IOT Main Notes
IOT Main Notes
Iresh A. Dhotre
M.E. (Information Technology),
Ex-Faculty, Sinhgad College of Engineering.
Pune.
TECHNICAL
PUBLICATIONS
SINCE 1993 An Up-Thrust for Knowledge
(i)
IoT & Applications
Subject Code : 2180709
Semester - VIII (Computer Engineering / Computer Science & Engineering / Information Technology)
Elective - III
Published by :
®
TECHNICAL Amit Residency, Office No.1, 412, Shaniwar Peth, Pune - 411030, M.S. INDIA
P h . : + 9 1 - 0 2 0 - 2 4 4 9 5 4 9 6 / 9 7 , Te l e f a x : + 9 1 - 0 2 0 - 2 4 4 9 5 4 9 7
PUBLICATIONS
SINCE 1993 An Up-Thrust for Knowledge Email : [email protected] Website : www.technicalpublications.org
ISBN 978-93-332-1492-6
(vi)
Chapter - 4 IoT Applications for Value Creations (4 - 1) to (4 - 24)
4.1 Introduction ...................................................................................................... 4 - 2
4.2 IoT Applications for Industry............................................................................. 4 - 2
4.2.1 Future Factory Concept ..................................................................................... 4 - 6
4.3 Brownfield IoT ................................................................................................. 4 - 10
4.4 Smart Objects and Smart Applications ........................................................... 4 - 11
4.5 Four Aspects in your Business to Master IoT.................................................. 4 - 13
4.6 Value Creation from Big Data and Serialization ............................................. 4 - 15
4.7 IoT for Retailing Industry ................................................................................ 4 - 20
4.8 IoT for Oil and Gas Industry ............................................................................ 4 - 21
4.9 Opinions on IoT Application and Value for Industry....................................... 4 - 22
4.10 eHealth ........................................................................................................... 4 - 22
(vii)
(viii)
IoT and Web Technology
Chapter - 1
IOT AND WEB TECHNOLOGY
Syllabus : The Internet of Things Today, Time for Convergence, Towards the IoT
Universe, Internet of Things Vision, IoT Strategic Research and
Innovation Directions, IoT Applications, Future Internet
Technologies, Infrastructure, Networks and Communication,
Processes, Data Management, Security, Privacy and Trust, Device
Level Energy Issues, IoT Related Standardization, Recommendations
on Research Topics.
1.8 Infrastructure 1 - 31
1.10 Processes 1 - 34
The Internet of Things (IoT) is the network of physical objects i.e. devices, vehicles,
buildings and other items embedded with electronics, software, sensors, and network
connectivity that enables these objects to collect and exchange data.
Wikipedia definition : The Internet of Things, also called The Internet of Objects, refers
to a wireless network between objects, usually the network will be wireless and self-
configuring, such as household appliances.
WSIS 2005 Definition : By embedding short-range mobile transceivers into a wide
array of additional gadgets and everyday items, enabling new forms of communication
between people and things, and between things
A phenomenon which connects a variety of things. Everything that has the ability to
communicate.
Fig. 1.1.1
IoT data differs from traditional computing. The data can be small in size and frequent
in transmission. The number of devices, or nodes, that are connecting to the network
are also greater in IoT than in traditional PC computing.
Machine-to-Machine communications and intelligence drawn from the devices and the
network will allow businesses to automate certain basic tasks without depending on
central or cloud based applications and services.
IoT impacts every business. Mobile and the Internet of Things will change the types of
devices that connect into a company’s systems. These newly connected devices will
produce new types of data. The Internet of Things will help a business gain efficiencies,
harness intelligence from a wide range of equipment, improve operations and increase
customer satisfaction.
Ubiquitous computing, pervasive computing, Internet Protocol, sensing technologies,
communication technologies, and embedded devices are merged together in order to
form a system where the real and digital worlds meet and are continuously in symbiotic
interaction.
The smart object is the building block of the IoT vision. By putting intelligence into
everyday objects, they are turned into smart objects able not only to collect information
from the environment and interact /control the physical world, but also to be
interconnected, to each other, through Internet to exchange data and information.
The expected huge number of interconnected devices and the significant amount of
available data open new opportunities to create services that will bring tangible benefits
to the society, environment, economy and individual citizens. In this paper we present
the key features and the driver technologies of IoT. In addition to identifying the
application scenarios and the correspondent potential applications, we focus on research
challenges and open issues to be faced for the IoT realization in the real world.
However, the IoT is still maturing, in particular due to a number of factors, which limit
the full exploitation of the IoT. Some of the factors are listed below :
1. There is no unique identification number system for object in the world.
2. IoT uses Architecture Reference Model (ARM) but there is no further development
in ARM.
3. Missing large-scale testing and learning environments
4. Difficulties in exchanging of sensor information in heterogeneous environments.
5. Difficulties in developing business which embraces the full support of the Internet
of Things.
Characteristics of the Internet of Things
The hardware utilized in IoT systems includes devices for a remote dashboard, devices
for control, servers, a routing or bridge device, and sensors. These devices manage key
tasks and functions such as system activation, action specifications, security,
communication, and detection to support-specific goals and actions.
Major components of IoT devices are as follows:
1. Control units : A small computer on a single integrated circuit containing
processor core, memory and a programmable I/O peripheral. It is responsible for
the main operation.
2. Sensor : Devices that can measure a physical quantity and convert it into a signal,
which can be read and interpreted by the microcontroller unit. These devices
consist of energy modules, power management modules, RF modules, and sensing
modules. Most sensors fall into 2 categories: Digital or analog. An analog data is
converted to digital value that can be transmitted to the Internet.
a. Temperature sensors : accelerometers
b. Image sensors: gyroscopes
c. Light sensors : acoustic sensors
d. Micro flow sensors : humidity sensors
e. Gas RFID sensors : pressure sensors
3. Communication modules : These are the part of devices and responsible for
communication with rest of IoT platform. They provide connectivity according to
wireless or wired communication protocol they are designed. The communication
between IoT devices and the Internet is performed in two ways:
A) There is an Internet-enable intermediate node acting as a gateway;
B) The IoT Device has direct communication with the Internet.
The communication between the main control unit and the communication module uses
serial protocol in most cases.
4. Power sources : In small devices the current is usually produced by sources like
batteries, thermocouples and solar cells. Mobile devices are mostly powered by
lightweight batteries that can be recharged for longer life duration.
Communication Technology and Protocol : IoT primarily exploits standard protocols
and networking technologies. However, the major enabling technologies and protocols
of IoT are RFID, NFC, low-energy Bluetooth, low-energy wireless, low-energy radio
protocols, LTE-A, and WiFi-Direct. These technologies support the specific networking
functionality needed in an IoT system in contrast to a standard uniform network of
common systems.
Working :
1. Collect and transmit data : The device can sense the environment and collect
information related to it and transmit it to a different device or to the Internet.
2. Actuate device based on triggers : It can be programmed to actuate other
devices based on conditions set by user.
3. Receive information : Device can also receive information from the network.
Sensors for various applications are used in different IoT devices as per different
applications such as temperature, power, humidity, proximity, force etc.
Gateway takes care of various wireless standard interfaces and hence one gateway can
handle multiple techologies and multiple sensors. The typical wireless technologies
used widely are 6LoWPAN, Zigbee, Zwave, RFID, NFC etc. Gateway interfaces with
cloud using backbone wireless or wired technologies such as WiFi, Mobile , DSL or
Fibre.
1.1.2 Advantages and Disadvantages of IoT
Advantages of IoT
1. Home : Buildings where people live. It controls home and security systems.
2. Offices : Energy management and security in office buildings; improved
productivity, including for mobile employees.
3. Factories : Places with repetitive work routines, including hospitals and farms;
operating efficiencies, optimizing equipment use and inventory.
4. Vehicles : Vehicles including cars, trucks, ships, aircraft, and trains; condition-
based maintenance, usage-based design, pre-sales analytics
5. Cities : Public spaces and infrastructure in urban settings; adaptive traffic control,
smart meters, environmental monitoring, resource management.
6. Worksites : It is custom production environments like mining, oil and gas,
construction; operating efficiencies, predictive maintenance, health and safety.
Fig. 1.1.3
IoT is simply a concept wherein machines and everyday objects are connected via the
Internet. Within the IoT, devices are controlled and monitored remotely and usually
wirelessly.
IDC predicts that the IoT will include 212 billion things globally by the end of 2020.
1. Development of a consistent, interoperable and accessible IoT across sectors,
including standardization.
2. Special attention is given to some of the most important application like health,
environment and energy consumption.
3. Maintaining the Internet of Things as an important subject for national and
international cooperation both for sharing best practices and development.
4. Offers security, privacy and trust in the scope of current legislation and
development of robust and future-proof general data protection rules.
5. Providing resources like spectrum allowing pan-European service provision and
removal of barriers such as roaming.
Internet of Things is a concept and paradigm. It considers variety of object from the
environment and communicate with wireless and wired connections with unique
addressing method.
A world where the real, digital and the virtual are converging to create smart
environments that make energy, transport, cities and many other areas more intelligent.
Main goal of the IoT is to enable things to be connected anytime, anyplace, with
anything and anyone ideally using any path/network and any service. It is a new
revolution of the Internet.
Using IPv6 with its abundant address spaces, globally unique object identification and
connectivity can be provided in a standardized manner without additional status or
address processing.
New types of applications can involve the electric vehicle and the smart house, in
which appliances and services that provide notifications, security, energy-saving,
automation, telecommunication, computers and entertainment are integrated into a
single ecosystem with a shared user interface.
There are a number of factors powering the progression of the IoT within the digital
economy, including :
1. Powerful new mobile, wearable or connected devices.
2. Application that fuel demand for mobile data and test the limits of the network
within most industry sector.
3. Cloud-based apps and those that rely on content stored in the cloud, which will
increase as development accelerates on new Platform-as-a-Service, mobile point
of sale and independent software vendor platforms.
4. New use cases, such as mobile video, which will be significant factors in driving
expensive capacity upgrades in networks.
The end goal is to have plug-n-play smart objects that can be deployed in any
environment with an interoperable interconnection backbone that allows them to blend
with other smart objects around them. Standardization of frequency bands and protocols
plays a pivotal role in accomplishing this goal.
The use of IP to communicate with and control small devices and sensors opens the
way for the convergence of large, IT-oriented networks with real time and specialized
networked applications.
The idea of internet of things was developed in parallel to WSNs. The term internet of
things was devised by Kevin Ashton in 1999 and refers to uniquely identifiable
objects and their virtual representations in an “internet-like” structure.
These objects can be anything from large buildings, industrial plants, planes, cars,
machines, any kind of goods, specific parts of a larger system to human beings, animals
and plants and even specific body parts of them.
IoT Definition : A global infrastructure for the information society, enabling advanced
services by interconnecting (physical and virtual) things based on existing and evolving
interoperable information and communication technologies.
Several factors are driving the convergence of Information Technology and
Communication Technology and, consequently, contributing to the integration and
transformation of cloud, pipe, and device technologies is shown in Fig. 1.4.3.
The goal of the IoT Strategic Research Agenda (IoT-SRA) is to direct the research
efforts to focus areas of identified significant value creation.
We are standing on the brink of a new ubiquitous computing and communication era,
one that will radically transform our corporate, community, and personal environments.
Development of new technology like smart-phones, embedded system, cloud
networking, sensors, nano-electronics, network virtualization and software are requires
Internet connection all the time.
The high level expert group on key enabling technologies (KETs) presented its final
report. This expert group was created with the aim to elaborate a European strategy to
develop several KETs - nanotechnology, micro and nanoelectronics, advanced
materials, photonics, industrial biotechnology and advanced manufacturing systems –
and to allow them to be more effectively exploited by industry.
The reduction in the critical dimensions while keeping the electrical field constant, and
at the same time a user obtained at a higher speed with reduction in power consumption
of a digital MOS circuits.
The International Technology Roadmap for Semiconductors has highlighted in its early
editions and its associated benefits in terms of performances, the traditional parameters
in Moore’s Law.
Mobile data traffic will be increases rapidly. In year 2015, technological survey was
conducted and it is observed that data traffic was increases and mobile operators are
facing problem to provide the required bandwidth to the client and customers.
Extra frequency spectrum is not available in some countries. So proposed solutions are
the seamless integration of existing Wi-Fi networks into the mobile ecosystem and also
this will have a very big impact on IoT ecosystems.
It is necessary to develop a chip to integrate all processes. It is called as “multicom
chip”. In a single silicon package, it is expected to cover Wi-Fi and baseband
communications. The architecture of mobile devices is likely to change as well as the
baseband chip will be taking control of the routing process, so the connectivity
components are connected to the baseband or integrated. So there will be change in the
architectural design.
Today many European projects address Internet of Things technologies, knowledge and
also it has been mentioned that these topics can be heterogeneous and specialized, also
there is a strong need for integration of the individual results.
In this context, the integration of knowledge has been conceptualized as the process
through which some specialized cognizance situated in multiple projects across Europe
is applied and assimilated.
The Agenda of Strategic Research and Innovation has been developed with the proper
support of a European-led community of interrelated projects and their stakeholders
with dedication to the innovation, creation, development and use of the IoT technology.
1.5.1 Applications and Scenarios of Relevance
The IERC is bringing together EU funded projects with the aim of defining a common
vision of IoT technology and addressing European research challenges. The rationale is
to target the large potential for IoT-based capabilities and promote the use of the results
from the existing projects to encourage the convergence of ongoing work to tackle the
most important deployment issues and the transfer of research and knowledge to
products and services and apply these in real IoT applications.
A smart space is deployed in an IoT-enabled computing environment, creating an
infrastructure for application to construct and deliver value-added services based on
cooperative activity of environment participants, either human or machines.
Fig. 1.5.1 shows IERC Vison for IoT Integrated Environment and Ecosystems.
Fig. 1.5.1 : IERC vision for IoT integrated environment and ecosystems
The final goal is to test and develop innovative and interoperable IoT solutions in areas
of industrial and public interest.
Smart is the new green as defined by Frost and Sullivan and the green products and
services will be replaced by smart products and services.
Fig. 1.5.2 : Equipment and service environment for participants in smart room
Smart environments are places where different kind of embedded devices are
interconnected in order to provide their occupants intelligent services improving their
comfort and convenience. These smart environments are seen to be important for the
future urban ecosystems in terms of user friendliness, quality of life, energy efficiency
and sustainability
The security challenge includes traditional issues of open distributed systems, such as
key exchange and resource restrictions, and specific problems caused by the dynamicity
and heterogeneity of smart spaces.
IoT applications need context-dependent and fine-grained access control. Smart space
access control policies define which knowledge processors (KPs) are allowed to access
which objects.
Security level of joined devices is measured. Access control ontology allows
representing meta-information about the context and granularity.
The approach enables devices to share knowledge with the same security level even
when these devices do not have interoperable security protocols for direct confidential
communication.
Many IoT devices are of low capacity (memory, CPU, battery, etc.), and they cannot
use the full scale of security capabilities that the basic HIP or other Internet protocols
provide.
1.5.2 IoT Functional View
Potential applications of the IoT are numerous and diverse, permeating into practically
all areas of every-day life of individuals , enterprises, and society as a whole
The number of urban residents is growing by nearly 60 million every year. In addition,
more than 60 percent of the world’s population will be living in cities by 2050. As a
result, people occupying just 2 percent of the world’s land will consume about three-
quarters of its resources. Moreover, more than 100 cities of 1 million people will be
built in the next 10 years.
