{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:17:51Z","timestamp":1774023471078,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031209352","type":"print"},{"value":"9783031209369","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20936-9_5","type":"book-chapter","created":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T05:12:32Z","timestamp":1672549952000},"page":"55-68","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["IntellIoT: Intelligent IoT Environments"],"prefix":"10.1007","author":[{"given":"Arne","family":"Br\u00f6ring","sequence":"first","affiliation":[]},{"given":"Vivek","family":"Kulkarni","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Zirkler","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Buschmann","sequence":"additional","affiliation":[]},{"given":"Konstantinos","family":"Fysarakis","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Mayer","sequence":"additional","affiliation":[]},{"given":"Beatriz","family":"Soret","sequence":"additional","affiliation":[]},{"given":"Lam Duc","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Petar","family":"Popovski","sequence":"additional","affiliation":[]},{"given":"Sumudu","family":"Samarakoon","sequence":"additional","affiliation":[]},{"given":"Mehdi","family":"Bennis","sequence":"additional","affiliation":[]},{"given":"J\u00e9r\u00f4me","family":"H\u00e4rri","sequence":"additional","affiliation":[]},{"given":"Martijn","family":"Rooker","sequence":"additional","affiliation":[]},{"given":"Gerald","family":"Fritz","sequence":"additional","affiliation":[]},{"given":"Anca","family":"Bucur","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Spanoudakis","sequence":"additional","affiliation":[]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,1]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Ansari, R.I., et al:. 5G D2D networks: techniques, challenges, and future prospects. IEEE Syst. J. 12(4), 3970\u20133984 (2017)","DOI":"10.1109\/JSYST.2017.2773633"},{"key":"5_CR2","series-title":"Internet of Things","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5861-5","volume-title":"Internet of Everything","year":"2018","unstructured":"Di Martino, B., Li, K.-C., Yang, L.T., Esposito, A. (eds.): Internet of Everything. IT, Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-10-5861-5"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Bennis, M., Debbah, M., Poor, H.V.: Ultrareliable and low-latency wireless communication: tail, risk, and scale. Proc. IEEE 106(10), 1834\u20131853 (2018)","DOI":"10.1109\/JPROC.2018.2867029"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Br\u00f6ring, A., Seeger, J., Papoutsakis, M., Fysarakis, K., Caracalli, A.: Networking-aware IoT application development. Sensors 20(3), 897 (2020)","DOI":"10.3390\/s20030897"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Bu, F., Wang, X.: A smart agriculture IoT system based on deep reinforcement learning. Futur. Gener. Comput. Syst. 99, 500\u2013507 (2019)","DOI":"10.1016\/j.future.2019.04.041"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Cardellini, V., Grassi, V., Presti, F.L., Nardelli, M.: Optimal operator placement for distributed stream processing applications. In: Proceedings of the 10th ACM International Conference on Distributed and Event-based Systems, pp. 69\u201380. ACM Press (2016)","DOI":"10.1145\/2933267.2933312"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Chen, M., Yang, Z., Saad, W., Yin, C., Poor, H.V, Cui, S.: A joint learning and communications framework for federated learning over wireless networks. IEEE Trans. Wireless Commun. PP, 1\u20131 (2020)","DOI":"10.1109\/TWC.2020.3024629"},{"key":"5_CR8","unstructured":"Ciortea, A., Mayer, S., Gandon, F., Boissier, O., Ricci, A., Zimmermann, A.: A decade in Hindsight: the missing bridge between multi-agent systems and the world wide web. In: Proceedings of the 18th International Conference on Autonomous Agents and Multi Agent Systems, pp. 1659\u20131663. International Foundation for Autonomous Agents and Multiagent Systems (2019)"},{"key":"5_CR9","unstructured":"IntellIoT consortium. Deliverable D2.3 - High level architecture (first version). https:\/\/intelliot.eu\/wp-content\/uploads\/2021\/10\/D2.3-High-level-architecture-first-version.pdf"},{"key":"5_CR10","unstructured":"Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Challenges and opportunities, Internet of Things security and forensics (2018)"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Danzi, P., et al.: Communication aspects of the integration of wireless IoT devices with distributed ledger technology. IEEE Netw. 34(1), 47\u201353 (2020)","DOI":"10.1109\/MNET.001.1900180"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Giordani, M., Polese, M., Roy, A., Castor, D., Zorzi, M.: Initial access frameworks for 3GPP NR at mmWave frequencies. In: 2018 17th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), pp. 1\u20138. IEEE (2018)","DOI":"10.23919\/MedHocNet.2018.8407094"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Ha, K., Chen, Z., Hu,W., Richter, W., Pillai, P., Satyanarayanan, M.: Towards wearable cognitive assistance. In: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, pp. 68\u201381. ACM (2014)","DOI":"10.1145\/2594368.2594383"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Holzinger, A., et al.: Interactive machine learning: experimental evidence for the human in the algorithmic loop. App. Intell. 