Unit-1 Iot
Unit-1 Iot
Unit-1
Contents
6. IoT Applications
8. Infrastructure
10. Processes
MINO401 IIOT
By Anshu Khare Page 1
1. Internet of Things Today-
Internet of Things (IoT) is a concept which enables communication between internetworking
devices and applications, whereby physical objects or ‘things’ communicate through the
Internet.
The concept of IoT began with things classified as identity communication devices.
Radio Frequency Identification Device (RFID) is an example of an identity communication device.
Things are tagged to these devices for their identification in future and can be tracked,
controlled and monitored using remote computers connected through the Internet.
The concept of IoT enables, for example, GPS-based tracking, controlling and monitoring of
devices; machine-to-machine (M2M) communication; connected cars; communication between
wearable and personal devices and Industry 4.0.
The IoT concept has made smart cities a reality and is also expected to make self-driving cars
functional very soon.
MINO401 IIOT
By Anshu Khare Page 2
1.2 Definition of Internet of Things-
Internet of Things means a network of physical things (objects) sending, receiving, or communicating
information using the Internet or other communication technologies and network just as the computers,
tablets and mobiles do, and thus enabling the monitoring, coordinating or controlling process across the
Internet or another data network.
“Internet of Things is the network of physical objects or ‘things’ embedded with electronics, software,
sensors and connectivity to enable it to achieve greater value and service by exchanging data with the
manufacturer, operator and/or other connected devices. Each thing is uniquely identifiable through
its embedded computing system but is able to interoperate within the existing Internet
infrastructure.”
MINO401 IIOT
By Anshu Khare Page 3
1.4 Major Components of IoT System
Major components of IoT devices are:
1. Physical object with embedded software into hardware consisting of a microcontroller,
firmware, sensors, control unit, actuators and communication module.
2. Communication module: Software consisting of device APIs and device interface for
communication over the network and communication circuit/port(s), and middleware for
creating communication stacks using 6LowPAN, CoAP, LWM2M, IPv4, IPv6 and other protocols.
3. for actions on messages, information and commands which the devices receive and then output
to the actuators, which enable actions such as glowing LEDs, robotic hand movement etc.
MINO401 IIOT
By Anshu Khare Page 4
MINO401 IIOT
By Anshu Khare Page 5
3. Towards the IOT universe-
4. IoT Vision-
Internet of Things is a vision where things (wearable watches, alarm clocks, home devices, surrounding
objects) become ‘smart’ and function like living entities by sensing, computing and communicating
through embedded devices which interact with remote objects (servers, clouds, applications, services
and processes) or persons through the Internet or Near-Field Communication (NFC) etc.
Example1-
Through computing, an umbrella can be made to function like a living entity. By installing a tiny
embedded device, which interacts with a web based weather service and the devices owner through the
Internet the following communication can take place. The umbrella, embedded with a circuit for the
purpose of computing and communication connects to the Internet. A website regularly publishes the
weather report.
The umbrella receives these reports each morning, analyses the data and issues reminders to the owner
at intermittent intervals around his/her office-going time. The reminders can be distinguished using
differently coloured LED flashes such as red LED flashes for hot and sunny days, yellow flashes for rainy
days. A reminder can be sent to the owner’s mobile at a pre-set time before leaving for office using NFC,
Bluetooth or SMS technologies. The message can be—(i) Protect yourself from rain. It is going to rain.
Don’t forget to carry the umbrella; (ii) Protect yourself from the sun. It is going to be hot and sunny.
MINO401 IIOT
By Anshu Khare Page 6
Don’t forget to carry the umbrella. The owner can decide to carry or not to carry the umbrella using the
Internet connected umbrella.
MINO401 IIOT
By Anshu Khare Page 7
Fig-IOT landscape
IERC Strategic Research and Innovation Agenda covers the important issues and challenges for the
Internet of Things technology. It provides the vision and the roadmap for coordinating and rationalizing
current and future research and development efforts in this field, by addressing the different enabling
technologies covered by the Internet of Things concept and paradigm. Many other technologies are
converging to support and enable IoT applications.
