0% found this document useful (0 votes)
63 views178 pages

IOT Main Notes

Uploaded by

stvrlightt317
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views178 pages

IOT Main Notes

Uploaded by

stvrlightt317
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 178

SUBJECT CODE : 2180709

As per New Syllabus of


Gujarat Technological University
Semester - VIII (CE / CSE / IT) Elective - III

IoT & Applications

Iresh A. Dhotre
M.E. (Information Technology),
Ex-Faculty, Sinhgad College of Engineering.
Pune.

TECHNICAL
PUBLICATIONS
SINCE 1993 An Up-Thrust for Knowledge

(i)
IoT & Applications
Subject Code : 2180709

Semester - VIII (Computer Engineering / Computer Science & Engineering / Information Technology)
Elective - III

First Edition : February 2017


Second Revised Edition : January 2018
Third Revised Edition : January 2019
Fourth Revised Edition : January 2020

ã Copyright with Author


All publishing rights (printed and ebook version) reserved with Technical Publications. No part of this book
should be reproduced in any form, Electronic, Mechanical, Photocopy or any information storage and
retrieval system without prior permission in writing, from Technical Publications, Pune.

Published by :
®

TECHNICAL Amit Residency, Office No.1, 412, Shaniwar Peth, Pune - 411030, M.S. INDIA
P h . : + 9 1 - 0 2 0 - 2 4 4 9 5 4 9 6 / 9 7 , Te l e f a x : + 9 1 - 0 2 0 - 2 4 4 9 5 4 9 7
PUBLICATIONS
SINCE 1993 An Up-Thrust for Knowledge Email : [email protected] Website : www.technicalpublications.org

ISBN 978-93-332-1492-6

9 789333 214926 Course 13

9789333214926 [4] (ii)


Table of Contents
Chapter - 1 IoT and Web Technology (1 - 1) to (1 - 44)
1.1 The Internet of Things Today ............................................................................ 1 - 2
1.1.1 Component of IoT ............................................................................................... 1 - 4
1.1.2 Advantages and Disadvantages of IoT ................................................................ 1 - 6
1.1.3 Application of IoT ................................................................................................ 1 - 7
1.2 Time for Convergence ....................................................................................... 1 - 8
1.3 Towards the IoT Universe ................................................................................. 1 - 9
1.4 Internet of Things Vision ................................................................................... 1 - 9
1.5 IoT Strategic Research and Innovation Directions .......................................... 1 - 13
1.5.1 Applications and Scenarios of Relevance .......................................................... 1 - 15
1.5.2 IoT Functional View ......................................................................................... 1 - 18
1.6 Application Areas ............................................................................................ 1 - 18
1.6.1 Smart Cities...................................................................................................... 1 - 19
1.6.2 Smart Energy and the Smart Grid .................................................................... 1 - 21
1.6.3 Smart Transportation and Mobility.................................................................. 1 - 22
1.6.4 Smart Factory and Smart Manufacturing......................................................... 1 - 23
1.6.5 Smart Health ................................................................................................... 1 - 24
1.6.6 Food and Water Tracking and Security ............................................................. 1 - 25
1.6.7 Participatory Sensing ........................................................................................ 1 - 26
1.6.8 Social Networks and IoT .................................................................................... 1 - 26
1.7 Future Internet Technologies ......................................................................... 1 - 27
1.7.1 Cloud Computing............................................................................................... 1 - 27
1.7.2 IoT and Semantic Technologies......................................................................... 1 - 28
1.7.3 Autonomy.......................................................................................................... 1 - 29
1.8 Infrastructure ................................................................................................. 1 - 31
1.9 Networks and Communication ...................................................................... 1 - 32
1.10 Processes........................................................................................................ 1 - 34
1.11 Data Management ......................................................................................... 1 - 34
1.12 Security, Privacy and Trust ............................................................................. 1 - 40
1.13 Device Level Energy Issues ............................................................................. 1 - 41
1.14 IoT Related Standardization .......................................................................... 1 - 42
(v)
Chapter - 2 M2M to IoT (2 - 1) to (2 - 24)
2.1 Introduction of M2M Basic Perspective .......................................................... 2 - 2
2.1.1 Architecture and Components of M2M ............................................................ 2 - 3
2.1.2 Key Application Area ......................................................................................... 2 - 5
2.1.3 Comparison of M2M and IoT ............................................................................ 2 - 6
2.2 Some Definition ................................................................................................ 2 - 6
2.3 M2M Value Chains ............................................................................................ 2 - 9
2.4 IoT Value Chains.............................................................................................. 2 - 10
2.5 An Emerging Industrial Structure for IoT ........................................................ 2 - 12
2.5.1 Information-Driven Global Value Chain .......................................................... 2 - 13
2.6 The International Driven Global Value Chain and
Global Information Monopolies ..................................................................... 2 - 17
2.7 M2M to IoT an Architectural Overview .......................................................... 2 - 18
2.7.1 Building Architecture ....................................................................................... 2 - 18
2.8 Main Design Principles and Needed Capabilities........................................... 2 - 19
2.9 An IoT Architecture Outline ........................................................................... 2 - 22
2.10 Standards Considerations .............................................................................. 2 - 24

Chapter - 3 IoT Reference Architecture (3 - 1) to (3 - 32)


3.1 State of the Art ................................................................................................. 3 - 2
3.1.1 European Telecommunications Standards Institute M2M/oneM2M ............... 3 - 2
3.1.2 International Telecommunication Union-Telecommunication Sector View ..... 3 - 9
3.1.3 Open Geospatial Consortium Architecture ..................................................... 3 - 11
3.1.4 The International Telecommunication Union’s Telecommunication
Standardization .......................................................................................................... 3 - 13
3.2 Architecture Reference Model ....................................................................... 3 - 14
3.2.1 Reference Model and Architecture ................................................................. 3 - 14
3.3 IoT Reference Model ...................................................................................... 3 - 16
3.3.1 IoT Domain Model ........................................................................................... 3 - 16
3.3.2 Information Model .......................................................................................... 3 - 19
3.3.3 Functional Model............................................................................................. 3 - 20
3.3.4 Communication Model .................................................................................... 3 - 22
3.3.5 IoT Security Model........................................................................................... 3 - 23
3.4 IoT Reference Architecture ............................................................................. 3 - 24
3.4.1 Introduction ..................................................................................................... 3 - 25
3.4.2 Functional View ............................................................................................... 3 - 26
3.4.3 Information View ............................................................................................. 3 - 29
3.4.4 Deployment and Operational View .................................................................3 – 32

(vi)
Chapter - 4 IoT Applications for Value Creations (4 - 1) to (4 - 24)
4.1 Introduction ...................................................................................................... 4 - 2
4.2 IoT Applications for Industry............................................................................. 4 - 2
4.2.1 Future Factory Concept ..................................................................................... 4 - 6
4.3 Brownfield IoT ................................................................................................. 4 - 10
4.4 Smart Objects and Smart Applications ........................................................... 4 - 11
4.5 Four Aspects in your Business to Master IoT.................................................. 4 - 13
4.6 Value Creation from Big Data and Serialization ............................................. 4 - 15
4.7 IoT for Retailing Industry ................................................................................ 4 - 20
4.8 IoT for Oil and Gas Industry ............................................................................ 4 - 21
4.9 Opinions on IoT Application and Value for Industry....................................... 4 - 22
4.10 eHealth ........................................................................................................... 4 - 22

Chapter - 5 Internet of Things Privacy, Security and Governance


(5 - 1) to (5 - 16)
5.1 Introduction ...................................................................................................... 5 - 2
5.2 Overview of Governance, Privacy and Security Issues ..................................... 5 - 2
5.3 Contribution from FP7 Projects ........................................................................ 5 - 3
5.3.1 FP7 iCore Access Framework............................................................................. 5 - 3
5.3.2 IoT@Work Capability Based Access Control System ......................................... 5 - 4
5.3.3 GAMBAS Adaptive Middleware ......................................................................... 5 - 6
5.3.4 Governance, Security and Privacy in the Butler Project .................................... 5 - 8
5.4 Security, Privacy and Trust in IoT-Data-Platforms for Smart Cities .................. 5 - 9
5.5 Data Aggregation for the IoT in Smart Cities .................................................. 5 - 11
5.5.1 First Steps Towards a Secure Platform ............................................................ 5 - 11
5.5.2 SMARTIE Approach .......................................................................................... 5 - 13
5.5.2.1 Smart Transportation ........................................................................................ 5 - 14
5.5.2.2 Smart Cities in India : An Overview .................................................................. 5 – 14

(vii)
(viii)
IoT and Web Technology

Chapter - 1
IOT AND WEB TECHNOLOGY

Syllabus : The Internet of Things Today, Time for Convergence, Towards the IoT
Universe, Internet of Things Vision, IoT Strategic Research and
Innovation Directions, IoT Applications, Future Internet
Technologies, Infrastructure, Networks and Communication,
Processes, Data Management, Security, Privacy and Trust, Device
Level Energy Issues, IoT Related Standardization, Recommendations
on Research Topics.

Section No. Topic Name Page No.


1.1 The Internet of Things Today 1-2

1.2 Time for Convergence 1-8

1.3 Towards the IoT Universe 1-9

1.4 Internet of Things Vision 1-9

1.5 IoT Strategic Research and Innovation Directions 1 - 13

1.6 Application Areas 1 - 18

1.7 Future Internet Technologies 1 - 27

1.8 Infrastructure 1 - 31

1.9 Networks and Communication 1 - 32

1.10 Processes 1 - 34

1.11 Data Management 1 - 34

1.12 Security, Privacy and Trust 1 - 40

1.13 Device Level Energy Issues 1 - 41

1.14 IoT Related Standardization 1 - 42

1-1 IoT and Applications


IoT and Web Technology

1.1 The Internet of Things Today

 The Internet of Things (IoT) is the network of physical objects i.e. devices, vehicles,
buildings and other items embedded with electronics, software, sensors, and network
connectivity that enables these objects to collect and exchange data.
 Wikipedia definition : The Internet of Things, also called The Internet of Objects, refers
to a wireless network between objects, usually the network will be wireless and self-
configuring, such as household appliances.
 WSIS 2005 Definition : By embedding short-range mobile transceivers into a wide
array of additional gadgets and everyday items, enabling new forms of communication
between people and things, and between things
 A phenomenon which connects a variety of things. Everything that has the ability to
communicate.

 The Internet of Things is the intelligent connectivity of physical devices driving


massive gains in efficiency, business growth, and quality of life. Fig. 1.1.1 shows IoT
ecosystem.
 The Internet of Things refers to the capability of everyday devices to connect to other
devices and people through the existing Internet infrastructure. Devices connect and
communicate in many ways. Examples of this are smart phones that interact with other
smart phones, vehicle-to-vehicle communication, connected video cameras, and
connected medical devices. They are able to communicate with consumers, collect and
transmit data to companies, and compile large amounts of data for third parties.

1-2 IoT and Applications


IoT and Web Technology

Fig. 1.1.1

 IoT data differs from traditional computing. The data can be small in size and frequent
in transmission. The number of devices, or nodes, that are connecting to the network
are also greater in IoT than in traditional PC computing.
 Machine-to-Machine communications and intelligence drawn from the devices and the
network will allow businesses to automate certain basic tasks without depending on
central or cloud based applications and services.
 IoT impacts every business. Mobile and the Internet of Things will change the types of
devices that connect into a company’s systems. These newly connected devices will
produce new types of data. The Internet of Things will help a business gain efficiencies,
harness intelligence from a wide range of equipment, improve operations and increase
customer satisfaction.
 Ubiquitous computing, pervasive computing, Internet Protocol, sensing technologies,
communication technologies, and embedded devices are merged together in order to
form a system where the real and digital worlds meet and are continuously in symbiotic
interaction.
 The smart object is the building block of the IoT vision. By putting intelligence into
everyday objects, they are turned into smart objects able not only to collect information
from the environment and interact /control the physical world, but also to be
interconnected, to each other, through Internet to exchange data and information.
 The expected huge number of interconnected devices and the significant amount of
available data open new opportunities to create services that will bring tangible benefits

1-3 IoT and Applications


IoT and Web Technology

to the society, environment, economy and individual citizens. In this paper we present
the key features and the driver technologies of IoT. In addition to identifying the
application scenarios and the correspondent potential applications, we focus on research
challenges and open issues to be faced for the IoT realization in the real world.
 However, the IoT is still maturing, in particular due to a number of factors, which limit
the full exploitation of the IoT. Some of the factors are listed below :
1. There is no unique identification number system for object in the world.
2. IoT uses Architecture Reference Model (ARM) but there is no further development
in ARM.
3. Missing large-scale testing and learning environments
4. Difficulties in exchanging of sensor information in heterogeneous environments.
5. Difficulties in developing business which embraces the full support of the Internet
of Things.
Characteristics of the Internet of Things

1. Interconnectivity : Everything can be connected to the global information and


communication infrastructure.
2. Heterogeneity : Devices within IoT have different hardware and use different
networks but they can still interact with other devices through different networks.
3. Things-related services : Provides things-related services within the constraints
of things, such as privacy and semantic consistency between physical and virtual
thing.
4. Dynamic changes : The state of a device can change dynamically.
1.1.1 Component of IoT

 The hardware utilized in IoT systems includes devices for a remote dashboard, devices
for control, servers, a routing or bridge device, and sensors. These devices manage key
tasks and functions such as system activation, action specifications, security,
communication, and detection to support-specific goals and actions.
 Major components of IoT devices are as follows:
1. Control units : A small computer on a single integrated circuit containing
processor core, memory and a programmable I/O peripheral. It is responsible for
the main operation.

1-4 IoT and Applications


IoT and Web Technology

2. Sensor : Devices that can measure a physical quantity and convert it into a signal,
which can be read and interpreted by the microcontroller unit. These devices
consist of energy modules, power management modules, RF modules, and sensing
modules. Most sensors fall into 2 categories: Digital or analog. An analog data is
converted to digital value that can be transmitted to the Internet.
a. Temperature sensors : accelerometers
b. Image sensors: gyroscopes
c. Light sensors : acoustic sensors
d. Micro flow sensors : humidity sensors
e. Gas RFID sensors : pressure sensors
3. Communication modules : These are the part of devices and responsible for
communication with rest of IoT platform. They provide connectivity according to
wireless or wired communication protocol they are designed. The communication
between IoT devices and the Internet is performed in two ways:
A) There is an Internet-enable intermediate node acting as a gateway;
B) The IoT Device has direct communication with the Internet.
 The communication between the main control unit and the communication module uses
serial protocol in most cases.
4. Power sources : In small devices the current is usually produced by sources like
batteries, thermocouples and solar cells. Mobile devices are mostly powered by
lightweight batteries that can be recharged for longer life duration.
 Communication Technology and Protocol : IoT primarily exploits standard protocols
and networking technologies. However, the major enabling technologies and protocols
of IoT are RFID, NFC, low-energy Bluetooth, low-energy wireless, low-energy radio
protocols, LTE-A, and WiFi-Direct. These technologies support the specific networking
functionality needed in an IoT system in contrast to a standard uniform network of
common systems.
Working :

1. Collect and transmit data : The device can sense the environment and collect
information related to it and transmit it to a different device or to the Internet.
2. Actuate device based on triggers : It can be programmed to actuate other
devices based on conditions set by user.
3. Receive information : Device can also receive information from the network.

1-5 IoT and Applications


IoT and Web Technology

4. Communication assistance : It provides communication between two devices of


same network or different network.
 Fig. 1.1.2 shows working of IoT.

Fig. 1.1.2 : Working of IoT

 Sensors for various applications are used in different IoT devices as per different
applications such as temperature, power, humidity, proximity, force etc.
 Gateway takes care of various wireless standard interfaces and hence one gateway can
handle multiple techologies and multiple sensors. The typical wireless technologies
used widely are 6LoWPAN, Zigbee, Zwave, RFID, NFC etc. Gateway interfaces with
cloud using backbone wireless or wired technologies such as WiFi, Mobile , DSL or
Fibre.
1.1.2 Advantages and Disadvantages of IoT
Advantages of IoT

1. Improved customer engagement and communication.


2. Support for technology optimization

1-6 IoT and Applications


IoT and Web Technology

3. Support wide range of data collection


4. Reduced waste
Disadvantages of IoT

1. Loss of privacy and security : As all the household appliances, industrial


machinery, public sector services like water supply and transport, and many other
devices all are connected to the Internet, a lot of information is available on it.
This information is prone to attack by hackers.
2 Flexibility : Many are concerned about the flexibility of an IoT system to
integrate easily with another
3. Complexity : The IoT is a diverse and complex network. Any failure or bugs in
the software or hardware will have serious consequences. Even power failure can
cause a lot of inconvenience.
4. Compatibility : Currently, there is no international standard of compatibility for
the tagging and monitoring equipment
5. Save time and money
1.1.3 Application of IoT

1. Home : Buildings where people live. It controls home and security systems.
2. Offices : Energy management and security in office buildings; improved
productivity, including for mobile employees.
3. Factories : Places with repetitive work routines, including hospitals and farms;
operating efficiencies, optimizing equipment use and inventory.
4. Vehicles : Vehicles including cars, trucks, ships, aircraft, and trains; condition-
based maintenance, usage-based design, pre-sales analytics
5. Cities : Public spaces and infrastructure in urban settings; adaptive traffic control,
smart meters, environmental monitoring, resource management.
6. Worksites : It is custom production environments like mining, oil and gas,
construction; operating efficiencies, predictive maintenance, health and safety.

1-7 IoT and Applications


IoT and Web Technology

Fig. 1.1.3

1.2 Time for Convergence

 Smartphone are not capable of running a multiplicity of user-driven applications and


connecting various sensors and objects are missing today. They cannot work properly
in heterogeneous environment.
 Fig. 1.2.1 shows IoT domain and application.

Fig. 1.2.1 : Domain and application of IoT

1-8 IoT and Applications


IoT and Web Technology

 Step forward to the Internet of Things are as follows :


1. Coherence of object capabilities and behavior : Large number objects are
available for sensing and actuation for information processing.
2. Coherence of application interactivity : The applications will increase in
complexity and modularization, and boundaries between applications and services
will be unclear to a high degree.
3. Coherence of corresponding technology approaches : Smart Cities, Cloud
computing, Future Internet, robotics will evolve in their own way, but because of
complementarily also partly merge with the Internet of Things.
4. Coherence of real and virtual worlds : Today real and virtual worlds are
perceived as two antagonistic conceptions.

1.3 Towards the IoT Universe

 IoT is simply a concept wherein machines and everyday objects are connected via the
Internet. Within the IoT, devices are controlled and monitored remotely and usually
wirelessly.
 IDC predicts that the IoT will include 212 billion things globally by the end of 2020.
1. Development of a consistent, interoperable and accessible IoT across sectors,
including standardization.
2. Special attention is given to some of the most important application like health,
environment and energy consumption.
3. Maintaining the Internet of Things as an important subject for national and
international cooperation both for sharing best practices and development.
4. Offers security, privacy and trust in the scope of current legislation and
development of robust and future-proof general data protection rules.
5. Providing resources like spectrum allowing pan-European service provision and
removal of barriers such as roaming.

1.4 Internet of Things Vision

 Internet of Things is a concept and paradigm. It considers variety of object from the
environment and communicate with wireless and wired connections with unique
addressing method.
 A world where the real, digital and the virtual are converging to create smart
environments that make energy, transport, cities and many other areas more intelligent.

1-9 IoT and Applications


IoT and Web Technology

 Main goal of the IoT is to enable things to be connected anytime, anyplace, with
anything and anyone ideally using any path/network and any service. It is a new
revolution of the Internet.
 Using IPv6 with its abundant address spaces, globally unique object identification and
connectivity can be provided in a standardized manner without additional status or
address processing.
 New types of applications can involve the electric vehicle and the smart house, in
which appliances and services that provide notifications, security, energy-saving,
automation, telecommunication, computers and entertainment are integrated into a
single ecosystem with a shared user interface.
 There are a number of factors powering the progression of the IoT within the digital
economy, including :
1. Powerful new mobile, wearable or connected devices.
2. Application that fuel demand for mobile data and test the limits of the network
within most industry sector.
3. Cloud-based apps and those that rely on content stored in the cloud, which will
increase as development accelerates on new Platform-as-a-Service, mobile point
of sale and independent software vendor platforms.
4. New use cases, such as mobile video, which will be significant factors in driving
expensive capacity upgrades in networks.
 The end goal is to have plug-n-play smart objects that can be deployed in any
environment with an interoperable interconnection backbone that allows them to blend
with other smart objects around them. Standardization of frequency bands and protocols
plays a pivotal role in accomplishing this goal.
 The use of IP to communicate with and control small devices and sensors opens the
way for the convergence of large, IT-oriented networks with real time and specialized
networked applications.
 The idea of internet of things was developed in parallel to WSNs. The term internet of
things was devised by Kevin Ashton in 1999 and refers to uniquely identifiable
objects and their virtual representations in an “internet-like” structure.
 These objects can be anything from large buildings, industrial plants, planes, cars,
machines, any kind of goods, specific parts of a larger system to human beings, animals
and plants and even specific body parts of them.

1 - 10 IoT and Applications


IoT and Web Technology

 While IoT does not assume a specific communication technology, wireless


communication technologies will play a major role, and in particular, WSNs will
proliferate many applications and many industries. The small, rugged, inexpensive and
low powered WSN sensors will bring the IoT to even the smallest objects installed in
any kind of environment, at reasonable costs.
 Fig. 1.4.1 shows IP convergence.
 The use of IP to communicate with and control small devices and sensors opens the
way for the convergence of large, IT-oriented networks with real time and specialized
networked applications.
 Offices and residential buildings have various control systems for heating, venting, and
air conditioning ; telephone service; security; and lighting.
 In just the last few years, we have moved beyond simply using our machines to connect
with other people and can now program them to connect directly to one another,
allowing for the collection and processing of information on an unprecedented scale.
 The new connectivity of both physical infrastructure and devices is being referred to as
the ‘industrial internet’, or the ‘internet of things’, while the technology that facilitates
this connectivity is most commonly called ‘Machine-to-Machine’ (M2M).
 By 2020, there will be 12.5 billion M2M devices globally, up from 1.3 billion devices
today (Hatton 2012) to put this in perspective, mobile internet use, which is also fast
becoming a part of our daily experience, is growing at only a fraction of the rate of
M2M, and the 400 million mobile internet users of 2007 are predicted to grow to two
billion users by 2015 (By Richmond 2011).

Fig. 1.4.1 : IP convergence

1 - 11 IoT and Applications


IoT and Web Technology

 M2M applications in the energy, transportation, built environment and agriculture


sectors are the most promising, each offering the potential for profitably.
 Internet contains all types and sizes of devices connected. For example, smart phones,
home appliances, toys, cameras, medical instruments and industrial systems, all
connected, all communicating and sharing information all the time. Fig. 1.4.2 shows
this communication.
 The Internet of Things is a “global concept” and requires a common definition.
 IoT Definition : A global infrastructure for the information society, enabling advanced
services by interconnecting (physical and virtual) things based on existing and evolving
interoperable information and communication technologies.

Fig. 1.4.2 : Everything in Internet

 IoT Definition : A global infrastructure for the information society, enabling advanced
services by interconnecting (physical and virtual) things based on existing and evolving
interoperable information and communication technologies.
 Several factors are driving the convergence of Information Technology and
Communication Technology and, consequently, contributing to the integration and
transformation of cloud, pipe, and device technologies is shown in Fig. 1.4.3.

1 - 12 IoT and Applications


IoT and Web Technology

Fig. 1.4.3 : Convergence of information technology and communication technology

 In Internet of Things , wireless communication technology or systems will play a vital


role and they are enabling the smart objects or “Things” to be networked. The universal
assumption of wireless communication systems for exchanging data or information will
create various issues in terms of availability of frequency spectrum and it will impel
towards the assumption of Cognitive radio Systems.
 The abilities of wireless communication system can provide and identify the operation
of Internet of Things and also it will be possible to locate the smart objects or “Things”
in the physical area or zone. It is important that the various operations of IoT the energy
which will be spent for wireless communication and computing purpose should be very
less.
 The most important thing is techniques or related to energy gathering i.e. the energy
should be handled with proper care while dealing with the devices which are used in
IoT technology.

1.5 IoT Strategic Research and Innovation Directions

 The goal of the IoT Strategic Research Agenda (IoT-SRA) is to direct the research
efforts to focus areas of identified significant value creation.

1 - 13 IoT and Applications


IoT and Web Technology

 We are standing on the brink of a new ubiquitous computing and communication era,
one that will radically transform our corporate, community, and personal environments.
 Development of new technology like smart-phones, embedded system, cloud
networking, sensors, nano-electronics, network virtualization and software are requires
Internet connection all the time.
 The high level expert group on key enabling technologies (KETs) presented its final
report. This expert group was created with the aim to elaborate a European strategy to
develop several KETs - nanotechnology, micro and nanoelectronics, advanced
materials, photonics, industrial biotechnology and advanced manufacturing systems –
and to allow them to be more effectively exploited by industry.
 The reduction in the critical dimensions while keeping the electrical field constant, and
at the same time a user obtained at a higher speed with reduction in power consumption
of a digital MOS circuits.
 The International Technology Roadmap for Semiconductors has highlighted in its early
editions and its associated benefits in terms of performances, the traditional parameters
in Moore’s Law.
 Mobile data traffic will be increases rapidly. In year 2015, technological survey was
conducted and it is observed that data traffic was increases and mobile operators are
facing problem to provide the required bandwidth to the client and customers.
 Extra frequency spectrum is not available in some countries. So proposed solutions are
the seamless integration of existing Wi-Fi networks into the mobile ecosystem and also
this will have a very big impact on IoT ecosystems.
 It is necessary to develop a chip to integrate all processes. It is called as “multicom
chip”. In a single silicon package, it is expected to cover Wi-Fi and baseband
communications. The architecture of mobile devices is likely to change as well as the
baseband chip will be taking control of the routing process, so the connectivity
components are connected to the baseband or integrated. So there will be change in the
architectural design.
 Today many European projects address Internet of Things technologies, knowledge and
also it has been mentioned that these topics can be heterogeneous and specialized, also
there is a strong need for integration of the individual results.
 In this context, the integration of knowledge has been conceptualized as the process
through which some specialized cognizance situated in multiple projects across Europe
is applied and assimilated.

1 - 14 IoT and Applications


IoT and Web Technology

 The Agenda of Strategic Research and Innovation has been developed with the proper
support of a European-led community of interrelated projects and their stakeholders
with dedication to the innovation, creation, development and use of the IoT technology.
1.5.1 Applications and Scenarios of Relevance

 The IERC is bringing together EU funded projects with the aim of defining a common
vision of IoT technology and addressing European research challenges. The rationale is
to target the large potential for IoT-based capabilities and promote the use of the results
from the existing projects to encourage the convergence of ongoing work to tackle the
most important deployment issues and the transfer of research and knowledge to
products and services and apply these in real IoT applications.
 A smart space is deployed in an IoT-enabled computing environment, creating an
infrastructure for application to construct and deliver value-added services based on
cooperative activity of environment participants, either human or machines.
 Fig. 1.5.1 shows IERC Vison for IoT Integrated Environment and Ecosystems.

Fig. 1.5.1 : IERC vision for IoT integrated environment and ecosystems

 The final goal is to test and develop innovative and interoperable IoT solutions in areas
of industrial and public interest.
 Smart is the new green as defined by Frost and Sullivan and the green products and
services will be replaced by smart products and services.

1 - 15 IoT and Applications


IoT and Web Technology

 Smart space is an ecosystem of interacting computational objects on shared knowledge


base. The key goal is seamless provision of users with information using the best
available resources for all kinds of devices that the users can use in the ecosystem.
 Fig.1.5.2 shows smart room.

Fig. 1.5.2 : Equipment and service environment for participants in smart room

 Communication in a smart room uses a wireless LAN attached to the Internet.


