IoT Technical Challenges and Solutions
IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook
Central, http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
IoT Technical Challenges
and Solutions
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
IoT Technical Challenges
and Solutions
Arpan Pal
Balamuralidhar Purushothaman
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Library of Congress Cataloging-in-Publication Data
A catalog record for this book is available from the U.S. Library of
Congress.
ISBN-13: 978-1-63081-111-2
10 9 8 7 6 5 4 3 2 1
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
To the IoT Research and Innovation community
at Tata Consultancy Services
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Contents
Preface 13
1
Internet of Things Today 15
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
8 IoT Technical Challenges and Solutions
1.6 Conclusions 36
References 36
Selected Bibliography 38
2
Scalability of Networks and Computing 41
2.1 Introduction 41
2.2 Use Cases and Requirements 42
2.2.1 Smart Transportation 43
2.2.2 Smart Environment 43
2.2.3 Smart Energy 44
2.2.4 Smart Water 44
2.2.5 Smart Security and Surveillance 45
2.2.6 Smart Retail and Logistics 45
2.2.7 Smart Manufacturing 46
2.2.8 Smart Farming 46
2.2.9 Smart Home 46
2.2.10 Smart Health 47
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Contents 9
2.7 Conclusions 67
References 68
Selected Bibliography 68
3
Security and Privacy 73
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
10 IoT Technical Challenges and Solutions
4
Sensor Informatics and Business Insights 109
5
Mobile Sensing 135
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Contents 11
6
Democratizing Analytics:
Analytics as a Service 157
7
The Real Internet of Things and Beyond 177
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
12 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Preface
13
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
14 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
1
Internet of Things Today
15
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
16 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Internet of Things Today 17
dustry verticals.
Some of the recent successful deployments of IoT that demon-
strate the above traits include [6]:
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
18 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Internet of Things Today 19
A typical IoT stack is outlined in Figure 1.1. The sensors are put
on physical objects and human beings to sense their context. The
meaningful information from the sensor signals is extracted and
sent over the Internet to the cloud using a gateway device. Fur-
ther analysis of the extracted information is done to understand
the physical events and business insights are derived thereof in
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
20 IoT Technical Challenges and Solutions
Most of the industry verticals that have fixed assets in form of build-
ings, campuses, infrastructure and heavy equipment will benefit
from deploying IoT for its facilities. There can be monitoring ap-
plications like perimeter security through video surveillance, con-
trol applications like building energy management via smart meter
data analytics or predictive maintenance for machines, and optimi-
zation applications like emergency evacuation via people sensing
and localization. Such applications will generate business value in
terms improved security or compliance, lower cost of operation,
lower cost of maintenance, and improved lifespan of assets in al-
most all industry verticals including travel and hospitality, retail,
energy and utilities, banking, industrial manufacturing, farming,
healthcare, and life sciences that usually have significant real es-
Copyright © 2016. Artech House. All rights reserved.
Using IoT for products can take two forms: it can ensure quality
when the product is built, or it can detect finished product perfor-
mance in the field. The former requires putting sensors into the
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Internet of Things Today 21
Using the sensors present in smart phones and wearable and oth-
er unobtrusive sensors like a camera, it will be possible to sense,
locate, and understand customers, which in turn, will be able to
provide enterprises with the invaluable knowledge about the cus-
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
22 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Internet of Things Today 23
Table 1.1
IoT Application Landscape
Type of Application Potential
Industry Disruption via
Vertical Facility Product Consumer Supply Chain IoT
Automotive Building or Car monitoring Driving Automation High, through
and transpor- infrastructure and behavior via driverless driverless cars
tation surveillance maintenance monitoring cars and drones
Travel and Building Room Customer Optimization Medium, through
hospitality surveillance monitoring and behavior of operations, personalization
maintenance monitoring recommender
systems
Retail and Building or End-product Customer Optimization High, through
CPG infrastructure sensing and behavior of operations, personalization
surveillance monitoring monitoring Recommender
Systems
Energy and Building or Quality Customer Demand Medium, through
utilities infrastructure monitoring behavior response peak load
surveillance and control: influencing optimization management
electricity and and peak load via customer
water management behavior
influencing
Banking, Building or End-product Customer Optimization Medium, through
insurance, infrastructure sensing and behavior via risk personalization
and financial surveillance monitoring monitoring profiling
services
Industrial Building, End-product Customer Optimization High, through
manufacturing infrastructure, quality control feedback of Operations improved
or equipment and defect monitoring efficiency
surveillance inspection
Farming Building, Produce Customer Optimization Medium, through
infrastructure, sensing and feedback of operations improved
equipment monitoring monitoring efficiency
surveillance
Environment Infrastructure Environmental People health Visualization Medium, through
surveillance sensing and and feedback real-time views
monitoring monitoring of pollution map
Healthcare Building, End-product Patient Optimization High, through
and life infrastructure sensing and prognostics of operations personalized
sciences surveillance monitoring and health risk healthcare
profiling
Telecommu- Building, End-product Customer Recommender Medium, through
nication and infrastructure sensing and feedback systems personalized
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
24 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Internet of Things Today 25
sible to conserve battery and extend sensor life in the field) are a
few of the important technical considerations for sensor subsystem
deployment. Sensor subsystems are typically computer memory
and power-constrained devices, but advances in semiconductor
technology are making sensor devices more and more powerful
yet miniaturized in this aspect. The sensors can sense environmen-
tal properties like temperature and pressure, physical properties
like location, velocity, acceleration, strain, vibration, contact, and
proximity, and physiological/biological properties like heart rate,
blood pressure, electrocardiogram (ECG), and electroencephalo-
gram (EEG). Advances in science of mechanics, electromagnetics,
acoustics, thermodynamics and optics, chemistry, and biology are
also creating increasingly more new transducers making it pos-
sible to sense newer physical events.
Local sensor networks carry the sensor data from sensors to a gate-
way device for further processing and transport of the data over
the Internet or other public networks to the cloud. They can have
fixed network topologies like star, ring, bus tree, or mesh networks
or they can be formed in an ad hoc manner. Shared media access
protocols using time division multiple access (TDMA), frequency
division multiple access (FDMA) or code division multiple access
(CDMA) technologies are used on top of the physical network con-
nectivity for seamless transportation of the sensor data. Bluetooth
and Zigbee (discussed in detail in Chapter 2) are the most popular
wireless sensor network technologies, while WiFi also can be used
in some scenarios. Depending upon the use case, the sensors can
be interconnected using wired network also or can be connected
point-to-point to the gateway using serial interfaces like universal
serial bus (USB).
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
26 IoT Technical Challenges and Solutions
whereas in most of the cases the local sensor network is not. One of
the sensor nodes in local sensor network can become the gateway
or there can be dedicated gateway devices. Because typically gate-
way devices can have more memory and computing power and in
many scenarios are electrically powered, it is possible to execute
some of the high sampling rate sensor signal processing and noise
cancellation algorithms in the gateway itself so that clean data at a
reduced rate goes to the cloud.
The cloud subsystem receives the sensor data over IP, stores them,
and allows analytics to be run on the stored data. The elastic nature
of cloud is needed to cater for uneven demand of processing and
storage emanating from fluctuating nature of the sensor data. In
some cases, the data is processed even before storing; such systems
are known as complex event processing (CEP) systems. The stor-
age database needs to handle huge data coming from sensors and
hence needs to be Big Data-enabled; there may be limited number
of huge files (like video surveillance data) or huge number of small
files (coming from a lot of sensors). The processing and analytics
engine is the software service available on the cloud to derive busi-
ness insights from the sensor data, as outlined earlier.
It is clear that the main value delivered by the IoT technolo-
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Internet of Things Today 27
ture and gas sensors. The data from these sensors form the raw
data layer. The visualization and reporting of these sensor data in
a spatiotemporal map can be the contextual information layer. The
knowledge model can be simple, telling that because there is high
abnormal temperature in certain zones, the building at that part
must have caught fire. The understanding layer can do causal anal-
ysis of the temperature sensor data and gas sensor data and infer
that the fire has been caused by a gas leak and hence appropriate
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
28 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Internet of Things Today 29
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
30 IoT Technical Challenges and Solutions
systems talking to each other to find out the fastest route for dis-
patching an ambulance).
Many of the notable standardization organizations all over the
world are working in the area of IoT Standardization under the
umbrella of the International Telecommunication Union–Telecom
(ITU-T) [16]. They include TIA (the U.S. Telecommunications In-
dustry Association) [17], ETSI (European Telecommunications
Standards Institute) [18], CCSA (China Communications Standards
Association) [19], TSDSI (Telecommunication Standards Develop-
ment Society, India) [20], ARIB (Association of Radio Industries
and Business, Japan) [21], 3GPP (Third Generation Partnership
Program), and OMA (Open Mobile Alliance) [22]. There are also
independent (or working under other organizations) alliances,
consortia, or standard-making bodies like IPSO Alliance [23], In-
ternet Engineering Task Force (IETF) [24], and OneM2M [25]. All
these bodies are working to create technical standards around
machine-to-machine (M2M) communications in various areas of
physical layer, data link layer, network layer, transport layer, and
application layer protocols and interfaces [26]. Figure 1.7 shows
the association among different M2M standardization organiza-
tions. These standardization efforts mainly take care of technical
and syntactic interoperability outlined in Figure 1.6.
In the semantic interoperation space, quite a bit of work has
been achieved in Open Geo Spatial Consortium (OGC) [27]. The
Sensor Web Enablement (SWE) and Sensor Mark-up Language
(SensorML) from OGC provides rich semantic description of sen-
sor data. These specifications from OGC are being put into stan-
dardization through the World Wide Web Consortium (W3C) [28]
as an Internet Standard for Spatial Data on the Web [29].
In the space of industry-specific interoperability, the Industrial
Internet Consortium (IIC) is doing a lot of work in terms of creat-
ing industry vertical-specific use cases, test beds, and technology
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Internet of Things Today 31
model. Similar work has also been done by the U.K. standardiza-
tion body called British Standards Institution (BSI) [32] in the area
of smart city vocabularies.
It should be noted that although a lot of effort is being spent on
the technical interoperation part, given the complexity and diver-
sity of IoT systems, it is not possible or prudent to define standards
for each and every layer and component; each vertical and use case
will have different requirements. Rather, the focus in an IoT system
should be to adopt multiple existing standards in each layer and
define the Interoperation between those standards at the syntactic,
semantic, and organizational levels. There are quite a few consor-
tia trying to work in this space [33], notable among them being
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
32 IoT Technical Challenges and Solutions
There is no disputing the fact that IoT has the potential to disrupt
every business and blur the boundaries between industry verti-
cals. There is no doubt about its potential impact. However, is this
just a hype or are there some real-life deployments in IoT? It is true
that most of the IoT deployments are happening in a pilot scale
and very few have scaled out beyond pilots. We try to explore the
main challenges in IoT that need to be addressed to convert the
hype around IoT to a practical reality. There seems to be five areas
of concern around which the challenges are emerging: (1) gearing
up the ICT infrastructure to the massive scale of IoT sensors and
data, (2) ensuring security of IoT systems and complying to pri-
vacy requirements for IoT data, (3) context-aware analytics of IoT
data leading towards business insights and value-adds, (4) afford-
able implementation and deployment of IoT system to ensure ROI,
and (5) ease of development of IoT analytics systems [40]. This is
depicted pictorially in Figure 1.8 and explained in detail next.
has scaled quite well; however, the network and computing scal-
ability, unless addressed properly can always become a bottleneck
for practical implementation of IoT systems, especially under real-
time constraints on the response and energy constraints on the sen-
sor device side. The storage, although capable of handling very
large data, mainly tries to handle a limited number of large and
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Internet of Things Today 33
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
34 IoT Technical Challenges and Solutions
A bulk of the cost of IoT deployment goes into the hardware and
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Internet of Things Today 35
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
36 IoT Technical Challenges and Solutions
1.6 Conclusions
References
[1] http://www.webopedia.com/TERM/I/internet_of_things.html.
[2] ������������������������������������������������������������������
http://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explana-
tion-internet-things-that-anyone-can-understand/#14b285316828.
[3] http://internetofthingsagenda.techtarget.com/definition/
Copyright © 2016. Artech House. All rights reserved.
Internet-of-Things-IoT.
[4] http://www.gartner.com/newsroom/id/3165317.
[5] http://sites.tcs.com/internet-of-things/.
[6] http://www.tcs.com/research/Pages/TCS-Connected-Universe-Platform.
aspx.
[7] http://www.ioti.com/iot-trends-and-analysis/10-most-important-iot-
trends-2016.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Internet of Things Today 37
[8] https://www.engadget.com/2016/02/15/
barbie-hello-dream-house-iot-voice-commands/.
[9] https://techcrunch.com/2016/06/05/atarinet-of-things/.
[10] https://blog.mozilla.org/blog/2015/12/09/firefox-os-pivot-to-connected-
devices/.
[11] http://www.techworld.com/mobile/internet-of-things-will-be-game-
changing-for-visa-says-director-3629227/.
[12] https://powermore.dell.com/technology/the-10-most-innovative-
consumer-based-internet-of-things-companies/.
[13] http://wonderfulengineering.com/30-innovative-products-you-did-not-
know-exist-but-are-too-awesome-to-miss/.
[14] http://sites.tcs.com/internet-of-things/.
[15] http://www.etsi.org/images/files/ETSIWhitePapers/IOP%20
whitepaper%20Edition%203%20final.pdf.
[16] http://www.itu.int/en/ITU-T/Pages/default.aspx.
[17] http://www.tiaonline.org/standards/procedures/manuals/scope.
cfm#TR50.
[18] http://www.etsi.org/deliver/etsi ts/102600 102699/102690/01.01.01 60/ts
102690v010101p.pdf.
