Internet of Things: Current Challenges in the Quality Assurance and Testing Methods

  • Miroslav BuresEmail author
  • Tomas Cerny
  • Bestoun S. Ahmed
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 514)


Contemporary development of the Internet of Things (IoT) technology brings a number of challenges in the Quality Assurance area. Current issues related to security, user’s privacy, the reliability of the service, interoperability, and integration are discussed. All these create a demand for specific Quality Assurance methodology for the IoT solutions. In the paper, we present the state of the art of this domain and we discuss particular areas of system testing discipline, which is not covered by related work sufficiently so far. This analysis is supported by results of a recent survey we performed among ten IoT solutions providers, covering various areas of IoT applications.


Internet of things Quality assurance Testing methodology Test strategy Integration testing Security Interoperability Integration issues 



This research is conducted as a part of the project TACR TH02010296 Quality Assurance System for Internet of Things Technology.


  1. 1.
    Kiruthika J, Khaddaj S (2015) Software quality issues and challenges of Internet of Things. In: 2015 14th international symposium on distributed computing and applications for business engineering and science (DCABES). IEEE, pp 176–179Google Scholar
  2. 2.
    Marinissen EJ, Zorian Y, Konijnenburg M, Huang CT, Hsieh PH, Cockburn P, Verbauwhede I 2016. May). Iot: source of test challenges. In: 2016 21th IEEE European Test Symposium (ETS). IEEE, pp 1–10Google Scholar
  3. 3.
    Xu T, Wendt JB, Potkonjak M (2014) Security of IoT systems: design challenges and opportunities. In: Proceedings of the 2014 IEEE/ACM international conference on computer-aided design. IEEE, pp 417–423Google Scholar
  4. 4.
    Bertino E, Choo KKR, Georgakopolous D, Nepal S (2016) Internet of Things (IoT): smart and secure service delivery. ACM Trans Internet Technol (TOIT) 16(4):22CrossRefGoogle Scholar
  5. 5.
    Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in Internet of Things: the road ahead. Comput Netw 76:146–164CrossRefGoogle Scholar
  6. 6.
    Lin H, Bergmann NW (2016) IoT privacy and security challenges for smart home environments. Information 7(3):44CrossRefGoogle Scholar
  7. 7.
    Sajid A, Abbas H (2016) Data privacy in cloud-assisted healthcare systems: state of the art and future challenges. J Med Syst 40(6):155CrossRefGoogle Scholar
  8. 8.
    Worthy P, Matthews B, Viller S (2016) Trust me: doubts and concerns living with the Internet of Things. In: Proceedings of the 2016 ACM conference on designing interactive systems. ACM, pp 427–434Google Scholar
  9. 9.
    Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347–2376CrossRefGoogle Scholar
  10. 10.
    Agrawal V (2015) Security and privacy issues in wireless sensor networks for healthcare. Internet of Things. Springer, User-Centric IoT, pp 223–228Google Scholar
  11. 11.
    Desnitsky V, Kotenko I (2016) Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge. J Ambient Intell Humaniz Comput 7(5):705–719CrossRefGoogle Scholar
  12. 12.
    Fernández-Caramés TM, Fraga-Lamas P, Suárez-Albela M, Castedo L (2016) Reverse engineering and security evaluation of commercial tags for RFID-based IoT applications. Sensors 17(1):28CrossRefGoogle Scholar
  13. 13.
    Sicari S, Rizzardi A, Miorandi D, Cappiello C, Coen-Porisini A (2016) A secure and quality-aware prototypical architecture for the Internet of Things. Inf Syst 58:43–55CrossRefGoogle Scholar
  14. 14.
    Ashraf QM, Habaebi MH (2015) Autonomic schemes for threat mitigation in Internet of Things. J Netw Comput Appl 49:112–127CrossRefGoogle Scholar
  15. 15.
    Wu F, Xu L, Kumari S, Li X (2017) A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security. J Ambient Intell Humaniz Comput 8(1):101–116CrossRefGoogle Scholar
  16. 16.
    Chatzigiannakis I, Vitaletti A, Pyrgelis A (2016) A privacy-preserving smart parking system using an IoT elliptic curve based security platform. Comput Commun 89:165–177CrossRefGoogle Scholar
  17. 17.
    Kawazoe H, Ajitomi D, Minami K (2015) A test framework for large-scale message broker system for consumer devices. In: 2015 IEEE 5th international conference on consumer electronics-Berlin (ICCE-Berlin). IEEE, pp 24–28Google Scholar
  18. 18.
    Rosenkranz P, Wählisch M, Baccelli E, Ortmann L (2015) A distributed test system architecture for open-source IoT software. In: Proceedings of the 2015 workshop on IoT challenges in mobile and industrial systems. ACM, pp 43–48Google Scholar
  19. 19.
    Fernandes J, Nati M, Loumis NS, Nikoletseas S, Raptis TP, Krco S, Ziegler S (2015) IoT lab: towards co-design and IoT solution testing using the crowd. In: 2015 international conference on recent advances in Internet of Things (RIoT). IEEE, pp 1–6Google Scholar
  20. 20.
    Giménez P, Molina B, Palau CE, Esteve M (2013) SWE simulation and testing for the IoT. In: 2013 IEEE international conference on systems, man, and cybernetics (SMC). IEEE, pp 356–361Google Scholar
