4.7 Review

Service composition approaches in IoT: A systematic review

Journal

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Volume 120, Issue -, Pages 61-77

Publisher

ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD
DOI: 10.1016/j.jnca.2018.07.013

Keywords

Service composition; Internet of things; Systematic literature review; Smart objects; QoS

Ask authors/readers for more resources

The Internet of Things (IoT) signifies to an overall system of interconnected physical Things utilizing existing correspondence conventions. One critical inquiry remains in what manner can make and communicate the management of provided services for smart devices by an assortment of protest things that substituted and joined capably. Service composition process permits the interaction between user requirements and smart objects of IoT environment. Leveraging on the service discovery procedure can be influenced on finding the desired services. Consequently, choosing suitable services is the main challenge that covers functionality and required quality to combine several services as the integrated composite service in the IoT. The service composition process has been broadly considered with regards to web suppliers and business processes in the IoT. Currently, the IoT environment identifies the dynamic relationship topics on physical processes that are combined as the enhanced web services heterogeneously. This paper focuses on several service composition approaches that are applied in the IoT environment based on the Systematic Literature Review (SLR) method. The aim of this study is to analytically and statistically categorize and analyze the current research techniques on the service composition in the IoT (published between 2012 and 2017). A technical taxonomy is presented for the service composition approaches according to content of the existing studies that are selected with SLR method in this review with respect to functional and non-functional aspects in service composition approaches. The functional aspect emphasizes on verifying the behavior of service composition approach and the non-functional aspect considers the Quality of Service (QoS) in IoT environment. The approaches are compared with each other according to some technical aspects such as system correctness factors in functional properties approaches, and (QoS) factors, presented algorithms, and existing platforms in non-functional approaches. The advantages and disadvantages of each selected approach discussed as well as providing some hints for solving their weaknesses. A brief contribution to this literature is as follows: (1) Presenting a SLR method for the service composition approaches in IoT, (2) Addressing a discussion of the main challenges, (3) Providing the future research directions and open perspectives.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Hardware & Architecture

A hybrid bi-objective scheduling algorithm for execution of scientific workflows on cloud platforms with execution time and reliability approach

Yeganeh Asghari Alaie, Mirsaeid Hosseini Shirvani, Amir Masoud Rahmani

Summary: This paper proposes a bi-objective optimization approach to address the scientific workflow scheduling issue in heterogeneous cloud datacenters. The proposed system framework, centralized log, and scheduling failure factor contribute to improving system reliability. The hybrid bi-objective discrete cuckoo search algorithm is utilized to solve the scheduling problem effectively.

JOURNAL OF SUPERCOMPUTING (2023)

Article Computer Science, Information Systems

Using recommender clustering to improve quality of services with sustainable virtual machines in cloud computing

Mehran Aghaei, Parvaneh Asghari, Sepideh Adabi, Hamid Haj Seyyed Javadi

Summary: This paper proposes an optimal method for assigning recommendation systems to users and improving the recommendation quality of Web services in cloud networks through appropriate mapping. The method processes virtual machine input and physical machines in cloud clusters in a parallel manner, taking into account factors such as energy, response time, and task execution.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2023)

Correction Computer Science, Artificial Intelligence

Personality-based and trust-aware products recommendation in social networks (vol 53, pg 879, 2022)

Nasim Vatani, Amir Masoud Rahmani, Hamid Haj Seyyed Javadi

APPLIED INTELLIGENCE (2023)

Article Computer Science, Artificial Intelligence

Fault tolerance in fog-based Social Internet of Things

Venus Mohammadi, Amir Masoud Rahmani, Aso Darwesh, Amir Sahafi

Summary: The Social Internet of Things (SIoT) is a future vision for establishing social relationships between objects and enabling object-to-object transactions. This is achieved through an intelligent strategy that leverages trust characteristics and object typology to eliminate interference from defective nodes. Additionally, SIoT networks face challenges due to device heterogeneity and resource constraints, necessitating fault tolerance mechanisms to enhance device lifetime and dependability. A fault-tolerant model based on a clustering algorithm for fault detection and recovery is proposed, utilizing Markov chains to model faults and hot standby nodes for substitution. The proposed scheme demonstrates improved network performance in terms of live nodes, detection accuracy, and availability and reliability compared to networks with similar properties.