Participants are chairman, active speaker and spectators. Two public screens are
available :
1. Agenda shows the event timetable and
2. Presentation shows material that each speaker presents.
 The participants access services in the smart room using personal mobile computers .
The room is equipped with sensor devices that sense the physical parameters of the
environment and participant activity.
 All knowledge is collected, organized, shared, and searched in a common smart space.
Local services run on local computers or nearby servers.
 The system accesses the external world for appropriate Internet services. Service
outcome is visible online on the public screens or personalized on mobile clients.
 The heterogeneity of participating devices and information sources immediately faces
with the interoperability challenge. Smart room service set is formed from multiple
sources of heterogeneous information and requires intensive processing, including
service discovery and the provision to a particular participant or a group of them.
 Personal information is essential for smart room operation, but it must support rigorous
security and privacy defense mechanisms.

1 - 16 IoT and Applications


IoT and Web Technology

 Examples of particular problems are the following.


1. Integration of joining devices (e.g., personal devices) is seamless.
2. Service management is adaptive, e.g., when some services become temporarily
unavailable.
3. Knowledge exchange is supported: one service utilizes knowledge deduced by
another service, e.g., discussion of participants in the blog leads to updates in the
agenda.
 The smart spaces concept makes clear separation between device, service, and
information level interoperability. Device interoperability covers technologies for
devices to discover and network with each other. Service interoperability covers
technologies for space participants to discover services and use of them.
 Information interoperability covers technologies and processes for making in-formation
available without a need to know interfacing methods of the entity creating or
consuming the information.
 A smart space is a semantic information-centric extension of the IoT-aware connection
of physical and virtual objects.

Fig. 1.5.3 : IoT- smart environment and smart spaces creation

 Smart environments are places where different kind of embedded devices are
interconnected in order to provide their occupants intelligent services improving their
comfort and convenience. These smart environments are seen to be important for the

1 - 17 IoT and Applications


IoT and Web Technology

future urban ecosystems in terms of user friendliness, quality of life, energy efficiency
and sustainability
 The security challenge includes traditional issues of open distributed systems, such as
key exchange and resource restrictions, and specific problems caused by the dynamicity
and heterogeneity of smart spaces.
 IoT applications need context-dependent and fine-grained access control. Smart space
access control policies define which knowledge processors (KPs) are allowed to access
which objects.
 Security level of joined devices is measured. Access control ontology allows
representing meta-information about the context and granularity.
 The approach enables devices to share knowledge with the same security level even
when these devices do not have interoperable security protocols for direct confidential
communication.
 Many IoT devices are of low capacity (memory, CPU, battery, etc.), and they cannot
use the full scale of security capabilities that the basic HIP or other Internet protocols
provide.
1.5.2 IoT Functional View

 IoT solutions contains following modules :


1. for local IoT devices interaction.
2. for local analysis and data processing
3. for interaction with remote IoT devices
4. for application specific data analysis and processing
5. for integration of IoT-generated information into the business processes of an
enterprise.
 A large number of applications made available through application markets have
significantly helped the success of the smart phone industry.
 The development of such a huge number of smart phone applications is primarily due to
involvement of the developers’ community at large.

1.6 Application Areas

 Potential applications of the IoT are numerous and diverse, permeating into practically
all areas of every-day life of individuals , enterprises, and society as a whole

1 - 18 IoT and Applications


IoT and Web Technology

1.6.1 Smart Cities

 The number of urban residents is growing by nearly 60 million every year. In addition,
more than 60 percent of the world’s population will be living in cities by 2050. As a
result, people occupying just 2 percent of the world’s land will consume about three-
quarters of its resources. Moreover, more than 100 cities of 1 million people will be
built in the next 10 years.
 Over the past decade, the city of Amsterdam, the Netherlands, has developed a vision
for collaborating, envisioning, developing, and testing numerous connected solutions
that could pave the way to a smarter, greener urban environment.
 Fig. 1.6.1 shows application in smart city.

Fig. 1.6.1 : Application in smart city

 A number of projects were launched, beginning in 2006, as Amsterdam identified ways


to improve sustainable living/working, public spaces, and mobility. Most recently, the
city has been exploring the potential for a connected public lighting infrastructure.
Fig. 1.6.2 shows concept of smart city.

1 - 19 IoT and Applications


IoT and Web Technology

Fig. 1.6.2 : Smart city

 Innovations will aim to improve the quality of life in cities, encompassing security
issues and energy resourcefulness. Smart city includes :
1. Smarter management of city infrastructure using Big Data analytics
2. Collaboration across multiple and disparate agencies using cloud technologies
3. Real-time data collection, enabling quick response using mobile technologies
4. Enhanced security : improved public safety and law enforcement, and more
efficient emergency response
5. Better city planning improved schematics, project management and delivery
6. Networked utilities smart metering and grid management
7. Building developments more automation, and better management and security
 Research challenges for smart city IoT applications :
1. To overcome the traditional silo based organization of the cities.
2. Creating algorithms and schemes to describe information created by sensors in
different applications to enable useful exchange of information between different
city services.
3. Mechanisms for cost efficient deployment and even more important maintenance
of such installations, including energy scavenging

1 - 20 IoT and Applications


IoT and Web Technology

4. Ensuring reliable readings from a plethora of sensors and efficient calibration of a


large number of sensors deployed everywhere from lamp-posts to waste bins
5. Development of low energy protocols and algorithms
6. Algorithms for analysis and processing of data acquired in the city and making
“sense” out of it.
7. IoT large scale deployment and integration
 With smart city applications producing continuous large data from heterogeneous
sources, existing relational database technologies are inadequate to handle such huge
amounts of data given the limited processing speed and the significant storage
expansion cost.
 To address this problem, big data processing technologies, which are based on
distributed data management and parallel processing, have provided enabling platforms
for data repositories, distributed processing, and interactive data visualization
1.6.2 Smart Energy and the Smart Grid

 Smart grids are an advancement of the electricity grids that are being used currently. A
smart grid is an electrical grid that uses modern technology (digital or analog) to collect
and communicate electricity related information of both the suppliers and consumers.
 It not only enhances efficiency and reliability, but also improves the production and
distribution of electricity to the consumers. The process of installing a smart grid
necessarily means technical re-designing of the infrastructure at different levels. One
such measure means replacing the existing electronic meters (or electromechanical
meters) with smart meters, to enhance the sustainability and efficiency of the entire
electrical system.
 Fig. 1.6.3 shows smart grid.
 It uses information technologies to improve how electricity travels from power plants to
consumers and allows consumers to interact with the grid. It integrates new and
improved technologies into the operation of the grid.
 The smart grid will require wide, seamless, often real-time use of applications and tools
that enable grid operators and managers to make decisions quickly.
 Decision support and improved interfaces will enable more accurate and timely human
decision making at all levels of the grid, including the consumer level, while also
enabling more advanced operator training.

1 - 21 IoT and Applications


IoT and Web Technology

Fig. 1.6.3 : Smart grid

 Energy storage systems are highly versatile and this is a technology that can meet the
needs of various users and be utilized in diverse fields. These include power generators
that use renewable energy, grid equipment like energy transmission and distribution
equipment, as well as commercial facilities, factories and homes.
1.6.3 Smart Transportation and Mobility

 Cities around the world face common transport challenges – from increasing
congestion, safety concerns and aging infrastructure to a lack of funding and increasing
environmental impacts. Like their colleagues in city administration and government,
transport officials are starting to implement "smart solutions" to address these
challenges and provide improved mobility in their cities, better services for citizens and
a more cost-effective transport network
 Vehicle networking : Utilizing the new technologies, such as wireless communication,
positioning and navigation, context awareness, to implement the connections between
vehicle to vehicle, vehicle to man, vehicle to infrastructure, so that the integrated
service can be provided.
 The Internet of Vehicles (IoV) is an integration of three networks : an inter-vehicle
network, an intra-vehicle network, and vehicular mobile Internet.

1 - 22 IoT and Applications


IoT and Web Technology

 The research and development, as well as the industrial application of IoV technologies
will promote the integration of automotive and information technology. The integrated
information services of vehicles, vehicle safety, and economic performance will
contribute to a more intelligent urban transportation system and advance social and
economic development.
 The IoV will have far reaching influence on the consumer vehicle market, consumer
lifestyle, and even modes of behavior.
 The application of IoV technology in providing information services, improving traffic
efficiency, enhancing traffic safety, implementing supervision and control and other
aspects will make millions of people enjoy more comfortable, convenient and safe
traffic service.
 Large concentrations of vehicles, e.g., in city parking facilities during business hours,
can also provide the ad-hoc computational resources which will be of interest to those
in the IT fields.
 Complementary efforts should be made for developing and enhancing middle-ware
platforms which will enable analytic and semantic processing of data coming from
vehicles.
1.6.4 Smart Factory and Smart Manufacturing

 Manufacturers are increasingly adding software, sensors, and wireless connectivity to


their products, providing a foundation for the Internet of Things , which IDC defines as
a network of uniquely identifiable endpoints that communicate without human
interaction using IP connectivity.
 IoT opportunities can be split into two broad categories: supporting the process or
supporting the product. For IoT-supported processes, we believe that by 2020, at least
half of all corporate standard processes will have automated data acquisition and a
quarter will have self-correction capabilities.
 For IoT-supported products, we also expect that manufacturers will see onboard service
revenue double in its share of total industry revenue by 2020 because of IoT and
connected products.
 Manufacturers have the opportunity to adapt processes with IoT to lower costs,
optimize operations, reduce resource consumption, improve productivity, enhance
customer service, and manage the supply chain. Similarly, they can also use IoT to
drive product-related benefits, such as improving product quality, increasing uptime,

1 - 23 IoT and Applications


IoT and Web Technology

and using actual performance data to drive future design changes in the next generation
of products.
 As IoT provides the basis for an increasing amount of automated data acquisition,
manufacturers will be able to adapt their processes and their products not just for
incremental improvements but also for transformation of the product, service, and
business model.
 IoT gives manufacturers the opportunity to create "intelligent" products that can sense,
learn, and predict customer needs as well as interconnect with other product
ecosystems.
1.6.5 Smart Health

 IoT devices can be used to enable remote health monitoring and emergency notification
systems. These health monitoring devices can range from blood pressure and heart rate
monitors to advanced devices capable of monitoring specialized implants.
 Smart health systems provide health related services using a network , some kind of
connection between intelligent agents. These intelligent agents could be computing
devices, mobile phones, sensors, Fitbit smart bands, surgical devices, devices that
measure your blood chemistry, or devices that measure your brainwaves. Any of these
things could be intelligent agents.
 The human actors, patients or healthcare providers for example could be intelligent
agents in this system. The sensors, devices, computers, applications, and human actors
are all intelligent agents that might be connected in the smart health system.
 Smart healthcare is an important research area for Internet of Things , which employs
sensors and other information identifying technologies, wireless and wired networks to
realize large-scale, multi-layer interaction between patients and medical equipments,
medical staff and healthcare institutions.
 Some challenges in the healthcare system are as follows :
1. Smarter hospital : Smarter hospital is an important improvement of smart
healthcare system. A natural problem is how to build a smarter hospital for
greatly improving medical services and patient experience.
2. Data integration/realtimeness : How to combine heterogeneous health data
sources in a unified and meaningful way enables the discovery and monitoring of
health data from different sources. It is also important for smart healthcare to
ensure the data realtimeness.

1 - 24 IoT and Applications


IoT and Web Technology

3. Medical resource shortness : There are not enough medical resources for the
population. For example, there are fewer doctors and high-level healthcare
institutions but more patients.
4. “Low” usage of community health service centers. In contrast with community
health service centers, people prefer the high-level healthcare institutions. This
results in the low usage of community service centers.
5. Bad health habits. The citizens have some bad health habits that contribute to poor
health, for instance, smoking and no sport.
6. Lack of information sharing. Hospitals are not sharing enough information. This
leads to the following two problems at least. First, the health information records
of patients cannot be queried. Second, there is lack of medical cooperation
between hospitals.
 The links between the many applications in health monitoring are :
1. Applications require the gathering of data from sensors
2. Applications must support user interfaces and displays
3. Applications require network connectivity for access to infrastructural services
4. Applications have in-use requirements such as low power, robustness, durability,
accuracy and reliability.
 Connected medical devices and associated IoT technologies will primarily be used to
achieve the following capabilities :
1. Access real time visibility of the patient's condition, his/her activities, context and
physiological parameters
2. Monitor compliance to prescribed treatment, diet and exercise regimes
3. Provide feedback and cues to patients, family members, doctors and caregivers in
order to implement corrective action
4. Leverage high performance computing for real time feedback and use evidence-
based medicine for better patient outcome
1.6.6 Food and Water Tracking and Security

 Important natural resources in the world are food and fresh water. Organic food
produced without addition of certain chemical substances and according to strict rules,
or food produced in certain geographical areas will be particularly valued. Similarly,
freshwater from mountain springs is already highly valued.

1 - 25 IoT and Applications


IoT and Web Technology

 The research challenges are :


1. Design of cost efficient and secure mechanism for tracking food and water from
production place to consumers.
2. Monitoring production processes
3. Ensure trust and secure exchange of data among applications and infrastructure
1.6.7 Participatory Sensing

 Participatory Sensing is data collection and interpretation.


 Participatory Sensing emphasizes the involvement of citizens and community groups in
the process of sensing and documenting where they live, work, and play.
 Participatory Sensing can draw on a variety of data collection devices, such as home
weather stations and water quality tests, but several features of mobile phones make
them a special and unprecedented tool for engaging participants in sensing their local
environment.
 The broad pro-liferation of cellular infrastructure and mobile phone usage makes it
possible to collect data over large areas for little incremental cost.
 Participatory sensing applications rely on the participation of end users with mobile
computing devices to create interactive sensor networks that en-able data gathering,
analysis, and sharing.
 Participatory sensing applications come with a number of challenges that need to be
solved :
1. Addressing scalability and large scale deployments
2. Ensuring privacy of individuals providing observations
3. Efficient mechanisms for sharing and distribution of community wisdom
4. Reliability and trustworthiness of observed data
5. Design of algorithms for normalization of observations taking into account the
conditions under which the observations were taken.
1.6.8 Social Networks and IoT

 The idea of the Internet of Things is linking digital information to a network and
thereby relating digital information to real world physical items. While many terms
have been used to describe the vision of seamless information access, exchange and
manipulation, the IoT can become a daily reality by the adoption and deployment of
more and more networked objects. The impact thus is not only achieved by
communication but by cooperation.

1 - 26 IoT and Applications


IoT and Web Technology

 Social networks serve human needs: by updating a status description on Face-book or


sending out a tweet, users can let their network of friends - or even the digital public -
know what is happening in their lives. Moreover, videos, pictures, or also news and
links get spread by a few mouse clicks. Currently, Facebook receives 55 millions of
manual updates by 350 millions of users worldwide.
 Future research directions in IoT applications should consider the social dimension,
based on integration with social networks which can be seen as another bundle of
information streams.

1.7 Future Internet Technologies

1.7.1 Cloud Computing

 Cloud computing is a pay-per-use model for enabling available, convenient, on-


demand network access to a shared pool of configurable computing resources (e.g.,
networks, servers, storage, applications, services) that can be rapidly provisioned and
released with minimal management effort or service-provider interaction.
 Cloud computing refer to a variety of services available over the Internet that deliver
compute functionality on the service provider's infrastructure. Its environment
(infrastructure) may actually be hosted on either a grid or utility computing
environment, but that doesn't matter to a service user.
 Cloud computing is a general term used to describe a new class of network based
computing that takes place over the Internet, basically a step on from Utility
Computing. In other words, this is a collection/group of integrated and networked
hardware, software and Internet infrastructure (called a platform).
 Using the Internet for communication and transport provides hardware, software and
networking services to clients. These platforms hide the complexity and details of the
underlying infrastructure from users and applications by providing very simple
graphical interface or API.
 In addition, the platform provides on demand services that are always on anywhere,
anytime and any place. Pay for use and as needed, elastic. The hardware and software
services are available to the general public, enterprises, corporations and business
markets.
 Cloud storage is a model of networked online storage where data is stored in virtualized
pools of storage which are generally hosted by third parties. Hosting companies operate
large data centers and people who require their data to be hosted buy or lease storage
capacity from them.

1 - 27 IoT and Applications


IoT and Web Technology

 Cloud storage services may be accessed through a web service API, a cloud storage
gateway or through a web-based user interface.
 Cloud computing solutions are made up of several elements.
1. Clients : Mobile, terminals or regular computers.
2. Benefits : Lower hardware costs, lower IT costs, security, data security, less
power consumption, ease of repair or replacement, less noise.
3. Data centers : Collection of servers where the application to subscribe is housed.
It could be a large room in the basement of your building or a room full of servers
on the other side of the world
4. Virtualizing servers : Software can be installed allowing multiple instances of
virtual servers to be used and a dozen virtual servers can run on one physical
server.
5. Distributed servers : Servers don't all have to be housed in the same location. It
can be in geographically disparate locations. If something were to happen at one
site, causing a failure, the service would still be accessed through another site. If
the cloud needs more hardware, they can add them at another site.
 In Software as a Service (SaaS) model, application is hosted as a service to
customers who access it via the Internet.
 Platform as a service is another application delivery model and also known as
cloud-ware. Supplies all the resources required to build applications and services
completely from the Internet, without having to download or install software.
1.7.2 IoT and Semantic Technologies

 Large number of highly distributed and heterogeneous devices in the IoT need to be
interconnected and communicate in different scenarios autonomously. This implies
that providing interoperability among the “Things” on the IoT is one of the most
fundamental requirements to support object addressing, tracking, and discovery as well
as information representation, storage, and exchange.
 The suite of technologies developed in the Semantic Web, such as ontologies, semantic
annotation, Linked Data and semantic Web services, can be uses as principal solutions
for the purpose of realising the IoT.
 Fig. 1.7.1 shows semantics in the IoT.

1 - 28 IoT and Applications


IoT and Web Technology

Fig. 1.7.1 : Semantics in the IoT

 Semantic technologies will also have a key role in enabling sharing and re-use of virtual
objects as a service through the cloud.
 Future research on IoT is likely to embrace the concept of Linked Open Data. This
could build on the earlier integration of ontologies (e.g., sensor ontologies) into IoT
infrastructures and applications.
 Linked Data is an approach to relate different resources and is currently adopted on the
Web. The four principles, of publishing data as linked data includes:
1. Using URI’s as names for things; everything is addressed using unique URI’s.
2. Using HTTP URI’s to enable people to look up those names; all the URI’s are
accessible via HTTP interfaces.
3. Providing useful RDF information related to URI’s that are looked up by machine
or people;
4. Linking the URI’s to other URI’s.
 The current linked open data effort on the Web provides a large of number of
interlinked data represented in RDF accessible via common standard interfaces. The
linked data approach is also applied to the IoT domain by providing semantic data and
linking it to other domain dependent resources such as location information and
semantic tags.
 The linked data approach enables resources described via different models and
ontologies to be interconnected. Linking the data to existing domain knowledge and
resources also makes the descriptions more interoperable.
1.7.3 Autonomy

 There is still a lack of research on how to adapt and tailor existing research on
autonomic computing to the specific characteristics of CPS, such as high dynamicity

1 - 29 IoT and Applications


IoT and Web Technology

and distribution, real-time nature , resource constraints and lossy environment. Most
existing research in self-aware IoT is lacking experimentation for validation.

 Autonomy in IoT can be realized by implementing self-managing systems. Self-


management is the property of a system to achieve management and maintenance of its
resources intrinsically and internally. Management and maintenance is realized through
many levels of decision making.
 In IoT, the management scope extends to access management, device management as
well as service management. Thus, for self-management, decision making in IoT should
pertain to this management scope of IoT.
 An Autonomic Computing (AC) system is required to be self-managing, with a
“minimum of human interference”
Characteristics of an AC System

1. Self-configuring : being able to modify interactions and behaviours based on


changes in the environment.
2. Self-healing : being able to discover, diagnose and prevent disruptions.
3. Self-optimizing : being able to tune resource usage and improve workload
balancing
4. Self-protecting : being able to detect, identify and protect against failure and
security attacks

1 - 30 IoT and Applications


IoT and Web Technology

1.8 Infrastructure

 The Internet of Things refers to the set of devices and systems that interconnect real-
world sensors and actuators to the Internet. This includes many different types of
systems, such as:
1. Mobile devices
2. Smart meters and objects
3. Wearable devices including clothing, health care implants, smart watches, and
fitness devices
4. Internet-connected automobiles
5. Home automation systems, including thermostats, lighting, and home security
6. Other measuring sensors for weather, traffic, ocean tides, road signals, and more
 Internet of Things applications require diverse sensors and actuators. IoT devices and
services should be able to connect seamlessly and on a plug-and-play basis. How your
device connects to the rest of the world is a key consideration for Internet of Things
products.
 To work with all features of Internet of Things, different types of application must run
on it. Devices used in the IoT, must support plug and play facility.
 The infrastructure needs to support applications in finding the things required. An
application may run anywhere, including on the things themselves. Finding things is not
limited to the start-up time of an application.
 IoT infrastructure has to support finding things according to location.
Infrastructure-related Research Questions

1. Low-power communication : Many IoT devices are small and do not have access
to a continuous power source. Battery size, lifetime, and cost impose significant
constraints on how these devices compute and communicate.
2. Computer networking researchers often grapple with questions of scale. For
example, today's Internet routing system interconnects more than 3 billion people,
more than a half million IP address blocks, and more than 50 thousand separately
administered networks. The networking community responded to the rapid growth
of the Internet by designing routing protocols, router architectures, and operational
practices to manage this kind of scale.
3. The unique properties of IoT devices have the potential make the underlying
network an even more important part of any viable defense. IoT devices may not

1 - 31 IoT and Applications


IoT and Web Technology

defend themselves appropriately, due to limited computing and power resources as


well as a lack of security expertise among device manufacturers and end users.
4. How IoT devices should support for security and privacy look?
5. How can the infrastructure support accounting and charging as the basis for
different IoT business models?
6. How to provide security and privacy functions at infrastructure level on the basis
of heterogeneous and resource limited components of the infrastructure?

1.9 Networks and Communication

 Internet of Things is an integrated part of Future Internet including existing and


evolving Internet and network developments.
 IoT allows communication among very heterogeneous devices connected via a very
wide range of networks through the Internet infrastructure. IoT devices and resources
are any kind of device connected to Internet, from existing devices, such as servers,
laptops, and personal computers, to emerging devices such as smart phones, smart
meters, sensors, identification readers, and appliances.
 Capturing real world data, information and knowledge and events is becoming
increasingly easier with sensor networks, social media sharing, location based services,
and emerging IoT applications. The knowledge capturing and using is done in many
cases at application level and the networks are mainly agnostic about what is happening
around the terminals connected to the Internet.
 Embedding real world information into networks, services and applications is one of
the aims of IoT technology by using enabling technologies like wireless sensor and
actuator networks, IoT devices, ubiquitous device assemblies and RFID.
 The Internet of Things infrastructure allows combinations of smart objects , sensor
network technologies, and human beings, using different but interoperable
communication protocols and realises a dynamic ultimodal/heterogeneous network that
can be deployed also in inaccessible, or remote spaces or in cases of emergencies or
hazardous situations.
 Network users will be humans, machines, things and groups of them.
 IoT research and development is becoming more complex, due to the already highly
advanced level of technology, the global, inter-sectoral and inter-disciplinary
collaboration needed and the ever increasing demands of society and the economic
global marketplace.

1 - 32 IoT and Applications


IoT and Web Technology

 Capabilities such as self-awareness, context awareness and inter-machine


communication are considered a high priority for the IoT. Integration of memory and
processing power, and the ability to withstand harsh environments are also a high
priority, as are the best possible security techniques.
 Capabilities such as self-awareness, context awareness and inter-machine
communication are considered a high priority for the IoT.
 New smart antennas that can be embedded in the objects and made of new materials are
the communication means that will enable new advanced communications systems on
chip.
 In the Internet of Things the following topics related to communication technology
have to be considered:
1. Communication to enable information exchange between “smart things/objects”
and gateways between those “smart things/objects” and Internet.
2. Communication with sensors for capturing and representing the physical world in
the digital world.
3. Communication with actuators to perform actions in the physical world triggered
in the digital world.
4. Communication with distributed storage units for data collection from sensors,
identification and tracking systems.
5. Communication for interaction with humans in the physical world.
6. Communication and processing to provide data mining and services.
7. Communication for physical world localization and tracking.
8. Communication for identification to provide unique physical object identification
in the digital world.
 IP provides today the protocol for implementing IoT applications. More research is
required for IP technology and eventually the development of different post IP
protocols optimized for IoT, compatible and interoperable with the exiting IP
technologies.
 Issues to be addressed :
1. Network technologies (fixed, wireless, mobile etc.).
2. Ad-hoc, wireless sensor networks.
3. Autonomic computing and networking.
4. Opportunistic networking

1 - 33 IoT and Applications


IoT and Web Technology

 IoT requires both an architecture and products that allow for the extension of Internet
technologies, in order to reach a Future Internet of Things, Services and People.
 The number of devices that are connected to the Internet is growing exponentially. This
has led to defining a new conception of Internet, the commonly called Future Internet,
which started with a new version of the Internet Protocol (IPv6) that extends the
addressing space in order to support all the emerging Internet-enabled devices.
 IPv6 is the fundamental technology for the IoT. It is estimated that several billion
things will be connected by 2020. Unlike IPv4, IPv6 can address this number of
objects. The IPv6 address space supports 2128 unique addresses

1.10 Processes

Adaptive and Event-driven Processes

 Processes become more adaptive after an IoT integration. Data collection is based on
event or entity. When data is collected from the sensor or real time data, integration
processes happens. Such events can occur at any time in the process.
 Event occurrence probability is very low. How to react to a single event can depend on
the context, i.e. the set of events that have been detected previously.
Processes Dealing with Unreliable Data

 When dealing with events coming from the physical world, a degree of unreliability and
uncertainty is introduced into the processes.
 If decisions in a business process are to be taken based on events that have some
uncertainty attached, it makes sense to associate each of these events with some value
for the quality of information.
Processes Dealing with Unreliable Resources

 Data as well as resources are inherently unreliable. This is because of failure of the
hosting device. Processes relying on such resources need to be able to adapt to such
situations. It is necessary to detect a failure.
 The quality of the generated reports should be regularly audited for correctness.

1.11 Data Management

 Data management is the ability to manage data information flow. With data
management in the management service layer, information can be accessed, integrated

1 - 34 IoT and Applications


IoT and Web Technology

and controlled. Higher layer applications can be shielded from the need to process
unnecessary data and reduce the risk of privacy disclosure of the data source.
 Data is received from the Sensors and actuators which is relayed by the micro-
controller through WiFi, GPRS, RFID, ZigBee and open connectivity to the Router.
These data has to be refined from the database or repository using the Data Mining
algorithms like clustering and classification which analyses semantically and
syntactically.
 Challenges and opportunities of data management are :
1. Data Collection and Analysis
2. Big Data
3. Semantic Sensor Networking
4. Virtual Sensors
5. Complex Event Processing.
Data Collection and Analysis (DCA)

 Main functions of a DCA module are as follows :


1. Data storing : Provides storage of the customer’s information collected by
sensors.
2. User data and operation modeling : Allows the customer to create new sensor
data models to accommodate collected information and the modelling of the
supported operations
3. On demand data access : Provides APIs to access the collected data
4. Customer rules/filtering : Allows the customer to establish its own filters and
rules to correlate events
5. Customer task automation : Provides the customer with the ability to manage his
automatic processes.
6. Customer workflows : Allows the customer to create his own workflow to
process the incoming events from a device
Big Data

 Big data is about the processing and analysis of large data repositories on Cloud
computing. Big document summarization method is an important technique for data
management of IoT.
 Traditional document summarization methods are restricted to summarize suitable
information from the exploding IoT big data on Cloud.

