BETCK105H-IOT Module-5
BETCK105H-IOT Module-5
Introduction
The use of connected vehicles is increasing rapidly across the globe.
Consequently, the number of on-road accidents and mismanagement of traffic is also
increasing.
The increasing number of vehicles gives rise to the problem of parking.
However, the evolution of IoT helps to form a connected vehicular environment to
manage the transportation systems efficiently.
Vehicular IoT systems have penetrated different aspects of the transportation
ecosystem, including on-road to off-road traffic management, driver safety for heavy
to small vehicles, and security in public transportation.
In a connected vehicular environment, vehicles are capable of communicating and
sharing their information.
Moreover, IoT enables a vehicle to sense its internal and external environments to
make certain autonomous decisions.
With the help of modern-day IoT infrastructure, a vehicle owner residing in Earth’s
northern hemisphere can very easily track his vehicular asset remotely, even if it is in
the southern hemisphere.
This chapter, focus on the importance and applications of IoT in the vehicular systems.
Figure represents a simple architecture of a vehicular IoT system.
The architecture of the vehicular IoT is divided into three sub layers: device, fog, and
cloud.
Device: The device layer is the bottom-most layer, which consists of the basic
infrastructure of the scenario of the connected vehicle.
Sandeep K.H Dept of CSE, PESITM-Shivamogga Page 1
This layer includes the vehicles and road side units (RSU). These vehicles contain
certain sensors which gather the internal information of the vehicles.
On the other hand, the RSU works as a local centralized unit that manages the data
from the vehicles.
Fog: In vehicular IoT systems, fast decision making is pertinent to avoid accidents and
traffic mismanagement.
In such situations, fog computing plays a crucial role by providing decisions in real-
time, much near to the devices.
Consequently, the fog layer helps to minimize data transmission time in a vehicular
IoT system.
Cloud: Fog computing handles the data processing near the devices to take decisions
instantaneously.
However, for the processing of huge data, fog computing is not enough.
Therefore, in such a situation, cloud computing is used.
In a vehicular IoT system, cloud computing helps to handle processes that involve a
huge amount of data.
Further, for long-term storage, cloud computing is used as a scalable resource in
vehicular IoT systems.
Satellites: In vehicular IoT systems, automatic vehicle tracking and crash detection
are among the important available features.
Satellites help the system to track vehicles and detect on-road crashes.
The satellite image is also useful for detecting on-road congestions and road blocks.
(i) The vehicle is equipped with a smart surveillance system, which is capable of
executing video processing and detecting criminal activity in real time.
(ii) A fog computing architecture works as the mediator between a vehicle and a police
vehicle.
(iii) A mobile application is used to report the crime to a nearby police agent.
Architecture
The architecture of the fog-FISVER consists of different IoT components.
Moreover, the developers utilized the advantages of the low-latency fog computing
architecture for designing their system.
Fog-FISVER is based on a three-tiered architecture, as shown in Figure.
We will discuss each of the tiers as follows:
Tier1—In-vehicle FISVER STS Fog: In this system component, a fog node is placed
for detecting criminal activities.
This tier accumulates the real sensed data from within the vehicle and processes it to
detect possible criminal activities inside the vehicle.
Image Processor: The image processor inside Tier 1 is a potent component, which
has a capability similar to the human eye for detecting criminal activities.
Developers of the system used a deep-learning-based approach for enabling image
processing techniques in the processor.
To implement the fog computing architecture in the vehicle, a Raspberry-Pi-3
processor board is used, which is equipped with a high-quality camera.
Further, this architecture uses template matching and correlation to detect the presence
of dangerous articles (such as a pistol or a knife) in the sub-image of a video frame.
Typically, the image processor stores a set of crime object templates in the fog-
FISVER STS fog infrastructure, which is present in Tier 2 of the system.
The image processor is divided into the following three parts:
(a) Crime definition downloader: This component periodically checks for the
presence of new crime object template definitions in fog-FISVER STS fog
infrastructure.
If a new crime object template is available, it is stored locally.
(b) Crime definition storage: In order to use template matching, the crime object
template definition is required to be stored in the system.
The crime definition storage is used to store all the possible crime object template
definitions.
(c) Algorithm launcher: This component initiates the instances of the registered
algorithm in order to match the template with the video captured by the camera
attached in the vehicles.
If a crime object is matched with the video, criminal activity is confirmed.
(ii) Tier 2—FISVER STS Fog Infrastructure: Tier 2 works on top of the fog
architecture.
