabling technologies, major reference archi- In the following Section 2.1 we describe how IoT can play
tectural solutions, and available products. The transition from one a key role in addressing the above societal challenges. Then, in
generation to the next is not only characterized by the introduction Section 2.2 we describe how public authorities can support the
of new technologies and architectures complementary to those of adoption of IoT for the above purposes and discuss technical and
the previous generation, but also by a distinctive approach to the non-technical barriers that still exist to the adoption of the IoT
design of the IoT. Notwithstanding, what is IoT today and what it technologies.
will be in the future is, undoubtedly, the result of the convergence
into the primary evolutionary path of all R&D experiences in sev- 2.1. IoT and societal challenges
eral ICT domains, as shown in Fig. 1 and described in the remain-
The aging process of the working population puts the health
der of the paper.
and wellbeing issues among the top priorities in our society.
124 L. Atzori et al. / Ad Hoc Networks 56 (2017) 122–140
Table 1 tivated remotely by the farmer, sales can be synchronized with the
List of acronyms used through all the paper.
production (as the time schedule of the crop can be shared with
Colonna1 Colonna2 external systems), and the usage of resources matches the actual
Acronym Description needs (thus, wastage are avoided). However, it is extremely impor-
ALE Application Level Events
tant that the relevant systems are easy to deploy and use. Other-
API Application Programming Interface wise, the configuration and the maintenance costs may overcome
CCN Content-Centric Networking the benefits.
CoAP Constrained Application Protocol Working Group Most countries have agreed on ambitious plans to reduce
CoRe Constrained RESTful Environment Working Group
greenhouse gas emissions, increase the share of renewable en-
CoT Cloud of Things
DHCPv6 Dynamic Host Configuration Protocol version 6 ergies, and improve energy efficiency. Achieving these objectives
DNS Domain Name Service would advance our society along the path to sustainability. IoT
EPC Electronic Product Code technologies will take a major role in this context with the in-
EPCIS EPC Information Service tent of delivering systems for automatic management of produc-
EUI-64 64-bit Extended Unique Identifier
tion and distribution of energy by means of sensors and actuators
ETSI European Telecommunication Standards Institute
FP7 Seventh Framework Program of the European Union distributed across the whole chain, with the smart grid as one of
HTTP Hypertext Transfer Protocol the major application scenarios. Stringent QoS (quality of service)
ICN Information Centric Networking requirements characterize the management of power grids as im-
ICT Information and Communications Technology
mediate actions have to be taken upon failure detections. Addition-
IETF Internet Engineering Task Force
IoE Internet of Everything ally, the resulting network should be highly adaptive to match the
IoT Internet of Things time varying behaviour, which characterize both the renewable en-
IoT-A IoT-Architecture ergy production systems and the energy consumption.
IP Internet Protocol The challenge of a smart, green and integrated mobility
IPv6 Internet Protocol version 6
is enabling a transportation system that is resource-efficient,
LLRP Low Level Reader Protocol
LR-WPAN Low Rate Wireless Personal Area Networks environment-friendly, safe and seamless for the benefit of all cit-
M2M Machine-to-Machine izens and of the economy. This is the area where IoT has taken
NDN Named Data Networking its first steps, since RFID tags have been massively used to track
NFC Near Field Communications
goods and improve the efficiency of transport and logistics proce-
ONS Object Naming Service
PaaS Platform as a Service
dures. Indeed, real-time information processing technology based
PSI Publish-Subscribe Internet on RFID and NFC can implement real-time monitoring of almost
REST REpresentational State Transfer every segment of the supply chain. By obtaining information re-
RESTful that follows REST principles lated to products promptly, timely, and accurately, either a single
RFID Radio-Frequency Identification
enterprise or even the whole supply chain can respond to intri-
SAaas Sensing and Actuation as a Service
SaaS Software as a Service cate and changeable markets in the shortest time. It is a matter
SCADA Supervisory Control and Data Acquisition of fact that the era of seemingly plentiful and low cost natural re-
SNS Social Networks Service sources is coming to an end: sources of raw materials, water and
SOA Service Oriented Architecture
air, as well as terrestrial, aquatic and marine ecosystems are all
SR Super Router
SSN Semantic Sensor Network
under pressure. As a consequence, there is a need for decoupling
TaaS Thing as a Service economic growth from resource usage. An IoT challenge in this di-
TCP Transmission Control Protocol rection is to support green economy activities. An exemplary ap-
TEDS Transducer Electronic Data Sheets plication is the automatic management of the energy consumption
UDP User Datagram Protocol
in smart cities so that the waste of energy resources is limited if
URI Universal Resource Identifier
URL Uniform Resource Locator not completely avoided. To this end, IoT systems should be able to
VE Virtual Entity become aware of the environment through a sort of distributed in-
WISP Wireless Identification and Sensing Platforms telligence and take appropriate local decision on the energy usage.
WoT Web of Things
Our society is also facing a number of important economic
WSAN Wireless Sensor and Actuator Networks
WSN Wireless Sensor Networks
and political challenges posed by global interdependencies and un-
6LoWPAN IPv6 over Low Power Wireless Personal Area Networks precedented transformations. These strongly affect its capacity to
ensure economic growth, high employment levels, and social sta-
bility. However, it suffers from sluggish growth, difficulties to ef-
Advancements in this area require the introduction of systems and fectively implement structural reforms in favour of innovation and
technologies able to continuously monitor the status of the en- employment, and increasing scepticism among citizens, especially
vironment where people live, work, travel, and to acquire data young people. The revolution of having our physical world at our
about conditions of people themselves. The resulting information hands through the network, introduces huge opportunities for in-
should be available everywhere to doctors, nurses, and relatives so novators and new entrepreneurs for the benefit of the whole soci-
that proper actions can be taken when needed. Automatic context- ety. However, the relevant technologies should be available to any-
aware processes will be also activated, for instance to guide the body, should be easy to understand. Thus, schools will assume a
patient in taking the right medicines. The IoT can play a key role in fundamental role, as they will be the places where innovations are
this context. However, this implies that its components should be taught to everybody. Additionally, the data generated by these sys-
ubiquitously embeddable in the environment, wearable so to con- tems have to be available to everybody; also the process should be
stantly monitor human conditions, transparent as much as possi- open to foster the interoperability and reutilization of the services,
ble, and trustful in handling personal data in a secure way. especially those deployed by public authorities.
Food security and sustainable agriculture is aimed at making Security is one of the major concerns in our society, and in this
the best use of our biological resources. The smart farms built by respect IoT systems are involved from two different points of view.
exploiting the IoT paradigm represent major means to reach these First, pervasiveness of the IoT deployments will imply that trillions
goals. In a smart farm the status of the crop and terrain is al- of objects will be observing us in our daily activities; these must
ways under control, many of the production procedures can be ac- be designed so that the collected data is used in the most reliable
L. Atzori et al. / Ad Hoc Networks 56 (2017) 122–140 125
Table 2
The three IoT generations: major objective for each addressed technological field, key standards and representative scientific works.
Tagged objects To uniquely identify objects through appropriate naming EPCglobal [38,42]
and architecture for the retrieval of objects’ associated
information
I Machine-to-Machine (M2M) To define a reference architecture for machine-to-machine oneM2M, ITU-T FS M2M [44]
communications
Integration RFID with WSN To seamless combine data coming from RFID tags with Missing [16,47]
data generated by sensors connected through WSNs
Internetworking To allow constrained devices to adopt the TCP/IP protocols IETF 6LoWPAN, ROLL RPL, IEEE 802.15.4 [54]
for a seamless integration in the Internet
II Web of Things To allow constrained devices to take part to web IETF CoAP, OASIS DPWS [26,58,59]
communications
Social network services To allow people to share data generated by their smart Missing [27,66,67]
objects with people they know and trust, leveraging the
existing human social networks services
Social Internet of Things To make objects able to participate in communities of Missing [75,77]
objects, to create groups of interest, and to take
collaborative actions with the objective to facilitate
service and information discovery
Semantic To describe the features of the IoT objects to foster systems W3C SSN [78,79]
interoperability
III Future Internet To introduce the Information Centric Networking feature IETF ICNRG [81,86,87]
into the IoT world so as to introduce content
centric-driven rather than host-driven communications
Cloud To empower objects with storage, communications and Missing [96,98]
processing capabilities coming from the cloud
Evolved RFID-IoT integration To facilitate the integration of the RFIDs into the IoT Missing [100,103]
applications
Table 3
Expected major contributions of the IoT systems in addressing the societal challenges and desired features.