[19] http://www.ccsa.org.cn/english/.
[20] http://www.tsdsi.org/.
[21] www.arib.or.jp/english/.
[22] http://www.openmobilealliance.org/.
[23] http://www.ipso-alliance.org/.
[24] www.ietf.org.
[25] http://www.onem2m.org/.
[26] http://www.iot-a.eu/public/public-documents/d3.1.
[27] www.opengeospatial.org/ogc.
[28] https://www.w3.org/.
Copyright © 2016. Artech House. All rights reserved.
[29] https://www.w3.org/2015/spatial/wiki/Main_Page.
[30] http://www.iiconsortium.org/.
[31] http://www.iso.org/iso/home.html.
[32] http://www.bsigroup.com/en-GB/smart-cities/.
[33] http://techbeacon.com/state-iot-standards-stand-big-shakeout.
[34] https://www.iotivity.org/.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
38 IoT Technical Challenges and Solutions
[35] https://allseenalliance.org/.
[36] http://www.itu.int/en/ITU-T/studygroups/2013-2016/20/Pages/
default.aspx.
[37] https://standards.ieee.org/develop/project/2413.html.
[38] https://developer.apple.com/homekit/.
[39] https://developers.google.com/brillo/.
[40] https://www.computer.org/csdl/mags/it/2015/03/mit2015030002.pdf.
[41] http://blogs.cisco.com/digital/4-key-requirements-to-scale-the-internet-
of-things.
[42] http://electronicdesign.com/communications/understanding-how-iot-
systems-scale-and-evolve.
Selected Bibliography
Atzori, L., A. Iera, and G. Morabito, “The Internet of Things: A Survey,” Computer
Networks, Vol. 54, No. 15, 2010, pp. 2787–2805.
Balamurali, P., P. Misra, and A. Pal, “Software Platforms for Internet of Things
and M2M,” Journal of the Indian Institute of Science, A Multidisciplinary Reviews Jour-
nal, Vol. 93, No. 3, July–September 2013.
Bandyopadhyay, D., and J. Sen, “Internet of Things: Applications and Challenges
in Technology and Standardization,” Wireless Personal Communications, Vol. 58,
No. 1, 2011, pp. 49–69.
Bandyopadhyay, S., P. Balamuralidhar, and A. Pal. “Interoperation Among IoT
Standards,” Journal of ICT Standardization, Vol. 1, No. 2, 2013, pp. 253–270.
Bandyopadhyay, S., et al., “Role of Middleware for Internet of Things: A Study,”
International Journal of Computer Science & Engineering Survey (IJCSES), Vol. 2, No.
3, August 2011.
Biswas, A. R., and R. Giaffreda, “IoT and Cloud Convergence: Opportunities and
Challenges,” 2014 IEEE World Forum on in Internet of Things (WF-IoT), 2014, pp.
375–376.
Botts, M., et al., “OGC® Sensor Web Enablement: Overview and High Level Ar-
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Internet of Things Today 39
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
40 IoT Technical Challenges and Solutions
Medaglia, C. M., and A. Serbanati, “An Overview of Privacy and Security Issues
in the Internet of Things,” in The Internet of Things, New York: Springer, 2010, pp.
389–395.
Ning, H., and Z. Wang, “Future Internet of Things Architecture: Like Mankind
Neural System or Social Organization Framework?” IEEE Communications Letters,
Vol. 15, No. 4, 2011, pp. 461–463.
Ojo, A., E. Curry, and T. Janowski, “Designing Next Generation Smart City Ini-
tiatives Harnessing Findings and Lessons from a Study of Ten Smart City Pro-
grams,” 22nd European Conf. on Information Systems, Tel Aviv, 2014.
Pal, A., “Internet of Things – from Hype to Reality,” IEEE Computer Society IT
Professional Magazine, May 2015.
Pal, A., et al., “System and Method for Identifying and Analyzing Personal Con-
text of a User,” U.S. Patent Application 14/376,536, filed January 22, 2013.
Parker, L. E., et al., “Distributed Heterogeneous Sensing for Outdoor Multi-Robot
Localization, Mapping, and Path Planning,” in Multi-Robot Systems: From Swarms
to Intelligent Automata, New York: Springer, 2002, pp. 21–30.
Smith, S. W., The Scientist and Engineer’s Guide to Digital Signal Processing,��������
San Di-
ego: California Technical Publishing, 1997.
Suo, H., et al., “Security in the Internet of Things: A Review,” 2012 IEEE Interna-
tional Conference on Computer Science and Electronics Engineering (ICCSEE), Vol. 3,
2012, pp. 648–651.
Tata Consultancy Services Ltd., “Internet of Things: The Complete Reimaginative
Force,” TCS Global Trend Study, July 2015.
Wallace, D. P., Knowledge Management: Historical and Cross-Disciplinary Themes,
Westport, CT: Libraries Unlimited, 2007, pp. 1–14.
Weber, R. H., “Internet of Things–New Security and Privacy Challenges,” Com-
puter Law & Security Review, Vol. 26, No. 1, 2010, pp. 23–30.
Wei, R. E. N., “A Study of Security Architecture and Technical Approaches in In-
ternet of Things,” Netinfo Security, Vol. 5, 2012, p. 025.
Xu, T., J. B. Wendt, and M. Potkonjak, “Security of IoT Systems: Design Chal-
lenges and Opportunities,” Proc. of the 2014 IEEE/ACM International Conference on
Computer-Aided Design, 2014, pp. 417–423.
Zhu, Q., et al., “IoT Gateway: Bridging Wireless Sensor Networks into Internet
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
2
Scalability of Networks and Computing
2.1 Introduction
41
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
42 IoT Technical Challenges and Solutions
IoT can give rise to several interesting use cases, which hold the
potential to add value to the end user. At a broad level, IoT use
cases can be verticalized into various domains [2]. These use cases
demand and pose a lot of requirements on the infrastructure of
network, storage, and computing. One needs to understand these
use cases first before understanding the infrastructural require-
ments from these use cases. Hence, we start with a list of example
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Scalability of Networks and Computing 43
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
44 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Scalability of Networks and Computing 45
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
46 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Scalability of Networks and Computing 47
ics themselves, so that only abnormal events are reported over the
Internet and video is not sent out over the network.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
48 IoT Technical Challenges and Solutions
Table 2.1
Requirements Mapping for Monitoring Applications
Number Data Data
Application Use of Traffic Traffic System Analytics Coverage
Case Sensors Nature Size Latency Complexity Area
Smart parking Large Burst Small Real-time Low Medium
Pollution monitoring Small Burst Small Offline Low High
Forest fire detection Medium Continuous Small Near real time Low Medium
Natural hazard detec- Large Continuous Medium Real time High High
tion and prediction
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Scalability of Networks and Computing 49
Table 2.2
Requirements Mapping for Control Applications
Number of Data Traffic Data System Analytics Coverage
Application Use Case Sensors Nature Traffic Size Latency Complexity Area
Traffic congestion Large Continuous Medium Real time Low High
management (traffic
control)
Grid monitoring and Medium Continuous Medium Real time Medium Medium
control
Peak load management Large Continuous Small Offline High High
Hazardous scenario Small Continuous Large Real time High Medium
detection and response
Personalized shopping Large Continuous Medium Offline Medium Low
Defect detection and Small Continuous Large Real time High Low
quality control
Predictive maintenance Small Continuous Large Offline Medium Low
and diagnosis for
machines
Smart control of green- Medium Continuous Medium Near real Medium Low
house environment time
Home energy and Small Burst Small Offline Medium Low
water use optimization
Monitoring or wellness Medium Burst Medium Real time Medium Low
monitoring at home
and workplace of
elderly people or
people with disease
Predictive analytics Medium Burst Medium Offline High High
and disease prognosis
Table 2.3
Requirements Mapping for Optimization Applications
Number Data
Application Use of Data Traffic Traffic System Analytics Coverage
Case Sensors Nature Size Latency Complexity Area
Traffic conges- Large Continuous Medium Offline High High
tion management
(planning)
Copyright © 2016. Artech House. All rights reserved.
Waste management Medium Burst Small Near real time Low Medium
Supply chain Large Burst Small Near real time High High
optimization
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
50 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Scalability of Networks and Computing 51
Table 2.4
Popular Short- and Medium-Range IoT Communication Technologies
Max
Frequency Max. Data Max. Network
Technologies Standards Body Band Range Rate Power Type
Bluetooth (https:// Bluetooth SIG 2.4-GHz 100m 1-3 1W WPAN
www.bluetooth.org/) ISM Mbps
Bluetooth Smart (BLE) IoT Interconnect 2.4-GHz 35m 1 Mbps 10 mW WPAN
(https://www.blue- ISM
tooth.com/what-is-
bluetooth-technology/
bluetooth-technology-
basics/low-energy)
ZigBee (https://www. IEEE 802.15.4, 2.4-GHz 160m 250 100 Star,
zigbee.org) Zigbee alliance ISM Kbps mW mesh
Wi-Fi (http://www. IEEE 802.11 g/n/ 2.4 GHz, 100m 6 to 780 1W Star,
wi-fi.org/) ac/ad (http:// 5 GHz, 60 Mbps, 6 mesh
www.ieee802. GHz Gbps at
org/11/Reports/ 60 GHz
tgah_update.htm)
Zwave (http://www.z- Zwave 908 MHz 30m 100 1 mW Star,
wave.com/) kbps mesh
ANT+ (https://www. ANT Alliance 2.4 GHz 100m 1 Mbps 1 mW Star,
thisisant.com/) mesh
Rubee (http://www. IEEE 1902.1, IEEE 131 kHz 5m 1.2 Kbps 40 to P2P
rubee.com) 1902.2 (long wave 50 nW
magnetic)
2.4.1.2 Zigbee
The ZigBee standard is maintained by the ZigBee Alliance. ZigBee
was developed for short-range communication in the order of 10m
to 100m based on IEEE 802.15.4. Its main feature is low energy; the
protocol can maintain very long sleep intervals and low operation
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
52 IoT Technical Challenges and Solutions
2.4.1.3 6LoWPAN
The full expansion of 6LoWPAN is IPv6 over low-power wireless
personal area networks. The standardization effort is driven by
Internet engineering task force (IETF) with a goal to define an ef-
ficient adaptation layer between the 802.15.4 link layer and trans-
mission control protocol over Internet protocol (TCP/IP) stack. It
includes the 802.15.4 link layer, the IP header compression layer
and a TCP/IP stack. A major advantage of 6LoWPAN is that the
devices running on different heterogeneous physical networks can
communicate with each other over the Internet, which is a very
important requirement from an IoT perspective. For connecting to
an IPV4 network, which is most of the deployed Internet today, it
requires a gateway to take care of IPv6-to-IPv4 conversion.
2.4.1.4 WirelessHART
WirelessHART is the wireless flavor of the Highway Addressable
Remote Transducer (HART) protocol. WirelessHART is also based
on the 2.4-GHz IEEE 802.15.4 physical layer. It uses time division
multiple access (TDMA) with time synchronization for achieving
reliable low-power consumption.
2.4.1.5 Thread
Thread uses IEEE 802.15.4 and 6LowPAN and specifies an IP-
based mesh network protocol. Every Thread-certified device gets
an IPv6 address. On the network layer, Thread supports user data-
gram protocol (UDP) on top of 6LowPAN.
Copyright © 2016. Artech House. All rights reserved.
2.4.1.6 Wi-Fi
The highly popular Wi-Fi technology, based on the IEEE 802.11
standard, is also used for IoT applications. Power consumption
can be an issue for low-power IoT devices. Clever power manage-
ment design can save the situation to an extent. The attraction is
that the IoT application can leverage the existing wireless network
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Scalability of Networks and Computing 53
2.4.1.7 Bluetooth
Bluetooth is another successful wireless technology grown with
the popularity of mobile phones. Bluetooth is mainly used today
as a cable replacement for short range communication. It supports
data throughput up to 2 MBps. Bluetooth is generally used in a
point-to-point or in a star network topology. A master Bluetooth
device can communicate with a maximum of seven devices in a
piconet. The technology is fairly low power but high compared to
Zigbee. Bluetooth Low Energy (BLE) is positioned to fill that gap.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
54 IoT Technical Challenges and Solutions
ing. There are also agricultural use cases like crop monitoring and
livestock movement monitoring that need wide-area coverage. As-
set monitoring and tracking in transportation and cold chain re-
quire ubiquitous coverage that is statewide, nationwide or world-
wide. Another use case for wide-area monitoring is monitoring
of transportation infrastructures such as rail lines and roadways
need. Consumer applications like health and wellness monitor-
ing can also benefit from having an alternative to cell phones for
their wide-area connectivity. Due to power constrained nature of
the sensing devices, this connectivity needs to low power. Major
technologies applicable for LPWAN are summarized in Table 2.5.
Current cellular 2G, 3G, and 4G technologies are also popular for
IoT applications. They are suitable for applications that require
wide area connectivity, mobility, and areas where main power sup-
ply is available or frequent recharging is possible. They support
Table 2.5
Low-Power Wide Area Networking Technologies for IoT
Standards or
Governing Devices per
Technology Body Frequency Range Data Rate Topology Access Point
Weightless — N&P (Sub- 2–5 km 200 bps– Star Unlimited
(http://www. gigahertz (urban) 100 Kbps, W
weightless. ISM), W (TV (1 Kbps–10
org/) whitespace) Mbps)
LoraWAN LoRa 433, 780, 2.5–15 0.3–50 Kbps Star on 1 million or
(https://www. Alliance 868, 915- km star more
lora-alliance. MHz ISM
org/)
SigFox (http:// SigFox Ultranarrow 30–50 km 100 bps Star 1 million
www.sigfox. band (rural),
com/en/) 3–10 km
(urban)
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Scalability of Networks and Computing 55
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
56 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Scalability of Networks and Computing 57
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
58 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Scalability of Networks and Computing 59
own headers.
