TY - GEN
T1 - No-Code Shadow Things Deployment for the IoT
AU - Korkan, Ege
AU - Regnath, Emanuel
AU - Kaebisch, Sebastian
AU - Steinhorst, Sebastian
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/6
Y1 - 2020/6
N2 - The Internet of Things (IoT) has brought Internet connectivity to devices from different domains and with different constraints. This, however, requires system developers to have a deep understanding of the individual devices' functionalities to achieve a successful integration. The Thing Description (TD) standard from the World Wide Web Consortium (W3C) is able to describe such device capabilities in a machine and human-readable format. While this standardization effort already provides many benefits to developers, the lack of easy-to-deploy virtual device instances introduces issues such as an increased risk for errors during the integration phase of IoT systems.In this paper, we introduce a novel method to create virtual instances of IoT devices based on their TD that act like the real device, which we call the Shadow Thing Method (STM). In the development and deployment stages of IoT systems, STM can be applied to deploy an instance to act as a smart proxy to address different problems, while requiring no programming experience or effort. We show for three different use cases that in addition to the simulation benefits, STM brings scalability, reliability, and safety to the existing IoT systems, making the adoption of IoT feasible for a wider audience.
AB - The Internet of Things (IoT) has brought Internet connectivity to devices from different domains and with different constraints. This, however, requires system developers to have a deep understanding of the individual devices' functionalities to achieve a successful integration. The Thing Description (TD) standard from the World Wide Web Consortium (W3C) is able to describe such device capabilities in a machine and human-readable format. While this standardization effort already provides many benefits to developers, the lack of easy-to-deploy virtual device instances introduces issues such as an increased risk for errors during the integration phase of IoT systems.In this paper, we introduce a novel method to create virtual instances of IoT devices based on their TD that act like the real device, which we call the Shadow Thing Method (STM). In the development and deployment stages of IoT systems, STM can be applied to deploy an instance to act as a smart proxy to address different problems, while requiring no programming experience or effort. We show for three different use cases that in addition to the simulation benefits, STM brings scalability, reliability, and safety to the existing IoT systems, making the adoption of IoT feasible for a wider audience.
KW - CPS
KW - Internet of Things
KW - Simulation
KW - System Design
KW - Web of Things Thing Description
UR - http://www.scopus.com/inward/record.url?scp=85095606617&partnerID=8YFLogxK
U2 - 10.1109/WF-IoT48130.2020.9221368
DO - 10.1109/WF-IoT48130.2020.9221368
M3 - Conference contribution
AN - SCOPUS:85095606617
T3 - IEEE World Forum on Internet of Things, WF-IoT 2020 - Symposium Proceedings
BT - IEEE World Forum on Internet of Things, WF-IoT 2020 - Symposium Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 6th IEEE World Forum on Internet of Things, WF-IoT 2020
Y2 - 2 June 2020 through 16 June 2020
ER -