Health and wellbeing Monitoring of the people health and quality of life Pervasivity
Transparency
Wear-ability
Security
Climate action, environment, resource efficiency and Smart management of energy consumption in smart Distributed local awareness
raw materials cities
Inclusive, innovative and reflective societies Provide the opportunities to create new applications Available to every one Open data Open process
and businesses in an easy way to everybody Participation Transparency Collaboration
and secure way. Second, IoT systems themselves will be used as • Forcing the diffusion of open IoT data and processes: as al-
an effective tool in support of the security of our society as the ready mentioned, produced data and relevant services should
connected smart things should be able to collect data about mali- be available to the external world, for other public or private
cious behaviours in both the digital and physical worlds. Addition- activities. There are already rules that obligate public authori-
ally, IoT systems should be trustable, i.e., they should provide the ties to provide some data in an open way. However, incentives
requested services at the needed quality of service. Even more im- to make available data produced by private companies should
portant, they should be perceived as trustable, i.e., it is necessary be introduced as well, at least for the data relevant to the sta-
that people feel that IoT systems handle their data by preserving tus of public environments.
freedom and security, like it is happening with cloud services that • Fostering the utilization of the IoT infrastructure in the city
almost everybody uses without caring about security. management: for instance, multiple distributed sources avail-
Table 3 summarizes the described challenges and the corre- able in the context of the open data, the big data and the smart
sponding required IoT features and possible contributions to their city activities, can be managed, analyzed and visualized to un-
overcoming. derstand urban development patterns [8];
• Introducing regulatory changes: the way the data is ex-
2.2. Role of public authorities and barriers to the adoption of IoT changed must be well-regulated to prevent any abuse.
solutions
In the contexts we have described above, public authorities IoT has still to face several challenges to be ready to play the
must play a key role in actively driving innovation. This may hap- pivotal role we expect.
pen in different ways:
126 L. Atzori et al. / Ad Hoc Networks 56 (2017) 122–140
First of all, it has to gain the trust of people. In fact, the idea of ferent opinions [10], the most accepted approach is the one pro-
a smart world all around us, which observes our habits and modi- posed in [11] and derived by the Universal Resource Locator [12].
fies its behavior according to what we do, what we say, and (soon As discussed in the following Section 5.4, an ICN network would be
maybe) what we think, may scare people for several reasons: able to route messages to interact with a resource by using only
the name of such a resource. Nevertheless, this cannot be given
• What if an IoT system controlling personal health related pro- for granted (at least in the short and medium term). Therefore, a
cesses makes a mistake? We are accustomed to computers and function is needed which is able to locate a resource and provide
smartphones malfunctioning (due to software or hardware fail- information on how to reach it. This is the function of the DNS in
ures). What if the above computers or smartphones are key traditional IP networks and of the ONS in the EPC platforms as we
players in ensuring our healthy life? In other words, the IoT, will discuss in the next section.
with all relevant technologies, must prove to be robust and re-
silient. 3. The first generation of the IoT: the tagged things
• What if some hackers violate IoT systems to compromise the
correct functioning of the processes governing our daily life? In this section we focus on the First Generation of IoT solu-
What if they steel our private data? There are many people tions. More specifically, we begin in Section 3.1 by providing a
worldwide who avoid any form of electronic payments for this general overview of motivations and solutions considered within
type of fear. Are we sure that those people will consciously ac- such a generation. Then we provide more details about the EPC-
cept the risks associated to a violation of a pervasive IoT sys- Global Network (Section 3.2), machine-to-machine communica-
tems? Again, IoT must prove to guarantee security and privacy. tions (Section 3.3) and the technologies provided to integrate RIFD
• How can an obscure technology be trusted by people who do systems and wireless sensor networks (Section 3.4).
not have a clue about its internal operations? This is a typical
problem that technology faces: to be accepted they need peo- 3.1. Overview
ple to build a mental model of their operations [9]. This can be
done in two ways: by educating people or by deceiving them, Unquestionably,
that is by hiding the real operations behind the interfaces peo-
ple are used to. Recall: many electronic digital appliances still
have a knob to control their behavior. the Radio-Frequency IDentification (RFID) technology played
the role of founding technology for the Internet of Things.
Only when the IoT will be much more resilient, robust, secure,
and easy to understand, people will trust it.
The first definition of this paradigm, given by Ashton at the
end of last century, directly referred to RFID [13]. The remarkable
Additionally, IoT solutions must be practical. A smart environ- contributions by the Auto-ID Labs [14], a world-wide network of
ment enriched with a large number of sensors and actuators is academic research laboratories, have also put the concept of Inter-
an attractive prospect as long as people will not be required to net of objects into strong relationship with the idea of networked
periodically change the batteries on each of them. A lot of work RFIDs.
has been done in this context, however, energetically autonomous Consequently, the earliest steps towards the IoT have been led
smart sensors and actuators have not reached the maturity level by efforts to create an industry-driven global standard to support
required to fulfil the real needs of IoT applications. In other words, the spread use of the Electronic Product CodeTM (EPC) and of RFID
tagging solutions at a world-wide scale [15]. The idea was to over-
come the limitations of the Barcode approach and achieve a global
advances are required in both the domains of energy effi- item identification through unique worldwide identifiers, repre-
ciency and energy harvesting. sented by the EPC codes stored in tags directly attached to objects.
The idea that RFID solutions could have been the fundaments
of the IoT is recurrent in early IoT related research [16–18]. Great
As a last remark, emphasis has been given to the potential to provide, through this
technology, a cost-effective way to tag objects and give them an
identity. Interesting examples of relevant applications based on
people will accept the IoT if there are applications justifying
the presence of such an intrusive system around them. RFID have been given, and new regulatory approaches to ensure
privacy and security in their fruition have been suggested. Accord-
ingly, IoT was seen as an emerging global Internet based informa-
However, applications need developers and developers need tion architecture facilitating the exchange of goods and services in
clearly defined, easily programmable, hopefully extensible, and global supply chain networks [18].
rarely changing APIs. Here, the diffusion of the RESTful model in While the work on an RFID-based IoT was ongoing, remote
the Web of Things domain is helping a lot although, like we have sensing solutions based on Wireless Sensor Networks (WSN),
seen, the IoT keeps evolving and nobody can safely say that the Telemetry, and Supervisory Control and Data Acquisition (SCADA)
APIs typical of a RESTful model are at the end of such an evolu- [19] technologies had already reached a mature stage. It was,
tion. In this context, public bodies can play a fundamental role by therefore, quite clear that these
at least taking clear and shared decisions on the open APIs to be
used to access those data collected by sensors deployed with the
taxpayers money and, thus, belonging to the collectivity. technologies for remote sensing would have played the same
Furthermore, a naming scheme must be decided. In fact, APIs al- key role in the IoT as RFID.
low interactions with IoT resources (objects, services, data servers,
etc.) and, to this end, it is necessary to identify these resources.
A lot of work on naming is being carried within the context of This is confirmed, for example, in [20], wherein Near Field Com-
Information-Centric Networking (ICN) and even if there are very dif- munications (NFC) and Wireless Sensor and Actuator Networks
L. Atzori et al. / Ad Hoc Networks 56 (2017) 122–140 127
• RFID tags: these represent the tags attached to the objects. They 1
In this perspective, it is worth mentioning the IEEE 1451 standard (standard
are characterized by a unique ID and may have some processing for Networked Smart Transducer Interface), whose major component is the TEDS
capabilities. (Transducer Electronic Data Sheets). TEDS is a sort of identification card carried
by a person. It stores manufacture-related information for the transducer(s), such
• RFID readers: these are responsible to query the RFID tags in as manufacturer identification, measurement range, accuracy, and calibration data,
their proximity and communicate the information gathered to similar to the information contained in the transducer data sheets normally pro-
some backend server. vided by the manufacturer.
128 L. Atzori et al. / Ad Hoc Networks 56 (2017) 122–140
Fig. 3. High level architecture for M2M Communications according to ETSI. in the IoT; (ii) Integration at the system level, i.e., a unique abstrac-
tion of object is defined which can represent any type of device.
3.3. Technologies for machine-to-machine communication Integration at the object level: This integration is fostered by
technological advances in miniaturization, energy harvesting, and
The European Telecommunication Standards Institute (ETSI) has energy efficiency that make it possible to integrate passive (in
focused on the definition of a standard for cellular M2M communi- terms of energy usage) hardware platforms, like some RFID tags,
cations. In fact, cellular network operators see in the spreading of with some environmental sensors and memory banks needed to
M2M technologies the opportunities to include machines in their store data. Relevant examples include the WISP as well as the pro-
user basin, so as to increase their revenues despite the continuous posals in [31] and [32].
decrease in the per-user revenues. Two families of architectures can be distinguished that support
The high level architecture envisioned by ETSI is depicted in integration at the object level: some solutions consider the result-
Fig. 3 and is based on a RESTful service approach [30]. As shown ing nodes as RFID tags equipped with sensors, while others con-
in the picture, two domains can be distinguished: the Network Do- sider the resulting nodes as wireless sensor nodes with a unique
main and the Device & Gateway Domain. ID. In the first case, the EPCglobal network architecture is the start-
Major components of the Device and Gateway Domain are the ing point and extensions are introduced to support the new for-
M2M Applications and the M2M Service Capabilities layers. In mats of messages (which can accommodate the values measured
some cases, these layers will be executed by the M2M Device. by sensors). However, solutions based on such an approach can-
In other cases, the M2M Devices have not enough resources to not integrate the data generated by traditional sensor networks
run them and therefore, the above components run in appropriate (already deployed in the environment) and do not support direct
gateways (M2M Gateways) acting as a proxy between the Network communications between nodes; i.e., a reader is needed in the
Domain and a few M2M Devices. Such M2M Devices are connected proximity of the node to collect the measured data.
to the M2M Gateway through a M2M Area Network that can be In the second case, instead, nodes can communicate with
based on any LAN standard such as IEEE 802.15.4. each other according to the multi-hop wireless communication
The M2M Service Capabilities layer has the objective to abstract paradigm supported by the WSN solutions. A remarkable exam-
the resources of the M2M Device and to establish a secure commu- ple of such an approach is proposed in [33], where a Smart Object
nication between the application running in the Network Domain (wireless node with sensing capabilities and unique ID) is defined,
and that running in the M2M Device. The idea is to allow different which is able to directly communicate with its peers. Differently
applications to run over the same M2M Device. from RFID tags equipped with sensors, Smart Objects are charac-
The M2M Application layer, instead, defines the application terized by high communication and interaction capabilities as well
logic. Instances of the M2M Application layer (as well as of the as higher management autonomy.