1 - 35 IoT and Applications


IoT and Web Technology

 Big data requires exceptional technologies to efficiently process large quantities of data
within a tolerable amount of time.
 Technologies being applied to big data include massively parallel processing (MPP)
databases, data-mining grids, distributed file systems, distributed databases, cloud
computing platforms, the Internet, and scalable storage systems.
 Companies focused on the big data topic, such as Google, Yahoo!, Face-book or some
specialised start-ups.
Semantic Sensor Networks and Semantic Annotation of Data

 The sensor networks range from tiny wireless artifacts to mobile devices (with many
sensors) to large scale systems (in smart cities and environmental monitoring
networks).
 Applications and users are typically interested in querying various events and
requesting measurement and observation data from the physical world.
 Integration of data from physical objects, using embedded processors and sensors, into
the Web is giving rise to the emergence of a new generation of systems.
 The incorporation of physical object data with the Web data, using
 information processing and knowledge engineering methods, enables the construction
of "‘intelligent and interconnected things"’ and "‘smart environments"’.
 Utilising semantic Web technologies in the sensor networks results in a new concept,
sometimes referred to as Semantic Sensor Networks.
 Sheth et al. propose annotating sensor data with spatial, temporal, and thematic
semantic metadata and refer to this as the Semantic Sensor Web (SSW). This approach
uses the current OGC and SWE specifications, extends them with semantic Web
technologies and provides enhanced machine-interpretable semantic descriptions.
 Associating sensor and sensor network data with other concepts (on the Web) and
reasoning the data makes this information widely available for different applications,
front-end services and data consumers.
 Semantics allow machines to interpret links and relations between the different
attributes of a sensor description and also other data existing on the Web or provided by
other applications and resources.
 Fig. 1.11.1 shows publishing data from sensors and services on the Web

1 - 36 IoT and Applications


IoT and Web Technology

Fig. 1.11.1 : Publishing data from sensors and services on the Web

 The example shows a parcel that is tagged with an RFID tag which is scanned every
time it is loaded or unloaded. The post delivery van has a GPS sensor which reports its
location and a twitter service is deployed to report the status of the parcel to interested
twitter followers.
 In a semantic integration scenario each of these sensors and services need to be able to
describe and/or discover what type of in-formation is published and who can use this
information. This includes the sensor or service descriptions and also the data reported
from sensors and services.
 Fig.1.11.2 shows a gateway component for Semantic Sensor Networks. The gateway
component is divided into three main layers.
 The connectivity layer establishes the connection with a capillary sensor network. A
connector modules for each supported sensor/protocol platform should be developed.
 External nodes directly connect to the gateway or use multi-hop connections. The
gateway provides a common interface which higher level applications and services can
access the under-lying sensor networks and their capabilities.
 When a new node is activated, the node context information is stored in the gateway
repository. The goal of storing this information is to obtain a semantic description that
other processes can exploit and infer the status and capabilities of each node.

1 - 37 IoT and Applications


IoT and Web Technology

Fig. 1.11.2 : Gateway component for semantic sensor networks

 The information processing layer uses the data from the connectivity layer and from the
context information to support query analysis and processing. To establish a reliable
connection between sensor nodes and gateway, a method similar to the association and
negotiation protocol in the IEEE 802.11 Standard’s negotiation steps is developed.
 The term “annotation” can denote both the process of annotating and the result of that
process. Semantic annotations, no matter inferred from the sensor data or provided by
users, represent the context data which can be utilised to create context-aware
applications.
Virtual Sensors

 Virtual sensors and actuators are a programming abstraction simplifying the


development of decentralized WSN applications.
 A virtual sensor is a software sensor as opposed to a physical or hardware sensor.
Virtual sensors provide indirect measurements of abstract conditions by combining
sensed data from a group of heterogeneous physical sensors.

1 - 38 IoT and Applications


IoT and Web Technology

Fig. 1.11.3 : A building fire control application

 For example, on an intelligent construction site, users may desire the cranes to have
safe load indicators that determine if a crane is exceeding its capacity. Such a virtual
sensor would take measurements from physical sensors that monitor boom angle, load,
telescoping length, two-block conditions, wind speed, etc
 Signals from these individual sensors can be used in calculations within a virtual sensor
to determine if the crane has exceeded its safe working load.
 Applications focus on a control loop where inputs are the data sensed in a given area of
the system, and outputs are the actions to be executed in a possibly different area. For
in-stance, in a building fire control system, shown in Fig. 1.11.3.
 A building fire control application. The control algorithm maps sensed inputs to output
commands. The sensing and acting tasks insist on different parts of the system.
 The virtualization of sensors can be considered at different levels and shows in
Fig. 1.11.4. At the lowest level are those related with the more local processing of
several simple measurements and at the highest level, the abstract combination of
different sensors at the application level.

1 - 39 IoT and Applications


IoT and Web Technology

Fig. 1.11.4 : Different levels for sensor virtualization

1.12 Security, Privacy and Trust

 The security of the Internet of Things, the following principles can be established.
a) Identity : Trust is always tied to an identity. Therefore every device needs a
unique identity that can't be changed. The device must also be able to prove its
identity at all times.
b) Positive intention : The device and linked service have positive intentions.
c) Predictability and transparency : The functional scope of the service provided by
devices is known to its full extent. There are no undocumented (secret) functions.
The behaviour of the system can be checked at any time by independent third
parties.
d) Reputation : An increasing number of positive interactions between the things
gradually form a reputation based intelligent network
Bringing Trust to the Internet of Things

 The Internet of Things touches many different sectors and applications, ranging from
connected cars to smart homes and intelligent infrastructure. This diversity has spawned
an ecosystem that consumers need to trust to keep their data protected.

1 - 40 IoT and Applications


IoT and Web Technology

1.13 Device Level Energy Issues

 One of the essential challenges in IoT is how to interconnect “things” in an


interoperable way while taking into account the energy constraints, knowing that the
communication is the most energy consuming task on devices.
 Low power communication technologies are as follows :
1. IEEE802.15.4 has developed a low-cost, low-power consumption, low complexity,
low to medium range communication standard.
2. Bluetooth low energy is the ultra-low power version of the Bluetooth technology.
3. Ultra-Wide Bandwidth (UWB) Technology is an emerging technology in the IoT
domain that transmits signals across a much larger frequency range than
conventional systems.
4. RFID/NFC proposes a variety of standards to offer contact less solutions.
Energy Harvesting

 It is a process by which energy is derived from external sources. Energy harvesters


provide a very small amount of power for low-energy electronics. The energy source
for energy harvesters is present as ambient background and is free
 Energy harvesting is a topic of substantial and increasing research attention, and
motion-driven devices represent a large fraction of this activity. Motion energy
harvesting devices are now offered commercially by several companies, mainly for
applications where machine vibration is the motion source, although body-powered
applications (particularly body sensor networks) are actively pursued.
 Energy harvesting (EH) must be chosen according to the local environment. For outside
or luminous indoor environments, solar energy harvesting is the most appropriate
solution. In a closed environment thermal or mechanical energy may be a better
alternative.
 The sources of energy available for harvesting are essentially of four forms : light,
radio-frequency (RF) electromagnetic radiation, thermal gradients, and motion,
including fluid flow.
 Solar cells are the most mature and commercially established energy-harvesting
solution.
 While cost is a key parameter for large-scale photovoltaic generation, at the small scale
of portable electronic devices this is less of an issue, and light avail-ability is instead the
key limitation.

1 - 41 IoT and Applications


IoT and Web Technology

 Low power devices are expected to require 50 mW in transmission mode and less in
standby or sleep modes. EH devices cannot supply this amount of energy in a
continuous active mode, but instead intermittent operation mode can be used in EH-
powered devices.
 The sensor node’s average power consumption corresponds to the total amount of
energy needed for one measurement cycle multiplied by the frequency of the operation

1.14 IoT Related Standardization

 Standards mean in general common methods, norms and regulations, based on which
some work must be done, some product or service must be produced or some actions be
conducted. Standards can be official and binding (de jure).
 De facto standards can be formed by companies or groups of companies (interest
groups, consortia, alliances, associations, etc.) which have come first into the market or
application area and therefore the used methods/protocols etc. have become de facto
standards. Standards play an important role in applying new technologies. With
standards different actors in industry and in ecosystems can utilize similar and
connective systems.
 Standards are published documents that establish specifications and procedures
designed to maximize the reliability of the materials, products, methods, and/or services
people use every day. Standards address a range of issues, including but not limited to
various protocols to help maximize product functionality and compatibility, facilitate
interoperability and support consumer safety and public health.
 Fig. 1.14.1 shows standardization process.

Fig. 1.14.1

1 - 42 IoT and Applications


IoT and Web Technology

Interoperability and Open Standard Development

 With the popularity of IoT devices, many IoT protocols and standards have been
developed. In contrast to ordinary computers, IoT devices are normally constrained
when it comes to memory space and processing capacity.
 In addition, IoT devices may be deployed where there is no or limited access to a power
grid, which means that they need to operate under power supply from batteries or small
solar panels.
 As a consequence, power-efficient communication protocols with small memory
footprints and limited demands on processing have been developed to support IoT
devices.
 IoT protocols have been standardized on virtually all layers of the protocol stack.

IoT and Web Technology ends….

1 - 43 IoT and Applications


IoT and Web Technology

Notes

1 - 44 IoT and Applications


M2M to IoT

Chapter - 2
M2M TO IOT
Syllabus : A Basic Perspective- Introduction, Some Definitions, M2M Value Chains, IoT
Value Chains, An emerging industrial structure for IoT, The international
driven global value chain and global information monopolies.
M2M to IoT : An Architectural Overview - Building an architecture, Main
design principles and needed capabilities, An IoT architecture outline, standards
considerations.

Section Topic Name Page No.


No.
2.1 Introduction of M2M Basic Perspective 2-2

2.2 Some Definition 2-6

2.3 M2M Value Chains 2-9

2.4 IoT Value Chains 2 - 10

2.5 An Emerging Industrial Structure for IoT 2 - 13

2.6 The International Driven Global Value Chain and Global Information 2 - 17
Monopolies

2.7 M2M to IoT an Architectural Overview 2 - 18

2.8 Main Design Principles and Needed Capabilities 2 - 19

2.9 An IoT Architecture Outline 2 - 22

2.10 Standards Considerations 2 - 24

2-1 IoT and Applications


M2M to IoT

2.1 Introduction of M2M Basic Perspective

 In just the last few years, we have moved beyond simply using our machines to connect
with other people and can now program them to connect directly to one another,
allowing for the collection and processing of information on an unprecedented scale.
The new connectivity of both physical infrastructure and devices is being referred to as
the ‘industrial internet’ or the ‘internet of things’, while the technology that facilitates
this connectivity is most commonly called ‘Machine-to-Machine’ (M2M).
 At the first look, it may appear that Machine-to-Machine (M2M) communications and
IoT denote the same thing. In reality, M2M is only a subset of IoT. IoT is a more
encompassing phenomenon because it also includes Human-to-Machine communication
(H2M).
 By 2020, there will be 12.5 billion M2M devices globally, up from 1.3 billion devices
today (Hatton 2012). To put this in perspective, mobile internet use, which is also fast
becoming a part of our daily experience, is growing at only a fraction of the rate of
M2M, and the 400 million mobile internet users of 2007 are predicted to grow to two
billion users by 2015 (richmond 2011).
 Radio Frequency Identification (RFID), Location-Based Services (LBS), Lab-on-a-
Chip (LOC), sensors, Augmented Reality (AR), robotics and vehicle telematics, which
are some of the technology innovations that employ both M2M and H2M
communications.
 M2M communication is the communication among the physical things which do not
need human intervention.
 M2M communication is a form of data communication that involves one or more
entities that do not necessarily require human interaction or intervention in the process
of communication. M2M is also named as Machine Type Communication (MTC) in
3GPP.
 M2M communication could be carried over mobile networks (e.g. GSM-GPRS, CDMA
EVDO networks). In the M2M communication, the role of mobile network is largely
confined to serve as a transport network.
Key features of M2M

 Some of the key features of M2M communication system are given below :
1. Low mobility : M2M devices do not move and if moves only within a certain
area.

2-2 IoT and Applications


M2M to IoT

2. Time controlled : Data can be send or receive only at certain pre - defined time
periods.
3. Time tolerant : Sometimes data transfer can be delayed.
4. Packet switched : Network operator to provide packet switched service.
5. Online small data transmissions : Devices frequently send or receive small
amounts of data.
6. Low power consumption : To improve the ability of the system to efficiently
service M2M applications.
7. Location specific trigger : Intending to trigger M2Mdevice in a particular area e.g.
wake up the device.
 M2M solutions allow end-users to capture data about events from assets, such as
temperature or inventory levels. Typically, M2M is deployed to achieve productivity
gains, reduce costs and increase safety or security. M2M has been applied in many
different scenarios, including the remote monitoring and control of enterprise assets or
to provide connectivity of remote machine-type devices.
2.1.1 Architecture and Components of M2M

 Fig. 2.1.1 shows M2M architecture.

Fig. 2.1.1 : M2M architecture


 The system components of an M2M solution are as follows :
1. M2M Device : A device that runs application(s) using M2M capabilities and
network domain functions. An M2M device is either connected straight to an
access network or interfaced to M2M gateways via an M2M area network.

2-3 IoT and Applications


M2M to IoT

2. M2M area network : A M2M area network provides connectivity between M2M
devices and M2M gateways. Examples of M2M area betworks include : Personal
area network technologies such as IEEE 802.15, SRD, UWB, Zigbee, Bluetooth,
etc or local networks such as PLC, M-BUS, Wireless M-BUS.
3. M2M gateways : Equipments using M2M capabilities to ensure M2M devices
interworking and interconnection to the network and application domain. The
M2M gateway may also run M2M applications.
4. M2M applications server : Applications that run the service logic and use service
capabilities accessible via open interfaces.
5. M2M application : The application component of the solution is a realization of the
highly specific monitor and control process. The application is further integrated
into the overall business process system of the enterprise.
 Fig. 2.1.2 shows generic M2M solution.

2-4 IoT and Applications


M2M to IoT

Fig 2.1.2 Generic M2M solution


 A number of sub-sets of users of M2M services can be identified : Consumers in the
home, business users and facility managers, city governments, logistics businesses,
energy providers and more.
2.1.2 Key Application Area

1. Security : Surveillances, Alarm systems, Access control, Car/driver security


2. Tracking and tracing : Fleet Management, Order Management, Pay as you drive, Asset
Tracking, Navigation, Traffic information, Road tolling, Traffic optimization/steering
3. Payment : Point of sales, Vending machines, Gaming machines.
4. Health : Monitoring vital signs, Supporting the aged or handicapped, Web Access
Telemedicine points, Remote diagnostics.
5. Remote maintenance/control : Sensors, Lighting, Pumps, Valves, Elevator control,
Vending machine control, Vehicle diagnostics.
6. Metering : Power, Gas, Water, Heating, Grid control, Industrial metering.
7. Manufacturing : Production chain monitoring and automation.
8. Facility management : Home / building / campus automation.
Sr. No. Industry/Vertical M2M applications
1. Automotive Passenger vehicle anti theft/recovery, monitoring/
maintenance, safety/control, entertainment.
2. Transportation Fleet management, asset tracking telematics manufacturing
and logistics.
3. Utilities/ Energy Smart metering, smart grid, electric line monitoring ,
gas/oil/water pipeline monitoring.
4. Security Commercial and home security monitoring, surveillance
applications, fire alarm, police/medical alert.
5. Financial/Retail Point of sale (POS), ATM Kiosk, vending machines, digital
signage and handheld terminals.

2-5 IoT and Applications


M2M to IoT

6 Health care Remote monitoring of patient after surgery (e-health),


remote diagnostics, medication reminders, tele-medicine.
7. Public saftey Highway, bridge traffic management, homeland security,
police, fire and emergency services.
India Market Scenario

 As per projections by Ericssion, Indian M2M market may rise from 30 Million in 2013
to more than 250 million in 2020. Automotive (connected vehicles) is having a market
share of 45 % and Energy (smart meters) 23 %.
 Other applications are Point of sale (POS), health care, security and surveillance,
intelligent buildings, smart homes etc. M2M applications will make the living smart
and improve the quality of life.
2.1.3 Comparison of M2M and IoT

Machine-to-Machine Internet of Things


It support single application with single It support multiple application with multiple
device device
It is communication and device centric It is information and service centric
It support closed business operations It support open market place
M2M uses vertical system solution IoT uses horizontal enabler approach
approach
It requires specialized device solutions It requires generic commodity devices
Used in B2B Used in B2B and B2C

2.2 Some Definition

 Global value chains : A value chain describes the full range of activities that firms
and workers perform to bring a product from its conception to end use and beyond,
including design, production, marketing, distribution, and support to the final
consumer.
 Fig. 2.2.1 shows simplified value chain. It consists of five separate activities that work
together to create a finalized product.

2-6 IoT and Applications


M2M to IoT

Fig. 2.2.1 : Simplified value chain


 Each of the segments identified in the previous step have specific characteristics and
dynamics, such as particular sourcing practices or preferred suppliers.
 For example, in the fruits and vegetable value chain, the inputs for the “processing”
segment may come from fruits that were intended for export but did not meet the
quality controls or it may come from production grown exclusively for processing.

Fig. 2.2.2 : Fruit and vegetables global value chain

2-7 IoT and Applications


M2M to IoT

 It is important to identify the type of companies involved in the industry and their key
characteristics : Global or domestic; state-owned or private; large, medium or small;
etc. Identifying the firms that participate in the chain will help to understand its
governance structure.
 International production processes have become characterized by inter-firm networks
that span borders. We call these networks global value chains.
 Fig. 2.2.2 shows fruit and vegetables global value chain.
What is a global value chain ?

 The value chain describes the full range of activities that firms and workers perform to
bring a product from its conception to end use and beyond. This includes activities such
as design, production, marketing, distribution and support to the final consumer. In the
context of globalization, the activities that constitute a value chain have generally been
carried out in inter-firm networks on a global scale. By focusing on the sequences of
tangible and intangible value-adding activities, from conception and production to end
use, GVC analysis provides a holistic view of global industries.

Fig. 2.2.3
 There are four basic dimensions that GVC methodology explores :
1) An input-output structure, which describes the process of transforming raw
materials into final products;
2) A geographical consideration;
3) A governance structure, which explains how the value chain controlled; and
4) An institutional context in which the industry value chain is embedded.
 GVCs have several attributes, one of them being governance.
 Governance analysis allows one to understand how a chain is controlled and
coordinated when certain actors in the chain have more power than others. Gereffi

2-8 IoT and Applications


M2M to IoT

defines governance as ‘authority and power relationships that determine how financial,
material and human resources are allocated and flow within a chain.
 In GVC the most value creation is often found in :
1. Upstream activities such as design, product development, R&D and
manufacturing of key parts and components;
2. Downstream activities such as marketing, branding and customer service.
Ecosystems vs. value chains

 The concept of the business ecosystem was introduced by James F. Moore in 1993 with
the description :
An economic community supported by a foundation of interacting organizations and
individuals, the organisms of the business world. This economic community produces
goods and services of value to customers, who are themselves members of the
ecosystem. The member organizations also include suppliers, lead producers,
competitors and other stakeholders. Over time, they co-evolve their capabilities and
roles and tend to align themselves with the directions set by one or more central
companies. Those companies holding leadership roles may change over time, but the
function of ecosystem leader is valued by the community because it enables members to
move toward shared visions to align their investments and to find mutually supportive
roles.
 Business ecosystem is a dynamic structure of interconnected organization that depends
on each other from mutual survival.
 Value chain is associated with the creation of valueit is the instantiation of exchange by
a certain set of companies within an ecosystem.

2.3 M2M Value Chains

 The “value chain” has been a basic business concept for many years. Each link in the
chain “adds value” in a somewhat linear progression from raw materials to finished
products or services. It is a useful concept for identifying key elements in the route to
market for new product ideas and for highlighting where new profits can be made.
 Fig. 2.3.1 shows M2M value creation chain.
 Inputs : It is raw material which converted into product. For example : Information is
converted into required data. Coal mined for making domestic steel.
 Production or manufacture : It processes the raw inputs which becomes a part of a
value chain. Data from an M2M solution, meanwhile, needs to be verified and tagged
for provenance.

2-9 IoT and Applications


M2M to IoT

 Processing : Product is prepared for sale.

Fig. 2.3.1 : M2M value creation chain


 Packaging : Packaging refers to the process whereby a product can be branded as
would be recognizable to end-user consumers.
 Distribution/Marketing : This process refers to the channels to market for products.
2.4 IoT Value Chains
 IoT value chains based on data are to some extent enabled by open APIs and the other
open web-based technologies.

Fig. 2.4.1 : Information-driven value chain for IoT

2 - 10 IoT and Applications


M2M to IoT

 Required data is collected from publicly available resources and take from other
company data. An information marketplace is available in world for getting data.
 It should be noted that such a marketplace could still be internal to a company or
strictly protected between the value chains of several companies.
 Open APIs allow for the knowledge contained within different technical systems to
become unembedded, creating the possibility for many different economic entities to
combine and share their data as long as they have a well-defined interface and
description of how the data is formatted.
 Fig. 2.4.1 shows an Information-Driven Value Chain for IoT.
M2M value chain IoT value chain Description
Input Sensors Similar to M2M device solution.
Open data Provided by government and city
organizations.
Operational support Used increasingly in tightly closed
systems / business information marketplaces.
support systems
Corporate database Contains various database like supply
chain management, payroll, accounting etc.
Production Asset Information It store information like temperature over
time of container during transit or air
quality during a particular month.
Open data sets It may include maps, rail timetables or
demographics about a certain area.
Network information Contains GPS data, services accessed via
the mobile network.
Corporate information Current state of demand for a particular
product in the supply chain at a particular
moment in time.
Processing Data combination Data is mixed together from various
sources.
Packaging Information components Packaging section of the information value
chain creates information components.
Distribution and Information product Company may have market information
marketing about a certain area of town.

2 - 11 IoT and Applications


M2M to IoT

 ‘Intelligence’ is imparted through a process of generating and sharing information


between these ‘things’. Therefore connectivity is an essential element where today there
are a number of open and proprietary standards governing connectivity between devices
and networks.
 Connectivity enables applications that take advantage of the connected devices to create
value to the end user. The applications are managed through platforms that provide
critical and value added business support services such as device management, security,
accounting and billing, data management and analytics, etc., to breathe life into the IoT
infrastructure.
 Fig. 2.4.2 shows IoT value stack.

Fig. 2.4.2 : IoT value stack

 From a value perspective, value will be appropriated by each layer of the IoT model :
Device, connectivity, applications, platforms and services. Devices and connectivity are
viewed as commodities with consequently low value appropriation whereas in
applications, platforms and services is where the value lies because that’s where the
‘brains’ of the operation resides as opposed to the connected limbs and veins that
represent devices and connectivity.

2.5 An Emerging Industrial Structure for IoT

 The Internet of Things is a network of networks where, typically, a massive number of


objects /things/ sensors/ devices are connected through communications and
information infrastructure to provide value-added services.
 The Industrial Internet of Things (Industrial IoT) is made up of a multitude of devices
connected by communications software. The resulting systems and even the individual

2 - 12 IoT and Applications


M2M to IoT

devices that comprise it, can monitor, collect, exchange, analyze and instantly act on
information to intelligently change their behavior or their environment -- all without
human intervention.
 Fig. 2.5.1 shows relation between industrial IoT and IoT

Fig. 2.5.1 : Relation between industrial IoT and IoT

 The industrial IoT connects critical machines and sensors in high-stakes industries such
as aerospace and defense, healthcare and energy. These are systems in which failure
often results in life-threatening or other emergency situations.
 The industrial IoT as the infrastructure that must be built before IoT applications can be
developed. In other words, the IoT, to some extent, depends on the Industrial IoT.
2.5.1 Information-Driven Global Value Chain

 Organization and others are play an important role. They are as follows :
1. Inputs : Sensors, RFID, other devices and end-users.
2. Data factories
3. Service providers/data wholesalers
4. Intermediaries
5. Resellers
 Fig. 2.5.2 shows the information-driven global value chain.

2 - 13 IoT and Applications


M2M to IoT

Fig. 2.5.2 : The information-driven global value chain

Inputs to the information-driven global commodity chain

 Information-driven global commodity chain (I - GVC) uses two main input. They are
sensors and end users.
 These two inputs supply small amount of data to I-GVC. These data is aggregated,
analyzed, repackaged and exchanged between the different economic think-tankers that
form the value chain.
 Sensor devices and networks, RFIDs, mobile and consumer devices, Wi-Fi hotspots and
end-users all form part of a network of “subcontractors” in the value chain, all
contributing to the increased value of the information products.
 Sensors may send data to custom gateway devices and then push to the cloud over
GSM or WiFi. In such situations, cloud services push the outcome to a mobile device to
update the user on the real-time activities.

2 - 14 IoT and Applications


M2M to IoT

 Smart phones have also been developed that allow mobile devices to interact with
sensors and RFID.
 End user is one of inputs to I-GVC. In the digital economy, however, more than
4 billion individuals are now connected via mobile devices, which will soon have
access to cloud computing capabilities.
 Individuals, sensors and a multitude of devices are able to transmit data about their
environments to computing facilities that can then process it into information.
 End users them-selves now play a large role in the emerging industrial structure of the
communications industries, the value chain would not exist without the contribution of
their data.
 More importantly, perhaps, data is a unique commodity, it is not consumed in the
process of producing a product. Steel, for example is used up and consumed in the
process of creating a car. Its value can therefore be viewed in terms of its purchase cost
and the value an end user receives from the steel used to build a car.
 Data, in contrast to traditional commodities, has a value not just in exchange and in its
use, but also in its reuse. It is possible to re-form data into many different information
products and to resell it many times over.
 The raw inputs may, however, be reused again and again in order to develop new
products and extend existing ones.
Production processes of the information-driven global value chain
Data factories :

 Data factory has a few key entities that work together to define input and output data,
processing events and the schedule and resources required to execute the desired data
flow. It produce data in digital forms for use in other parts of the I-GVC.
 Data factory is a cloud-based data integration service that automates the movement and
transformation of data. You can create data integration solutions using the data factory
service.
 Data factories are those entities that produce data in digital forms for use in other parts
of the I-GVC.
 Some organization and company collects various information from the field and
prepare the map for purchase. Such data factories would create paper-based pro-ducts
and sell them to end-users via retailers. But in the digital era, these companies now also
provide this data via digital format.

2 - 15 IoT and Applications


M2M to IoT

Service providers and data wholesalers :

 Service providers and data wholesalers are collect data from various sources
worldwide. This massive database is used to improve their own information product or
sell information products in various forms.
 Twitter, facebook, google are example of this type of company.
 Facebook requires massive storage infrastructure to house its enormous stockpile of
photos, which grows steadily as users add hundreds of millions of new photos every
day and as it expands its platform capabilities to support video.
 With facebook eclipsing 900 million users and twitter closing in on 150 million, owned
and earned media are now richer sources of data that include new data types that
weren’t available to marketers in the past, specifically those types that involve user
behaviors, intentions and affinities.
 In exchange for freely distributing a sharing widget, companies like share this target
users by tracking users’ sharing activity through the network of websites that have the
widget installed. They collect data about what users like, read, share, save and more.
This data is then augmented with additional targeting data and sold at a premium.
Intermediaries

 There is a need for intermediaries that handle several aspects of the production of
information products. There are many privacy and regional issues associated with the
collection of personal information.
 Transaction cost is reduced by using intermediaries with the establishment of a market
for many different companies to participate in.
Resellers

 Reseller’s collects information from various sources, combine it together, analyze it and
sell it to end user or other organization.
 Among the most common value-added resellers are computer retailers and service
companies, automobile dealerships and furniture stores. Value-added resellers are
businesses that sell products manufactured by other companies in addition to selling
their own supplemental products and services, thereby increasing the value of the resold
product purchased by the consumer.
 The data and tools available today can give you the insight you need to improve
marketing and advertising performance.