• IoT architecture
• Identification
• Communication
• Networks technology
• Network discovery
MINO401 IIOT
By Anshu Khare Page 8
• Software and algorithms
• Hardware technology
• Network management
• Interoperability
• Standardization
The Strategic Research and Innovation Agenda is developed with the support of a European-led
community of interrelated projects and their stakeholders, dedicated to the innovation, creation,
development and use of the Internet of Things technology. Since the release of the first version of the
Strategic Research and Innovation Agenda, we have witnessed active research on several IoT topics. On
the one hand this research filled several of the gaps originally identified in the Strategic Research and
Innovation Agenda, whilst on the other it created new challenges and research questions. Recent
advances in areas such as cloud computing, cyber-physical systems, autonomic computing, and social
networks have changed the scope of the Internet of Thing’s convergence even more so. The Cluster
has a goal to provide an updated document each year that records the relevant changes and illustrates
emerging challenges.
MINO401 IIOT
By Anshu Khare Page 9
6. IoT Applications and Use Case Scenarios
The IERC vision is that “the major objectives for IoT are the creation of smart
environments/spaces and self-aware things (for example: smart transport, products, cities, buildings,
rural areas, energy, health, living, etc.) for climate, food, energy, mobility, digital society and health
applications”[68]. The outlook for the future is the emerging of a network of interconnected uniquely
identifiable objects and their virtual representations in an Internet alike structure that is positioned over
a network of interconnected computers allowing for the creation of a new platform for economic
growth.
MINO401 IIOT
By Anshu Khare Page 10
While some researchers think there is a need for a 'clean slate' design of the network of the
future, much successful work is evolutionary rather than revolutionary, and this can be seen in
the articles in this issue.
For this special theme on Future Internet Technology, we issued a call for papers and invited
four well known researchers in addition, to cover the following topics as well as possible:
Architectures and Infrastructures
Future core networks will leverage IP over simple, super-fast optical core networks. A major
trend is that of virtualization, featuring the construction of optimized virtual networks that
answer the needs of a collection of users or applications. A wide variety of wired and wireless
access networks are available or being developed: FTTH/FTTO in the wired domain, and
3G/CDMA, LTE, WiFi, WiMax and Satellite in the wireless setting.
Internet Modelling, Simulation and Measurements
It is quite important to comprehend how the complex systems that we build actually operate.
This requires basic research on network modelling and simulation, eg, in order to derive the
fundamental laws on network dynamics and control or to evaluate the ultimate capacity of self-
organized wireless networks. It also requires advances in network measurements: traffic
statistics, Internet probing and measurement, network inference and detection of anomalies
and attacks.
Internet Algorithms and Software
The future of the Internet will require a wide range of computer science tools: verification;
distributed algorithms (eg for consensus, and election and epidemic diffusion); resource
management algorithms: resource allocation and scheduling; database algorithms: content
storage, update and retrieval, content replication and consistency; search engines and the
semantic Web.
Self-Managing Networks
A key cost in networking is the operations and management overheads. The scalability of the
Internet is well known, but as distributed applications proliferate, a more autonomic approach is
increasingly required. Spontaneous and self-organized networks emerge both in the wireless
setting (eg with Wifi meshes or infrastructure-less wireless networks [MANETS]) and in the
wired network setting (eg in peer to peer),
Embedded Internet, Internet of Things
The Internet started by connecting computers and users to information, and then went on to
connect users to each other with audio, video, games and social networking tools. Now the
rapid evolution of pervasive, embedded networked devices means that we connect various
types of devices to each other. There are far more computers in the world embedded in
everyday objects (cars, domestic appliances etc) than there are on desktops. The
interconnection of the Internet with the physical world through sensors and agents and the
tagging of industrial production by RFIDs will lead to new traffic and architecture challenges,
with possibly hundreds of billions of new devices that will collect information and will have to be
upgraded and managed remotely and conveniently. This will require new paradigms for routing,
search, naming, maintenance, data survival etc.
