{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:47:59Z","timestamp":1760240879373,"version":"build-2065373602"},"reference-count":40,"publisher":"MDPI AG","issue":"20","license":[{"start":{"date-parts":[[2019,10,16]],"date-time":"2019-10-16T00:00:00Z","timestamp":1571184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003407","name":"Ministero dell\u2019Istruzione, dell\u2019Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","award":["PON04a200490","PON04a200381"],"award-info":[{"award-number":["PON04a200490","PON04a200381"]}],"id":[{"id":"10.13039\/501100003407","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007706","name":"Ministero dello Sviluppo Economico","doi-asserted-by":"publisher","award":["PON 2014\/2020 POS. 395"],"award-info":[{"award-number":["PON 2014\/2020 POS. 395"]}],"id":[{"id":"10.13039\/501100007706","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Virtualization technologies are characterizing major advancements in the Internet of Things (IoT) arena, as they allow for achieving a cyber-physical world where everything can be found, activated, probed, interconnected, and updated at both the virtual and the physical levels. We believe these technologies should apply to human users other than things, bringing us the concept of the Virtual User (VU). This should represent the virtual counterpart of the IoT users with the ultimate goal of: (i) avoiding the user from having the burden of following the tedious processes of setting, configuring and updating IoT services the user is involved in; (ii) acting on behalf of the user when basic operations are required; (iii) exploiting to the best of its ability the IoT potentialities, always taking always account the user profile and interests. Accordingly, the VU is a complex representation of the user and acts as a proxy in between the virtual objects and IoT services and application; to this, it includes the following major functionalities: user profiling, authorization management, quality of experience modeling and management, social networking and context management. In this respect, the major contributions of this paper are to: provide the definition of VU, present the major functionalities, discuss the legal issues related to its introduction, provide some implementation details, and analyze key performance aspects in terms of the capability of the VU to correctly identify the user profile and context.<\/jats:p>","DOI":"10.3390\/s19204489","type":"journal-article","created":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T04:46:06Z","timestamp":1571287566000},"page":"4489","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Virtual User in the IoT: Definition, Technologies and Experiments"],"prefix":"10.3390","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1298-7960","authenticated-orcid":false,"given":"Roberto","family":"Girau","sequence":"first","affiliation":[{"name":"DIEE, University of Cagliari and National Inter-University Consortium for Telecommunications (CNIT), Research Unit of Cagliari, 09123 Cagliari, Italy"}]},{"given":"Raimondo","family":"Cossu","sequence":"additional","affiliation":[{"name":"DIEE, University of Cagliari and National Inter-University Consortium for Telecommunications (CNIT), Research Unit of Cagliari, 09123 Cagliari, Italy"}]},{"given":"Massimo","family":"Farina","sequence":"additional","affiliation":[{"name":"DIEE, University of Cagliari and National Inter-University Consortium for Telecommunications (CNIT), Research Unit of Cagliari, 09123 Cagliari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6141-3031","authenticated-orcid":false,"given":"Virginia","family":"Pilloni","sequence":"additional","affiliation":[{"name":"DIEE, University of Cagliari and National Inter-University Consortium for Telecommunications (CNIT), Research Unit of Cagliari, 09123 Cagliari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1350-3574","authenticated-orcid":false,"given":"Luigi","family":"Atzori","sequence":"additional","affiliation":[{"name":"DIEE, University of Cagliari and National Inter-University Consortium for Telecommunications (CNIT), Research Unit of Cagliari, 09123 Cagliari, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2019,10,16]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Girau, R., Pilloni, V., and Atzori, L. (2018, January 5\u20138). The virtual user: The holistic manager of our IoT applications. Proceedings of the IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore.","DOI":"10.1109\/WF-IoT.2018.8355115"},{"key":"ref_2","unstructured":"O\u2019reilly, T. (2007). What is Web 2.0: Design patterns and business models for the next generation of software. Commun. Strateg., 17\u201337."