2 - 16 IoT and Applications


M2M to IoT

2.6 The International Driven Global Value Chain and Global


Information Monopolies

 Globalization has given rise to a new era of international competition that is best
understood by looking at the global organization of industries and the ways in which
countries rise and fall within these industries.
 Fig. 2.6.1 shows data collection map : An example of how data is collected with just
15 minutes of a web surfing session. Browse the web normally. As you does, the graph
in this popup will change and the icon in the toolbar will animate.
 Each circle in the graph represents a site that’s been sent some of your personal
information. Circles with a halo are sites you’ve visited. Circles without a halo are sites
you haven’t.
 Through being able to collect and analyze data without being restricted by the same
level of privacy regulation as in Europe, for example, they are able to create a much
better information product. Companies in Europe, Asia and other parts of the globe are
therefore dependent on these companies in order to gain the most appropriate
knowledge for their companies’ needs.

Fig. 2.6.1 : Data collection map

2 - 17 IoT and Applications


M2M to IoT

2.7 M2M to IoT an Architectural Overview

 The Internet of things domain will encompass an extremely wide range of technologies,
from stateless to stateful, from extremely constrained to unconstrained, from hard real
time to soft real time.
 So single reference architecture cannot be used as a blueprint for all possible concrete
implementations. While a reference model can probably be identified, it is likely that
several reference architectures will co-exist in the Internet of things.
 Architecture in this context is defined as a framework for the specification of a
network's physical components and their functional organization and configuration, its
operational principles and procedures, as well as data formats used in its operation.
 For example, the RFID tag based identification architecture may be quite different from
a sensor-based architecture, which is more comparable to the current Internet. There
will also be several types of communications models such as : Thing to application
server, thing to human or thing to thing communication.
2.7.1 Building Architecture

 Fig. 2.7.1 shows how to build a system solution from reference architecture.
Architecture contains information about main conceptual elements, the actual elements
of a target system and the relation between them. It also includes principles for the
design of the architecture.
 A conceptual element refers to an intended function, a piece of data or a service. An
actual element refers to a technology building block or a protocol.
 The reference architecture is related to the generalized model. It contains set of
elements and relations that are of relevance to the domain IoT.
 Reference architecture can be used to select the best delivery method for particular
technologies within an IT service catalog. A reference model is an abstract framework
for understanding significant relationships among the entities of some environment.
 Reference architecture is used to design applied architecture.

Fig. 2.7.1 : How to build a system solution from reference architecture


 Reference architecture model must includes overall objective for the architecture as
well as design principles.

2 - 18 IoT and Applications


M2M to IoT

 Reference architecture tries to show the most complete picture of what is involved in
realizing the modeled entities. It is possible to define reference architectures at many
levels of detail or abstraction and for many different purposes.
 Fig. 2.7.2 shows problem and solution domain partitioning.

Fig. 2.7.2 : Problem and solution domain partitioning

Layers Domain Functions


Needs problems constraints Problem domain 1. Application needs and scenarios
2. Business and technical constraints
3. Requirements
Concepts base technologies Solution domain 1. Design objectives and principles
2. Architecture views
3. Needed capabilities and functions
4. Technology components
System solution Solution domain 1. System design
2. Deployment view
3. Software components
4. Hardware components

2.8 Main Design Principles and Needed Capabilities

 IoT-A technical objective was to create the architectural foundations of the future
Internet of things, allowing seamless integration of heterogeneous IoT technologies into
a coherent architecture and their federation with other systems of the future Internet.

2 - 19 IoT and Applications


M2M to IoT

 In this context an architectural reference model for the interoperability of IoT systems
was introduced. The project also focused on other technological issues, such as
scalability, mobility, management, reliability, security and privacy.
 In the SENSEI project the focus has been drawn on the realization of ambient
intelligence in a future network and service environment. In this environment,
heterogeneous Wireless Sensor and Actuator Networks (WSAN) are integrated into a
common framework of global scale and make it available to services and applications
via universal service interfaces.
IoT-A architectural reference model

 European Commission within the Seventh Framework Program (FP7) has supported
the proposed project; IoT-A by Martin Bauer and et.al. The recommended reference
architecture provided high-level architectural views and perspectives for constructing
IoT systems.
 Views : Different angles for viewing an architecture that can be used when designing
and implementing it.
 There are different approached adapted by the industry and standardization bodies
towards defining an acceptable reference architecture.
 The European project SENSEI has undertaken one such initiative towards integrating
the physical world with the digital world of the future internet. The objective is to
develop an architecture and technology building blocks to achieve the integration of the
two realms - Physical and Digital.
 The approach followed by ETSI is to define the M2M service requirements based on a
set of M2M use cases and then to specify the architecture along with the associated
system interfaces.
 Finally, the approach followed by IOT-A is based on Architecture Reference Model
(ARM). The vision of IoT-A is to establish, via the ARM, a means to achieve a high
degree of interoperability between different IoT solutions at the different system levels
of communication, service and information.
 The main goal of SENSEI is to integrate the physical with the digital world of the
network of the future.
 Behind the concept of SENSEI is the idea of sensors, actuators and efficiently
networked nodes deployed everywhere and interconnected. They are accessible and
manageable through a global and pluggable sensor and actuator networking framework.

2 - 20 IoT and Applications


M2M to IoT

 It allow the connection of present and future networks, via the network support
interface.
 The architecture relies on the separation of resources providing sensing and actuation
from the actual devices, a set of contextual and real world entity-centric ser-vices and
the users of the services.
 IoT-A refers to as the Architectural Reference Model (ARM). The vision of IoT-A
is, via the ARM, to establish a means to achieve a high degree of interoperability
between different IoT solutions at the different system levels of communication, service
and information.
 Introducing the IoT-A tree :
1. A generic reference model, derived from Business considerations, application-
based requirements and current technologies,
2. Able to generate different reference architectures depending on domain-specific
requirements.
3. To be used as a blueprint for concrete architecture design.
 Reference model : A reference model is an abstract framework for understanding
significant relationships among the entities of some environment. It enables the
development of specific reference architectures. A Reference Model consists of a
minimal set of unifying concepts, axioms and relationships
 Reference architecture : A reference architecture is an architectural design pattern that
indicates how an abstract set of relationships realizes a set of requirements. The main
purpose of a RA is to provide guidance for the development of concrete architectures.
More reference architectures may be derived from a common reference model.

Fig. 2.8.1 : Architectural reference model

2 - 21 IoT and Applications


M2M to IoT

IoT architecture objective

1. The overall design objective of IoT architecture shall be to target a horizontal system of
real-world services that are open, service-oriented, secure and offer trust.
2. Design for reuse of deployed IoT resources across application domains.
3. Design for a set of support services that provide open service-oriented capabilities and
can be used for application development and execution.
4. Design for different abstraction levels that hide underlying complexities and
heterogeneities.
5. Design for sensing and actors taking on different roles of providing and using services
across different business domains and value chains.
6. Design for ensuring trust, security and privacy.
7. Design for scalability, performance and effectiveness.
8. Design for evolvability, heterogeneity and simplicity of integration
9. Design for simplicity of management.
10. Design for different service delivery models.
11. Design for lifecycle support.

2.9 An IoT Architecture Outline

 Fig. 2.9.1 shows functional layers and capabilities of an IoT solution.

Fig. 2.9.1 : Functional layers and capabilities of an IoT solution


1. Asset layer represents the real-world objects subject to monitoring and control
having digital representations and identities. Assets can be physical or virtual,
animate as well as inanimate.

2 - 22 IoT and Applications


M2M to IoT

2. Resource layer provides the functional capabilities of sensing, actuation and


embedded identities. The sensors and actuators are embedded in physical objects,
are linked through wired and wireless networks using the same IP protocol that
connects the Internet.
3. Communication layer provides the means of connectivity between the entities.
LANs, WANs, wireless personal area networks, bluetooth or its variant Bluetooth
Low Power are few examples. There are also legacy and industry-specific non-IP
protocols which are now migrating towards IP. IEEE 802.15.4 is one such
standard. The IEEE standard 802.15.4 offers physical and media access control
layers for low-cost, low-speed, low-power Wireless Personal Area Networks
(WPANs). Possible application scenarios are home networks, automotive
networks, industrial networks, remote metering to just name a few.
4. Service support layer simplifies the IOT applications by performing common and
routine task for the applications.
5. Data and information layer supports advanced control logic besides capturing
knowledge through a framework called KMF (Knowledge Management
Framework). The KMF integrates anything from single pieces of data from
individual sensors to highly domain-specific expert knowledge into a common
knowledge fabric.
6. Application layer provides the specific IOT application. This is an open-ended
array of different applications. Examples are asset management, industrial
automation, smart grid, commercial building automation, smart cities, smart
homes, smart factories, smart transport, participatory sensing to just name a few.
7. Business layer supports the core business of any enterprise interested in the IOT
application. Business layer is where the IOT applications are integrated into
business processes and enterprise systems.
 In addition to the aforementioned functional layers, there are three functional groups
spanning across the functional layers - management, security, IOT data and services.
1. Management deals with the management of the various parts of the system
solution related to its operation, maintenance, administration and provisioning.
2. Security is about protection of the system, its information and services from
external threats or any other harm. Security measures provide communication
security, information security. Trust and identity management, authentication and
authorization, privacy protection are the key capabilities.

2 - 23 IoT and Applications


M2M to IoT

3. Data and service processing can be topologically distributed. Sensor nodes in the
WSAN (Wireless Sensor and Actor Networks) can handle the basic data
processing while further processing and aggregation can take place higher up in
the network topology.

2.10 Standards Considerations

 Although the establishment of standards is necessary for market acceleration, true


interoperability will be realized through middleware (inter-standards “glue”) that fills
the gaps between standards that do not fully meet the needs of the market.
 After the standards have been defined, IoT platform vendors will need to develop
middleware to create interoperability between each of the technologies defined by
SDO-ratified standards.
 Standards are needed for interoperability both within and between domains. Within a
domain, standards can provide cost efficient realizations of solutions, and a domain
here can mean even a specific organization or enterprise realizing an IoT.
 Between domains, the interoperability ensures cooperation between the engaged
domains and is more oriented towards a proper “Internet of Things”. There is a need to
consider the life-cycle process in which standardization is one activity.
 Significant attention is given to the “pre-selection” of standards through collaborative
research, but focus should also be given to regulation, legislation, interoperability and
certification as other activities in the same life-cycle. For IoT, this is of particular
importance.
 IERC is working to create a reference for pre-standardisation activities of EC IoT
research projects that is the base for the position paper and the IoT standardisation
roadmap. This effort has as goal to increase overall efficiency and raise mutual
awareness, defragment and synergize in one unique place important information for
stakeholders : Industry, Standard Development Organisations (SDOs), European
Commission (EC).

M2M to IoT ends….

2 - 24 IoT and Applications


IoT Reference Architecture

Chapter - 3
IOT REFERENCE ARCHITECTURE
Syllabus : IoT Architecture -State of the Art – Introduction, State of the art,
Architecture Reference Model- Introduction, Reference Model and
architecture, IoT reference Model, IoT Reference Architecture-
Introduction, Functional View, Information View, Deployment and
Operational View, Other Relevant architectural views.

Section Topic Name Page No.


No.
3.1 State of the Art 3-2
3.2 Architecture Reference Model 3 - 14
3.3 IoT Reference Model 3 - 16
3.4 IoT Reference Architecture 3 - 24

3-1 IoT and Applications


IoT Reference Architecture

3.1 State of the Art

 Several Reference Architectures and Models exist both for M2M and IoT systems.
 The use of standards
1. Ensures interoperable and cost-effective solutions
2. Opens up opportunities in new areas
3. Allows the market to reach its full potential
 The more things are connected, the greater the security risk. So security standards are
also needed to protect the individuals, businesses and governments which will use the
IoT.
3.1.1 European Telecommunications Standards Institute M2M/oneM2M

 The European Telecommunications Standards Institute (ETSI) produces globally-


applicable standards for Information and Communications Technologies, including
fixed, mobile, radio, converged, broadcast and Internet technologies.
 A new ETSI Technical Committee is developing standards for M2M Communications.
This group aims to provide an end-to-end view of M2M standardization cooperating
with ETSI's activities on Next Generation Networks and 3GPP standards initiative for
mobile communication technologies.
 The ETSI M2M specifications are based on specifications from ETSI as well as other
standardization bodies such as the IETF (Internet Engineering Task Force), 3GPP (3rd
Generation Partnership Project), OMA (Open Mobile Alliance), and BBF (Broadband
Forum).
 Goals of ETSI TC M2M :
1. To develop and maintain an end-to-end overall telecommunication high level
architecture for M2M
2. To identify gaps where existing standards and provide specifications to fill these
gaps
What is ETSI’s Technical Committee M2M

 ETSI TC M2M focuses on M2M system.


 Established in 2009, after 8 months preparation.
 Monthly plenary- and rapporteurs meetings, conference calls.
 Liaisons and cooperation with other SDOs, consortia.
 Constantly increasing participation (group of 50 - 70 people).

3-2 IoT and Applications


IoT Reference Architecture

 Europe, N. America, China, Korea and Japan companies (currently about 30 %


operators and 60 % Manufacturers).
 Open approach, published and draft TR/TS are public on the ETSI server.
ETSI TC M2M has the responsibility

1. To collect and specify M2M requirements from relevant stakeholders;


2. To develop and maintain an end-to-end overall high level architecture for M2M;
3. To identify gaps where existing standards do not fulfil the requirements and provide
specifications and standards to fill these gaps, where existing standards bodies or groups
are unable to do so;
4. To provide the ETSI main centre of expertise in the area of M2M;
5. To co-ordinate ETSI’s M2M activity with that of other standardization groups and fora.
ETSI M2M high-level architecture

 Fig. 3.1.1 shows the high-level ETSI M2M architecture.

Fig. 3.1.1 : High-level ETSI M2M architecture

3-3 IoT and Applications


IoT Reference Architecture

 A high-level architecture of M2M system consists of a Device and Gateway Domain,


and a Network Domain. The device and gateway domain is composed of the following
elements :
1. M2M Device runs M2M Device Applications (DA) using M2M Device Service
Capabilities Layer (DSCL).
2. M2M Gateway runs M2M Gateway Applications (GA) using M2M Gateway
Service Capabilities Layer (GSCL).
3. M2M Area Network provides connectivity based on Personal or Local Area
Network technologies (e.g. Zigbee, Bluetooth) between M2M devices and M2M
gateways. The case of device-to-device communication is out of the scope of
ETSI's effort.
 Network domain contains the following elements :
1. M2M Access Network : It allows M2M devices and M2M gateways to
communicate with the core network. It uses any one network solutions : Digital
Subscriber Line (DSL), satellite, GSM EDGE Radio Access Network (GERAN),
Universal Terrestrial Radio Access Network (UTRAN), evolved UTRAN
(eUTRAN), Wi-Fi (IEEE 802.11), and Worldwide Interoperability for Microwave
Access (WiMAX), that can be optimized for M2M communication if needed.
2. M2M Core Network : This network enables interconnection with other networks,
provides IP connectivity or other connectivity options, service and control
functions, and roaming. Similarly to access network, it can be based on varied
existing core networking solutions.
3. M2M Network Service Capabilities Layer (NSCL) : It provides M2M functions
that are shared by different M2M applications.
4. M2M Applications run the service logic and use M2M service capabilities
available via open interfaces.
5. M2M network management functions consist of all the functions required to
manage access and core networks.
6. M2M management functions consist of all the functions used to facilitate the
bootstrapping of permanent M2M service layer security credentials required to
manage M2M service capabilities in the network domain.
 Fig. 3.1.2 shows M2M service capabilities, M2M nodes and open interface.

3-4 IoT and Applications


IoT Reference Architecture

Fig. 3.1.2 : M2M service capabilities and reference points


 In order to standardize the procedures that can be used for enabling these entities to
communicate the ETSI M2M specifications have defined a number of Reference Points
and the operations that can be used for this communication. These Reference Points are :
1. mIa : M2M application interface : It is used by the Network Applications (NA) to
communicate with the Network Service Capability Layer (NSCL).
2. dIa : Device application interface : It is used by the Device and Gateway
Applications (DA and GA) to communicate with the local service capabilities, i.e.
Device Service Capability Layer (DSCL) and Gateway Service Capability Layer
(GSCL).
3. mId : M2M to device interface : It is used for the inter-SCLs communication.
ETSI M2M service capabilities

 Each M2M domain has its own service capabilities layer (i.e. Network SCL, Gateway
SCL, and Device SCL), which provides functions that are exposed on the mIa, dIa,
mId, and mIm reference point.
 Fig. 3.1.3 shows ETSI M2M service capabilities.

3-5 IoT and Applications


IoT Reference Architecture

Fig. 3.1.3 : ETSI M2M service capabilities

Fig. 3.1.4 : Basic entities, deployment view

Note : x in each of the below stands for either N for network, G for gateway, or D for device.

3-6 IoT and Applications


IoT Reference Architecture

 NA ....... Network Application


 interface mIa = API between applications and service platform
Mandatory :

1. NAE .... NW Application Enablement capability (communicates with application)


2. NSEC ... NW Security capability
3. NRAR ... NW Reachability, Addressing and Repository cap.
4. NCS .... NW Communication Selection capability
5. NREM ... NW Remote Entity Management capability
6. NGC .... NW Generic Communication capability (communicates with
Device/Gateway)
Optional :

1. NIP ...... NW Interworking Proxy capability


2. NTM .... NW Transaction Management
3. NTOE … NW Telco Operator Exposure
4. NHDR … NW History and Data Retention
5. NCB ….. NW Compensation Brokerage
1. Application enablement (xAE) is the single contact point to M2M applications. It
exposes functionalities implemented in each of the SCLs via a single reference
point : mIa/dIa (depending on the SCL in question).
2. Generic communication (xGC) is the single point of contact for communication
with each of the SCLs. This capability provides transport session establishment
and teardown along with security key negotiation, encryption and integrity
protection on data exchanged with the SCLs. Key material for the latter is derived
upon secure session establishment.
3. Reachability, addressing and repository (xRAR) provides a map-ping between
the name of an M2M entity or a group of M2M entities and their reachability
status. It also manages subscriptions and notifications pertaining to events and
allows creating, deleting, and listing of a group of M2M entities. It stores M2M
application and SCL data, and makes it available on request or based on
subscriptions.
4. Communication selection (xCS) provides network selection, based on policies,
when each of the available M2M entities can be reached through several networks

3-7 IoT and Applications


IoT Reference Architecture

or several bearers. It also includes alternative network or communication service


selection after a communication failure.
5. Remote entity management (xREM) acts as a remote management client to
perform the device remote entity management functionalities for the M2M
entities. It supports several management protocols, such as OMA-DM ] and BBF
TR-069.
6. Security (xSEC) supports M2M service bootstrap and key hierarchy for
authentication and authorization procedures. It also initiates mutual authentication
and key agreement, and is responsible for the storage and handling of M2M
connection keys.
7. History and data retention (xHDR) is an optional capability deployed when
required by policies. It archives relevant information referring to messages
exchanged over the reference points and also internally to each of the SCLs based
on policies.
8. Transaction management (xTM) is an optional capability that deals with
transactions. Transaction is an operation that involves several atomic operations.
This capability triggers a roll-back if any individual operation fails, aggregates the
results of the individual operations, and commits the transaction when all
individual operations have completed successfully.
9. Interworking proxy (xIP) is also an optional capability that enables interworking
between non-ETSI compliant devices and the SCLs. It can be implemented either
as an internal capability of DSCL/GSCL, or an application communicating via
reference point dIa with DSCL/GSCL.
10. Compensation brokerage (xCB) is another optional capability deployed only
when needed. It submits compensation tokens to requesting customers, bills the
customer of compensation tokens after the validity of compensation tokens is
verified, and finally refunds service providers for tokens acquired as compensation
for services provided to customers.
11. Telco operator exposure (xTOE) enables interworking and using of core network
services exposed by the network operator.
ETSI M2M resource management (REST)

 REST is an architectural style by Roy T.


 REST is NOT a protocol
 REST is about RESOURCES

3-8 IoT and Applications


IoT Reference Architecture

 RESOURCES are UNIQUELY IDENTIFIED by URIs


 RESOURCES are STATEFUL

 A resource may contain a LINK pointing to another resource


 Actions on resources are done through a UNIFORM INTERFACE
 The current implementation uses HTTP, but other protocols are also possible.
 The ETSI M2M architecture assumes that applications (DA, GA, NA) exchange
information with SCLs by performing CRUD (Create, Read, Update, Delete) operations
on a number of Resources following the RESTful (Representational State Transfer)
architecture paradigm.
 Regardless of the protocol in use, resources accept only four operations : CREATE,
READ, UPDATE, DELET.

Operation HTTP Commands


CREATE POST
UPDATE PUT
READ GET
DELETE DELETE
NOTIFICATION HTTP SERVER PUSH

 Moreover, when a resource is modified, it is possible to have status-change


NOTIFICATIONS. These operations can be mapped onto different network protocols.
The most common implementation is HTTP.
3.1.2 International Telecommunication Union-Telecommunication Sector View

 The Telecommunication sector of the International Telecommunication Union (ITU-T)


has been active on IoT standardization since 2005 with the Joint Coordination Activity
on Network Aspects of Identification Systems (JCA-NID), which was renamed to Joint
Coordination Activity on IoT in 2011.

 The ITU-T IoT domain model includes a set of physical devices that connect directly or
through gateway devices to a communication network that allows them to exchange
information with other devices, services, and applications.

3-9 IoT and Applications


IoT Reference Architecture

 Fig. 3.1.5 shows ITU-T IOT Reference Model.

Fig. 3.1.5 : ITU-T IOT Reference Model


 It is composed of four layers as well as management and security capabilities which are
associated with the four layers. The four layers are as follows :
1. Application layer
2. Service support and application support layer
3. Network layer
4. Device layer
 Application layer : It contains IoT applications.
 Service and application support layer : It consists of common capabilities which can be
used by different IoT applications and various detailed capability groupings, in order to
provide different support functions to different IoT applications.
 Network layer : Provides relevant control functions of network connectivity and IoT
services and applications transportation.
 Device layer : Includes direct/indirect device interaction with the gateway and
communication network.
 Management capabilities : How to manage the devices, traffic and etc.
 Security capabilities : Includes authorization, authentication, application data
confidentiality and integrity protection, privacy protection, security audit, anti-virus and
etc.

3 - 10 IoT and Applications


IoT Reference Architecture

 Advantages :
1. It provides a language for everyone involved.
2. It provides an abstract but also rich view of the domain.
3. It can assist IoT project leaders in planning the work at hand and the teams needed.
3.1.3 Open Geospatial Consortium Architecture

 The Open Geospatial Consortium (OGC 2013) is an international industry consortium


of a few hundred companies, government agencies, and universities that develops
publicly available standards that provide geographical information support to the Web,
and wireless and location-based services.
 OGC Standards used to monitor, model and forecast flood, drought and environmental
events. Government agencies can rapidly integrate data from different sensor networks.
External (e.g. agricultural) sensor feeds can be incorporated easily to improve
prediction and decision making.
 Fig. 3.1.6 shows OGC sensor web enablement.

Fig. 3.1.6
 The SWE framework can be understood as an architecture consisting of a set of
standards defining data formats as well as (web) service interfaces. During the
development of the SWE framework, several aims had to be taken into account.
 Especially the following goals were the drivers of the design of the SWE architecture :

3 - 11 IoT and Applications


IoT Reference Architecture

1. Standardized access to sensor measurements (including real-time as well as time-


series data).
2. Retrieval of metadata for determining sensor capabilities and the quality/reliability
of measurements.
3. Controlling and tasking of sensors.
4. Alerting based on user defined criteria and sensor measurements.
5. Access to sensor parameters and automatic processing of measurements based
upon pre-defined processes.
 The SWE architecture comprises two elementary parts : The Information Model and the
Service Model. Whereas the Information Model addresses all aspects related to
encoding sensor data and metadata, the Service Model deals with the specification of
(web) service interfaces for sensor related functionality.
 Sensor Web Enablement standards that have been built and prototyped by members of
the OGC include the following pending OpenGIS Specifications :
1. Observations and Measurements Schema (O and M) : Standard models and XML
Schema for encoding observations and measurements from a sensor, both archived
and real-time.
2. Sensor Model Language (SensorML) : Standard models and XML Schema for
describing sensors systems and processes; provides information needed for
discovery of sensors, location of sensor observations, processing of low-level
sensor observations and listing of taskable properties.
3. Transducer Markup Language (TransducerML or TML) : The conceptual model
and XML Schema for describing transducers and supporting real-time streaming
of data to and from sensor systems.
4. Sensor Observations Service (SOS) : Standard web service interface for
requesting, filtering and retrieving observations and sensor system information.
This is the intermediary between a client and an observation repository or near
real-time sensor channel.
5. Sensor Planning Service (SPS) : Standard web service interface for requesting
user-driven acquisitions and observations. This is the intermediary between a
client and a sensor collection management environment.

3 - 12 IoT and Applications


IoT Reference Architecture

6. Sensor Alert Service (SAS) : Standard web service interface for publishing and
subscribing to alerts from sensors.
7. Web Notification Services (WNS) : Standard web service interface for
asynchronous delivery of messages or alerts from SAS and SPS web services and
other elements of service workflows.
3.1.4 The International Telecommunication Union’s Telecommunication
Standardization

 The International Telecommunication Union’s Telecommunication Standardization


Sector (ITU-T) Study Group 13 has produced ITU-T Y.2060. This standard identifies
IoT functional characteristics, high-level requirements and an IoT reference model.
 The identified functional characteristics include interconnectivity, things-related
services, heterogeneity, dynamic changes and enormous scale. High-level requirements
listed for the IoT are identification-based connectivity, interoperability, autonomic
networking, location-based capabilities, security, privacy protection, high quality and
highly-secure human-body-related services, plug and play and manageability.
 Fig. 3.1.7 shows ITU-T model.

Fig. 3.1.7 : ITU-T IoT Reference Model

3 - 13 IoT and Applications


IoT Reference Architecture

 The model is divided into four layers : application, service support and application
support, network, and device. The model addresses required management capabilities
and security capabilities for each layer.
 Security is divided into generic and specific security capabilities. Specific capabilities
are bound to application requirements; generic capabilities are application independent
and defined for each layer.
 Authorization and authentication are defined capabilities at the application, network
and device layers.
 The application layer adds application data confidentiality and integrity protection,
privacy protection, security audit and anti-virus capabilities.
 The network layer adds use data as well as signalling data confidentiality and signalling
integrity protection.
 The device layer adds device integrity validation, access control, data confidentiality
and integrity protection capabilities.

3.2 Architecture Reference Model

3.2.1 Reference Model and Architecture

 An Architecture Reference Model (ARM) is divided into two main parts : a Reference
model and a Reference Architecture.
 Reference model : A division of functionality into elements together with the data flow
among those elements
 Reference architecture : A reference model mapped onto software elements that
implements the functionality defined in the reference model.
 Typically, generic reference architectures provide architecture team with an outline of
their organization-specific reference architecture that will be customized for a specific
organization.
 The foundation of an IoT Reference Architecture description is an IoT reference model.
A reference model describes the domain using a number of sub-models. Fig. 3.2.1
shows IoT Reference Model.

3 - 14 IoT and Applications


IoT Reference Architecture

Fig. 3.2.1 : IoT Reference Model

 The reference model consists of domain, information, functional, communication and


security models. The domain model is responsible for outlining core concepts in the IoT
such as “devices”, “IoT services”, and “virtual entities”.
 The information model defines the generic structural properties of information in an
IoT system. The functional model identifies groups of functionalities based on the
relations defined in the domain model.
 The communications model addresses the complexity of communications in IoT
environments. The trust, security and privacy (TSP) model is specifically identified by
its importance to IoT use-case scenarios and each is addressed separately.
 In addition to the IoT reference model, the ARM defines an IoT reference architecture,
which is “the reference for building compliant IoT architectures” and includes
guidelines intended to guide IoT system architects in creating actual architectures.
 When these common language references are established, the domain model adds
descriptions about the relationship between the concepts.
 The basic model is extended by security capabilities, that is, security is built into each
layer and each dimension of the model.
 Fig. 3.2.2 shows the IoT architecture model is related to the IoT Reference
Architecture.