Vehicular Internet
The Internet of things extends to cars and other vehicles. Here the key potential is in safety: ABS
in cars could communicate road surface conditions to following vehicles, setting speed and
MINO401 IIOT
By Anshu Khare Page 11
braking reactions sooner rather than too late. Traffic management and pollution sensing on cars
can also make use of networking between cars, and from cars to roadside infrastructure.
Tracking goods in transit on the road would allow logistics companies to optimize their freight
operations, saving time and energy and perishable goods.
Media Internet/Media-Driven Networks
There is an important diversification of the nature of the content transported across the
Internet: initially it was files, then real-time games, video, telephony and whiteboards, and now
TV, video on demand etc. There has also been diversification of the localization of contents: with
each user potentially a content producer (peer-to-peer applications). New interactions with data
are appearing, as in Web 2.0 or the semantic Web, and applications continue to evolve and
require new systems, measurements and management tools.
Identity Management/Security
Since its beginnings in 1992, the World-Wide Web has offered remote transactions for goods
and services. Recently we have seen a rapid growth in the number of attacks on identity, since
acquiring such information allows miscreants to commit fraud that is hard to detect.
Energy saving and the Internet
Estimates vary, but the Internet and all its services consume something on the order of 4% of
the energy in the developed world. Only simple measures are required to improve this by a
factor of two. Furthermore, the Internet, as we have discussed above, can be used to monitor
and control external devices (things, vehicles, services) and significantly reduce their
unnecessary power consumption. Figures as high as 30% have been quoted for possible national
savings of energy, if unused devices in all homes could be remotely turned off. The investment
necessary to achieve this is relatively low, with what seems like a very big potential return.
The Internet Services
We are moving from a Web of documents to a Web of services and Web of knowledge. This has
triggered an explosion of new applications such as SecondLife, FaceBook and LinkedIn. And
there is more to come, with augmented reality, virtual worlds, real-time games and
telepresence. New concepts such as service orchestrations are also emerging, and with them,
new business models.
8. Iot infrastructure-
The Internet of Things (IoT) covers a broad range of industries and applications. There many IoT use
cases which require:
Cloud connectivity (asset tracking, home automation, industrial automation, etc.) using technologies like
WiFi or cellular networks like NB-IoT, LTE-M, GSM, etc.
Long-range local networks (smart city, smart agriculture, etc.) using technologies like LoRa, Zigbee,
Sigfox, etc.
Short-range local networks (tracking vital health parameters using wearables, smart door locks, etc.)
using technologies like BLE, NFC, ZWave, etc.
While implementation specifics vary across these applications, the fundamentals of IoT infrastructure is
the same.
MINO401 IIOT
By Anshu Khare Page 12
As a result, a solid understanding of IoT infrastructure is an important aspect of building reliable IoT
systems across industries. In this article, we’ll take a deep dive on the topic of IoT infrastructure.
At a basic level, IoT refers to any system of interconnected devices that have sensors and embedded
processing abilities. Note that devices don’t have to use the Internet. Even locally connected devices
interacting and exchanging data are an IoT system.
With that in mind, we can break down the IoT infrastructure required to make an IoT system into these
elements.
IoT Infrastructure Elements
IoT Infrastructure
Description
Element
Used for measuring physical quantities that the IoT device shares over the
Sensor
network
The brain of the device; acts as a bridge between the sensor and the network and
Controller
also performs onboard computations and storage
The technology used for exchanging data with either other devices in the system,
Network
or the Cloud
Cloud Computing, storage and gateway resources accessible over the internet
User-facing Mobile and web applications that allow the user to interact with the IoT system
applications and visualize the data
The tools and resources (often on the Cloud) that enable users to derive insights
Data Analytics
from the data sent by the IoT system
In addition to these basic IoT infrastructure elements, optional hubs can connect a cluster of IoT
devices to the internet. And finally, an attribute spanning all these infrastructure elements is security. In
the following sections, we’ll take a closer look at each of these infrastructure elements.
