0% found this document useful (0 votes)
20 views15 pages

IOT Part 2

Uploaded by

Medha Harini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views15 pages

IOT Part 2

Uploaded by

Medha Harini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

ISA 100.

11A
Introduction
 International Society of Automation.
 Designed mainly for large scale industrial complexes and plants.
 More than 1 billion devices use ISA 100.11A
 ISA 100.11A is designed to support native and tunneled application layers.

 Various transport services, including ‘reliable,’ ‘best effort,’ ‘real‐time’ are offered.
 Network and transport layers are based on TCP or UDP / IPv6.
 Data link layer supports mesh routing and Frequency hopping.
 Physical and MAC layers are based on IEEE 802.15.4
 Topologies allowed are:
 Star/tree
 Mesh
 Permitted networks include:
 Radio link
 ISA over Ethernet
 Field buses
 Application Support Layer delivers communications services to user and
management processes.
 It can pass objects (methods, attributes) natively within the ISA 100.11A protocol.
 A tunneling mode is available to allow legacy data through the ISA100.11A
network.

 RD=routing device

 NRD=Non‐ routing device


 H=Handheld device
 B=backbone Device
Features
 Flexibility
 Support for multiple protocols
 Use of open standards
 Support for multiple applications
 Reliability (error detection, channel hopping)
 Determinism (TDMA, QoS support)
 Security
Security

 Security is fully built‐in to the standard.


 Authentication and confidentiality services are independently available.
 A network security manager manages and distributes keys.
 Twin data security steps in each node:
 Data link layer encrypts each hop.

 Transport layer secures peer‐to‐peer communications.


Sensor Networks
Wireless Sensor Networks (WSNs)
 Consists of a large number of sensor nodes, densely deployed over an area.
 Sensor nodes are capable of collaborating with one another and measuring the
condition of their surrounding environments (i.e. Light, temperature, sound,
vibration).
 The sensed measurements are then transformed into digital signals and processed
to reveal some properties of the phenomena around sensors.
 Due to the fact that the sensor nodes in WSNs have short radio transmission
range, intermediate nodes act as relay nodes to transmit data towards the sink
node using a multi‐hop path.
Sensor Nodes
 Multifunctional
 The number of sensor nodes used depends on the
application type.
 Short transmission ranges
 Have OS (e.g., TinyOS).
 Battery Powered – Have limited life.

Constraints on Sensor Nodes


 Small size, typically less than a cubic cm.
 Must consume extremely low power
 Operate in an unattended manner in a highly dense area.
 Should have low production cost and be dispensable
 Be autonomous
 Be adaptive to the environment
Challenges
 Scalability
 Providing acceptable levels of service in the presence of large number of nodes.
 Typically, throughput decreases at a rate of 1/√N , N = number of nodes.
 Quality of service
 Offering guarantees in terms of bandwidth, delay, jitter, packet loss probability.
 Limited bandwidth, unpredictable changes in RF channel characteristics.

 Energy efficiency
 Nodes have limited battery power
 Nodes need to cooperate with other nodes for relaying their information.
 Security
 Open medium.
 Nodes prone to malicious attacks, infiltration, eavesdropping, interference.
Sensor Web Entanglement
 Observations & measurements (O&M)
 Sensor model language (sensorml)
 Transducer model language (transducerml or TML)
 Sensor observations service (SOS)
 Sensor planning service (SPS)
 Sensor alert service (SAS)
 Web notification services (WNS)
Cooperation in Wireless Ad Hoc and Sensor Networks
 Nodes communicate with other nodes with the help of intermediate nodes.
 The intermediate nodes act as relays.

 Wireless nodes are energy‐constrained.


 Nodes may or may not cooperate.
Cooperation in Wireless Ad Hoc and Sensor Networks
 Two extremities:
 Total cooperation: if all relay requests are accepted, nodes will quickly exhaust
limited energy.

 Total non‐cooperation: if no relay requests are accepted, the network throughput


will go down rapidly.

 Issues:

 Selfishness, self‐interests, etc.


 Symbiotic dependence
 Tradeoff: individual node’s lifetime vs. Throughput.
Security Challenges in Cooperation
 Open, shared radio medium by the nodes, which dynamically change positions.
 No centralized network management or certification authority.
 Existence of malicious nodes.
 Nodes prone to attacks, infiltration, eavesdropping, interference.
 Nodes can be captured, compromised, false routing information can be sent –
paralyzing the whole network.
 The cooperating node or the node being cooperated might be victimized.

Node Behavior in WSNs (contd.)