BP is a message-based overlay that follows the store, carry,
and forward principle. The BP defines the format of the messages,
called bundles, and the logic layout to process them. Bundles have
a lifetime and will be deleted if the lifetime expires. BP uses a cache
to store the bundles. These bundles are either processed by the
node, if it is the destination or forwarded to other nodes toward
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
60 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Scalability of Networks and Computing 61
open APIs between the SDN control and applications layers make
it possible for business applications to operate on an abstraction of
the network without being tied to the details of the network im-
plementation. SDN makes the networks application-customized
and applications network-capability-aware. As a result, comput-
ing, storage, and network resources can be optimized and both
computer-aware and storage-aware networks can be implemented
easily on top of SDN.
OpenFlow [8] is the first standard communications interface
directed towards an SDN architecture. OpenFlow allows direct ac-
cess to the forwarding plane of network devices such as switches
and routers (depicted as network hardware abstraction in Figure
2.3); it exposes an open interface (depicted as network control inter-
faces in Figure 2.3) for the formation of the required control plane.
Network function virtualization (NFV) is a related technology that
provides a software virtualization layer on top of the variety of
network equipment and devices providing a common interface.
The combination of SDN and NFV can provide a lot of technologi-
cal boost towards the required adaptive network scalability for IoT
systems. These kinds of adaptive architectures would be particu-
larly useful for application scenarios that have widely fluctuating
network traffic. For example, a citywide video surveillance sys-
tem that sends raw video only on detection of anomalous events
can generate very low data traffic when there are no surveillance
events and huge data traffic when some events occur.
With the potential huge scale of network for IoT, current net-
work systems may find it difficult to handle the capacity demands
and real-time needs without compromising on reliability. Hence,
there is need to create adaptive networks on top of existing net-
working technology via addition of in-network storage in network
routers to handle network fluctuations. They need a customized
link-state routing protocol to enable routers to temporarily store
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
62 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Scalability of Networks and Computing 63
• For the ideal real-time system, all processing of sensor data can
be done at the edge device (sensor aggregators and gateways)
and suitable decision or responsive action taken from there it-
self. However, due to limited computational power and memo-
ry of the edge device, all the required analytics cannot be done
at the edge and hence need to be offloaded to the cloud.
• The less computation is done at the edge device, the more data
needs to be sent to the cloud, which results in higher conges-
tion, higher data transfer cost, and increased system latency,
which, in turn, affects the real-time performance.
• Edge devices needing to send more data to the cloud over
wireless connectivity typically end up consuming more power
resulting in precious battery drain for battery-powered edge
gateways, required in many IoT systems due to deployment
considerations.
A good IoT system design needs to take care of all these con-
flicting requirements. Needless to say, such design is completely
specific to the application use case under consideration. Referring
to Table 2.1, we can suggest the following thumb rules for IoT sys-
tem design consideration:
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
64 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Scalability of Networks and Computing 65
Such platforms can provide the basis for creating massive IoT
data exchanges connecting sensor providers to data consumers via
application stores. It not only allows IoT data to be shared among
applications, but it also allows it to be shared among different ver-
tical systems creating real intelligent system of systems. Such con-
cepts are extremely useful in designing complex interdependent
systems like smart cities, which rely on intelligent interoperation
between multiple verticals like governance, energy, transportation,
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
66 IoT Technical Challenges and Solutions
erate new products and services, and can promote efficiency due
to better visibility. A horizontal platform for IoT can really provide
the fulcrum for creating such open data systems. Additionally, the
variety of sensor devices, their data syntax and semantics, and
the variety of the communication protocols that they use for con-
Copyright © 2016. Artech House. All rights reserved.
necting to the cloud via the Internet demands platforms that can
provide all possible combinations covering sensor device manage-
ment, sensor data management, sensor data transport, and analyt-
ics services. Providing these implementations in form of a set of
libraries and APIs in the platform can provide the much needed
abstraction layer insulating the application developers from the
tiny details of the underlying IoT sensor data network.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Scalability of Networks and Computing 67
2.7 Conclusions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
68 IoT Technical Challenges and Solutions
References
[1] http://www.cisco.com/web/about/ac50/ac207/crc_new/university/
RFP/rfp13078.html.
[2] http://www.libelium.com/top_50_iot_sensor_applications_ranking/.
[3] http://www.3gpp.org/news-events/3gpp-news/1714-lc_mtc.
[4] http://mqtt.org/.
[5] http://coap.technology/.
[6] http://xmpp.org/.
[7] https://www.opennetworking.org/about/onf-overview.
[8] https://www.opennetworking.org/sdn-resources/openflow.
[9] http://www.etsi.org/plugtests/COAP2/Presentations/03_ETSI_M2M_
oneM2M.pdf.
[10] Balamurali P, P. Misra, and A. Pal, “Software Platforms for Internet of Things
and M2M,” Journal of the Indian Institute of Science, A Multidisciplinary Reviews
Journal, Vol. 93, No. 3, July–September 2013.
[11] http://www.tcs.com/about/research/Pages/TCS-Connected-Universe-
Platform.aspx.
Selected Bibliography
Bartram, J., and R. Ballance, (eds.), Water Quality Monitoring: A Practical Guide
to the Design and Implementation of Freshwater Quality Studies and Monitoring Pro-
grams, Boca Raton, FL: CRC Press, 1996.
Bonomi, F., et al., “Fog Computing and Its Role in the Internet of Things,” ACM
Proc. of 1st Edition of the MCC Workshop on Mobile Cloud Computing, August 17,
2012, pp. 13–16.
Decker, C., et al., “Challenges of Using Edge Devices in IoT Computation Grids,”
2013 Intl. Conf. on Parallel and Distributed Systems (ICPADS), December 15, 2013,
pp. 564–569.
Ekbatani, M. K., et al., “Congestion Control in Urban Networks Via Feedback Gat-
Copyright © 2016. Artech House. All rights reserved.
ing,” Procedia-Social and Behavioral Sciences, Vol. 48, 2012, pp. 1599–1610.
Evans, J. R., and C. H. Lindner, “Business Analytics: The Next Frontier for Deci-
sion Sciences,” Decision Line, Vol. 43, No. 2, 2012, pp. 4–6.
Ghose, A., et al., “UbiHeld: Ubiquitous Healthcare Monitoring System for Elderly
and Chronic Patients,” Proc. of the 2013 ACM Conf. on Pervasive and Ubiquitous
Computing, Adjunct Publication, 2013, pp. 1255–1264.
Gonzalez-Miranda, S., et al., “An IoT-Leveraged Information System for Future
Shopping Environments,” IT Convergence Practice, Vol. 1, No. 3, 2013, pp. 49–65.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Scalability of Networks and Computing 69
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
70 IoT Technical Challenges and Solutions
Maiti, S., et al., “Historical Data Based Real Time Prediction of Vehicle Arrival
Time,” 17th Intl. IEEE Conf. on Intelligent Transportation Systems (ITSC14), 2014.
Auzias, M., Y. Mahéo, and F. Raimbault, “CoAP over BP for a Delay-Tolerant In-
ternet of Things,” 3rd Intl. Conf. on Future Internet of Things and Cloud (FiCloud),
2015.
Michałkiewicz, A., M. Kujawińska, and K. Stasiewicz. “Digital Holographic Cam-
eras and Data Processing for Remote Monitoring and Measurements of Mechani-
cal Parts,” Opto-Electronics Review, Vol. 16, No. 1, 2008, pp. 68–75.
Mukherjee, A., A. Pal, and P. Misra. “Data Analytics in Ubiquitous Sensor-Based
Health Information Systems,” 2012 IEEE 6th Intl. Conf. on Next Generation Mobile
Applications, Services and Technologies (NGMAST), 2012, pp. 193–198.
Mukherjee, A., et al., “ANGELS for Distributed Analytics in IoT,” 2014 IEEE World
Forum on Internet of Things (WF-IoT), March 6, 2014, pp. 565–570.
Ojo, A., E. Curry, and T. Janowski, “Designing Next Generation Smart City Ini-
tiatives: Harnessing Findings and Lessons from a Study of Ten Smart City Pro-
grams,” 22nd European Conf. on Information Systems, Tel Aviv, 2014.
Omnes, N., et al., “A Programmable and Virtualized Network & IT Infrastructure
for the Internet of Things: How Can NFV & SDN Help for Facing The Upcoming
Challenges?” 2015 IEEE 18th Intl. Conf. on Intelligence in Next Generation Networks
(ICIN), February 2015, pp. 64–69.
Pal, A., “Internet of Things: From Hype to Reality,” IEEE Computer Society IT Pro-
fessional Magazine, May 2015.
Pal, A., et al., “Energy Information Gateway for Home,” 2011 IEEE 2nd Intl. Conf.
on Intelligent Systems, Modelling and Simulation (ISMS), 2011, pp. 235–240.
Polycarpou, E., L. Lambrinos, and E. Protopapadakis, “Smart Parking Solutions
for Urban Areas,” 2013 IEEE 14th Intl. Symp. and Workshops on a World of Wireless,
Mobile and Multimedia Networks (WoWMoM), 2013, pp. 1–6.
Ruiz-Altisent, M., et al., “Sensors for Product Characterization and Quality of
Specialty Crops—A Review,” Computers and Electronics in Agriculture, Vol. 74, No.
2, 2010, pp. 176–194.
Somani, N., et al., “Storage Aware Routing Protocol for Robust and Efficient Serv-
ices in the Future Mobile Internet,” 2012 IEEE Intl. Conf. on Communications (ICC),
2012, pp. 5849–5853.
Stähli, M., et al., “Monitoring and Prediction in Early Warning Systems for Rapid
Copyright © 2016. Artech House. All rights reserved.
Mass Movements,” Natural Hazards and Earth System Science, Vol. 15, No. 4, 2015,
pp. 905–917.
Tennenhouse, D. L., et al., “A Survey of Active Network Research,” IEEE Commu-
nications Magazine, Vol. 35, No. 1, 1997, pp. 80–86.
Caraguay A. L. V., et al., “SDN: Evolution and Opportunities in the Development
IoT Applications,” International Journal of Distributed Sensor Networks, May 4, 2014.
Gazis, V., et al., “A Survey of Technologies for the Internet of Things,” Intl. Conf.
on Wireless Communications and Mobile Computing (IWCMC), Dubrovnik, 2015.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Scalability of Networks and Computing 71
Xiaoli, X., Z. Yunbo, and W. Guoxin, “Design of Intelligent Internet of Things for
Equipment Maintenance,” 2011 IEEE Intl. Conf. on Intelligent Computation Technol-
ogy and Automation (ICICTA), Vol. 2, 2011, pp. 509–511.
Zhao, J. -C., et al., “The Study and Application of the IOT Technology in Agri-
culture,” 2010 3rd IEEE Intl. Conf. on Computer Science and Information Technology
(ICCSIT), Vol. 2, 2010, pp. 462–465.
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
3
Security and Privacy
73
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
74 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Security and Privacy 75
A secure IoT system should provide for the required level of confi-
dentiality, integrity, and availability of data and services. Further,
they should ensure safety, reliability, resilience, and usability. These
aspects may get different emphasis from the varied perspectives
of different stakeholders including equipment vendor, business
owner or operator, service provider, and end user. The business
impact of security attacks on the IoT system is at multiple levels. It
includes service availability, system access and control, equipment
damage, data loss, and breach of privacy.
The major value proposition of security to the business is in the
reduction and mitigation of risk, supporting new business models
and improving operation performance. Minimizing the impact of
security measures on user experience is another aspect gaining im-
portance these days. The following are the key dimensions where
a business is impacted by a breach of security:
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
76 IoT Technical Challenges and Solutions
IoT system can be mapped into end points, gateway, and cloud.
End points are terminal devices such as sensors and actuators.
Gateways include access points and other network elements
that help aggregation at the edge. Cloud infrastructure provides
the required computing, storage, and visualization resources for
the IoT application. As shown in Figure 3.1, each of these com-
ponents has targets and associated vulnerabilities for attacks. The
artifacts to be protected include sensor data, security credentials,
identities of devices and people, configuration, and software. In
addition to this, limited resources at endpoints make them target
for easy overloading attacks on memory, CPU cycles and battery.
The external human agents including users, consumers, develop-
ers, workers, and hackers are predominantly the sources of po-
tential attacks. At times, software agents running on these devices
have also potential for triggering attacks. Efficient access control
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Security and Privacy 77
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
78 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Security and Privacy 79
Each endpoint must have the ability to maintain its identity in-
formation. Identity is a token assigned to a single instance to iden-
tify that device uniquely. Manually managing endpoint identity on
individual systems is not practical for large-scale systems. In such
cases, an automated identity management infrastructure should be
in place.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
80 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Security and Privacy 81
The dynamics of the IoT data fall into three classes. They are data
in use (DIU), data at rest (DAR), and data in motion (DIM). The
data in use pertains to that being used by a running algorithm.
DIU is somewhat tricky because it hard to maintain cryptographic
measures to secure it while processing. This may be handled by
operating system layers that provide a confidential computing en-
vironment for the processing. The protection of such data requires
a trusted environment for the execution of code. The Trusted Ex-
ecution Environment (TEE) [6] provides this capability for use on
various processors such as those from Advanced RISC Machines
(ARM), which has a family of reduced instruction set CPU (RISC).