Assignment Questions
1. What is the role of cloud and fog computing in vehicular IoT?
2. What are the applications of IoT in transportation?
3. What are the advantages of vehicular IoT?
4. Give an example of image processing in vehicular IoT.
5. What are roadside units (RSUs)?
6. How can data analytics help in a vehicular IoT system?
7. What are the uses of a camera sensor in vehicular IoT?
8. How can a vehicular IoT system ensure the safety of drivers?
9. Design a use case for developing an IoT-based driver sleep detection system. Please
mention all types of sensors required for developing the same.
Introduction
Internet of Things (IoT) has resulted in the development and emergence of a variety of
technologies that has had a huge impact on the medical field, especially wearable
healthcare.
The salient features of IoT encourage researchers and industries to develop new IoT-
based technologies for healthcare.
These technologies have given rise to small, power-efficient, health monitoring and
diagnostic systems.
Consequently, the development of numerous healthcare technologies and systems has
rapidly increased over the last few years.
Currently, various IoT-enabled healthcare devices are in wide use around the globe for
diagnosing human diseases, monitoring human health conditions, caring/monitoring
for elders, children, and even infants.
Moreover, IoT-based healthcare systems and services help to increase the quality of
life for common human beings; in fact, it has a promising scope of revolutionizing
healthcare in developing nations.
IoT-based healthcare devices provide access and knowledge about human
physiological conditions through hand held devices.
With this development, users can be aware of the risks in acquiring various diseases
and take necessary precautions to avoid preventable diseases.
The basic skeleton of an IoT-based healthcare system is very similar to the
conventional IoT architectures.
However, for IoT-based healthcare services, the sensors are specifically designed to
measure and quantify different physiological conditions of its users/patients.
A typical architecture for healthcare IoT is shown in Figure. We divide the
architecture into four layers.
The detailed description of these layers are as follows:
(ii) Wireless Connectivity: Without proper connectivity and communication, the data
sensed by the physiological sensors are of no use in an IoT-based healthcare system.
Typically, the communication between the wearable sensors and the LPU is through
either wired or wireless connectivity.
The wireless communication between the physiological sensors and LPU occurs with
the help of Bluetooth and ZigBee.
On the other hand, the communication between the LPU and the cloud or server takes
place with Internet connectivity such as Wi- Fi and WLAN.
In Layer 4 of the healthcare IoT architecture, the healthcare data are received by the
end users with different devices such as laptops, desktops, and cellphones.
These communication protocols vary depending on the type of device in use.
For example, when a service is received by a cellphone, it uses GSM (global system
for mobile communications).
On the other hand, if the same service is received on a desktop, it can be through
Ethernet or Wi-Fi.
Communication and connectivity in healthcare IoT is an essential component.
(iii) Privacy and Security: The privacy and security of health data is a major concern
in healthcare IoT services.
In a healthcare IoT architecture, several devices connect with the external world.
Moreover, between LPU and the server/cloud, different networking devices work via
network hops (from one networked device to another) to transmit the data.
Case Studies
(i) AmbuSens system
In many developing countries, patients need to be transferred from primary-care to
tertiary-care hospitals for proper diagnosis and treatment.
During the transit, the hospitals at both ends—the referring one as well as the referred
one—do not have any information about the patient’s health condition during transit.
In such situations, the hospitals are unable to suggest any precautionary measures in
the event of some emergency during transit.
Consequently, many patients die during the transit due to lack of proper suggestive
care by medical experts.
To overcome these shortcomings, the Smart Wireless Applications and Networking
(SWAN) laboratory at the Indian Institute of Technology Kharagpur developed a
system: AmbuSens.
The system was primarily funded by the Ministry of Human Resource and
Development (MHRD) of the Government of India.
This product system is a very crucial part of the healthcare IoT system.
The primary objectives of the AmbuSens system are summarized as follows:
Digitization and standardization of the healthcare data, which can be easily
accessed by the registered hospital authorities.
Real-time monitoring of the patients who are in transit from one hospital to
another. At both hospitals, doctors can access the patients’ health conditions.
Accessibility by which multiple doctors can access the patient’s health data at
the same time.
Provision of confidentiality to the health data of the patients in the cloud.
In the AmbuSens system, wireless physiological sensor nodes are used. These
sensor nodes make the system flexible and easy to use.
Architecture
The AmbuSens system is equipped with different physiological sensors along with a
local hub.
These sensors sense the physiological parameters from the patient’s body and transmit
those to a local data processing unit (LDPU).