3 - 15 IoT and Applications


IoT Reference Architecture

Fig. 3.2.2 : IoT architecture model is related to the IoT reference architecture

 This figure shows two facets of the IoT ARM :


a. how to actually create an IoT ARM,
b. how to use it with respect to building actual systems

3.3 IoT Reference Model

 IoT reference model to promote common understanding


1. High abstraction level
2. Describes the aspects of the IoT domain that do not change
3. Enables a general discourse on the IoT domain
4. Provides a domain, information, functional, communication and security models
3.3.1 IoT Domain Model

 A domain model defines the main concepts of a specific area of interest. These
concepts are expected to remain unchanged over the course of time, even if the details
of an ARM may undergo continuous transformation or evolution over time.
 The domain model captures the basic attributes of the main concepts and the
relationship between these concepts.
Model notation and semantics

 Unified Modeling Language (UML) Class diagram is used to shows the relationships
between the main concepts of the IoT domain model.
 UML is a diagramming language. It is a modeling language for visualizing, specifying,
constructing and documenting the artifacts of software systems.

3 - 16 IoT and Applications


IoT Reference Architecture

 Each class is a descriptor of a set of objects that have similar structure, behavior, and
relationships. A class contains a name and a set of attributes and operations.
Main Concept :

 The IoT is a support infrastructure for enabling objects and places in the physical world
to have a corresponding representation in the digital world.
 Fig. 3.3.1 shows mapping concept of physical world to virtual world.

Fig. 3.3.1 : mapping concept of physical world to virtual world

 As interaction with the physical world is the key for the IoT; it needs to be captured in
the domain model (DM). The DM defines the main concepts of the Internet of Things
and the relations between these concepts.
 User and a Physical Entity are two concepts that belong to the domain model. A User
can be a Human User, and the interaction can be physical.
 The physical interaction is the result of the intention of the human to achieve a certain
goal. Fig. 3.3.2 shows IoT domain model.

3 - 17 IoT and Applications


IoT Reference Architecture

Fig. 3.3.2 (b) : IoT Domain model


 A Physical Entity, as the model shows, can potentially contain other physical entities;
for example, a building is made up of several floors, and each floor has several rooms.
 A Physical Entity is represented in the digital world as a Virtual Entity. A Virtual Entity
can be a database entry, a geographical model, an image or avatar, or any other Digital
Artifact.
 The relations between services and entities are modeled as associations. These
associations could be static, e.g. in case the device is embedded into the entity; they
could also be dynamic, e.g., if a device from the environment is monitoring a mobile
entity. These identified concepts of the IoT domain and the relations between them are
depicted in Fig. 3.3.3.

Fig. 3.3.3 : Key concepts and interaction in IoT model


 One physical entity can be represented by multiple virtual entities, each serving a
different purpose. For the IoT Domain Model, three kinds of Device types are the most
important :
1) Sensors : These are simple or complex devices and contain a transducer that
converts physical properties such as temperature into electrical signals. These

3 - 18 IoT and Applications


IoT Reference Architecture

devices include the necessary conversion of analog electrical signals into digital
signals.
2) Actuators : These devices that involve a transducer that converts electrical signals
to a change in a physical property.
3) Tags : Tags in general identify the Physical Entity that they are attached to.
3.3.2 Information Model

 An abstract description (UML diagram or ontology) for explaining information about


elements or concepts defined in the IoT Domain Model.
 The information model models domain model concepts that are to be explicitly
represented and manipulated in the digital world. In addition the information model
explicitly models relations between these concepts.
 Fig 3.3.4 shows information model. The information model is a meta model that
provides a structure for the information. This structure provides the basis for defining
the functional interfaces.

Fig. 3.3.4 : IoT Information Model

3 - 19 IoT and Applications


IoT Reference Architecture

 IoT Information Model is represented using Unified Modeling Language (UML)


diagram. The IoT Information Model maintains the necessary information about Virtual
Entities and their properties or attributes.
 The information model for an object can contain information about the objects structure
and resource types. This can enable APIs to automatically be composed by middleware
and automatically consumed by application software.
 Additional metadata can indicate context, such as geographical location, and bindings,
such as message protocols and event handlers, as well as access control information.
 The IoT Information Model describes Virtual Entities and their attributes that have one
or more values annotated with meta-information or metadata. The attribute values are
updated as a result of the associated services to a Virtual Entity.
3.3.3 Functional Model

 The functional model (FM) is derived from internal and external requirements.
Functional view is derived from the Functional Model in conjunction with high-level
requirements.
 IoT Functional model identifies Functional Groups (FGs) that is, groups of
functionalities, grounded in key concepts of the IoT Domain Model.
 Functional Model is an abstract framework for understanding the main Functionality
Groups (FG) and their interactions. This framework defines the common semantics of
the main functionalities and will be used for the development of IoT-A compliant
Functional Views.
 The Functional Model is not directly tied to a certain technology, application domain,
or implementation. It does not explain what the different Functional Components are
that make up a certain Functionality Group.
 Fig. 3.3.5 shows IoT functional model.
 The Application, Virtual Entity, IoT Service, and Device FGs are generated by starting
from the User, Virtual Entity, Resource, Service, and Device classes from the IoT
Domain Model.
 Device functional group contains all the possible functionality hosted by the physical
devices. Device functionality includes sensing, actuation, processing, storage, and
identification components, the sophistication of which depends on the device
capabilities.
 Communication functional group support all the communication used by devices. It
uses wired and wireless technology.

3 - 20 IoT and Applications


IoT Reference Architecture

Fig. 3.3.5 : IoT functional model

 IoT Service functional group : Support functions such as directory services, which
allow discovery of Services and resolution to Resources.
 Virtual Entity functional group : it is related to the Virtual Entity class in the IoT
Domain Model. Associations between Virtual Entities can be static or dynamic
depending on the mobility of the Physical Entities related to the corresponding Virtual
Entities.
 IoT Service Organization functional group : to host all functional components that
support the composition and orchestration of IoT and Virtual Entity services.
 Finally, the “Management” transversal FG is required for the management of and/or
interaction between the functionality groups.
 The IoT Process Management FG relates to the conceptual integration of (business)
process management systems with the IoT ARM.
 The Service Organisation FG is a central Functionality Group that acts as a
communication hub between several other Functionality Groups.
 The Virtual Entity and IoT Service FGs include functions that relate to interactions on
the Virtual Entity and IoT Service abstraction levels, respectively.
 The Virtual Entity FG contains functions for interacting with the IoT System on the
basis of VEs, as well as functionalities for discovering and looking up Services that can
provide information about VEs, or which allow the interaction with VEs.

3 - 21 IoT and Applications


IoT Reference Architecture

 Communication FG provides a simple interface for instantiating and for managing high
-level information flow. It can be customized according to the different requirements
defined in the Unified Requirements list.
 The Management FG combines all functionalities that are needed to govern an IoT
system. The need for management can be traced back to at least four high-level system
goals : Cost reduction; Attending unexpected usage issues; Fault handling and
Flexibility.
 The Security Functionality Group is responsible for ensuring the security and privacy of
IoT-A-compliant systems. It is in charge of handling the initial registration of a client to
the system in a secure manner. This ensures that only legitimate clients may access
services provided by the IoT infrastructure.
3.3.4 Communication Model

 IoT Communication model introduces concepts for handling the complexity of


communication in an IoT environment. It is one FG in the IoT Functional model.
 The communicating endpoints or entities are the users, resources, and devices from the
IoT domain model. Users include human users and active digital artifacts.
 The communication between these users needs to support different paradigms : unicast
is the mandatory solution for one-to-one connectivity. However, multicast and anycast
are needed for fulfilling many other IoT-application requirements, such as data
collection and information dissemination, etc.
 Fig. 3.3.6 shows use of communication model.

Fig. 3.3.6 : Use of communication model

Fig. 3.3.7 : IoT specialization of the model

3 - 22 IoT and Applications


IoT Reference Architecture

 The device-to-device communication model represents two or more devices that


directly connect and communicate between one another, rather than through an
intermediary application server. These devices communicate over many types of
networks, including IP networks or the Internet.
 This communication model is commonly used in applications like home automation
systems, which typically use small data packets of information to communicate
between devices with relatively low data rate requirements.
 In a device-to-cloud communication model, the IoT device connects directly to an
Internet cloud service like an application service provider to exchange data and control
message traffic.
3.3.5 IoT Security Model

 IoT enables a constant transfer and sharing of data among things and users. In such a
sharing environment, authentication, authorization, access control and non-repudiation
are important to ensure secure communication.
 The high level of heterogeneity, coupled to the wide scale of IoT systems, is expected
to magnify security threats of the current Internet. The high number of inter-connected
devices arises scalability issues.
 IoT systems integrate in a seamless way physical objects, data, and computing devices
into a global network of information about “smart things”.
 Fig. 3.3.8 shows high level security challenges of IoT.
 Access control refers to the permissions in the usage of resources, assigned to different
actors of a wide IoT network.
 System safety is highly application- or application domain-specific. Trust Model that
provides data integrity and confidentiality, and endpoint authentication and non-
repudiation between any two system-entities that interact with each other.
 The trust requirements in IoT are related to identify management and access control
issues. The IoT-A Privacy Model depends on the following functional components :
Identity Management, Authentication, Authorization, and Trust and Reputation.
 Communication security : IoT systems are heterogeneous. Not only because of the
variety of the entities involved, but also because they include Devices with various
capabilities in terms of communication and processing.
 Communication Security Model must not only consider the hetereogenity of the system,
but it also should guarantee a balance between security features, bandwidth, power
supply and processing capabilities.

3 - 23 IoT and Applications


IoT Reference Architecture

Fig. 3.3.8 : IoT security challenges

 IoT devices face many threats, including malicious data that can be sent over
authenticated connections, exploiting vulnerabilities. Such attacks frequently exploit
many weaknesses, including but not limited to :
a) failure to use code signature verification and secure boot and
b) poorly implemented verification models which can be bypassed.
 Attackers often use those weaknesses to install backdoors, sniffers, data collection
software, file transfer capabilities to extract sensitive information from the system, and
sometimes even command and control (CandC) infrastructure to manipulate system
behavior.

3.4 IoT Reference Architecture

 IoT Reference Architecture to describe essential building blocks and identify design
choices to deal with conflicting requirements.
 The IoT Reference Model provides the highest abstraction level for the definition of the
IoT-A Architectural Reference Model. It promotes a common understanding of the IoT
domain.
 The description of the IoT Ref-erence Model includes a general discourse on the IoT
domain, an IoT Domain Model as a top-level description, an IoT Infor-mation Model
explaining how IoT infor-mation is going to be modelled, and an IoT Communication
Model in order to under-stand specifics about communication between many
heterogeneous IoT devices and the Internet as a whole.

3 - 24 IoT and Applications


IoT Reference Architecture

3.4.1 Introduction

 Reference Architecture is a starting point for generating concrete architectures and


actual systems.
 The Reference Architecture is based on the concepts of architectural views and
architectural perspectives.
 A view is a representation of one or more structural aspects of a reference architecture
that illustrates how the reference architecture can be adopted to address one or more
concerns held by its stakeholders.
 Perspectives : The issues addressed by perspectives are the nonfunctional requirements
of the architecture
 Architectural views derive from the concerns of stakeholders (i.e., people, groups, or
entities with an interest in the realization of the architecture). Views are representations
of one or more structural aspects of an architecture that illustrate how the architecture
addresses the concerns set by its stakeholders .
 Reference Architecture, serves as a guide for one or more concrete system architects.
Views are useful for reducing the complexity of the Reference Architecture.
 The IoT Reference Architecture does not contain details about the environment where
the actual system is deployed, some views cannot be presented in detail or at all.
 Reference Architecture as a set of architectural views is as follows :
1) Functional View : Description of what the system does, and its main functions.
2) Information View : Description of the data and information that the system
handles.
3) Deployment and Operational View : Description of the main real world
components of the system such as devices, network routers, servers, etc.
Purpose of Architectural Reference Models :

1) Cognitive aid : common language, common concepts

3 - 25 IoT and Applications


IoT Reference Architecture

2) Reference model as a common grounding


3) Generation of architectures
4) Identifying differences and commonalities in derived architectures
5) Benchmarking
3.4.2 Functional View

 Functional View describes the system’s runtime Functional Components, their


responsibilities, default functions, interfaces and primary interactions. The Functional
View derives from the Functional Model and reflects the developer’s perspectives on
the system.
 It will need to be extended with all identified (and recommended) new profile-specific
Functional Components including their interfaces and a list of Sequence Charts
illustrating recommended usage of those components.
 Fig. 3.4.1 shows functional view.

Fig. 3.4.1 : Functional view

 The viewpoints used for constructing the IoT Functional View are hence :
1) The Unified Requirements;
2) The IoT Functional Model

3 - 26 IoT and Applications


IoT Reference Architecture

 Once all Functional Components are defined, the default function set, system use cases,
sequence charts and interface definitions are made.
 Device and Application functional group : Device functional components contains
the sensing, actuation tag, processing and storage components. Application functional
group contains standalone application.
 Communication functional group : it contains the components for end-to-end
communication, network communication, and Hop-by-Hop communication.
Communication Description
type
End-to-End 1) Responsible for end-to-end transport of application layer
Communication FC messages through diverse network and MAC/physical layers
2) Used with mesh radio networking technologies such as IEEE
802.15.4
3) The End-to-End FC interfaces the Network FC on the
“southbound” direction.
Hop-by-hop FC 1) Responsible for transmission and reception of physical and
MAC layer frames to/from other devices.
2) Two interfaces used : one “southbound” to/from the actual
radio on the device, and another for “northbound” to/from the
Network FC in the Communication FG.
Network FC 1) Responsible for message routing and forwarding and the
necessary translations of various identifiers and addresses.
2) Network FC interfaces the End-to-End Communication FC on
the “northbound” direction and the Hop-by-Hop
Communication FC on the “southbound” direction.
 IoT Service functional group : it consists of IoT Service FC and the IoT Service
Resolution FC. Various service implementations are covered in service FC and service
resolution FC contains the necessary functions to realize a directory of IoT Services
that allows dynamic management of IoT service descriptions.
 Virtual Entity functional group : The Virtual Entity FG contains functions that
support the interactions between Users and Physical Things through Virtual Entity
services.

3 - 27 IoT and Applications


IoT Reference Architecture

 Process Management FG : Provides the functional concepts necessary to conceptually


integrate the IoT world into traditional (business) processes.
 The Process Modeling FC which provides the tools required for modeling IoT-aware
business processes that will be serialized and executed in the Process Execution FC,
which is responsible for deploying process models to the execution environments.
 Service Organization FG : Acts as a communication hub between several other
Functional Groups by composing and orchestrating Services of different levels of
abstraction.
 The Service Orchestration FC resolves the IoT Services that are suitable to fulfill
service requests coming from the Process Execution FC or from Users while the
Service Composition FC is responsible for creating services with extended functionality
by composing IoT services with other services.
 Service Choreography FC offers a broker that handles Publish/Subscribe
communication between services.
 Virtual Entity FG : Provides functionality for the interaction of VEs with the IoT
system, for VE look-up and discovery and for providing information concerning VEs.
The VE Resolution FC provides discovery services for associations between VEs and
IoT.
 VE and IoT Service Monitoring FC is responsible for automatically finding new
associations based on service descriptions and information about VE’s. the VE Service
FC handles entity services.
 Service FG : Provides IoT services as well as functionalities for discovery, look-up, and
name resolution of IoT Services.
 Security FG : It is responsible for security and privacy matters in IoT-A-compliant IoT
systems.
1) The Authorization FC is used to apply access control and access policy
management while, the Authentication FC is used for user and service
authentication.
2) Key Exchange and Management (KEM) FC enables secure communications
ensuring integrity and confidentiality by distributing keys upon request in a secure
way.
 Management FG : It is responsible for the composition and tracking of actions that
involve the other FGs.
1) Configuration FC is responsible for initializing the system's configuration.

3 - 28 IoT and Applications


IoT Reference Architecture

2) The Fault FC is used to identify, isolate, correct and log faults that occur in the IoT
system.
3) The Member FC is responsible for the management of the membership of any
relevant entity
 The Reporting FC generates reports about the system and, finally, the State FC can
change or enforce a particular state on the system by issuing a sequence of commands
to the other FCs.
3.4.3 Information View

 Information View provides an overview on how static information (i.e., VEs by means
of hierarchies, semantics) and dynamic information (i.e., information processing,
storage, flow) is represented.
 The information view also describes the components that handle the information, the
flow of information through the system and the life cycle of information in the system.
 One of the main purposes of connected and smart objects in the IoT is the exchange of
information between each other and also with external systems.
Information flow and lifecycle

 Information flow in the IoT system uses two paths :


1) From devices that produce information such as sensors and tags, information
follows a context-enrichment process until it reaches the consumer application or
part of the larger system
2) Application or part of a larger system information it follows a context-reduction
process until it reaches the consumer types of devices
 An IoT system is typically deployed to monitor and control physical entities.
Monitoring and controlling physical entities is in turn performed by mainly the devices,
communication, IoT services, and virtual entity functional groups in the functional
view.
 The virtual entity is the key concept of any IoT system as it models the physical entity
or the thing that is the real element of interest.
 Virtual Entities have an identifier (ID), an entity type and a number of attributes that
provide information about the entity or can be used for changing the state of the Virtual
Entity, triggering an actuation on the modeled physical entity.

3 - 29 IoT and Applications


IoT Reference Architecture

 Services provide access to functions for retrieving information or executing actuation


tasks on IoT Devices. Service Descriptions contain information about the interface of
the service, both on a syntactic as well as a semantic level, e.g. the required inputs, the
provided outputs or the necessary pre-conditions as well as post-conditions.
 Information in the system is handled by IoT Services. IoT Services are registered to the
IoT system using service descriptions. Service Descriptions can be provided by the
services themselves, by users or by special management components that want to make
the service visible and discoverable within the IoT system.
General information flow concepts

 There are four message exchanges patterns considered for information exchange
between IoT functional components.
1) Push-pattern
2) Request/Response-pattern
3) Subscribe/Notify-pattern
4) Publish/Subscribe-pattern
 Fig 3.4.2 shows message exchange pattern.

Fig. 3.4.2

 The Push-pattern : It is a one-way communication between two devices (server and


client).

3 - 30 IoT and Applications


IoT Reference Architecture

 The Request/Response pattern is a synchronous way of communication between two


parties. A client sends a request to a server. The server will receive the request and will
send a response back to the client. The client is waiting for the response until the server
has sent it.
 The Subscribe/Notify pattern allows an asynchronous way of communication between
two parties without the client waiting for the server response. The client just indicates
the interest in a service on the server by sending a subscribe-call to the server. The
server stores the subscription together with the address of the client wants to get
notified on and sends notifications to this address whenever they are ready to be sent.
 The Publish/Subscribe pattern allows a loose coupling between communication
partners. There are services offering information and advertise those offers on a broker
component. When clients declare their interest in certain information on the broker the
component will make sure the information flow between service and client will be
established.
Information flow through functional components

 Fig. 3.4.3 shows the information request from a user to an IoT Service and the
corresponding response.

Fig. 3.4.3 : User requests IoT service

3 - 31 IoT and Applications


IoT Reference Architecture

 The IoT Service Resolution implements two main inter-faces, one for the CUD of
Service Description objects in the IoT Service Resolution database/store, and one for
lookup/resolution/discovery of IoT Services.
 The IoT Service Resolution component offers three methods to find IoT Services :
1) look-up of Service Description based on service identifier;
2) discovery of Service Descriptions based on service specification;
3) resolution of service identifier to service locator.
3.4.4 Deployment and Operational View

 Deployment and Operational View depends on the specific actual use case and
requirements. Smart object in the IoT uses different methods for communication using
different technology.
 Hence the Deployment and Operation view is very important to address how actual
system can be realized by selecting technologies and making them communicate and
operate in a comprehensive way.
 It provides an IoT Reference Model with a set of guidelines to application users. The
different design choices that they have to face while designing the actual
implementation of their services.
 The viewpoints used in the Deployment and Operation view are the following :
1) The IoT Domain Model diagram is used as a guideline to describe the specific
application domain.
2) The Functional Model is used as a reference to the system definition.
3) Network connectivity diagrams can be used to plan the connectivity topology to
enable the desired networking capability of the target application; at the
deployment level, the connectivity diagram will be used to define the hierarchies
and the type of the sub-networks composing the complete system network;
4) Device Descriptions can be used to map actual hardware on the service and
resource requirements of the target system.
IoT Reference Architecture ends…

3 - 32 IoT and Applications


IoT Applications for Value Creations

Syllabus : Introduction, IoT applications for industry: Future Factory Concepts,


Brownfield IoT, Smart Objects, Smart Applications, Four Aspects in your
Business to Master IoT, Value Creation from Big Data and Serialization, IoT
for Retailing Industry, IoT For Oil and Gas Industry, Opinions on IoT
Application and Value for Industry, Home Management, eHealth.

Section No. Topic Name Page No.


4.1 Introduction 4-2
4.2 IoT Applications for Industry 4-2
4.3 Brownfield IoT 4 - 10
4.4 Smart Objects and Smart Applications 4 - 11
4.5 Four Aspects in your Business to Master IoT 4 - 13
4.6 Value Creation from Big Data and Serialization 4 - 15
4.7 IoT for Retailing Industry 4 - 20
4.8 IoT for Oil and Gas Industry 4 - 21
4.9 Opinions on IoT Application and Value for Industry 4 - 22
4.10 eHealth 4 - 22

4-1 IoT and Applications


IoT Applications for Value Creations

4.1 Introduction

 IoT is a wide and rapidly developing area with expected strong and growing
implications for the industry. Numerous IoT research and application projects have
been done by universities or in joint industry-university consortia in recent years.
 Internet of things examples extend from smart connected homes to wearables to
healthcare. It is not wrong to suggest that IoT is now becoming part of every aspect of
our lives. Not only internet of things applications are enhancing the comforts of our
lives but also it giving us more control by simplifying routine work life and personal
tasks.
 Value creation lies at the core of any business model of an organization and should be a
consistent instrument that enhances the value of your organization’s offering and
encourages your customers’ willingness to pay.
 A business that does not create value to maintain relevance in the evolving marketplace
will eventually fail. For this reason, the business model of your organization must be
clearly defined and kept central to the innovation process.
 Given the technology barrage hitting organizations, replicating popular frameworks and
consolidating established business models will not suffice.
 Management guru Michael Porter stipulates three generic strategies for value creation:
differentiation, cost leadership, and focus.
 The users of IoT, including business enterprises, other organizations, and consumers,
could capture up to 90 % of the value IoT applications create.
 IoT and other technology types can generate a new revenue stream from its potential to
increase service offerings. Contracts for IoT services typically specify both price
structures and service-level agreements.
 For the value proposition it is interesting to look at the revenue model. When a firm
delivers services it wants to get something in return in the form of money which comes
from the revenue model. The way a firm uses the revenue model can convince
customers to stay or choose for the firm.

4.2 IoT Applications for Industry

 To define the value of an industrial IoT application or IoT project is difficult. Value can
be generated and may show up as a result of a combination of IoT applications with
other systems or processes, or can originate in new human behavior or new interactions.
Fact is that value is the key element finally asked by the project stakeholders or owners.

4-2 IoT and Applications


IoT Applications for Value Creations

IoT APPLICATIONS - VALUE CREATION FOR INDUSTRY

1. Visibility identification, location tracking


2. IoT -supported safety in hard industrial environments
3. Right information providing or collecting
4. Improved industrial operation and flows in industry
5. Reduced production losses
6. Reduced energy consumption
7. New type of processes made possible by IoT applications
8. New type of maintenance and lifetime approaches
9. Enabled by smart objects, connected aspects.

IoT applications requirements and capabilities

 Existing manufacturing field industrial I/O devices including sensors, actuators,


analyzers, drives, vision, video, and robotics.
 It accommodates large number of nodes and controls latency at various levels of
hierarchical processing.
 High reliability, high availability, safe and resilience to failure
 Provides smarter services (monitoring, alarm management).
 Non‐invasive IT integration with operational technology. Operational technology is
defined bottom up with different vendor proprietary equipment. Communication
network system that works in presence of internet, intermittent internet or, independent
and connects to edge nodes for real time processing.
 High access security and provision.
 Fig. 4.1.1 shows Industrial IoT system architecture.
 The common requirements of the IoT are technical requirements independent of any
specific application domain.
 IoT non-functional requirements refer to the requirements related to the
implementation and operation of the IoT itself , i.e. Interoperability, scalability,
reliability, high availability, adaptability, manageability.

4-3 IoT and Applications


IoT Applications for Value Creations

Fig 4.1.1 : Industrial IoT system architecture

 IoT functional requirements refer to the requirements related to the IoT actors, these
requirements have been categorized as,
1. Application support requirements
2. Service requirements
3. Communication requirements
4. Device requirements
5. Data management requirements
6. Security and privacy protection requirements.
 The IoT application capabilities for industrial application should meet requirements
such as :
1. Reliability: Reliable IoT devices and systems should allow a continuous operation
of industrial processes and perform on-site activities.
2. Robustness. The IoT application and devices should be robust and adapted to the
task and hard working conditions.
3. Simple to use
4. Low maintains cost
5. Support optimal and adaptive set of features
6. It must have reach sensing and data capabilities

4-4 IoT and Applications


IoT Applications for Value Creations

7. Industry grade support and services. The IoT applications should be supported
over years in operation by a set of rich tools and continuously updated services
8. Support standardization
9. Security and safety.
 The Industrial Internet of Things will be shaped by the appearance of three features:
1. The enhancement of basic mechanical devices through sensors and other data
producing devices (“smartness”);
2. The possibilities of ever faster and more flexible data allocation, transfer and
processing (computing capacities);
3. The ever increasing digital interconnectivity between the engaged devices and
computational capacities (digital integration).
Challenges faced by IoT industry applications
1. Security. As the IoT connects more devices together, it provides more decentralized
entry points for malware. Less expensive devices that are in physically compromised
are more subject to tampering.
2. Trust and Privacy. With remote sensors and monitoring a core use case for the IoT,
there will be heightened sensitivity to controlling access and ownership of data.
3. Complexity : Confusion and integration issues. With multiple platforms, numerous
protocols and large numbers of APIs, IoT systems integration and testing will be a
challenge to say the least. The confusion around evolving standards is almost sure to
slow adoption.
4. Evolving architectures competing standards. With so many players involved with the
IoT, there are bound to be ongoing turf wars as legacy companies seek to protect their
proprietary systems advantages and open systems proponents try to set new standards.
There may be multiple standards that evolve based on different requirements
determined by device class, power requirements, capabilities and uses. This presents
opportunities for platform vendors and open source advocates to contribute and
influence future standards.
5. Concrete use cases and compelling value propositions. Lack of clear use cases or strong
ROI examples will slow down adoption of the IoT. Although technical specifications,
theoretical uses and future concepts may suffice for some early adopters, mainstream
adoption of IoT will require well-grounded, customer-oriented communications and
messaging around “what’s in it for me.”
6. There are several wireless standards which can be used to connect devices to a network,
most are still developing. That means delays as products play catch‐up with new
networking standards.