  21. 21.
    Kuemper D, Reetz E, Tönjes R (2013) Test derivation for semantically described IoT services. In: Future network and mobile summit (FutureNetworkSummit), 2013. IEEE, pp 1–10Google Scholar
  22. 22.
    Peischl B (2015) Software quality research: from processes to model-based techniques. In: 2015 IEEE eighth international conference on software testing, verification and validation workshops (ICSTW). IEEE, pp 1–6Google Scholar
  23. 23.
    Ahmad A, Bouquet F, Fourneret E, Le Gall F, Legeard B (2016) Model-based testing as a service for IoT platforms. In: International symposium on leveraging applications of formal methods. Springer, pp 727–742CrossRefGoogle Scholar
  24. 24.
    Ren G, Deng P, Yang C, Zhang J, Hua Q (2015) A formal approach for modeling and verification of distributed systems. In: International conference on cloud computing. Springer, pp 317–322Google Scholar
  25. 25.
    Jia Y, Bodanese E, Bigham J (2012) Model checking of the reliability of publish/subscribe structure based system. In: 2012 1st IEEE international conference on communications in China (ICCC). IEEE, pp 155–160Google Scholar
  26. 26.
    Choe Y, Lee S, Lee M (2016) SAVE: an environment for visual specification and verification of IoT. In: 2016 IEEE 20th international enterprise distributed object computing workshop (EDOCW). IEEE, pp 1–8Google Scholar
  27. 27.
    Hillah LM, Maesano AP, De Rosa F, Kordon F, Wuillemin PH, Fontanelli R, Maesano L (2017) Automation and intelligent scheduling of distributed system functional testing. Int J Softw Tools Technol Transfer 19(3):281–308CrossRefGoogle Scholar
  28. 28.
    González L, Cubo J, Brogi A, Pimentel E, Ruggia R (2013) Run-time verification of behaviour-aware mashups in the Internet of Things. In: European conference on service-oriented and cloud computing. Springer, pp 318–330Google Scholar
  29. 29.
    Ahmad M (2014) Reliability models for the Internet of Things: a paradigm shift. In: 2014 IEEE international symposium on software reliability engineering workshops (ISSREW). IEEE, pp 52–59Google Scholar
  30. 30.
    Yong-Fei L, Li-Qin T (2014) Comprehensive evaluation method of reliability of Internet of Things. In: 2014 ninth international conference on P2P, parallel, grid, cloud and internet computing (3PGCIC). IEEE, pp 262–266Google Scholar
  31. 31.
    Behera RK, Reddy KHK, Roy DS (2015) Reliability modelling of service oriented Internet of Things. In: 2015 4th international conference on reliability, infocom technologies and optimization (ICRITO) (Trends and Future Directions). IEEE, pp 1–6Google Scholar
  32. 32.
    Xie H, Wei L, Zhou J, Hua X (2013) Research of conformance testing of low-rate wireless sensor networks based on remote test method. In 2013 fifth international conference on computational and information sciences (ICCIS). IEEE, pp 1396–1400Google Scholar
  33. 33.
    Göhring M, Schmitz R (2015) On randomness testing in physical layer key agreement. In: 2015 IEEE 2nd world forum on Internet of Things (WF-IoT). IEEE, pp 733–738Google Scholar
  34. 34.
    Bae H, Sim SH, Choi Y, Liu L (2016) Statistical verification of process conformance based on log equality test. In: 2016 IEEE 2nd international conference on collaboration and internet computing (CIC). IEEE, pp 229–235Google Scholar
  35. 35.
    Silva DS, Resner D, de Souza RL, Martina JE (2016) Formal Verification of a Cross-Layer, Trustful Space-Time Protocol for Wireless Sensor Networks. In: Information systems security. Springer, pp 426–443CrossRefGoogle Scholar
  36. 36.
    Wittstock, V., Lorenz, M., Wittstock, E. and Pürzel, F. 2012. A Framework for User Tests in a Virtual Environment. In Advances in Visual Computing, 358–367CrossRefGoogle Scholar
  37. 37.
    Batalla JM, Gajewski M, Latoszek W, Krawiec P (2015) Implementation and performance testing of ID layer nodes for hierarchized IoT network. In: Asian conference on intelligent information and database systems. Springer, pp 463–472Google Scholar
  38. 38.
    Bures M (2014) Automated testing in the Czech Republic: the current situation and issues. In: Proceedings of the 15th international conference on computer systems and technologies. ACM, pp 294–301Google Scholar
  39. 39.
    Bures M (2015) Framework for assessment of web application automated testability. In: Proceedings of the 2015 conference on research in adaptive and convergent systems. ACM, pp 512–514Google Scholar
  40. 40.
    Bures M (2015) Metrics for automated testability of web applications. In: Proceedings of the 16th international conference on computer systems and technologies. ACM, pp 83–89Google Scholar
  41. 41.
    Bures M (2015) Model for evaluation and cost estimations of the automated testing architecture. In: New contributions in information systems and technologies. Springer, pp 781–787CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.FEE, CTU in PraguePraha 2Czech Republic
  2. 2.Computer ScienceBaylor UniversityWacoUSA

Personalised recommendations