MINO401 IIOT
By Anshu Khare Page 13
• One of the strategies of address conservation in IoT is to use local addresses which exist uniquely
within the domain of the gateway. These are represented by the circles in this slide.
• The network connected to the internet has routers with their set of addresses and ranges.
• These routers have multiple gateways connected to them which can forward packets from the nodes,
to the Internet, only via these routers. These routers assign prefixes to gateways under them, so that
the gateways can be identified with them.
• IoT gateway WAN address changes without change in LAN address. This is achieved using ULA.
• The gateways assigned with prefixes, which are attached to a remote anchor point by using various
protocols such as Mobile IPv6, and are immune to changes of network prefixes.
• This is achieved using LU. The address of the nodes within the gateways remains unchanged as the
gateways provide them with locally unique address and the change in gateway’s network prefix doesn’t
affect them.
• Sometimes, there is a need for the nodes to communicate directly to the internet. This is achieved by
tunnelling, where the nodes communicate to a remote anchor point instead of channelling their packets
through the router which is achieved by using tunnelling protocols such as IKEv2:internet key exchange
version 2
10. Processes
The deployment of IoT technologies will significantly impact and change the way enterprises do business
as well as interactions between different parts of the society, affecting many processes. To be able to reap
the many potential benefits that have been postulated for the IoT, several challenges regarding the
modeling and execution of such processes need to be solved in order to see wider and in particular
commercial deployments of IoT . The special characteristics of IoT services and processes have to be
taken into account and it is likely that existing business process modeling and execution languages as well
as service description languages such as USDL [165], will need to be extended.
MINO401 IIOT
By Anshu Khare Page 14
Processes Dealing with Unreliable Data
When dealing with events coming from the physical world (e.g., via sensors or signal processing
algorithms), a degree of unreliability and uncertainty is introduced into the processes. If decisions in a
business process are to be taken based on events that have some uncertainty attached, it makes sense to
associate each of these events with some value for the quality of information (QoI). In simple cases, this
allows the process modeller to define thresholds: e.g., if the degree of certainty is more than 90%, then it
assumed that the event really happened. If it is between 50% and 90%, some other activities will be
triggered to determine if the event occurred or not. If it is below 50%, the event is ignored. Things get
more complex when multiple events are involved: e.g., one event with 95% certainty, one with 73%, and
another with 52%. The underlying services that fire the original events have to be programmed to attach
such QoI values to the events. From a BPM perspective, it is essential that such information can
be captured, processed and expressed in the modelling notation language, e.g. BPMN. Secondly, the
syntax and semantics of such QoI values need to be standardized. Is it a simple certainty percentage as in
the examples above, or should it be something more expressive (e.g., a range within which the true value
lies)? Relevant techniques should not only address uncertainty in the flow of a given (well-known) IoT-
based business process, but also in the overall structuring and modelling of (possibly unknown or
unstructured) process flows. Techniques for fuzzy modelling of data and processes could be considered.
MINO401 IIOT
By Anshu Khare Page 15
11. Data Management
Data management is a crucial aspect in the Internet of Things. When considering a world of objects
interconnected and constantly exchanging all types of information, the volume of the generated data
and the processes involved the handling of those data become critical. A long-term opportunity for
wireless communications chip makers is the rise of machine-to-machine (M2M) computing, which one
of the enabling technologies for Internet of Things. This technology spans a broad range of applications.