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/MIC.2007.52","article-title":"Embracing \u201cWeb 3.0\u201d","volume":"11","author":"Lassila","year":"2007","journal-title":"IEEE Internet Comput."},{"key":"ref_4","unstructured":"Moschonas, P., Tsakiris, A., and Tzovaras, D. (April, January 29). Product accessibility evaluation using virtual user models. Proceedings of the IEEE Virtual Reality (VR), Minneapolis, MN, USA."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1017\/S0269888906000397","article-title":"User profiling in personal information agents: A survey","volume":"20","author":"Godoy","year":"2005","journal-title":"Knowl. Eng. Rev."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Chin, D. (1991). Intelligent Interfaces as Agents. Intelligent User Interfaces, ACM.","DOI":"10.1145\/107215.128698"},{"key":"ref_7","unstructured":"Lieberman, H. (2001). Your Wish is My Command: Programming by Example, Morgan Kaufmann."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/S0020-7373(83)80007-8","article-title":"Users are individuals: Individualizing user models","volume":"18","author":"Rich","year":"1983","journal-title":"Int. J. Man-Mach. Stud."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Resnick, P., Iacovou, N., Suchak, M., Bergstrom, P., and Riedl, J. (1994, January 22\u201326). GroupLens: An open architecture for collaborative filtering of netnews. Proceedings of the 1994 ACM Conference on Computer Supported Cooperative Work, Chapel Hill, NC, USA.","DOI":"10.1145\/192844.192905"},{"key":"ref_10","first-page":"329","article-title":"User modeling via stereotypes","volume":"3","author":"Rich","year":"1979","journal-title":"Cogn. Sci."},{"key":"ref_11","first-page":"924","article-title":"Letizia: An agent that assists web browsing","volume":"1995","author":"Lieberman","year":"1995","journal-title":"IJCAI"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/BF01099758","article-title":"Feature Based Modelling: A methodology for producing coherent, consistent, dynamically changing models of agents\u2019 competencies","volume":"5","author":"Webb","year":"1995","journal-title":"User Model. User Adapt. Interact."},{"key":"ref_13","unstructured":"iCore Empowering IoT through Cognitive Technologies, 2011\u20132014. funded by the European Commission under the 7th Framework Programme."},{"key":"ref_14","unstructured":"COMPOSE (2012). Collaborative Open Market to Place Objects at Your Service, CORDIS."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1228","DOI":"10.1109\/COMST.2015.2498304","article-title":"The virtual object as a major element of the internet of things: A survey","volume":"18","author":"Nitti","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Kelaidonis, D., Somov, A., Foteinos, V., Poulios, G., Stavroulaki, V., Vlacheas, P., Demestichas, P., Baranov, A., Biswas, A.R., and Giaffreda, R. (2012, January 20\u201323). Virtualization and cognitive management of real world objects in the internet of things. Proceedings of the IEEE International Conference on Green Computing and Communications, Besancon, France.","DOI":"10.1109\/GreenCom.2012.37"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1080\/00207160.2014.915316","article-title":"DCapBAC: Embedding authorization logic into smart things through ECC optimizations","volume":"93","author":"Jara","year":"2016","journal-title":"Int. J. Comput. Math."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/MVT.2013.2281657","article-title":"Cognitive Management for the Internet of Things: A Framework for Enabling Autonomous Applications","volume":"8","author":"Foteinos","year":"2013","journal-title":"Veh. Technol. Mag. IEEE"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/JIOT.2016.2616022","article-title":"Lysis: A Platform for IoT Distributed Applications Over Socially Connected Objects","volume":"4","author":"Girau","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Ryden, M., Oh, K., Chandra, A., and Weissman, J. (2014, January 11\u201314). Nebula: Distributed edge cloud for data intensive computing. Proceedings of the IEEE International Conference on Cloud Engineering, Boston, MA, USA.","DOI":"10.1109\/IC2E.2014.34"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., and Addepalli, S. (2012, January 17). Fog computing and its role in the internet of things. Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland.","DOI":"10.1145\/2342509.2342513"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MCC.2015.116","article-title":"Social Virtual Objects in the Edge Cloud","volume":"2","author":"Farris","year":"2015","journal-title":"IEEE Cloud Comput."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Colistra, G., Pilloni, V., and Atzori, L. (2014, January 6\u20138). Objects that agree on task frequency in the IoT: A lifetime-oriented consensus based approach. Proceedings of the IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea.","DOI":"10.1109\/WF-IoT.2014.6803196"},{"key":"ref_24","unstructured":"Taddei Elmi, G. (1990). I diritti dell\u2019intelligenza artificiale tra soggettivit\u00e1 e valore: Fantadiritto o jus condendum. Il Meritevole di Tutela, (In Italian)."},{"key":"ref_25","first-page":"23","article-title":"L\u2019intenzionalit\u00e1 dei sistemi della giustizia italiana","volume":"57","author":"Sartor","year":"2003","journal-title":"Riv. Trimest. Di Dirit. E Proced. Civ."},{"key":"ref_26","unstructured":"Celotto, A. (2019). I robot possono avere diritti?. Biolaw J., 91\u201399. (In Italian)."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1093\/idpl\/ipv016","article-title":"Data protection, e-ticketing, and intelligent systems for public transport","volume":"5","author":"Mantelero","year":"2015","journal-title":"Int. Data Priv. Law"},{"key":"ref_28","unstructured":"(2019, May 20). European Parliament resolution of 16 February 2017 with recommendations to the Commission on Civil Law Rules on Robotics (2015\/2103(INL)). Available online: http:\/\/www.europarl.europa.eu\/doceo\/document\/TA-8-2017-0051_EN.html."},{"key":"ref_29","unstructured":"Bobbio, N. (1990). L\u2019et\u00e1 dei Diritti, Einaudi. (In Italian)."},{"key":"ref_30","unstructured":"Cartabia, M.M.C. (2011). In tema di nuovi diritti. Scritti in onore di Franco Modugno, Editoriale Scientifica.. (In Italian)."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Klitou, D. (2014). Privacy-Invading Technologies and Privacy by Design. Safeguarding Privacy, Lib. Secur. 21st Century, Springer.","DOI":"10.1007\/978-94-6265-026-8"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Cavoukian, A. (2012). Privacy by design: Origins, meaning, and prospects for assuring privacy and trust in the information era. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, IGI Global.","DOI":"10.4018\/978-1-61350-501-4.ch007"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Cavoukian, A. (2013). Privacy by Design and the Promise of SmartData. SmartData, Springer.","DOI":"10.1007\/978-1-4614-6409-9_1"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Harvey, I., Cavoukian, A., Tomko, G., Borrett, D., Kwan, H., and Hatzinakos, D. (2013). SmartData: Privacy Meets Evolutionary Robotics, Springer.","DOI":"10.1007\/978-1-4614-6409-9"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Pagallo, U. (2012). On the principle of privacy by design and its limits: Technology, ethics and the rule of law. European Data Protection: In Good Health?, Springer.","DOI":"10.1007\/978-94-007-2903-2_16"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Gutwirth, S., Leenes, R., De Hert, P., and Poullet, Y. (2012). European Data Protection: In Good Health?, Springer.","DOI":"10.1007\/978-94-007-2903-2"},{"key":"ref_37","unstructured":"Pagallo, U., and Bassi, E. (2011). The future of EU working parties\u2019 \u201cthe future of privacy\u201d and the principle of privacy by design. An Information Law for the 21st Century."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/MWC.2016.1500356WC","article-title":"Machine learning paradigms for next-generation wireless networks","volume":"24","author":"Jiang","year":"2017","journal-title":"IEEE Wirel. Commun."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1111\/1467-9868.00293","article-title":"Estimating the number of clusters in a data set via the gap statistic","volume":"63","author":"Tibshirani","year":"2001","journal-title":"J. R. Stat. Soc. Ser. B"},{"key":"ref_40","unstructured":"(2019, May 20). Lysis Platform. Available online: http:\/\/www.lysis-iot.com\/."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/20\/4489\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:26:58Z","timestamp":1760189218000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/20\/4489"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,16]]},"references-count":40,"journal-issue":{"issue":"20","published-online":{"date-parts":[[2019,10]]}},"alternative-id":["s19204489"],"URL":"https:\/\/doi.org\/10.3390\/s19204489","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2019,10,16]]}}}