M2M Service Capability layer) run in both the Device & Gateway Furthermore, in the solution proposed in [33] nodes are clus-
and the Network Domains. tered and a cluster head is identified. This collects information
It is important to note that in the ETSI view, which is strongly generated by other nodes in its cluster and is responsible to trans-
influenced by the perspective of cellular network operators, M2M fer this information towards the network infrastructure. The use of
Devices or their M2M Gateway must be equipped with a cellular a cluster head is common to improve efficiency in the WSN litera-
wireless interface. ture [34–36].
In the Network Domain the Access Networks provide M2M De- As a general consideration, solutions that envision the integra-
vices with access to the Core Network: these are independent, in tion at the object layer are unpractical in that they cannot integrate
general, from the M2M technologies, and include most of the avail- objects already deployed in the environment.
able data access standards. The Core Network instead offers (at Integration at the system level: The basic idea of the solutions
least) IP connectivity, service and network control functions, inter- envisioning the integration at the system level is to introduce a
connection with other networks and roaming functionality. component at the edge of the network infrastructure which hides
the differences and heterogeneities among nodes.
3.4. Technologies to integrate RFIDs and WSNs in the IoT
For example, as shown in Fig. 4, the authors of [21] introduce
In this context, two approaches can be considered: (i) integra- a sort of gateway between wireless sensor networks and the EPC-
tion at the object level, i.e., any type of objects can be integrated global network infrastructure to translate events generated by the
L. Atzori et al. / Ad Hoc Networks 56 (2017) 122–140 129
4.1. Overview
In fact, in the second stage of the IoT evolution, the major fo-
cus was on giving the simple objects the capabilities to be di-
rectly connected to the Internet like any other host.
Table 4
Possible scenarios of integrating objects data into social networks with relevant type of communication and papers.
The tools to compose and build personalized and social appli- this heterogeneity by providing a common IoT application develop-
cations that process data from different sources are in continuous ment layer wherein the different hardware devices are virtualized.
evolution. Among these tools are: Ninja Blocks [67], IFTTT [68] and At the same time, services from different providers can be merged
the already mentioned Paraimpu [63]. Ninja Blocks controls de- (mashup process) in the cloud to provide complex services [70].
vices that can sense their environment and can act by controlling As already mentioned, during the third stage disruptive novel
lights, power sockets, and other actuators. The system provides a approaches to exploiting social networking concepts and technolo-
tool to drive the composition of actions and sensing tasks with gies in the IoT domain are fast arising. The driving idea is to allow
common social web sites such as Twitter, Facebook, Instagram. objects to autonomously establish social relationships and create
IFTTT is a web-based service that allows users to create chains their own social network separated from the one of the humans.
of simple conditional statements involving any type of objects and The motivation is that a social-oriented approach is expected to
through many social network sites. Accordingly, when some events boost the deployment of effective solutions to discover, select, and
monitored by objects make some statements becoming true, other compose services and data provided by distributed objects. It al-
objects are triggered to perform specific actions. lows objects to create a network, which manifests interesting prop-
A further remarkable project to mention is under development erties in terms of navigability, trustworthiness in data exchange
at the Ericsson Research laboratories, where researchers of the Us- and, scalability in a community of billions of devices.
ability Laboratory are implementing their vision of Social Web of At the network layer, the Information Centric Networking (ICN)
Things [9]. Accordingly, objects become capable of more autonomy paradigm, recently proposed to replace the host-centric network-
and the interactions between objects of the IoT are presented in ing paradigm of the Internet with a solution centred around the
analogy to the interactions people usually experience in Facebook exchanged data units, is gaining ground [71]. It represents a so-
or Twitter or other social networks. This helps people to master lution to the difficulties in matching the stringent performance
the complexity introduced by the IoT networking paradigm. requirements of IoT systems (scalability, robustness, energy effi-
ciency, to mention some) by relying on IP-based solutions. ICN fea-
tures such as the effective content naming schemes, the associ-
5. The third generation of the IoT: age of social objects, cloud
ated data retrieval and data sharing approaches, the native mobil-
computing, and future internet
ity support, the in-network caching, and the content-based secu-
rity are very appealing to IoT designers. Therefore, the strong com-
In this section we focus on the Third Generation of IoT so-
mitment of several research groups towards the application of ICN
lutions. More specifically, in Section 5.1 we provide an overview
principles in IoT contexts opens new opportunities [72].
of the motivation and solutions considered within this genera-
As a further point, it is worth highlighting the central role
tion. In the following sections we then present the major char-
played by knowledge representation solutions in this stage of the
acteristics of Social Internet of Things solutions (Section 5.2), the
IoT evolution. Currently, IoT systems and applications cannot be
use of semantic technologies and ICN paradigm in the IoT domain
effective without a complete knowledge about their components,
(Sections 5.3 and 5.4), the integration of IoT and cloud computing
characteristics and features, which must be, somehow, formalized
solutions (Section 5.5), and the evolved RFID solutions in the IoT
and disseminated. To this end, ontology can be used to introduce
(Section 5.6).
a formal, explicit specification of a shared conceptualization so as
to represent knowledge within a domain as a set of concepts re-
5.1. Overview lated to each other. Ontology is then used by semantic engines for
different purposes, such as: search, composition, and translation.
The Internet world is rapidly evolving under the pressure of a To conclude the description of this new era of the IoT, it is also
new wave, which is changing the way of building Internet services worth pointing out what happened to its funding technology, i.e.
and enabling ubiquitous, convenient, on-demand access to them: RFID. Actually the interest on it has not completely disappeared,
cloud computing. At the same time, a new generation of social ob- but surely its centrality in third generation IoT solutions is severely
jects is raising and is pushing towards new disruptive paradigms reduced.
for social networks of things. Last, the Internet, as we have been
knowing it, is about to undergo profound transformations which 5.2. Social Internet of Things
put content and services at the very center of the network opera-
tions. A keen attention to the social potential of the IoT building
blocks characterizes this generation. In fact, one finds papers, such
as [73], which describe architectures where objects are clearly
All these aspects are causing a further generational leap which identified as potentially able to participate in communities of ob-
is taking the IoT in what is often referred to as the Future Inter- jects, create groups of interest, and take collaborative actions. This
net which will exploit cloud computing technologies and will kind of researches, however, theorize the Social Internet of Things
be people-, content-, and service-centric. but do not indicate how to build the envisioned social network of
objects and how to implement the needed architecture and proto-
cols. This is provided by [74], where the authors propose mecha-
The reasons for an extension of cloud computing technologies nisms that can be used by objects to build friendship relationships.
and solutions to the IoT domain are various. Things generate great Besides, they suggest an architectural model for the resulting so-
amounts of data that need to be stored. Being local device mem- cial IoT with the major building blocks to create and manage the
ory usually limited and costly, the best solution is to send data objects social network. By relying on this architecture, [75] anal-
to the cloud, where functionalities such as encryption, authentica- yses the problem of evaluating the trustworthiness of each node
tion, duplication, annotation [69] can be implemented easily. Also in the network and propose a method to allow objects mimicking
the things need for on-demand use of IT resources (e. g., com- the behavior of the humans when evaluating the trustworthiness
puter, storage, and network) in a scalable and cost efficient way of friends. Motivated by the considerable amount of work in this
matches the cloud computing paradigm very well. Besides, IoT de- field, a recent review of related researches appeared in the litera-
vices are highly heterogeneous in terms of interfaces, achievable ture [76]. Herein, the use of the social networking technologies are
performance, and capabilities. The cloud may help in managing seen as means to increase the pervasiveness and ubiquity of the
L. Atzori et al. / Ad Hoc Networks 56 (2017) 122–140 133
computing systems as (social) interactions among objects in our from the SRs in the core networks. Therefore, a content-centric
living places are necessary to improve the ICT system performance. internetworking scheme and relevant specific strategies to adapt
to the needs of weak devices, playing the role of producers and
5.3. Semantic in the Internet of Things consumers of IoT data and applications, are studied in [87]. Simi-
larly, the work in [88] combines CCN with the concept of IoT and
One of the most notable efforts in this area is the Seman- investigates different ways to make use of the hierarchical CCN
tic Sensor Network Ontology (SSN) [77], which is not application- content naming, in-network caching, and other information-centric
dependent and is frequently adopted in different IoT domains to networking characteristics in a sensor environment.