Worldwide M2M interconnected devices are on a steady upward march that is expected to surge 10-
fold to a global total of 12.5 billion devices by 2020. The resulting forecast in M2M traffic shows a similar
trajectory, with traffic predicted to grow 24-fold from 2012–2017, representing a CAGR
(Compound Annual Growth Rate) of 89% over the same period. Revenue 3.7 Data Management 83 PCs,
smartphones, and tablets: Unit shipment forecast, worldwide, from M2M services spanning a wide
range of industry vertical applications, including telematics, health monitoring, smart buildings and
security, smart metering, retail point of sale, and retail banking, is set to reach $35 billion by
2016. Driving this surge in the M2M market are a number of forces such as the declining cost of mobile
device and infrastructure technology, increased deployment of IP, wireless and wireline networks, and a
low-cost opportunity for network carriers to eke out new revenue streams by utilizing existing
infrastructure in new markets. This opportunity will likely be most prominent across a number of
enterprise verticals, with the energy industry-in the form of smart grid and smart metering technologies-
expected to experience significant growth in the M2M market . In this context there are many
technologies and factors involved in the “data management” within the IoT context. Some of the most
relevant concepts which enable us to understand the challenges and opportunities of data management
are:
• Data Collection and Analysis
• Big data
• Semantic Sensor Networking
• Virtual Sensors
• Complex Event Processing.
MINO401 IIOT
By Anshu Khare Page 16
Provides the customer with the ability to manage his automatic processes.
(e.g. scheduled platform originated data collection).
Customer workflows:
Allows the customer to create his own workflow to process the incoming events from a device
Multitenant structure:
Provides the structure to support multiple organizations and reseller schemes.In the coming years, the
main research efforts should be targeted to some features that should be included in any Data
Collection and Analysis platform:
• Multi-protocol. DCA platforms should be capable of handling or understanding different input (and
output) protocols and formats. Different standards and wrappings for the submission of observations
should be supported
• De-centralisation. Sensors and measurements/observations captured by them should be stored in
systems that can be de-centralized from a platform. It is essential that different components,
geographically distributed in different locations may cooperate and exchange data.
Related with this concept, federation among different systems will make possible the global integration
of IoT architectures.
• Security. DCA platforms should increase the level of data protection and security, from the
transmission of messages from devices (sensors, actuators, etc.) to the data stored in the platform.
• Data mining features. Ideally, DCAsystems should also integrate capacities for the processing of the
stored info, making it easier to extract useful data from the huge amount of contents that may be
recorded.
Big Data
Big data is about the processing and analysis of large data repositories, so disproportionately large that it
is impossible to treat them with the conventional tools of analytical databases. Some statements suggest
that we are entering the “Industrial Revolution of Data,” , where the majority of data will be stamped out
by machines. These machines generate data a lot faster than people can, and their production rates will
grow exponentially with Moore’s Law. Storing this data is cheap, and it can be mined for valuable
information.
Examples of this tendency include:
• Web logs;
• RFID;
• Sensor networks;
• Social networks;
• Social data (due to the Social data revolution);
• Internet text and documents;
• Internet search indexing;
• Call detail records;
• Astronomy, atmospheric science, genomics, biogeochemical, biological, and other complex and/or
interdisciplinary scientific research;
• Military surveillance;
• Medical records;
• Photography archives;
MINO401 IIOT
By Anshu Khare Page 17
12. Security, Privacy &Trust
The Internet of Things presents security-related challenges that are identified in the IERC 2010 Strategic
Research and Innovation Roadmap but some elaboration is useful as there are further aspects that need to
be addressed by the research community. While there are a number of specific security, privacy and trust
challenges in the IoT, they all share a number of transverse non-functional requirements:
• Lightweight and symmetric solutions, Support for resource constrained devices
• Scalable to billions of devices/transactions
Solutions will need to address federation/administrative co-operation
• Heterogeneity and multiplicity of devices and platforms
• Intuitively usable solutions, seamlessly integrated into the real world
MINO401 IIOT
By Anshu Khare Page 18
all of these devices connected, it is as well needed have the right data model. The data model has to
accommodate high data rate sensor data and to assimilate and analyze the information. In this context
database read/write performance is critical, particularly with high data rate sensor data. The database must
support high-speed read and writes, be continuously available (100% of the time) to gather this data at
uniform intervals and be scalable in order to maintain a cost-effective horizontal data store over time.