ARM-based devices leverage technologies such as TrustZone [7]
Table 3.1
Representative List of Threats at Various Subsystem Level
Subsystem Threats
Cloud, Web Account hijacking, data breaches, loss of data, insecure APIs,
applications and denial of service, malicious insiders, cross-site scripting (XSS)
services where client side scripts are injected to Web pages viewed by
others. Cross-Site Request Forgery (CSRF) that forces an end
user to execute unwanted actions on a Web application in
which they are currently authenticated. Broken authentication
and session management, insecure direct object references,
security misconfiguration, missing function level access
control, unvalidated redirects and forwards.
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
82 IoT Technical Challenges and Solutions
for this purpose. Security integrated circuit (IC) chips have high-
quality cryptographic implementations. Random number genera-
tion, certification, and resistance to physical attacks are particular
strengths. Secure microcontroller unit (MCU) is a good proposition
for embedded device security. It would have built-in hardware
crypto modules that can generate various session keys, verify, and
sign using certificates and support data encryption. All the keys
and certificates are securely stored in a secure MCU vault. Embed-
ded microcontrollers may make use of security fuses to provide
security for Flash memory from external manipulations. Secure
operating systems and microkernels are other options to consider.
Separating the data from the metadata and storing data integ-
rity checks in with the metadata are another approach. Here the
data path units can work in its native environment and can check
the integrity as and when needed. More novel approaches includ-
ing homomorphic encryption attempt to allow the processing of
data while still in encrypted state. However, their complexity is too
high to be practical with the current state of the art.
Most of the data protection schemes will involve the applica-
tion of encryption. There are numerous cryptographic primitives
available in hardware or software form. The National Institute of
Standards and Technology (NIST) provide recommendations for
various crypto algorithms and configurations to use for the protec-
tion of sensitive information.
Some commonly used encryption algorithms are listed in Table
3.2.
If a new crypto scheme is developed, then it should undergo
cryptographic algorithm validation. For this purpose, the Crypto-
graphic Module Validation Program (CMVP) and Cryptographic
Algorithm Validation Program (CAVP) from the NIST can be
helpful.
Data is at rest when the device holds the data for a longer time.
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Security and Privacy 83
Table 3.2
Commonly Used Encryption Algorithms
Crypto Algorithm Comments
Triple DES Symmetric, uses three individual keys of 56 bits each;
hardware implementable
RSA Public key encryption, key size 1,024 to 4,096 bits
Blowfish Symmetric, encrypts in 64-bit blocks, key sizes 32 to
448, very fast except when there is a key change due to
preprocessing delay
Twofish Symmetric, block sizes of 128 bits, key sizes up to 256 bits
AES Symmetric, block size 128, key sizes 128, 192, 256, Most
popular contemporary standard, available with many devices
ECDH and ECDSA Elliptic curve Diffie-Hellman (ECDH) scheme for encryption
key establishment Elliptic Curve Digital Signature algorithm
(ECDSA) for data signing
Table 3.3
Salient Security Features of Popular IoT Wireless Communications Standards
Wireless
Communication
Standards Security Aspects
Wi-Fi Wi-Fi Protected Access 2 (WPA2) with AES (IEEE 802.11i), EAP
methods for layer 2 authentication
Bluetooth, BLE Discovery or connect through enquiry or paging, no device
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
84 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Security and Privacy 85
Table 3.4
Popular Security Protocols and Their Salient Features
Protocol Security Aspects
IKEv2/IPsec Establishes a secure tunnel, X.509 certificates for
authentication, Diffie-Hellman key exchange for shared session
secret, cryptographic key generation using shared secret
TLS/SSL X.509 certificate for authentication, asymmetric keys from
X.509 used for symmetric key exchange, symmetric key used for
Copyright © 2016. Artech House. All rights reserved.
data encryption
DTLS Datagram TLS (based on TLS)
HIP Host Identity Protocol, host identity based on public key
(instead of popular IP address/DNS)
EAP Extensible Authentication Protocol, an authentication
framework supporting multiple authentication methods, works
on the link layer, uses different protocols for EAP messages
transmission, supports key delivery and usage mechanisms
SSH A cryptographic network protocol, uses public key cryptography
for mutual authentication, creates a secure channel for data
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
86 IoT Technical Challenges and Solutions
The IoT poses the challenge to manage a huge set of identities that
are larger than conventional identity management systems. Here,
in addition to humans, the identities of several other machines and
identities of things are to be managed. In many cases, they are con-
nected intermittently or mobile. Some people refer to this identity
ecosystem as the Identity of Things (Adopt) [8] where there is a
networked relationship between devices, applications or services,
and humans.
An identifier is typically a publicly known dedicated attribute
or name for a device. A device can have more than one identifier.
Sometimes the network addresses are used as identities. However,
that is not a recommended practice. Addresses such as IP deter-
mine the communication endpoint within a certain system, but the
device address may not be permanently associated with the device
and it may change. Thus, it is better to have a different identifier
other than the network address for the device.
There are many types of device identifiers in common use. The
simplest of them are a globally unique identifier (GUID) or a pub-
lic name. However, these by themselves do not provide an authen-
ticated identity for an IoT device and are open for easy spoofing.
Another technique is to use a cryptographic identifier such as
802.1AR device identifications (IDs). A trusted platform module
(TPM) [9] can handle cryptographic device identities that are ro-
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Security and Privacy 87
3.7 Authentication
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
88 IoT Technical Challenges and Solutions
Table 3.5
Authentication Options for Some of the IoT Protocols
Protocol Authentication Methods Supported
MQTT Username and password are used and are sent in the clear. It is
recommended that TLS be employed when using MQTT.
CoAP Support for multiple authentication options for device-to-device
communication. Can use DTLS additionally for higher-level confidentiality
requirements. Uses preSharedKey, rawPublicKey, and certificate.
XMPP Supports multiple authentication patterns via the Simple Authentication
and Security Layer (SASL). Includes one-way anonymous and mutual
authentication with encrypted passwords, certificates, and other means
through SASL.
DDS The Data Distribution Standard (DDS) from OMG provides endpoint
authentication. Also supports key establishment to perform message
data origin authentication (HMAC). Both digital certificates and
various identity or authorization token types are supported. Uses X.509
certificates (PKI) using RSA and DSA tokens.
HTTP/REST Support of TLS protocol for authentication and confidentiality. For basic
authentication, credentials are passed in the clear and can be used with
TLS. However, a token-based authentication approach such as OAUTH 2 is
recommended.
Zigbee Supports network and application-level authentication through the use
of master key, network, and, optionally, application link keys. Keys are
preshared.
Bluetooth Provides authentication through standard automatic pairing or simple
pairing with a human-in-loop to verification (following a simple Diffie-
Hellman exchange). Supports one-way and mutual authentication options.
For device-device authentication, .secure simple pairing offers Justworks,
Passkey entry, and Out of Box options.
Bluetooth-LE Supports two-factor authentication system. LE Secure Connections pairing
model that combines several of the available association models. In
addition, ECDH is used for key exchange. Unencrypted data authenticated
using Connection Signature Resolving Key (CSRK) Device Identity/Privacy
is via an Identity Resolving Key (IRK).
tual intelligence.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Security and Privacy 89
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
90 IoT Technical Challenges and Solutions
This mechanism can also be used for the secure update of system
configurations.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Security and Privacy 91
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
92 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Security and Privacy 93
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
94 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Security and Privacy 95
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
96 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Security and Privacy 97
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
98 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Security and Privacy 99
Table 3.6
Threat Categories and General Mitigation Approaches
Threat Type Mitigation Techniques
Spoofing identity Malicious party impersonates a device or a user with an illegally acquired
identity. Some of the mitigation approaches are: stronger authentication,
protecting secrets, and avoiding storage of secrets if possible.
Tampering with Deletion or modification of data. This may be mitigated by: enhanced
data authorization, hashes, message authentication codes, digital signatures,
and tamper-resistant protocol.
Repudiation Denial of committing a data operation or transaction. Some mitigation
measures are: digital signatures that can be verified, timestamps, and
audit trails.
Information Unauthorized disclosure of data to an unintended audience. Some steps
disclosure for mitigation are: strong authorization, encryption of data, protect
security keys, credentials, avoiding storage of secrets.
Denial of service Block the access to data and services even to legitimate users. Some of
the following measures can be considered: authentication, authorization,
filtering based on source, ID, size, and type, throttling, and quality-of-
service measures in the network.
Elevation of Unauthorized enhancement of access level and permissions. Some
privilege applicable measures include: authentication, authorization, access
control, and run with least privilege.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
100 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Security and Privacy 101
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
102 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Security and Privacy 103
3.13 Summary
Security and privacy are the top concerns of IoT systems these
days. One of the major reasons behind this concern is the uncer-
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
104 IoT Technical Challenges and Solutions
tainty on how the system will be impacted by the actions and be-
haviors of various system components and stakeholders. Many
times, a holistic picture of the system security is not available
to the decision-makers and end users. A systematic approach to
analyze various threats and their potential risks with the help of
a system model would be of use here. There are a large number
of security protocols and algorithms available for consideration.
Only the prominent ones are outlined in this chapter, and there are
many others being worked out by the research community. As the
device technology progresses, the affordable computing and stor-
age capability per joule is also increasing. This enables the use of
Internet protocols directly on end points in many cases. Although
we highlight constraint devices as one of the differentiators for IoT
protocols in general, one should leverage proven Internet technol-
ogies wherever possible to reduce overall cost and time to market.
IoT business is at its initial stages and insights from future opera-
tions will testify and enhance the security and privacy schemes as
it evolves.
References
[1] IDC Futurescape for Internet of Things, December 2014, https://www.idc.
com/getdoc.jsp?containerId=prUS25291514.
[2] http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet.
[3] http://www.securityweek.com/blackenergy-group-uses-destructive-plu-
gin-ukraine-attacks.
[4] http://www.wired.com/2015/12/2015-the-year-the-internet-of-things-
got-hacked/.
[5] https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_
Ten_Project#tab=Top_10_IoT_Vulnerabilities__282014_29.
[6] Trusted Execution Environment, https://en.wikipedia.org/wiki/Trusted_
Copyright © 2016. Artech House. All rights reserved.
execution_environment.
[7] http://www.arm.com/products/processors/technologies/trustzone/.
[8] https://kantarainitiative.org/confluence/display/IDoT/Concepts+of+Ide
ntity+within+the+Internet+of+Things.
[9] http://www.trustedcomputinggroup.org/resources/trusted_platform_
module_tpm_summary.
[10] http://oauth.net/2/.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Security and Privacy 105
[11] http://openid.net/connect/.
[12] http://www.iot-now.com/2015/03/26/31426-securing-the-identity-of-
things-idot-for-the-internet-of-things/Contextual knowledge is power.
[13] Westin, A. F., “Privacy and Freedom,” Washington and Lee Law Review, Vol.
25, No. 1, 1968.
[14] Stoneburner, G., A., Goguen, and A. Feringa, “Risk Management Guide for
Information Technology Systems,” NIST Special Publication 800-30, 2002.
[15] STRIDE Model https://msdn.microsoft.com/en-us/library/ee823878
(v=cs.20).aspx.
[16] https://msdn.microsoft.com/en-us/library/ff648644.aspx.
[17] ����������������������������������������������������������������������
http://www.upm.ro/facultati_departamente/stiinte_litere/conferinte/si-
tul_integrare_europeana/Lucrari6/06%20-%20Hunor,%20Haller,%20Sebe-
sety-Pal.pdf.
[18] ���������������������������������������������������������������������
http://engage.securestate.com/assess-your-security-risk-with-secures-
tates-simple-irisk-equation.
[19] Trusted Computing Group, published documents on IoT security www.
trustedcomputinggroup.org.
[20] https://www.nccgroup.trust/uk/about-us/newsroom-and-events/
blogs/2014/april/security-of-things-an-implementers-guide-to-cyber-se-
curity-for-internet-of-things-devices-and-beyond/.
[21] https://downloads.cloudsecurityalliance.org/whitepapers/Security_
Guidance_for_Early_Adopters_of_the_Internet_of_Things.pdf.
[22] Guidance for Securing IoT Using TCG Technology Version 1.0, Trusted
Computing Group, 2015, http://www.trustedcomputinggroup.org/files/
resource_files/CD35B517-1A4B-B294-D0A08D30868AB3D1/TCG_Guid-
ance_for_Securing_IoT_1_0r21.pdf.
[23] https://www.owasp.org/index.php/IoT_Security_Guidance.
Selected Bibliography
Clymer, C., et al., “iRisk Equation,” Whitepaper, http://insurehub.org/sites/de-
fault/files/reports/Final%20Report.pdf.
Copyright © 2016. Artech House. All rights reserved.
Folk, C., et al., Dun & Bradstreet, “The Security Implications of the Internet of
Things,” AFCEA International Cyber Committee, February 2015.
Garcia-Morchon, O., et al., “A Comprehensive and Lightweight Security Architec-
ture to Secure the IoT Throughout the Lifecycle of a Device Based on HIMMO,”
11th Intl. Symp. on Algorithms and Experiments for Wireless Sensor Networks, ALGO-
SENSORS 2015, Patras, Greece, September 17–18, 2015.
Hernan, S., et al., “Threat Modeling Uncover Security Design Flaws Using the
STRIDE Approach,” MSDN Magazine-Louisville, 2006, pp. 68–75.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
106 IoT Technical Challenges and Solutions
Internet of Things, “IoT Governance, Privacy and Security Issues,” Position Pa-
per, European Research Cluster on the Internet of Things, 2015.
Kamongi, P., M. Gomathisankaran, and K. Kavi, “Nemesis: Automated Architec-
ture for Threat Modeling and Risk Assessment, for Cloud Computing,” 2014 ASE
Big Data, Social Informatics, PASSAT, BioMedCom 2014 Conf., Harvard University,
December 14–16, 2014.