4-5 IoT and Applications


IoT Applications for Value Creations

4.2.1 Future Factory Concept


 The manufacturing sector supports the development of IoT by the provision of smart
products. For instance, 43 million wearable bands were shipped in 2015, and it is
estimated that 20 million smart thermostats will ship by 2023. By 2016, smart products
will be offered by 53 % of manufacturers.
 At present, the majority of manufacturing plants and production facilities around the
world are putting into place systems that will make them adaptive, fully connected,
analytical and more efficient.
 These new manufacturing systems are introducing a new industrial revolution, called
Factory of the Future (FoF). This model marks the beginning of a new phase of
manufacturing characterized by complete automation and involving an increased use of
technology and field devices in and outside of the manufacturing facility.
 Factories of the future are oriented toward ensuring the availability of all relevant
information in real time through the connectivity of all elements participating in the
value chain, as well as providing the ability to deduce the optimal value chain processes
from this data at the demand of the individual customer.
 The factory of the future will increase global competitiveness and will require an
unprecedented integration of systems across domains, hierarchy boundaries and life
cycle phases.
 Many factors can contribute to establishing factories of the future, but consensus-based
standards are indispensable in this process.
 The benefits of data to factories are across several vectors. These include :
1. Improved compliance to environmental guidelines; a major challenge for
industries at the moment.
2. Heightened and improved security, reducing loss due to sabotage, pilferage,
leakages and human error
3. Giving your MES system an efficiency boost from process improvement and
reduced down time of equipment realized through real-time alerts and predictive
analytics
4. Insights into new product demand from markets thus directly driving RandD
spends and design programs
5. Reduced cost through better demand forecasting, sourcing, supply chain
management and inventory control.
Smart Factory :
 The convergence of the virtual and physical worlds has given rise to the Smart Factory.
This integrates artificial intelligence, machine learning, automation of knowledge work
and machine-to-machine communication with the manufacturing process.

4-6 IoT and Applications


IoT Applications for Value Creations

 The Smart Factory will fundamentally change how products are invented, manufactured
and shipped. At the same time it will improve worker safety and protect the
environment by enabling low-emissions and low-incident manufacturing.
 Empowered by the Industrial Internet of Things, the factory of tomorrow promises to be
a proactive, self-healing environment with increased responsiveness and ability to meet
consumer demand.
 Manufacturing has made huge progress in recent years. Automation levels have
increased in all manufacturing sub-sectors and third party suppliers now have better
vertical skills, geographical coverage and greater scalability. The number of products
and product variants has exploded. Globalized capability has become the foundation of
cost reduction.
 Fig. 4.2.1 shows smart factory concept.

Fig. 4.2.1 : Smart factory concept

4-7 IoT and Applications


IoT Applications for Value Creations

1. Smart Manufacturing Intelligence

 Deeper understanding of the manufacturing process through modeling and


analysis
 New capacity to observe and take action on integrated patterns of operation
through networked data, information, analytics, and metrics
 Dynamic management of energy and material resources.
2. Smart Manufacturing Practice

a. Generating and orchestrating the use of sensor-based, data-driven manufacturing


intelligence
b. Applying integrated performance metrics constructed for real-time action
c. Reusing, scaling and repurposing integrated practice using a common
infrastructure.
3. Smart Manufacturing Execution

a. Dynamic orchestration of decision/action workflows in heterogeneous


environments without losing control of state
i. Across different time constants and seams, including supply chain
ii. Multi-vendor discrete, continuous, operational and human/social applications
b. Applications that can share data and data that can share
 IoT will generate 4 primary forms of value in terms of manufacturing processes :
1. Supply Chain Management : IoT can help manufacturers better manage their
supply chains
2. Operating Efficiency : IoT provides manufacturers a comprehensive view of
what’s occurring at every point in the production process and helps make real-time
adjustments
3. Predictive Maintenance: Monitor the status of production equipment in real –time.
IoT expected to reduce factory equipment maintenance costs by up to 40 %
4. Inventory Optimization : IoT helps manufacturers better manage inventory. IoT
can drive inventory optimization measures that can save 20 to 50 % of factory
inventory carrying costs.
IoT and Smart Manufactured Products

 All “smart products” share three key components :


1. Physical components : E.g., Mechanical and electrical parts.

4-8 IoT and Applications


IoT Applications for Value Creations

2. Smart components : E.g., sensors, microprocessors, data storage, controls,


software, an embedded operating system, and a digital user interface.
3. Connectivity components : E.g., Wireless connectivity, ports, antennas, etc
 Fig 4.2.2 shows relation between humans and factories in the past and in the future.

Fig. 4.2.2 : Relation between humans and factories in the past and in the future
Design Implications for Smart Manufacturing Products

1. Low - cost variability : The software in smart, connected products can make variability
far cheaper.
2. Evergreen Design : Continually upgrading of existing products.
The Augmented Operator

 The utilization of the smart product, equipment and infrastructure will lead to a huge
amount of available data.

4-9 IoT and Applications


IoT Applications for Value Creations

 The human will need to access situation dependent filter mechanisms in order to decode
the data noise.
 Context information such as the task, the role or the intention of the human as well as
the location, product status or costumer information can help to identify the situation
and to configure the filter mechanisms.
Security :

 In the factory of the future, any physical space connected to cyber space is exposed to
the potential threat of a cyber-attack, in addition to concerns regarding its physical
security.
 To prevent such attacks, which may result in damage and liabilities, security measures
are becoming increasingly important for the factory of the future.
 Typically, cyber security protection is defined as following the path of confidentiality,
integrity and availability which still applies for information system networks. However,
factory of the future systems which integrate both physical space and cyber space
require a protection priority that follows the path of availability, integrity and
confidentiality.

4.3 Brownfield IoT

 Brownfield refers to the implementation of new systems to resolve IT problem areas


while accounting for established systems.
 Brownfield describes the billions of devices and legacy software applications
performing discrete functions in isolation. Some of these will require migration
strategies to connect with and realize the benefits of IoT.
 Brownfield is especially important in industrial IoT, such as smart buildings, bridges,
roads, railways and all infrastructure that have been around for decades and will
continue to be around for decades more.
 Connecting these to the cloud, collecting data and obtaining actionable insights might
be even more pertinent than having a light bulb that can be turned on and off with your
smart phone.
 An Industrial IoT is what will make our cities smarter, more efficient, and create the
basis to support the technology of the future, shared economies, fully autonomous
vehicles and things that we can’t imagine right now.

4 - 10 IoT and Applications


IoT Applications for Value Creations

Cost-effective Technical Integration of IoT Devices

 A developer of IoT technology has to take various technical requirements into account
such as energy, communication bandwidth, communication topology or processing
resources of different IoT systems.
 Loosely coupled, document-based Web services provide a well-defined path to
configuration and measurement data from wireless ad hoc systems and automation
systems, however, have the disadvantage of a very high runtime overhead.
1. Standardized ways must be found to obtain comparable quality data sets with
opportunistic, distributed measurements.
2. Live data acquisition, needs a high throughput of data to ensure that, while energy
efficiency of the hardware, requires a high efficiency of bandwidth usage.
Cost-effective Process Integration of IoT Devices

 IoT enabled processes needs to be cost-effective by design and well integrated. Global
interoperability in contrast to global connectivity and the use of mobile devices can
enable the user to access IoT services ad-hoc.

4.4 Smart Objects and Smart Applications

 Smart Object is a bi-directional communicating object which observes its environment


and is able to make decisions depending on the application and based on the
information extracted from the physical world.
 Smart object is an item equipped with a form of sensor or actuator, a tiny
microprocessor, a communication device, and a power source.
 Fig. 4.4.1 shows use of smart object in IoT.

Fig. 4.4.1

4 - 11 IoT and Applications


IoT Applications for Value Creations

 The sensor or actuator gives the smart object the ability to interact with the physical
world. The microprocessor enables the smart object to transform the data captured from
the sensors at a limited speed and at limited complexity.
 The communication device enables the smart object to communicate its sensor readings
to the outside world and receive input from other smart objects. The power source
provides the electrical energy for the smart object to do its work.
 For smart objects, size matters. They are significantly smaller than both laptops and cell
phones. For smart objects to be embedded in everyday objects, their physical size
cannot exceed a few cubic centimeters.
 Wireless sensor networks have evolved from the idea that small wireless sensors can be
used to collect information from the physical environment in a large number of
situations ranging from wild fire tracking and animal observation to agriculture
management and industrial monitoring.
 Each sensor wirelessly transmits information toward a base station. Sensors help each
other to relay the information to the base station.
 The ISO/IEC JTC1/WG7 Working Group on Sensor Networks has designed reference
architecture Fig. 4.4. 2, which separates the sensor node functionality into three layers :
1. Communication layer : Describes the communication protocol for the interaction
of a smart object with other smart objects, an infrastructure or backbone networks.
2. Service layer : Represents a set of functions commonly required, such as sensor
information gathering, filtering by various policies and rules, data comparison and
analysis, data mining, context mod-ling, context-aware processing, self-
localization, context-aware decision and estimation.
3. Application layer : Realizes the use case of a smart object by a set of functions to
users to meet defined requirements.
 The communication layer is responsible for low-level communication issues, such as
device discovery, topology construction, connection establishment, and data transfer.
 The application layer supports programmers in implementing context-aware services.
Generally, context-aware applications have four parts :
1. Basic application behavior, i.e., functionality that does not depend on context
changes,
2. Adaptive application behavior, which describes how an application reacts to
changing situational context,
3. Section that specifies how to derive context from local and remote sensor readings,
and

4 - 12 IoT and Applications


IoT Applications for Value Creations

4. Part that specifies how to access sensors.

Fig. 4.4.2 : Architecture overview of interconnected smart objects


 From the users prospect the smartness of a smart object is realized within the service
and the application layers.
 The technical challenges for smart objects include the node-level internals of each
smart object, such as power consumption and physical size, as well as the network-level
mechanisms and structures formed by the smart objects.

4.5 Four Aspects in your Business to Master IoT

 Every business has unique global trade management issues. These issues are based on
factors such as the geographic locations of where products are sourced, manufactured,
and shipped; the volumes that are being imported and exported; the compliance and
security regulations of each destination country; the multitude of free trade agreements
and foreign trade zones; the number of trade and manufacturing partners involved in the
supply chain; and the level of in-house trade expertise available. In addition, an
organization’s needs may change from year-to year and from location-to-location.

4 - 13 IoT and Applications


IoT Applications for Value Creations

 In recent years, the internet has transformed communications, the media landscape,
commerce and the music industry.
 The Internet of Things is the next generation of the internet. It is a global system of
interconnected computer networks, sensors, actuators, and devices that use the internet
protocol to potentially connect every physical object.
 Four aspects of the Internet of Things and Services are technology, business
innovation, market and competencies.
 Various IoT technologies can be conventionally categorized into tagging things,
sensing things and embedded things. The tagging things provide seamless and cost-
efficient item identification, allowing the things to be connected with their records in
databases.
 The sensing things enable us to measure and detect changes in the physical status of our
environment. Finally, the embedded things yield information about the internal status of
the embedding object.
 Over the last decade, these technologies have been developed rapidly in the domains of,
the Radio-Frequency Identification (RFID), Machine-to-Machine (M2M)
Communication and Machine-type Communication (MTC), Wireless Sensor and
Actuator Networks (WSAN), ubiquitous computing, and web-of-things.
 The IoT field is relatively young, and still dominated by the silos of vertically
integrated solutions based on incompatible technologies, with each having a relatively
limited marked penetration.
 However, the adoption of the various IoT technologies is expected to expand rapidly
in the upcoming years, and it will be reflected in the number of connected things,
expected revenues, and annual growth rates.
Connected industry
 The Internet of Things in production and logistics is coined with the term “Industrie
4.0” in Germany. The term ‘Industry 4.0’ stands for the fourth industrial revolution.
 While Industry 3.0 focused on the automation of single machines and processes,
Industry 4.0 focuses on the end-to-end digitization of all physical assets and integration
into digital ecosystems with value chain partners.
 Generating, analyzing and communicating data seamlessly underpins the gains
promised by Industry 4.0, which networks a wide range of new technologies to create
value.
 Industry 4.0 digitises and integrates processes vertically across the entire organisation,
from product development and purchasing, through manufacturing, logistics and
service. Fig. 4.5.1 shows Industry 4.0

4 - 14 IoT and Applications


IoT Applications for Value Creations

Fig. 4.5.1 : Industry 4.0


 Digitisation of products includes the expansion of existing products, e.g. by adding
smart sensors or communication devices that can be used with data analytics tools, as
well as the creation of new digitised products which focus on completely integrated
solutions.
 Digital business models and customer access : Leading industrial companies also
expand their offering by providing disruptive digital solutions such as complete, data-
driven services and integrated platform solutions
4.6 Value Creation from Big Data and Serialization

 Serialization is the process of transforming objects or data entities into bytes for
persistence (in memory or on disk) or transportation from one machine to another over
a network.
 Serialization engine provides the ability to serialize and deserialize data in a Big Data
platform. In Big Data platforms, serialization is required for establishing
communication between machines by exchanging messages between them, and for
persisting data.
 The serialized bytes can either be encoded using a binary format or a plain-text format.
Different serialization engines may provide different levels of speed, extensibility and
interoperability.

4 - 15 IoT and Applications


IoT Applications for Value Creations

 Serialized identifiers are the keys to building an Internet of Things; just as unique IP
addresses are integral to the web itself.
 Big Data is data which cannot be handled by traditional technologies.
 Big data is about the processing and analysis of large data repositories, so
disproportionately large that it is impossible to treat them with the conventional tools of
analytical databases.
 Machines generate data at higher speed and their production rates will grow
exponentially with Moore’s Law. Storing this data is cheap, and it can be mined for
valuable information.
 Big data requires exceptional technologies to efficiently process large quantities of data
within a tolerable amount of time.
 Technologies being applied to big data include Massively Parallel Processing (MPP)
databases, data-mining grids, distributed file systems, distributed databases, cloud
computing platforms, the Internet, and scalable storage systems.
 These technologies are linked with many aspects derived from the analysis of natural
phenomena such as climate and seismic data to environments such as health, safety or,
of course, the business environment.
 Fig. 4.6.1 shows dimension of big data. Big data is characterized by three “Vs”:
volume, velocity and variety.

Fig. 4.6.1 : Dimension of big data


1. Volume : datasets who size runs into petabytes and beyond.

4 - 16 IoT and Applications


IoT Applications for Value Creations

2. Variety: data who form could be structured or unstructured.


3. Velocity: data that comes into the processing environment very fast.
 Technological growth and easy access to sophisticated gadgets have led to a digital data
explosion. Complex data generated by network traffic and collected from applications
and process logs, outputs from numerous digital devices, interactions on the web and
social media sites, digital photographs, satellites, are common examples of Big Data.
 Big Data is generated in the form of RFID and sensor data from medical devices and
pharmaceutical manufacturing organizations, raw data from various state-of-the-art
machines that process blood samples, tissues and so on. This large volume of data can
be processed using a Big Data platform to support scientific analytics.
 Other sources of Big Data include websites, digital data sellers, organizational data in
the form of documents, images, email messages, result datasets generated out of various
experiments, and so on.
Big data in the pharmaceutical industry
 From research records and patient information to utilization details and supply chain
monitoring, pharmaceutical firms have been managing vast amounts of data for years.
 Pharmaceutical companies need to spend less time preparing data sets for analysis and
more time discovering insights that they can turn into business value, such as :
a. Identifying trial candidates and accelerating their recruitment
b. Designing better inclusion and exclusion criteria for clinical trials
c. Conducting virtual trials to build predictive models
d. Uncovering unintended uses and indications for products
e. Researching competitive products for strategic advantage.
Tracking serialized products
 The pharmaceuticals industry has struggled to ensure the integrity of its products as
they are transferred between the different stops on the value chain from contract
manufacturers to wholesalers to dispensers and finally to the patient. This is particularly
true as products move across international borders. And the problem has been growing.
 In the first phase of implementing serialization the pharmaceutical industry is adopting
2D optical bar code as a transport and the GS-1 serialized Global Trade identification
Number (sGTIN) symbology.
 In tracking physical goods there is some debate about whether e-Pedigree specifications
should include a requirement for tracking the aggregation/disaggregation of each item
as it moves across the supply chain, adding expense to the process.

4 - 17 IoT and Applications


IoT Applications for Value Creations

 Three major models for serialization and track and trace reporting. These include :
1. China Food and Drug Administration (CFDA) serialization requirements, which
use government issued serial numbers that are reported back to a central
government database.
2. The EU’s European Stakeholder Model, which is based on the European
Medicines Verification System (EMVS) where manufacturers upload serialized
information to a central institutional hub for verification.
3. The U.S. model which requires lot traceability shared with each member of the
value chain in 2015, individual saleable package serialization by 2017 and
verification at the point of dispensing by 2023.
 Serialization regulations will of course go a long way toward protecting patients from
dangerous counterfeit drugs, and life sciences companies from lost revenues and
potentially brand disrupting recalls.
 Significant investments will be required, for example, to make packaging lines capable
of managing serialization.
 Serialization will generate massive amounts of data for global companies that will need
to be retained for many years to meet compliance requirements.
 This serialized information will need to be readily accessible and highly responsive to
support business processes that require sub-second authentication, and to provide easy
access for regulatory compliance, including investigations and statutory reporting.
 We believe serialized data will also provide a rich repository of information for
business value and insight, not only in terms of supply chain integrity but also for
improving responsiveness, insight and financial transparency in areas such as contracts
and charge backs.

4 - 18 IoT and Applications


IoT Applications for Value Creations

 Creating a global, scalable serialization architecture to manage a complete end-to-end


business process is critical.
Value of supply chain data

 The supply chain encompasses all of those activities associated with moving goods
from the raw-materials stage through to the end user.
 To remain competitive, companies must seek new solutions to important Supply Chain
Management issues such as modal analysis, supply chain management, load planning,
route planning and distribution network design.
 Companies must face corporate challenges that impact Supply Chain Management such
as reengineering globalization and outsourcing.
 Supply Chain Management has an important role to play in moving goods more quickly
to their destination.
 Product identifiers on a label can serve as a “key” to information about the processes
and conditions through which the product has travelled.
 Supply chain management department functions :
1. Inventory management
2. Transportation service procurement
3. Materials handling
4. Inbound transportation
5. Transportation operations management
6. Warehousing management.
Legal information flows

 Legal issues around data exchange can be divided into two separate parts :
1. The question of jurisdiction over data,
2. Within that con-text, what party(s) own the data.
 For example : In the US , despite a common interest in ensuring efficient oversight and
promoting safe and environmentally friendly products, the FDA has not been active in
developing national standards on transportation and drug packaging.
Finance flows

 Every step in the development, clinical trials, manufacturing, distribution and service
delivery of a biologics product involves massive amounts of data.

4 - 19 IoT and Applications


IoT Applications for Value Creations

 Extensive industry guidelines and best practices are established for the use of this
information in specific contexts such as quality control or product authentication.
 A parallel assessment of data asset values, liabilities and exchange mechanisms for
these data assets is warranted in light of pharmaceutical development, technology
transfer, commercial manufacturing and product discontinuation processes.

4.7 IoT for Retailing Industry

 The Internet of Things (IoT) is transforming the Retail Industry. There are four broad
IoT application areas within retail
1. Sensors - fitted in refrigeration and lighting equipment can lead to automated
energy usage and provide retailers huge energy savings. This will help retailers
reduce their carbon footprint which will resonate with shoppers, leading to better
loyalty.
2. Leveraging existing CCTV cameras for Video Analytics can trigger real-time
automated alerts that help store associates replenish shelves just in time and serve
customers in need. This not only improves conversion and customer experience,
but also leads to effective labor utilization.
3. Using RFID and IoT sensors, retailers can get better visibility into inventory and
perishables. IoT can enable dynamic re-routing of delivery vans based on weather
forecasts and live traffic updates. All of these result in cost savings and improved
customer satisfaction.
4. Using in-store sensors and video feeds, retailers can analyze and understand
customer hot spots, dwell times and flow patterns improving store layouts and
promotional placements. This will result in a better shopping experience and
higher revenues.
 Retailers gain a deeper understanding of the customer’s path to purchase, preferences
and shopping habits, which can be used in a variety of ways to optimize various
customer touch points and build differentiation as well as strong brand perception. Rich
insights gained from deploying sensor-based solutions provide a multitude of options to
improve operations across various retail functions.
 Digital technologies such as mobility, big data, NFC, augmented reality, sensors and
cloud computing provide opportunities to redefine retail stores like never before.

4 - 20 IoT and Applications


IoT Applications for Value Creations

4.8 IoT for Oil and Gas Industry

 Unconventional resources challenge the oil industry. Exploration and development of


oil and gas reservoirs require new sensors, analytics, and processes. Systems require
better connectivity, monitoring and control, and process automation.
 Process industry in general and Oil and Gas in particular put special requirements on
field devices. Devices have to operate under harsh conditions; dirt, often high
temperatures and sometimes in explosion prone environments. It is a challenge to
develop a field device that not only is easy to install and maintain, have a long enough
life length but also withstand this tough environment.
 Modern process control systems often have the facility to pass HART commands
through the I/O modules so that instrument configuration can be modified at the host
system level.
 At a time when well drilling and completion complexities are increasing and field
experts are becoming scarcer, automation offers many benefits. Besides capturing
domain knowledge, automation increases safety and decreases personnel time on-site
and therefore lowers cost.
 The data generated from a single well can be sizeable; a large field of wells can produce
massive amounts of valuable information. Industrial Internet technology can tackle the
large-scale collection across an entire site. The proven results include better asset
utilization across all wells, reduced effluents, and accelerated production.
 All of the components of the system under study must be integrated such that
information can be reliably gathered. This is especially critical for real-time analytics
that directly drive process improvements and production optimizations.
 Data flows can be secure, independent of protocols, roles, and nodes. The security
model allows protection of every dataflow.
 Some of the small AC motors on an oil rig are highly critical with respect to regularity,
some are critical with respect to safety if for instance placed in explosion proof zone.
 Larger machines are normally always monitored but for these smaller AC motors then
prevailing maintenance strategy was “run-to-failure” due to their high numbers of up to
1000 units per offshore installation and the cost associated with monitoring them.
 WiMon 100 is a battery operated device with an expected lifetime of five years. Due to
the cost efficiency, small size and ease of installation and commissioning of the
WiMon100 sensor, on line vibration monitoring can now be realized for all types of
rotating machines.

4 - 21 IoT and Applications


IoT Applications for Value Creations

 WiMon100 unit contains a vibration sensor, a temperature sensor, a long-life battery


and communicating using Wireless HART.
 It form a mesh communication network, if configured for routing, provide a secure,
reliable and redundant path from WiMon 100 sensor to a gateway and onwards to
monitoring and analysis toolkits.
 The WiMon Data Manager handles data acquisition and storage as well as providing a
user interface for commissioning, configuration, network operation and machine
supervision and analyses.

4.9 Opinions on IoT Application and Value for Industry

 The Internet of Things (IoT) is undeniably transforming the way that organizations
communicate and organize everyday businesses and industrial procedures. Its adoption
has proven well suited for sectors that manage a large number of assets and coordinate
complex and distributed processes.
 The impact of IoT in the commercial sector results in significant improvements in
efficiency, productivity, profitability, decision-making and effectiveness. IoT is
transforming how products and services are developed and distributed, and how
infrastructures are managed and maintained. It is also redefining the interaction
between people and machines.
 IoT represents the convergence of several interdisciplinary domains: networking,
embedded hardware, radio spectrum, mobile computing, communication technologies,
software architectures, sensing technologies, energy efficiency, information
management, and data analytics.
 The rapid growth of IoT is driven by four key advances in digital technologies.
1. Minizing cost and miniaturization of ever more powerful microelectronics such as
sensors and actuators, processing units, Field-Programmable Gate Array and
receivers.
2. Fast pace and expansion of wireless connectivity.
3. Expansion of data storage and the processing capacity of computational systems.
4. Advent of innovative software applications and analytics, including advancements
in machine-learning techniques for big data processing.

4.10 eHealth

 The World Health Organization [WHO] defines e-Health as : E-health is the transfer of
health resources and health care by electronic means. It encompasses three main areas :

4 - 22 IoT and Applications


IoT Applications for Value Creations

The delivery of health information, for health professionals and health consumers,
through the Internet and telecommunications.
 E-health provides a new method for using health resources - such as information,
money, and medicines - and in time should help to improve efficient use of these
resources.
 eHealth brings special characteristics. The monitoring device’s environment is a
patient; a living and breathing human being. This changes some of the dynamics of the
situation. Human interaction with the device means batteries could be changed,
problems could be called in to technical support and possibly be resolved over the
phone rather than some type of service call. In most cases, the devices on the patient are
mobile not static with regard to location.
 Fig. 4.10.1 shows High Level e-Health ecosystem Architecture.

Fig. 4.10.1 : High Level e-Health ecosystem architecture


 The data flow architecture focuses on the source of the data, the destination the data and
path the data. The source of the data is typically the sensor.
 The data can be either locally cached or is sent to the upstream systems without storing
in the sensor. The path taken by the data includes a gateway, which can also cache
some of the data and do distributed processing.
 Intermediate hubs can also store and process the data to filter out or make certain
decisions. A distributed rules engine is used to make distributed decisions at the closest
point of care. This enables data traffic to be filtered and processed efficiently without
having every data being processed by the cloud service

4 - 23 IoT and Applications


IoT Applications for Value Creations

 The development of wireless networks has led to the emergency of a new type of
e-healthcare system, providing expert-based medical treatment remotely on time.
 With the e-healthcare system, wearable sensors and portable wireless devices can
automatically monitor individuals' health status and forward them to the hospitals,
doctors and related people.
 The system offers great conveniences to both patients and health care providers. For the
patients, the foremost advantage is to reduce the waiting time of diagnosis and medical
treatment, since they can deliver the emergent accident information to their doctors
even if they are far away from the hospital or they don't notice their health condition.
 In addition, e-health system causes little interruption to patients' daily activities. For the
health care providers, after receiving the abnormal signals from the patients,
appropriate treatment can be made, which saves medical resources.
 Furthermore, without direct contact with medical facilities, medical personnel or other
patients, the patients are unlikely to be infected with other diseases.
 However, to ensure the security and privacy of patients' medical records encounters a
lot of challenges :
1. How to achieve the confidentiality and integrity of patients' information,
2. The security of wireless body area network,
3. The privacy and unlink ability of patients' health status,
4. The undeniability and unlinkability of doctors' treatment,
5. The location privacy of patients, the fine-grained access control of patients'
medical record, the mutual authentication between patients and hospitals, etc.
 It would be useful to create an up-to-date bibliography on secure e-healthcare systems.
IoT Applications for Value Creations ends …..

4 - 24 IoT and Applications


Internet of Things Privacy, Security and Governance

Chapter - 5
INTERNET OF THINGS
PRIVACY, SECURITY AND GOVERNANCE

Syllabus : Introduction, Overview of Governance, Privacy and Security Issues,


Contribution from FP7 Projects, Security, Privacy and Trust in IoT-Data-
Platforms for Smart Cities, First Steps Towards a Secure Platform, Smartie
Approach. Data Aggregation for the IoT in Smart Cities, Security.

Section No. Topic Name Page No.


5.1 Introduction 5-2
5.2 Overview of Governance, Privacy and Security Issues 5-2
5.3 Contribution from FP7 Projects 5-3
5.4 Security, Privacy and Trust in IoT-Data-Platforms for Smart Cities 5-9
5.5 Data Aggregation for the IoT in Smart Cities 5 - 11

5-1 IoT and Applications


Internet of Things Privacy, Security and Governance

5.1 Introduction

 The Internet of Things" (IoT) refers to the capability of everyday devices to connect to
other devices and people through the existing Internet infrastructure.
 Devices connect and communicate in many ways. Examples of this are smart phones
that interact with other smart phones, vehicle-to-vehicle communication, connected
video cameras, and connected medical devices.
 They are able to communicate with consumers, collect and transmit data to companies,
and compile large amounts of data for third parties.
 This increased connectivity raises a myriad of consumer privacy and data security
issues. Government agencies, like the Federal Trade Commission, are concerned with
issues such as data security, mobile privacy, and big data.
 The development of the IoT means that companies preserve privacy. Among other
things, this involves adopting privacy and data security best practices, only collecting
consumer information with express consumer consent, and providing consumers with
access to their data
 IoT is broad term, which indicates the concept that increasingly pervasive connected
devices will support various applications to enhance the awareness and the capabilities
of users. For example, users will be able to interact with home automation systems to
remotely control the heating or the alarm system.