Large-scale applications and services based on the IoT are increasingly vulnerable to disruption from
attack or information theft. Advances are required in several areas to make the IoT secure from those with
malicious intent, including
• DoS/DDOS attacks are already well understood for the current Internet, but the IoT is also susceptible
to such attacks and will require specific techniques and mechanisms to ensure that transport, energy, city
infrastructures cannot be disabled or subverted.
• General attack detection and recovery/resilience to cope with IoT-specific threats, such as compromised
nodes, malicious code hacking attacks.
• Cyber situation awareness tools/techniques will need to be developed to enable IoT-based
infrastructures to be monitored. Advances are required to enable operators to adapt the protection of the
IoT during the lifecycle of the system and assist operators to take the most appropriate protective action
during attacks.
• The IoT requires a variety of access control and associated accounting schemes to support the various
authorisation and usage models that are required by users. The heterogeneity and diversity of the
devices/gateways that require access control will require new lightweight schemes to be developed.
• The IoT needs to handle virtually all modes of operation by itself without relying on human control.
New techniques and approaches e.g. from machine learning, are required to lead to a self-managed IoT.
Energy Harvesting
Four main ambient energy sources are present in our environment: mechanical energy, thermal energy,
radiant energy and chemical energy. The power consumption varies depending on the communication
protocols and data rate used to transmit the date. The approximate power consumption for different
protocols is as following 3G-384kbps-2W, GPRS- 24kbps-1W, WiFi-10Mbps-32–200mW, Bluetooth-
1Mbps-2.5–100 mW, and Zigbee-250kbps-1mW. Ambient light, thermal gradients, vibration/motion or
electromagnetic radiation can be harvested to power electronic devices. The major components of an
autonomous wireless sensor are the energy harvesting transducer, energy, sensor, microcontroller and the
wireless radio. For successful harvesting implementations there are three key areas in the energy
processing stage that must be addressed: energy conversion, energy storage, and power management.
Harvesting 100 μW during 1 year corresponds to a total amount of energy equivalent to 1 g of lithium.
Considering this approach of looking at energy consumption for one measurement instead of average
power consumption, it results that, today:
• Sending 100 bits of data consumes about 5 μJ,
• Measuring acceleration consumes about 50 μJ,
• Making a complete measurement: measure + conversion + emission consume 250–500 μJ.
MINO401 IIOT
By Anshu Khare Page 20
Therefore, with 100 μW harvested continuously, it is possible to perform a complete measurement every
1–10 seconds. This duty cycle can be sufficient for many applications. For other applications, basic
functions’ power consumptions are expected to be reduced by 10 to 100 within 10 years; which will
enable continuous running mode of EH-powered IoT devices. Even though many developments have
been performed over the last 10 years, energy harvesting – except PV cells – is still an emerging
technology that has not yet been adopted by industry. Nevertheless, further improvements of present
technologies should enable the needs of IoT to be met.
MINO401 IIOT
By Anshu Khare Page 21
these different disciplines can often come from legislation or regulatory activities. As a result, such policy
making can have a direct requirement for supporting IoT standards to be developed. It would therefore be
beneficial to develop a wider approach to standardization and include anticipation of emerging or on-
going policy making in target application areas, and thus be prepared for its potential impact on IoT-
related standardization. Atypical example is the standardization of vehicle emergency call services called
eCall driven from theEC[193]. Based on the objective of increased road safety, directives were
established that led to the standardization of solutions for services and communication by e.g. ETSI, and
subsequently3GPP.Another example is the Smart Grid standardization mandate M/490 [194] from the EC
towards the European Standards Organisations (ESOs), and primarily ETSI, CEN and CENELEC.
The standardization bodies are addressing the issue of interoperable protocol stacks and open standards
for the IoT. This includes as well expending the HTTP, TCP, IP stack to the IoT-specific protocol stack.