Over the past decade, the city of Amsterdam, the Netherlands, has developed a vision
for collaborating, envisioning, developing, and testing numerous connected solutions
that could pave the way to a smarter, greener urban environment.
Fig. 1.6.1 shows application in smart city.
Innovations will aim to improve the quality of life in cities, encompassing security
issues and energy resourcefulness. Smart city includes :
1. Smarter management of city infrastructure using Big Data analytics
2. Collaboration across multiple and disparate agencies using cloud technologies
3. Real-time data collection, enabling quick response using mobile technologies
4. Enhanced security : improved public safety and law enforcement, and more
efficient emergency response
5. Better city planning improved schematics, project management and delivery
6. Networked utilities smart metering and grid management
7. Building developments more automation, and better management and security
Research challenges for smart city IoT applications :
1. To overcome the traditional silo based organization of the cities.
2. Creating algorithms and schemes to describe information created by sensors in
different applications to enable useful exchange of information between different
city services.
3. Mechanisms for cost efficient deployment and even more important maintenance
of such installations, including energy scavenging
Smart grids are an advancement of the electricity grids that are being used currently. A
smart grid is an electrical grid that uses modern technology (digital or analog) to collect
and communicate electricity related information of both the suppliers and consumers.
It not only enhances efficiency and reliability, but also improves the production and
distribution of electricity to the consumers. The process of installing a smart grid
necessarily means technical re-designing of the infrastructure at different levels. One
such measure means replacing the existing electronic meters (or electromechanical
meters) with smart meters, to enhance the sustainability and efficiency of the entire
electrical system.
Fig. 1.6.3 shows smart grid.
It uses information technologies to improve how electricity travels from power plants to
consumers and allows consumers to interact with the grid. It integrates new and
improved technologies into the operation of the grid.
The smart grid will require wide, seamless, often real-time use of applications and tools
that enable grid operators and managers to make decisions quickly.
Decision support and improved interfaces will enable more accurate and timely human
decision making at all levels of the grid, including the consumer level, while also
enabling more advanced operator training.
Energy storage systems are highly versatile and this is a technology that can meet the
needs of various users and be utilized in diverse fields. These include power generators
that use renewable energy, grid equipment like energy transmission and distribution
equipment, as well as commercial facilities, factories and homes.
1.6.3 Smart Transportation and Mobility
Cities around the world face common transport challenges – from increasing
congestion, safety concerns and aging infrastructure to a lack of funding and increasing
environmental impacts. Like their colleagues in city administration and government,
transport officials are starting to implement "smart solutions" to address these
challenges and provide improved mobility in their cities, better services for citizens and
a more cost-effective transport network
Vehicle networking : Utilizing the new technologies, such as wireless communication,
positioning and navigation, context awareness, to implement the connections between
vehicle to vehicle, vehicle to man, vehicle to infrastructure, so that the integrated
service can be provided.
The Internet of Vehicles (IoV) is an integration of three networks : an inter-vehicle
network, an intra-vehicle network, and vehicular mobile Internet.
The research and development, as well as the industrial application of IoV technologies
will promote the integration of automotive and information technology. The integrated
information services of vehicles, vehicle safety, and economic performance will
contribute to a more intelligent urban transportation system and advance social and
economic development.
The IoV will have far reaching influence on the consumer vehicle market, consumer
lifestyle, and even modes of behavior.
The application of IoV technology in providing information services, improving traffic
efficiency, enhancing traffic safety, implementing supervision and control and other
aspects will make millions of people enjoy more comfortable, convenient and safe
traffic service.
Large concentrations of vehicles, e.g., in city parking facilities during business hours,
can also provide the ad-hoc computational resources which will be of interest to those
in the IT fields.
Complementary efforts should be made for developing and enhancing middle-ware
platforms which will enable analytic and semantic processing of data coming from
vehicles.
1.6.4 Smart Factory and Smart Manufacturing
and using actual performance data to drive future design changes in the next generation
of products.
As IoT provides the basis for an increasing amount of automated data acquisition,
manufacturers will be able to adapt their processes and their products not just for
incremental improvements but also for transformation of the product, service, and
business model.
IoT gives manufacturers the opportunity to create "intelligent" products that can sense,
learn, and predict customer needs as well as interconnect with other product
ecosystems.
1.6.5 Smart Health
IoT devices can be used to enable remote health monitoring and emergency notification
systems. These health monitoring devices can range from blood pressure and heart rate
monitors to advanced devices capable of monitoring specialized implants.
Smart health systems provide health related services using a network , some kind of
connection between intelligent agents. These intelligent agents could be computing
devices, mobile phones, sensors, Fitbit smart bands, surgical devices, devices that
measure your blood chemistry, or devices that measure your brainwaves. Any of these
things could be intelligent agents.
The human actors, patients or healthcare providers for example could be intelligent
agents in this system. The sensors, devices, computers, applications, and human actors
are all intelligent agents that might be connected in the smart health system.
Smart healthcare is an important research area for Internet of Things , which employs
sensors and other information identifying technologies, wireless and wired networks to
realize large-scale, multi-layer interaction between patients and medical equipments,
medical staff and healthcare institutions.
Some challenges in the healthcare system are as follows :
1. Smarter hospital : Smarter hospital is an important improvement of smart
healthcare system. A natural problem is how to build a smarter hospital for
greatly improving medical services and patient experience.
2. Data integration/realtimeness : How to combine heterogeneous health data
sources in a unified and meaningful way enables the discovery and monitoring of
health data from different sources. It is also important for smart healthcare to
ensure the data realtimeness.
3. Medical resource shortness : There are not enough medical resources for the
population. For example, there are fewer doctors and high-level healthcare
institutions but more patients.
4. “Low” usage of community health service centers. In contrast with community
health service centers, people prefer the high-level healthcare institutions. This
results in the low usage of community service centers.
5. Bad health habits. The citizens have some bad health habits that contribute to poor
health, for instance, smoking and no sport.
6. Lack of information sharing. Hospitals are not sharing enough information. This
leads to the following two problems at least. First, the health information records
of patients cannot be queried. Second, there is lack of medical cooperation
between hospitals.
The links between the many applications in health monitoring are :
1. Applications require the gathering of data from sensors
2. Applications must support user interfaces and displays
3. Applications require network connectivity for access to infrastructural services
4. Applications have in-use requirements such as low power, robustness, durability,
accuracy and reliability.
Connected medical devices and associated IoT technologies will primarily be used to
achieve the following capabilities :
1. Access real time visibility of the patient's condition, his/her activities, context and
physiological parameters
2. Monitor compliance to prescribed treatment, diet and exercise regimes
3. Provide feedback and cues to patients, family members, doctors and caregivers in
order to implement corrective action
4. Leverage high performance computing for real time feedback and use evidence-
based medicine for better patient outcome
1.6.6 Food and Water Tracking and Security
Important natural resources in the world are food and fresh water. Organic food
produced without addition of certain chemical substances and according to strict rules,
or food produced in certain geographical areas will be particularly valued. Similarly,
freshwater from mountain springs is already highly valued.
The idea of the Internet of Things is linking digital information to a network and
thereby relating digital information to real world physical items. While many terms
have been used to describe the vision of seamless information access, exchange and
manipulation, the IoT can become a daily reality by the adoption and deployment of
more and more networked objects. The impact thus is not only achieved by
communication but by cooperation.
Cloud storage services may be accessed through a web service API, a cloud storage
gateway or through a web-based user interface.
Cloud computing solutions are made up of several elements.
1. Clients : Mobile, terminals or regular computers.
2. Benefits : Lower hardware costs, lower IT costs, security, data security, less
power consumption, ease of repair or replacement, less noise.
3. Data centers : Collection of servers where the application to subscribe is housed.
It could be a large room in the basement of your building or a room full of servers
on the other side of the world
4. Virtualizing servers : Software can be installed allowing multiple instances of
virtual servers to be used and a dozen virtual servers can run on one physical
server.
5. Distributed servers : Servers don't all have to be housed in the same location. It
can be in geographically disparate locations. If something were to happen at one
site, causing a failure, the service would still be accessed through another site. If
the cloud needs more hardware, they can add them at another site.
In Software as a Service (SaaS) model, application is hosted as a service to
customers who access it via the Internet.
Platform as a service is another application delivery model and also known as
cloud-ware. Supplies all the resources required to build applications and services
completely from the Internet, without having to download or install software.
1.7.2 IoT and Semantic Technologies
Large number of highly distributed and heterogeneous devices in the IoT need to be
interconnected and communicate in different scenarios autonomously. This implies
that providing interoperability among the “Things” on the IoT is one of the most
fundamental requirements to support object addressing, tracking, and discovery as well
as information representation, storage, and exchange.
The suite of technologies developed in the Semantic Web, such as ontologies, semantic
annotation, Linked Data and semantic Web services, can be uses as principal solutions
for the purpose of realising the IoT.
Fig. 1.7.1 shows semantics in the IoT.
Semantic technologies will also have a key role in enabling sharing and re-use of virtual
objects as a service through the cloud.
Future research on IoT is likely to embrace the concept of Linked Open Data. This
could build on the earlier integration of ontologies (e.g., sensor ontologies) into IoT
infrastructures and applications.
Linked Data is an approach to relate different resources and is currently adopted on the
Web. The four principles, of publishing data as linked data includes:
1. Using URI’s as names for things; everything is addressed using unique URI’s.
2. Using HTTP URI’s to enable people to look up those names; all the URI’s are
accessible via HTTP interfaces.
3. Providing useful RDF information related to URI’s that are looked up by machine
or people;
4. Linking the URI’s to other URI’s.
The current linked open data effort on the Web provides a large of number of
interlinked data represented in RDF accessible via common standard interfaces. The
linked data approach is also applied to the IoT domain by providing semantic data and
linking it to other domain dependent resources such as location information and
semantic tags.
The linked data approach enables resources described via different models and
ontologies to be interconnected. Linking the data to existing domain knowledge and
resources also makes the descriptions more interoperable.
1.7.3 Autonomy
There is still a lack of research on how to adapt and tailor existing research on
autonomic computing to the specific characteristics of CPS, such as high dynamicity
and distribution, real-time nature , resource constraints and lossy environment. Most
existing research in self-aware IoT is lacking experimentation for validation.
1.8 Infrastructure
The Internet of Things refers to the set of devices and systems that interconnect real-
world sensors and actuators to the Internet. This includes many different types of
systems, such as:
1. Mobile devices
2. Smart meters and objects
3. Wearable devices including clothing, health care implants, smart watches, and
fitness devices
4. Internet-connected automobiles
5. Home automation systems, including thermostats, lighting, and home security
6. Other measuring sensors for weather, traffic, ocean tides, road signals, and more
Internet of Things applications require diverse sensors and actuators. IoT devices and
services should be able to connect seamlessly and on a plug-and-play basis. How your
device connects to the rest of the world is a key consideration for Internet of Things
products.
To work with all features of Internet of Things, different types of application must run
on it. Devices used in the IoT, must support plug and play facility.
The infrastructure needs to support applications in finding the things required. An
application may run anywhere, including on the things themselves. Finding things is not
limited to the start-up time of an application.
IoT infrastructure has to support finding things according to location.
Infrastructure-related Research Questions
1. Low-power communication : Many IoT devices are small and do not have access
to a continuous power source. Battery size, lifetime, and cost impose significant
constraints on how these devices compute and communicate.
2. Computer networking researchers often grapple with questions of scale. For
example, today's Internet routing system interconnects more than 3 billion people,
more than a half million IP address blocks, and more than 50 thousand separately
administered networks. The networking community responded to the rapid growth
of the Internet by designing routing protocols, router architectures, and operational
practices to manage this kind of scale.
3. The unique properties of IoT devices have the potential make the underlying
network an even more important part of any viable defense. IoT devices may not
IoT requires both an architecture and products that allow for the extension of Internet
technologies, in order to reach a Future Internet of Things, Services and People.
The number of devices that are connected to the Internet is growing exponentially. This
has led to defining a new conception of Internet, the commonly called Future Internet,
which started with a new version of the Internet Protocol (IPv6) that extends the
addressing space in order to support all the emerging Internet-enabled devices.
IPv6 is the fundamental technology for the IoT. It is estimated that several billion
things will be connected by 2020. Unlike IPv4, IPv6 can address this number of
objects. The IPv6 address space supports 2128 unique addresses
1.10 Processes
Processes become more adaptive after an IoT integration. Data collection is based on
event or entity. When data is collected from the sensor or real time data, integration
processes happens. Such events can occur at any time in the process.
Event occurrence probability is very low. How to react to a single event can depend on
the context, i.e. the set of events that have been detected previously.
Processes Dealing with Unreliable Data
When dealing with events coming from the physical world, a degree of unreliability and
uncertainty is introduced into the processes.
If decisions in a business process are to be taken based on events that have some
uncertainty attached, it makes sense to associate each of these events with some value
for the quality of information.
Processes Dealing with Unreliable Resources
Data as well as resources are inherently unreliable. This is because of failure of the
hosting device. Processes relying on such resources need to be able to adapt to such
situations. It is necessary to detect a failure.
The quality of the generated reports should be regularly audited for correctness.
Data management is the ability to manage data information flow. With data
management in the management service layer, information can be accessed, integrated
and controlled. Higher layer applications can be shielded from the need to process
unnecessary data and reduce the risk of privacy disclosure of the data source.
Data is received from the Sensors and actuators which is relayed by the micro-
controller through WiFi, GPRS, RFID, ZigBee and open connectivity to the Router.
These data has to be refined from the database or repository using the Data Mining
algorithms like clustering and classification which analyses semantically and
syntactically.
Challenges and opportunities of data management are :
1. Data Collection and Analysis
2. Big Data
3. Semantic Sensor Networking
4. Virtual Sensors
5. Complex Event Processing.
Data Collection and Analysis (DCA)
Big data is about the processing and analysis of large data repositories on Cloud
computing. Big document summarization method is an important technique for data
management of IoT.
Traditional document summarization methods are restricted to summarize suitable
information from the exploding IoT big data on Cloud.
Big data requires exceptional technologies to efficiently process large quantities of data
within a tolerable amount of time.
Technologies being applied to big data include massively parallel processing (MPP)
databases, data-mining grids, distributed file systems, distributed databases, cloud
computing platforms, the Internet, and scalable storage systems.
Companies focused on the big data topic, such as Google, Yahoo!, Face-book or some
specialised start-ups.
Semantic Sensor Networks and Semantic Annotation of Data
The sensor networks range from tiny wireless artifacts to mobile devices (with many
sensors) to large scale systems (in smart cities and environmental monitoring
networks).
Applications and users are typically interested in querying various events and
requesting measurement and observation data from the physical world.
Integration of data from physical objects, using embedded processors and sensors, into
the Web is giving rise to the emergence of a new generation of systems.
The incorporation of physical object data with the Web data, using
information processing and knowledge engineering methods, enables the construction
of "‘intelligent and interconnected things"’ and "‘smart environments"’.
Utilising semantic Web technologies in the sensor networks results in a new concept,
sometimes referred to as Semantic Sensor Networks.