49(7), 2401\u20132414 (2019)","DOI":"10.1007\/s10489-018-1361-5"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Hsieh, B.Z., Chao,Y.H, Cheng, R.G., Nikaein, N.: Design of a UE-specific uplink scheduler for narrowband Internet-of-Things (NB-IoT) systems. In: 2018 3rd International Conference on Intelligent Green Building and Smart Grid (IGBSG), pp. 1\u20135. IEEE (2018)","DOI":"10.1109\/IGBSG.2018.8393573"},{"key":"5_CR16","unstructured":"Islam, M.M, Morshed, S., Goswami. P.: Cloud computing: a survey on its limitations and potential solutions. Int. J. Comput. Sci. Iss. (IJCSI) 10(4), 159 (2013)"},{"key":"#cr-split#-5_CR17.1","unstructured":"Kaltenberger, F., Souza, G.D., Knopp, R., Wang, H.:The OpenAirInterface 5G new radio implementation: current status and roadmap. In: WSA 2019"},{"key":"#cr-split#-5_CR17.2","unstructured":"23rd International ITG Workshop on Smart Antennas, pp. 1-5. VDE (2019)"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395\u2013411 (2018)","DOI":"10.1016\/j.future.2017.11.022"},{"key":"5_CR19","unstructured":"Kone\u010dn\u1ef3 J., McMahan, B.H., Ramage, D., Richt\u00e1rik, P.: Federated optimization: distributed machine learning for on-device intelligence. arXiv preprint arXiv:1610.02527 (2016)"},{"key":"5_CR20","unstructured":"Kovatsch, M., Matsukura, R., Lagally, M., Kawagucchi, T., Toumura, K., Kajimoto, K.: Web of Things (WoT) Architecture (2019). https:\/\/w3c.github.io\/wot-architecture"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Mohan, N., Kangasharju, J.: Edge-Fog cloud: a distributed cloud for Internet of Things computations. In: 2016 Cloudification of the Internet of Things (CIoT), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/CIOT.2016.7872914"},{"issue":"11","key":"5_CR22","doi-asserted-by":"publisher","first-page":"2204","DOI":"10.1109\/JPROC.2019.2941458","volume":"107","author":"J Park","year":"2019","unstructured":"Park, J., Samarakoon, S., Bennis, M., Debbah, M.: Wireless network intelligence at the edge. Proc. IEEE 107(11), 2204\u20132239 (2019)","journal-title":"Proc. IEEE"},{"issue":"3","key":"5_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3386361","volume":"20","author":"J Seeger","year":"2020","unstructured":"Seeger, J., Br\u00f6ring, A., Carle, G.: Optimally self-healing IoT choreographies. ACM Trans. Internet Technol. (TOIT) 20(3), 1\u201320 (2020)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Sun, L., Peng, C., Zhan, W., Tomizuka, M.: A fast integrated planning and control framework for autonomous driving via imitation learning. In: Dynamic Systems and Control Conference, vol. 51913, p. V003T37A012. American Society of Mechanical Engineers (2018)","DOI":"10.1115\/DSCC2018-9249"},{"key":"5_CR25","doi-asserted-by":"publisher","first-page":"9998","DOI":"10.1109\/ACCESS.2019.2891613","volume":"7","author":"X-L Xiong","year":"2019","unstructured":"Xiong, X.-L., Yang, L., Zhao, G.-S.: Effectiveness evaluation model of moving target defense based on system attack surface. IEEE Access 7, 9998\u201310014 (2019)","journal-title":"IEEE Access"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Yang, H.H., Liu, Z., Quek, T.Q., Poor, H.V.: Scheduling policies for federated learning in wireless networks. IEEE Trans. Commun. 68(1), 317\u2013333 (2019)","DOI":"10.1109\/TCOMM.2019.2944169"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Yi, S., Hao, Z., Qin, Z., Li, Q.: Fog computing: platform and applications. In: 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb), pp. 73\u201378. IEEE (2015)","DOI":"10.1109\/HotWeb.2015.22"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Yousefpour, A., et al.: All one needs to know about fog computing and related edge computing paradigms: a complete survey. J. Syst. Architect. 98, 289\u2013330 (2019)","DOI":"10.1016\/j.sysarc.2019.02.009"}],"container-title":["Lecture Notes in Computer Science","Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20936-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T05:52:46Z","timestamp":1672552366000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20936-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031209352","9783031209369"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20936-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"1 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GIoTS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Global IoT Summit","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dublin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ireland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"giots2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/globaliotsummit.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"75","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}