Keoh, S. L., S. S. Kumar, and H. Tschofenig, “Securing the Internet of Things: A
Standardization Perspective,” IEEE Internet of Things Journal, Vol. 1, No. 3, June
2014.
Lee, M. -C., “Information Security Risk Analysis Methods and Research Trends:
AHP and Fuzzy Comprehensive Method,” International Journal of Computer Sci-
ence & Information Technology (IJCSIT), Vol. 6, No. 1, February 2014.
Li, Z., and T. Xin, “Threat Modeling and Countermeasures Study for the Internet
of Things,” Journal of Convergence Information Technology, Vol. 8, No. 5, 2013.
Noel, S., et al., “Measuring Security Risk of Networks Using Attack Graphs,” In-
ternational Journal of Next Generation Computing, July 2010.
Nurse, J. R. C., et al., “Smart Insiders: Exploring the Threat from Insiders Using
the Internet-of-Things,” Intl. Workshop on Secure Internet of Things (SIoT), 2015.
Olsson, T., “Assessing Security Risk to a Network Using a Statistical Model of
Attacker Community Competence,” 11th Intl. Conf., ICICS 2009, Beijing, China,
December 14–17, 2009.
Roman, R., P. Najera, and J. Lopez, “Securing the Internet of Things,” Computer,
Vol. 44, No. 9, September 2011, pp. 51–58.
Sicari, S., et al., “Security, Privacy and Trust in Internet of Things: The Road
Ahead,” Elsevier Journal on Computer Networks, Vol. 76, 2015, pp. 146–164.
Sitnikova, E., and M. Asgarkhani, “A Strategic Framework for Managing Internet
Security,” 2014 11th Intl. Conf. on Fuzzy Systems and Knowledge Discovery (FSKD),
2014, pp. 947–955.
Stoneburner, G., A. Goguen, and A. Feringa, “Risk Management Guide for Infor-
mation Technology Systems,” NIST special publication, Vol. 800, No. 30, 2002, pp.
800–830.
Ukil, A., J. Sen, and S. Koilakonda, “Embedded Security for Internet of Things,”
2nd Natl. Conf. on Emerging Trends and Applications in Computer Science (NCETACS),
2011.
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Security and Privacy 107
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
4
Sensor Informatics and Business Insights
4.1 Introduction
1. They can help optimize the business operations and run busi-
nesses more efficiently.
109
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
110 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Sensor Informatics and Business Insights 111
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
112 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Sensor Informatics and Business Insights 113
Resampling
Many times, the physical signals have unequal sampling frequen-
cies (due to hardware limitations of reporting sensor data only
when they change) or have higher or lower than necessary sam-
pling frequencies. Typically, all signal informatics algorithms work
on uniformly sampled data; in the case of working with multiple
sensors, there is the need to put all the sensor signals in the same
sampling rate so that they can be fused. Through the use of sam-
pling and interpolation algorithms, signal informatics can help in
acquiring the digitized signal into the system in the right sampling
rate. For example, for accelerometer signals, the hardware is typ-
ically designed to send data only when there is a change in the
value of acceleration, thereby making it a variable sampling rate
system that needs resampling to make it uniform sampling-rate.
Noise Cleaning
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
114 IoT Technical Challenges and Solutions
Anomaly Detection
Sometimes, even after cleaning the sensor data, the artifacts of the
unwanted signal remain at an unacceptably high level, thereby
corrupting the analytics insights. In such cases, it is better to throw
away such data than process it. Statistical processing-based anom-
aly detection techniques can be used for such requirements. In the
activity detection use case, this kind of unwanted signal can be
generated if the wearable device or the mobile phone is not firm-
ly held against the body or if there are irregularity in the sensor
electronics.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Sensor Informatics and Business Insights 115
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
116 IoT Technical Challenges and Solutions
Visualization
Visualization of various signal components can be the first step to-
wards having some insight into the signal behavior, which, in turn,
can lead to efficient signal analytics development. However, due
to the large amount of information available in the signal space,
sometimes it is extremely difficult to manually visualize all parts
of the signal. Transform and statistical processing techniques can
help in breaking down the signal into smaller, nonredundant com-
ponents, which, when visualized in a graph, can provide much
better insights about the signal and underlying events. This can
be the precursor to visual analytics, described later in this chapter.
4.2.3.1 Detection
Statistical signal processing techniques are used detect the pres-
ence or absence of a particular pattern in the sensor signal. It can
be regarded as having a single hypothesis and inferencing the hy-
pothesis to be right or wrong based on certain patterns present
in the sensor signal [28]. Signal detection theory is a very mature
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Sensor Informatics and Business Insights 117
4.2.3.2 Identification
Identification can be considered as detection of identity of instanc-
es that works on multiple patterns instead of one pattern. It can be
regarded as having multiple hypothesis and inferencing one of the
hypotheses to be right or wrong based on specific patterns present
in the sensor signal [32]. It also involves correlating certain features
of the sensor signal with the desired pattern, but instead of apply-
ing thresholding techniques as in detection, identification systems
employ pattern recognition techniques [33].
4.2.3.3 Estimation
Signal estimation can be thought of inferring value of unknown
states observed by the sensors under noisy conditions [34]. While
detection or identification can be regarded as proving a discrete
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
118 IoT Technical Challenges and Solutions
4.2.3.4 Fusion
Sensor information fusion can be thought of as techniques and
tools for exploiting the synergy in the information acquired from
multiple sensors [39]. Integration of multisensory information can
help in making better inferences about the physical event. Multi-
sensor data fusion can result in better accuracy and noise perfor-
mance exploiting the sensor redundancy and sensor correlation.
The fusion can happen at the data level (mix all raw sensor signals
together), feature level (extract relevant features from each sensor
signal and then fuse), or decision or inference level (infer from each
sensor signal and then fuse the inference through techniques like
majority voting). Challenges on multisensor fusion mainly emerge
around different noise distribution of different sensor signals and
their nonstationarity [40].
Pattern Recognition
This is the detection of specific patterns or discovery of recurrent
patterns that have causation with physical events captured by the
sensor. For example, the accelerometer data from a smart phone
may have different specific patterns in the x, y, and z-axes when
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Sensor Informatics and Business Insights 119
Prediction
Once a clean sensor data is available, in many use cases, the main
requirement from informatics becomes modeling of the events to
predict them in the future. The estimation techniques outlined
above can provide the necessary statistical models (LSE, ML,
BMSE, and so forth). The Kalman filtering techniques addition-
ally allow for state-space modeling through state transition ma-
trices, which make it easy to model time series that are governed
by physical equations (like rectilinear motion). For example, in the
accelerometer-based activity detection use case, use of Kalman fil-
ter in conjunction with the activity detector can predict the user’s
motion, thereby making it useful for indoor localization kind of
applications.
Once the data from sensors are cleaned up and processed to gener-
ate information, the next important step becomes converting the
processed information into knowledge. The critical part of this
step is to interpret the information in a semantic manner that corre-
lates the information to physical events and maps the cyber world
findings into interpretations in the physical world. As depicted in
Figure 4.3, the workflow of semantic interpretation has three ma-
jor components: machine learning, rule engine, and reasoning. It
should be noted that the machine learning can be regarded as part-
ly belonging to inference, described previously. However, the out-
come of machine learning always provides a powerful semantic
interpretation of the data; hence, we thought it prudent to describe
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
120 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Sensor Informatics and Business Insights 121
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
122 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Sensor Informatics and Business Insights 123
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
124 IoT Technical Challenges and Solutions
goal. In other words, they try to find out if something exists based
on existing information. They are also known as goal-driven rules.
Backward chaining evaluates different conditions simultaneously
to ascertain which one is closest to the desired goal.
4.3.3 Reasoning
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Sensor Informatics and Business Insights 125
4.3.3.1 Deductive
Deductive reasoning is the process of reasoning from one or more
propositions or facts to reach a logically certain conclusion. Deduc-
tive reasoning is a top-down logic in which a conclusion is reached
by assertion of a general rule leading towards a guaranteed spe-
cific conclusion. For example, if x = 10 and y = 11, we can deduce
that x + y = 21.
4.3.3.2 Inductive
Inductive reasoning starts with specific observations and tries
to move towards a generalized most likely conclusion; it weighs
the accumulated evidence to reach the most likely outcome. Here
the premises are viewed as supplying the necessary evidence for
the likely conclusion. The conclusion of an inductive argument is
probable, based upon the evidence given. An example of induc-
tive reasoning is scientific research-gathering evidence, identify-
ing patterns, and forming a hypothesis or theory to explain the
observation.
4.3.3.3 Abductive
Abductive tries to infer a theory from an observation; it tries to find
the simplest and most likely explanation that justifies the observa-
tion. In abductive reasoning also, the premises do not guarantee
the conclusion. Abductive reasoning usually uses an incomplete
set of observations to find the likeliest possible explanation for the
set. The abductive reasoning process usually needs creativity and
intuition, thereby making it most difficult to implement in com-
puter systems. An example of abductive reasoning is a medical di-
agnosis in which, given a set of symptoms and signs, doctors try to
determine the most likely cause (disease).
Copyright © 2016. Artech House. All rights reserved.
Diagnosis
Diagnosis of fault in machines or disease in human beings is com-
plex hybrid process that includes straightforward deduction (if x
is the symptom, then y must be the cause), induction (if x is the
symptom, then y is the most likely cause among n possible op-
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
126 IoT Technical Challenges and Solutions
Expert Systems
Expert systems can be regarded as automated diagnostic systems
in which rules and reasoners with domain knowledge are embed-
ded into the system and the system tries to recommend a possible
diagnosis or a set of diagnoses to the doctor or mechanic. It can
help experts like doctors and mechanics to make quick diagnostic
decisions.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Sensor Informatics and Business Insights 127
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
128 IoT Technical Challenges and Solutions
The most important aspect of any IoT system is the data being col-
lected. However, traditionally data will be in silos of individual
verticals or organizations. To deliver value, the data from different
sources and systems need to be aggregated together to gain far
greater insight. In this regard, this is the big push towards open
data, especially governments and smart cities all over the world
providing data sets to the public from their departments through
Web sites like data.gov. In many cases, this is not real-time data but
a slightly older data. This data needs to be complete, primary, time-
ly, accessible, machine-processible, nondiscriminatory, nonpropri-
etary, and license-free. Open data encourages transparency and
can generate new products and services and promote efficiency
due to better visibility. However, at this point, beyond smart cities
and government data, there is very little open data available in IoT
space for enterprises. It is obvious that such data cannot be made
available for free to everybody; hence, there is a case for creating a
data marketplace [61]. In a data marketplace [62], application de-
velopers need to buy data to create value-added applications on
it. When the business value created (in terms of operational cost
reduction or process optimization or improvement in efficiency)
is worth more than the data cost (which will be the usual case for
value creation via sensor informatics and analytics), it creates a vi-
able and scalable business model that is democratized. However,
ensuring the security and maintaining the privacy of such data are
important concerns that need to be addressed; in Chapter 3, we
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Sensor Informatics and Business Insights 129
References
[1] http://dictionary.cambridge.org/dictionary/english/context.
[2] http://inls151f14.web.unc.edu/files/2014/08/rowleydikw.pdf.
[3] https://www.cs.cf.ac.uk/Dave/Multimedia/node149.html.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
130 IoT Technical Challenges and Solutions
[4] http://redwood.berkeley.edu/bruno/npb261/aliasing.pdf.
[5] http://in.mathworks.com/help/signal/ref/resample.
html?s_tid=gn_loc_drop.
[6] http://ee.eng.usm.my/eeacad/mandeep/EEE436/chp%203.pdf.
[7] http://learn.mikroe.com/ebooks/digitalfilterdesign/chapter/
basic-concepts-of-digital-filtering/.
[8] http://dspguru.com/dsp/faqs/fir/basics.
[9] http://dspguru.com/dsp/faqs/iir/basics.
[10] http://www.ece.mcmaster.ca/faculty/reilly/coe4tl4/adaptive%20
filters%20Scot%20Douglas.PDF.
[11] http://in.mathworks.com/help/dsp/ug/overview-of-adaptive-filters-
and-applications.html.
[12] http://www.ee.lamar.edu/gleb/adsp/Lecture%2007%20-%20
Adaptive%20filtering.pdf.
[13] https://www.lsv.uni-saarland.de/fileadmin/teaching/dsp/ss15/
DSP2016/ADF_intro.pdf.
[14] https://courseware.ee.calpoly.edu/~fdepiero/fdepiero_dsp_notes/
notes%20%26%20materials/Adaptive_Filtering.pdf.
[15] http://www.itl.nist.gov/div898/handbook/eda/section3/eda35h.htm.
[16] http://eprints.whiterose.ac.uk/767/1/.
[17] https://arxiv.org/ftp/arxiv/papers/1107/1107.4414.pdf.
[18] http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3270843/.
[19] http://www.thefouriertransform.com/.
[20] http://www.robots.ox.ac.uk/~sjrob/Teaching/SP/l7.pdf.
[21] http://www.dspguide.com/ch12/2.htm.
[22] http://gwyddion.net/documentation/user-guide-en/wavelet-transform.
html.
[23] http://www.cse.iitm.ac.in/~vplab/courses/CV_DIP/PDF/Lect-wavelet_
filt.pdf.
Copyright © 2016. Artech House. All rights reserved.
[24] https://reference.wolfram.com/language/guide/Statistics.html.
[25] http://www.ncbi.nlm.nih.gov/pubmed/12762451.
[26] http://jmotif.github.io/sax-vsm_site/morea/algorithm/PAA.html.
[27] https://cs.gmu.edu/~jessica/sax.htm.
[28] http://www.ece.uic.edu/~devroye/courses/ECE531/lectures/b2c3.pdf.
