Mitigating Risk of IoT Sensing Data Error Using Platform as a Data Handler

Sensing node principally is only responsible for sending data to the server that later on will forward the data to the user. Through this mechanism, the user will receive the data from the sensing node based on the value sent without any data verification at the server-side. The data in this case could be invalid. Thus, error handling as the main problem of the research is needed. By ensuring that this problem is worth objectivity raising, then through the Risk Management Process Model, it is certain that this problem will cause an adverse threat. After identification, 6 arising risk were found, with the level of control at threat”. Furthermore, 7 Mitigation Actions (MA) were designed and grouped into 3 Mitigation Phases (MP). Mitigation plan was realized into a platform with several system blocks, including 2 middleware blocks giving data error handling service directly. Moreover, to ensure that the proposed platform has covered all existing risks, service guarantee agreement was made in the form of a Service Level Agreement (SLA).The test results showed that both SLA 1 and SLA 2 succeed in guaranteeing no more risk arising. The test results showed the security level value is 6/ 6=1, which means all of the risks are ”handled” status and succeed in scope of ”eliminate”. Eventually, when the proposed platform is adopted directly to the organizations that need it, it is expected that it can be the answer to the problem of error in data sensing.

[1]  Yusep Rosmansyah,et al.  Exploratory Study of a Smart System Framework for Educational Process with Gamification: Case Study - Schools in Indonesia , 2019, Proceedings of the International Conferences on Information System and Technology.

[2]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[3]  Rui Hu,et al.  A survey on data provenance in IoT , 2019, World Wide Web.

[4]  Rubby Casallas,et al.  Evaluating the monolithic and the microservice architecture pattern to deploy web applications in the cloud , 2015, 2015 10th Computing Colombian Conference (10CCC).

[5]  Rahmat Yasirandi,et al.  Security Functional Requirements for The Development of a Biometrics Attendance System , 2020, 2020 8th International Conference on Information and Communication Technology (ICoICT).

[6]  Victor C. M. Leung,et al.  A reliable and energy efficient IoT data transmission scheme for smart cities based on redundant residue based error correction coding , 2015, 2015 12th Annual IEEE International Conference on Sensing, Communication, and Networking - Workshops (SECON Workshops).

[7]  Oliver Obst,et al.  Wireless Sensor Network Anomalies: Diagnosis and Detection Strategies , 2011 .

[8]  Ali Al-Dahoud,et al.  Failure detection on wireless sensor network based on comparative study , 2017, 2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE).

[9]  Carlos M. Oppus,et al.  Development and Implementation of an IoT Platform , 2019, 2019 International Symposium on Multimedia and Communication Technology (ISMAC).

[10]  Victoria Borkovskaya,et al.  Project Management Risks in the Sphere of Housing and Communal Services , 2018 .

[11]  Harry G. Perros,et al.  Performance Analysis of Microservice Design Patterns , 2019, IEEE Internet Computing.

[12]  Sujit Dey,et al.  Model-Based Techniques for Data Reliability in Wireless Sensor Networks , 2009, IEEE Transactions on Mobile Computing.

[13]  John A. Clark,et al.  Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained Routing , 2011, Networking Workshops.

[14]  Yang Zhou,et al.  Microservice-Based Platform for Space Situational Awareness Data Analytics , 2020, International Journal of Aerospace Engineering.

[15]  Ling Zheng,et al.  Application of microservice architecture in cloud environment project development , 2018 .

[16]  Rahmat Yasirandi,et al.  IoT Products Adoption for Smart Living in Indonesia: Technology Challenges and Prospects , 2020, 2020 8th International Conference on Information and Communication Technology (ICoICT).

[17]  Manpreet Singh,et al.  Wireless Sensor Network: A Survey , 2013, 2018 International Conference on Automation and Computational Engineering (ICACE).

[18]  Guy L. Steele,et al.  The Java Language Specification , 1996 .

[19]  RUKHSAR BEGUM SHAIKH,et al.  SENSOR NODE FAILURE DETECTION IN WIRELESS SENSOR NETWORK : A SURVEY , 2015 .

[20]  François Marmier,et al.  Project risk management conceptual model , 2016, 2016 3rd International Conference on Logistics Operations Management (GOL).

[21]  Martin Fowler,et al.  Patterns of Enterprise Application Architecture , 2002 .

[22]  Marin Litoiu,et al.  Efficiency Analysis of Provisioning Microservices , 2016, 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom).

[23]  Chenyang Lu,et al.  Servilla: A flexible service provisioning middleware for heterogeneous sensor networks , 2012, Sci. Comput. Program..

[24]  Desheng Dash Wu,et al.  Enterprise Risk Management Models , 2010 .

[25]  L. S. Jayashree,et al.  Enterprise IoT Development Platforms , 2020 .

[26]  Mikko Raatikainen,et al.  The Role of Platform Boundary Resources in Software Ecosystems: A Case Study , 2014, 2014 IEEE/IFIP Conference on Software Architecture.