Sheth et al. propose annotating sensor data with spatial, temporal, and thematic
semantic metadata and refer to this as the Semantic Sensor Web (SSW). This approach
uses the current OGC and SWE specifications, extends them with semantic Web
technologies and provides enhanced machine-interpretable semantic descriptions.
Associating sensor and sensor network data with other concepts (on the Web) and
reasoning the data makes this information widely available for different applications,
front-end services and data consumers.
Semantics allow machines to interpret links and relations between the different
attributes of a sensor description and also other data existing on the Web or provided by
other applications and resources.
Fig. 1.11.1 shows publishing data from sensors and services on the Web
Fig. 1.11.1 : Publishing data from sensors and services on the Web
The example shows a parcel that is tagged with an RFID tag which is scanned every
time it is loaded or unloaded. The post delivery van has a GPS sensor which reports its
location and a twitter service is deployed to report the status of the parcel to interested
twitter followers.
In a semantic integration scenario each of these sensors and services need to be able to
describe and/or discover what type of in-formation is published and who can use this
information. This includes the sensor or service descriptions and also the data reported
from sensors and services.
Fig.1.11.2 shows a gateway component for Semantic Sensor Networks. The gateway
component is divided into three main layers.
The connectivity layer establishes the connection with a capillary sensor network. A
connector modules for each supported sensor/protocol platform should be developed.
External nodes directly connect to the gateway or use multi-hop connections. The
gateway provides a common interface which higher level applications and services can
access the under-lying sensor networks and their capabilities.
When a new node is activated, the node context information is stored in the gateway
repository. The goal of storing this information is to obtain a semantic description that
other processes can exploit and infer the status and capabilities of each node.
The information processing layer uses the data from the connectivity layer and from the
context information to support query analysis and processing. To establish a reliable
connection between sensor nodes and gateway, a method similar to the association and
negotiation protocol in the IEEE 802.11 Standard’s negotiation steps is developed.
The term “annotation” can denote both the process of annotating and the result of that
process. Semantic annotations, no matter inferred from the sensor data or provided by
users, represent the context data which can be utilised to create context-aware
applications.
Virtual Sensors
For example, on an intelligent construction site, users may desire the cranes to have
safe load indicators that determine if a crane is exceeding its capacity. Such a virtual
sensor would take measurements from physical sensors that monitor boom angle, load,
telescoping length, two-block conditions, wind speed, etc
Signals from these individual sensors can be used in calculations within a virtual sensor
to determine if the crane has exceeded its safe working load.
Applications focus on a control loop where inputs are the data sensed in a given area of
the system, and outputs are the actions to be executed in a possibly different area. For
in-stance, in a building fire control system, shown in Fig. 1.11.3.
A building fire control application. The control algorithm maps sensed inputs to output
commands. The sensing and acting tasks insist on different parts of the system.
The virtualization of sensors can be considered at different levels and shows in
Fig. 1.11.4. At the lowest level are those related with the more local processing of
several simple measurements and at the highest level, the abstract combination of
different sensors at the application level.
The security of the Internet of Things, the following principles can be established.
a) Identity : Trust is always tied to an identity. Therefore every device needs a
unique identity that can't be changed. The device must also be able to prove its
identity at all times.
b) Positive intention : The device and linked service have positive intentions.
c) Predictability and transparency : The functional scope of the service provided by
devices is known to its full extent. There are no undocumented (secret) functions.
The behaviour of the system can be checked at any time by independent third
parties.
d) Reputation : An increasing number of positive interactions between the things
gradually form a reputation based intelligent network
Bringing Trust to the Internet of Things
The Internet of Things touches many different sectors and applications, ranging from
connected cars to smart homes and intelligent infrastructure. This diversity has spawned
an ecosystem that consumers need to trust to keep their data protected.
Low power devices are expected to require 50 mW in transmission mode and less in
standby or sleep modes. EH devices cannot supply this amount of energy in a
continuous active mode, but instead intermittent operation mode can be used in EH-
powered devices.
The sensor node’s average power consumption corresponds to the total amount of
energy needed for one measurement cycle multiplied by the frequency of the operation
Standards mean in general common methods, norms and regulations, based on which
some work must be done, some product or service must be produced or some actions be
conducted. Standards can be official and binding (de jure).
De facto standards can be formed by companies or groups of companies (interest
groups, consortia, alliances, associations, etc.) which have come first into the market or
application area and therefore the used methods/protocols etc. have become de facto
standards. Standards play an important role in applying new technologies. With
standards different actors in industry and in ecosystems can utilize similar and
connective systems.
Standards are published documents that establish specifications and procedures
designed to maximize the reliability of the materials, products, methods, and/or services
people use every day. Standards address a range of issues, including but not limited to
various protocols to help maximize product functionality and compatibility, facilitate
interoperability and support consumer safety and public health.
Fig. 1.14.1 shows standardization process.
Fig. 1.14.1
With the popularity of IoT devices, many IoT protocols and standards have been
developed. In contrast to ordinary computers, IoT devices are normally constrained
when it comes to memory space and processing capacity.
In addition, IoT devices may be deployed where there is no or limited access to a power
grid, which means that they need to operate under power supply from batteries or small
solar panels.
As a consequence, power-efficient communication protocols with small memory
footprints and limited demands on processing have been developed to support IoT
devices.
IoT protocols have been standardized on virtually all layers of the protocol stack.
Notes
Chapter - 2
M2M TO IOT
Syllabus : A Basic Perspective- Introduction, Some Definitions, M2M Value Chains, IoT
Value Chains, An emerging industrial structure for IoT, The international
driven global value chain and global information monopolies.
M2M to IoT : An Architectural Overview - Building an architecture, Main
design principles and needed capabilities, An IoT architecture outline, standards
considerations.
2.6 The International Driven Global Value Chain and Global Information 2 - 17
Monopolies
In just the last few years, we have moved beyond simply using our machines to connect
with other people and can now program them to connect directly to one another,
allowing for the collection and processing of information on an unprecedented scale.
The new connectivity of both physical infrastructure and devices is being referred to as
the ‘industrial internet’ or the ‘internet of things’, while the technology that facilitates
this connectivity is most commonly called ‘Machine-to-Machine’ (M2M).
At the first look, it may appear that Machine-to-Machine (M2M) communications and
IoT denote the same thing. In reality, M2M is only a subset of IoT. IoT is a more
encompassing phenomenon because it also includes Human-to-Machine communication
(H2M).
By 2020, there will be 12.5 billion M2M devices globally, up from 1.3 billion devices
today (Hatton 2012). To put this in perspective, mobile internet use, which is also fast
becoming a part of our daily experience, is growing at only a fraction of the rate of
M2M, and the 400 million mobile internet users of 2007 are predicted to grow to two
billion users by 2015 (richmond 2011).
Radio Frequency Identification (RFID), Location-Based Services (LBS), Lab-on-a-
Chip (LOC), sensors, Augmented Reality (AR), robotics and vehicle telematics, which
are some of the technology innovations that employ both M2M and H2M
communications.
M2M communication is the communication among the physical things which do not
need human intervention.
M2M communication is a form of data communication that involves one or more
entities that do not necessarily require human interaction or intervention in the process
of communication. M2M is also named as Machine Type Communication (MTC) in
3GPP.
M2M communication could be carried over mobile networks (e.g. GSM-GPRS, CDMA
EVDO networks). In the M2M communication, the role of mobile network is largely
confined to serve as a transport network.
Key features of M2M
Some of the key features of M2M communication system are given below :
1. Low mobility : M2M devices do not move and if moves only within a certain
area.
2. Time controlled : Data can be send or receive only at certain pre - defined time
periods.
3. Time tolerant : Sometimes data transfer can be delayed.
4. Packet switched : Network operator to provide packet switched service.
5. Online small data transmissions : Devices frequently send or receive small
amounts of data.
6. Low power consumption : To improve the ability of the system to efficiently
service M2M applications.
7. Location specific trigger : Intending to trigger M2Mdevice in a particular area e.g.
wake up the device.
M2M solutions allow end-users to capture data about events from assets, such as
temperature or inventory levels. Typically, M2M is deployed to achieve productivity
gains, reduce costs and increase safety or security. M2M has been applied in many
different scenarios, including the remote monitoring and control of enterprise assets or
to provide connectivity of remote machine-type devices.
2.1.1 Architecture and Components of M2M
2. M2M area network : A M2M area network provides connectivity between M2M
devices and M2M gateways. Examples of M2M area betworks include : Personal
area network technologies such as IEEE 802.15, SRD, UWB, Zigbee, Bluetooth,
etc or local networks such as PLC, M-BUS, Wireless M-BUS.
3. M2M gateways : Equipments using M2M capabilities to ensure M2M devices
interworking and interconnection to the network and application domain. The
M2M gateway may also run M2M applications.
4. M2M applications server : Applications that run the service logic and use service
capabilities accessible via open interfaces.
5. M2M application : The application component of the solution is a realization of the
highly specific monitor and control process. The application is further integrated
into the overall business process system of the enterprise.
Fig. 2.1.2 shows generic M2M solution.
As per projections by Ericssion, Indian M2M market may rise from 30 Million in 2013
to more than 250 million in 2020. Automotive (connected vehicles) is having a market
share of 45 % and Energy (smart meters) 23 %.
Other applications are Point of sale (POS), health care, security and surveillance,
intelligent buildings, smart homes etc. M2M applications will make the living smart
and improve the quality of life.
2.1.3 Comparison of M2M and IoT
Global value chains : A value chain describes the full range of activities that firms
and workers perform to bring a product from its conception to end use and beyond,
including design, production, marketing, distribution, and support to the final
consumer.
Fig. 2.2.1 shows simplified value chain. It consists of five separate activities that work
together to create a finalized product.
It is important to identify the type of companies involved in the industry and their key
characteristics : Global or domestic; state-owned or private; large, medium or small;
etc. Identifying the firms that participate in the chain will help to understand its
governance structure.
International production processes have become characterized by inter-firm networks
that span borders. We call these networks global value chains.
Fig. 2.2.2 shows fruit and vegetables global value chain.
What is a global value chain ?
The value chain describes the full range of activities that firms and workers perform to
bring a product from its conception to end use and beyond. This includes activities such
as design, production, marketing, distribution and support to the final consumer. In the
context of globalization, the activities that constitute a value chain have generally been
carried out in inter-firm networks on a global scale. By focusing on the sequences of
tangible and intangible value-adding activities, from conception and production to end
use, GVC analysis provides a holistic view of global industries.
Fig. 2.2.3
There are four basic dimensions that GVC methodology explores :
1) An input-output structure, which describes the process of transforming raw
materials into final products;
2) A geographical consideration;
3) A governance structure, which explains how the value chain controlled; and
4) An institutional context in which the industry value chain is embedded.
GVCs have several attributes, one of them being governance.
Governance analysis allows one to understand how a chain is controlled and
coordinated when certain actors in the chain have more power than others. Gereffi
defines governance as ‘authority and power relationships that determine how financial,
material and human resources are allocated and flow within a chain.
In GVC the most value creation is often found in :
1. Upstream activities such as design, product development, R&D and
manufacturing of key parts and components;
2. Downstream activities such as marketing, branding and customer service.
Ecosystems vs. value chains
The concept of the business ecosystem was introduced by James F. Moore in 1993 with
the description :
An economic community supported by a foundation of interacting organizations and
individuals, the organisms of the business world. This economic community produces
goods and services of value to customers, who are themselves members of the
ecosystem. The member organizations also include suppliers, lead producers,
competitors and other stakeholders. Over time, they co-evolve their capabilities and
roles and tend to align themselves with the directions set by one or more central
companies. Those companies holding leadership roles may change over time, but the
function of ecosystem leader is valued by the community because it enables members to
move toward shared visions to align their investments and to find mutually supportive
roles.
Business ecosystem is a dynamic structure of interconnected organization that depends
on each other from mutual survival.
Value chain is associated with the creation of valueit is the instantiation of exchange by
a certain set of companies within an ecosystem.
The “value chain” has been a basic business concept for many years. Each link in the
chain “adds value” in a somewhat linear progression from raw materials to finished
products or services. It is a useful concept for identifying key elements in the route to
market for new product ideas and for highlighting where new profits can be made.
Fig. 2.3.1 shows M2M value creation chain.
Inputs : It is raw material which converted into product. For example : Information is
converted into required data. Coal mined for making domestic steel.
Production or manufacture : It processes the raw inputs which becomes a part of a
value chain. Data from an M2M solution, meanwhile, needs to be verified and tagged
for provenance.
Required data is collected from publicly available resources and take from other
company data. An information marketplace is available in world for getting data.
It should be noted that such a marketplace could still be internal to a company or
strictly protected between the value chains of several companies.
Open APIs allow for the knowledge contained within different technical systems to
become unembedded, creating the possibility for many different economic entities to
combine and share their data as long as they have a well-defined interface and
description of how the data is formatted.
Fig. 2.4.1 shows an Information-Driven Value Chain for IoT.
M2M value chain IoT value chain Description
Input Sensors Similar to M2M device solution.
Open data Provided by government and city
organizations.
Operational support Used increasingly in tightly closed
systems / business information marketplaces.
support systems
Corporate database Contains various database like supply
chain management, payroll, accounting etc.
Production Asset Information It store information like temperature over
time of container during transit or air
quality during a particular month.
Open data sets It may include maps, rail timetables or
demographics about a certain area.
Network information Contains GPS data, services accessed via
the mobile network.
Corporate information Current state of demand for a particular
product in the supply chain at a particular
moment in time.
Processing Data combination Data is mixed together from various
sources.
Packaging Information components Packaging section of the information value
chain creates information components.
Distribution and Information product Company may have market information
marketing about a certain area of town.
From a value perspective, value will be appropriated by each layer of the IoT model :
Device, connectivity, applications, platforms and services. Devices and connectivity are
viewed as commodities with consequently low value appropriation whereas in
applications, platforms and services is where the value lies because that’s where the
‘brains’ of the operation resides as opposed to the connected limbs and veins that
represent devices and connectivity.
devices that comprise it, can monitor, collect, exchange, analyze and instantly act on
information to intelligently change their behavior or their environment -- all without
human intervention.
Fig. 2.5.1 shows relation between industrial IoT and IoT
The industrial IoT connects critical machines and sensors in high-stakes industries such
as aerospace and defense, healthcare and energy. These are systems in which failure
often results in life-threatening or other emergency situations.
The industrial IoT as the infrastructure that must be built before IoT applications can be
developed. In other words, the IoT, to some extent, depends on the Industrial IoT.
2.5.1 Information-Driven Global Value Chain
Organization and others are play an important role. They are as follows :
1. Inputs : Sensors, RFID, other devices and end-users.
2. Data factories
3. Service providers/data wholesalers
4. Intermediaries
5. Resellers
Fig. 2.5.2 shows the information-driven global value chain.
Information-driven global commodity chain (I - GVC) uses two main input. They are
sensors and end users.
These two inputs supply small amount of data to I-GVC. These data is aggregated,
analyzed, repackaged and exchanged between the different economic think-tankers that
form the value chain.
Sensor devices and networks, RFIDs, mobile and consumer devices, Wi-Fi hotspots and
end-users all form part of a network of “subcontractors” in the value chain, all
contributing to the increased value of the information products.
Sensors may send data to custom gateway devices and then push to the cloud over
GSM or WiFi. In such situations, cloud services push the outcome to a mobile device to
update the user on the real-time activities.