[29] http://www-psych.stanford.edu/~lera/psych115s/notes/signal/.
[30] http://www.ece.iisc.ernet.in/~cmurthy/E1_244/Slides/Rohling.pdf.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Sensor Informatics and Business Insights 131
[31] http://ece.wpi.edu/radarcourse/Radar%202010%20PDFs/Radar%20
2009%20A_6%20Detection%20of%20Signals%20in%20Noise.pdf.
[32] http://research.microsoft.com/en-us/um/redmond/events/
cognetsummit/presentations/stancil.pdf.
[33] http://www.sis.pitt.edu/spring/patterns/node11.html.
[34] http://www.ece.uic.edu/~devroye/courses/ECE531/lectures/intro.pdf.
[35] http://stat.ethz.ch/~geer/bsa199_o.pdf.
[36] http://times.cs.uiuc.edu/course/410/note/mle.pdf.
[37] http://www.lx.it.pt/~mtf/learning/Bayes_lecture_notes.pdf.
[38] http://stanford.edu/class/ee363/lectures/kf.pdf.
[39] https://www.ieee.li/pdf/viewgraphs/multisensor_data_fusion.pdf.
[40] http://preserve.lehigh.edu/cgi/viewcontent.
cgi?article=2318&context=etd.
[41] http://cs.brown.edu/~ugur/8rulesSigRec.pdf.
[42] http://edoc-intranet.epfl.ch/files/content/sites/lts4/files/frossard/
publications/pdfs/icassp06.pdf.
[43] http://db.csail.mit.edu/pubs/cidr07.pdf.
[44] http://www.nist.gov/smartspace/downloads/ICME08_paper.pdf.
[45] http://alex.smola.org/drafts/thebook.pdf.
[46] http://www.sas.com/it_it/insights/analytics/machine-learning.html.
[47] http://www.cs.huji.ac.il/~shais/UnderstandingMachineLearning/
understanding-machine-learning-theory-algorithms.pdf.
[48] http://neuralnetworksanddeeplearning.com/.
[49] http://deeplearning.net/.
[50] https://en.wikipedia.org/wiki/Business_rules_engine.
[51] https://www.oasis-open.org/committees/tc_home.php?wg_
abbrev=wsbpel.
[52] http://www.brcommunity.com/b410.php.
Copyright © 2016. Artech House. All rights reserved.
[53] http://www.complexevents.com/about-real-time-intelligence-and-cep/.
[54] https://www.butte.edu/departments/cas/tipsheets/thinking/reasoning.
html.
[55] http://research.microsoft.com/pubs/192773/tr-2011-02-08.pdf.
[56] http://www.visual-analytics.eu/faq/.
[57] http://vis.pnnl.gov/pdf/RD_Agenda_VisualAnalytics.pdf.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
132 IoT Technical Challenges and Solutions
[58] http://www.automationworld.com/all/internet-things-and-importance-
modeling-and-simulation.
[59] http://mathworld.wolfram.com/OperationsResearch.html.
[60] http://web.mit.edu/~sgraves/www/papers/Graves_Kletter_Hetzel.pdf.
[61] http://radar.oreilly.com/2012/03/data-markets-survey.html.
[62] http://www.bigdataexchange.com/homepage/buyersellers/.
[63] https://www.datamapper.com/algorithms.
[64] https://algorithmia.com/.
[65] http://www.gartner.com/smarterwithgartner/the-algorithm-economy-
will-start-a-huge-wave-of-innovation/.
Selected Bibliography
Ackoff, R. L., “From Data to Wisdom,” Journal of Applied Systems Analysis, Vol. 16,
1989, pp. 3–9.
Allen, J., “Photoplethysmography and Its Application in Clinical Physiological
Measurement,” Physiol. Meas., Vol. 28, 2007, pp. R1–R39.
Arel, I., D. C. Rose, and T. P. Karnowski, “Deep Machine Learning: A New Fron-
tier in Artificial Intelligence Research [Research Frontier],” IEEE Computational
Intelligence Magazine, Vol. 5, No. 4, 2010, pp. 13–18.
Arora, A., et al. “Exscal: Elements of an Extreme Scale Wireless Sensor Network,”
Proc. 11th IEEE Intl. Conf. on Embedded and Real-Time Computing Systems and Ap-
plications, 2005, pp. 102–108.
Chandel, V., et al., “AcTrak: Unobtrusive Activity Detection and Step Counting
Using Smartphones,” in Mobile and Ubiquitous Systems: Computing, Networking,
and Services, New York: Springer, 2013, pp. 447–459.
Coutaz, J., et al., “Context Is Key,” Communications of the ACM, Vol. 48, No. 3, 2005,
pp. 49–53.
Daubechies, I., “The Wavelet Transform, Time-Frequency Localization and Signal
Analysis,” IEEE Trans. on Information Theory, Vol. 36, No. 5, 1990, pp. 961–1005.
Derler, P., E. A. Lee, and A. Sangiovanni Vincentelli, “Modeling Cyber–Physical
Copyright © 2016. Artech House. All rights reserved.
Systems,” Proc. of the IEEE, Vol. 100, No. 1, 2012, pp. 13–28.
Douglas, S. C., “Introduction to Adaptive Filters,” in Digital Signal Processing
Handbook, V. K. Madisetti and D. B. Williams, (eds.), Boca Raton, FL: CRC Press,
1999.
Friedman-Hill, E. “Jess, the Rule Engine for the Java Platform,” 2008.
Frigo, M., and S. G. Johnson, “FFTW: An Adaptive Software Architecture for the
FFT,” Proc. of the 1998 IEEE Intl. Conf. on Acoustics, Speech and Signal Processing, Vol.
3, 1998, pp. 1381–1384.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Sensor Informatics and Business Insights 133
Goodwin, G. C., and K. S. Sin, “Adaptive Filtering Prediction and Control,” Cou-
rier Corporation, 2014.
Graves, S. C., D. B. Kletter, and W. B. Hetzel. “A Dynamic Model for Requirements
Planning with Application to Supply Chain Optimization,” Operations Research,
Vol. 46, No. 3, Supplement 3, 1998, pp. S35–S49.
Grubbs, F. E., “Procedures for Detecting Outlying Observations in Samples,” Tech-
nometrics, Vol. 11, No. 1, February 1969, pp. 1–21.
Gubbi, J., et al., “Internet of Things (IoT): A Vision, Architectural Elements, and
Future Directions,” Future Generation Computer Systems, Vol. 29, No. 7, 2013, pp.
1645–1660.
Hall, D. L., and J. Llinas, “An Introduction to Multisensor Data Fusion,” Proc. of
the IEEE, Vol. 85, No. 1, 1997, pp. 6–23.
Haykin, S., Adaptive Filter Theory, Upper Saddle River, NJ: Prentice Hall 1996.
Honig, M. L., and D. G. Messerschmitt, Adaptive Filters, Structures, Algorithms and
Applications, Boston, MA: Kluwer Academic Publishers, 1984.
Jenkins, W. K., et al., Advanced Concepts in Adaptive Signal Processing, Boston, MA:
Kluwer Academic Publishers, 1996.
Kay, S. M., Fundamentals of Statistical Signal Processing, Vol. 1: Estimation Theory,
Upper Saddle River, NJ: Prentice Hall, 1993.
Kay, S. M., Fundamentals of Statistical Signal Processing, Vol. 2: Detection Theory, Up-
per Saddle River, NJ: Prentice Hall, 1998.
Kay, S. M., Fundamentals of Statistical Signal Processing: Practical Algorithm Develop-
ment, Vol. 3, Boston, MA: Pearson Education, 2013.
Keogh, E. J., and M. J Pazzani. “Scaling Up Dynamic Time Warping for Datamin-
ing Applications,” Proc. of 6th ACM SIGKDD Intl. Conf. on Knowledge Discovery and
Data Mining, 2000, pp. 285–289.
Kielman, J., and J. Thomas, (Guest Eds.), “Special Issue: Foundations and Fron-
tiers of Visual Analytics,” Information Visualization, Vol. 8, No. 4, Winter 2009, pp.
239–314.
Lertniphonphun, W., and J. H. McClellan. “Unified Design Algorithm for Com-
plex FIR and IIR Filters,” Proc. on 2001 IEEE Intl. Conf. on Acoustics, Speech, and
Signal Processing, (ICASSP’01), Vol. 6, 2001, pp. 3801–3804.
Li, C., and G. Miklau, “Pricing Aggregate Queries in a Data Marketplace,” Web-
DB, 2012, pp. 19–24.
Copyright © 2016. Artech House. All rights reserved.
Liggins II, M., D. Hall, and J. Llinas, (eds.), Handbook of Multisensor Data Fusion:
Theory and Practice, Boca Raton, FL: CRC Press, 2008.
Lin, J., et al., “A Symbolic Representation of Time Series, with Implications for
Streaming Algorithms,” Proc. of 8th ACM SIGMOD Workshop on Research Issues in
Data Mining and Knowledge Discovery, 2003, pp. 2–11.
Maddala, G. S., “Outliers,” in Introduction to Econometrics, 2nd ed., New York:
MacMillan, 1992, pp. 88–96.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
134 IoT Technical Challenges and Solutions
Magnani, L., Abduction, Reason, and Science: Processes of Discovery and Explanation,
New York: Kluwer Academic/Plenum Publishers, 2001.
Mannila, H., “Data Mining: Machine Learning, Statistics, and Databases,” IEEE
Computer Society Intl. Conf. Scientific and Statistical Database Management, 1996.
Manolakis, D. G., V. K. Ingle, and S. M. Kogon, Statistical and Adaptive Signal Pro-
cessing: Spectral Estimation, Signal Modeling, Adaptive Filtering, and Array Process-
ing, Norwood, MA: Artech House, 2005.
Menychtas, A., et al., “A Marketplace Framework for Trading Cloud-Based Ser-
vices,” in Economics of Grids, Clouds, Systems, and Services, New York: Springer,
2011, pp. 76–89.
Ojo, A., E. Curry, and T. Janowski, “Designing Next Generation Smart City Ini-
tiatives: Harnessing Findings and Lessons from a Study of Ten Smart City Pro-
grams,” 22nd European Conf. on Information Systems, Tel Aviv, 2014.
Pal, A., et al., “A Robust Heart Rate Detection Using Smart-Phone Video,” Proc. of
3rd ACM MobiHoc Workshop on Pervasive Wireless Healthcare, 2013, pp. 43–48.
Poor, V. H., An Introduction to Signal Detection and Estimation, 2nd ed., New York:
Springer, 1998.
Proctor, M., “Drools: A Rule Engine for Complex Event Processing,” in Applica-
tions of Graph Transformations with Industrial Relevance, New York: Springer, 2011,
pp. 2-2.
Russell, S., and P. Norvig, Artificial Intelligence: A Modern Approach, 2nd ed., Upper
Saddle River, NJ: Prentice Hall, 2003.
Skolnik, M. I., “Introduction to Radar,” in Radar Handbook, 2nd ed., New York:
McGraw Hill, 1962.
Sokwoo, R., “Design and Analysis of Artifact-Resistive Finger Photoplethysmo-
graphic Sensors for Vital Sign Monitoring,” Ph.D. dissertation, MIT, 2000.
Suh, J., et al., “A Performance Analysis of PIM, Stream Processing, and Tiled Pro-
cessing on Memory-Intensive Signal Processing Kernels,” ACM SIGARCH Com-
puter Architecture News, Vol. 31, No. 2, 2003, pp. 410–421.
Sun, Y., et al., “Advances on Data, Information, and Knowledge in the Internet of
Things,” Personal and Ubiquitous Computing, Vol. 18, No. 8, 2014, p. 1793.
Thomas, J. J., and K. A. Cook, “Illuminating the Path: The R&D Agenda for Visual
Analytics,” National Visualization and Analytics Center, 2005, p. 4.
Vickers, J., “The Problem of Induction,” Stanford Encyclopedia of Philosophy, June
Copyright © 2016. Artech House. All rights reserved.
21, 2010.
Hodge, V. J., and J. Austin, “A Survey of Outlier Detection Methodologies,” Arti-
ficial Intelligence Review, Vol. 22, No. 2, 2004, pp. 85–126.
Wang, H., D. Estrin, and L. Girod, “Preprocessing in a Tiered Sensor Network for
Habitat Monitoring,” EURASIP Journal on Advances in Signal Processing, Vol. 4,
2003, pp. 392–401.
Wu, J., et al., “Apparatus and Method for Providing a Data Marketplace,” U.S.
Patent Application 11/750,993, filed May 18, 2007.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
5
Mobile Sensing
5.1 Introduction
Each platform has its own sweet spot in the economic spatio-
temporal coverage as depicted in Figure 5.1. Satellites provide
a coarse view from space that can provide a large coverage but
has a low time resolution (i.e., periodicity of views available is in
days). Views from unmanned aerial vehicles (UAVs) provide a
135
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
136 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Mobile Sensing 137
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
138 IoT Technical Challenges and Solutions
Robots can have the ability to perform tasks that humans find dif-
ficult, monotonous, or inefficient to do [3]. They can assist in home
care support functions such as asset location, can move patients,
and can communicate with doctors in an emergency. Robotic pets
are becoming popular for wellness and theraputic purposes. In a
home care scenario, they may assist in sharing the location of med-
ication, objects, and people and may also help in navigation. They
need to be autonomous in terms of both mobility and decision-
making abilities. This requires systems for the data collection, pro-
cessing, storing, and use of information for the autonomous ser-
vices. Further medical robots are being used for several minimally
invasive surgical procedures.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Mobile Sensing 139
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
140 IoT Technical Challenges and Solutions
Table 5.1
Some of the Prominent UAV Applications for Different Verticals
Domains UAV Applications
Utilities Pipelines (oil, gas, water), power lines, wind farm, solar farm
Transportation Road traffic, railways, water transport
Government Coastal surveillance, public events, pollution, forests, smart city,
heritage sites, land use, and law and order
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Mobile Sensing 141
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
142 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Mobile Sensing 143
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
144 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Mobile Sensing 145
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
146 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Mobile Sensing 147
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
148 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Mobile Sensing 149
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
150 IoT Technical Challenges and Solutions
Table 5.2
UAV-Driven Computer Vision Methods for Construction and Building Monitoring
Use Cases Techniques or Approaches
Progress monitoring Leveraging spatial and temporal information in four
dimensions (4-D) for monitoring work-in-progress,
appearance-based reasoning about the progress
Site monitoring 4-D visualization of digital surface model (DSM), geometry-
based change detection, integrating aerial images with
augmented reality
Building inspection 3-D model-based damage estimation, edge detection for
identifying cracks on building façades and roofs
Building 3-D model, extracting building contours for measurement
measurement
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Mobile Sensing 151
cessing tools for visualization of aerial data, the fact is that end con-
sumers are not interested in just collecting and visualizing the data.
