Unit Iv & V
Unit Iv & V
In this case, the smart city management system inherits also the security and privacy risks of cloud
computing, for instance the compromise of cloud servers or data abuse by insider attacks.
Additionally the Smart Cities infrastructure is also interacting with sensors and actuators in order to
gather data and control critical infrastructure functions. This clearly requires to authenticate and authorize
the access and to provide trusted information in a secure and privacy-preserving way.
These examples and developments show the importance of security, privacy and trust in smart city
applications. The actual damages caused by possible threats can range from small interferences in the
system to personal losses/exposure of private information.
With more information and management and control the smart city assets being available over ICT
networks, the risk and impact of security or privacy threats is foreseen to be increasing and can have
profound and serious consequences for the community.
A smart city infrastructure, as pictured above, is exposed to several risks such as attacks on the
control infrastructure, poisoning of data, and leakage of confidential data.
SMARTIE will focus on challenges that concern privacy, security and trust of the information
available in the smart city. An attacker can simultaneously attack on multiple layers:
1. Manipulate the sensor measurements to infiltrate the system with wrong data, e.g. to cause certain
actuations
2. Attack the sensors and actuators physically to obtain credentials
3. Attack or impersonate network components to act as a man-in-the-middle
4. Obtain sensitive data or cause actuation by attacking the sharing platform with forged or malicious
requests
Standard network security tools such as firewalls, monitoring or typically access control will not suffice to
prevent such sophisticated attacks due to the distributed nature of the IoT and the problem of
defining/finding trusted parties.
It is essential that security is built into the infrastructure rather than being added as an extra plug-ins. An
effective protection approach is to have security in depth, where data and services are protected by several
independent systems.
An effective protection approach is to have security in depth, where data and services are protected by
several independent systems. The challenge will be to design solutions where no single server has
significant power to control the infrastructure or to access significant amounts of data.
First Steps Towards a Secure Platform:
Smartie Approach:
SMARTIE will design and build a data-centring information sharing platform in which information will be
accessed through an information service layer operating above heterogeneous network devices and data
sources and provide services to diverse applications in a transparent manner. It is crucial for the
approach that all the layers involve appropriate mechanisms to protect the data already at the perception
layer as well as at the layers on top of it. These mechanisms shall cooperate in order to provide a cross-layer
holistic approach.
SMARTIE will focus on key innovations that strengthen security, privacy and trust at different IoT Layers
as depicted in the following table:
Initiative In order to transfer the central paradigms of the IoT to factory automation, many technologies
working well in the consumer world have to be applied under industrial conditions. One of the biggest
obstacles keeping responsibles away from the application of new technologies is missing trust and the lack
of best practice examples. For this reason in 2004, a group of people from industry and academia
met and formulated the vision of a smart factory of the future. After feasibility study the technology
initiative SmartFactoryKL was founded in 2005 as a public private partnership. Its target is to develop, apply
and distribute innovative industrial plant technology. The founding partners represented various industry
sectors. Meanwhile the number of partners has grown up to 22, including mainly partners from industry as
well as universities and research centers. The funding is based on membership fees and public research
projects given by German ministries and the EU [10]. The basic equipment of the SmartFactoryKL is an
automated production facility for liquid colored soap (Figure 3.4). It contains a process manufacturing
part as well as a piece handling part. Based on state of the art automation technology the equipment
demonstrates the migration path to the application of smart technologies in factory environments. In the
meanwhile several additional demonstration modules have been set up showing the application of new
technologies and paradigms like Service Oriented Automation architectures, Digital Product Memories,
Plug&Play automation, Dynamic orchestration of automated processes and the use of tablet computers in
industrial environments.
3.3.3 From Technologies to Technology Concepts
Often the discussion about the IoT in the context of industry applications is of technological nature.
However, as stated before technology is only a means to an end. Experience with the SmartFactoryKL
shows that instead of losing oneself in the discussion of technical implementation details one should focus
on the application type of IoT technology. Regarding the future factory this are basically the smart product,
the smart equipment, the smart infrastructure and the augmented operator. These concepts can be
implemented using a wide range of technology depending on the concrete scenario.
The Internet of Things aims to be a disruptive technology in many ways and may change how future
industry will work. However, enabling technologies like RFID orWireless Sensor Networks are in place, it is
often hindered by the fact that huge investments are needed and the local value is considered too low
for adoption. The creation of a global network of various ubiquitous networks is one of the driving
technological vision behind the Internet of Things. The economical vision of creating domain-and network-
wide business fields and usage scenarios by pervasive information networking uses the “Internet” both
as a technical and economical analogon. On one hand, as the global IP-based network that connects over 5
billion devices of different networks, and on the other the resulting economic growth and business cases.