describe the sensor and context properties. SSN is natively able to Differently, with reference to the Named Data Networking (NDN)
model the most common context properties and the set of proper- architecture, a high-level architecture for IoT systems has been de-
ties can also be extended unlimitedly. An important characteristic scribed in [89]. On top of the Thing layer, that accounts for the
of SSN is that sensors are not constrained to physical sensing de- multitude of devices of the IoT ecosystem, NDN acts as a network-
vices; rather a sensor is anything that can estimate or calculate ing layer, which hides to applications the complexity and diver-
the value of a phenomenon. Therefore, either a device or a com- sity of the underlying things by adapting its modules to their fea-
putational process or combination of these can play the role of a tures. Besides, in [90], the authors propose an NDN-based frame-
sensor, while a sensing device is a device that implements sensing work for the support of multi-source data retrieval (e.g., environ-
and belongs to the sensor class [78]. mental monitoring), which is a typical IoT traffic pattern not na-
The main drawback of SSN lies in the limitations of the adopted tively supported by NDN.
semantic web approach, which is unable to describe and perform An overview of possible naming schemes for the IoT is also de-
reasoning over the system dynamics. In the IoT, this precludes any scribed in [91] as part of a study conducted by referring to the
object representation that can evolve over time (e.g., having their MobilityFirst architecture.2 This report is interesting in that it lists
access policy, availability, geo-location, etc. changing over time). the different naming scheme applicable to IoT and compares them
The highlighted issue is clearly identified in the recent literature. with naming schemes available in ICN solutions.
Proposals are appearing, which propose to combine semantic web Differently, in [92] the authors propose a service discovery
technologies with temporal and spatial reasoning in order to accu- architecture for IoT which enables multi-ownership and flexible
rately reflect the behavior of the considered IoT systems. The con- management of information that is associated with an object dur-
tribution in [79] is noteworthy in that it also demonstrate that the ing its entire supply chain (clearly they refer to objects tagged
effectiveness of proposed solutions can be increased by adopting by RFID technology). The authors claim that a prototype will be
distributed models. implemented, based on the information centric Publish-Subscribe
Internet (PSI) architectures, originally created by the FP7 project
5.4. The information centric networking paradigm in the IoT PSIRP.3
The “prehistory” of ICN approaches for the IoT is probably rep- 5.5. The IoT moves to the cloud
resented by the ideas proposed by Ivan Stojmenovic and Stephan
Olariu in their work [80], which dates back to 2005, when the idea The need to migrate to the cloud typical features of IoT is
of IoT had not received yet the attention it is receiving now. Al- rooted in the specific nature of the objects that populate it. Due
though the authors actually review a number of emerging topics to the energy-constrained nature of wireless sensor devices, sev-
pertaining to a data-centric view of wireless sensor networks (such eral solutions in the relevant literature envision the alternation of
as data-driven routing for example), their work already includes duty-periods [93] and periods in which the RF interface of these
some interesting ideas that have been later recovered to handle devices is switched off. Similarly, RFID tags spend most of their
data in ICN-based solutions for the IoT. Scenarios for information time outside the radio coverage of an RFID reader. It can be con-
centric wireless sensor and actuator networks are also the subject cluded that IoT things are unreachable during most of their life-
of later works, such as [81–84]. time. Oppositely, IoT applications usually require things to be al-
More recently, several research activities have been devoted to ways reachable.
the integration of the ICN concepts specifically into the IoT. Re- Hence, the need has been identified for a digital counter-
search in this area is still at an early stage, although the advan- part of any IoT devices always on and running in some Internet
tages and opportunities that ICN offers and the related challenges servers [94] and to design solutions in which applications inter-
in a perspective of ICN-IoT integration have already emerged. Also, act with such digital representatives of physical entities. Accord-
solutions to the problems of service discovery and naming for IoT ing to the current technological trends in the ICT community, the
have already been proposed as part of the main platforms of ICN straightforward next step is to move these entities into the cloud.
developed. Therefore, solutions have been proposed that envision a Cloud of
Recent IETF Drafts [85,86] address the issue of building a uni- Things [95–97].
fied IoT platform based on the Information Centric Network archi- The reference architecture for a Cloud of Things is shown in
tecture. The authors clearly highlight the limitations of IP in serv- Fig. 8 [95]. IntraNode is the bottom layer of the protocol stack,
ing as an internetworking layer for the different intranets of things which deals with the virtualization of the resources provided by
developed without any form of coordination. They also illustrate devices. At this layer, the Sensing and Actuation as a Service
the potential of the main features of ICN to achieve seamless mo- (SAaaS) module runs all functions to virtualize the services offered
bility support, scalability, and efficient content and service delivery by a sensor or an actuator node.
in an Internet of Things. The IntraCloud/InterNode layer is responsible for the interac-
Most of the work concerning the integration of ICN in the tions between the virtualizations of different nodes run by the
IoT has the Content-Centric Networking (CCN) [11] architectures at same cloud. At this layer, a key role is played by the SAaaS Provider
its very basis. CCN provides a core network for the future Inter- which offers the APIs to manage and use the services offered by
net characterized by in-network memory and composed of Su- the virtualizations of the nodes running in the same cloud.
per Routers (SRs) with large content stores, high computing ca-
pabilities, and relatively reliable communication performance. De- 2
http://mobilityfirst.winlab.rutgers.edu/.
vices with constrained resources, typical of the IoT, greatly differ 3
http://www.psirp.org/.
134 L. Atzori et al. / Ad Hoc Networks 56 (2017) 122–140
The InterCloud/Platform as a Service (PaaS) layer handles the 6. Enabling technologies for next generation IoT
interactions between entities running in different clouds and ex-
ecutes the Thing as a Service (TaaS) module, which supports The current generation of IoT is definitely not the culmination
the meshup between heterogeneous resources in different clouds. of the evolutionary process depicted, thanks to emerging techno-
Through the APIs offered by this layer it is possible to virtualize logical trends that will keep on shaping the IoT of the future. In
the resources of physical objects running in different clouds. fact, in several technological areas, solutions are being specifically
Finally, the Software as a Service (SaaS) gives the potentiality to designed to fit the peculiarities of IoT devices and applications.
run instances of IoT software used by different applications. These solutions, in our opinion, will boost the IoT diffusion and
The great interest in the development of cloud based IoT so- provide new impetus to the IoT evolution.
lutions is also witnessed by the worldwide funded researches for What is happening in the Cloud Computing area is a remarkable
this purpose. Among the others, the EU is currently funding ClouT example. Cyber counterparts of objects virtualized in the Cloud of-
(http://clout-project.eu), a major project aimed at defining APIs fers to IoT important advantages that many research and industrial
and reference infrastructures for Cloud IoT and at developing rele- players are currently trying to exploit: supporting the discovery
vant tools. This is an EU-Japan collaboration project leveraging the and the mash up of services involving etherogeneous devices, fos-
Cloud Computing as an enabler to bridge the Internet of Things tering the creation of complex applications, improving the objects
with Internet of People via Internet of Services, to establish an effi- energy management efficiency, as well as addressing heterogene-
cient communication and collaboration platform exploiting all pos- ity and scalability issues. Notwithstanding, it is manifest that cy-
sible information sources to make the cities smarter. ber counterparts of physical things running in remote servers can
Interestingly, several real IoT platforms are already developed cause long delays, due to the distance between physical objects
on the cloud. This is the case of Xively (xively.com), which makes and their virtual counterparts, and large consumption of commu-
use of the LogMeIn cloud platform. Similarly, Oracle is taking a sig- nication resources. This problem has to be quickly addressed by
nificant position in providing IoT PaaS (Platform as a Service) ser- bringing closer the IoT objects (sensors, actuators, etc.) to the cy-
vices from its leading market position in database management. ber counterpart devoted to its management. Next generation solu-
Nimbits (www.nimbits.com) is already providing cloud services to tions shall thus move the cyber counterparts of the things to the
record and process time and geo stamped sensor data on the cloud. extreme edge of the network.
All the used software is open source and can be freely used to de- At the same time, what is needed is to implement a kind of
velop the desired applications. The access to the cloud services re- personal networks interconnecting all (physical and virtual) IoT de-
lies on RESTful API web interfaces. vices belonging to a given user in the same broadcast domain.