5.2 Overview of Governance, Privacy and Security Issues

 Governance, security and privacy are probably the most challenging issues in the
Internet of Things.
 As per European Union (EU), ‘governance’ refers to the rules, processes and behaviour
that affect the way in which powers are exercised, particularly as regards openness,
participation, accountability, effectiveness and coherence.
 These five "principles of good governance" reinforce those of subsidiary and
proportionality. The concept of Governance have been already applied to the Internet
for specific aspects and there are already organizations like IETF, ICANN, RIRs, ISOC,
IEEE, IGF, W3C, which are each responsible and dealing with a specific area.
 Size and heterogeneity are the two main components that affect the governance of IoT.

5-2 IoT and Applications


Internet of Things Privacy, Security and Governance

 Heterogeneity requires security to overcome the impossibility of implementing efficient


protocols and algorithms on all the devices involved across the many IoT application
areas.
 Without guarantees in security, stakeholders are unlikely to adopt IoT solutions on a
large scale. For this reason, the development of enforcement techniques to support
scalability and heterogeneity, to anonymize users’ data and to allow context aware data
protection are key factors.
 In the IoT context, it is difficult to separate the concepts of Governance, Security and
Privacy, because addressing privacy and security aspects to achieve trust in IoT would
probably need governance mechanisms as well.
 The security and privacy framework has to provide features to dynamically adapt
access rules and information granularity to the context.

5.3 Contribution from FP7 Projects

 FP7 means 7th Framework Programme for research and technological development. It
will last for seven years from 2007 until 2013. The programme has a total budget of
over € 50 billion.
 FP7 is a key tool to respond to Europe's needs in terms of jobs and competitiveness, and
to maintain leadership in the global knowledge economy.
5.3.1 FP7 iCore Access Framework

 The iCore cognitive framework is based on the principle that any real world object and
any digital object that is available, accessible, observable or controllable can have a
virtual representation in the “Internet of Things”, which is called Virtual Object (VO).
 iCore initiative addresses two key issues in the context of the Internet of Things (IoT),
namely how to abstract the technological heterogeneity that derives from the vast
amounts of heterogeneous objects, while enhancing reliability and how to consider the
views of different stakeholders for ensuring proper application provision, business
integrity and, therefore, maximize exploitation opportunities.
 The iCore proposed solution is a cognitive framework comprising three levels of
functionality, reusable for various and diverse applications. The levels under
consideration are Virtual Objects (VOs), Composite Virtual Objects (CVOs) and
functional blocks for representing the stakeholder perspectives.

5-3 IoT and Applications


Internet of Things Privacy, Security and Governance

 Virtual objects are cognitive virtual representations of real‐world objects (e.g. sensors,
devices, everyday objects) that hide the underlying technological heterogeneity.
 The iCore solutions will be equipped with essential security protocols/functionality,
which span all levels of the framework, and consider the ownership and privacy of data,
as well as controlling the actual access to objects.
 A Virtual Object (VO) is the virtual representation of Real-World Objects (RWOs).
RWOs may be either digital objects with Information and Communication
Technologies (ICT) capabilities or non-ICT objects.
 ICT objects include objects such as sensors, actuators, smart phones, etc. ICT objects
may have a physical location and may offer various functions such as environmental
condition measurements, location of objects /person, monitoring of places for security
reasons, etc.
 The VO registry includes information about VOs that are available in the system. Each
VO is identified by a Uniform Resource Identifier (URI) and contains information on
the association with an ICT object.
5.3.2 IoT@Work Capability Based Access Control System

 Resources’ protection requires the resource provider be able to know which client is
accessing what resources for doing what. Information about clients and about their
purposes when accessing a specific resource is critical for a resource provider to grant
or deny the requested operation.
 The most common form of access control is based on Access Control Lists (ACLs),
which assign access rights to specific subjects.
 Capability-Based Access Control (Cap-BAC) : A capability is a communicable,
unforgeable rights markup, which corresponds to a value that uniquely specifies certain
access rights to objects owned by subjects.
 In Cap-BAC, the user needs to show the service provider the authorization certificate
prior to performing corresponding resource request operations.
 Fig. 5.3.1 shows traditional ACL-based access control and access control using
capability based messaging.

5-4 IoT and Applications


Internet of Things Privacy, Security and Governance

Fig. 5.3.1(a) : Traditional ACL-based access control

Fig. 5.3.1(b) : Access control using capability based messaging

 Authorization certificates are issued by the owner of a resource/service to desired users,


in order to ensure that the users can request resources or services.
 The IoT@Work capability based approach supports : Access right delegation,
capability tokens revocation, fine-grained access rights. Token elements are based on
the SAML/XACML standards.
 The resource manager creates a first capability token that assigns rights to itself as the
owner of the capability on resources.
 The capability token contains other information and is digitally signed by the issuer.
The server that is in charge of managing access to the specified resource has to trust the
resource manager and, therefore, its root capability.
 The resource manager can generate new capability tokens for other users using its root
capability, granting them one or more of its rights. It can also flag some or all of the
granted rights as delegable so they can create further capability tokens on their own.

5-5 IoT and Applications


Internet of Things Privacy, Security and Governance

The new capability token has to be digitally signed by the issuer and includes the
capability token of the issuer.
 The resource PDP (Policy Decision Point) is the service in charge of managing resource
access request validation and decision.
5.3.3 GAMBAS Adaptive Middleware

 GAMBAS means Generic Adaptive Middleware for Behavior-driven Autonomous


Service.
 Fig. 5.3.2 shows the overall system architecture. GAMBAS deployment consists of
different systems.
 The mobile systems of the citizens are acting as both data sources and data sinks. The
city systems from different layers are managing data and providing services to the
mobile systems. To do this, they may rely on information provided by other services as
well as data provided by the mobile systems.
 In most cases, information is accessed via the web which requires persons to memorize
long URLs, click through web pages or browse through search results.

Fig. 5.3.2 : Overall system architecture

5-6 IoT and Applications


Internet of Things Privacy, Security and Governance

 Furthermore, they may integrate data from legacy systems and they may be receiving
data from other systems through existing means. For example, a transport system might
already be collecting information through sensors deployed in a city or in vehicles.
Similarly, it may already have access to geographic data describing the different roads
in the city.
 The GAMBAS middleware will enable the development of novel applications and
Internet-based services that utilize context information in order to adapt to the behavior
of the user autonomously.

Fig. 5.3.3 : GAMBAS middleware

 To do this, the middleware will provide the means to gather context in a generic, yet
resource-efficient manner and it will support the privacy-preserving sharing of the
acquired data.
 Thereby, it will apply interoperable data representations which support scalable
processing of data gathered from a large number of connected objects.
 In order to make the resulting novel services accessible to the user, the middleware will
also support intent-aware interaction by providing a constant stream of relevant
recommendations for services.

5-7 IoT and Applications


Internet of Things Privacy, Security and Governance

 From a security and privacy perspective, the developments in GAMBAS are centered
on a secure distributed architecture in which data acquisition, data storage and at a
processing are tightly controlled by the user.
 To store and manage data of services as well as data generated by devices, the
GAMBAS runtime encompasses a data processing component. Internally, the data
processing component itself is structured in three sub-components that (a) Store the
data, (b) Query for data and (c) Discover data.
 The GAMBAS middle-ware simplifies the development of smart city applications
focusing on three common tasks, namely efficient data acquisition, secure and privacy-
preserving data distribution as well as interoperable data integration
5.3.4 Governance, Security and Privacy in the Butler Project

 The goal of the BUTLER project is the creation of an experimental technical platform
to support the development of the Internet of Things.
 BUTLER brought together a consortium of 19 partners, innovative companies, research
and academic institutions, end-user centric service providers and business experts from
eight European countries.
 BUTLER focused on five “innovation eco-systems” that are part of most people’s daily
lives :
1) Smart homes and offices;
2) Smart shopping;
3) Smart mobility and transport;
4) Smart healthcare and wellness; and
5) Smart cities.
 The BUTLER services are based on state-of-the-art network communication protocols
that enable reliable communication using secured protocols that are adapted to the
limited capacity of the devices that are part of the network.
 The researchers involved used context information to develop algorithms to improve
trust, security and privacy that satisfy the needs of both users and infrastructure
providers.
 The main achievement of the BUTLER project is the release of an open-platform portal
that provides a map of open technologies that can be used to create Internet of Things
applications.

5-8 IoT and Applications


Internet of Things Privacy, Security and Governance

 The platform can also be used to document their interoperability, relationships, and
reference to existing use cases, infrastructures and deployments.
 BUTLER provides an authorization server as a security service path distinct from the
application path. The authorization server and the managed resources share bootstrap
security credentials enabling generation of session keys.
 The authorization server authenticates user and application for providing the application
with access token and session keys for accessing a specific resource.
 BUTLER provides also a threat analysis model that could be used to evaluate the threat
on dedicated use cases and scenarios.

5.4 Security, Privacy and Trust in IoT-Data-Platforms for Smart Cities

 SMARTIE is a secure and smarter cities data management system. The SMARTIE
project works on security, privacy and trust for data exchange between IoT devices and
consumers of their information.
 A secure, trusted, but easy to use IoT system for a smart city will benefit the various
stakeholders of a smart city.
 The city administration will have it easier to get information from their citizens while
protecting their privacy.
 Furthermore, the services offered will be more reliable if quality and trust of the
underlying information is ensured.
 Fig. 5.4.1 shows the components of a typical smart city information system.

Fig. 5.4.1 : Components of a typical smart city information system

5-9 IoT and Applications


Internet of Things Privacy, Security and Governance

 Privacy and trust are a key prerequisite for citizens to participate in Smart City
activities. A smart city can improve the smart and comfort live of their citizens
enormously.
 Enterprises benefit from the securely provided information. They can optimize their
business processes and deal with peak demands introduced by the dynamics of the
smart city. Furthermore, they can offer more tailored solutions for their customers
based on the status of the smart city.
 All parties involved in the overall systems such as sensors and actuators, end users, data
owners but also service providers need strong mechanisms for reliability and trust.
 The Objectives of SMARTIE are
1) Understanding requirements for data and application security and creating a
policy-enabled framework supporting data sharing across applications.
2) Developing new technologies that establish trust and security in the perception
layer and network layer.
3) Develop new technologies for trusted information creation and secure storage for
the information service layer.
4) Develop new technologies for information retrieval and processing guided by
access control policies in the application layer.
5) Demonstrate the project results in real use cases.
Why risk mitigation is a top priority for smart cities

 Due to the large number of connected devices that make up a smart city's digital
infrastructure, enhanced security management for gateway devices, such as Industrial
Control Systems (ICS) and IT Systems (ITS), is critical to prevent data breach or
leakage.
 Leakage of sensitive data can lead to a lock-down of critical services.
 A smart city framework deals with huge volumes of data that is generated as a result of
communication between various interdependent subsystems and the interactions
between devices and citizens.
 Protection of such private and sensitive information, especially citizen data, is of utmost
importance. Further, any incident of data breach or data loss can damage citizens'
perception of security in a smart city.
 Other information security concerns include interception of wireless data in transit
between senders and receivers, leakage of confidential information, and viruses in
devices such as sensors.

5 - 10 IoT and Applications


Internet of Things Privacy, Security and Governance

 Cloud-based information services and data storage in smart cities can also be
compromised through hacking and other subversive activities.
 An attacker can simultaneously attack on multiple layers :
1) Manipulate the sensor measurements to infiltrate the system with wrong data, e.g.
to cause certain actuations.
2) Attack the sensors and actuators physically to obtain credentials.
3) Attack or impersonate network components to act as a man-in-the-middle.
4) Obtain sensitive data or cause actuation by attacking the sharing platform with
forged or malicious requests

5.5 Data Aggregation for the IoT in Smart Cities

 An IoT data is heterogeneous both semantically and syntactically. Despite this


heterogeneity, future IoT applications including smart home, smart city and smart
energy services, will require that all data be easily compared, correlated and merged,
and that interpretation of the resulting aggregate into higher level context better
matches people needs and requirements.
 Data integration research has been focused in database schema integration approaches
and the use of ontologies and related semantic technologies to provide data consistency
among heterogeneous database schemas.
 One major benefit of expressing data representation with semantic language relates to
its ability to provide high level and expressive abstractions. For instance, in the IoT,
data abstraction is concerned with the ways that the physical world is perceived and
managed
5.5.1 First Steps Towards a Secure Platform

 In SMARTIE and in other IoT systems, systems belonging to different owners need to
cooperate. Such a cooperating system can be denoted as a System of Systems (SoS).
 Dependability have the following attributes :
1) Availability 2) Reliability
3) Safety 4) Integrity
5) Maintainability
 The main aspects of security are confidentiality, integrity and availability for authorized
actions. Confidentiality means absence of unauthorized disclosure of information.
Integrity is the prevention of unauthorized modification or deletion of information.

5 - 11 IoT and Applications


Internet of Things Privacy, Security and Governance

 Fundamental building blocks for realizing and managing SoS are as follows :
1) Autonomy : The ability to make independent choices.
2) Belonging : Happiness found in a secure relationship.
3) Connectivity : The ability of system to link with other systems.
4) Diversity : Distinct elements in a group.
Privacy-preserving sharing of IoT data
 The increasing development of IoT is dramatically changing the way people share
information and communicate with their surrounding environment, enabling a constant,
invisible and sometimes unintended data exchange, between things and people.
 The main objective of privacy preservation is ensuring that private data remains
protected, while processing or releasing sensitive information.
 Privacy in the Internet of Things is the threefold guarantee to the subject for
a) Awareness of privacy risks imposed by smart things and services surrounding the
data subject
b) Individual control over the collection and process-ing of personal information by
the surrounding smart things
c) Awareness and control of subsequent use and dissemination of personal
information by those entities to any entity outside the subject’s personal control
sphere
 Fig. 5.5.1 shows an IoT reference model with relevant entities and data flows in a
typical IoT application.

Fig. 5.5.1

5 - 12 IoT and Applications


Internet of Things Privacy, Security and Governance

 The fundamental privacy mechanisms lie in the intelligent data management so that
only the required data is collected. Detecting the redundancy, data is anonymized at the
earliest possible stage and then deleted at the earliest convenience.
5.5.2 SMARTIE Approach
 SMARTIE is used for designing and building data centric information sharing platform.
This information is accessed by an information service layer.
 An information service layer operates above the heterogeneous network devices and
data sources. SMARTIE is the first EU project that relies on the IoT-ARM.
 IoT layer with their responsibility is given below :
IoT Layer Devices and functions Security requirements
Application layer 1) Intelligent transportation 1) Authentication,
2) Smart energy authorization, assurance;
3) Public safety 2) Privacy protection and
4) Utilities policy management;
5) Service providers. 3) Secure computation;
4) Application-specific data
minimization;
5) Discovery of information
sources
Information services 1) In-network data processing 1) Cryptographic data
layer 2) Data aggregation Storage;
3) Cloud computing 2) Protected data management
and handling
Network 1) Networking infrastructure 1) Communication and
2) Network-level protocols connectivity security;
2) Secure sensor/cloud
Interaction;
3) Cross-domain data security
handling
Smart object 1) Sensors for data collection 1) Data format and structures;
2) Actuators 2) Trust anchors and
Attestation;
3) Access control to nodes
4) Lightweight encryption

5 - 13 IoT and Applications


Internet of Things Privacy, Security and Governance

5.5.2.1 Smart Transportation

 A smart city uses collaboration and stakeholder engagement to create an aligned vision
and uncover synergies that reduce costs, increase operational efficiencies, improve
safety and quality of life, mitigate environmental impacts, and provide stewardship of
resources for future generations.
 Smart transportation should provide a comprehensive holistic approach to the broader
issue of managing an urban environment by sharing and leveraging data to proactively
manage traffic.
 Performance measures provide quantified evidence of the consequences of deployed
strategies or technologies as well as identifying traffic bottlenecks and air pollution hot
spots.
 Autonomous and connected vehicle technologies is expected to revolutionize traditional
traffic management and operations to further reduce traffic crashes and congestion.
Smart city objectives

1) Use of user smart phones in order to include additional information related to their
travels.
2) Extending traffic control systems with mobile traffic control systems to react fast
on abnormal situations.
3) Improving the management of individual motor car traffic, to reduce travelling
time in the town.
4) Improving the management of the public transportation networks to foster greater
use of sustainable transport modes.
5.5.2.2 Smart Cities in India : An Overview

 The government of India is in the process of developing smart cities in India which it
sees as the key to the country's economic and social growth.
 The promises of the smart city mission include reduction of carbon footprint, adequate
water and electricity supply, proper sanitation, including solid waste management,
efficient urban mobility and public transport, affordable housing, robust IT connectivity
and digitalization, good governance, citizen participation, security of citizens, health
and education
 Objectives
1) Provide basic infrastructure.
2) Quality of life.

5 - 14 IoT and Applications


Internet of Things Privacy, Security and Governance

3) Clean and sustainable environment.


4) Apply smart solutions.
5) Set examples to be replicated both within and outside the smart city and catalyze
the creation of similar smart cities.
 Basic infrastructure includes :
1) Assured water and electricity supply,
2) Sanitation and solid waste management,
3) Efficient urban mobility and public transport,
4) Affordable housing,
5) Robust IT connectivity,
6) e-governance and citizen participation,
7) Safety and security of citizens,
8) Health and education and
9) Economic activities and livelihood opportunities.
Internet of Things Privacy, Security & Governance ends…

5 - 15 IoT and Applications


Internet of Things Privacy, Security and Governance

Notes

5 - 16 IoT and Applications


Short Questions and Answers

Short Questions and Answers

Chapter 1 : IoT & Web Technology


Q.1 Define IoT.

Ans :  By embedding short-range mobile transceivers into a wide array of additional


gadgets and everyday items, enabling new forms of communication between people and
things, and between things.
 The Internet of Things (IoT) is the network of physical objects i.e. devices, vehicles,
buildings and other items embedded with electronics, software, sensors, and network
connectivity that enables these objects to collect and exchange data.
Q.2 How IoT differ from traditional computing ?

Ans. : IoT data differs from traditional computing. The data can be small in size and frequent
in transmission. The number of devices, or nodes, that are connecting to the network are also
greater in IoT than in traditional PC computing.
Q.3 List the characteristics of the Internet of Things.

Ans. : Characteristics of the Internet of Things are Interconnectivity, Heterogeneity, Things-


related services and dynamic changes.
Q.4 List the advantages of IoT.

Ans. : Advantages :

1. Improved customer engagement and communication


2. Support for technology optimization
3. Support wide range of data collection
4. Reduced waste
Q.5 List the name of low power communication technology.

Ans. : Low power communication technologies are IEEE 802.15.4, Bluetooth, Ultra-wide
bandwidth and RFIS.
Q.6 What do you mean autonomy in IoT ?

Ans. : Autonomy in IoT can be realized by implementing self-managing systems. Self-


management is the property of a system to achieve management and maintenance of its
resources intrinsically and internally. Management and maintenance is realized through many
levels of decision making.

Q-1 IoT and Applications


Short Questions and Answers

Q.7 What is cloud computing ?

Ans. : Cloud computing is a pay-per-use model for enabling available, convenient, on-
demand network access to a shared pool of configurable computing resources that can be
rapidly provisioned and released with minimal management effort or service-provider
interaction. Cloud computing refer to a variety of services available over the Internet that
deliver compute functionality on the service provider's infrastructure. Its environment may
actually be hosted on either a grid or utility computing environment, but that doesn't matter to
a service user.
Q.8 What are the challenges in implementing smart healthcare by using IoT ?

Ans. : Challenges are smarter hospital, data integration, lack of information sharing, bad
health habits, shortness of medical resources.
Q.9 What is smart grid ?

Ans. : A smart grid is an electrical grid that uses modern technology (digital or analog) to
collect and communicate electricity related information of both the suppliers and consumers.
Q.10 What are the factors powering the progression of the IoT within the digital
economy ?

Ans. :  Powerful new mobile, wearable or connected devices


 Application that fuel demand for mobile data and test the limits of the network within
most industry sector
 Cloud-based apps and those that rely on content stored in the cloud, which will increase as
development accelerates on new Platform-as-a-Service, mobile point of sale and
independent software vendor platforms
 New use cases, such as mobile video, which will be significant factors in driving
expensive capacity upgrades in networks
Q.11 What is data management ?

Ans. : Data management is the ability to manage data information flow. With data
management in the management service layer, information can be accessed, integrated and
controlled. Higher layer applications can be shielded from the need to process unnecessary
data and reduce the risk of privacy disclosure of the data source.
Q.12 Define virtual sensor.

Ans. : A virtual sensor is a software sensor as opposed to a physical or hardware sensor.


Virtual sensors provide indirect measurements of abstract conditions by combining sensed
data from a group of heterogeneous physical sensors.

Q-2 IoT and Applications


Short Questions and Answers

Chapter 2 : M2M to IoT


Q.13 What is M2M communication ?

Ans. : M2M communication is a form of data communication that involves one or more
entities that do not necessarily require human interaction or intervention in the process of
communication
Q.14 What are the key features of M2M communication ?

Ans. :  Some of the key features of M2M communication system are given below :
1. Low Mobility : M2M devices do not move and if moves only within a certain area
2. Time Controlled : Data can be send or receive only at certain pre-defined time periods
3. Time Tolerant : Sometimes data transfer can be delayed
4. Packet Switched : Network operator to provide packet switched service
Q.15 What is M2M device ?

Ans. : A device that runs application(s) using M2M capabilities and network domain
functions. An M2M Device is either connected straight to an Access Network or interfaced to
M2M Gateways via an M2M Area Network
Q.16 What is Global value chains ?

Ans. : A value chain describes the full range of activities that firms and workers perform to
bring a product from its conception to end use and beyond, including design, production,
marketing, distribution, and support to the final consumer
Q.17 What is Industrial Internet of Things ?

Ans. : The Industrial Internet of Things (Industrial IoT) is made up of a multitude of devices
connected by communications software. The resulting systems, and even the individual
devices that comprise it, can monitor, collect, exchange, analyze, and instantly act on
information to intelligently change their behavior or their environment -- all without human
intervention
Q.18 What is Reference model ?

Ans. : A Reference Model is an abstract framework for understanding significant


relationships among the entities of some environment. It enables the development of specific
reference architectures. A Reference Model consists of a minimal set of unifying concepts,
axioms and relationships
Q.19 Define reference architecture.

Ans. : A Reference Architecture is an architectural design pattern that indicates how an


abstract set of relationships realizes a set of requirements. The main purpose of a RA is to

Q-3 IoT and Applications


Short Questions and Answers

provide guidance for the development of concrete architectures. More reference architectures
may be derived from a common reference model.

Chapter 3 : IoT Reference Architecture


Q.20 What are the responsibility of ETSI TC M2M ?

Ans. : 1. To collect and specify M2M requirements from relevant stakeholders;


2. To develop and maintain an end-to-end overall high level architecture for M2M;
3. To identify gaps where existing standards do not fulfil the requirements and provide
specifications and standards to fill these gaps, where existing standards bodies or groups
are unable to do so;
4. To provide the ETSI main centre of expertise in the area of M2M;
Q.21 What is use of mla reference point ?

Ans. :mIa : M2M application interface : it is used by the Network Applications (NA) to
communicate with the Network Service Capability Layer (NSCL).
Q.22 What is use of dla reference point ?

Ans. : Device application interface : it is used by the Device and Gateway Applications (DA
and GA) to communicate with the local service capabilities, i.e. Device Service Capability
Layer (DSCL) and Gateway Service Capability Layer.
Q.23 What is Open Geospatial Consortium standard ?

Ans. : The Open Geospatial Consortium (OGC 2013) is an international industry


consortium of a few hundred companies, government agencies, and universities that develops
publicly available standards that provide geographical information support to the Web, and
wireless and location-based services.
Q.24 What is use of Open Geospatial Consortium (OGC 2013) ?

Ans. : OGC Standards used to monitor, model and forecast flood, drought and
environmental events. Government agencies can rapidly integrate data from different sensor
networks. External (e.g. agricultural) sensor feeds can be incorporated easily to improve
prediction and decision making.
Q.25 Explain an IoT domain model

Ans. : A domain model defines the main concepts of a specific area of interest. These
concepts are expected to remain unchanged over the course of time, even if the details of an
ARM may undergo continuous transformation or evolution over time. The domain model
captures the basic attributes of the main concepts and the relationship between these concepts.

Q-4 IoT and Applications


Short Questions and Answers

Q.26 What is functional model ?

Ans. : Functional Model is an abstract framework for understanding the main Functionality
Groups (FG) and their interactions. This framework defines the common semantics of the
main functionalities and will be used for the development of IoT-A compliant Functional
Views.
Q.27 What is functional view ?

Ans. : Functional View describes the system’s runtime Functional Components, their
responsibilities, default functions, interfaces and primary interactions. The Functional View
derives from the Functional Model and reflects the developer’s perspectives on the system.
Q.28 What is Request/Response pattern ?

Ans. : The Request/Response pattern is a synchronous way of communication between two


parties. A client sends a request to a server. The server will receive the request and will send a
response back to the client. The client is waiting for the response until the server has sent it.
Q.29 Explain Publish/Subscribe pattern.

Ans. : The Publish/Subscribe pattern allows a loose coupling between communication


partners. There are services offering information and advertise those offers on a broker
component. When clients declare their interest in certain information on the broker the
component will make sure the information flow between service and client will be established.

Chapter 4 : IoT Application for Value Creation


Q.30 What are the challenges faced by IoT industry applications ?

Ans. : 1. Security. As the IoT connects more devices together, it provides more
decentralized entry points for malware. Less expensive devices that are in physically
compromised locales are more subject to tampering.
2. Trust and Privacy. With remote sensors and monitoring a core use case for the IoT, there
will be heightened sensitivity to controlling access and ownership of data.
3. Complexity, confusion and integration issues.
4. Evolving architectures competing standards
Q.31 What is concept of future factory ?

Ans. : Factories of the future are oriented toward ensuring the availability of all relevant
information in real time through the connectivity of all elements participating in the value
chain, as well as providing the ability to deduce the optimal value chain processes from this
data at the demand of the individual customer. The factory of the future will increase global
competitiveness and will require an unprecedented integration of systems across domains,
hierarchy boundaries and life cycle phases

Q-5 IoT and Applications


Short Questions and Answers

Q.32 What do you mean smart factory ?

Ans. : The Smart Factory will fundamentally change how products are invented,
manufactured and shipped. At the same time it will improve worker safety and protect the
environment by enabling low-emissions and low-incident manufacturing.
Q.33 What is Brownfield IoT ?

Ans. : Brownfield refers to the implementation of new systems to resolve IT problem areas
while accounting for established systems. Brownfield describes the billions of devices and
legacy software applications performing discrete functions in isolation. Some of these will
require migration strategies to connect with and realize the benefits of IoT
Q.34 Explain smart object.

Ans. : Smart Object is a bi-directional communicating object which observes its


environment and is able to make decisions depending on the application and based on the
information extracted from the physical world. Smart object is an item equipped with a form
of sensor or actuator, a tiny microprocessor, a communication device, and a power source
Q.35 What are the four aspects of Internet of Things & Services ?

Ans. : Four aspects of the Internet of Things & Services are technology, business
innovation, market and competencies.
Q.36 Define the term ‘Industry 4.0’.

Ans. : It stands for the fourth industrial revolution and focuses on the end-to-end digitization
of all physical assets and integration into digital ecosystems with value chain partners.
Industry 4.0 digitizes and integrates processes vertically across the entire organization, from
product development and purchasing, through manufacturing, logistics and service.
Q.37 List the dimension of Big data.

