{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T10:47:36Z","timestamp":1778150856029,"version":"3.51.4"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031095924","type":"print"},{"value":"9783031095931","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,6,17]],"date-time":"2022-06-17T00:00:00Z","timestamp":1655424000000},"content-version":"vor","delay-in-days":167,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The fast growth of the IoT and the unlimited possibilities in terms of applications and processing brought forth by the 5G which is around the corner is making IoT an active part of the activity of daily living. Those massive architectures become then the target of security issues, broken services, broken hardware or malfunctioning of applications. Moreover, in a system of million connected devices, operating each one of them is impossible making the platform unmaintainable. In this study, we present our attempt to achieve the autonomy of IoT infrastructure and we present some of the existing and recurrent issues undermining the IoT architecture. Then we review existing self-healing techniques that enable a system to be autonomous and solve issues. We also described our IoT platform that targets the self-healing concern. Finally, we point out some recommendations to make an overall reliable, resilient IoT system with cognitive entities for self-management.<\/jats:p>","DOI":"10.1007\/978-3-031-09593-1_1","type":"book-chapter","created":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T11:13:50Z","timestamp":1655810030000},"page":"3-17","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Self-healing Approach for IoT Architecture: AMI Platform"],"prefix":"10.1007","author":[{"given":"Bessam","family":"Abdulrazak","sequence":"first","affiliation":[]},{"given":"Josu\u00e9 Ayi","family":"Codjo","sequence":"additional","affiliation":[]},{"given":"Suvrojoti","family":"Paul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,17]]},"reference":[{"key":"1_CR1","unstructured":"Rivera, J., Goasduff, L.: Gartner says a thirty-fold increase in internet-connected physical devices by 2020 will significantly alter how the supply chain operates. Gartner (2014). https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2014-03-24-gartner-says-a-thirty-fold-increase-in-internet-connected-physical-devices-by-2020-will-significantly-alter-how-the-supply-chain-operates. Accessed 8 Sep 2021"},{"key":"1_CR2","doi-asserted-by":"publisher","unstructured":"Naik, S., Maral, V.: Cyber security \u2013 IoT. In: 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (2017). https:\/\/doi.org\/10.1109\/RTEICT.2017.8256700","DOI":"10.1109\/RTEICT.2017.8256700"},{"key":"1_CR3","unstructured":"de Almeida, F.M., Ribeiro, A., Moreno, E.D.: An architecture for self-healing in internet of things. In: Ubicomm (2015)"},{"key":"1_CR4","first-page":"1579","volume":"3","author":"G Gupta","year":"2003","unstructured":"Gupta, G., Younis, M.: Fault-tolerant clustering of wireless sensor networks. IEEE Wirel. Commun. Networking Conf. WCNC 3, 1579\u20131584 (2003)","journal-title":"IEEE Wirel. Commun. Networking Conf. WCNC"},{"key":"1_CR5","doi-asserted-by":"publisher","unstructured":"Vecchio, M., Sasidharan, S., Marcelloni, F., Giaffreda, R.: Reconfiguration of environmental data compression parameters through cognitive IoT technologies (2013). https:\/\/doi.org\/10.1109\/WiMOB.2013.6673353","DOI":"10.1109\/WiMOB.2013.6673353"},{"key":"1_CR6","doi-asserted-by":"publisher","unstructured":"Angarita, R.: Responsible objects: towards self-healing internet of things applications (2015). https:\/\/doi.org\/10.1109\/ICAC.2015.60","DOI":"10.1109\/ICAC.2015.60"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Abdulrazak, B., Paul, S., Maraoui, S., Rezaei, A., Xiao, T.: IoT Architecture with Plug and Play for fast deployment and system reliability: AMI Platform. In: International Conference On Smart Living and Public Health (2022)","DOI":"10.1007\/978-3-031-09593-1_4"},{"issue":"12","key":"1_CR8","first-page":"3","volume":"3","author":"KK Raghunath","year":"2013","unstructured":"Raghunath, K.K.: Investigation of faults, errors and failures in wireless sensor network: a systematical survey. Int. J. Adv. Comput. Res. 3(12), 3 (2013)","journal-title":"Int. J. Adv. Comput. Res."},{"key":"1_CR9","unstructured":"Koopman, P.: Elements of the Self-Healing System Problem Space. System (2003)"},{"key":"1_CR10","doi-asserted-by":"publisher","unstructured":"Joshi, K.R., Hiltunen, M.A., Sanders, W.H., Schlichting, R.D.: Automatic model-driven recovery in distributed systems (2005) https:\/\/doi.org\/10.1109\/RELDIS.2005.11","DOI":"10.1109\/RELDIS.2005.11"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Porter, B., Ta\u00a8\u0131ani, T., Coulson, G.: Generalised repair for overlay networks (2006)","DOI":"10.1109\/SRDS.2006.23"},{"issue":"1","key":"1_CR12","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/JETCAS.2013.2243032","volume":"3","author":"MT Lazarescu","year":"2013","unstructured":"Lazarescu, M.T.: Design of a WSN platform for long-term environmental monitoring for IoT applications. IEEE J. Emerg. Sel. Top. Circuits Syst. 3(1), 45\u201354 (2013)","journal-title":"IEEE J. Emerg. Sel. Top. Circuits Syst."