This is an unavoidable way to simplify the discovery of relevant
5.6. Evolved RFID-based solutions in IoT nodes/services, and to isolate personal IoT devices from the rest of
the world, which will allow for achieving a high degree of privacy
Still, in this generation, the process of integration between IoT and security.
concepts and solutions based on RFID technology continued still The mentioned activities are witnessing a great interest from
following two parallel paths of integration at the system- and de- big actors, such as Cisco, actively promoting the Fog Computing
vice level. A sample solution of system level integration is available paradigm [104], mainly with a focus on latency as required to
in [98], where the authors focus on the EPC Network and explain support interactive and locally-relevant IoT applications. Similarly,
how a wider adoption of its standards and tools will go through across Europe, several funded projects are paving the way to this
the inclusion of virtualization, cloud computing, and Web related further evolution in the IoT platforms for things and data manage-
concepts. The continuous momentum towards a tighter integration ment.
of RFID into IoT platforms is also testified by the researches in Software Defined Networking (SDN) [105] is a further technol-
[99,100] and [101]. Authors of [99] propose a system architecture ogy originally conceived to foster network programmability, by
L. Atzori et al. / Ad Hoc Networks 56 (2017) 122–140 135
decoupling the control and data planes, which can play a relevant tivity (as the word Internet implies) and to computing devices
role in facing the main hurdle to the take-off of IoT networks rep- of various kind (hence the presence of the word Things).
resented by the poor flexibility and adaptability of the network in- 2. The different points of view of the IoT stakeholders which have
frastructure. Early efforts to bring SDN in IoT can be found in [106], proposed the definition [114]. Differences, sometimes substan-
where the usage of heterogeneous wireless networks are orches- tial, in the IoT visions raised from the fact that stakeholders,
trated by the centralized control plane. The next challenge is to business alliances, research and standardization bodies started
include in this picture IoT nodes inherently able to sense the real approaching the issue from either an Internet oriented or a
world, take actions but also to store, manipulate and forward data, Things oriented perspective, depending on their specific inter-
through in-network processing, cross-layering, security and privacy ests, finalities and backgrounds. Besides, the attention to the
issues covered by design through SDN. representation and storing of the exchanged information be-
Recently, also cellular networks are being considered as en- came brought directly to a third, Semantic oriented, perspec-
abling internetworking solutions for IoT devices, as witnessed by tive.
the novel features introduced by the Third Generation Partner-
ship Project (3GPP) [107] to support IoT (also named machine- The definitions available from the literature or originated by the
type communications MTC in this context) characterized by intrin- main research projects [115] are wide-ranging and vary from some
sic battery-constrained capabilities and challenging traffic patterns. that are more minimalist, i.e., expressed by simple formulas (such
Still, a significant amount of research is necessary to improve as Services + Data + Networks + Sensors = Internet of Things, given
the access procedures of LTE/LTE-A systems to prevent IoT traffic by Nick Wainwright, HP Labs and Chair of the UK Future Internet
load from adversely affecting Human-to-Human (H2H) traffic. The Strategy Group) or simple concepts, to those so complex to make
research community is hardly working on this issue, as witnessed an excess of technology converge into the IoT. The problem with
by the research achievements and standardized solutions [108,109]. the former kind of definitions is twofold. These either oversimplify
Besides, it is our view, widely shared by the scientific community the meaning of IoT, by reducing the scope to a few technologies
[110,111], that the next-to-come fifth generation (5G) wireless sys- and solutions, or just represent mere repetitions, in more struc-
tems will play a key role in fulfilling the IoT requirements. In fact, tured ways, of nothing than the concept of “generic network that
these represent a revolution in the wireless ICT scenario thanks connects generic objects to provide generic services,” which could
to the innovative network features they will provide [112], among be true (we are talking about an Internet of Things), but does not
which are: native support of MTC, small-cell deployments, inter- contribute to the understanding of the phenomenon.
operability, optimized access/core segments also through network The latter approach suffers from a main drawback: if one brings
virtualization techniques. into the Internet of Things many concepts derived from different
In this evolutionary scenario, the device-to-device (D2D) architectures and technologies, such as ubiquitous/pervasive com-
paradigm, according to which devices communicate directly with puting, Internet Protocol (IP), Machine-to-Machine and embedded
each other without routing the data paths through a network in- devices, Internet of People, then eventually this makes IoT syn-
frastructure, will contribute to the IoT evolution in future 5G sce- onymous with everything and, therefore, denies to IoT the specific
narios [113]. Nonetheless, when considering the possibility of D2D- connotation it deserves.
based interconnection of IoT devices in cellular environment, se- Fortunately, there are common features that occur in many of
vere challenges still need to be faced, such as efficient device dis- the definitions given for IoT:
covery in heterogeneous environment, optimized link selection for
• A widely accepted feature is the presence of a global network
highly dynamic multi-tenant networks, security issues, and so on
infrastructure or network connectivity, which allows the inter-
[113].
operability of the elements of an IoT, their seamless integration
and a unique addressing scheme. This infrastructure shall be a
whatever global infrastructure (not necessarily IP-based) allow-
7. Defining the Internet of Things of year 2020!
ing to overcome the idea of separate Intranet of Things [116].
• Everyday objects, not only ICT devices, are the main players of
From the picture given in previous sections, it clearly appears
the IoT. These have to be readable, recognizable, locatable, ad-
that the term Internet of Things (or IoT) has been associated to
dressable, and/or controllable. As a consequence, it is widely
very different concepts, technologies, and solutions during its first
accepted that there is a need for solutions that allow for link-
appearance in the scientific community. The oddity of a term so
ing physical and virtual objects. The meaning is that sensors
abused and associated to many different meanings in such a short
and actuators shall be embedded into physical objects to enable
timeframe suggests that, maybe, there is a basic misunderstanding
them to operate through their virtual representations within a
in its use. Such misunderstanding has been amplified by the fact
digital overlay information system that is built over the physi-
that there are significant overlappings between the IoT and other
cal world. The interesting definition4 of IoT as an “intersection
important research areas such as smart objects, cyber physical sys-
of people (meatspace), systems (cyberspace) and physical world
tems, and ambient intelligence, for example.
(atomspace)” goes in this direction as well.
Then, we believe it is worth trying to shed light on what IoT
• Autonomy and autonomicity are two recurrent features which
actually is. The approach we choose is to start from highlighting
are claimed to characterize the objects that populate the
the substantial differences between IoT and terms and technolo-
IoT. This has not to surprise, as it clearly emerges from
gies often confused with it, rather than merely proposing a further
the literature [117] that system complexity can be controlled
definition that might add further chaos.
through the achievement of self-governance (autonomy) and
The task is not simple, because at first glance it is clearly evi-
self-management (autonomicity).
dent that each definition of IoT is a result of two biasing elements:
• Particular attention has to be paid to the design of effective
(better if “intelligent”) interfaces both between humans and
1. The historical period, with all the relevant evolutionary history
things and between things.
of ICT technologies adopted by IoT, in which the definition is
conceived. The rapid evolution of ICT technologies observed in
these last few years has inevitably influenced the definition of a 4
The definition has been given by Rick Bullotta in a Linkedin IoT group discus-
term that aspires to identify something related both to connec- sion in April 2010.
136 L. Atzori et al. / Ad Hoc Networks 56 (2017) 122–140
Table 5
Current technological frameworks: existing and missing IoT features.
RFID platforms Pervasiveness; often integrated with sensors/actuators Effective object virtualization; autonomy and autonomicity;
interaction between objects
Pervasive computing platforms Pervasiveness, autonomy and autonomicity; heterogeneity of Global network infrastructure; interfaces for thing to thing
technologies; association of services with objects interactions
Cyber-physical systems Pervasiveness; autonomy and autonomicity; interfaces between Global network infrastructure
humans and things as well as between things; heterogeneity
of technologies; association of services with objects
Sensor networks Autonomy and autonomicity; association between services and Global network infrastructure; pervasiveness; heterogeneity of
physical resources the technologies;
M2M systems Connectivity and global network infrastructure; Interfaces Pervasiveness; autonomy and autonomicity
between humans and things as well as between things;
heterogeneity of the technologies
we are persuaded that the best definition that can be given, in our Scheduling, the management of Security and Trust, and the Re-
humble opinion, for the Internet of Things as it appears today and source/Service Discovery. Note that Security and Trust Manage-
is sketched in Fig. 9 is: ment as well as Resource/Service Discovery will strongly rely
on-the SIoT.
• Northbound API: Finally, we have the Northbound API, which
a conceptual framework that leverages on the availability of is responsible of creating an abstraction of the services offered
heterogeneous devices and interconnection solutions, as well by the physical resources. A good starting point for the North-
as augmented physical objects providing a shared informa- bound API is the work carried out within the Open Connectiv-
tion base on global scale, to support the design of applications ity Foundation (https://openconnectivity.org). By leveraging the
involving at the same virtual level both people and represen- Northbound API, it will be possible to implement applications
tations of objects. according to the SAaaS as presented in Section 5.5.