Ans. : Dimension of Big data are :


1. Volume : datasets who size runs into petabytes and beyond.
2. Variety : data who form could be structured or unstructured.
3. Velocity : data that comes into the processing environment very fast.
Q.38 Explain the supply chain management department functions.

Ans. : Functions are


1. Inventory management
2. Transportation service procurement
3. Materials handling
4. Inbound transportation

Q-6 IoT and Applications


Short Questions and Answers

5. Transportation operations management


6. Warehousing management
Chapter 5 : IoT Privacy, security and Governance
Q.39 What is Governance as per EU ?

Ans. : As per European Union (EU), ‘Governance’ refers to the rules, processes and
behaviour that affect the way in which powers are exercised, particularly as regards openness,
participation, accountability, effectiveness and coherence.
Q.40 Define Cap-BAC.

Ans. : Capability-Based Access Control (Cap-BAC) : A capability is a communicable,


unforgeable rights markup, which corresponds to a value that uniquely specifies certain access
rights to objects owned by subjects.
Q.41 Explain GAMBAS middleware

Ans. : The GAMBAS middleware will enable the development of novel applications and
Internet-based services that utilize context information in order to adapt to the behavior of the
user autonomously. To do this, the middleware will provide the means to gather context in a
generic, yet resource-efficient manner and it will support the privacy-preserving sharing of the
acquired data.
Q.42 What is goal of BUTLER project ?

Ans. : The goal of the BUTLER project is the creation of an experimental technical platform
to support the development of the Internet of Things.
Q.43 Explain BUTLERs five “innovation eco-systems”.

Ans. : Innovation eco-systems are as follows :


1. Smart homes and offices;
2. Smart shopping;
3. Smart mobility and transport;
4. Smart healthcare and wellness; and
5. Smart cities.
Q.44 What are the objectives of SMARTIE ?

Ans. : The objectives are :


1. Understanding requirements for data and application security and creating a policy-
enabled framework supporting data sharing across applications.

Q-7 IoT and Applications


Short Questions and Answers

2. Developing new technologies that establish trust and security in the perception layer and
network layer.
3. Develop new technologies for trusted information creation and secure storage for the
information service layer.
4. Demonstrate the project results in real use cases
Q.45 Define SMARTIE.

Ans. : SMARTIE is a secure and smarter cities data management system. The SMARTIE
project works on security, privacy and trust for data exchange between IoT devices and
consumers of their information.
Q.46 Explain objective of smart city.

Ans. : Smart City Objectives


1. Use of user smart phones in order to include additional information related to their travels
2. Extending traffic control systems with mobile traffic control systems to react fast on
abnormal situations
3. Improving the management of individual motor car traffic, to reduce travelling time in the
town
4. Improving the management of the public transportation networks to foster greater use of
sustainable transport modes

Short Questions and Answers ends…

Q-8 IoT and Applications


Advanced Semiconductor Devices S-1 December-2012

Summer - 2017 Gujarat Technological


IoT and Applications
Semester - VIII (CE/CSE/IT) Elective – III
University
Solved Paper
1
Time : 2 Hours] [Total Marks : 70
2
Instructions :

1. Attempt all questions.

2. Make suitable assumptions wherever necessary.

3. Figures to the right indicate full marks.

Q.1 (a) Define IoT. Discuss various application areas of IoT. (Refer section 1.1) [7]
(b) Explain Time for convergence for IoT. (Refer section 1.2) [7]
Q.2 (a) Explain M2M value chains. (Refer section 2.3) [7]
(b) Explain IoT functional view. (Refer section 1.5.2) [7]
OR

(b) Discuss IoT architecture outline with diagram. (Refer section 2.9) [7]
Q.3 (a) Explain IoT value chains. (Refer section 2.4) [7]
(b) Explain ETSI M2M high - level architecture. (Refer section 3.1.1) [7]
OR

Q.3 (a) Discuss IoT domain model notation and semantics. (Refer section 3.3.1) [7]
(b) Explain IoT reference architecture’s deployment and operational view.
(Refer section 3.4.4) [7]
Q.4 (a) What are the requirements that IoT application for industrial application should meet ?
(Refer section 4.2) [7]
(b) What the shopping basket can tell : IoT for retailing industry ? [7]
Ans. : Shopping Basket :

 Every supermarkets employ shopping baskets to help customers to select and store the
products. The customers have to drop the products which they wish to purchase and then
proceed to checkout.

S-1
Solved Paper Summer-2017

 Smartstore is a concept that describes the principle of automating retail trading platforms
utilizing the Internet of Things (IoT) technology. To automate these processes, RFID
sensors, POS terminals, smart shelves, smart carts, video cameras, Big Data technology
and many other solutions can be used. As a result, retailers gain ample opportunities to
optimize their business processes and improve the quality of service to their customers.
 For example, by using RFID tags and specialized software, you can control in real time the
types of goods that were taken off the shelf, which ones were loaded into carts, which ones
were paid at the checkout, etc.
 The customers have to drop every product which they wish to purchase into the shopping
cart and then proceed to checkout at the billing counter. The billing process is quite
tedious and highly time consuming and has created the need for shops to employ more
and more human resource in the billing section, and yet waiting time remains
considerably high.
 The automated shopping cart system integrates a shopping cart (trolley) with two sets of
barcode scanners placed at 2 different checkpoints, the entry and exit points respectively.
It facilitates the user to self-scan the barcode of the purchased products which he intends
to purchase.
 Wrongful entries can be corrected by making use of a keypad that changes the
functionality of the machine from addition of products to removal of products and
activates the other barcode scanner at the opposite end.
 Wireless smart-device makes note of all the scanned commodities of the particular trolley;
and is linked with the Supermarket's backend database which contains details of the
products such as cost, available stock.
 The scanned products are automatically billed in the wireless smart device for their
purchases, thereby significantly reducing turnaround time and reducing and transmitted
to the Shop's central Billing program. By this mechanism, the time consuming work of
scanning and billing every single product at the cash counter can be avoided. Users can
then make use of the counter to pack and pay labour time which has become a real
problem in the modern era.
OR

(a) Discuss GAMBAS adaptive middleware. (Refer section 5.3.3) [7]


(b) Explain smartie approach for IoT. (Refer section 5.5.2) [7]

S-2 IoT and Applications


Solved Paper Summer-2017

Q.5 (a) Explain in brief future factory concepts. (Refer section 4.2.1) [7]

(b) Describe four aspects in your business to master IoT. (Refer section 4.5) [7]
OR

(a) Explain Butler project. (Refer section 5.3.4) [7]


(b) Explain security, privacy and trust in IoT - Data - Platforms for smart cities.
(Refer section 5.4) [7]


































S-3 IoT and Applications


Solved Paper Summer-2017

Notes

S-4 IoT and Applications


Advanced Semiconductor Devices S-5 December-2012

Winter - 2017 Gujarat Technological


IoT and Applications University
Semester - VIII (CE/CSE/IT) Elective – III Solved Paper
1
Time : 2 Hours] [Total Marks : 70
2
Instructions :

1. Attempt all questions.


2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
Q.1 (a) Explain issues of IoT. [3]
Ans. : From the beginning, IoT devices present inherited challenges since they are constrained
devices with low memory, processing, communication and energy capabilities.

1. The first key challenge for a ubiquitous deployment is the integration of multi-
technology networks in a common all-IP network to ensure that the communication
network is reliable and scalable. For this purpose, IoT relies on the connectivity and
reliability for its communications on Future Internet architecture.
2. The second key challenge is to guarantee security, privacy, integrity of information
and user confidentiality. The majority of the IoT applications need to take into
considerations the support of mechanisms to carry out the authentication,
authorization, access control, and key management.
3. In addition, due to the reduced capabilities from the constrained devices enabled with
Internet connectivity, a higher protection of the edge networks needs to be considered
with respect to the global network.
4. The third key challenge is to offer support for the mobility, since the Future Internet
presents a more ubiquitous and mobile Internet. Mobility support increases the
applicability of Internet to new areas.
 The most present nowadays are mobile platforms such as smart phones and tablets
which enable a tremendous range of applications based on ubiquitous location,
context awareness, social networking, and interaction with the environment.
 Future Internet potential is not limited to mobile platforms, else IoT is another
emerging area of the Future Internet, which is offering a high integration of the
cybernetic and physical world.
 Mobility support in the IoT enables a global and continuous connection of all the
devices without requiring the disruption of the communication sessions.
 For example, mobility management in hospitals is required since clinical devices can
be connected through wireless technologies. Mobility offers highly valuable features
such as higher quality of experiences for the patients, since this allows the patients to

S-5
Solved Paper Winter-2017

move freely, continuous monitoring through portable/wearable sensors, extend the


coverage within all the hospital, and finally a higher fault tolerance since the mobility
management allows the connection to adapt dynamically to different access points.
5. Other challenges are also arising from the application, economical, and technological
perspectives. For example, from an application point of view are the requirements for
processing large amounts of data for a growing number of devices, it is called Big
Data.
(b) Define IoT. Explain reasons to converge the technologies and shift to IOT.
(Refer section 1.4) [4]
(c) Explain research direction of IoT. (Refer section 1.5) [7]
Q.2 (a) Define M2M. Explain reasons of shifting from M2M to IoT. (Refer section 2.1) [3]
(b) Explain IoT value chains using figure (Refer section 2.4) [4]
(c) Explain layered IoT architecture using figure. (Refer section 2.9) [7]
OR
(c) Explain main design principles and needed capabilities of IoT. (Refer section 2.8) [7]
Q.3 (a) Explain smart parking IoT application using figure. [3]
Ans.:  Smart parking system obtains the information such as availability of the parking space, the
time when the vehicle parked in, the time when the parking vehicle left.
 Fig. 1 show smart parking system.

Fig. 1 : Smart parking system

S-6 IoT and Applications


Solved Paper Winter-2017

 It involves the smart sensors that could be fixed in street lights for every parking space,
collection of real-time data, a web-based portal to monitor the parking spaces and a
mobile app which will enable user to reserve a parking space and make online payment
from their mobile app for their parking
 Sensing Device (Cogito) : Wireless sensors to monitor the status of parking slots on real
time basis. Sends data through IEEE 802.15.4 low power radio to Transeo.
 Information Gateway (Transeo) : Received data from the Cogito through IEEE 802.15.4
low power radio. Uses Wi-Fi/ Ethernet/GSM/GPRS to communicate with Server.
 Parking App : Online parking booking facility .
 Different digital modes of payment : Credit cards, e-wallet etc.
 Real time parking availability status in parking lots.
 Parking guidance on smartphone.
 Parking session ending reminders.
 Flexibility to extend parking sessions/cancel parking bookings.

(b) Explain reference architecture of IoT using figure. (Refer section 2.8) [4]
(c) Explain functional view, information view, deployment and operatonal view, other
relevant architectural views of IoT reference architecture. (Refer section 3.4) [7]
OR

Q.3 (a) Explain smart home IoT application using figure. [3]
Ans. :  Smart homes using IoT provide the user varied features to operate home devices from
any place where the user being and at any time whenever needed.
 Fig. 2 shows smart home. (See Fig. 2 on next page)
 To allow each device to communicate with each other within a heterogeneous network.
 First, it provides internet connection and data conversion services between Wi-Fi and
ZigBee networks. Then, it establishes a ZigBee network that allows home devices to
communicate with each other by using the ZigBee wireless protocol.
 Finally, it provides a user interface control panel so that users can connect to IoT AP
through the internet to get the status of each ZigBee device at home and control them
remotely.
 IoT sensors involved in home automation are in thousands, and there are hundreds of
home automation gateways as well. Most of the firmware is either written in C, Python,
Node.js, or any other programming language.
 IoT sensors for home automation by their sensing capabilities : Temperature sensors, Lux
sensors, Water level sensors, Air composition sensors, Video cameras for surveillance,
Voice/Sound sensors, Pressure sensors, Humidity sensors, Accelerometers and Infrared
sensors etc.

S-7 IoT and Applications


Solved Paper Winter-2017

Fig. 2

(b) Explain architecture reference model of IoT using figure. (Refer section 3.2) [4]
(c) Explain I-GVC using figure. (Refer section 2.5.1) [7]
Q.4 (a) Enlist IoT applications for value creations. [3]
Ans. : IoT applications for value creations :
1. Smart city
2. Smart health
3. Smart transportation
4. Smart energy and smart grid
5. Smart factor and smart manufacturing
6. Future factory
7. IoT for gas and oil industry
8. Value creation for big data and serialization

(b) Explain needs of IoT for oil and gas industry. (Refer section 4.8) [4]
(c) Explain value creation from big data and serialization. (Refer section 4.6) [7]
OR

Q.4 (a) Enlist challenges faced by industry related IoT applications.


(Refer section 4.1 page (4-5)) [3]
(b) Explain four aspects in one’s business to master IoT. (Refer section 4.5) [4]
(c) Explain eHealth IoT application (Refer section 4.10) [7]

S-8 IoT and Applications


Solved Paper Winter-2017

Q.5 (a) Data aggregation for the IoT in smart cities security. (Refer section 5.5) [3]
(b) Explain contributions from FP7 projects. (Refer section 5.3) [4]
(c) Explain security, privacy and trust in IoT data-platforms for smart cities.
(Refer section 5.4) [7]
OR

(a) Explain security concerns for smart home application. [3]


Ans. : Some of the security threats in the smart home are as follows :
 Confidentiality threats are those that result in the unwanted release of sensitive
information. For example, confidentiality breaches in home monitoring systems can lead
to the inadvertent release of sensitive medical data.
 Authentication threats can lead to either sensing or control information being tampered
with.
 Access threats are probably the greatest threats. Unauthorized access to a system
controller, particularly at the administrator level, makes the entire system insecure.
 This can be through inappropriate password and key management, or it could be by
unauthorized devices connecting to the network.
 Even if control cannot be gained, an unauthorized connection to a network can steal
network bandwidth, or result in a denial of service to legitimate users.
 Vulnerabilities : A significant vulnerability is networked system accessibility. Because
modern smart home systems are connected to the Internet, attacks can be conducted
remotely, either by direct access to networked control interfaces, or by downloading
malware to devices.
 Due to their low cost, IoT computing devices generally are not as powerful as traditional
desktop and laptop computers.
 Most IoT devices are low energy, use a low-end microcontroller and have limited
memory. Such controllers are well-matched to the requirements of standalone controllers
in a washing machine or air conditioner.
 However, these characteristics have made the move to networked IoT controllers more
challenging as the existing Internet protocols are not typically designed for these
embedded devices.
 Several Internet Engineering Task Force (IETF) working groups have been created to
tackle these problems.

(b) Explain smartie approach, properties and characteristics. [4]


Ans. : Properties and characteristics :
1. It store, share and process large volumes of heterogeneous information
2. Enable end-to-end security and trust in information delivery for decision-making purpose

S-9 IoT and Applications


Solved Paper Winter-2017

3. SMARTIE follows a data-centric paradigm, which will offer highly scalable and secure
information for smart city applications
4. Applying smart solutions to infrastructure and services in area-based development in order
to make them better
5. Making governance citizen-friendly and cost effective - increasingly rely on online
services to bring about accountability and transparency
6. Promoting a variety of transport options
7. Confidentiality is needed to protect the privacy of citizens and valuable information of
stakeholders in the city, thereby protecting against unauthorized external access
8. Guaranteeing data availability and control functionality is also essential, especially in hard
situations, such as rescue operations for public safety in which coordination tasks are
required.

(c) Explain security concerns for industry. [7]


Ans. :
 Industrial IoT (IIoT) infrastructure should be protected by a comprehensive security
solution (device-to-cloud) that does not disrupt operations, service reliability or
profitability
 Many security problems associated with the IIoT stem from a lack of basic security
measures in place. Security gaps like exposed ports, inadequate authentication practices,
and obsolete applications contribute to the emergence of risks. Combine these with having
the network directly connected to the internet and more potential risks are invited.
 Unsecure IIoT systems can lead to operational disruption and monetary loss, among other
considerable consequences. More connected environments mean more security risks, such
as :
1. Software vulnerabilities that can be exploited to attack systems.
2. Publicly searchable internet-connected devices and systems.
3. Malicious activities like hacking, targeted attacks, and data breaches.
4. System manipulation that can cause operational disruption (e.g., product recalls) or
sabotage processes.
5. System malfunction that can result in damage of devices and physical facilities or
injury to operators or people nearby.
 The device layer usually comprises the IIoT devices and applications that are brought in
from different manufacturers and service providers.
 IIoT adopters should be able to know how their manufacturers and service providers
transmit and store data. And in the event of a security issue, manufacturers and service
providers should also be able to actively notify enterprises of what needs to be taken care
of.
 Securing IIoT systems therefore requires connected threat defense and end-to-end
protection, from the gateway to the endpoint, that are able to provide:

S - 10 IoT and Applications


Solved Paper Winter-2017

1. Regular monitoring and detection in case of malware infection.


2. Better threat visibility and early detection of anomalies.
3. Proactive prevention of threats and attacks between IT and OT.
4. Secure data transfer.
5. A next-generation IPS to prevent attacks from exploiting vulnerabilities.
6. Server and application protection across the data center and the cloud.
























S - 11 IoT and Applications


Advanced Semiconductor Devices S - 12 December-2012

Summer - 2018 Gujarat Technological


IoT and Applications University
Semester - VIII (CE/CSE/IT) Elective – III
Solved Paper
1
Time : 2 Hours] [Total Marks : 70
2
Instructions :

1. Attempt all questions.

2. Make suitable assumptions wherever necessary.

3. Figures to the right indicate full marks.

Q.1 (a) What is IoT. (Refer section 1.1) [3]


(b) Discuss smart health using IoT. (Refer section 1.6.5) [4]
(c) Explain research directions of IoT (Refer section 1.5) [7]
Q.2 (a) What is global value chain ? Explain it with a diagram. (Refer section 2.2) [3]
(b) Explain IoT value chains. (Refer section 2.4) [4]
(c) Discuss in detail smart city application of IoT. (Refer section 1.6.1) [7]
OR

(c) Discuss layered IoT architecture using a figure. (Refer section 2.9) [7]
Q.3 (a) What is IoT domain model. (Refer section 3.3.1) [3]
(b) Explain M2M value chains. (Refer section 2.3) [4]
(c) Explain functional view, Information view, deployment and operational view, other
relevant architectural views of IoT reference architecture. (Refer section 3.4) [7]
OR

Q.3 (a) Discuss ETSI M2M interfaces. (Refer section 3.1.1) [3]
(b) What is IoT functional model ? (Refer section 3.3.3) [4]
(c) Explain open geospatial consortium architecture with a diagram.
(Refer section 3.1.3) [7]
Q.4 (a) Explain strategic business aspects. (Refer section 4.5) [3]
(b) What the shopping basket can tell : IoT for retailing industry ?
(Refer Q.4(b) of Summer-2017) [4]
(c) Explain in brief future factory concepts. (Refer section 4.2.1) [7]

S - 12
Solved Paper Summer-2018

OR

Q.4 (a) Describe : Smart products, smart equipment and smart infrastructure. [3]
Ans. :
 Smart product : It is a data processing object, which has several interactive functions. A
smart product combines the physical and software interfaces. The usage of a smart
product is interactive and requires also some cognitive work by the user. Smart products
are dedicated to certain functionality. Smart products, also called as intelligent products.
A smart product uses a different of well known and developed technologies like; GPS,
QR codes, RFID and WLAN.
 Smart equipment : It makes management easier and also provide status information to
the user remotely
 Smart infrastructure incorporate functions of sensing, actuation, and control in order to
describe and analyze a situation, and make decisions based on the available data in a
predictive or adaptive manner, thereby performing smart actions.

(b) Discuss IoT for oil and gas industry. (Refer section 4.8) [4]

(c) Explain : The smart factory. (Refer section 1.6.4) [7]

Q.5 (a) IoT – A Architecture. (Refer section 2.9) [3]

(b) Discuss GAMBAS adaptive middleware. (Refer section 5.3.3) [4]


(c) Explain privacy-preserving sharing of IoT data. (Refer section 5.4) [7]
OR

(a) Discuss activity chain 05 – goverance, privacy and security issues. (Refer section 5.2) [3]
(b) Explain smartie approach for IoT. (Refer section 5.5.2) [4]
(c) Discuss various FP7 projects. (Refer section 5.3) [7]











S - 13 IoT and Applications


Advanced Semiconductor Devices S - 14 December-2012

Winter - 2018 Gujarat Technological


IoT and Applications University
Semester - VIII (CE/CSE/IT) Elective – III
Solved Paper
1
Time : 2 Hours] [Total Marks : 70
2
Instructions :

1. Attempt all questions.

2. Make suitable assumptions wherever necessary.

3. Figures to the right indicate full marks.

Q.1 (a) What is M2M communication ? Why M2M has shifted to the Internet of Things ?
(Refer section 2.1) [3]
(b) What is Internet of Things ? What are the applications of IoT ?
(Refer sections 1.1 and 1.6) [4]
(c) Explain the architecture of the Internet of Things. (Refer section 2.9) [7]
Q.2 (a) Which are the network and communication technologies can be used to implement an IoT
application. (Refer section 1.9) [3]
(b) What is a cloud ? What is the role of cloud platforms in IoT ? (Refer section 1.7.1) [4]
(c) Explain reference model of Internet of Things. (Refer section 3.2.1) [7]
OR

(c) Which are hardware and software components of IoT ? How do these components get
synchronized in an IoT based application ? (Refer section 1.1.1) [7]
Q.3 (a) What is the value chain of Internet of Things ? (Refer section 2.4) [3]
(b) What are data accumulation and data abstraction in a smart city application ?
(Refer section 5.5) [4]
(c) What are the security and private issues of IOT ? Explain using suitable case scenario.
(Refer section 1.12) [7]
OR

Q.3 (a) Explain functional model of IoT. (Refer section 3.3.3) [3]
(b) What is middleware ? Explain GAMBAS adaptive middleware. (Refer section 5.3.3) [4]
(c) Explain challenges of the Internet of Things ? [7]

S - 14
Solved Paper Winter-2018

Ans. : IoT Issues and Challenges :


 IoT and ubiquitous integration of clinical environments define complex design challenges
and requirements in order to reach a suitable technology maturity for its wide deployment
and market integration.
Refer Q.1 (a) of Winter-2017
 From the economic points of view, the needs to provide economies of scale, i.e., new
services based on existing modules in order to leverage the related platform investment.
 From the networking point of view to offer an end-to-end support for Quality of Service ,
since the different IoT applications will present different requirements in terms of latency
and bandwidth, for example, for clinical environments the traffic should be prioritized
over other non-critical traffic coming from smart-metering.
 Fig. 1 shows the key challenges to offer an Internet of Everything. This covers from the
integration of heterogeneous devices to the integration into a Web of Things.

Fig. 1. Key challenges to offer an Internet of Everything


 The number of devices that are connected to the Internet is growing exponentially. This
has led to defining a new conception of Internet, the commonly called Future Internet,
which started with a new version of the Internet Protocol (IPv6) that extends the
addressing space in order to support all the emerging Internet-enabled devices.
 IoT devices are small wireless devices that would be placed in public places. Wireless
communication is made secure through encryption technique. But the IoT devices are
very small and not powerful enough to support encryption methods. There is need to
modify encryption algorithm in order to support IoT devices.

S - 15 IoT and Applications


Solved Paper Winter-2018

 In IoT, the different devices are traceable through the interconnected network, it creates
threats to personal and private data.
 Many IoT devices are small in size and do not have the continuous power source.
A device computation depends on battery size and cost of the device. Many IoT devices
work as a single, limited purpose which could have customized network interfaces,
operating systems, and programming models that make the most efficient use of limited
computation, network, and energy resources.

Q.4 (a) Differentiate M2M and IoT. (Refer section 2.1.3) [3]
(b) What are the research issues of Internet of Things ? Refer section 1.5) [4]
(c) Explain smart parking system with architecture of system.
(Refer Q.3 (a) of Winter-2017) [7]
OR

Q.4 (a) Explain IoT domain model. (Refer section 3.3.1) [3]

(b) What are Bid data and Big data analytics ? How the data captured by an IoT system can be
analyzed ? (Refer section 4.6) [4]

(c) Which is a smart city ? What are the features of IoT based smart city ? Explain role of IoT
in making smart city. (Refer section 1.6.1) [7]
Q.5 (a) What is FP7 projects ? How these projects are helpful in implementing IoT systems ?
(Refer section 5.7) [3]

S - 16 IoT and Applications


Solved Paper Winter-2018

(b) What is smart health ? Discuss use of IoT smart health using all cases of the health
industry. (Refer section 4.10) [4]

(c) What is a smart home ? What are the functions of IoT based smart home ? Which sensors
are required to make smart home. (Refer Q.3 (a) of Winter-2017) [7]
OR

Q.5 (a) What are the governance issues of Internet of Things ? (Refer section 5.2) [7]
(b) How does an Internet of Things conserve the electric energy ? Discuss with a suitable case
scenario. (Refer section 1.6.2) [4]
(c) What is smart application ? How oil and gas industry can be smart using an Internet of
Things ? Take all possible use cases of oil and gas industry into consideration.
(Refer section 4.8) [7]



S - 17 IoT and Applications


Solved Paper Winter-2018

Notes
















S - 18 IoT and Applications


Advanced Semiconductor Devices S - 19 December-2012

Summer - 2019 Gujarat Technological


IoT and Applications University
Semester - VIII (CE/CSE/IT) Elective - III
Solved Paper
1
Time : 2 Hours] [Total Marks : 70
2
Instructions :

1. Attempt all questions.

2. Make suitable assumptions wherever necessary.

3. Figures to the right indicate full marks.


Q.1 a) Explain vision of IoT. (Refer section 1.4) [3]
b) Explan time for convergence for loT in detail. (Refer section 1.2) [4]
c) Explain in brief detailed layered loT architecture.
(Refer section 3.1.4) [7]
Q.2 a) Compare main characteristics of M2M and IoT.
(Refer section 2.1.3) [3]
b) Explain IoT value chains. (Refer section 2.4) [4]
c) For building an architecture of IoT explain main design principles and needed
capabilities. (Refer section 2.8) [7]
OR
c) Discuss IoT with various application area. (Refer section 1.6) [7]
Q.3 a) Explain IoT domain model. (Refer section 3.3.1) [3]
b) Explain IoT function view. (Refer section 3.4.2) [4]
c) Explain ETSI M2M high level architecture. (Refer section 3.1.1) [7]
OR
Q.3 a) Explain IoT information model. (Refer section 3.3.2) [3]
b) Explain IoT deployment and operational view.
(Refer section 3.4.4) [4]
c) Explain ETSI M2M service capabilities. (Refer section 3.1.1) [7]
Q.4 a) Explain brownfield IoT application. (Refer section 4.3) [3]
b) Explain value creation from big data and serialization.
(Refer section 4.6) [4]
c) Explain opiniouns on IoT application and value for industry.
(Refer section 4.9) [7]

S - 19
Solved Paper Summer-2019

OR
Q.4 a) Explain future factory concepts IoT application (Refer section 4.2.1) [3]
b) Explain in detail smart objects and application. (Refer section 4.4) [4]
c) Explain eHealth IoT applications. (Refer section 1.6.5) [7]
Q.5 a) Discuss activity chain 05 - governance, privacy and security issues.
(Refer section 5.2) [3]
b) Explain smartie approach for IoT. (Refer section 5.5.2) [4]
c) Discuss GAMBAS adaptive middleware. (Refer section 5.3.3) [7]
OR
Q.5 a) Explain IoT for retailing industry. (Refer section 4.7) [3]
b) Explain security, privacy and trust in IoT-data-platforms for smart cities.
(Refer section 5.4) [4]
c) Discuss various FP7 projects. (Refer section 5.3) [7]



S - 20 IoT and Applications

You might also like