This is quite challenging considering the different wireless protocols like ZigBee, RFID, Bluetooth,
BACnet 802.15.4e, 6LoWPAN, RPL, CoAP , AMQP and MQTT. HTTP relies on the Transmission
Control Protocol (TCP). TCP’s flow control mechanism is not appropriate for LLNs and its overhead is
considered too high for short-lived transactions. In addition, TCP does not have multicast support and is
rather sensitive to mobility. CoAP is built on top of the User Datagram Protocol (UDP) and therefore has
significantly lower overhead and multicast support [103]. The conclusion is that any IoT related
standardization must pay attention to how regulatory measures in a particular applied sector will
eventually drive the need for standardized efforts in the IoT domain. Agreed standards do not necessarily
mean that the objective of interoperability is achieved. The mobile communications industry has been
successful not only because of its global standards, but also because interoperability can be assured via
the certification of mobile devices and organizations such as the Global Certification Forum [195] which
is a joint partnership between mobile network operators, mobile handset manufacturers and test
equipment manufacturers. Current corresponding M2M efforts are very domain specific and fragmented.
The emerging IoT and M2M dependant industries should also benefit from ensuring interoperability of
devices via activities such as conformance testing and certification on a broader scale. To achieve this
very important objective of a “certification” or validation programme, we also need non ambiguous test
specifications which are also standards. This represents a critical step and an economic issue as this
activity is resource consuming.As for any complex technology, implementation of test specifications into
cost-effective test tools should also to be considered.Agood example is the complete approach of ETSI
using a methodology (e.g. based on TTCN-3) considering all the needs for successful certification
programmes. The conclusion therefore is that just as the applied sector can benefit from standards
supporting their particular regulated or mandated needs, equally, these sectors can benefit from
conforming and certified solutions, protocols and devices. This is certain to help the IoT- supporting
industrial players to succeed.
Current Situation
The current M2M related standards and technologies landscape is highly fragmented. The fragmentation
can be seen across different applied domains where there is very little or no re-use of technologies beyond
basic communications or networking standards. Even within a particular applied sector, a number of
competing standards and technologies are used and promoted. The entire ecosystem of solution providers
and users would greatly benefit from less fragmentation and should strive towards the use of a common
set of basic tools. This would provide faster time to market, economy of scale and reduce overall costs.
Another view is standards targeting protocols vs. systems. Much emphasis has been put on
communications and protocol standards, but very little effort has previously been invested in
standardizing system functions or system architectures that support IoT. Localized system standards are
plentiful for specific deployments in various domains. One such example is in building automation and
control with (competing) standards like BACnet KNX. However, system standards on the larger
deployment and global are not in place. The on going work in ETSI M2M TC is one such approach, but is
MINO401 IIOT
By Anshu Khare Page 22
currently limited to providing basic application enablement on top of different networks. It should also be
noted that ETSI represent one industry – the telecommunications industry. The IoT stakeholders are
represented by a number of different industries and sectors reaching far beyond telecommunications.
IEEE-SA is also collaborating with other Standards Development Organizations to create a more efficient
and collaborative standards-development environment.