8. Conclusions
In accordance with the above definition, we envision that in
the next future IoT platforms will evolve towards the architecture This article has analyzed the Internet of Things phenomenon
shown in Fig. 10, as explained in the following. Appropriate soft- from an evolutionary point of view, by emphasizing that the IoT
ware drivers will create abstractions of the IoT physical resources. has undergone several transformations in its characterizing tech-
Note that drivers can run either in the IoT devices or in some nologies and principles since its introduction. As a result of this
server. Such abstractions will hide the specific hardware/software analysis, three generations of IoT have been identified: the first
features of the IoT resources. The abstractions of the IoT resources one of tagged objects; the second one of things interconnection
will be used by the IoT Operating System which is organized in through web technologies; the third one of social objects, seman-
three layers: tic data representation, and cloud of things.
It is obvious that the IoT will continue to evolve as new com-
• Southbound API: This is a common layer of modern Network puting and communication paradigm will arrive at a mature stage,
Operating Systems, e.g., [119], and is responsible of creating in- consider the seminal work in [5,6] on the Internet of Nano Things,
ternal representations of the IoT resources and their services for example, and therefore we have provided a definition of the
which are used by the Core layer. One of the most impor- IoT as conceptual framework which is independent of the specific
tant operations executed by the Southbound API layers are the technologies involved. Indeed, we believe that at the present time
mapping between a unique, platform-independent identifier of finding an answer to the question “what IoT is and what it is
a specific IoT resource and the platform-dependent address of not” avoids confusions that could lead to the rejection of such a
such a resource. Another fundamental operation of the South- paradigm, which instead has the potentials to impact significantly
bound API layer is the implementation of the specific commu- on most of our current societal challenges.
nication/interoperation protocol of the physical resource.
• Core layer: This is responsible of the most critical operations ex- References
ecuted by the IoT Operating System. In the Core layer the Social
IoT will play a key role as it allows to create an overlay net- [1] S. Jeschke, The Internet of Things in Production Technology: Heterogeneous
work spanning different and even heterogeneous IoT platforms Agent Systems for Decentralized Production Paradigms, 6. Expertenforum.
Agenten im Umfeld von Industrie 4.0, 2014.
[74]. Other important operations performed by the Core layer [2] [Online]. Available: http://postscapes.com/internet- of- things- history.
are related to the management of the resources and include [3] M. Weiser, The computer for the twenty-first century, Sci. Am. (1991) 66–75.
138 L. Atzori et al. / Ad Hoc Networks 56 (2017) 122–140
[4] B. Sterling, Shaping Things, MIT Press, 2005. [43] S.E.H. Jensen, R.H. Jacobsen, Integrating rfid with ip host identities, Book: Ra-
[5] I.F. Akyildiz, J.M. Jornet, The internet of nano-things, IEEE Wireless Commun. dio Frequency Identification from System to Applications, 2013.
17 (6) (2010) 58–63. [44] A.J. Jara, S. Varakliotis, A.F. Skarmeta, P. Kirstein, Extending the internet of
[6] J.M. Jornet, I.F. Akyildiz, The internet of multimedia nano-things, Nano Com- things to the future internet through ipv6 support, Mobile Inf. Syst. 10 (1)
mun. Netw. 3 (4) (2012) 242–251. (2014) 3–17.
[7] E. Commission, Horizon 2020 work programme 2014 2015, european com- [45] M.-C. Chung, G.M. Lee, N. Crespi, C.-C. Tseng, Rfid Object Tracking with Ip
mission decision c, 2013. Compatibility for the Internet of Things, in: Proc. of IEEE International Con-
[8] 2013, Policy Modelling and Governance Tools for Sustainable Urban Develop- ference on Green Computing and Communications, Conference on Internet of
ment, “State-of-the-art and future challenges. Things, and Conference on Cyber, Physical and Social Computing, 2012.
[9] J. Formo, A. Fasbender, M. Grdman, T. Matsumura, Social web of objects, [46] D. Guinard, V. Trifa, E. Wilde, Architecting a mashable open world wide web
Patent US 20 110 161 478 A1 (2011). of things, ETH, Technical Report, 2010.
[10] A. Ghodsi, T. Koponen, J. Rajahalme, P. Sarolahti, S. Shenker, Naming in Con- [47] D. Guinard, V. Trifa, F. Mattern, E. Wilde, D. Uckelmann, M. Harrison, F. Micha-
tent-Oriented Architectures, in: In Proc. of ACM SIGCOMM - ICN Workshop, helles, From the Internet of Things to the Web of Things: Resource Oriented
2011. Architecture and Best Practice, Architecting the Internet of Things, 2011.
[11] V. Jacobson, D.K. Smetters, J.D. Thornton, M.F. Plass, N.H. Briggs, R.L. Braynard, [48] L. Atzori, A. Iera, G. Morabito, From “smart objects” to “social objects”: the
Networking Named Content, in: Proc. of ACM CoNEXT, 2009. next evolutionary step of the internet of things, IEEE Commun. Mag. 52 (1)
[12] T. Berners-Lee, R. Fielding, L. Masinter, Uniform resource identifier (uri): (2014) 97–105.
generic syntax, IETF RFC 3986 (2005). [49] N. Kushalnagar, G. Montenegro, C. Schumacher, Ipv6 over low-power wireless
[13] K. Ashton, Presentation at procter & gamble in 1999, reported in internet of personal area networks (6lowpans): overview, assumptions, problem state-
things thing. in the real world things matter more than ideas, RFID J. (2009). ment, and goals, IETF RFC 4919 (2007).
[14] Auto-id labs.” [Online]. Available: http://www.autoidlabs.org/. [50] I. Ishaq, D. Carels, G.K. Teklemariam, J. Hoebeke, F.V.d. Abeele, E.D. Poorter,
[15] 2009, The EPCglobal Architecture Framework, EPCglobal Final Version 1.3. I. Moerman, P. Demeester, Ietf standardization in the field of the internet of
[16] E. Welbourne, L. Battle, G. Cole, K. Gould, K. Rector, S. Raymer, M. Balazin- things, J. Sensor Actuator Netw. 2 (2) (2013) 235–287.
ska, G. Borriello, Building the internet of things using rfid: the rfid ecosystem [51] 2013, Sandvine Intelligent Broadband Networks, “Global internet phenomena
experience, IEEE Internet Comput. 13 (3) (2009) 48–55. report.
[17] A. Belpaire, Internet of things “already a reality today”, interview in eurescom [52] D. Crockford, The application/json media type fro javascript object notation
mess@ge, Mag. Telecom Insiders 2 (2009). (json), IETF RFC 4627 (2006).
[18] R.H. Weber, Internet of things - new security and privacy challenges, Com- [53] Z. Shelby, K. Hartke, C. Bormann, B. Frank, The constrained application proto-
puter Law Secur. Rev. 26 (2010) 23–30. col (coap), RFC 7252 (2014).
[19] B. Galloway, G.P. Hancke, Introduction to industrial control networks, IEEE [54] D. Guinard, M. Mueller, J. Pasquier-Rocha, Giving Rfid a Rest: Building a We-
Commun. Surv. Tutorials 15 (2) (2013) 860–880. b-Enabled Epcis, in: Proc. of Internet of Things Conference, 2010.
[20] M. Presser, A. Gluhak, The internet of things: connecting the real world with [55] F. Paganelli, S. Turchi, L. Bianchi, L. Ciofi, M.C. Pettenati, F. Pirri, D. Giuli, An
the digital world, eurescom mess@ge, Mag. Telecom Insiders 2 (2009). information-centric and rest-based approach for epc information services, J.
[21] J. Sung, T. Sanchez-Lopez, D. Kim, The Epc Sensor Network for Rfid and Wsn Commun. Softw. Syst. 9 (1) (2013).
Integration Infrastructure, in: Proc. of Fifth IEEE International Conference on [56] A.J. Jara, P. Moreno-Sanchez, A.F. Skarmeta, S. Varakliotis, P. Kirstein, Ipv6 ad-
Pervasive Computing and Communications Workshops (PerCom 2007), 2007. dressing proxy: mapping native addressing from legacy technologies and de-
[22] W. Wang, J. Sung, D. Kim, Complex Event Processing in Epc Sensor Network vices to the internet of things (ipv6), Sensors 13 (5) (2013) 6687–6712.
Middleware for Both Rfid and Wsn, in: Proc. of the 11-th IEEE International [57] M. Mller, RESTful EPCIS: Design and Implementation of a Web-enabled Elec-
Symposium on Object Oriented Real-Time Distributed Computing (ISORC), tronic Product Code Information Service (EPCIS), University of Fribourg, 2009
2008. Master’s thesis.
[23] H. Liu, M. Bolic, A. Nayak, I. Stojmenovic, Taxonomy and challenges of the [58] A. Castellani, S. Loreto, A. Rahman, T. Fossati, E. Dijk, Best practices for http-
integration of rfid and wireless sensor networks, IEEE Netw. 22 (6) (2008) coap mapping implementation, 2013, [Online]. Available: draft-castellanicore-
26–32. http-mapping-07.