The physiological sensors and LDPU form a wireless body area network (WBAN).
Further, this local hub forwards the physiological data to the cloud for storing and
analyzing the health parameters.
Finally, the data are accessed by different users. The detailed layered architecture of
the AmbuSens system is depicted in Figure.
Hardware
In the AmbuSens system, a variety of hardware components are used such as sensors,
communication units, and other computing devices.
Sensors: The sensors used in the AmbuSens system are non-invasive.
The description of the sensors used for forming the WBAN in the AmbuSens system
are as follows:
(i) Optical Pulse Sensing Probe: It senses the photoplethysmogram (PPG) signal and
transmits it to a GSR expansion module.
Typically, PPG signals are sensed from the ear lobe, fingers, or other location of the
human body.
Further, the GSR expansion module transfers the sensed data to a device in real-time.
(ii) Electrocardiogram (ECG) unit and sensor: The ECG module used in AmbuSens
is in the form of a kit, which contains ECG electrodes, biophysical 9” leads,
biophysical 18” leads, alcohol swabs, and wrist strap.
Typically, the ECG sensor measures the pathway of electrical impulses through the
heart to sense the heart’s responses to physical exertion and other factors affecting
cardiac health.
(iii) Electromyogram (EMG) sensor: This sensor is used to analyze and measure the
biomechanics of the human body.
Particularly, the EMG sensor is used to measure different electrical activity related to
muscle contractions; it also assesses nerve conduction, and muscle response in injured
tissue.
(iv) Temperature sensor: The body temperature of patients changes with the
condition of the body.
Therefore, a temperature sensor is included in the AmbuSens system, which can easily
be placed on the body of the patient.
(v) Galvanic Skin Response (GSR) sensor: The GSR sensor is used for measuring
the change in electrical characteristics of the skin.
Local Data Processing Unit (LDPU): In AmbuSens, all the sensors attached to the
human body sense and transmit the sensed data to a centralized device, which is called
an LDPU.
An LDPU is a small processing board with limited computation capabilities.
The connectivity between the sensors and the LDPU follows a single-hop star
topology.
The LDPU is programmed in such a way that it can receive the physiological data
from multiple sensor nodes, simultaneously.
Further, it transmits the data to the cloud for long-term storage and heavy processing.
Front End
In the AmbuSens system, three actors—doctor, paramedic/nurse, and patient—are
able to participate and use the services.
The web interface is designed as per the requirements of the actors of the system.
Each of the actors has an option to log in and access the system.
The confidentiality of a patient and their physiological data is important in a
healthcare system.
Therefore, the system provides different scopes for data accessibility based on the
category of an actor.
For example, the detailed health data of a patient is accessible only to the assigned
doctor.
These data may not be required for the nurse; therefore, a nurse is unable to access the
same set of data a doctor can access.
The system provides the flexibility to a patient to log in to his/her account and
download the details of his/her previous medical/treatment details.
Therefore, in AmbuSens, the database is designed in an efficient way such that it can
deliver the customized data to the respective actor.
Each of the users has to register with the system to avail of the service of the
AmbuSens.
Therefore, in this system, the registration process is also designed in a customized
fashion, that is, the details of a user to be entered into the registration form are
different for different actors.
For example, a doctor must enter his/her registration number in the registration form.
Assignment Questions
1. List the components of healthcare IoT.
2. Why privacy and security is important for healthcare?
3. What is a wireless body area network (WBAN)?
4. What is the difference between electrocardiogram (ECG) and electromyogram (EMG)
sensors?
5. List the advantages of healthcare IoT.
6. List the risks associated with healthcare IoT systems.
7. How can data analysis be used in healthcare IoT?
8. What is a local processing unit (LPU)?
9. Discuss an idea for developing an IoT-based healthcare system, where we can include
fingerprint sensor.
10.Why is cloud computing important for a healthcare IoT system?
Introduction
These sensors collect data from the environment and serve different IoT-based
applications.
The raw data from a sensor require processing to draw inferences.
However, an IoT based system generates data with complex structures; therefore,
conventional data processing on these data is not sufficient.
Sophisticated data analytics are necessary to identify hidden patterns. In this chapter,
we discuss a few traditional data analytics tools that are popular in the context of IoT
applications.
These tools include k-means, decision tree (DT), random forest (RF), k-nearest
neighbor (KNN), and density-based spatial clustering of applications with noise
(DBSCAN) algorithms.