The interesting fact is, however, that a lot of the enabling technology of the Internet of Things is
made to work in a very resource efficient way that hinders such efforts. Novel applications are often enabled
only by proprietary technology that uses local optimizations and does not primarily consider inter-
networking aspects. Industrial infrastructures are often older that the networks that formed
the initial Internet. They can by no means be considered a green field, but consists of a large installed base
with machinery that has lifetimes of up to 40 years. Thus many of the applications of IoT technology (as
depicted in Figure 3.7) that we consider to have high potential value involve retrofitting industrial systems
with IoT systems. These “brownfield” use cases are all targeted towards optimizing existing processes by
decreasing the gap between the realworld and the virtualworld. They are thus examples for an evolutionary
approach towards an “Industry 4.0” that builds upon IoT Technology. As depicted in Figure 3.8 so called
cyber-physical-systems in an industrial environment are by definition heavily interconnected. They reflect
their physical interdependencies also by communication link and data exchange. Technologies like sensor
networks and RFID often builds the missing link insuch an environment. IoT technology delivers
“smartness” and context awareness to otherwise “dumb” objects and environments. It puts the human in the
loop of many otherwise ad-hoc and unstructured business processes. As a motivating example of a very
simple use case for such a system we consider a mobile maintenance use case. In such a scenario a service
technician comes onto the site of a client and can identify all machinery parts easily
using RFID and ad-hoc device discovery. Based on this information he can build an up-to-date image of the
current system state that can be augmented with historical and semantically interconnected data. He can
further deploy wireless measurement devices ad-hoc to gather missing parameters to guide his diagnosis and
maintenance strategy. Such an ad-hoc setting is an example for the integration of federated heterogeneous
sensor information as core of an informed maintenance strategy with high immediate value coming from
IoT technology beyond high infrastructural investments [11].
SMART OBJECT
Introduction:
In the Vision of an Internet of Things interconnected Smart Objects play an important role.
Such a Smart Object is a bi-directional communicating object which observes its environment and is able to
make decisions depending on the application and based on the information extracted from the physical
world.
It is also called as Intelligent objects. The world of IOT is the network of interconnected
heterogeneous objects such as Smart devices, smart objects, sensors, actuators, RFID, Embedded system.
History of objects:
Smart object concept was introduced by Marcelo kallam and Daniel Thalmann as an
object that can be describe its own possible interacts
Artifacts
Machines
Products
GIZMOS
SPIMES
Artifacts:
It is Early Civilization
It is simple hand-made, human powered objects , created through logic
Eg:- Toys, Abacus tool kit etc
Machines:
It is Industrial revolution
Complex composition of artifacts powered by outside energy.
Products:
Industry produced the mass production
Mass produced and assembled products supported by organized system.
Gizmos:
This is our current technology
Technology + culture
It is based on unstable, customizable, programmable, highly functional interface
Gizmos have enough functionality to actively may people behave.
SPIMES:
From the users prospect the smartness of a smart object is realized within the
service and the application layers. Additional value can be achieved through generic, reconfigurable Smart
Objects.
Smart objects are designed as miniaturized, low power microelectronic systems
based on micro controllers, transceivers, sensors and energy supply.
As these microelectronic systems provide very limited resources (i.e., processing
power, memory) reconfigurable software implementations for smart objects become a challenge, especially
when reconfiguration should be possible by a user without code programming (requires easy programming)
or if reconfiguration should be done over the air (requires minimum code size).
Oracle Internet of Things, Amazon web services, Microsoft Azure IoT suite, Mocana IoT Platform, Ayla
Networks IoT, SAP cloud platform, DeviceHive, Cisco IoT could connect, SalesForce IoT, IBM Watson
Third-party Application
In Third-party applications, the output should be sent. These can be a mobile app or an internal system
amongst other things.
The IoT platform ensures the communication between devices, output work i.e collection of data and
formatted incorrect way functions like remote updates and access facilitated.
There are also other components like security features, connectivity choice i.e wifi, bluetooth, Zigbee, etc.
2. TinyDB: Focus on gathering data from devices. Since in an IoT-based system we need to gather data
from environment through different devices, we reviewed TinyDB that is a popular middleware.
3. WiseMID: Is the only middleware among the reviewed middleware that is specific for energy saving
purpose. As saving the energy of devices is important issue, we reviewed this middleware
Hydra
Hydra is a well-known middleware framework for IoT-based system
To provide the ease of deployment and configuration, we are looking for a Service Oriented Architecture
that interacts with devices in a loosely couple way.
The reason is, a loosely couple IoT-based system can support better system maintainability and extendibility
in case of handling changes in the type an number of devices.
As Hydra is a SOA-based middleware, and supports many required functionalities to support an IoT-based
system, we consider it as our related work,
* This project was developed for three application domains, namely building automation, healthcare, and
agriculture scenarios.
Hydra middleware is intelligent software that is placed between applications and the operating system to
handle various tasks in a cost-efficient way.
This middleware provides a web service interface to interact with any physical devices, actuators, sensors or
subsystems, irrespective of their network interface technologies, e.g. Bluetooth, RF, ZigBee, RFID, WiFi,
etc.
Working
This middleware has been designed to facilitate the interaction with devices by abstracting from the detailed
information about these devices and their networks.
Hydra considers each device as a service, and uses ontology languages, e.g. OWL, OWL-s and SAWSDL,
to define semantic descriptions of these devices.
Moreover, it provides an intelligent service layer that allows end-users to interact with these devices without
dealing with the communication technology that is supported by the devices.