A Resource Oriented Architecture for the Web of Things

March 1, 2016

Many efforts are centered around creating largescale networks of “smart things” found in the physical world (e.g., wireless sensor and actuator networks, embedded devices, tagged objects). Rather than exposing real-world data and functionality through proprietary and tightly-coupled systems, we propose to make them an integral part of the Web. As a result, smart things become easier to build upon. Popular Web languages (e.g., HTML, Python, JavaScript, PHP) can be used to easily build applications involving smart things and users can leverage wellknown Web mechanisms (e.g., browsing, searching, bookmarking, caching, linking) to interact and share these devices. In this paper, we begin by describing the Web of Things architecture and best-practices based on the RESTful principles that have already contributed to the popular success, scalability, and modularity of the traditional Web. We then discuss several prototypes designed in accordance with these principles to connect environmental sensor nodes and an energy monitoring system to the World Wide Web. We finally show how Web-enabled smart things can be used in lightweight ad-hoc applications called “physical mashups”.

Spotlight

Open Automation Software

Open Automation Software IoT Framework connects all commonly used industrial and business data sources to almost any application including .NET, Web, iOS, Android, and databases, all using open data formats and lightweight secure networking transport with data validation from end to end.

OTHER WHITEPAPERS
news image

Medical and iot device security for healthcare

whitePaper | December 27, 2021

With the advent of the Internet of Things (IoT), businesses are experiencing a digital transformation bigger than the PC and Mobile revolutions combined and healthcare is no exception. The new breed of connected medical devices brings the promise of improved patient care, better clinical data, improved efficiency, and reduced costs but they also bring increased security risks.

Read More
news image

Consumer IoT Device Cybersecurity Standards, Policies, and Certification Schemes

whitePaper | February 23, 2023

There are three key elements in the world of Internet of Things cyber security. Standards are created in order to harmonize a common set of requirements. Regulations are created in order to incentivize manufacturers to adopt cybersecurity hygiene practices so as to protect societies and increase their cyber-resilience. Labels are created in order to provide visibility to consumers.

Read More
news image

The Work Ahead in IoT: The Gap Widens Between IoT ‘Haves’ and ‘Have-nots’

whitePaper | September 1, 2021

The current task with IoT is to drive performance outcomes by combining it with other advanced technologies and gaining buy-in from the employees essential to making digital initiatives possible. While the definition of IoT evolves, the mission remains essentially the same: to provide real-time visibility into critical business operations.

Read More
news image

Zero Trust Network Access (ZTNA) and its Adoption

whitePaper | September 22, 2022

The complexity and cost of ensuring network security and remote access for employees and key business partners can overwhelm smaller businesses. Higher cloud adoption, a distributed workforce, mobile employees, the proliferation of Internet of Things (IoT) devices, and increasingly sophisticated cyberattacks make traditional methods of ensuring secure communications across your organization overly complex and expensive. Zero Trust Network Access (ZTNA) reduces the surface area for attack by following zero trust tenets to provide access to applications. ZTNA from OpenVPN Cloud creates a private, secure overlay network for businesses, which connects all of their applications, private networks, workforce, and IoT devices together without needing to own and manage a multitude of complex and hard-to-scale security and data networking gear.

Read More
news image

The Right Approach to Zero Trust for IoT Devices

whitePaper | May 18, 2022

Networking and security teams have historically relied on protections at the network perimeter to secure the entire enterprise. The internal network was deemed trusted and secure. While everything outside was considered “dirty,” everything on the internal network was considered “clean,” and application traffic would flow unrestricted. However, recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security.

Read More
news image

Dell PowerScale: Network Design Considerations

whitePaper | January 23, 2023

The information in this publication is provided as is. Dell Inc. makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose.

Read More

Spotlight

Open Automation Software

Open Automation Software IoT Framework connects all commonly used industrial and business data sources to almost any application including .NET, Web, iOS, Android, and databases, all using open data formats and lightweight secure networking transport with data validation from end to end.

Events