In the Internet of Things several objects with network capabilities are connected over a self-configured local network with other objects to interact and share knowledge. In this context, the Triple Space approach, where different processes share common semantic knowledge, seems to fit perfectly. In this paper we present our progress towards a semantic… (More)
The Internet of Things (IoT) enables communication among real-world things and devices through Internet. So far, IoT research has focused on allowing such communication through different protocols and architectures. Some of these architectural approaches are Web of Things (WoT) and Triple Space (TS) which are both resource oriented architectures. This work… (More)
The increase of life expectancy has arisen new challenges related with the amount of resources required to attend elderly people with cognitive diseases. These requirements, such as medical staff and financial resources, have been multiplied in the last years, and this tendency will continue in the forthcoming ones. In order to reduce these requirements ,… (More)
This work introduces a novel access control solution for in-frastructures composed of highly constrained devices which provide users with services. Low energy consumption is a key point in this kind of scenarios given that devices usually run on batteries and are unattended for long periods of time. Our proposal achieves privacy, authentication, semantic… (More)
The demand for Internet-enabled objects which expose their content in a RESTful and web compliant manner is increasing. Consequently, these objects have to face well-known problems from the web world. The lack of expressiveness and human orientation of the syntactically described capabilities and contents of those resources is one of these difficulties. The… (More)
This work introduces a novel access control solution for wireless network services in Internet of Things scenarios. We focus on a minimal use of computation, energy and storage resources at wireless sensors so as to address constrained devices: the proposed methods for key distribution and access control rely on extremely fast key derivation functions and,… (More)
Copyright and Moral Rights for the articles on this site are retained by the individual authors and/or other copyright owners. For more information on Open Research Online's data policy on reuse of materials please consult the policies page.