},{"key":"1_CR13","doi-asserted-by":"publisher","unstructured":"Singh, S., Woo, M., Raghavendra, C.S.: Power-aware routing in mobile ad hoc networks (1998). https:\/\/doi.org\/10.1145\/288235.288286","DOI":"10.1145\/288235.288286"},{"key":"1_CR14","unstructured":"Begum, R., Shaikh, Syed, A.: Sensor node failure detection in wireless sensor network: a survey (2018)"},{"key":"1_CR15","doi-asserted-by":"publisher","unstructured":"al Dahoud, A., Doghmane, R.: Failure detection on wireless sensor network based on comparative study (2017). https:\/\/doi.org\/10.1109\/RISE.2017.8378140","DOI":"10.1109\/RISE.2017.8378140"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-32785-9_1","volume-title":"How AI Impacts Urban Living and Public Health","author":"I Sadek","year":"2019","unstructured":"Sadek, I., Rehman, S.U., Codjo, J., Abdulrazak, B.: Privacy and security of IoT based healthcare systems: concerns, solutions, and recommendations. In: Pag\u00e1n, J., Mokhtari, M., Aloulou, H., Abdulrazak, B., Cabrera, M.F. (eds.) ICOST 2019. LNCS, vol. 11862, pp. 3\u201317. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32785-9_1"},{"key":"1_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2014.20","author":"Z Tari","year":"2014","unstructured":"Tari, Z.: Security and privacy in cloud computing. IEEE Cloud Comput. (2014). https:\/\/doi.org\/10.1109\/MCC.2014.20","journal-title":"IEEE Cloud Comput."},{"key":"1_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014","author":"S Raza","year":"2013","unstructured":"Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the internet of things. Ad Hoc Netw. (2013). https:\/\/doi.org\/10.1016\/j.adhoc.2013.04.014","journal-title":"Ad Hoc Netw."},{"key":"1_CR19","doi-asserted-by":"publisher","unstructured":"Dai, Y.S., Hinchey, M., Qi, M., Zou, X.: Autonomie security and self-protection based on feature-recognition with virtual neurons (2006). https:\/\/doi.org\/10.1109\/DASC.2006.24","DOI":"10.1109\/DASC.2006.24"},{"key":"1_CR20","doi-asserted-by":"publisher","unstructured":"Kephart, J.O.: Research challenges of autonomic computing (2005). https:\/\/doi.org\/10.1145\/1062455.1062464","DOI":"10.1145\/1062455.1062464"},{"key":"1_CR21","doi-asserted-by":"publisher","unstructured":"Nguyen, T.A., Aiello, M., Yonezawa, T., Tei, K.: A self-healing framework for online sensor data (2015). https:\/\/doi.org\/10.1109\/ICAC.2015.61","DOI":"10.1109\/ICAC.2015.61"},{"issue":"1","key":"1_CR22","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s11280-015-0329-1","volume":"19","author":"R Angarita","year":"2015","unstructured":"Angarita, R., Rukoz, M., Cardinale, Y.: Modeling dynamic recovery strategy for composite web services execution. World Wide Web 19(1), 89\u2013109 (2015)","journal-title":"World Wide Web"},{"key":"1_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2013.2281657","author":"V Foteinos","year":"2013","unstructured":"Foteinos, V., Kelaidonis, D., Poulios, G., Vlacheas, P., Stavroulaki, V., Demestichas, P.: Cognitive management for the internet of things: a framework for enabling autonomous applications. IEEE Veh. Technol. Mag. (2013). https:\/\/doi.org\/10.1109\/MVT.2013.2281657","journal-title":"IEEE Veh. Technol. Mag."},{"key":"1_CR24","doi-asserted-by":"publisher","unstructured":"Kelaidonis, D., et al.: Virtualization and cognitive management of real world objects in the internet of things (2012). https:\/\/doi.org\/10.1109\/GreenCom.2012.37","DOI":"10.1109\/GreenCom.2012.37"},{"key":"1_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.030","author":"L Atzori","year":"2019","unstructured":"Atzori, L., et al.: SDN&NFV contribution to IoT objects virtualization. Comput. Netw. (2019). https:\/\/doi.org\/10.1016\/j.comnet.2018.11.030","journal-title":"Comput. Netw."},{"key":"1_CR26","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-642-37935-2_15","volume-title":"Mobile Networks and Management","author":"D Kelaidonis","year":"2013","unstructured":"Kelaidonis, D., et al.: A cognitive management framework for smart objects and applications in the internet of things. In: Timm-Giel, A., Strassner, J., Ag\u00fcero, R., Sargento, S., Pentikousis, K. (eds.) MONAMI 2012. LNICSSITE, vol. 58, pp. 196\u2013206. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37935-2_15"}],"container-title":["Lecture Notes in Computer Science","Participative Urban Health and Healthy Aging in the Age of AI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-09593-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T22:41:56Z","timestamp":1675896116000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-09593-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031095924","9783031095931"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-09593-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"17 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICOST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Homes and Health Telematics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icost2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icost-society.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}