Smart phones have also been developed that allow mobile devices to interact with
sensors and RFID.
End user is one of inputs to I-GVC. In the digital economy, however, more than
4 billion individuals are now connected via mobile devices, which will soon have
access to cloud computing capabilities.
Individuals, sensors and a multitude of devices are able to transmit data about their
environments to computing facilities that can then process it into information.
End users them-selves now play a large role in the emerging industrial structure of the
communications industries, the value chain would not exist without the contribution of
their data.
More importantly, perhaps, data is a unique commodity, it is not consumed in the
process of producing a product. Steel, for example is used up and consumed in the
process of creating a car. Its value can therefore be viewed in terms of its purchase cost
and the value an end user receives from the steel used to build a car.
Data, in contrast to traditional commodities, has a value not just in exchange and in its
use, but also in its reuse. It is possible to re-form data into many different information
products and to resell it many times over.
The raw inputs may, however, be reused again and again in order to develop new
products and extend existing ones.
Production processes of the information-driven global value chain
Data factories :
Data factory has a few key entities that work together to define input and output data,
processing events and the schedule and resources required to execute the desired data
flow. It produce data in digital forms for use in other parts of the I-GVC.
Data factory is a cloud-based data integration service that automates the movement and
transformation of data. You can create data integration solutions using the data factory
service.
Data factories are those entities that produce data in digital forms for use in other parts
of the I-GVC.
Some organization and company collects various information from the field and
prepare the map for purchase. Such data factories would create paper-based pro-ducts
and sell them to end-users via retailers. But in the digital era, these companies now also
provide this data via digital format.
Service providers and data wholesalers are collect data from various sources
worldwide. This massive database is used to improve their own information product or
sell information products in various forms.
Twitter, facebook, google are example of this type of company.
Facebook requires massive storage infrastructure to house its enormous stockpile of
photos, which grows steadily as users add hundreds of millions of new photos every
day and as it expands its platform capabilities to support video.
With facebook eclipsing 900 million users and twitter closing in on 150 million, owned
and earned media are now richer sources of data that include new data types that
weren’t available to marketers in the past, specifically those types that involve user
behaviors, intentions and affinities.
In exchange for freely distributing a sharing widget, companies like share this target
users by tracking users’ sharing activity through the network of websites that have the
widget installed. They collect data about what users like, read, share, save and more.
This data is then augmented with additional targeting data and sold at a premium.
Intermediaries
There is a need for intermediaries that handle several aspects of the production of
information products. There are many privacy and regional issues associated with the
collection of personal information.
Transaction cost is reduced by using intermediaries with the establishment of a market
for many different companies to participate in.
Resellers
Reseller’s collects information from various sources, combine it together, analyze it and
sell it to end user or other organization.
Among the most common value-added resellers are computer retailers and service
companies, automobile dealerships and furniture stores. Value-added resellers are
businesses that sell products manufactured by other companies in addition to selling
their own supplemental products and services, thereby increasing the value of the resold
product purchased by the consumer.
The data and tools available today can give you the insight you need to improve
marketing and advertising performance.
Globalization has given rise to a new era of international competition that is best
understood by looking at the global organization of industries and the ways in which
countries rise and fall within these industries.
Fig. 2.6.1 shows data collection map : An example of how data is collected with just
15 minutes of a web surfing session. Browse the web normally. As you does, the graph
in this popup will change and the icon in the toolbar will animate.
Each circle in the graph represents a site that’s been sent some of your personal
information. Circles with a halo are sites you’ve visited. Circles without a halo are sites
you haven’t.
Through being able to collect and analyze data without being restricted by the same
level of privacy regulation as in Europe, for example, they are able to create a much
better information product. Companies in Europe, Asia and other parts of the globe are
therefore dependent on these companies in order to gain the most appropriate
knowledge for their companies’ needs.
The Internet of things domain will encompass an extremely wide range of technologies,
from stateless to stateful, from extremely constrained to unconstrained, from hard real
time to soft real time.
So single reference architecture cannot be used as a blueprint for all possible concrete
implementations. While a reference model can probably be identified, it is likely that
several reference architectures will co-exist in the Internet of things.
Architecture in this context is defined as a framework for the specification of a
network's physical components and their functional organization and configuration, its
operational principles and procedures, as well as data formats used in its operation.
For example, the RFID tag based identification architecture may be quite different from
a sensor-based architecture, which is more comparable to the current Internet. There
will also be several types of communications models such as : Thing to application
server, thing to human or thing to thing communication.
2.7.1 Building Architecture
Fig. 2.7.1 shows how to build a system solution from reference architecture.
Architecture contains information about main conceptual elements, the actual elements
of a target system and the relation between them. It also includes principles for the
design of the architecture.
A conceptual element refers to an intended function, a piece of data or a service. An
actual element refers to a technology building block or a protocol.
The reference architecture is related to the generalized model. It contains set of
elements and relations that are of relevance to the domain IoT.
Reference architecture can be used to select the best delivery method for particular
technologies within an IT service catalog. A reference model is an abstract framework
for understanding significant relationships among the entities of some environment.
Reference architecture is used to design applied architecture.
Reference architecture tries to show the most complete picture of what is involved in
realizing the modeled entities. It is possible to define reference architectures at many
levels of detail or abstraction and for many different purposes.
Fig. 2.7.2 shows problem and solution domain partitioning.
IoT-A technical objective was to create the architectural foundations of the future
Internet of things, allowing seamless integration of heterogeneous IoT technologies into
a coherent architecture and their federation with other systems of the future Internet.
In this context an architectural reference model for the interoperability of IoT systems
was introduced. The project also focused on other technological issues, such as
scalability, mobility, management, reliability, security and privacy.
In the SENSEI project the focus has been drawn on the realization of ambient
intelligence in a future network and service environment. In this environment,
heterogeneous Wireless Sensor and Actuator Networks (WSAN) are integrated into a
common framework of global scale and make it available to services and applications
via universal service interfaces.
IoT-A architectural reference model
European Commission within the Seventh Framework Program (FP7) has supported
the proposed project; IoT-A by Martin Bauer and et.al. The recommended reference
architecture provided high-level architectural views and perspectives for constructing
IoT systems.
Views : Different angles for viewing an architecture that can be used when designing
and implementing it.
There are different approached adapted by the industry and standardization bodies
towards defining an acceptable reference architecture.
The European project SENSEI has undertaken one such initiative towards integrating
the physical world with the digital world of the future internet. The objective is to
develop an architecture and technology building blocks to achieve the integration of the
two realms - Physical and Digital.
The approach followed by ETSI is to define the M2M service requirements based on a
set of M2M use cases and then to specify the architecture along with the associated
system interfaces.
Finally, the approach followed by IOT-A is based on Architecture Reference Model
(ARM). The vision of IoT-A is to establish, via the ARM, a means to achieve a high
degree of interoperability between different IoT solutions at the different system levels
of communication, service and information.
The main goal of SENSEI is to integrate the physical with the digital world of the
network of the future.
Behind the concept of SENSEI is the idea of sensors, actuators and efficiently
networked nodes deployed everywhere and interconnected. They are accessible and
manageable through a global and pluggable sensor and actuator networking framework.
It allow the connection of present and future networks, via the network support
interface.
The architecture relies on the separation of resources providing sensing and actuation
from the actual devices, a set of contextual and real world entity-centric ser-vices and
the users of the services.
IoT-A refers to as the Architectural Reference Model (ARM). The vision of IoT-A
is, via the ARM, to establish a means to achieve a high degree of interoperability
between different IoT solutions at the different system levels of communication, service
and information.
Introducing the IoT-A tree :
1. A generic reference model, derived from Business considerations, application-
based requirements and current technologies,
2. Able to generate different reference architectures depending on domain-specific
requirements.
3. To be used as a blueprint for concrete architecture design.
Reference model : A reference model is an abstract framework for understanding
significant relationships among the entities of some environment. It enables the
development of specific reference architectures. A Reference Model consists of a
minimal set of unifying concepts, axioms and relationships
Reference architecture : A reference architecture is an architectural design pattern that
indicates how an abstract set of relationships realizes a set of requirements. The main
purpose of a RA is to provide guidance for the development of concrete architectures.
More reference architectures may be derived from a common reference model.
1. The overall design objective of IoT architecture shall be to target a horizontal system of
real-world services that are open, service-oriented, secure and offer trust.
2. Design for reuse of deployed IoT resources across application domains.
3. Design for a set of support services that provide open service-oriented capabilities and
can be used for application development and execution.
4. Design for different abstraction levels that hide underlying complexities and
heterogeneities.
5. Design for sensing and actors taking on different roles of providing and using services
across different business domains and value chains.
6. Design for ensuring trust, security and privacy.
7. Design for scalability, performance and effectiveness.
8. Design for evolvability, heterogeneity and simplicity of integration
9. Design for simplicity of management.
10. Design for different service delivery models.
11. Design for lifecycle support.
3. Data and service processing can be topologically distributed. Sensor nodes in the
WSAN (Wireless Sensor and Actor Networks) can handle the basic data
processing while further processing and aggregation can take place higher up in
the network topology.
Chapter - 3
IOT REFERENCE ARCHITECTURE
Syllabus : IoT Architecture -State of the Art – Introduction, State of the art,
Architecture Reference Model- Introduction, Reference Model and
architecture, IoT reference Model, IoT Reference Architecture-
Introduction, Functional View, Information View, Deployment and
Operational View, Other Relevant architectural views.
Several Reference Architectures and Models exist both for M2M and IoT systems.
The use of standards
1. Ensures interoperable and cost-effective solutions
2. Opens up opportunities in new areas
3. Allows the market to reach its full potential
The more things are connected, the greater the security risk. So security standards are
also needed to protect the individuals, businesses and governments which will use the
IoT.
3.1.1 European Telecommunications Standards Institute M2M/oneM2M
Each M2M domain has its own service capabilities layer (i.e. Network SCL, Gateway
SCL, and Device SCL), which provides functions that are exposed on the mIa, dIa,
mId, and mIm reference point.
Fig. 3.1.3 shows ETSI M2M service capabilities.
Note : x in each of the below stands for either N for network, G for gateway, or D for device.
The ITU-T IoT domain model includes a set of physical devices that connect directly or
through gateway devices to a communication network that allows them to exchange
information with other devices, services, and applications.
Advantages :
1. It provides a language for everyone involved.
2. It provides an abstract but also rich view of the domain.
3. It can assist IoT project leaders in planning the work at hand and the teams needed.
3.1.3 Open Geospatial Consortium Architecture
Fig. 3.1.6
The SWE framework can be understood as an architecture consisting of a set of
standards defining data formats as well as (web) service interfaces. During the
development of the SWE framework, several aims had to be taken into account.
Especially the following goals were the drivers of the design of the SWE architecture :
6. Sensor Alert Service (SAS) : Standard web service interface for publishing and
subscribing to alerts from sensors.
7. Web Notification Services (WNS) : Standard web service interface for
asynchronous delivery of messages or alerts from SAS and SPS web services and
other elements of service workflows.
3.1.4 The International Telecommunication Union’s Telecommunication
Standardization
The model is divided into four layers : application, service support and application
support, network, and device. The model addresses required management capabilities
and security capabilities for each layer.
Security is divided into generic and specific security capabilities. Specific capabilities
are bound to application requirements; generic capabilities are application independent
and defined for each layer.
Authorization and authentication are defined capabilities at the application, network
and device layers.
The application layer adds application data confidentiality and integrity protection,
privacy protection, security audit and anti-virus capabilities.
The network layer adds use data as well as signalling data confidentiality and signalling
integrity protection.
The device layer adds device integrity validation, access control, data confidentiality
and integrity protection capabilities.
An Architecture Reference Model (ARM) is divided into two main parts : a Reference
model and a Reference Architecture.
Reference model : A division of functionality into elements together with the data flow
among those elements
Reference architecture : A reference model mapped onto software elements that
implements the functionality defined in the reference model.
Typically, generic reference architectures provide architecture team with an outline of
their organization-specific reference architecture that will be customized for a specific
organization.
The foundation of an IoT Reference Architecture description is an IoT reference model.
A reference model describes the domain using a number of sub-models. Fig. 3.2.1
shows IoT Reference Model.
Fig. 3.2.2 : IoT architecture model is related to the IoT reference architecture
A domain model defines the main concepts of a specific area of interest. These
concepts are expected to remain unchanged over the course of time, even if the details
of an ARM may undergo continuous transformation or evolution over time.
The domain model captures the basic attributes of the main concepts and the
relationship between these concepts.
Model notation and semantics
Unified Modeling Language (UML) Class diagram is used to shows the relationships
between the main concepts of the IoT domain model.
UML is a diagramming language. It is a modeling language for visualizing, specifying,
constructing and documenting the artifacts of software systems.
Each class is a descriptor of a set of objects that have similar structure, behavior, and
relationships. A class contains a name and a set of attributes and operations.
Main Concept :
The IoT is a support infrastructure for enabling objects and places in the physical world
to have a corresponding representation in the digital world.
Fig. 3.3.1 shows mapping concept of physical world to virtual world.
As interaction with the physical world is the key for the IoT; it needs to be captured in
the domain model (DM). The DM defines the main concepts of the Internet of Things
and the relations between these concepts.
User and a Physical Entity are two concepts that belong to the domain model. A User
can be a Human User, and the interaction can be physical.
The physical interaction is the result of the intention of the human to achieve a certain
goal. Fig. 3.3.2 shows IoT domain model.
devices include the necessary conversion of analog electrical signals into digital
signals.
2) Actuators : These devices that involve a transducer that converts electrical signals
to a change in a physical property.
3) Tags : Tags in general identify the Physical Entity that they are attached to.
3.3.2 Information Model
The functional model (FM) is derived from internal and external requirements.
Functional view is derived from the Functional Model in conjunction with high-level
requirements.
IoT Functional model identifies Functional Groups (FGs) that is, groups of
functionalities, grounded in key concepts of the IoT Domain Model.
Functional Model is an abstract framework for understanding the main Functionality
Groups (FG) and their interactions. This framework defines the common semantics of
the main functionalities and will be used for the development of IoT-A compliant
Functional Views.
The Functional Model is not directly tied to a certain technology, application domain,
or implementation. It does not explain what the different Functional Components are
that make up a certain Functionality Group.
Fig. 3.3.5 shows IoT functional model.
The Application, Virtual Entity, IoT Service, and Device FGs are generated by starting
from the User, Virtual Entity, Resource, Service, and Device classes from the IoT
Domain Model.
Device functional group contains all the possible functionality hosted by the physical
devices. Device functionality includes sensing, actuation, processing, storage, and
identification components, the sophistication of which depends on the device
capabilities.
Communication functional group support all the communication used by devices. It
uses wired and wireless technology.
IoT Service functional group : Support functions such as directory services, which
allow discovery of Services and resolution to Resources.
Virtual Entity functional group : it is related to the Virtual Entity class in the IoT
Domain Model. Associations between Virtual Entities can be static or dynamic
depending on the mobility of the Physical Entities related to the corresponding Virtual
Entities.
IoT Service Organization functional group : to host all functional components that
support the composition and orchestration of IoT and Virtual Entity services.
Finally, the “Management” transversal FG is required for the management of and/or
interaction between the functionality groups.