They are more interested in actionable information extracted from
the mission. Automatic object recognition, object-based measure-
ments, and change or anomaly detection are major requirements.
This requires a data processing pipeline that can work autono-
mously without manual intervention and provides information
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
152 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Mobile Sensing 153
Cd
Ns =
Cs (1 + ms ) * min(Tp , Tr )
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
154 IoT Technical Challenges and Solutions
Ps = ( pc + a ′p0 ) * N s
5.5 Summary
References
[1] http://www.ijcaonline.org/archives/volume83/number10/14488-2798.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Mobile Sensing 155
[2] http://techxplore.com/news/2014-02-data-gathering-tumbleweed-robot-
desertification.html.
[3] http://www.werobot2015.org/wp-content/uploads/2015/04/Simshaw-
Hauser-Terry-Cummings-Regulating-Healthcare-Robots.pdf.
[4] http://sites.tcs.com/blogs/research-and-innovation/
promise-inspection-drones-enterprises.
[5] https://www.researchgate.net/publication/229013654_MobiShop_Using_
Mobile_Phones_for_Sharing_Consumer_Pricing_Information.
[6] http://sites.tcs.com/blogs/research-and-innovation/
challenges-adopting-drones-inspection-utility-assets.
Selected Bibliography
Aberer, K., et al., “OpenSense: Open Community Driven Sensing of Environ-
ment,” Proc. IWGS ’10 of the ACM SIGSPATIAL Intl. Workshop on GeoStreaming,
2010.
Brezmes, T., J. L. Gorricho, and J. Cotrina, “Activity Recognition from Accelerom-
eter Data on a Mobile Phone,” Proc. of 10th Intl. Work-Conference on Artificial Neural
Networks: Part II: Distributed Computing, Artificial Intelligence, Bioinformatics, Soft
Computing, and Ambient Assisted Living, 2009.
Burke, J., et al., “Participatory Sensing,” Proc. ACM Sen-Sys Workshop, World-Sen-
sor-Web, 2006.
Campbell, A. T., et al., “People-Centric Urban Sensing,” 2nd ACM WICON, 2006,
p. 18.
Changkun, J., et al., “Economics of Peer-to-Peer Mobile Crowdsensing,” 2015
IEEE Global Communications Conference (GLOBECOM), 2015.
Das, T., et al., “Prism: Platform for Remote Sensing Using Smartphones,” Proc. 8th
ACM MobiSys, 2010.
Fossel, J., et al., “OctoSLAM: A 3D Mapping Approach to Situational Awareness
of Unmanned Aerial Vehicles,” Proc. of Intl. Conf. on Unmanned Aircraft Systems
(ICUAS), Atlanta, GA, May 28–31, 2013, pp. 179–188.
Guo, B., et al., “From Participatory Sensing to Mobile Crowd Sensing,” Proc. of
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
156 IoT Technical Challenges and Solutions
Kakaes, K., et al., “Drones and Aerial Observation: New Technologies for Proper-
ty Rights, Human Rights and Global Development: A Primer,” July 2015, http://
drones.newamerica.org.
Krause, A., et al., “Toward Community Sensing,” Proc.7th ACM/IEEE IPSN, 2008,
pp. 481–492.
Lane, N. D., et al., “A Survey of Mobile Phone Sensing,” IEEE Communications
Magazine, September 2010.
Li, Q., “Security, Privacy & Incentive Provision for Mobile Crowd Sensing Sys-
tems,” Doctoral Dissertation, Pennsylvania State University, University Park, PA,
2013.
Máthé, K., and Lucian Buşoniu, “Vision and Control for UAVs: A Survey of Gen-
eral Methods and of Inexpensive Platforms for Infrastructure Inspection,” Sen-
sors, Vol. 15, No. 7, June 25, 2015.
Pal, A., et al., “Road Condition Monitoring and Alert Application,” Pervasive Com-
puting and Communications Workshops (PERCOM Workshops), 2012.
Simshaw, D., et al., “Regulating Healthcare Robots: Maximizing Opportunities
While Minimizing Risks,” Richmond Journal of Law and Technology, Vol. 22, No. 3,
2016, http://jolt.richmond.edu/v22i2/article3.pdf.
Whitehead, K., and C. H. Hugenholtz, “Remote Sensing of the Environment with
Small Unmanned Aircraft Systems (UASs), Part 1: A Review of Progress and
Challenges,” J. Unmanned Veh. Syst., Vol. 2, 2014, pp. 69–85.
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
6
Democratizing Analytics: Analytics as a Service
In the IoT context, there are physical objects in the real world (e.g.,
buildings, cars, roads, environment, human bodies), which, when
perturbed by external stimuli in form of physical events (e.g., fire,
earthquake, traffic congestion, faults, disease), generate specific
sensor signals from specific features of interests (e.g., temperature,
vibration, location, speed, physiological parameters). Sensors are
the transducers placed on the physical objects that can observe the
property change of the feature of interests and provide that infor-
mation in the form of sensor signals. Sensor informatics, covered
in Chapter 4, extracts information from the sensor signal. The role
of analytics is to ingest this information and provide intelligence
from it. The whole process is outlined in Figure 6.1.
The objective of any IoT analytics application is the derivation
Copyright © 2016. Artech House. All rights reserved.
157
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
158 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Democratizing Analytics: Analytics as a Service 159
Table 6.1
Different Types of Analytics
Contextual Question Analytics Type IoT Analytics Case
Who, What, Where, When? Descriptive Smart parking, pollution monitoring
How did it happen? Diagnostic Hazardous scenario detection, water
leakage detection, perimeter access
control, elderly people monitoring:
fall or inactivity detection
Why did it happen? What is Predictive Electricity grid monitoring and
expected to happen? control, monitoring for people with
chronic disease, alert generation,
predictive analytics and disease
prognosis for health, predictive
maintenance of machines
What should be done to Prescriptive Traffic congestion management,
make it happen or not electricity peak load management,
happen? hazardous scenario response:
emergency evacuation
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
160 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Democratizing Analytics: Analytics as a Service 161
terns in the sensor signal. This model can be improved with the
scientific knowledge of design and operation of the machine.
• Use the learned and designed model to diagnose from the pat-
terns of the sensor signal whether the machine has gone “bad”
or which parts of the machine have gone “bad.” This is known
as diagnostic analytics.
• Going one step further, if sensor signal can be collected over
the lifespan of a machine gradually going from a good state to
a bad state, a regression-type predictive model can be built to
predict the failure of similar other machines. This can lead to
timely intervention through predictive maintenance reducing
machine downtime and cost of repair.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
162 IoT Technical Challenges and Solutions
perts in the Ops role who take the applications and systems de-
veloped by the Dev teams and deploy it in sensor network cum
cloud-based IoT infrastructure (Figures 2.1 and 2.4). For the ma-
chine predictive maintenance example given earlier, the Biz person
is the factory maintenance person, the Sci person is the physicist
or mechanical engineer who was involved in the machine design
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Democratizing Analytics: Analytics as a Service 163
or the person who understands the machine design. The Dev and
Ops roles remain similar to the healthcare example mapping to
programmers and application developers and IT infrastructure ex-
perts, respectively.
Traditionally, IoT applications are built bottom-up as per verti-
cal requirements starting with sensor integration followed by sen-
sor data collection using sensor networking, storing the collected
data, and finally analyzing the stored data and streamed data to
draw actionable insights. However, instead of taking the bottom-
up vertical approach for application development, from the cost of
development, ease of development, and code reuse perspective, it
is beneficial to have a horizontal, platform-driven approach. Many
of the existing IoT service platforms support features like user
management, resource provisioning, application life-cycle man-
agement, device management and configuration, and connectiv-
ity service provisioning and management. Another such platform
[TCS Connected Universe Platform (TCUP) [4]] tries to address a
few of the above concerns by providing an integrated application
development platform covering device management, data storage
and management, an application programming interface (API)
-based application development framework and a distributed ap-
plication deployment framework.
What is primarily missing in the above frameworks is a service
layer abstracting analytics to a higher level, thereby making it easy
to use. The study of IoT analytics problems (all of which is handled
in detail in Chapter 4) clearly indicates that the developers of IoT
analytics systems typically spend maximum of their development
time in few specific tasks:
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
164 IoT Technical Challenges and Solutions
mantics for sensor data needed for a full-fledged IoT system. The
need for a distributed computing environment to deploy and ex-
ecute the analytics across multiple computing entities distributed
in space while still meeting timing requirements adds interesting
new dimensions to the analytics deployment challenges. This be-
comes further challenging with the advent of multicore processors
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Democratizing Analytics: Analytics as a Service 165
There has been quite a bit of ongoing work on MDD systems on the
implementation side. One example of such effort is from an organi-
zation called OASIS (Advancing Open Standards for the Informa-
tion Society) [10]. They have brought a new standard metamodel
for IT services “The Topology and Orchestration Specification for
Cloud Applications” (TOSCA) [11] for improving portability of
cloud applications in heterogeneous application environments.
Here the structure of a service is defined by the topology template
with a directed graph, which, in turn, consists of node templates
and relationship templates. TOSCA allows defining complex
workflows that can be used for the management process of cre-
ating, deploying, and terminating services. It specifies an Exten-
sible Markup Language (XML)-based syntax for describing the
basic data and components [12], while existing business process
modeling languages such as Business Process Execution Language
(BPEL) [13] and Business Process Model and Notation (BPMN)
[14] are used to describe plans.
An open source implementation and development framework
is available in OpenTOSCA [15]. The architecture [16] supported
in OpenTOSCA is outlined in Figure 6.4. It has descriptors for end
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
166 IoT Technical Challenges and Solutions
processes (Biz), but they complete lack support of the Sci for IoT
analytics applications development. Their support from Biz, Dev,
and Ops also lacks the support of sensors, sensor integration to
the cloud, and cloud-based sensor device management. However,
these drawbacks can be addressed through addition of sensor in-
tegration and management functionalities in the IoT platform and
through knowledge-driven architectures as outlined in Figure 6.5.
Such knowledge-driven architectures can support modeling of
knowledge of the different expert stakeholders described in Fig-
ure 6.3, thereby allowing separation of their concerns. An applica-
tion developer can take advantage of the knowledge of the other
stakeholders encoded in the system to quickly develop analytics
applications.
The different knowledge bases described in Figure 6.5 is out-
lined next.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Democratizing Analytics: Analytics as a Service 167
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
168 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Democratizing Analytics: Analytics as a Service 169
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
170 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Democratizing Analytics: Analytics as a Service 171
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
172 IoT Technical Challenges and Solutions
6.5 Summary
In this chapter, we first established the need for IoT analytics citing
some example use cases. We took an example use case of predic-
tive maintenance of machines to elaborate on the complexity of the
analytics development process. Then we elaborated the need for
analytics as a service for IoT, taking an example of health and well-
ness via physiological sensing and suggested how services like
anomaly detection, feature engineering, and compression, if done
in a sensor-agnostic way, can really add value to the IoT analytics
developer. We also introduced the need for learning models from
the cleaned up sensor data using the hybrid knowledge of physi-
cal sciences and data sciences there by establishing the multidisci-
plinary skill requirement for IoT analytics. This, when combined
with the typical IoT analytics development project requirement of
involving multiple stakeholders in form of Biz-Sci-Dev-Ops, point
towards MDD as a possible approach towards separating and ad-
dressing the concerns of each of the stakeholders. We introduced
knowledge models for different these stakeholders of IoT analytics
and identified four different knowledge models for four different
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Democratizing Analytics: Analytics as a Service 173
References
[1] http://agilemethodology.org/.
[2] https://blog.appdynamics.com/devops/
new-modern-family-business-development-operations-bizdevops/.
[3] ����������������������������������������������������������������
http://www.tcs.com/resources/newsletters/Pages/Biz-DevOps-Enter-
prise-Agility.aspx.
[4] http://www.tcs.com/about/research/Pages/TCS-Connected-Universe-
Platform.aspx.
[5] http://www.agilemodeling.com/essays/amdd.htm.
[6] https://msdn.microsoft.com/en-us/library/aa964145.aspx.
[7] http://www.w3.org/2014/02/wot/papers/prehofer.pdf.
[8] https://software.intel.com/en-us/articles/
frequently-asked-questions-intel-multi-core-processor-architecture.
[9] http://www.nvidia.com/object/what-is-gpu-computing.html.
[10] https://www.oasis-open.org/org.
[11] https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=tosca.
[12] http://www.w3schools.com/xml/.
[13] http://searchsoa.techtarget.com/tutorial/BPEL-tutorial.