KNOWLEDGE-BASED SYSTEMS (2023)

Article Computer Science, Information Systems

Automatic text summarization using deep reinforced model coupling contextualized word representation and attention mechanism

Hassan Aliakbarpour, Mohammad Taghi Manzuri, Amir Masoud Rahmani

Summary: With the rapid growth of textual data, there is an increasing demand for automatic text summarization models. This paper proposes a new summarization model that combines extractive and abstractive approaches using reinforcement learning strategy gradient. The model uses convolutional neural networks, gated recurrent units, and attention mechanisms, and employs language models like Word2Vec and BERT for better semantic representation. The experimental results on widely-studied datasets show that the proposed model outperforms other summarization models in terms of accuracy and summary quality.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Review Computer Science, Information Systems

Toward caching techniques in edge computing over SDN-IoT architecture: a review of challenges, solutions, and open issues

Seyedeh Shabnam Jazaeri, Parvaneh Asghari, Sam Jabbehdari, Hamid Haj Seyyed Javadi

Summary: The Internet of Things (IoT) is a network of interconnected computing devices that exploit Information-centric networking (ICN) to gain additional benefits. Resource constraints in IoT, such as caching capability and wireless bandwidth limits, necessitate an appropriate caching mechanism. Edge computing architecture aims to meet evolving IoT application needs but requires light caching algorithms and flexible support for high-quality networks on edge nodes. Emerging caching possibilities, such as Software-Defined Networking (SDN) and Network Function Virtualization (NFV), enable fine-grained control and deployment of caching services. This review paper discusses the impact of caching strategies on QoS in EC-SDN-IoT networks and investigates the significance of SDN/NFV in Edge Caching. It provides an overview of recent studies, categorizes caching techniques, and highlights challenges and future research directions.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Review Computer Science, Information Systems

Blockchain-based privacy and security preserving in electronic health: a systematic review

Kianoush Kiania, Seyed Mahdi Jameii, Amir Masoud Rahmani

Summary: In today's world, health and medicine are crucial in human life. Traditional and current Electronic Health Records (EHR) systems have weaknesses in security and privacy due to centralized architecture. Blockchain technology ensures the privacy and security of EHR systems through encryption and decentralized nature. This paper proposes a systematic literature review (SLR) to analyze existing Blockchain-based approaches for improving privacy and security in electronic health systems. The review discusses the research methodology, paper selection process, and presents a detailed analysis of 51 selected papers published between 2018 and Dec 2022, including main ideas, Blockchain types, evaluation metrics, and tools used. Future research directions, open challenges, and issues are also discussed.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

Resource Management approaches to Internet of Vehicles

Mehdi Hosseinzadeh, Shirin Abbasi, Amir Masoud Rahmani

Summary: This paper analyzes the recent studies on resource management in the Internet of Vehicles (IoV). The analysis shows that resource allocation has the highest utilization rate of resource management approaches at 30%. The most critical parameter in resource allocation is cost, which includes energy, time, price, and processing capacity. Furthermore, the paper proposes a taxonomy for resource management in IoV and identifies challenges and open issues in this field.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Review Computer Science, Artificial Intelligence

Computer-aided methods for combating Covid-19 in prevention, detection, and service provision approaches

Bahareh Rezazadeh, Parvaneh Asghari, Amir Masoud Rahmani

Summary: The infectious disease Covid-19 has caused significant global impacts since 2019, leading to social, economic, and humanitarian crises. Countries have adopted different strategies based on their capabilities and technological infrastructure to combat the virus. An intelligent and automatic healthcare system is crucial for controlling such a massive epidemic. Initially, the focus was on lockdown measures and disease diagnosis, but now research has shifted towards computer-aided methods for monitoring, tracking, detecting, and treating individuals affected by Covid-19, as well as providing services to citizens. This article surveys computer-based approaches in prevention, detection, and service provision for combating Covid-19, analyzing current methods, providing a technical taxonomy, and exploring future challenges and opportunities.