The IoT Process Management FG relates to the conceptual integration of (business)
process management systems with the IoT ARM.
The Service Organisation FG is a central Functionality Group that acts as a
communication hub between several other Functionality Groups.
The Virtual Entity and IoT Service FGs include functions that relate to interactions on
the Virtual Entity and IoT Service abstraction levels, respectively.
The Virtual Entity FG contains functions for interacting with the IoT System on the
basis of VEs, as well as functionalities for discovering and looking up Services that can
provide information about VEs, or which allow the interaction with VEs.
Communication FG provides a simple interface for instantiating and for managing high
-level information flow. It can be customized according to the different requirements
defined in the Unified Requirements list.
The Management FG combines all functionalities that are needed to govern an IoT
system. The need for management can be traced back to at least four high-level system
goals : Cost reduction; Attending unexpected usage issues; Fault handling and
Flexibility.
The Security Functionality Group is responsible for ensuring the security and privacy of
IoT-A-compliant systems. It is in charge of handling the initial registration of a client to
the system in a secure manner. This ensures that only legitimate clients may access
services provided by the IoT infrastructure.
3.3.4 Communication Model
IoT enables a constant transfer and sharing of data among things and users. In such a
sharing environment, authentication, authorization, access control and non-repudiation
are important to ensure secure communication.
The high level of heterogeneity, coupled to the wide scale of IoT systems, is expected
to magnify security threats of the current Internet. The high number of inter-connected
devices arises scalability issues.
IoT systems integrate in a seamless way physical objects, data, and computing devices
into a global network of information about “smart things”.
Fig. 3.3.8 shows high level security challenges of IoT.
Access control refers to the permissions in the usage of resources, assigned to different
actors of a wide IoT network.
System safety is highly application- or application domain-specific. Trust Model that
provides data integrity and confidentiality, and endpoint authentication and non-
repudiation between any two system-entities that interact with each other.
The trust requirements in IoT are related to identify management and access control
issues. The IoT-A Privacy Model depends on the following functional components :
Identity Management, Authentication, Authorization, and Trust and Reputation.
Communication security : IoT systems are heterogeneous. Not only because of the
variety of the entities involved, but also because they include Devices with various
capabilities in terms of communication and processing.
Communication Security Model must not only consider the hetereogenity of the system,
but it also should guarantee a balance between security features, bandwidth, power
supply and processing capabilities.
IoT devices face many threats, including malicious data that can be sent over
authenticated connections, exploiting vulnerabilities. Such attacks frequently exploit
many weaknesses, including but not limited to :
a) failure to use code signature verification and secure boot and
b) poorly implemented verification models which can be bypassed.
Attackers often use those weaknesses to install backdoors, sniffers, data collection
software, file transfer capabilities to extract sensitive information from the system, and
sometimes even command and control (CandC) infrastructure to manipulate system
behavior.
IoT Reference Architecture to describe essential building blocks and identify design
choices to deal with conflicting requirements.
The IoT Reference Model provides the highest abstraction level for the definition of the
IoT-A Architectural Reference Model. It promotes a common understanding of the IoT
domain.
The description of the IoT Ref-erence Model includes a general discourse on the IoT
domain, an IoT Domain Model as a top-level description, an IoT Infor-mation Model
explaining how IoT infor-mation is going to be modelled, and an IoT Communication
Model in order to under-stand specifics about communication between many
heterogeneous IoT devices and the Internet as a whole.
3.4.1 Introduction
The viewpoints used for constructing the IoT Functional View are hence :
1) The Unified Requirements;
2) The IoT Functional Model
Once all Functional Components are defined, the default function set, system use cases,
sequence charts and interface definitions are made.
Device and Application functional group : Device functional components contains
the sensing, actuation tag, processing and storage components. Application functional
group contains standalone application.
Communication functional group : it contains the components for end-to-end
communication, network communication, and Hop-by-Hop communication.
Communication Description
type
End-to-End 1) Responsible for end-to-end transport of application layer
Communication FC messages through diverse network and MAC/physical layers
2) Used with mesh radio networking technologies such as IEEE
802.15.4
3) The End-to-End FC interfaces the Network FC on the
“southbound” direction.
Hop-by-hop FC 1) Responsible for transmission and reception of physical and
MAC layer frames to/from other devices.
2) Two interfaces used : one “southbound” to/from the actual
radio on the device, and another for “northbound” to/from the
Network FC in the Communication FG.
Network FC 1) Responsible for message routing and forwarding and the
necessary translations of various identifiers and addresses.
2) Network FC interfaces the End-to-End Communication FC on
the “northbound” direction and the Hop-by-Hop
Communication FC on the “southbound” direction.
IoT Service functional group : it consists of IoT Service FC and the IoT Service
Resolution FC. Various service implementations are covered in service FC and service
resolution FC contains the necessary functions to realize a directory of IoT Services
that allows dynamic management of IoT service descriptions.
Virtual Entity functional group : The Virtual Entity FG contains functions that
support the interactions between Users and Physical Things through Virtual Entity
services.
2) The Fault FC is used to identify, isolate, correct and log faults that occur in the IoT
system.
3) The Member FC is responsible for the management of the membership of any
relevant entity
The Reporting FC generates reports about the system and, finally, the State FC can
change or enforce a particular state on the system by issuing a sequence of commands
to the other FCs.
3.4.3 Information View
Information View provides an overview on how static information (i.e., VEs by means
of hierarchies, semantics) and dynamic information (i.e., information processing,
storage, flow) is represented.
The information view also describes the components that handle the information, the
flow of information through the system and the life cycle of information in the system.
One of the main purposes of connected and smart objects in the IoT is the exchange of
information between each other and also with external systems.
Information flow and lifecycle
There are four message exchanges patterns considered for information exchange
between IoT functional components.
1) Push-pattern
2) Request/Response-pattern
3) Subscribe/Notify-pattern
4) Publish/Subscribe-pattern
Fig 3.4.2 shows message exchange pattern.
Fig. 3.4.2
Fig. 3.4.3 shows the information request from a user to an IoT Service and the
corresponding response.
The IoT Service Resolution implements two main inter-faces, one for the CUD of
Service Description objects in the IoT Service Resolution database/store, and one for
lookup/resolution/discovery of IoT Services.
The IoT Service Resolution component offers three methods to find IoT Services :
1) look-up of Service Description based on service identifier;
2) discovery of Service Descriptions based on service specification;
3) resolution of service identifier to service locator.
3.4.4 Deployment and Operational View
Deployment and Operational View depends on the specific actual use case and
requirements. Smart object in the IoT uses different methods for communication using
different technology.
Hence the Deployment and Operation view is very important to address how actual
system can be realized by selecting technologies and making them communicate and
operate in a comprehensive way.
It provides an IoT Reference Model with a set of guidelines to application users. The
different design choices that they have to face while designing the actual
implementation of their services.
The viewpoints used in the Deployment and Operation view are the following :
1) The IoT Domain Model diagram is used as a guideline to describe the specific
application domain.
2) The Functional Model is used as a reference to the system definition.
3) Network connectivity diagrams can be used to plan the connectivity topology to
enable the desired networking capability of the target application; at the
deployment level, the connectivity diagram will be used to define the hierarchies
and the type of the sub-networks composing the complete system network;
4) Device Descriptions can be used to map actual hardware on the service and
resource requirements of the target system.
IoT Reference Architecture ends…
4.1 Introduction
IoT is a wide and rapidly developing area with expected strong and growing
implications for the industry. Numerous IoT research and application projects have
been done by universities or in joint industry-university consortia in recent years.
Internet of things examples extend from smart connected homes to wearables to
healthcare. It is not wrong to suggest that IoT is now becoming part of every aspect of
our lives. Not only internet of things applications are enhancing the comforts of our
lives but also it giving us more control by simplifying routine work life and personal
tasks.
Value creation lies at the core of any business model of an organization and should be a
consistent instrument that enhances the value of your organization’s offering and
encourages your customers’ willingness to pay.
A business that does not create value to maintain relevance in the evolving marketplace
will eventually fail. For this reason, the business model of your organization must be
clearly defined and kept central to the innovation process.
Given the technology barrage hitting organizations, replicating popular frameworks and
consolidating established business models will not suffice.
Management guru Michael Porter stipulates three generic strategies for value creation:
differentiation, cost leadership, and focus.
The users of IoT, including business enterprises, other organizations, and consumers,
could capture up to 90 % of the value IoT applications create.
IoT and other technology types can generate a new revenue stream from its potential to
increase service offerings. Contracts for IoT services typically specify both price
structures and service-level agreements.
For the value proposition it is interesting to look at the revenue model. When a firm
delivers services it wants to get something in return in the form of money which comes
from the revenue model. The way a firm uses the revenue model can convince
customers to stay or choose for the firm.
To define the value of an industrial IoT application or IoT project is difficult. Value can
be generated and may show up as a result of a combination of IoT applications with
other systems or processes, or can originate in new human behavior or new interactions.
Fact is that value is the key element finally asked by the project stakeholders or owners.
IoT functional requirements refer to the requirements related to the IoT actors, these
requirements have been categorized as,
1. Application support requirements
2. Service requirements
3. Communication requirements
4. Device requirements
5. Data management requirements
6. Security and privacy protection requirements.
The IoT application capabilities for industrial application should meet requirements
such as :
1. Reliability: Reliable IoT devices and systems should allow a continuous operation
of industrial processes and perform on-site activities.
2. Robustness. The IoT application and devices should be robust and adapted to the
task and hard working conditions.
3. Simple to use
4. Low maintains cost
5. Support optimal and adaptive set of features
6. It must have reach sensing and data capabilities
7. Industry grade support and services. The IoT applications should be supported
over years in operation by a set of rich tools and continuously updated services
8. Support standardization
9. Security and safety.
The Industrial Internet of Things will be shaped by the appearance of three features:
1. The enhancement of basic mechanical devices through sensors and other data
producing devices (“smartness”);
2. The possibilities of ever faster and more flexible data allocation, transfer and
processing (computing capacities);
3. The ever increasing digital interconnectivity between the engaged devices and
computational capacities (digital integration).
Challenges faced by IoT industry applications
1. Security. As the IoT connects more devices together, it provides more decentralized
entry points for malware. Less expensive devices that are in physically compromised
are more subject to tampering.
2. Trust and Privacy. With remote sensors and monitoring a core use case for the IoT,
there will be heightened sensitivity to controlling access and ownership of data.
3. Complexity : Confusion and integration issues. With multiple platforms, numerous
protocols and large numbers of APIs, IoT systems integration and testing will be a
challenge to say the least. The confusion around evolving standards is almost sure to
slow adoption.
4. Evolving architectures competing standards. With so many players involved with the
IoT, there are bound to be ongoing turf wars as legacy companies seek to protect their
proprietary systems advantages and open systems proponents try to set new standards.
There may be multiple standards that evolve based on different requirements
determined by device class, power requirements, capabilities and uses. This presents
opportunities for platform vendors and open source advocates to contribute and
influence future standards.
5. Concrete use cases and compelling value propositions. Lack of clear use cases or strong
ROI examples will slow down adoption of the IoT. Although technical specifications,
theoretical uses and future concepts may suffice for some early adopters, mainstream
adoption of IoT will require well-grounded, customer-oriented communications and
messaging around “what’s in it for me.”
6. There are several wireless standards which can be used to connect devices to a network,
most are still developing. That means delays as products play catch‐up with new
networking standards.
The Smart Factory will fundamentally change how products are invented, manufactured
and shipped. At the same time it will improve worker safety and protect the
environment by enabling low-emissions and low-incident manufacturing.
Empowered by the Industrial Internet of Things, the factory of tomorrow promises to be
a proactive, self-healing environment with increased responsiveness and ability to meet
consumer demand.
Manufacturing has made huge progress in recent years. Automation levels have
increased in all manufacturing sub-sectors and third party suppliers now have better
vertical skills, geographical coverage and greater scalability. The number of products
and product variants has exploded. Globalized capability has become the foundation of
cost reduction.
Fig. 4.2.1 shows smart factory concept.
Fig. 4.2.2 : Relation between humans and factories in the past and in the future
Design Implications for Smart Manufacturing Products
1. Low - cost variability : The software in smart, connected products can make variability
far cheaper.
2. Evergreen Design : Continually upgrading of existing products.
The Augmented Operator
The utilization of the smart product, equipment and infrastructure will lead to a huge
amount of available data.
The human will need to access situation dependent filter mechanisms in order to decode
the data noise.
Context information such as the task, the role or the intention of the human as well as
the location, product status or costumer information can help to identify the situation
and to configure the filter mechanisms.
Security :
In the factory of the future, any physical space connected to cyber space is exposed to
the potential threat of a cyber-attack, in addition to concerns regarding its physical
security.
To prevent such attacks, which may result in damage and liabilities, security measures
are becoming increasingly important for the factory of the future.
Typically, cyber security protection is defined as following the path of confidentiality,
integrity and availability which still applies for information system networks. However,
factory of the future systems which integrate both physical space and cyber space
require a protection priority that follows the path of availability, integrity and
confidentiality.
A developer of IoT technology has to take various technical requirements into account
such as energy, communication bandwidth, communication topology or processing
resources of different IoT systems.
Loosely coupled, document-based Web services provide a well-defined path to
configuration and measurement data from wireless ad hoc systems and automation
systems, however, have the disadvantage of a very high runtime overhead.
1. Standardized ways must be found to obtain comparable quality data sets with
opportunistic, distributed measurements.
2. Live data acquisition, needs a high throughput of data to ensure that, while energy
efficiency of the hardware, requires a high efficiency of bandwidth usage.
Cost-effective Process Integration of IoT Devices
IoT enabled processes needs to be cost-effective by design and well integrated. Global
interoperability in contrast to global connectivity and the use of mobile devices can
enable the user to access IoT services ad-hoc.
Fig. 4.4.1
The sensor or actuator gives the smart object the ability to interact with the physical
world. The microprocessor enables the smart object to transform the data captured from
the sensors at a limited speed and at limited complexity.
The communication device enables the smart object to communicate its sensor readings
to the outside world and receive input from other smart objects. The power source
provides the electrical energy for the smart object to do its work.
For smart objects, size matters. They are significantly smaller than both laptops and cell
phones. For smart objects to be embedded in everyday objects, their physical size
cannot exceed a few cubic centimeters.
Wireless sensor networks have evolved from the idea that small wireless sensors can be
used to collect information from the physical environment in a large number of
situations ranging from wild fire tracking and animal observation to agriculture
management and industrial monitoring.
Each sensor wirelessly transmits information toward a base station. Sensors help each
other to relay the information to the base station.
The ISO/IEC JTC1/WG7 Working Group on Sensor Networks has designed reference
architecture Fig. 4.4. 2, which separates the sensor node functionality into three layers :
1. Communication layer : Describes the communication protocol for the interaction
of a smart object with other smart objects, an infrastructure or backbone networks.
2. Service layer : Represents a set of functions commonly required, such as sensor
information gathering, filtering by various policies and rules, data comparison and
analysis, data mining, context mod-ling, context-aware processing, self-
localization, context-aware decision and estimation.
3. Application layer : Realizes the use case of a smart object by a set of functions to
users to meet defined requirements.
The communication layer is responsible for low-level communication issues, such as
device discovery, topology construction, connection establishment, and data transfer.
The application layer supports programmers in implementing context-aware services.