Before discussing these algorithms, let us understand some of the basics related to
machine learning (ML).
Machine learning
The term “machine learning” was coined by Arthur Lee Samuel, in 1959.
He defined machine learning as a “field of study that gives computers the ability to
learn without being explicitly programmed”.
ML is a powerful tool that allows a computer to learn from past experiences and its
mistakes and improve itself without user intervention.
Typically, researchers envision IoT-based systems to be autonomous and self-
adaptive, which enhance services and user experience.
To this end, different ML models play a crucial role in designing intelligent systems in
IoT by leveraging the massive amount of generated data and increasing the accuracy
in their operations.
The main components of ML are statistics, mathematics, and computer science for
drawing inferences, constructing ML models, and implementation, respectively.
Advantages of ML
Applications fueled by ML open a plethora of opportunities in IoT-based systems,
from triggering actuators to identifying chronic diseases from images of an eye.
ML also enables a system to identify changes and to take intelligent actions that
relatively imitates that of a human.
Sandeep K.H Dept of CSE, PESITM-Shivamogga Page 19
As ML demonstrates a myriad of advantages, its popularity in IoT applications is
increasing rapidly. In this section, we discuss the different advantages of ML, as
depicted in Figure.
(i) Self-learner: An ML-empowered system is capable of learning from its prior and
run-time experiences, which helps in improving its performance continuously.
For example, an ML-assisted weather monitoring system predicts the weather report
of the next seven days with high accuracy from data collected in the last six months.
The system offers even better accuracy when it analyses weather data that extends
back to three more months.
(ii) Time-efficient: ML tools are capable of producing faster results as compared to
human interpretation.
For example, the weather monitoring system generates a weather prediction report for
the upcoming seven days, using data that goes back to 6–9 months.
A manual analysis of such sizeable data for predicting the weather is difficult and
time-consuming.
Moreover, the manual process of data analysis also affects accuracy.
In such a situation, ML is beneficial in predicting the weather with less delay and
accuracy as compared to humans.
(iii) Self-guided: An ML tool uses a huge amount of data for producing its results.
These tools have the capability of analysing the huge amount of data for identifying
trends autonomously.
As an example, when we search for a particular item on an online e-commerce
website, an ML tool analyses our search trends.
As a result, it shows a range of products similar to the original item that we searched
for initially.
(iv)Minimum Human Interaction Required: In an ML algorithm, the human does
not need to participate in every step of its execution.
The ML algorithm trains itself automatically, based on available data inputs.
For instance, let us consider a healthcare system that predicts diseases.
In traditional systems, humans need to determine the disease by analyzing different
symptoms using standard “if– else” observations.
However, the ML algorithm determines the same disease, based on the health data
available in the system and matching the same with the symptoms of the patient.
(v) Diverse Data Handling: Typically, IoT systems consist of different sensors and
produce diverse and multi-dimensional data, which are easily analyzed by ML
algorithms.
For example, consider the profit of an industry in a financial year.
Profits in such industries depend on the attendance of laborers, consumption of raw
materials, and performance of heavy machineries.
The attendance of laborers is associated with an RFID (radio frequency identification)-
based system.
On the other hand, industrial sensors help in the detection of machiney failures, and a
scanner helps in tracking the consumption of raw materials.
ML algorithms use these diverse and multi-dimensional data to determine the profit of
the industry in the financial year.
Challenges in ML
An ML algorithm utilizes a model and its corresponding input data to produce an
output.
A few major challenges in ML are listed as follows:
(i) Data Description: The data acquired from different sensors are required to be
informative and meaningful.
Description of data is a challenging part of ML.
(ii) Amount of Data: In order to provide an accurate output, a model must have
sufficient amount of data.
The availability of a huge amount of data is a challenge in ML.
(iii) Erroneous Data: A dataset may contain noisy or erroneous data.
On the other hand, the learning of a model is heavily dependent on the quality of data.
Since erroneous data misleads the ML model, its identification is crucial.
(iv)Selection of Model: We have already discussed the use of ML algorithms in
different applications.
Multiple models may be suitable for serving a particular purpose. However, one model
may perform better than others.
In such cases, the proper selection of the model is pertinent for ML.
(v) Quality of Model: After the selection of a model, it is difficult to determine the
quality of the selected model.
However, the quality of the model is essential in an ML-based system.
Types of ML
Typically, ML algorithms consist of four categories: (i) Supervised (ii) Unsupervised
(iii) Semi-supervised (iv) Reinforcement Learning (Figure).