Sensors (Jun 2022)

Toward Mapping an NGSI-LD Context Model on RDF Graph Approaches: A Comparison Study

  • Ahmed Abid,
  • Jieun Lee,
  • Franck Le Gall,
  • JaeSeung Song

DOI
https://doi.org/10.3390/s22134798
Journal volume & issue
Vol. 22, no. 13
p. 4798

Abstract

Read online

A considerable number of Internet of Things deployments are isolated from specific solutions, from devices to data platforms. Standardized data models were proposed to overcome the interoperability gap between these deployments. Next generation service interfaces-linked data (NGSI-LD) is one of the proposed platforms that exploits linked data and proposes an information model and an application programming interface (API) for easy use and standard management of context information. The NGSI-LD information model is based on JSON for Linked Data (JSON-LD) as a serialization format for context information. This efficiently exploits the potential of semantics and linked open data. However, the NGSI-LD graph API and query language are still theoretically defined and limited to some preliminary works. Consequently, current NGSI-LD implementations are mainly based on traditional databases, where the JSON-LD serialization is supported but not exploited owing to the difficulties in defining and implementing new NGSI-LD based Graph APIs. One of the basic solutions is the use of an RDF store for NGSI-LD payloads because these types of databases are well defined and maintained and will not need any added effort for JSON-LD based payloads. However, the main complication at this level is the use of reification to annotate relationships. This study focused on both aspects of exploiting the semantics of NGSI-LD by proposing standardized mapping mechanisms to RDF graphs without reifying JSON-LD payloads and with respect to the NGSI-LD context model and API. Our main proposals highlight that exploiting the RDF store for processing NGSI-LD data semantically is feasible and uncomplicated. We illustrated the proposed mapping approaches with real use-case examples and a possible exploitation of semantic approaches.

Keywords