[14] http://www.bpmn.org/.
[15] http://www.iaas.uni-stuttgart.de/OpenTOSCA/indexE.php.
[16] http://www.iaas.uni-stuttgart.de/OpenTOSCA/container_architecture.
php.
Copyright © 2016. Artech House. All rights reserved.
[17] http://www.usb.org/home.
[18] https://www.bluetooth.com/.
[19] http://www.zigbee.org/.
[20] http://www.wi-fi.org/.
[21] http://www.3gpp.org/.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
174 IoT Technical Challenges and Solutions
Selected Bibliography
Balamurali P, P. Misra, and A. Pal, “Software Platforms for Internet of Things and
M2M,” Journal of the Indian Institute of Science, A Multidisciplinary Reviews Journal,
Vol. 93, No. 3, July–September 2013.
Bandyopadhyay, S., et al., “Demo: IAS: Information Analytics for Sensors,” Proc.
of the 13th ACM Conf. on Embedded Networked Sensor Systems, 2015, pp. 469–470.
Bonomi, F., et al., “Fog Computing and Its Role in the Internet of Things,” AMC
Proc. of the 1st Edition of the MCC Workshop on Mobile Cloud Computing, MCC ’12,
New York, NY, 2012, pp. 13–16.
Chattopadhyay, T., et al., “Automated Workflow Formation for IoT Analytics: A
Case Study,” IoTaaS, IoT360, Rome, Italy, October 2015.
Dasgupta, R., and S. Dey, “A Comprehensive Sensor Taxonomy and Semantic
Knowledge Representation: Energy Meter Use Case,” 7th Intl. Conf. on Sensing
Technology, 2013.
Dey, S., et al., “A Semantic Sensor Network (SSN) Ontology Based Tool for Se-
mantic Exploration of Sensor,” Semantic Web Challenge Competition ISWC, 2014.
Ghose, A., et al., “Design Insights for a Mobile Based Sensor Application Frame-
work: For Aiding Platform Independent Algorithm Design,” 14th Intl. Conf. on
Information Processing in Sensor Networks (IPSN), 2015.
Gubbi, J., et al., “Internet of Things (IoT): A Vision, Architectural Elements, and
Future Directions,” Elsevier Journal on Future Generation Computer Systems, Vol. 29,
2013, pp. 1645–1660.
Jaiswal, D., et al., “Demo: A Smart Framework for IoT Analytic Workflow Devel-
opment,” Proc. of 13th ACM Conf. on Embedded Networked Sensor Systems, 2015, pp.
455–456.
Köhler, M., D. Wörner, and F. Wortmann, “Platforms for the Internet of
Things: An Analysis of Existing Solutions,” http://cocoa.ethz.ch/down-
loads/2014/02/1682_20140212%20-%20Bocse.pdf.
Li, F., et al., “Towards Automated IoT Application Deployment by a Cloud-Based
Approach,” IEEE 6th Intl. Conf. on Service-Oriented Computing and Applications
(SOCA), 2013.
Mistry, S., et al., “P2P-Based Service Distribution over Distributed Resources,”
2015 IEEE 29th Intl. Conf. on Advanced Information Networking and Applications
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Democratizing Analytics: Analytics as a Service 175
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Copyright © 2016. Artech House. All rights reserved.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
7
The Real Internet of Things and Beyond
177
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
178 IoT Technical Challenges and Solutions
deployment context.
The following are several factors contributing to a real IoT.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
The Real Internet of Things and Beyond 179
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
180 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
The Real Internet of Things and Beyond 181
port [4]. They are operational efficiency, new products and services,
outcome economy, and autonomous and pull economy. In the ini-
tial phase, focus can be given to improving operational efficiency
through various means such as improved asset utilization, opera-
tional cost reduction and worker productivity. In the second phase,
new products and services can be focused. This may involve new
software services, data monetization, and payment models such as
pay per use. Outcome economy will focus on systems by forming
and leveraging new connected ecosystems, platform-enabled mar-
ketplaces, and new payment processes. Finally, autonomous and
pull economy is leveraged by continuous demand sensing, end-to-
end automation, resource optimization, and waste reduction.
In each of these phases, there is a potential to explore appro-
priate new business models. Remote monitoring and maintenance
are an upcoming service and business model enabled by IoT. New
payment models that will enable charging for usage and service
quality levels are promising. “TotalCare” aerospace service from
Rolls Royce is an example of a business model applicable to IoT
where the payment mechanism for aircraft engines is $/engine fly-
ing hours. Supporting such a service requires extensive sensing,
monitoring, analytics, and prediction [5].
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
182 IoT Technical Challenges and Solutions
7.2.1 Some of the Common Trade-Offs Encountered in IoT Systems and Applications
7.2.1.1 Hard Sensing Versus Soft Sensing
Appropriate hard sensors can be used for every phenomenon or
feature to be monitored. In some cases, there is a possibility of us-
ing analytics and inference to reduce the number of hard sensors
required. While these soft sensors that are implemented in soft-
ware will help to reduce the sensor cost, it may increase the soft-
ware complexity and cost of software and computing platform de-
pending on where it is implemented. A suitable balance should be
made between hard sensing and soft sensing.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
The Real Internet of Things and Beyond 183
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
184 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
The Real Internet of Things and Beyond 185
all the wearable devices of the workers, but are they highly band-
width constrained and will they be sufficient for the communica-
tion requirements?
Communication depends on where the data is required and
where it is processed. The sensor data processing pipeline includes
data preprocessing, filtering, motion artifact removal, parameter
computations, and event detection. One option is to implement the
whole pipeline in the wearable device itself and only the events
need to be communicated to the cloud. This will have an impact
on the computing, memory, and energy required for the wearable
device and may lead to a short battery life. However, there is an
option to distribute the computation between the wearable device,
the gateway, and the cloud. In this approach, the preprocessing
and other low-intensity computations resulting in a data reduction
can be planned to execute in the wearable device. The reduced data
can be further processed at the gateway level or cloud. If there is
a good connectivity available between the gateway and the cloud,
then it is advisable to do it in the cloud for ease of maintenance and
security.
Camera-based sensing is an alternate or complementary ap-
proach for the situation monitoring. There the computation re-
quirements are comparatively high, but it has the potential to
gather additional information. Here also one has to go through the
above analysis process to evaluate the solution architecture.
The exercise is not yet over. We need to look at the business
model as well. Who will build, operate, and maintain the solution
and how is the cash flow? One option is that the steel plant can
get this system implemented by an external vendor and they take
care of the operation and maintenance as well. This will involve a
one-time contract fee with an annual maintenance charge. Another
payment option is to charge per worker on an annual basis. Here
then data and services may be hosted by the vendor. Alternately,
Copyright © 2016. Artech House. All rights reserved.
this may be hosted in a cloud under the control of the steel plant.
There is a room for bringing in insurance companies as a stake-
holder in this business. Here the steel plant may engage with the
insurance company for covering damages related to safety and se-
curity. The insurance company, in turn, can engage a vendor for
deploying the above IoT solution supporting a feature set deter-
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
186 IoT Technical Challenges and Solutions
mined from a risk analysis. There are many more possibilities for
the suitable business model.
The next wave of IoT will most likely to focus on robustness and
resilience by leveraging distributed embedded intelligence. A brief
conceptual overview of two major aspects, namely, resilient IoT
systems and cognitive IoT systems, is given next.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
The Real Internet of Things and Beyond 187
resilience. The second aspect is that how IoT can be used to make
systems cognitive.
There are several aspects of cognitive systems that will be rel-
evant for IoT.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
188 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
The Real Internet of Things and Beyond 189
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
190 IoT Technical Challenges and Solutions
ogy challenges and the economy or business case for such sensing
and analytics systems. In Chapter 6, we addressed the application
developer concerns by introducing the concept of analytics as a
service on top of the sensor informatics stack outlined in Chapter
4. Finally, in this chapter, we address the real issues that need to be
tackled for successful deployment of IoT applications.
While IoT gets a lot of attention with academia and industry,
there is lot to be desired on the success rate of real-life IoT projects.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
The Real Internet of Things and Beyond 191
References
[1] http://www.sustainablebrands.com/news_and_views/ict_big_data/bart_
king/case_study_18month_roi_north_face_connected_ems_retail_stores.
[2] http://cio.economictimes.indiatimes.com/news/internet-of-things/8-out-
of-10-iot-projects-fail-even-before-they-are-launched/52448887.
[3] Weiser, M., “The Computer for the 21st Century,” Scientific American, Sep-
tember, 1991, pp. 94-104; reprinted in IEEE Pervasive Computing, January-
March 2002.
[4] ����������������������������������������������������������
http://www3.weforum.org/docs/WEFUSA_IndustrialInternet_Re-
port2015.pdf.
[5] http://www.rolls-royce.com/pro-and-services/civil-aerospace/services/
services-catalogue/totalcare.aspx.
Selected Bibliography
4G Americas Cellular Technologies, “Enabling the Internet of Things,” November
2015, http://www.4gamericas.org/files/6014/4683/4670/4G_Americas_Cellu-
Copyright © 2016. Artech House. All rights reserved.
lar_Technologies_Enabling_the_IoT_White_Paper_-_November_2015.pdf.
Athreya, A. P., B. DeBruhl, and P. Tague, “Designing for Self-Configuration and
Self-Adaptation in the Internet of Things,” 9th Intl. Conf. on Collaborative Comput-
ing: Networking Applications and Worksharing (Collabcom 2013), 2013.
Athreya, P., and P. Tague, “Network Self-Organization in the Internet of Things,”
10th Annual IEEE Communications Society Conference on Sense, Mesh, and Ad Hoc
Communications and Networks (SECON), 24–27 June 2013.
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
192 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
About the Authors
Arpan Pal received his B.Tech and M.Tech from the Indian Insti-
tute of Technology, Kharagpur, India, in electronics and telecom-
munications in 1990 and 1993, respectively, followed by a PhD.
from Aalborg University, Denmark.
He has more than 24 years of experience in the areas of sig-
nal processing, communication, and real-time embedded systems.
Currently, he works for Tata Consultancy Services (TCS), where, as
principal scientist, he heads the Embedded Systems and Robotics
Research Area. His areas of interest include mobile phone, camera
and biosensing, physiological sensing, machine to machine (M2M)
communications and Internet of Things-based platforms and sys-
tems. He had earlier worked with the Defense Research and Devel-
opment Organization (DRDO) of the Indian government working
on missile seeker signal processing and he had also worked with
Macmet Interactive Technologies, leading their real-time systems
group in the area of interactive TV and set-top boxes.
Dr. Pal currently has more than 85 publications in reputed
journals and conferences along with a couple of book chapters. He
has also filed for more than 75 patents and has 15 patents that have
been granted. He is an associate editor for reputed journals like
ACM Transactions on Embedded Computing Systems and IEEE Trans-
actions on Emerging Topics in Computing and IT Professional Magazine
from the IEEE Computer Society. He is in the program committee
Copyright © 2016. Artech House. All rights reserved.
193
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
194 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Index
Analytics facilities, 20
context-aware, 34 illustrated, 23
data linkage, 91 industry vertical, 23
development stakeholders, 162 products, 20–21
diagnostic, 160–61 supply chain, 22
Application space, 21
195
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
196 IoT Technical Challenges and Solutions
Artificial neural networks (ANNs), 122 security and privacy, 33–34, 73–104
Attestation, 101
Authentication, 87–88 Cloud
in IoT security, 79 connectivity networks, 26
multifactor (MFA), 87 infrastructure, 76
options, 88 interfaces, 103
practical guidelines, 100–101 subsystem, 26–28
SSL (Secure Sockets Layer), 87 Clustering and classification, 122
TLS (Transport Layer Security), 87 CoAP, 56
Authorization, 79 Code division multiple access
(CDMA), 25
B Cognitive IoT, 187–88
Battery lifetime versus performance, Collaborative sensing, 138, 145–47
183 Communication, range, power, and
Bayesian minimum squared error bandwidth trade-offs, 183
(BMSE), 117 Communication security
Biz-Sci-Dev-Ops, 161–63, 166–68 cryptographic key management,
Biz knowledge base, 166 84–86
Dev knowledge base, 167 features of wireless standards, 83
Ops knowledge base, 168 overview, 83–84
Sci knowledge base, 167 practical guidelines, 101
Bluetooth, 53 protocols, 84
Bluetooth Low Energy (BLE), 53 requirements, 84
Bundle Protocol (BP), 59 Communication technologies
Business insights, 111, 126–28 application-level protocols, 55–56
modeling and simulation, 127 cellular, 54–55
optimization and planning, 127–28 fifth generation (5G), 188–90
visual analytics, 126–27 for low power wide area networks
workflow, 126 (LPWAN), 53–54
Business model, 180–81 overview, 49–50
personal/local area network, 50–53
C Community sensing, 144
Complex event processing (CEP)
Carrier sense multiple access/collision
systems, 26, 124
advance (CSMA/CA), 50–51
Copyright © 2016. Artech House. All rights reserved.
Compression, 115–16
Cellular technology, 54–55
Concluding remarks, 190–91
Challenges in deployments
Confidentiality, integrity, and
affordability, 34–35
availability (CIA), 78
context-aware analytics, 34
Consumers, 21–22
ease and economy, 35
Context-aware analytics, 34
realistic deployments, 35
Core business areas, 20
scalability, 32–33, 41–67
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Index 197
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
198 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Index 199
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
200 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Index 201
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
202 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
Index 203
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.
204 IoT Technical Challenges and Solutions
Pal, Arpan, and Balamuralidhar Purushothaman. IoT Technical Challenges and Solutions, Artech House, 2016. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/binghamton/detail.action?docID=4845595.
Created from binghamton on 2025-05-14 01:10:15.