[24] “Epcglobal inc., network frame architecture.” [Online]. Available: http://www. [59] S. D’Oro, L. Galluccio, G. Morabito, S. Palazzo, Exploiting object group localiza-
epcglobalinc.org/standards. tion in the internet of things: a performance analysis, IEEE Trans. Vehicular
[25] J.R. Smith, A.P. Sample, P.S. Powledge, S. Roy, A. Mamishev, A Wirelessly-Pow- Technol. 64 (8) (Aug. 2015).
ered Platform for Sensing and Computation, in: Proc. of UbiComp 20 06, 20 06. [60] A. Kamilaris, D. Papadiomidous, A. Pitsillides, Lessons Learned from Online
[26] EPC radio-frequency identity protocols class-1 generation-2 uhf rfid protocol Social Networking of Physical Things, in: International Conference on Broad-
for communications at 860 mhz - 960 mhz, version 2.0.0,” Specification for band and Wireless Computing, Communication and Applications, 2011.
RFID Air Interface. 2013, [61] T. Schmid, M.B. Srivastava, Exploiting social networks for sensor data sharing
[27] ISO/IEC 180 0 0-63 - Information technology - Radio frequency identification with senseshare, CENS 5th Annual Research Review, 2007.
for item management - Part 63: Parameters for air interface communications [62] E. Miluzzo, N.D. Lane, K. Fodor, R.A. Peterson, H. Lu, M. Musolesi, Shane,
at 860 MHz to 960 MHz Type C. 2013, B. Eisenman, X. Zheng, A.T. Campbell, Sensing Meets Mobile Social Networks:
[28] Application level events (ale), version 1.1.1, epcglobal specification. 2009, The Design, Implementation and Evaluation of the Cenceme Application, in:
[29] 2007, Low level reader protocol (LLRP), Version 1.0.1, EPCglobal specification. Proc. of 6th ACM Conference on Embedded Networked Sensor Systems, 2008.
[30] 2013, ETSI. machine-to-machine communications (M2M): Functional architec- [63] A. Pintus, D. Carboni, A. Piras, Paraimpu: A Platform for a Social Web of
ture. etsi ts 102 690. Things, in: Proc. of the 21st international conference companion on World
[31] A.N. Parks, A.P. Sample, Y. Zhao, J.R. Smith, A Wireless Sensing Platform Utiliz- Wide Web, 2012.
ing Ambient Rf Energy, in: Proc. of IEEE Topical Meeting on Wireless Sensors [64] V. Beltran, A.M. Ortiz, D. Hussein, N. Crespi, A Semantic Service Creation Plat-
and Sensor Networks, 2013. form for Social Iot, in: In Proc. of IEEE World Forum on Internet of Things
[32] B. Kellog, A. Parks, S. Gollakota, J.R. Smith, D. Wetherall, Wi-fi Backscatter: In- (WF-IoT), 2014.
ternet Connectivity for Rf-powered Devices, in: Proc. of ACM SigComm, 2014. [65] L.E. Holmquist, F. Mattern, B. Schiele, P. Alahutha, M. Beigl, H. Gallersen,
[33] T.S. Lopez, D. Ranasinghe, M. Harrison, D. McFarlane, Adding sense to the in- Smart-its Friends: A Technique for Users to Easily Establish Connections be-
ternet of things: an architecture framework for smart object systems, Pers. tween Smart Artefacts, in: Proc. of ACM UbiComp, 2001.
Ubiquitous Comput. 16 (3) (2012) 291–308. [66] A. Zelenkauskaite, N. Bessis, S. Sotiriadis, E. Asimakopoulou, Interconnected-
[34] W. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-Efficient Communi- ness of Complex Systems of Internet of Things through Social Network Analy-
cation Protocol for Wireless Sensor Networks, in: Proc. of HICSS 20 0 0, 20 0 0. sis for Disaster Management, in: Proc. of the 4th International Conference on
[35] S. Bandyopadhyay, E.J. Coyle, An Energy Efficient Hierarchical Clustering Algo- Social networking, 2012.
rithm for Wireless Sensor Networks, in: In Proc. of IEEE Infocom 2003, 2003. [67] Ninja blocks - the api for atoms. 2012,
[36] A.A. Abbasi, M. Younis, A survey on clustering algorithms for wireless sensor [68] Ifttt / put the internet to work for you.
networks, Comput. Commun. 30 (14–15) (2007) 2826–2841. [69] J. Zhou, T. Leppnen, E. Harjula, M. Ylianttila, T. Ojala, C. Yu, H. Jin, L.T. Yang,
[37] F. Carrez, Deliverable d1.5 final architectural reference model for the iot v3.0,” Cloudthings: A Common Architecture for Integrating the Internet of Things
IoT-A, Tech. Rep., 2013. [Online]. Available: http://www.iot-a.eu. with Cloud Computing, in: Proc. of IEEE International Conference on Com-
[38] Y. Shim, T. Kwon, Y. Choi, Sarif: a novel framework for integrating wireless puter Supported Cooperative Work in Design, 2013.
sensors and rfid networks, IEEE Wireless Commun. 14 (2007) 50–56. [70] J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, Internet of things (iot): a
[39] T.S. Lpez, D. Kim, G.H. Canepa, K. Koumadi, Integrating wireless sensors and vision, architectural elements, and future directions, Future Gener. Comput.
rfid tags into energy-efficient and dynamic context networks, Comput. J. 52 Syst. 29 (7) (2013) 16451660.
(2009) 240–267. [71] B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, B. Ohlman, A survey of
[40] I. Farris, A. Iera, A. Molinaro, S. Pizzi, A Coap-Compliant Solution for Efficient information-centric networking, IEEE Commun. Mag. 50 (7) (2012) 2636.
Inclusion of Rfid in the Internet of Things, in: In Proc. of IEEE Globecom, 2014. [72] M. Amedeo, C. Campolo, J. Quevedo, D. Corujo, A. Molinaro, A. Iera, R. Aguiar,
[41] S. Lee, M.K. Shin, H.J. Kim, EPC vs. IPv6 Mapping Mechanism, in: Proc. of the A. Vasilakos, Information-Centric networking for the internet of things: chal-
The 9th International Conference on Advanced Communication Technology, lenges and opportunities, IEEE Netw. 30 (2) (March-April 2016).
2007. [73] A.C. Boucouvalas, E.A. Kosmatos, N.D. Tselikas, Integrating rfids and smart ob-
[42] S. Dominikus, M. Aigner, S. Kraxberger, Passive Rfid Technology for the Inter- jects into a unified internet of things architecture, Adv. Internet Things 1 (1)
net of Things, in: Proc. of ICITST 2010, 2010. (2011) 5–12.
L. Atzori et al. / Ad Hoc Networks 56 (2017) 122–140 139
[74] L. Atzori, A. Iera, G. Morabito, M. Nitti, The social internet of things (siot): [97] K. Tei, L. Gurgen, Clout: Cloud of Things for Empowering the Citizen Cloud in
when social networks meet the internet of things: concept, architecture and Smart Cities, in: Proc. of IEEE WF-IoT, 2014.
network characterization, Comput. Networks 56 (16) (2012) 3594–3608. [98] D. Guinard, C. Floerkemeier, S. Sarma, Cloud Computing, Rest and Mashups
[75] M. Nitti, R. Girau, L. Atzori, Trustworthiness management in the social inter- to Simplify Rfid Application Development and Deployment, in: Proc. of ACM
net of things, IEEE Trans. Knowl. Data Eng. 26 (5) (2014) 1253–1266. WoT 2011, 2011.
[76] A. Ortiz, D. Hussein, S. Park, S. Han, N. Crespi, The cluster between internet [99] X. Shang, R. Zhang, D. Chen, Y. Chen, Agent-based epc-rfid network for smart
of things and social networks: review and research challenges, IEEE Internet awareness system, Adv. Inf. Sci. Serv. Sci. 3 (6) (2011).
Things J. 1 (3) (2014) 206–215. [100] C. Turcu, C. Turcu, The Social Internet of Things and the Rfid-based Robots,
[77] Semantic Sensor Network XG, “Final report: W3c incubator group re- in: Proc. of ICUMT 2012, 2012.
port,” 2011. [Online]. Available: http://www.w3.org/2005/Incubator/ssn/ [101] L.A. Amaral, F.P. Hessel, E.A. Bezerra, J.C. Corra, O.B. Longhi, T.F. Dias, Ecloudr-
XGR- ssn- 20110628/. fid a mobile software framework architecture for pervasive rfid-based appli-
[78] C. Perera, A. Zaslavsky, C.H. Liu, M. Compton, P. Christen, D. Georgakopoulos, cations, J. Netw. Comput. Appl. 34 (3) (2011) 972–979.