NEURAL COMPUTING & APPLICATIONS (2023)

Article Health Care Sciences & Services

Exploring Access as a Process of Adaptation in a Self-Monitoring Perinatal eHealth System: Mixed Methods Study From a Sociomaterial Perspective

Jennifer Auxier, Kaisu T. Savolainen, Miriam Bender, Amir M. Rahmani, Fatemeh Sarhaddi, Iman Azimi, Anna M. Axelin

Summary: This study examined the process of patient engagement in access during the adaptation of eHealth self-monitoring use by pregnant women. The findings revealed a cocreation process between the users and the eHealth system, with different user groups experiencing different personal adaptation and system mediation. The study highlights access as a valuable core component of perinatal eHealth self-monitoring systems.

JMIR FORMATIVE RESEARCH (2023)

Article Multidisciplinary Sciences

A cluster-tree-based trusted routing algorithm using Grasshopper Optimization Algorithm (GOA) in Wireless Sensor Networks (WSNs)

Mehdi Hosseinzadeh, Omed Hassan Ahmed, Jan Lansky, Stanislava Mildeova, Mohammad Sadegh Yousefpoor, Efat Yousefpoor, Joon Yoo, Lilia Tightiz, Amir Masoud Rahmani

Summary: This paper presents a cluster-tree-based trusted routing method for wireless sensor networks (WSNs) that provides secure and energy-efficient communication paths. The proposed method analyzes node behavior using the grasshopper optimization algorithm and a time-variant trust model, and evaluates each routing path using a fitness function.

PLOS ONE (2023)

Review Computer Science, Software Engineering

Energy-aware resource management in fog computing for IoT applications: A review, taxonomy, and future directions

Sayed Mohsen Hashemi, Amir Sahafi, Amir Masoud Rahmani, Mahdi Bohlouli

Summary: This article investigates the use and guarantee of Fog computing, reviewing six general approaches published between 2015 and late May 2023. The focus is on evaluating Fog computing and energy consumption strategy, discussing advantages, disadvantages, tools, evaluation types, and quality factors. The article proposes open issues and challenges in Fog computing energy consumption management for further study.

SOFTWARE-PRACTICE & EXPERIENCE (2023)

Article Computer Science, Information Systems

Applications of Artificial Intelligence in the Economy, Including Applications in Stock Trading, Market Analysis, and Risk Management

Amir Masoud Rahmani, Bahareh Rezazadeh, Majid Haghparast, Wei-Che Chang, Shen Guan Ting

Summary: In an increasingly automated world, AI holds the promise to revolutionize work, consumption, and societal development. This paper explores AI applications in economics, covering stock trading, market analysis, and risk assessment. It proposes a comprehensive taxonomy to investigate AI applications in various scopes and discusses significant AI-based techniques and evaluation criteria in this domain. Lastly, it identifies challenges, open issues, and future work suggestions.

IEEE ACCESS (2023)

Article Computer Science, Interdisciplinary Applications

A Descriptive Comparative Pilot Study: Association Between Use of a Self-monitoring Device and Sleep and Stress Outcomes in Pregnancy

Jennifer Auxier, Milad Asgari Mehrabadi, Amir M. Rahmani, Anna Axelin

Summary: Pregnancy poses challenges for sleep and stress management. Self-monitoring technologies are popular, but their association with sleep/stress outcomes remains untested. A pilot study of 20 pregnant women examined the relationship between device wear time and sleep/stress outcomes. Results showed no association between engagement and improved outcomes, suggesting the need for further research on the impact of self-monitoring technologies in pregnancy.

CIN-COMPUTERS INFORMATICS NURSING (2023)

Proceedings Paper Computer Science, Artificial Intelligence

Towards Deep Personal Lifestyle Models Using Multimodal N-of-1 Data

Nitish Nagesh, Iman Azimi, Tom Andriola, Amir M. Rahmani, Ramesh Jain

Summary: The rise of wearable technology has enabled continuous collection of data about various lifestyle parameters. However, developing personal models based on longitudinal data presents challenges. This study collects dense multimodal data for an individual over three years and examines relationships between parameters using correlation, network mapping, and causality techniques. Through experiments, the hypotheses are validated, indicating the potential for revolutionizing future health approaches.

