scholarly journals Modeling-framework for model-based software engineering of complex Internet of things systems

2021 ◽  
Vol 18 (6) ◽  
pp. 9312-9335
Author(s):  
Khurrum Mustafa Abbasi ◽  
◽  
Tamim Ahmed Khan ◽  
Irfan ul Haq ◽  

<abstract> <p>Internet of things (IoT) systems are composed of variety of units from different domains. While developing a complete IoT system, different professionals from different domains may have to work in collaboration. In this paper we provide a framework which allows using discrete and continuous time modeling and simulation approaches in combination for IoT systems. The proposed framework demonstrates on how to model Ad-hoc and general IoT systems for software engineering purpose. We demonstrate that model-based software engineering on one hand can provide a common platform to overcome communication gaps among collaborating stakeholders whereas, on the other hand can model and integrate heterogeneous components of IoT systems. While modeling heterogeneous IoT systems, one of the major challenges is to apply continuous and discrete time modeling on intrinsically varying components of the system. Another difficulty may be how to compose these heterogeneous components into one whole system. The proposed framework provides a road-map to model discrete, continuous, Ad-hoc, general systems along with composition mechanism of heterogeneous subsystems. The framework uses a combination of Agent-based modeling, Aspect-oriented modeling, contract-based modeling and services-oriented modeling concepts. We used this framework to model a scenario example of a service-oriented IoT system as proof of concept. We analyzed our framework with existing systems and discussed it in details. Our framework provides a mechanism to model different viewpoints. The framework also enhances the completeness and consistency of the IoT software models.</p> </abstract>

Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3257
Author(s):  
Arne Bochem ◽  
Benjamin Leiding

Today, increasing Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks that are deployed in scenarios with irregular or unreliable Internet connectivity. The lack of a central authority that can be contacted at any time allows attackers to introduce arbitrary amounts of nodes into the network and manipulate its behavior according to the attacker’s goals, by posing as a majority participant. Depending on the structure of the network, employing Sybil node detection schemes may be difficult, and low powered Internet of Things devices are usually unable to perform impactful amounts of work for proof-of-work based schemes. In this paper, we present Rechained, a scheme that monetarily disincentivizes the creation of Sybil identities for networks that can operate with intermittent or no Internet connectivity. We introduce a new revocation mechanism for identities, tie them into the concepts of self-sovereign identities, and decentralized identifiers. Case-studies are used to discuss upper- and lower-bounds for the costs of Sybil identities and, therefore, the provided security level. Furthermore, we formalize the protocol using Colored Petri Nets to analyze its correctness and suitability. Proof-of-concept implementations are used to evaluate the performance of our scheme on low powered hardware as it might be found in Internet of Things applications.


Author(s):  
Jorge Arroyo-Esquivel ◽  
Nathan G. Marculis ◽  
Alan Hastings

AbstractOne of the main factors that determines habitat suitability for sessile and territorial organisms is the presence or absence of another competing individual in that habitat. This type of competition arises in populations occupying patches in a metacommunity. Previous studies have looked at this process using a continuous-time modeling framework, where colonizations and extinctions occur simultaneously. However, different colonization processes may be performed by different species, which may affect the metacommunity dynamics. We address this issue by developing a discrete-time framework that describes these kinds of metacommunity interactions, and we consider different colonization dynamics. To understand potential dynamics, we consider specific functional forms that characterize the colonization and extinction processes of metapopulations competing for space as their limiting factor. We then provide a mathematical analysis of the models generated by this framework, and we compare these results to what is seen in nature and in previous models.


2021 ◽  
Vol 1769 (1) ◽  
pp. 012006
Author(s):  
Ai-Ling Wang ◽  
Lei-ming Li ◽  
Guo-ling Xu

Entropy ◽  
2018 ◽  
Vol 20 (10) ◽  
pp. 752 ◽  
Author(s):  
Francesca Tria ◽  
Vittorio Loreto ◽  
Vito Servedio

Zipf’s, Heaps’ and Taylor’s laws are ubiquitous in many different systems where innovation processes are at play. Together, they represent a compelling set of stylized facts regarding the overall statistics, the innovation rate and the scaling of fluctuations for systems as diverse as written texts and cities, ecological systems and stock markets. Many modeling schemes have been proposed in literature to explain those laws, but only recently a modeling framework has been introduced that accounts for the emergence of those laws without deducing the emergence of one of the laws from the others or without ad hoc assumptions. This modeling framework is based on the concept of adjacent possible space and its key feature of being dynamically restructured while its boundaries get explored, i.e., conditional to the occurrence of novel events. Here, we illustrate this approach and show how this simple modeling framework, instantiated through a modified Pólya’s urn model, is able to reproduce Zipf’s, Heaps’ and Taylor’s laws within a unique self-consistent scheme. In addition, the same modeling scheme embraces other less common evolutionary laws (Hoppe’s model and Dirichlet processes) as particular cases.


Sign in / Sign up

Export Citation Format

Share Document