 Normal nodes work perfectly in ideal environmental conditions
 Failed nodes are simply those that are unable to perform an operation; this could
be because of power failure and environmental events.
 Badly failed nodes exhibit features of failed nodes but they can also send false
routing messages which are a threat to the integrity of the network.
 Selfish nodes are typified by their unwillingness to cooperate, as the protocol
requires whenever there is a personal cost involved. Packet dropping is the main
attack by selfish nodes.
 Malicious nodes aim to deliberately disrupt the correct operation of the routing
protocol, denying network service if possible.
Dynamic Misbehavior: Dumb Behavior
 Detection of such temporary misbehavior in order to preserve normal functioning
of the network – coinage and discovery of dumb behavior
 In the presence of adverse environmental conditions (high temperature, rainfall,
and fog) the communication range shrinks
 A sensor node can sense its surroundings but is unable to transmit the
sensed data
 With the resumption of favorable environmental conditions, dumb nodes work
normally
 Dumb behavior is temporal in nature (as it is dependent on the effects of
environmental conditions)
Detection and Connectivity Re-establishment
 The presence of dumb nodes impedes the overall network performance

 Detection, and, subsequently, the re‐establishment of network connectivity is


crucial

dumb node with other nodes in the network could be re ‐established


 The sensed information can only be utilized if the connectivity between each

 Before restoration of network connectivity, it is essential to detect the dumb


nodes in the network.

 CoRD and CoRAD are two popular schemes that re ‐establish the connectivity
between dumb nodes with others.

Event-Aware Topology Management in Wireless Sensor Networks


 Timely detection of an event of interest
 Monitoring the event

 Disseminating event‐data to the sink


 Adapting with the changes of event state
 Event location
 Event area
 Event duration
Information Theoretic Self-Management of Wireless Sensor Networks
 A WSN is deployed with the intention of acquiring information
 The sensed information are transmitted in the form of packets

 Information theoretic self‐management (INTSEM) controls the transmission rate of


a node by adjusting a node’s sleep time

 Benefits
 Reduce consumption of transmission energy of transmitters
 Reduce consumption of receiving energy of relay nodes

Social Sensing in WSNs

 Social Sensing ‐based Duty Cycle Management for Monitoring Rare Events in
Wireless Sensor Networks

 WSNs are energy‐constrained


 Scenario:
 Event monitoring using WSNs
 WSNs suffer from ineffective sensing for rare events
 Event monitoring or sensing, even if there is no event to monitor or sense
 Example: Submarine monitoring in underwater surveillance
Social Sensing in WSNs (contd.)
 Challenges:
 Distinguish rare events and regular events

 Adapt the duty‐cycle with the event occurrence probability.


 Contribution:
 Probabilistic duty cycle (PDC) in WSNs
 Accumulates information from the social media to identify the occurrence
possibility of rare events
 Adjusts the duty cycles of sensor nodes using weak estimation learning automata
Applications of WSNs: Mines (contd.)

 It is not only capable of providing real‐time monitoring and alarm in


case of a fire, but also capable of providing the exact fire location and spreading
direction by continuously gathering, analysing, and storing real time information

Applications of WSNs: Healthcare


 Wireless Body Area Networks
 Wireless body area networks (WBANs) have recently gained popularity due to their
ability in providing innovative, cost‐effective, and user‐friendly solution for
continuous monitoring of vital physiological parameters of patients.
 Monitoring chronic and serious diseases such as cardiovascular diseases and
diabetes.
 Could be deployed in elderly persons for monitoring their daily activities.
Applications of WSNs: Healthcare (contd.)

Social Choice Considerations in Cloud‐Assisted WBAN Architecture

 A proper aggregation function necessarily needs to be “fair", so that none ofthe


eligible elements are ignored unjustly.

 In a post‐disaster environment, it is required to monitor patients' health conditions


remotely.
 This includes ambulatory healthcare services where the health status of a patient
is examined continuously over time, while the patient is being moved to the
emergency healthcare center.

 The work focuses on the formation of pseudo‐clusters so that the aggregation is


not biased towards the leader nodes.
 Data aggregation among the LDPUs is done in a “fair" manner following the
Theory of Social Choice.
 Aggregation is performed at mobile aggregation centers, thereby increasing the
scalability of the system.
 After the aggregation of data, the gateways are allocated dynamically.
 Payload tuning mechanism for WBANs
 In addition to the actual health condition, there exists indirect influence of
external parameters such as– age, height, weight, and sex on health parameters.
 In crisp set theory, we are unable to interpret how much ‘low’, ‘moderate’,or
‘high’, a particular health parameter is.

 Exclusion of the important external parameters while assessing health and the
usage of traditional crisp set theory may result into inefficient decision making.
 Challenge is to design a dynamic decision making model that can optimize the
energy consumption of each physiological sensor
 Fuzzy inference system (FIS) and markov decision process (MDP) are used to
optimize energy consumption

 Priority ‐Based Time‐Slot Allocation in WBANs


 In medical emergency situations, it is important to discriminate the WBANs
transmitting critical heath data from the ones transmitting data of regular
importance.

 Existing frequency division ‐based transmission in a multisource‐single ‐sink


network results in flooding of the sink’s receiver buffer.
 This leads to packet loss and consequent retransmission of the regenerated
packets.
 Transmission priority of an local data processing unit (LDPU) is indifferent to the
criticality of the health data that is being transmitted by the LDPU.

 Based on LDPU ‐properties, such as the criticality of health data, energy

parameter is formulated which is a relative measure of node ‐ importance.


dissipation factor, and time elapsed since last successful transmission, a fitness

 The priority‐based allocation of time slots (PATS) algorithm allows the LDPUs to
choose their strategies based on their fitness.

waiting time between successive transmission of data ‐packets.


 LDPUs with higher fitness are given higher preference, while ensuring minimum

You might also like