MULTIMEDIA MODELING, MMM 2023, PT I (2023)

Article Computer Science, Hardware & Architecture

A dynamic state sharding blockchain architecture for scalable and secure crowdsourcing systems

Zihang Zhen, Xiaoding Wang, Hui Lin, Sahil Garg, Prabhat Kumar, M. Shamim Hossain

Summary: In this paper, a blockchain architecture based on dynamic state sharding (DSSBD) is proposed to solve the problems caused by cross-shard transactions and reconfiguration. By utilizing deep reinforcement learning, the number of shards, block spacing, and block size can be dynamically adjusted to improve the performance of the blockchain. The experimental results show that the crowdsourcing system with DSSBD has better performance in terms of throughput, latency, balancing, cross-shard transaction proportion, and node reconfiguration proportion, while ensuring security.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

A flexible algorithm to offload DAG applications for edge computing

Gabriel F. C. de Queiroz, Jose F. de Rezende, Valmir C. Barbosa

Summary: Multi-access Edge Computing (MEC) is a technology that enables faster task processing at the network edge by deploying servers closer to end users. This paper proposes the FlexDO algorithm to solve the DAG application partitioning and offloading problem, and compares it with other solutions to demonstrate its superior performance in various test scenarios.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm

Shahid Latif, Wadii Boulila, Anis Koubaa, Zhuo Zou, Jawad Ahmad

Summary: In the field of Industrial Internet of Things (IIoT), networks are increasingly vulnerable to cyberattacks. This research introduces an optimized Intrusion Detection System based on Deep Transfer Learning (DTL) for heterogeneous IIoT networks, combining Convolutional Neural Networks (CNNs), Genetic Algorithms (GA), and ensemble techniques. Through rigorous evaluation, the framework achieves exceptional performance and accurate detection of various cyberattacks.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

STOP: Joint send buffer and transmission control for user-perceived deadline guarantee via curriculum guided-deep reinforcement learning

Rongji Liao, Yuan Zhang, Jinyao Yan, Yang Cai, Narisu Tao

Summary: This paper proposes a joint control approach called STOP to guarantee user-perceived deadline using curriculum-guided deep reinforcement learning. Experimental results show that the STOP scheme achieves a significantly higher average arrival ratio in NS-3.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

End-to-end active queue management with Named-Data Networking

Miguel Rodriguez-Perez, Sergio Herreria-Alonso, J. Carlos Lopez-Ardao, Raul F. Rodriguez-Rubio

Summary: This paper presents an implementation of an active queue management (AQM) algorithm for the Named-Data Networking (NDN) architecture and its application in congestion control protocols. By utilizing the congestion mark field in NDN packets, information about each transmission queue is encoded to achieve a scalable AQM solution.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

HADES: An NFV solution for energy-efficient placement and resource allocation in infrastructures

Angel Canete, Mercedes Amor, Lidia Fuentes

Summary: This paper proposes an energy-aware placement of service function chains of Virtual Network Functions (VNFs) and a resource-allocation solution for heterogeneous edge infrastructures. The solution has been integrated with an open source management and orchestration project and has been successfully applied to augmented reality services, achieving significant reduction in power consumption and ensuring quality of service compliance.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

Node cardinality estimation in a heterogeneous wireless network deployed over a large region using a mobile base station

Sachin Kadam, Kaustubh S. Bhargao, Gaurav S. Kasbekar

Summary: This paper discusses the problem of estimating the node cardinality of each node type in a heterogeneous wireless network. Two schemes, HSRC-M1 and HSRC-M2, are proposed to rapidly estimate the number of nodes of each type. The accuracy and efficiency of these schemes are proven through mathematical analysis and simulation experiments.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

A hybrid analytical concept to QoE index evaluation: Enhancing eMBB service detection in 5G SA networks