Developing smart grids around the world will produce benefits – from the ability to respond to demand
with more or less generation, to identifying waste and reducing costs. But it’s connecting to what’s in the
home that will produce the greatest efficiencies, because the homes/buildings are where the grid connects
to the user. By bringing the user online, the smart grid can manage demand, eliminate waste, lower peak
loads, and stimulate investment in more energy efficient appliances. Utilities, manufacturers and suppliers
are using IEEE standards to make the Smart Grid work with their products and the customers’
homes/buildings. The standards addressing this area are as following [67]:
• Smart Grid Interoperability—IEEE 2030TM
• Smart Metering—IEEE P1377TM, IEEE 1701TM, IEEE 1702TM, IEEE P1703TM, IEEE P1704TM, IEEE
P1705TM
• Utility Network Protocol—IEEE 1815TM
• Interconnecting Distributed Resources with Electrical Power Systems - IEEE 1547TM series
• Communication over Power Lines—IEEE 1901TM, IEEE P1901.2TM
• Local and Metropolitan Area Networks—IEEE 802§series The electric vehicle will interface with the
homes/buildings and the electrical grid is being shaped by the feedback of owners and manufacturers
today. The standards addressing this area are as following [67]:
• Smart Grid Interoperability – IEEE 2030TM, IEEE P2030.1TM
• Communication over Power Lines – IEEE 1901TM, IEEE P1901.2TM
• Local and Metropolitan Area Networks – IEEE 802§series
• Interconnecting Distributed Resources with Electrical Power Systems - IEEE 1547TM series
• Smart Metering/Utility Network Protocol – IEEE 1701TM, IEEE 1702TM, IEEE P1703TM, IEEE
P1704TM, IEEE P1705TM, IEEE P1377TM, IEEE 1815TM
The IoT will bring home/building networking for connecting devices and humans to communicate. This
will empower the devices themselves and allow them to interact. In order to make home/building-wide
systems with components from many manufacturers work requires connectivity standards and an
assurance of interoperability. The standards addressing this area are as following [67]:
• Convergent Digital Home Network – IEEE P1905.1TM
• Power Lines Communications – IEEE 1901TM, IEEE P1901.2TM, IEEE 1675TM, IEEE 1775TM
• Low-Frequency andWireless Protocol – IEEE 1902.1TM
• Local and Metropolitan Area Networks – IEEE 802_series
• Utility Network Protocol – IEEE 1815TM
Areas for Additional Consideration
The technology fragmentation mentioned above is particularly evident on the IoT device side. To drive
further standardization of device technologies in the direction of standard Internet protocols and Web
technologies, and towards application level, would mitigate the impacts of fragmentation and striv
towards true interoperability. Embedded web services, as driven by the IETF and IPSO Alliance, will
ensure a seamless integration of IoT devices with the Internet. It will also need to include semantic
MINO401 IIOT
By Anshu Khare Page 23
representation of IoT device hosted services and capabilities. The service layer infrastructure will require
standardization of necessary like interfaces to information and sensor data repositories, discovery
directory services and other mechanisms that have already been identified in projects like SENSEI [195],
IoT-A[196], and IoT6. Current efforts in ETSI M2M TC do not address these aspects.
The IoT will require federated environments where producers and consumers of services and information
can collaborate across both administrative and application domains. This will require standardized
interfaces on discovery capabilities as well as the appropriate semantic annotation to ensure that
information becomes interoperable across sectors. Furthermore, mechanisms for authentication and
authorization as well as provenance of information, ownership and “market mechanisms” for information
become particularly important in a federated environment. Appropriate SLAs will be required for
standardization. F-ONS [199] is one example activity in the direction of federation by GS1. Similar
approaches will be needed in general for IoT including standardized cross-domain interfaces of sensor
based services. A number of IoT applications will be coming from the public sector. The Directive on
Public Sector Information [201] requires open access to data. Integration of data coming from various
application domains is not an easy task as data and information does not adhere to any standardized
formats including their semantics. Even within a single domain, data and information is not easily
integrated or shared. Consideration of IoT data and information integration and sharing within domains as
well as between domains need, also be considered at the international level. Instrumental in a number of
IoT applications is the spatial dimension. Standardization efforts that provide necessary harmonization
and interoperability with spatial information services like INSPIRE [202] will be the key.
IoT with its envisioned billions of devices producing information of very different characteristics will
place additional requirements on the underlying communications and networking strata. Efforts are
needed to ensure that the networks can accommodate not only the number of devices but also the very
different traffic requirements including delay tolerance, latency and reliability. This is of particular
importance for wireless access networks which traditionally have been optimized based on a different set
of characteristics. 3GPP, as an example, has acknowledged this and has started to address the short term
needs, but the long term needs still require identification and standardization.
MINO401 IIOT
By Anshu Khare Page 24