Sensor search techniques for sensing as a service architecture for the internet [102] A.J. Jara, M.A. Zamora, A.F. Skarmeta, Drug identification and interaction
of things, IEEE Sens. J. 14 (2) (2014). checker based on iot to minimize adverse drug reactions and improve drug
[79] S. De, B. Christophe, K. Moessner, Semantic enablers for dynamic digital-phys- compliance, Personal Ubiquitous Comput. 18 (1) (2014) 5–17.
ical object associations in a federated node architecture for the internet of [103] S. Amendola, R. Lodato, S. Manzari, C. Occhiuzzi, G. Marrocco, Rfid technology
things, Elsevier Ad Hoc Netw. 18 (2014) 102–120. for iot-based personal healthcare in smart spaces, IEEE Internet Things J. 1 (2)
[80] I. Stojimenovic, S. Olariu, Data-centric protocols for wireless sensor networks, (2014).
Handbook of Sensor Networks: Algorithms and Architectures, 2005. [104] F. Bonomi, R. Milito, J. Zhu, S. Addepalli, Fog Computing and Its Role in the
[81] N. Dinh, Y. Kim, Icn wireless sensor and actor network baseline scenarios, Internet of Things, in: In Proc. of the First Workshop on Mobile Computing,
ICNRG Internet Draft (2013). 2012.
[82] N. Dinh, Y. Kim, Potential of Information-Centric Wireless Sensor and Actor [105] D. Kreutz, F.M.V. Ramos, P.E. Verssimo, C.E. Rothenberg, S. Azodolmolky,
Networking, in: Proc. of COMMANTEL 2013, 2013. S. Uhlig, Software-defined networking: a comprehensive survey, Proc. IEEE
[83] T.-X. Do, Y. Kim, Information-centric Wireless Sensor and Actor Network in 103 (1) (2015) 14–76.
the Industrial Network, in: Proc. of ICTC, 2013. [106] A.C. Anadiotis, L. Galluccio, S. Milardo, G. Morabito, S. Palazzo, Towards a Net-
[84] D. Kutscher, S. Farrell, Towards an information-centric internet with more work Operating System for the Internet of Things, in: Proc. of IEEE World Fo-
things, IETF Internet Draft (2011). rum on Internet of Things (WF-IoT), 2015.
[85] Y. Zhang, D. Raychadhuri, L. Grieco, R. Ravindran, G. Wang, Icn based archi- [107] G.T. 22.368, Service requirements for machine-type communications (mtc),
tecture for iot, ICNRG Internet-Draft(2014). v13.11.0, 2014,
[86] Y. Zhang, D. Raychadhuri, L. Grieco, E. Baccelli, J. Burke, R. Ravindran, G. [108] G.T. 22.368, 2012, Evolved universal terrestrial radio access (e-utra): Radio
Wang, Icn based architecture for iot requirements and challenges, ICNRG resource control (rrc) v10.5.0.
Internet-Draft(2014). [109] . Z. 3GPP TSG RAN WG2, 2010, Mtc simulation results with specific solutions,
[87] Y. Song, H. Ma, L. Liu, Content-Centric Internetworking for Resource-con- document r2-104662.
strained Devices in the Internet of Things, in: Proc. of IEEE International Con- [110] M. Agiwal, A. Roy, N. Saxena, Next generation 5g wireless networks: a com-
ference on Communications, 2013. prehensive survey, IEEE Commun. Survey Tut. 18 (3) (2016).
[88] O. Waltari, Content-Centric Networking in the Internet of Things, University [111] A. Gupta, R.K. Jha, A survey of 5g network: architecture and emerging tech-
of Helsinki, 2013 Master’s thesis. nologies, IEEE Access (2015).
[89] M. Amadeo, C. Campolo, A. Iera, A. Molinaro, Named Data Networking for Iot: [112] F. Boccardi, R.W. Heath, A. Lozano, T.L. Marzetta, P. Popovski, Next generation
An Architectural Perspective, in: In Proc. of European Conference on Networks 5g wireless networks: a comprehensive survey, IEEE Commun. Mag. 52 (2)
and Communications, 2014a. (2014) 74–80.
[90] M. Amadeo, C. Campolo, A. Molinaro, Multi-Source Data Retrieval in Iot via [113] L. Militano, G. Araniti, M. Condoluci, I. Farris, A. Iera, Device-to-device com-
Named Data Networking, in: In Proc. of ACM Information-Centric Networking munications for 5g internet of things, EAI Endorsed Trans. Internet Things 1
Conference, 2014b. (1) (2015).
[91] Y. Li, Naming in the internet of things, 2013, [Online]. Available: http://www. [114] L. Atzori, A. Iera, G. Morabito, The internet of things: a survey, Comput. Netw.
cse.wustl.edu/∼jain/cse570-13/index.html. 54 (15) (2010) 2787–2805.
[92] G. Marias, N. Fotiou, G.C. Polyzos, Efficient Information Lookup for the Inter- [115] Internet of things definitions.” [Online]. Available: http://postscapes.com/
net of Things, in: Proc. of IEEE WoWMoM, 2012. internet- of- things- definition.
[93] P. Santi, J. Simon, Silence is golden with high probability: maintaining a con- [116] G. Venkat, Not iot, 2014, [Online]. Available: https://www.linkedin.com/today/
nected backbone in wireless sensor networks, Wireless Sensor Netw. 2920 post/article/20140620064438- 52931539- not- iot.
(2004) 106–121. [117] R.R. Sterritt, M. Hinchey, Autonomicity - an Antidote for Complexity? in: Proc.
[94] M. Zorzi, A. Gluhak, S. Lange, A. Bassi, From todays INTRAnet of things to a of IEEE Computational Systems Bioinformatics Conference, 2005.
future INTERnet of things: a wireless- and mobility-based view, IEEE Wireless [118] P. Buxmann, T. Hess, R. Ruggaber, Internet of services, Bus. Inf. Syst. Eng. 1
Commun. 17 (6) (2010) 44–51. (5) (2009) 341–342.
[95] S. Distefano, G. Merlino, A. Puliafito, Enabling the Cloud of Things, in: Proc. of [119] ON.Lab, Open network operating system (onos), 2016, [Online]. Available:
IMIS 2012, 2012. http://onosproject.org.
[96] S. Karnouskos, Smart Houses in the Smart Grid and the Search for Val-
ue-added Services in the Cloud of Things Era, in: Proc. of IEEE ICIT 2013, 2013.
140 L. Atzori et al. / Ad Hoc Networks 56 (2017) 122–140
Luigi Atzori, Ph.D., is Associate Professor at the Department of Electrical and Electronic Engineering at the University of Cagliari (Italy). L. Atzori
research interests are in multimedia communications and computer networking (wireless and wireline), with emphasis on multimedia QoE, multi-
media streaming, NGN service management, service management in wireless sensor networks, architecture and services in the Internet of Things.
L. Atzori is senior member of IEEE (since 2009), chair of the Steering Committee of the IEEE Multimedia Communications Committee (MMTC) and
co-chair of the IEEE 1907.1 standard on Network-Adaptive Quality of Experience (QoE) Management Scheme for Real-Time Mobile Video Commu-
nications. He is the coordinator of the Marie Curie Initial Training Network on QoE for multimedia services (qoenet-itn.eu), which involves ten
European Institutions in Europe and one in South Korea. He has been the editor for the ACM/Springer Wireless Networks Journal and guest edi-
tor for the IEEE Communications Magazine, the Springer Monet Journal and the Elsevier Signal Processing: Image Communications Journal. He is
member of the editorial board of the IEEE IoT, the Elsevier Ad Hoc Networks and the Advances on Multimedia journals.
Antonio Iera, Ph.D., is Full Professor of Telecommunications at the University of Reggio Calabria, Italy where he has Scientific Responsibility of
the Laboratory for Advanced Research into Telecommunication Systems (ARTS, www.arts.unirc.it). From 1994 to 1995 he has been at the Mobile
Network Division Research Center, Siemens AG Muenchen, Germany to participate, with task responsibilities, to the CEC Project RACE II 2084
ATDMA (Advanced TDMA Mobile Access) under a CEC Fellowship Contract in RACE Mobility Action. He served as guest editor of several special
issues in IEEE Magazines and Journals and has given several Tutorials and Invited Speeches in International Conferences and Workshops on the
Internet of Things, Social-IoT, and Cloud of Things topics. His research interests include Internet of Things, Social Internet of Things, Cloud of
Things, RFID Technology, Future Internet, Multicasting in 4G and 5G Networks. He is a Senior Member of IEEE.
Giacomo Morabito is Associate Professor at the University of Catania. From November 1999 to April 2001, he was with the Broadband and Wireless
Networking Laboratory of the Georgia Institute of Technology. He has been involved in several EU projects: in particular he was responsible for the
participation of the CNIT RU at University of Catania in the STREP DISCREET and the Collaborative project CONVERGENCE. He serves (or has served)
in the Editorial Boards of the IEEE Wireless Communications Magazine, and the Elsevier Computer Networks, and Wireless Network journals. He
has also been the General Co-Chair of the Med-Hoc-Net 2006 and ACM NanoCom 2016 conference and TPC Chair of Med-Hoc-Net 2004 and ACM
SIGCOMM-ICN. His main research interests are in Internet of Things and Software Defined Networks.