Skip to main content

On Programming Models, Smart Middleware, Cyber-Security and Self-Healing for the Next-Generation Internet-of-Things

  • Conference paper
  • First Online:
Intelligent Computing (SAI 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 858))

Included in the following conference series:

Abstract

Internet-of-Things (IoT) is one of the most important new paradigms and technological advances in the realm of the soon-to-be-present-in-every-household (and nearly every business), Internet-powered cyber-physical systems of this decade and likely years to come. We are interested in the distributed intelligence, agent-based programming and multi-agent systems aspects of what it will take to enable the reliable, secure, inter-operable and human-friendly Next-Generation IoT, and in particular, Internet-of-Agents (IoA) as the IoT’s software and computational intelligence foundation. Several key software design and computational intelligence aspects of IoT/IoA are discussed in this paper. We first address suitable programming abstractions for the software agents that would provide IoT’s inter-operability, enabling different users, devices and platforms to effectively communicate and coordinate with each other. We then review some desiderata for the Next-Generation (NG) IoT middleware design. To address cyber-security for IoT holistically, we outline some elements of computational intelligence that would enable the self-healing and self-recovery capabilities of the NG IoT. We argue that the design of NG cyber-defense, self-healing and self-recovering mechanisms could greatly benefit from exploring paradigms from biology – in particular, from the immune systems of living organisms. If such highly adaptable self-healing capabilities were built into the NG IoT, future cyber-attacks would cause much less disruption to the infrastructure and the end-users than what was the case with some recent cyber-attacks on the present-day IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)

    Article  Google Scholar 

  2. Sicari, S., Rizzardi, A., Miorandi, D., Cappiello, C., Coen-Porisini, A.: A secure and quality-aware prototypical architecture for the IoT. Inf. Syst. 58, 43–55 (2016)

    Article  Google Scholar 

  3. Tosic, P.: Reputation-based distributed coordination for heterogeneous autonomous agents. In: Proceedings of the Internet of Agents (IoA-2016), Web Intelligence Workshops (WIW-2016), Omaha, Nebraska (2016)

    Google Scholar 

  4. Tosic, P., Wu, Y.: Towards networks of search engines and other digital experts: a distributed intelligence approach. In: Proceedings of the 8th International Conference on u- & e-Service, Science & Technology (UNESST 2015), pp. 35–38 (2015)

    Google Scholar 

  5. Khan, R., Khan, S.U., Zaheer, R., Khan, S.: Future Internet: the Internet of Things architecture, possible applications and key challenges. In: Proceedings of the 10th International Conference on FIT, pp. 257–260 (2012)

    Google Scholar 

  6. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347–2376 (2015)

    Article  Google Scholar 

  7. The iCORE Project. http://www.iot-icore.edu

  8. Shoham, Y.: Agent-oriented programming. Artif. Intell. 60, 51–92 (1993)

    Article  MathSciNet  Google Scholar 

  9. Jennings, N.R.: An agent-based approach for building complex software systems. Commun. ACM 44(4), 35–41 (2001)

    Article  Google Scholar 

  10. Agha, G.: Concurrent object-oriented programming. Commun. ACM 33(9), 125–141 (1990)

    Article  Google Scholar 

  11. Agha, G., Jamali, N.: Concurrent programming for DAI. In: Weiss, G. (ed.) Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence. MIT Press, Cambridge (1999)

    Google Scholar 

  12. Tosic, P.: Understanding autonomous agents: a cybernetics and systems science perspective. In: Proceedings of the IEEE/SAI Future Technologies Conference (FTC-2016), San Francisco, California (2016)

    Google Scholar 

  13. Rizzardi, A., Miorandi, D., Sicari, S., Cappiello, C., Coen-Porisini, A.: Networked smart objects: moving data processing closer to the source. In: Mandler, B., et al. (eds.) Internet of Things. IoT Infrastructures, IoT360. Lecture Notes of the Institute for Computer Science, Social Informatics and Telecommunication Engineering, vol. 170. Springer (2016)

    Google Scholar 

  14. The IoT- Ebbits project. http://www.ebbits-project.eu/

  15. The EST project. http://ict-iotest.eu/iotest

  16. uTRUST: Usable Trust in the Internet of Things project. www.utrustit.eu

  17. The BUTLER Project. www.iot-butler.eu

  18. Cobb, S.: 10 things to know about the October 21 IoT DDoS attacks, October 2016. https://www.welivesecurity.com/2016/10/24/10-things-know-october-21-iot-ddos-attacks/

  19. Newman, L.H.: What we know about Friday’s Massive East Coast Internet Outage, Wired magazine, Security section, October 2016. https://www.wired.com/2016/10/internet-outage-ddos-dns-dyn/

  20. Islam, N., Das, S., Chen, Y.: On-device mobile phone security exploits machine learning. IEEE Pervasive Comput. 16(2), 92–96 (2017)

    Article  Google Scholar 

  21. Tosic, P.: Some thoughts on programming models, middleware and self-healing capabilities for the next-generation internet-of-agents. In: Proceedings of the Internet-of-Agents workshop (IoA 2017), within the 16th International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2017), pp. 74–83, Sao Paulo, Brazil, May 2017

    Google Scholar 

Download references

Acknowledgments

The authors would like to sincerely thank Mohsen Guizani, Daniel Conte de Leon and Saad Alqithami for several stimulating discussions and reading recommendations on topics discussed in this paper, as well as the anonymous reviewers for their valuable feedback and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Predrag T. Tošić .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tošić, P.T., Sheldon, F.T. (2019). On Programming Models, Smart Middleware, Cyber-Security and Self-Healing for the Next-Generation Internet-of-Things. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2018. Advances in Intelligent Systems and Computing, vol 858. Springer, Cham. https://doi.org/10.1007/978-3-030-01174-1_87

Download citation

Publish with us

Policies and ethics