Jean Nestor M. Dahj, Kingsley A. Ogudo, Leandro Boonzaaier

Summary: The launch of commercial 5G networks has opened up opportunities for heavy data users and highspeed applications, but traditional monitoring and evaluation techniques have limitations in the 5G networks. This paper presents a cost-effective hybrid analytical approach for detecting and evaluating user experience in real-time 5G networks, using statistical methods to calculate the user quality index.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

Dynamic resource management in integrated NOMA terrestrial-satellite networks using multi-agent reinforcement learning

Ali Nauman, Haya Mesfer Alshahrani, Nadhem Nemri, Kamal M. Othman, Nojood O. Aljehane, Mashael Maashi, Ashit Kumar Dutta, Mohammed Assiri, Wali Ullah Khan

Summary: The integration of terrestrial and satellite wireless communication networks offers a practical solution to enhance network coverage, connectivity, and cost-effectiveness. This study introduces a resource allocation framework that leverages local cache pool deployments and non-orthogonal multiple access (NOMA) to improve energy efficiency. Through the use of a multi-agent enabled deep deterministic policy gradient algorithm (MADDPG), the proposed approach optimizes user association, cache design, and transmission power control, resulting in enhanced energy efficiency and reduced time delays compared to existing methods.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

A fast coordination approach for large-scale drone swarm

Wu Chen, Jiayi Zhu, Jiajia Liu, Hongzhi Guo

Summary: With advancements in technology, large-scale drone swarms will be widely used in commercial and military fields. Current application methods are mainly divided into autonomous methods and controlled methods. This paper proposes a new framework for global coordination through local interaction.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

CE-VNE: Constraint escalation virtual network embedding algorithm assisted by graph convolutional networks

Peiying Zhang, Zhihu Luo, Neeraj Kumar, Mohsen Guizani, Hongxia Zhang, Jian Wang

Summary: With the development of Industry 5.0, the demand for network access devices is increasing, especially in areas such as financial transactions, drone control, and telemedicine where low latency is crucial. However, traditional network architectures limit the construction of low-latency networks due to the tight coupling of control and data forwarding functions. To overcome this problem, researchers propose a constraint escalation virtual network embedding algorithm assisted by Graph Convolutional Networks (GCN), which automatically extracts network features and accelerates the learning process to improve network performance.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Review Computer Science, Hardware & Architecture

Comprehensive review on congestion detection, alleviation, and control for IoT networks

P. Anitha, H. S. Vimala, J. Shreyas

Summary: Congestion control is crucial for maintaining network stability, reliability, and performance in IoT. It ensures that critical applications can operate seamlessly and that IoT devices can communicate efficiently without overwhelming the network. Congestion control algorithms ensure that the network operates within its capacity, preventing network overload and maintaining network performance.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

Enabling containerized Central Unit live migration in 5G radio access network: An experimental study

Shunmugapriya Ramanathan, Abhishek Bhattacharyya, Koteswararao Kondepu, Andrea Fumagalli

Summary: This article presents an experiment that achieves live migration of a containerized 5G Central Unit module using modified open-source migration software. By comparing different migration techniques, it is found that the hybrid migration technique can reduce end-user service recovery time by 36% compared to the traditional cold migration technique.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction

Fatma Foad Ashrif, Elankovan A. Sundararajan, Rami Ahmad, Mohammad Kamrul Hasan, Elaheh Yadegaridehkordi

Summary: This article introduces the development and current status of authentication protocols in 6LoWPAN, and proposes an innovative perspective to fill the research gap. The article comprehensively surveys and evaluates AKA protocols, analyzing their suitability in wireless sensor networks and the Internet of Things, and proposes future research directions and issues.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

Task offloading to edge cloud balancing utility and cost for energy harvesting Internet of Things

Pranjal Kumar Nandi, Md. Rejaul Islam Reaj, Sujan Sarker, Md. Abdur Razzaque, Md. Mamun-or-Rashid, Palash Roy

Summary: This paper proposes a task offloading policy for IoT devices to a mobile edge computing system, aiming to balance device utility and execution cost. A meta heuristic approach is developed to solve the offloading problem, and the results show its potential in terms of task execution latency, energy consumption, utility per unit cost, and task drop rate.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)