Generally, context-aware applications have four parts :
1. Basic application behavior, i.e., functionality that does not depend on context
changes,
2. Adaptive application behavior, which describes how an application reacts to
changing situational context,
3. Section that specifies how to derive context from local and remote sensor readings,
and
Every business has unique global trade management issues. These issues are based on
factors such as the geographic locations of where products are sourced, manufactured,
and shipped; the volumes that are being imported and exported; the compliance and
security regulations of each destination country; the multitude of free trade agreements
and foreign trade zones; the number of trade and manufacturing partners involved in the
supply chain; and the level of in-house trade expertise available. In addition, an
organization’s needs may change from year-to year and from location-to-location.
In recent years, the internet has transformed communications, the media landscape,
commerce and the music industry.
The Internet of Things is the next generation of the internet. It is a global system of
interconnected computer networks, sensors, actuators, and devices that use the internet
protocol to potentially connect every physical object.
Four aspects of the Internet of Things and Services are technology, business
innovation, market and competencies.
Various IoT technologies can be conventionally categorized into tagging things,
sensing things and embedded things. The tagging things provide seamless and cost-
efficient item identification, allowing the things to be connected with their records in
databases.
The sensing things enable us to measure and detect changes in the physical status of our
environment. Finally, the embedded things yield information about the internal status of
the embedding object.
Over the last decade, these technologies have been developed rapidly in the domains of,
the Radio-Frequency Identification (RFID), Machine-to-Machine (M2M)
Communication and Machine-type Communication (MTC), Wireless Sensor and
Actuator Networks (WSAN), ubiquitous computing, and web-of-things.
The IoT field is relatively young, and still dominated by the silos of vertically
integrated solutions based on incompatible technologies, with each having a relatively
limited marked penetration.
However, the adoption of the various IoT technologies is expected to expand rapidly
in the upcoming years, and it will be reflected in the number of connected things,
expected revenues, and annual growth rates.
Connected industry
The Internet of Things in production and logistics is coined with the term “Industrie
4.0” in Germany. The term ‘Industry 4.0’ stands for the fourth industrial revolution.
While Industry 3.0 focused on the automation of single machines and processes,
Industry 4.0 focuses on the end-to-end digitization of all physical assets and integration
into digital ecosystems with value chain partners.
Generating, analyzing and communicating data seamlessly underpins the gains
promised by Industry 4.0, which networks a wide range of new technologies to create
value.
Industry 4.0 digitises and integrates processes vertically across the entire organisation,
from product development and purchasing, through manufacturing, logistics and
service. Fig. 4.5.1 shows Industry 4.0
Serialization is the process of transforming objects or data entities into bytes for
persistence (in memory or on disk) or transportation from one machine to another over
a network.
Serialization engine provides the ability to serialize and deserialize data in a Big Data
platform. In Big Data platforms, serialization is required for establishing
communication between machines by exchanging messages between them, and for
persisting data.
The serialized bytes can either be encoded using a binary format or a plain-text format.
Different serialization engines may provide different levels of speed, extensibility and
interoperability.
Serialized identifiers are the keys to building an Internet of Things; just as unique IP
addresses are integral to the web itself.
Big Data is data which cannot be handled by traditional technologies.
Big data is about the processing and analysis of large data repositories, so
disproportionately large that it is impossible to treat them with the conventional tools of
analytical databases.
Machines generate data at higher speed and their production rates will grow
exponentially with Moore’s Law. Storing this data is cheap, and it can be mined for
valuable information.
Big data requires exceptional technologies to efficiently process large quantities of data
within a tolerable amount of time.
Technologies being applied to big data include Massively Parallel Processing (MPP)
databases, data-mining grids, distributed file systems, distributed databases, cloud
computing platforms, the Internet, and scalable storage systems.
These technologies are linked with many aspects derived from the analysis of natural
phenomena such as climate and seismic data to environments such as health, safety or,
of course, the business environment.
Fig. 4.6.1 shows dimension of big data. Big data is characterized by three “Vs”:
volume, velocity and variety.
Three major models for serialization and track and trace reporting. These include :
1. China Food and Drug Administration (CFDA) serialization requirements, which
use government issued serial numbers that are reported back to a central
government database.
2. The EU’s European Stakeholder Model, which is based on the European
Medicines Verification System (EMVS) where manufacturers upload serialized
information to a central institutional hub for verification.
3. The U.S. model which requires lot traceability shared with each member of the
value chain in 2015, individual saleable package serialization by 2017 and
verification at the point of dispensing by 2023.
Serialization regulations will of course go a long way toward protecting patients from
dangerous counterfeit drugs, and life sciences companies from lost revenues and
potentially brand disrupting recalls.
Significant investments will be required, for example, to make packaging lines capable
of managing serialization.
Serialization will generate massive amounts of data for global companies that will need
to be retained for many years to meet compliance requirements.
This serialized information will need to be readily accessible and highly responsive to
support business processes that require sub-second authentication, and to provide easy
access for regulatory compliance, including investigations and statutory reporting.
We believe serialized data will also provide a rich repository of information for
business value and insight, not only in terms of supply chain integrity but also for
improving responsiveness, insight and financial transparency in areas such as contracts
and charge backs.
The supply chain encompasses all of those activities associated with moving goods
from the raw-materials stage through to the end user.
To remain competitive, companies must seek new solutions to important Supply Chain
Management issues such as modal analysis, supply chain management, load planning,
route planning and distribution network design.
Companies must face corporate challenges that impact Supply Chain Management such
as reengineering globalization and outsourcing.
Supply Chain Management has an important role to play in moving goods more quickly
to their destination.
Product identifiers on a label can serve as a “key” to information about the processes
and conditions through which the product has travelled.
Supply chain management department functions :
1. Inventory management
2. Transportation service procurement
3. Materials handling
4. Inbound transportation
5. Transportation operations management
6. Warehousing management.
Legal information flows
Legal issues around data exchange can be divided into two separate parts :
1. The question of jurisdiction over data,
2. Within that con-text, what party(s) own the data.
For example : In the US , despite a common interest in ensuring efficient oversight and
promoting safe and environmentally friendly products, the FDA has not been active in
developing national standards on transportation and drug packaging.
Finance flows
Every step in the development, clinical trials, manufacturing, distribution and service
delivery of a biologics product involves massive amounts of data.
Extensive industry guidelines and best practices are established for the use of this
information in specific contexts such as quality control or product authentication.
A parallel assessment of data asset values, liabilities and exchange mechanisms for
these data assets is warranted in light of pharmaceutical development, technology
transfer, commercial manufacturing and product discontinuation processes.
The Internet of Things (IoT) is transforming the Retail Industry. There are four broad
IoT application areas within retail
1. Sensors - fitted in refrigeration and lighting equipment can lead to automated
energy usage and provide retailers huge energy savings. This will help retailers
reduce their carbon footprint which will resonate with shoppers, leading to better
loyalty.
2. Leveraging existing CCTV cameras for Video Analytics can trigger real-time
automated alerts that help store associates replenish shelves just in time and serve
customers in need. This not only improves conversion and customer experience,
but also leads to effective labor utilization.
3. Using RFID and IoT sensors, retailers can get better visibility into inventory and
perishables. IoT can enable dynamic re-routing of delivery vans based on weather
forecasts and live traffic updates. All of these result in cost savings and improved
customer satisfaction.
4. Using in-store sensors and video feeds, retailers can analyze and understand
customer hot spots, dwell times and flow patterns improving store layouts and
promotional placements. This will result in a better shopping experience and
higher revenues.
Retailers gain a deeper understanding of the customer’s path to purchase, preferences
and shopping habits, which can be used in a variety of ways to optimize various
customer touch points and build differentiation as well as strong brand perception. Rich
insights gained from deploying sensor-based solutions provide a multitude of options to
improve operations across various retail functions.
Digital technologies such as mobility, big data, NFC, augmented reality, sensors and
cloud computing provide opportunities to redefine retail stores like never before.
The Internet of Things (IoT) is undeniably transforming the way that organizations
communicate and organize everyday businesses and industrial procedures. Its adoption
has proven well suited for sectors that manage a large number of assets and coordinate
complex and distributed processes.
The impact of IoT in the commercial sector results in significant improvements in
efficiency, productivity, profitability, decision-making and effectiveness. IoT is
transforming how products and services are developed and distributed, and how
infrastructures are managed and maintained. It is also redefining the interaction
between people and machines.
IoT represents the convergence of several interdisciplinary domains: networking,
embedded hardware, radio spectrum, mobile computing, communication technologies,
software architectures, sensing technologies, energy efficiency, information
management, and data analytics.
The rapid growth of IoT is driven by four key advances in digital technologies.
1. Minizing cost and miniaturization of ever more powerful microelectronics such as
sensors and actuators, processing units, Field-Programmable Gate Array and
receivers.
2. Fast pace and expansion of wireless connectivity.
3. Expansion of data storage and the processing capacity of computational systems.
4. Advent of innovative software applications and analytics, including advancements
in machine-learning techniques for big data processing.
4.10 eHealth
The World Health Organization [WHO] defines e-Health as : E-health is the transfer of
health resources and health care by electronic means. It encompasses three main areas :
The delivery of health information, for health professionals and health consumers,
through the Internet and telecommunications.
E-health provides a new method for using health resources - such as information,
money, and medicines - and in time should help to improve efficient use of these
resources.
eHealth brings special characteristics. The monitoring device’s environment is a
patient; a living and breathing human being. This changes some of the dynamics of the
situation. Human interaction with the device means batteries could be changed,
problems could be called in to technical support and possibly be resolved over the
phone rather than some type of service call. In most cases, the devices on the patient are
mobile not static with regard to location.
Fig. 4.10.1 shows High Level e-Health ecosystem Architecture.
The development of wireless networks has led to the emergency of a new type of
e-healthcare system, providing expert-based medical treatment remotely on time.
With the e-healthcare system, wearable sensors and portable wireless devices can
automatically monitor individuals' health status and forward them to the hospitals,
doctors and related people.
The system offers great conveniences to both patients and health care providers. For the
patients, the foremost advantage is to reduce the waiting time of diagnosis and medical
treatment, since they can deliver the emergent accident information to their doctors
even if they are far away from the hospital or they don't notice their health condition.
In addition, e-health system causes little interruption to patients' daily activities. For the
health care providers, after receiving the abnormal signals from the patients,
appropriate treatment can be made, which saves medical resources.
Furthermore, without direct contact with medical facilities, medical personnel or other
patients, the patients are unlikely to be infected with other diseases.
However, to ensure the security and privacy of patients' medical records encounters a
lot of challenges :
1. How to achieve the confidentiality and integrity of patients' information,
2. The security of wireless body area network,
3. The privacy and unlink ability of patients' health status,
4. The undeniability and unlinkability of doctors' treatment,
5. The location privacy of patients, the fine-grained access control of patients'
medical record, the mutual authentication between patients and hospitals, etc.
It would be useful to create an up-to-date bibliography on secure e-healthcare systems.
IoT Applications for Value Creations ends …..
Chapter - 5
INTERNET OF THINGS
PRIVACY, SECURITY AND GOVERNANCE
5.1 Introduction
The Internet of Things" (IoT) refers to the capability of everyday devices to connect to
other devices and people through the existing Internet infrastructure.
Devices connect and communicate in many ways. Examples of this are smart phones
that interact with other smart phones, vehicle-to-vehicle communication, connected
video cameras, and connected medical devices.
They are able to communicate with consumers, collect and transmit data to companies,
and compile large amounts of data for third parties.
This increased connectivity raises a myriad of consumer privacy and data security
issues. Government agencies, like the Federal Trade Commission, are concerned with
issues such as data security, mobile privacy, and big data.
The development of the IoT means that companies preserve privacy. Among other
things, this involves adopting privacy and data security best practices, only collecting
consumer information with express consumer consent, and providing consumers with
access to their data
IoT is broad term, which indicates the concept that increasingly pervasive connected
devices will support various applications to enhance the awareness and the capabilities
of users. For example, users will be able to interact with home automation systems to
remotely control the heating or the alarm system.
Governance, security and privacy are probably the most challenging issues in the
Internet of Things.
As per European Union (EU), ‘governance’ refers to the rules, processes and behaviour
that affect the way in which powers are exercised, particularly as regards openness,
participation, accountability, effectiveness and coherence.
These five "principles of good governance" reinforce those of subsidiary and
proportionality. The concept of Governance have been already applied to the Internet
for specific aspects and there are already organizations like IETF, ICANN, RIRs, ISOC,
IEEE, IGF, W3C, which are each responsible and dealing with a specific area.
Size and heterogeneity are the two main components that affect the governance of IoT.
FP7 means 7th Framework Programme for research and technological development. It
will last for seven years from 2007 until 2013. The programme has a total budget of
over € 50 billion.
FP7 is a key tool to respond to Europe's needs in terms of jobs and competitiveness, and
to maintain leadership in the global knowledge economy.
5.3.1 FP7 iCore Access Framework
The iCore cognitive framework is based on the principle that any real world object and
any digital object that is available, accessible, observable or controllable can have a
virtual representation in the “Internet of Things”, which is called Virtual Object (VO).
iCore initiative addresses two key issues in the context of the Internet of Things (IoT),
namely how to abstract the technological heterogeneity that derives from the vast
amounts of heterogeneous objects, while enhancing reliability and how to consider the
views of different stakeholders for ensuring proper application provision, business
integrity and, therefore, maximize exploitation opportunities.
The iCore proposed solution is a cognitive framework comprising three levels of
functionality, reusable for various and diverse applications. The levels under
consideration are Virtual Objects (VOs), Composite Virtual Objects (CVOs) and
functional blocks for representing the stakeholder perspectives.
Virtual objects are cognitive virtual representations of real‐world objects (e.g. sensors,
devices, everyday objects) that hide the underlying technological heterogeneity.
The iCore solutions will be equipped with essential security protocols/functionality,
which span all levels of the framework, and consider the ownership and privacy of data,
as well as controlling the actual access to objects.
A Virtual Object (VO) is the virtual representation of Real-World Objects (RWOs).
RWOs may be either digital objects with Information and Communication
Technologies (ICT) capabilities or non-ICT objects.
ICT objects include objects such as sensors, actuators, smart phones, etc. ICT objects
may have a physical location and may offer various functions such as environmental
condition measurements, location of objects /person, monitoring of places for security
reasons, etc.
The VO registry includes information about VOs that are available in the system. Each
VO is identified by a Uniform Resource Identifier (URI) and contains information on
the association with an ICT object.
5.3.2 IoT@Work Capability Based Access Control System
Resources’ protection requires the resource provider be able to know which client is
accessing what resources for doing what. Information about clients and about their
purposes when accessing a specific resource is critical for a resource provider to grant
or deny the requested operation.
The most common form of access control is based on Access Control Lists (ACLs),
which assign access rights to specific subjects.
Capability-Based Access Control (Cap-BAC) : A capability is a communicable,
unforgeable rights markup, which corresponds to a value that uniquely specifies certain
access rights to objects owned by subjects.
In Cap-BAC, the user needs to show the service provider the authorization certificate
prior to performing corresponding resource request operations.
Fig. 5.3.1 shows traditional ACL-based access control and access control using
capability based messaging.
The new capability token has to be digitally signed by the issuer and includes the
capability token of the issuer.
The resource PDP (Policy Decision Point) is the service in charge of managing resource
access request validation and decision.
5.3.3 GAMBAS Adaptive Middleware
Furthermore, they may integrate data from legacy systems and they may be receiving
data from other systems through existing means. For example, a transport system might
already be collecting information through sensors deployed in a city or in vehicles.
Similarly, it may already have access to geographic data describing the different roads
in the city.
The GAMBAS middleware will enable the development of novel applications and
Internet-based services that utilize context information in order to adapt to the behavior
of the user autonomously.
To do this, the middleware will provide the means to gather context in a generic, yet
resource-efficient manner and it will support the privacy-preserving sharing of the
acquired data.
Thereby, it will apply interoperable data representations which support scalable
processing of data gathered from a large number of connected objects.
In order to make the resulting novel services accessible to the user, the middleware will
also support intent-aware interaction by providing a constant stream of relevant
recommendations for services.
From a security and privacy perspective, the developments in GAMBAS are centered
on a secure distributed architecture in which data acquisition, data storage and at a
processing are tightly controlled by the user.
To store and manage data of services as well as data generated by devices, the
GAMBAS runtime encompasses a data processing component. Internally, the data
processing component itself is structured in three sub-components that (a) Store the
data, (b) Query for data and (c) Discover data.
The GAMBAS middle-ware simplifies the development of smart city applications
focusing on three common tasks, namely efficient data acquisition, secure and privacy-
preserving data distribution as well as interoperable data integration
5.3.4 Governance, Security and Privacy in the Butler Project
The goal of the BUTLER project is the creation of an experimental technical platform
to support the development of the Internet of Things.
BUTLER brought together a consortium of 19 partners, innovative companies, research
and academic institutions, end-user centric service providers and business experts from
eight European countries.
BUTLER focused on five “innovation eco-systems” that are part of most people’s daily
lives :
1) Smart homes and offices;
2) Smart shopping;
3) Smart mobility and transport;
4) Smart healthcare and wellness; and
5) Smart cities.
The BUTLER services are based on state-of-the-art network communication protocols
that enable reliable communication using secured protocols that are adapted to the
limited capacity of the devices that are part of the network.
The researchers involved used context information to develop algorithms to improve
trust, security and privacy that satisfy the needs of both users and infrastructure
providers.
The main achievement of the BUTLER project is the release of an open-platform portal
that provides a map of open technologies that can be used to create Internet of Things
applications.
The platform can also be used to document their interoperability, relationships, and
reference to existing use cases, infrastructures and deployments.
BUTLER provides an authorization server as a security service path distinct from the
application path. The authorization server and the managed resources share bootstrap
security credentials enabling generation of session keys.
The authorization server authenticates user and application for providing the application
with access token and session keys for accessing a specific resource.
BUTLER provides also a threat analysis model that could be used to evaluate the threat
on dedicated use cases and scenarios.
SMARTIE is a secure and smarter cities data management system. The SMARTIE
project works on security, privacy and trust for data exchange between IoT devices and
consumers of their information.
A secure, trusted, but easy to use IoT system for a smart city will benefit the various
stakeholders of a smart city.
The city administration will have it easier to get information from their citizens while
protecting their privacy.
Furthermore, the services offered will be more reliable if quality and trust of the
underlying information is ensured.
Fig. 5.4.1 shows the components of a typical smart city information system.
Privacy and trust are a key prerequisite for citizens to participate in Smart City
activities. A smart city can improve the smart and comfort live of their citizens
enormously.
Enterprises benefit from the securely provided information. They can optimize their
business processes and deal with peak demands introduced by the dynamics of the
smart city. Furthermore, they can offer more tailored solutions for their customers
based on the status of the smart city.
All parties involved in the overall systems such as sensors and actuators, end users, data
owners but also service providers need strong mechanisms for reliability and trust.
The Objectives of SMARTIE are
1) Understanding requirements for data and application security and creating a
policy-enabled framework supporting data sharing across applications.
2) Developing new technologies that establish trust and security in the perception
layer and network layer.
3) Develop new technologies for trusted information creation and secure storage for
the information service layer.
4) Develop new technologies for information retrieval and processing guided by
access control policies in the application layer.
5) Demonstrate the project results in real use cases.
Why risk mitigation is a top priority for smart cities
Due to the large number of connected devices that make up a smart city's digital
infrastructure, enhanced security management for gateway devices, such as Industrial
Control Systems (ICS) and IT Systems (ITS), is critical to prevent data breach or
leakage.
Leakage of sensitive data can lead to a lock-down of critical services.
A smart city framework deals with huge volumes of data that is generated as a result of
communication between various interdependent subsystems and the interactions
between devices and citizens.
Protection of such private and sensitive information, especially citizen data, is of utmost
importance. Further, any incident of data breach or data loss can damage citizens'
perception of security in a smart city.
Other information security concerns include interception of wireless data in transit
between senders and receivers, leakage of confidential information, and viruses in
devices such as sensors.
Cloud-based information services and data storage in smart cities can also be
compromised through hacking and other subversive activities.
An attacker can simultaneously attack on multiple layers :
1) Manipulate the sensor measurements to infiltrate the system with wrong data, e.g.
to cause certain actuations.
2) Attack the sensors and actuators physically to obtain credentials.
3) Attack or impersonate network components to act as a man-in-the-middle.
4) Obtain sensitive data or cause actuation by attacking the sharing platform with
forged or malicious requests
In SMARTIE and in other IoT systems, systems belonging to different owners need to
cooperate. Such a cooperating system can be denoted as a System of Systems (SoS).
Dependability have the following attributes :
1) Availability 2) Reliability
3) Safety 4) Integrity
5) Maintainability
The main aspects of security are confidentiality, integrity and availability for authorized
actions. Confidentiality means absence of unauthorized disclosure of information.
Integrity is the prevention of unauthorized modification or deletion of information.
Fundamental building blocks for realizing and managing SoS are as follows :
1) Autonomy : The ability to make independent choices.
2) Belonging : Happiness found in a secure relationship.
3) Connectivity : The ability of system to link with other systems.
4) Diversity : Distinct elements in a group.
Privacy-preserving sharing of IoT data
The increasing development of IoT is dramatically changing the way people share
information and communicate with their surrounding environment, enabling a constant,
invisible and sometimes unintended data exchange, between things and people.
The main objective of privacy preservation is ensuring that private data remains
protected, while processing or releasing sensitive information.
Privacy in the Internet of Things is the threefold guarantee to the subject for
a) Awareness of privacy risks imposed by smart things and services surrounding the
data subject
b) Individual control over the collection and process-ing of personal information by
the surrounding smart things
c) Awareness and control of subsequent use and dissemination of personal
information by those entities to any entity outside the subject’s personal control
sphere
Fig. 5.5.1 shows an IoT reference model with relevant entities and data flows in a
typical IoT application.
Fig. 5.5.1
The fundamental privacy mechanisms lie in the intelligent data management so that
only the required data is collected. Detecting the redundancy, data is anonymized at the
earliest possible stage and then deleted at the earliest convenience.
5.5.2 SMARTIE Approach
SMARTIE is used for designing and building data centric information sharing platform.
This information is accessed by an information service layer.
An information service layer operates above the heterogeneous network devices and
data sources. SMARTIE is the first EU project that relies on the IoT-ARM.
IoT layer with their responsibility is given below :
IoT Layer Devices and functions Security requirements
Application layer 1) Intelligent transportation 1) Authentication,
2) Smart energy authorization, assurance;
3) Public safety 2) Privacy protection and
4) Utilities policy management;
5) Service providers. 3) Secure computation;
4) Application-specific data
minimization;
5) Discovery of information
sources
Information services 1) In-network data processing 1) Cryptographic data
layer 2) Data aggregation Storage;
3) Cloud computing 2) Protected data management
and handling
Network 1) Networking infrastructure 1) Communication and
2) Network-level protocols connectivity security;
2) Secure sensor/cloud
Interaction;
3) Cross-domain data security
handling
Smart object 1) Sensors for data collection 1) Data format and structures;
2) Actuators 2) Trust anchors and
Attestation;
3) Access control to nodes
4) Lightweight encryption
A smart city uses collaboration and stakeholder engagement to create an aligned vision
and uncover synergies that reduce costs, increase operational efficiencies, improve
safety and quality of life, mitigate environmental impacts, and provide stewardship of
resources for future generations.
Smart transportation should provide a comprehensive holistic approach to the broader
issue of managing an urban environment by sharing and leveraging data to proactively
manage traffic.
Performance measures provide quantified evidence of the consequences of deployed
strategies or technologies as well as identifying traffic bottlenecks and air pollution hot
spots.
Autonomous and connected vehicle technologies is expected to revolutionize traditional
traffic management and operations to further reduce traffic crashes and congestion.
Smart city objectives
1) Use of user smart phones in order to include additional information related to their
travels.
2) Extending traffic control systems with mobile traffic control systems to react fast
on abnormal situations.
3) Improving the management of individual motor car traffic, to reduce travelling
time in the town.
4) Improving the management of the public transportation networks to foster greater
use of sustainable transport modes.
5.5.2.2 Smart Cities in India : An Overview
The government of India is in the process of developing smart cities in India which it
sees as the key to the country's economic and social growth.
The promises of the smart city mission include reduction of carbon footprint, adequate
water and electricity supply, proper sanitation, including solid waste management,
efficient urban mobility and public transport, affordable housing, robust IT connectivity
and digitalization, good governance, citizen participation, security of citizens, health
and education
Objectives
1) Provide basic infrastructure.
2) Quality of life.
Notes
Ans. : IoT data differs from traditional computing. The data can be small in size and frequent
in transmission. The number of devices, or nodes, that are connecting to the network are also
greater in IoT than in traditional PC computing.
Q.3 List the characteristics of the Internet of Things.
Ans. : Advantages :
Ans. : Low power communication technologies are IEEE 802.15.4, Bluetooth, Ultra-wide
bandwidth and RFIS.
Q.6 What do you mean autonomy in IoT ?
Ans. : Cloud computing is a pay-per-use model for enabling available, convenient, on-
demand network access to a shared pool of configurable computing resources that can be
rapidly provisioned and released with minimal management effort or service-provider
interaction. Cloud computing refer to a variety of services available over the Internet that
deliver compute functionality on the service provider's infrastructure. Its environment may
actually be hosted on either a grid or utility computing environment, but that doesn't matter to
a service user.
Q.8 What are the challenges in implementing smart healthcare by using IoT ?
Ans. : Challenges are smarter hospital, data integration, lack of information sharing, bad
health habits, shortness of medical resources.
Q.9 What is smart grid ?
Ans. : A smart grid is an electrical grid that uses modern technology (digital or analog) to
collect and communicate electricity related information of both the suppliers and consumers.
Q.10 What are the factors powering the progression of the IoT within the digital
economy ?
Ans. : Data management is the ability to manage data information flow. With data
management in the management service layer, information can be accessed, integrated and
controlled. Higher layer applications can be shielded from the need to process unnecessary
data and reduce the risk of privacy disclosure of the data source.
Q.12 Define virtual sensor.
Ans. : M2M communication is a form of data communication that involves one or more
entities that do not necessarily require human interaction or intervention in the process of
communication
Q.14 What are the key features of M2M communication ?
Ans. : Some of the key features of M2M communication system are given below :
1. Low Mobility : M2M devices do not move and if moves only within a certain area
2. Time Controlled : Data can be send or receive only at certain pre-defined time periods
3. Time Tolerant : Sometimes data transfer can be delayed
4. Packet Switched : Network operator to provide packet switched service
Q.15 What is M2M device ?
Ans. : A device that runs application(s) using M2M capabilities and network domain
functions. An M2M Device is either connected straight to an Access Network or interfaced to
M2M Gateways via an M2M Area Network
Q.16 What is Global value chains ?
Ans. : A value chain describes the full range of activities that firms and workers perform to
bring a product from its conception to end use and beyond, including design, production,
marketing, distribution, and support to the final consumer
Q.17 What is Industrial Internet of Things ?
Ans. : The Industrial Internet of Things (Industrial IoT) is made up of a multitude of devices
connected by communications software. The resulting systems, and even the individual
devices that comprise it, can monitor, collect, exchange, analyze, and instantly act on
information to intelligently change their behavior or their environment -- all without human
intervention
Q.18 What is Reference model ?
provide guidance for the development of concrete architectures. More reference architectures
may be derived from a common reference model.
Ans. :mIa : M2M application interface : it is used by the Network Applications (NA) to
communicate with the Network Service Capability Layer (NSCL).
Q.22 What is use of dla reference point ?
Ans. : Device application interface : it is used by the Device and Gateway Applications (DA
and GA) to communicate with the local service capabilities, i.e. Device Service Capability
Layer (DSCL) and Gateway Service Capability Layer.
Q.23 What is Open Geospatial Consortium standard ?
Ans. : OGC Standards used to monitor, model and forecast flood, drought and
environmental events. Government agencies can rapidly integrate data from different sensor
networks. External (e.g. agricultural) sensor feeds can be incorporated easily to improve
prediction and decision making.
Q.25 Explain an IoT domain model
Ans. : A domain model defines the main concepts of a specific area of interest. These
concepts are expected to remain unchanged over the course of time, even if the details of an
ARM may undergo continuous transformation or evolution over time. The domain model
captures the basic attributes of the main concepts and the relationship between these concepts.
Ans. : Functional Model is an abstract framework for understanding the main Functionality
Groups (FG) and their interactions. This framework defines the common semantics of the
main functionalities and will be used for the development of IoT-A compliant Functional
Views.
Q.27 What is functional view ?
Ans. : Functional View describes the system’s runtime Functional Components, their
responsibilities, default functions, interfaces and primary interactions. The Functional View
derives from the Functional Model and reflects the developer’s perspectives on the system.
Q.28 What is Request/Response pattern ?
Ans. : 1. Security. As the IoT connects more devices together, it provides more
decentralized entry points for malware. Less expensive devices that are in physically
compromised locales are more subject to tampering.
2. Trust and Privacy. With remote sensors and monitoring a core use case for the IoT, there
will be heightened sensitivity to controlling access and ownership of data.
3. Complexity, confusion and integration issues.
4. Evolving architectures competing standards
Q.31 What is concept of future factory ?
Ans. : Factories of the future are oriented toward ensuring the availability of all relevant
information in real time through the connectivity of all elements participating in the value
chain, as well as providing the ability to deduce the optimal value chain processes from this
data at the demand of the individual customer. The factory of the future will increase global
competitiveness and will require an unprecedented integration of systems across domains,
hierarchy boundaries and life cycle phases
Ans. : The Smart Factory will fundamentally change how products are invented,
manufactured and shipped. At the same time it will improve worker safety and protect the
environment by enabling low-emissions and low-incident manufacturing.
Q.33 What is Brownfield IoT ?
Ans. : Brownfield refers to the implementation of new systems to resolve IT problem areas
while accounting for established systems. Brownfield describes the billions of devices and
legacy software applications performing discrete functions in isolation. Some of these will
require migration strategies to connect with and realize the benefits of IoT
Q.34 Explain smart object.
Ans. : Four aspects of the Internet of Things & Services are technology, business
innovation, market and competencies.
Q.36 Define the term ‘Industry 4.0’.
Ans. : It stands for the fourth industrial revolution and focuses on the end-to-end digitization
of all physical assets and integration into digital ecosystems with value chain partners.
Industry 4.0 digitizes and integrates processes vertically across the entire organization, from
product development and purchasing, through manufacturing, logistics and service.
Q.37 List the dimension of Big data.
Ans. : As per European Union (EU), ‘Governance’ refers to the rules, processes and
behaviour that affect the way in which powers are exercised, particularly as regards openness,
participation, accountability, effectiveness and coherence.
Q.40 Define Cap-BAC.
Ans. : The GAMBAS middleware will enable the development of novel applications and
Internet-based services that utilize context information in order to adapt to the behavior of the
user autonomously. To do this, the middleware will provide the means to gather context in a
generic, yet resource-efficient manner and it will support the privacy-preserving sharing of the
acquired data.
Q.42 What is goal of BUTLER project ?
Ans. : The goal of the BUTLER project is the creation of an experimental technical platform
to support the development of the Internet of Things.
Q.43 Explain BUTLERs five “innovation eco-systems”.
2. Developing new technologies that establish trust and security in the perception layer and
network layer.
3. Develop new technologies for trusted information creation and secure storage for the
information service layer.
4. Demonstrate the project results in real use cases
Q.45 Define SMARTIE.
Ans. : SMARTIE is a secure and smarter cities data management system. The SMARTIE
project works on security, privacy and trust for data exchange between IoT devices and
consumers of their information.
Q.46 Explain objective of smart city.
Q.1 (a) Define IoT. Discuss various application areas of IoT. (Refer section 1.1) [7]
(b) Explain Time for convergence for IoT. (Refer section 1.2) [7]
Q.2 (a) Explain M2M value chains. (Refer section 2.3) [7]
(b) Explain IoT functional view. (Refer section 1.5.2) [7]
OR
(b) Discuss IoT architecture outline with diagram. (Refer section 2.9) [7]
Q.3 (a) Explain IoT value chains. (Refer section 2.4) [7]
(b) Explain ETSI M2M high - level architecture. (Refer section 3.1.1) [7]
OR
Q.3 (a) Discuss IoT domain model notation and semantics. (Refer section 3.3.1) [7]
(b) Explain IoT reference architecture’s deployment and operational view.
(Refer section 3.4.4) [7]
Q.4 (a) What are the requirements that IoT application for industrial application should meet ?
(Refer section 4.2) [7]
(b) What the shopping basket can tell : IoT for retailing industry ? [7]
Ans. : Shopping Basket :
Every supermarkets employ shopping baskets to help customers to select and store the
products. The customers have to drop the products which they wish to purchase and then
proceed to checkout.
S-1
Solved Paper Summer-2017
Smartstore is a concept that describes the principle of automating retail trading platforms
utilizing the Internet of Things (IoT) technology. To automate these processes, RFID
sensors, POS terminals, smart shelves, smart carts, video cameras, Big Data technology
and many other solutions can be used. As a result, retailers gain ample opportunities to
optimize their business processes and improve the quality of service to their customers.
For example, by using RFID tags and specialized software, you can control in real time the
types of goods that were taken off the shelf, which ones were loaded into carts, which ones
were paid at the checkout, etc.
The customers have to drop every product which they wish to purchase into the shopping
cart and then proceed to checkout at the billing counter. The billing process is quite
tedious and highly time consuming and has created the need for shops to employ more
and more human resource in the billing section, and yet waiting time remains
considerably high.
The automated shopping cart system integrates a shopping cart (trolley) with two sets of
barcode scanners placed at 2 different checkpoints, the entry and exit points respectively.
It facilitates the user to self-scan the barcode of the purchased products which he intends
to purchase.
Wrongful entries can be corrected by making use of a keypad that changes the
functionality of the machine from addition of products to removal of products and
activates the other barcode scanner at the opposite end.
Wireless smart-device makes note of all the scanned commodities of the particular trolley;
and is linked with the Supermarket's backend database which contains details of the
products such as cost, available stock.
The scanned products are automatically billed in the wireless smart device for their
purchases, thereby significantly reducing turnaround time and reducing and transmitted
to the Shop's central Billing program. By this mechanism, the time consuming work of
scanning and billing every single product at the cash counter can be avoided. Users can
then make use of the counter to pack and pay labour time which has become a real
problem in the modern era.
OR
Q.5 (a) Explain in brief future factory concepts. (Refer section 4.2.1) [7]
(b) Describe four aspects in your business to master IoT. (Refer section 4.5) [7]
OR
Notes
1. The first key challenge for a ubiquitous deployment is the integration of multi-
technology networks in a common all-IP network to ensure that the communication
network is reliable and scalable. For this purpose, IoT relies on the connectivity and
reliability for its communications on Future Internet architecture.
2. The second key challenge is to guarantee security, privacy, integrity of information
and user confidentiality. The majority of the IoT applications need to take into
considerations the support of mechanisms to carry out the authentication,
authorization, access control, and key management.
3. In addition, due to the reduced capabilities from the constrained devices enabled with
Internet connectivity, a higher protection of the edge networks needs to be considered
with respect to the global network.
4. The third key challenge is to offer support for the mobility, since the Future Internet
presents a more ubiquitous and mobile Internet. Mobility support increases the
applicability of Internet to new areas.
The most present nowadays are mobile platforms such as smart phones and tablets
which enable a tremendous range of applications based on ubiquitous location,
context awareness, social networking, and interaction with the environment.
Future Internet potential is not limited to mobile platforms, else IoT is another
emerging area of the Future Internet, which is offering a high integration of the
cybernetic and physical world.
Mobility support in the IoT enables a global and continuous connection of all the
devices without requiring the disruption of the communication sessions.
For example, mobility management in hospitals is required since clinical devices can
be connected through wireless technologies. Mobility offers highly valuable features
such as higher quality of experiences for the patients, since this allows the patients to
S-5
Solved Paper Winter-2017
It involves the smart sensors that could be fixed in street lights for every parking space,
collection of real-time data, a web-based portal to monitor the parking spaces and a
mobile app which will enable user to reserve a parking space and make online payment
from their mobile app for their parking
Sensing Device (Cogito) : Wireless sensors to monitor the status of parking slots on real
time basis. Sends data through IEEE 802.15.4 low power radio to Transeo.
Information Gateway (Transeo) : Received data from the Cogito through IEEE 802.15.4
low power radio. Uses Wi-Fi/ Ethernet/GSM/GPRS to communicate with Server.
Parking App : Online parking booking facility .
Different digital modes of payment : Credit cards, e-wallet etc.
Real time parking availability status in parking lots.
Parking guidance on smartphone.
Parking session ending reminders.
Flexibility to extend parking sessions/cancel parking bookings.
(b) Explain reference architecture of IoT using figure. (Refer section 2.8) [4]
(c) Explain functional view, information view, deployment and operatonal view, other
relevant architectural views of IoT reference architecture. (Refer section 3.4) [7]
OR
Q.3 (a) Explain smart home IoT application using figure. [3]
Ans. : Smart homes using IoT provide the user varied features to operate home devices from
any place where the user being and at any time whenever needed.
Fig. 2 shows smart home. (See Fig. 2 on next page)
To allow each device to communicate with each other within a heterogeneous network.
First, it provides internet connection and data conversion services between Wi-Fi and
ZigBee networks. Then, it establishes a ZigBee network that allows home devices to
communicate with each other by using the ZigBee wireless protocol.
Finally, it provides a user interface control panel so that users can connect to IoT AP
through the internet to get the status of each ZigBee device at home and control them
remotely.
IoT sensors involved in home automation are in thousands, and there are hundreds of
home automation gateways as well. Most of the firmware is either written in C, Python,
Node.js, or any other programming language.
IoT sensors for home automation by their sensing capabilities : Temperature sensors, Lux
sensors, Water level sensors, Air composition sensors, Video cameras for surveillance,
Voice/Sound sensors, Pressure sensors, Humidity sensors, Accelerometers and Infrared
sensors etc.
Fig. 2
(b) Explain architecture reference model of IoT using figure. (Refer section 3.2) [4]
(c) Explain I-GVC using figure. (Refer section 2.5.1) [7]
Q.4 (a) Enlist IoT applications for value creations. [3]
Ans. : IoT applications for value creations :
1. Smart city
2. Smart health
3. Smart transportation
4. Smart energy and smart grid
5. Smart factor and smart manufacturing
6. Future factory
7. IoT for gas and oil industry
8. Value creation for big data and serialization
(b) Explain needs of IoT for oil and gas industry. (Refer section 4.8) [4]
(c) Explain value creation from big data and serialization. (Refer section 4.6) [7]
OR
Q.5 (a) Data aggregation for the IoT in smart cities security. (Refer section 5.5) [3]
(b) Explain contributions from FP7 projects. (Refer section 5.3) [4]
(c) Explain security, privacy and trust in IoT data-platforms for smart cities.
(Refer section 5.4) [7]
OR
3. SMARTIE follows a data-centric paradigm, which will offer highly scalable and secure
information for smart city applications
4. Applying smart solutions to infrastructure and services in area-based development in order
to make them better
5. Making governance citizen-friendly and cost effective - increasingly rely on online
services to bring about accountability and transparency
6. Promoting a variety of transport options
7. Confidentiality is needed to protect the privacy of citizens and valuable information of
stakeholders in the city, thereby protecting against unauthorized external access
8. Guaranteeing data availability and control functionality is also essential, especially in hard
situations, such as rescue operations for public safety in which coordination tasks are
required.
(c) Discuss layered IoT architecture using a figure. (Refer section 2.9) [7]
Q.3 (a) What is IoT domain model. (Refer section 3.3.1) [3]
(b) Explain M2M value chains. (Refer section 2.3) [4]
(c) Explain functional view, Information view, deployment and operational view, other
relevant architectural views of IoT reference architecture. (Refer section 3.4) [7]
OR
Q.3 (a) Discuss ETSI M2M interfaces. (Refer section 3.1.1) [3]
(b) What is IoT functional model ? (Refer section 3.3.3) [4]
(c) Explain open geospatial consortium architecture with a diagram.
(Refer section 3.1.3) [7]
Q.4 (a) Explain strategic business aspects. (Refer section 4.5) [3]
(b) What the shopping basket can tell : IoT for retailing industry ?
(Refer Q.4(b) of Summer-2017) [4]
(c) Explain in brief future factory concepts. (Refer section 4.2.1) [7]
S - 12
Solved Paper Summer-2018
OR
Q.4 (a) Describe : Smart products, smart equipment and smart infrastructure. [3]
Ans. :
Smart product : It is a data processing object, which has several interactive functions. A
smart product combines the physical and software interfaces. The usage of a smart
product is interactive and requires also some cognitive work by the user. Smart products
are dedicated to certain functionality. Smart products, also called as intelligent products.
A smart product uses a different of well known and developed technologies like; GPS,
QR codes, RFID and WLAN.
Smart equipment : It makes management easier and also provide status information to
the user remotely
Smart infrastructure incorporate functions of sensing, actuation, and control in order to
describe and analyze a situation, and make decisions based on the available data in a
predictive or adaptive manner, thereby performing smart actions.
(b) Discuss IoT for oil and gas industry. (Refer section 4.8) [4]
(a) Discuss activity chain 05 – goverance, privacy and security issues. (Refer section 5.2) [3]
(b) Explain smartie approach for IoT. (Refer section 5.5.2) [4]
(c) Discuss various FP7 projects. (Refer section 5.3) [7]
Q.1 (a) What is M2M communication ? Why M2M has shifted to the Internet of Things ?
(Refer section 2.1) [3]
(b) What is Internet of Things ? What are the applications of IoT ?
(Refer sections 1.1 and 1.6) [4]
(c) Explain the architecture of the Internet of Things. (Refer section 2.9) [7]
Q.2 (a) Which are the network and communication technologies can be used to implement an IoT
application. (Refer section 1.9) [3]
(b) What is a cloud ? What is the role of cloud platforms in IoT ? (Refer section 1.7.1) [4]
(c) Explain reference model of Internet of Things. (Refer section 3.2.1) [7]
OR
(c) Which are hardware and software components of IoT ? How do these components get
synchronized in an IoT based application ? (Refer section 1.1.1) [7]
Q.3 (a) What is the value chain of Internet of Things ? (Refer section 2.4) [3]
(b) What are data accumulation and data abstraction in a smart city application ?
(Refer section 5.5) [4]
(c) What are the security and private issues of IOT ? Explain using suitable case scenario.
(Refer section 1.12) [7]
OR
Q.3 (a) Explain functional model of IoT. (Refer section 3.3.3) [3]
(b) What is middleware ? Explain GAMBAS adaptive middleware. (Refer section 5.3.3) [4]
(c) Explain challenges of the Internet of Things ? [7]
S - 14
Solved Paper Winter-2018
In IoT, the different devices are traceable through the interconnected network, it creates
threats to personal and private data.
Many IoT devices are small in size and do not have the continuous power source.
A device computation depends on battery size and cost of the device. Many IoT devices
work as a single, limited purpose which could have customized network interfaces,
operating systems, and programming models that make the most efficient use of limited
computation, network, and energy resources.
Q.4 (a) Differentiate M2M and IoT. (Refer section 2.1.3) [3]
(b) What are the research issues of Internet of Things ? Refer section 1.5) [4]
(c) Explain smart parking system with architecture of system.
(Refer Q.3 (a) of Winter-2017) [7]
OR
Q.4 (a) Explain IoT domain model. (Refer section 3.3.1) [3]
(b) What are Bid data and Big data analytics ? How the data captured by an IoT system can be
analyzed ? (Refer section 4.6) [4]
(c) Which is a smart city ? What are the features of IoT based smart city ? Explain role of IoT
in making smart city. (Refer section 1.6.1) [7]
Q.5 (a) What is FP7 projects ? How these projects are helpful in implementing IoT systems ?
(Refer section 5.7) [3]
(b) What is smart health ? Discuss use of IoT smart health using all cases of the health
industry. (Refer section 4.10) [4]
(c) What is a smart home ? What are the functions of IoT based smart home ? Which sensors
are required to make smart home. (Refer Q.3 (a) of Winter-2017) [7]
OR
Q.5 (a) What are the governance issues of Internet of Things ? (Refer section 5.2) [7]
(b) How does an Internet of Things conserve the electric energy ? Discuss with a suitable case
scenario. (Refer section 1.6.2) [4]
(c) What is smart application ? How oil and gas industry can be smart using an Internet of
Things ? Take all possible use cases of oil and gas industry into consideration.
(Refer section 4.8) [7]
Notes
S - 19
Solved Paper Summer-2019
OR
Q.4 a) Explain future factory concepts IoT application (Refer section 4.2.1) [3]
b) Explain in detail smart objects and application. (Refer section 4.4) [4]
c) Explain eHealth IoT applications. (Refer section 1.6.5) [7]
Q.5 a) Discuss activity chain 05 - governance, privacy and security issues.
(Refer section 5.2) [3]
b) Explain smartie approach for IoT. (Refer section 5.5.2) [4]
c) Discuss GAMBAS adaptive middleware. (Refer section 5.3.3) [7]
OR
Q.5 a) Explain IoT for retailing industry. (Refer section 4.7) [3]
b) Explain security, privacy and trust in IoT-data-platforms for smart cities.
(Refer section 5.4) [4]
c) Discuss various FP7 projects. (Refer section 5.3) [7]